ترغب بنشر مسار تعليمي؟ اضغط هنا

Condition Numbers of Gaussian Random Matrices

27   0   0.0 ( 0 )
 نشر من قبل Zizhong Chen
 تاريخ النشر 2008
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Let $G_{m times n}$ be an $m times n$ real random matrix whose elements are independent and identically distributed standard normal random variables, and let $kappa_2(G_{m times n})$ be the 2-norm condition number of $G_{m times n}$. We prove that, for any $m geq 2$, $n geq 2$ and $x geq |n-m|+1$, $kappa_2(G_{m times n})$ satisfies $ frac{1}{sqrt{2pi}} ({c}/{x})^{|n-m|+1} < P(frac{kappa_2(G_{m times n})} {{n}/{(|n-m|+1)}}> x) < frac{1}{sqrt{2pi}} ({C}/{x})^{|n-m|+1}, $ where $0.245 leq c leq 2.000$ and $ 5.013 leq C leq 6.414$ are universal positive constants independent of $m$, $n$ and $x$. Moreover, for any $m geq 2$ and $n geq 2$, $ E(logkappa_2(G_{m times n})) < log frac{n}{|n-m|+1} + 2.258. $ A similar pair of results for complex Gaussian random matrices is also established.

قيم البحث

اقرأ أيضاً

The topology and geometry of random fields - in terms of the Euler characteristic and the Minkowski functionals - has received a lot of attention in the context of the Cosmic Microwave Background (CMB), as the detection of primordial non-Gaussianitie s would form a valuable clue on the physics of the early Universe. The virtue of both the Euler characteristic and the Minkowski functionals in general, lies in the fact that there exist closed form expressions for their expectation values for Gaussian random fields. However, the Euler characteristic and Minkowski functionals are summarizing characteristics of topology and geometry. Considerably more topological information is contained in the homology of the random field, as it completely describes the creation, merging and disappearance of topological features in superlevel set filtrations. In the present study we extend the topological analysis of the superlevel set filtrations of two-dimensional Gaussian random fields by analysing the statistical properties of the Betti numbers - counting the number of connected components and loops - and the persistence diagrams - describing the creation and mergers of homological features. Using the link between homology and the critical points of a function - as illustrated by the Morse-Smale complex - we derive a one-parameter fitting formula for the expectation value of the Betti numbers and forward this formalism to the persistent diagrams. We, moreover, numerically demonstrate the sensitivity of the Betti numbers and persistence diagrams to the presence of non-Gaussianities.
82 - Ehsan Rohani , Gwan Choi , Mi Lu 2017
In this paper we introduce the algorithm and the fixed point hardware to calculate the normalized singular value decomposition of a non-symmetric matrices using Givens fast (approximate) rotations. This algorithm only uses the basic combinational log ic modules such as adders, multiplexers, encoders, Barrel shifters (B-shifters), and comparators and does not use any lookup table. This method in fact combines the iterative properties of singular value decomposition method and CORDIC method in one single iteration. The introduced architecture is a systolic architecture that uses two different types of processors, diagonal and non-diagonal processors. The diagonal processor calculates, transmits and applies the horizontal and vertical rotations, while the non-diagonal processor uses a fully combinational architecture to receive, and apply the rotations. The diagonal processor uses priority encoders, Barrel shifters, and comparators to calculate the rotation angles. Both processors use a series of adders to apply the rotation angles. The design presented in this work provides $2.83sim649$ times better energy per matrix performance compared to the state of the art designs. This performance achieved without the employment of pipelining; a better performance advantage is expected to be achieved employing pipelining.
We present a parallel algorithm for computing the approximate factorization of an $N$-by-$N$ kernel matrix. Once this factorization has been constructed (with $N log^2 N $ work), we can solve linear systems with this matrix with $N log N $ work. Kern el matrices represent pairwise interactions of points in metric spaces. They appear in machine learning, approximation theory, and computational physics. Kernel matrices are typically dense (matrix multiplication scales quadratically with $N$) and ill-conditioned (solves can require 100s of Krylov iterations). Thus, fast algorithms for matrix multiplication and factorization are critical for scalability. Recently we introduced ASKIT, a new method for approximating a kernel matrix that resembles N-body methods. Here we introduce INV-ASKIT, a factorization scheme based on ASKIT. We describe the new method, derive complexity estimates, and conduct an empirical study of its accuracy and scalability. We report results on real-world datasets including COVTYPE ($0.5$M points in 54 dimensions), SUSY ($4.5$M points in 8 dimensions) and MNIST (2M points in 784 dimensions) using shared and distributed memory parallelism. In our largest run we approximately factorize a dense matrix of size 32M $times$ 32M (generated from points in 64 dimensions) on 4,096 Sandy-Bridge cores. To our knowledge these results improve the state of the art by several orders of magnitude.
We present the relation between the genus in cosmology and the Betti numbers for excursion sets of three- and two-dimensional smooth Gaussian random fields, and numerically investigate the Betti numbers as a function of threshold level. Betti numbers are topological invariants of figures that can be used to distinguish topological spaces. In the case of the excursion sets of a three-dimensional field there are three possibly non-zero Betti numbers; $beta_0$ is the number of connected regions, $beta_1$ is the number of circular holes, and $beta_2$ is the number of three-dimensional voids. Their sum with alternating signs is the genus of the surface of excursion regions. It is found that each Betti number has a dominant contribution to the genus in a specific threshold range. $beta_0$ dominates the high-threshold part of the genus curve measuring the abundance of high density regions (clusters). $beta_1$ dominates the genus near the median thresholds which measures the topology of negatively curved iso-density surfaces, and $beta_2$ corresponds to the low-threshold part measuring the void abundance. We average the Betti number curves (the Betti numbers as a function of the threshold level) over many realizations of Gaussian fields and find that both the amplitude and shape of the Betti number curves depend on the slope of the power spectrum $n$ in such a way that their shape becomes broader and their amplitude drops less steeply than the genus as $n$ decreases. This behaviour contrasts with the fact that the shape of the genus curve is fixed for all Gaussian fields regardless of the power spectrum. Even though the Gaussian Betti number curves should be calculated for each given power spectrum, we propose to use the Betti numbers for better specification of the topology of large scale structures in the universe.
A novel Mathematical Random Number Generator (MRNG) is presented here. In this case, mathematical refers to the fact that to construct that generator it is not necessary to resort to a physical phenomenon, such as the thermal noise of an electronic d evice, but rather to a mathematical procedure. The MRNG generates binary strings - in principle, as long as desired - which may be considered genuinely random in the sense that they pass the statistical tests currently accepted to evaluate the randomness of those strings. From those strings, the MRNG also generates random numbers expressed in base 10. An MRNG has been installed as a facility on the following web page: http://www.appliedmathgroup.org. This generator may be used for applications in tasks in: a) computational simulation of probabilistic-type systems, and b) the random selection of samples of different populations. Users interested in applications in cryptography can build another MRNG, but they would have to withhold information - specified in section 5 - from people who are not authorized to decode messages encrypted using that resource.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا