-
Learning the P2D Model for Lithium-Ion Batteries with SOH Detection
Authors:
Maricela Best McKay,
Bhushan Gopaluni,
Brian Wetton
Abstract:
Lithium ion batteries are widely used in many applications. Battery management systems control their optimal use and charging and predict when the battery will cease to deliver the required output on a planned duty or driving cycle. Such systems use a simulation of a mathematical model of battery performance. These models can be electrochemical or data-driven. Electrochemical models for batteries…
▽ More
Lithium ion batteries are widely used in many applications. Battery management systems control their optimal use and charging and predict when the battery will cease to deliver the required output on a planned duty or driving cycle. Such systems use a simulation of a mathematical model of battery performance. These models can be electrochemical or data-driven. Electrochemical models for batteries running at high currents are mathematically and computationally complex. In this work, we show that a well-regarded electrochemical model, the Pseudo Two Dimensional (P2D) model, can be replaced by a computationally efficient Convolutional Neural Network (CNN) surrogate model fit to accurately simulated data from a class of random driving cycles. We demonstrate that a CNN is an ideal choice for accurately capturing Lithium ion concentration profiles. Additionally, we show how the neural network model can be adjusted to correspond to battery changes in State of Health (SOH).
△ Less
Submitted 19 February, 2025;
originally announced February 2025.
-
Optimizing Global Genomic Surveillance for Early Detection of Emerging SARS-CoV-2 Variants
Authors:
Haogao Gu,
Jifan Li,
Wanying Sun,
Mengting Li,
Kathy Leung,
Joseph T. Wu,
Hsiang-Yu Yuan,
Maggie H. Wang,
Bingyi Yang,
Matthew R. McKay,
Ning Ning,
Leo L. M. Poon
Abstract:
Background: Global viral threats underscore the need for effective genomic surveillance, but high costs and uneven resource distribution hamper its implementation. Targeting surveillance to international travelers in major travel hubs may offer a more efficient strategy for the early detection of SARS-CoV-2 variants.
Methods: We developed and calibrated a multiple-strain metapopulation model of…
▽ More
Background: Global viral threats underscore the need for effective genomic surveillance, but high costs and uneven resource distribution hamper its implementation. Targeting surveillance to international travelers in major travel hubs may offer a more efficient strategy for the early detection of SARS-CoV-2 variants.
Methods: We developed and calibrated a multiple-strain metapopulation model of global SARS-CoV-2 transmission using extensive epidemiological, phylogenetic, and high-resolution air travel data. We then compared baseline surveillance with various resource-allocation approaches that prioritize travelers, focusing on Omicron BA.1/BA.2 retrospectively and on hypothetical future variants under different emergence, transmission and vaccine effectiveness scenarios.
Findings: Focusing existing surveillance resources on travelers at key global hubs significantly shortened detection delays without increasing total surveillance efforts. In retrospective analyses of Omicron BA.1/BA.2, traveler-targeted approaches consistently outperformed baseline strategies, even when overall resources were reduced. Simulations indicate that focusing surveillance on key travel hubs outperform baseline practices in detecting future variants, across different possible origins, even with reduced resources. This approach also remains effective in future pandemic scenarios with varying reproductive numbers and vaccine effectiveness.
Interpretation: These findings provide a quantitative, cost-effective framework for strengthening global genomic surveillance. By reallocating resources toward international travelers in select travel hubs, early detection of emerging variants can be enhanced, informing rapid public health interventions and bolstering preparedness for future pandemics.
△ Less
Submitted 13 February, 2025; v1 submitted 2 February, 2025;
originally announced February 2025.
-
AI Across Borders: Exploring Perceptions and Interactions in Higher Education
Authors:
Juliana Gerard,
Sahajpreet Singh,
Morgan Macleod,
Michael McKay,
Antoine Rivoire,
Tanmoy Chakraborty,
Muskaan Singh
Abstract:
This study investigates students' perceptions of Generative Artificial Intelligence (AI), with a focus on Higher Education institutions in Northern Ireland and India. We collect quantitative Likert ratings and qualitative comments from 1,211 students on their awareness and perceptions of AI and investigate variations in attitudes toward AI across institutions and subject areas, as well as interact…
▽ More
This study investigates students' perceptions of Generative Artificial Intelligence (AI), with a focus on Higher Education institutions in Northern Ireland and India. We collect quantitative Likert ratings and qualitative comments from 1,211 students on their awareness and perceptions of AI and investigate variations in attitudes toward AI across institutions and subject areas, as well as interactions between these variables with demographic variables (focusing on gender). We find that: (a) while perceptions varied across institutions, responses for Computer Sciences students were similar; and (b) after controlling for institution and subject area, we observed no effect of gender. These results are consistent with previous studies, which find that students' perceptions are predicted by prior experience. We consider the implications of this relation and some considerations for the role of experience.
△ Less
Submitted 15 December, 2024;
originally announced January 2025.
-
Error-Mitigated Quantum Random Access Memory
Authors:
Wenbo Shi,
Neel Kanth Kundu,
Matthew R. McKay,
Robert Malaney
Abstract:
As an alternative to quantum error correction, quantum error mitigation methods, including Zero-Noise Extrapolation (ZNE), have been proposed to alleviate run-time errors in current noisy quantum devices. In this work, we propose a modified version of ZNE that provides for a significant performance enhancement on current noisy devices. Our modified ZNE method extrapolates to zero-noise data by eva…
▽ More
As an alternative to quantum error correction, quantum error mitigation methods, including Zero-Noise Extrapolation (ZNE), have been proposed to alleviate run-time errors in current noisy quantum devices. In this work, we propose a modified version of ZNE that provides for a significant performance enhancement on current noisy devices. Our modified ZNE method extrapolates to zero-noise data by evaluating groups of noisy data obtained from noise-scaled circuits and selecting extrapolation functions for each group with the assistance of estimated noisy simulation results. To quantify enhancement in a real-world quantum application, we embed our modified ZNE in Quantum Random Access Memory (QRAM) - a memory system important for future quantum networks and computers. Our new ZNE-enhanced QRAM designs are experimentally implemented on a 27-qubit noisy superconducting quantum device, the results of which demonstrate QRAM fidelity can be improved significantly relative to traditional ZNE usage. Our results demonstrate the critical role the extrapolation function plays in ZNE - judicious choice of that function on a per-measurement basis can make the difference between a quantum application being functional or non-functional.
△ Less
Submitted 21 October, 2024; v1 submitted 10 March, 2024;
originally announced March 2024.
-
Transitions in magnetic behavior at the substellar boundary
Authors:
E. Magaudda,
B. Stelzer,
R. A. Osten,
J. S. Pineda,
St. Raetz,
M. McKay
Abstract:
We aim at advancing our understanding of magnetic activity and the underlying dynamo mechanism at the end of the main-sequence. To this end, we collected simultaneous X-ray and radio observations for a sample of M7-L0 dwarfs using XMM-Newton jointly with the JVLA and the ATCA. We also included data from the all-sky surveys of eROSITA on board the Russian Spektrum-Roentgen-Gamma mission (SRG) and r…
▽ More
We aim at advancing our understanding of magnetic activity and the underlying dynamo mechanism at the end of the main-sequence. To this end, we collected simultaneous X-ray and radio observations for a sample of M7-L0 dwarfs using XMM-Newton jointly with the JVLA and the ATCA. We also included data from the all-sky surveys of eROSITA on board the Russian Spektrum-Roentgen-Gamma mission (SRG) and rotation periods from TESS together with an archival compilation of X-ray and radio data for UCDs from the literature. We limit the sample to objects with rotation period <1d, focusing on the study of a transition in magnetic behavior suggested by a drastic change in the radio detection rate at vsini \approx 38 km/s. We compiled the most up-to-date radio/X-ray luminosity relation for 26 UCDs with rotation periods lower than 1d, finding that rapid rotators lie the furthest away from the Güdel-Benz relation previously studied for earlier-type stars. Radio bursts are mainly experienced by very fast UCDs, while X-ray flares are seen along the whole range of rotation. We examined the L_{\rm x}/L_{\rm bol} vs P_{\rm rot} relation, finding no evident relation between the X-ray emission and rotation, reinforcing previous speculations on a bimodal dynamo across late-type dwarfs. One radio-detected object has a rotation period consistent with the range of auroral bursting sources; while it displays moderately circularly polarized emission. A radio flare from this object is interpreted as gyrosynchrotron emission, and it displays X-ray and optical flares. We also found a slowly rotating apparent auroral emitter, that is also one of the X-ray brightest radio-detected UCDs. We speculate that this UCD is experiencing a transition of its magnetic behavior since it produces signatures expected from higher mass M dwarfs along with emerging evidence of auroral emission.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Impact of architecture on robustness and interpretability of multispectral deep neural networks
Authors:
Charles Godfrey,
Elise Bishoff,
Myles McKay,
Eleanor Byler
Abstract:
Including information from additional spectral bands (e.g., near-infrared) can improve deep learning model performance for many vision-oriented tasks. There are many possible ways to incorporate this additional information into a deep learning model, but the optimal fusion strategy has not yet been determined and can vary between applications. At one extreme, known as "early fusion," additional ba…
▽ More
Including information from additional spectral bands (e.g., near-infrared) can improve deep learning model performance for many vision-oriented tasks. There are many possible ways to incorporate this additional information into a deep learning model, but the optimal fusion strategy has not yet been determined and can vary between applications. At one extreme, known as "early fusion," additional bands are stacked as extra channels to obtain an input image with more than three channels. At the other extreme, known as "late fusion," RGB and non-RGB bands are passed through separate branches of a deep learning model and merged immediately before a final classification or segmentation layer. In this work, we characterize the performance of a suite of multispectral deep learning models with different fusion approaches, quantify their relative reliance on different input bands and evaluate their robustness to naturalistic image corruptions affecting one or more input channels.
△ Less
Submitted 27 September, 2023; v1 submitted 21 September, 2023;
originally announced September 2023.
-
Quantifying the robustness of deep multispectral segmentation models against natural perturbations and data poisoning
Authors:
Elise Bishoff,
Charles Godfrey,
Myles McKay,
Eleanor Byler
Abstract:
In overhead image segmentation tasks, including additional spectral bands beyond the traditional RGB channels can improve model performance. However, it is still unclear how incorporating this additional data impacts model robustness to adversarial attacks and natural perturbations. For adversarial robustness, the additional information could improve the model's ability to distinguish malicious in…
▽ More
In overhead image segmentation tasks, including additional spectral bands beyond the traditional RGB channels can improve model performance. However, it is still unclear how incorporating this additional data impacts model robustness to adversarial attacks and natural perturbations. For adversarial robustness, the additional information could improve the model's ability to distinguish malicious inputs, or simply provide new attack avenues and vulnerabilities. For natural perturbations, the additional information could better inform model decisions and weaken perturbation effects or have no significant influence at all. In this work, we seek to characterize the performance and robustness of a multispectral (RGB and near infrared) image segmentation model subjected to adversarial attacks and natural perturbations. While existing adversarial and natural robustness research has focused primarily on digital perturbations, we prioritize on creating realistic perturbations designed with physical world conditions in mind. For adversarial robustness, we focus on data poisoning attacks whereas for natural robustness, we focus on extending ImageNet-C common corruptions for fog and snow that coherently and self-consistently perturbs the input data. Overall, we find both RGB and multispectral models are vulnerable to data poisoning attacks regardless of input or fusion architectures and that while physically realizable natural perturbations still degrade model performance, the impact differs based on fusion architecture and input data.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
How many dimensions are required to find an adversarial example?
Authors:
Charles Godfrey,
Henry Kvinge,
Elise Bishoff,
Myles Mckay,
Davis Brown,
Tim Doster,
Eleanor Byler
Abstract:
Past work exploring adversarial vulnerability have focused on situations where an adversary can perturb all dimensions of model input. On the other hand, a range of recent works consider the case where either (i) an adversary can perturb a limited number of input parameters or (ii) a subset of modalities in a multimodal problem. In both of these cases, adversarial examples are effectively constrai…
▽ More
Past work exploring adversarial vulnerability have focused on situations where an adversary can perturb all dimensions of model input. On the other hand, a range of recent works consider the case where either (i) an adversary can perturb a limited number of input parameters or (ii) a subset of modalities in a multimodal problem. In both of these cases, adversarial examples are effectively constrained to a subspace $V$ in the ambient input space $\mathcal{X}$. Motivated by this, in this work we investigate how adversarial vulnerability depends on $\dim(V)$. In particular, we show that the adversarial success of standard PGD attacks with $\ell^p$ norm constraints behaves like a monotonically increasing function of $ε(\frac{\dim(V)}{\dim \mathcal{X}})^{\frac{1}{q}}$ where $ε$ is the perturbation budget and $\frac{1}{p} + \frac{1}{q} =1$, provided $p > 1$ (the case $p=1$ presents additional subtleties which we analyze in some detail). This functional form can be easily derived from a simple toy linear model, and as such our results land further credence to arguments that adversarial examples are endemic to locally linear models on high dimensional spaces.
△ Less
Submitted 10 April, 2023; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Hypothesis Test Procedures for Detecting Leakage Signals in Water Pipeline Channels
Authors:
Liusha Yang,
Matthew R. McKay,
Xun Wang
Abstract:
We design statistical hypothesis tests for performing leak detection in water pipeline channels. By applying an appropriate model for signal propagation, we show that the detection problem becomes one of distinguishing signal from noise, with the noise being described by a multivariate Gaussian distribution with unknown covariance matrix. We first design a test procedure based on the generalized l…
▽ More
We design statistical hypothesis tests for performing leak detection in water pipeline channels. By applying an appropriate model for signal propagation, we show that the detection problem becomes one of distinguishing signal from noise, with the noise being described by a multivariate Gaussian distribution with unknown covariance matrix. We first design a test procedure based on the generalized likelihood ratio test, which we show through simulations to offer appreciable leak detection performance gain over conventional approaches designed in an analogous context (for radar detection). Our proposed method requires estimation of the noise covariance matrix, which can become inaccurate under high-dimensional settings, and when the measurement data is scarce. To deal with this, we present a second leak detection method, which employs a regularized covariance matrix estimate. The regularization parameter is optimized for the leak detection application by applying results from large dimensional random matrix theory. This second proposed approach is shown to yield improved performance in leak detection compared with the first approach, at the expense of requiring higher computational complexity.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Testing predictions of representation cost theory with CNNs
Authors:
Charles Godfrey,
Elise Bishoff,
Myles Mckay,
Davis Brown,
Grayson Jorgenson,
Henry Kvinge,
Eleanor Byler
Abstract:
It is widely acknowledged that trained convolutional neural networks (CNNs) have different levels of sensitivity to signals of different frequency. In particular, a number of empirical studies have documented CNNs sensitivity to low-frequency signals. In this work we show with theory and experiments that this observed sensitivity is a consequence of the frequency distribution of natural images, wh…
▽ More
It is widely acknowledged that trained convolutional neural networks (CNNs) have different levels of sensitivity to signals of different frequency. In particular, a number of empirical studies have documented CNNs sensitivity to low-frequency signals. In this work we show with theory and experiments that this observed sensitivity is a consequence of the frequency distribution of natural images, which is known to have most of its power concentrated in low-to-mid frequencies. Our theoretical analysis relies on representations of the layers of a CNN in frequency space, an idea that has previously been used to accelerate computations and study implicit bias of network training algorithms, but to the best of our knowledge has not been applied in the domain of model robustness.
△ Less
Submitted 25 September, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Envy-freeness in 3D Hedonic Games
Authors:
Michael McKay,
Ágnes Cseh,
David Manlove
Abstract:
We study the problem of partitioning a set of agents into coalitions based on the agents' additively separable preferences, which can also be viewed as a hedonic game. We apply three successively weaker solution concepts, namely envy-freeness, weakly justified envy-freeness, and justified envy-freeness.
In a model in which coalitions may have any size, trivial solutions exist for these concepts,…
▽ More
We study the problem of partitioning a set of agents into coalitions based on the agents' additively separable preferences, which can also be viewed as a hedonic game. We apply three successively weaker solution concepts, namely envy-freeness, weakly justified envy-freeness, and justified envy-freeness.
In a model in which coalitions may have any size, trivial solutions exist for these concepts, which provides a strong motivation for placing restrictions on coalition size. In this paper, we require feasible coalitions to have size three. We study the existence of partitions that are envy-free, weakly justified envy-free, and justified envy-free, and the computational complexity of finding such partitions, if they exist.
We present a comprehensive complexity classification, in terms of the restrictions placed on the agents' preferences. From this, we identify a general trend that for the three successively weaker solution concepts, existence and polynomial-time solvability hold under successively weaker restrictions.
△ Less
Submitted 2 August, 2024; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Packing $K_r$s in bounded degree graphs
Authors:
Michael McKay,
David Manlove
Abstract:
We study the problem of finding a maximum-cardinality set of $r$-cliques in an undirected graph of fixed maximum degree $Δ$, subject to the cliques in that set being either vertex-disjoint or edge-disjoint. It is known for $r=3$ that the vertex-disjoint (edge-disjoint) problem is solvable in linear time if $Δ=3$ ($Δ=4$) but APX-hard if $Δ\geq 4$ ($Δ\geq 5$).
We generalise these results to an arb…
▽ More
We study the problem of finding a maximum-cardinality set of $r$-cliques in an undirected graph of fixed maximum degree $Δ$, subject to the cliques in that set being either vertex-disjoint or edge-disjoint. It is known for $r=3$ that the vertex-disjoint (edge-disjoint) problem is solvable in linear time if $Δ=3$ ($Δ=4$) but APX-hard if $Δ\geq 4$ ($Δ\geq 5$).
We generalise these results to an arbitrary but fixed $r \geq 3$, and provide a complete complexity classification for both the vertex- and edge-disjoint variants in graphs of maximum degree $Δ$.
Specifically, we show that the vertex-disjoint problem is solvable in linear time if $Δ< 3r/2 - 1$, solvable in polynomial time if $Δ< 5r/3 - 1$, and APX-hard if $Δ\geq \lceil 5r/3 \rceil - 1$. We also show that if $r\geq 6$ then the above implications also hold for the edge-disjoint problem. If $r \leq 5$, then the edge-disjoint problem is solvable in linear time if $Δ< 3r/2 - 1$, solvable in polynomial time if $Δ\leq 2r - 2$, and APX-hard if $Δ> 2r - 2$.
△ Less
Submitted 6 April, 2024; v1 submitted 8 September, 2022;
originally announced September 2022.
-
The Seventeenth Data Release of the Sloan Digital Sky Surveys: Complete Release of MaNGA, MaStar and APOGEE-2 Data
Authors:
Abdurro'uf,
Katherine Accetta,
Conny Aerts,
Victor Silva Aguirre,
Romina Ahumada,
Nikhil Ajgaonkar,
N. Filiz Ak,
Shadab Alam,
Carlos Allende Prieto,
Andres Almeida,
Friedrich Anders,
Scott F. Anderson,
Brett H. Andrews,
Borja Anguiano,
Erik Aquino-Ortiz,
Alfonso Aragon-Salamanca,
Maria Argudo-Fernandez,
Metin Ata,
Marie Aubert,
Vladimir Avila-Reese,
Carles Badenes,
Rodolfo H. Barba,
Kat Barger,
Jorge K. Barrera-Ballesteros,
Rachael L. Beaton
, et al. (316 additional authors not shown)
Abstract:
This paper documents the seventeenth data release (DR17) from the Sloan Digital Sky Surveys; the fifth and final release from the fourth phase (SDSS-IV). DR17 contains the complete release of the Mapping Nearby Galaxies at Apache Point Observatory (MaNGA) survey, which reached its goal of surveying over 10,000 nearby galaxies. The complete release of the MaNGA Stellar Library (MaStar) accompanies…
▽ More
This paper documents the seventeenth data release (DR17) from the Sloan Digital Sky Surveys; the fifth and final release from the fourth phase (SDSS-IV). DR17 contains the complete release of the Mapping Nearby Galaxies at Apache Point Observatory (MaNGA) survey, which reached its goal of surveying over 10,000 nearby galaxies. The complete release of the MaNGA Stellar Library (MaStar) accompanies this data, providing observations of almost 30,000 stars through the MaNGA instrument during bright time. DR17 also contains the complete release of the Apache Point Observatory Galactic Evolution Experiment 2 (APOGEE-2) survey which publicly releases infra-red spectra of over 650,000 stars. The main sample from the Extended Baryon Oscillation Spectroscopic Survey (eBOSS), as well as the sub-survey Time Domain Spectroscopic Survey (TDSS) data were fully released in DR16. New single-fiber optical spectroscopy released in DR17 is from the SPectroscipic IDentification of ERosita Survey (SPIDERS) sub-survey and the eBOSS-RM program. Along with the primary data sets, DR17 includes 25 new or updated Value Added Catalogs (VACs). This paper concludes the release of SDSS-IV survey data. SDSS continues into its fifth phase with observations already underway for the Milky Way Mapper (MWM), Local Volume Mapper (LVM) and Black Hole Mapper (BHM) surveys.
△ Less
Submitted 13 January, 2022; v1 submitted 3 December, 2021;
originally announced December 2021.
-
Optimal Grouping Strategy for Reconfigurable Intelligent Surface Assisted Wireless Communications
Authors:
Neel Kanth Kundu,
Zan Li,
Junhui Rao,
Shanpu Shen,
Matthew R. McKay,
Ross Murch
Abstract:
The channel estimation overhead of reconfigurable intelligent surface (RIS) assisted communication systems can be prohibitive. Prior works have demonstrated via simulations that grouping neighbouring RIS elements can help to reduce the pilot overhead and improve achievable rate. In this paper, we present an analytical study of RIS element grouping. We derive a tight closed-form upper bound for the…
▽ More
The channel estimation overhead of reconfigurable intelligent surface (RIS) assisted communication systems can be prohibitive. Prior works have demonstrated via simulations that grouping neighbouring RIS elements can help to reduce the pilot overhead and improve achievable rate. In this paper, we present an analytical study of RIS element grouping. We derive a tight closed-form upper bound for the achievable rate and then maximize it with respect to the group size. Our analysis reveals that more coarse-grained grouping is important-when the channel coherence time is low (high mobility scenarios) or the transmit power is large. We also demonstrate that optimal grouping can yield significant performance improvements over simple `On-Off' RIS element switching schemes that have been recently considered.
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Channel Estimation and Secret Key Rate Analysis of MIMO Terahertz Quantum Key Distribution
Authors:
Neel Kanth Kundu,
Soumya P. Dash,
Matthew R. McKay,
Ranjan K. Mallik
Abstract:
We study the secret key rate (SKR) of a multiple-input multiple-output (MIMO) continuous variable quantum key distribution (CVQKD) system operating at terahertz (THz) frequencies, accounting for the effects of channel estimation. We propose a practical channel estimation scheme for the THz MIMO CVQKD system which is necessary to realize transmit-receive beamforming between Alice and Bob. We charac…
▽ More
We study the secret key rate (SKR) of a multiple-input multiple-output (MIMO) continuous variable quantum key distribution (CVQKD) system operating at terahertz (THz) frequencies, accounting for the effects of channel estimation. We propose a practical channel estimation scheme for the THz MIMO CVQKD system which is necessary to realize transmit-receive beamforming between Alice and Bob. We characterize the input-output relation between Alice and Bob during the key generation phase, by incorporating the effects of additional noise terms arising due to the channel estimation error and detector noise. Furthermore, we analyze the SKR of the system and study the effect of channel estimation error and overhead. Our simulation results reveal that the SKR may degrade significantly as compared to the SKR upper bound that assumes perfect channel state information, particularly at large transmission distances.
△ Less
Submitted 8 October, 2021;
originally announced October 2021.
-
Machine Learning Based Parameter Estimation of Gaussian Quantum States
Authors:
Neel Kanth Kundu,
Matthew R. McKay,
Ranjan K. Mallik
Abstract:
We propose a machine learning framework for parameter estimation of single mode Gaussian quantum states. Under a Bayesian framework, our approach estimates parameters of suitable prior distributions from measured data. For phase-space displacement and squeezing parameter estimation, this is achieved by introducing Expectation-Maximization (EM) based algorithms, while for phase parameter estimation…
▽ More
We propose a machine learning framework for parameter estimation of single mode Gaussian quantum states. Under a Bayesian framework, our approach estimates parameters of suitable prior distributions from measured data. For phase-space displacement and squeezing parameter estimation, this is achieved by introducing Expectation-Maximization (EM) based algorithms, while for phase parameter estimation an empirical Bayes method is applied. The estimated prior distribution parameters along with the observed data are used for finding the optimal Bayesian estimate of the unknown displacement, squeezing and phase parameters. Our simulation results show that the proposed algorithms have estimation performance that is very close to that of Genie Aided Bayesian estimators, that assume perfect knowledge of the prior parameters. Our proposed methods can be utilized by experimentalists to find the optimum Bayesian estimate of parameters of Gaussian quantum states by using only the observed measurements without requiring any knowledge about the prior distribution parameters.
△ Less
Submitted 13 August, 2021;
originally announced August 2021.
-
The Three-Dimensional Stable Roommates Problem with Additively Separable Preferences
Authors:
Michael McKay,
David Manlove
Abstract:
The Stable Roommates problem involves matching a set of agents into pairs based on the agents' strict ordinal preference lists. The matching must be stable, meaning that no two agents strictly prefer each other to their assigned partners. A number of three-dimensional variants exist, in which agents are instead matched into triples. Both the original problem and these variants can also be viewed a…
▽ More
The Stable Roommates problem involves matching a set of agents into pairs based on the agents' strict ordinal preference lists. The matching must be stable, meaning that no two agents strictly prefer each other to their assigned partners. A number of three-dimensional variants exist, in which agents are instead matched into triples. Both the original problem and these variants can also be viewed as hedonic games. We formalise a three-dimensional variant using general additively separable preferences, in which each agent provides an integer valuation of every other agent. In this variant, we show that a stable matching may not exist and that the related decision problem is NP-complete, even when the valuations are binary. In contrast, we show that if the valuations are binary and symmetric then a stable matching must exist and can be found in polynomial time. We also consider the related problem of finding a stable matching with maximum utilitarian welfare when valuations are binary and symmetric. We show that this optimisation problem is NP-hard and present a novel 2-approximation algorithm.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
MIMO Terahertz Quantum Key Distribution
Authors:
Neel Kanth Kundu,
Soumya P. Dash,
Matthew R. McKay,
Ranjan K. Mallik
Abstract:
We propose a multiple-input multiple-output (MIMO) quantum key distribution (QKD) scheme for terahertz (THz) frequency applications operating at room temperature. Motivated by classical MIMO communications, a transmit-receive beamforming scheme is proposed that converts the rank-$r$ MIMO channel between Alice and Bob into $r$ parallel lossy quantum channels. Compared with existing single-antenna Q…
▽ More
We propose a multiple-input multiple-output (MIMO) quantum key distribution (QKD) scheme for terahertz (THz) frequency applications operating at room temperature. Motivated by classical MIMO communications, a transmit-receive beamforming scheme is proposed that converts the rank-$r$ MIMO channel between Alice and Bob into $r$ parallel lossy quantum channels. Compared with existing single-antenna QKD schemes, we demonstrate that the MIMO QKD scheme leads to performance improvements by increasing the secret key rate and extending the transmission distance. Our simulation results show that multiple antennas are necessary to overcome the high free-space path loss at THz frequencies. We demonstrate a non-monotonic relation between performance and frequency, and reveal that positive key rates are achievable in the $10-30$ THz frequency range. The proposed scheme can be used for both indoor and outdoor QKD applications for beyond fifth-generation ultra-secure wireless communications systems.
△ Less
Submitted 10 July, 2021; v1 submitted 8 May, 2021;
originally announced May 2021.
-
Channel Estimation for Large Intelligent Surface Aided MISO Communications: From LMMSE to Deep Learning Solutions
Authors:
Neel Kanth Kundu,
Matthew R. McKay
Abstract:
We consider multi-antenna wireless systems aided by large intelligent surfaces (LIS). LIS presents a new physical layer technology for improving coverage and energy efficiency by intelligently controlling the propagation environment. In practice however, achieving the anticipated gains of LIS requires accurate channel estimation. Recent attempts to solve this problem have considered the least-squa…
▽ More
We consider multi-antenna wireless systems aided by large intelligent surfaces (LIS). LIS presents a new physical layer technology for improving coverage and energy efficiency by intelligently controlling the propagation environment. In practice however, achieving the anticipated gains of LIS requires accurate channel estimation. Recent attempts to solve this problem have considered the least-squares (LS) approach, which is simple but also sub-optimal. The optimal channel estimator, based on the minimum mean-squared-error (MMSE) criterion, is challenging to obtain and is non-linear due to the non-Gaussianity of the effective channel seen at the receiver. Here we present approaches to approximate the optimal MMSE channel estimator. As a first approach, we analytically develop the best linear estimator, the LMMSE, together with a corresponding majorization-minimization based algorithm designed to optimize the LIS phase shift matrix during the training phase. This estimator is shown to yield improved accuracy over the LS approach by exploiting second-order statistical properties of the wireless channel and the noise. To further improve performance and better approximate the globally-optimal MMSE channel estimator, we propose data-driven non-linear solutions based on deep learning. Specifically, by posing the MMSE channel estimation problem as an image denoising problem, we propose two convolutional neural network (CNN) based methods to perform the denoising and approximate the optimal MMSE channel estimation solution. Our numerical results show that these CNN-based estimators give superior performance compared with linear estimation approaches. They also have low computational complexity requirements, thereby motivating their potential use in future LIS-aided wireless communication systems.
△ Less
Submitted 14 November, 2020;
originally announced November 2020.
-
Large Intelligent Surfaces with Channel Estimation Overhead: Achievable Rate and Optimal Configuration
Authors:
Neel Kanth Kundu,
Matthew R. McKay
Abstract:
Large intelligent surfaces (LIS) present a promising new technology for enhancing the performance of wireless communication systems. Realizing the gains of LIS requires accurate channel knowledge, and in practice the channel estimation overhead can be large due to the passive nature of LIS. Here, we study the achievable rate of a LIS-assisted single-input single-output communication system, accoun…
▽ More
Large intelligent surfaces (LIS) present a promising new technology for enhancing the performance of wireless communication systems. Realizing the gains of LIS requires accurate channel knowledge, and in practice the channel estimation overhead can be large due to the passive nature of LIS. Here, we study the achievable rate of a LIS-assisted single-input single-output communication system, accounting for the pilot overhead of a least-squares channel estimator. We demonstrate that there exists an optimal $K^{*}$, which maximizes achievable rate by balancing the power gains offered by LIS and the channel estimation overhead. We present analytical approximations for $K^{*}$, based on maximizing an analytical upper bound on average achievable rate that we derive, and study the dependencies of $K^*$ on statistical channel and system parameters.
△ Less
Submitted 2 September, 2021; v1 submitted 22 August, 2020;
originally announced August 2020.
-
RIS-Assisted MISO Communication: Optimal Beamformers and Performance Analysis
Authors:
Neel Kanth Kundu,
Matthew R. McKay
Abstract:
We study a multiple-input single-output (MISO) communication system assisted by a reconfigurable intelligent surface (RIS). A base station (BS) having multiple antennas is assumed to be communicating to a single-antenna user equipment (UE), with the help of a RIS. We assume that the system operates in an environment with line-of-sight (LoS) between the BS and RIS, whereas the RIS-UE link experienc…
▽ More
We study a multiple-input single-output (MISO) communication system assisted by a reconfigurable intelligent surface (RIS). A base station (BS) having multiple antennas is assumed to be communicating to a single-antenna user equipment (UE), with the help of a RIS. We assume that the system operates in an environment with line-of-sight (LoS) between the BS and RIS, whereas the RIS-UE link experiences Rayleigh fading. We present a closed form expression for the optimal active and passive beamforming vectors at the BS and RIS respectively. Then, by characterizing the statistical properties of the received SNR at the UE, we apply them to derive analytical approximations for different system performance measures, including the outage probability, average achievable rate and average symbol error probability (SEP). Our results, in general, demonstrate that the gain due to RIS can be substantial, and can be significantly greater than the gains reaped by using multiple BS antennas.
△ Less
Submitted 7 October, 2020; v1 submitted 16 July, 2020;
originally announced July 2020.
-
DNN Approximation of Nonlinear Finite Element Equations
Authors:
Tuyen Tran,
Aidan Hamilton,
Maricela Best McKay,
Benjamin Quiring,
Panayot S. Vassilevski
Abstract:
We investigate the potential of applying (D)NN ((deep) neural networks) for approximating nonlinear mappings arising in the finite element discretization of nonlinear PDEs (partial differential equations). As an application, we apply the trained DNN to replace the coarse nonlinear operator thus avoiding the need to visit the fine level discretization in order to evaluate the actions of the true co…
▽ More
We investigate the potential of applying (D)NN ((deep) neural networks) for approximating nonlinear mappings arising in the finite element discretization of nonlinear PDEs (partial differential equations). As an application, we apply the trained DNN to replace the coarse nonlinear operator thus avoiding the need to visit the fine level discretization in order to evaluate the actions of the true coarse nonlinear operator. The feasibility of the studied approach is demonstrated in a two-level FAS (full approximation scheme) used to solve a nonlinear diffusion-reaction PDE.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Extreme Eigenvalue Distributions of Jacobi Ensembles: New Exact Representations, Asymptotics and Finite Size Corrections
Authors:
Laureano Moreno-Pozas,
David Morales-Jimenez,
Matthew R. McKay
Abstract:
Let $\mathbf{W}_1$ and $\mathbf{W}_2$ be independent $n\times n$ complex central Wishart matrices with $m_1$ and $m_2$ degrees of freedom respectively. This paper is concerned with the extreme eigenvalue distributions of double-Wishart matrices $(\mathbf{W}_1+\mathbf{W}_2)^{-1}\mathbf{W}_1$, which are analogous to those of F matrices ${\bf W}_1 {\bf W}_2^{-1}$ and those of the Jacobi unitary ensem…
▽ More
Let $\mathbf{W}_1$ and $\mathbf{W}_2$ be independent $n\times n$ complex central Wishart matrices with $m_1$ and $m_2$ degrees of freedom respectively. This paper is concerned with the extreme eigenvalue distributions of double-Wishart matrices $(\mathbf{W}_1+\mathbf{W}_2)^{-1}\mathbf{W}_1$, which are analogous to those of F matrices ${\bf W}_1 {\bf W}_2^{-1}$ and those of the Jacobi unitary ensemble (JUE). Defining $α_1=m_1-n$ and $α_2=m_2-n$, we derive new exact distribution formulas in terms of $(α_1+α_2)$-dimensional matrix determinants, with elements involving derivatives of Legendre polynomials. This provides a convenient exact representation, while facilitating a direct large-$n$ analysis with $α_1$ and $α_2$ fixed (i.e., under the so-called "hard-edge" scaling limit); the analysis is based on new asymptotic properties of Legendre polynomials and their relation with Bessel functions that are here established. Specifically, we present limiting formulas for the smallest and largest eigenvalue distributions as $n \to \infty$ in terms of $α_1$- and $α_2$-dimensional determinants respectively, which agrees with expectations from known universality results involving the JUE and the Laguerre unitary ensemble (LUE). We also derive finite-$n$ corrections for the asymptotic extreme eigenvalue distributions under hard-edge scaling, giving new insights on universality by comparing with corresponding correction terms derived recently for the LUE. Our derivations are based on elementary algebraic manipulations, differing from existing results on double-Wishart and related models which often involve Fredholm determinants, Painlevé differential equations, or hypergeometric functions of matrix arguments.
△ Less
Submitted 8 June, 2019;
originally announced June 2019.
-
Asymptotics of eigenstructure of sample correlation matrices for high-dimensional spiked models
Authors:
David Morales-Jimenez,
Iain M. Johnstone,
Matthew R. McKay,
Jeha Yang
Abstract:
Sample correlation matrices are employed ubiquitously in statistics. However, quite surprisingly, little is known about their asymptotic spectral properties for high-dimensional data, particularly beyond the case of "null models" for which the data is assumed independent. Here, considering the popular class of spiked models, we apply random matrix theory to derive asymptotic first-order and distri…
▽ More
Sample correlation matrices are employed ubiquitously in statistics. However, quite surprisingly, little is known about their asymptotic spectral properties for high-dimensional data, particularly beyond the case of "null models" for which the data is assumed independent. Here, considering the popular class of spiked models, we apply random matrix theory to derive asymptotic first-order and distributional results for both the leading eigenvalues and eigenvectors of sample correlation matrices. These results are obtained under high-dimensional settings for which the number of samples n and variables p approach infinity, with p/n tending to a constant. To first order, the spectral properties of sample correlation matrices are seen to coincide with those of sample covariance matrices; however their asymptotic distributions can differ significantly, with fluctuations of both the sample eigenvalues and eigenvectors often being remarkably smaller than those of their sample covariance counterparts.
△ Less
Submitted 12 March, 2019; v1 submitted 24 October, 2018;
originally announced October 2018.
-
Fully resolved array of simulations investigating the influence of the magnetic Prandtl number on magnetohydrodynamic turbulence
Authors:
Mairi E. McKay,
Arjun Berera,
Richard D. J. G. Ho
Abstract:
We explore the effect of the magnetic Prandtl number Pm on energy and dissipation in fully resolved direct numerical simulations of steady-state, mechanically forced homogeneous magnetohydrodynamic turbulence in the range Pm = 1/32 to 32. We compare the spectra and show that if the simulations are not fully resolved, the steepness of the scaling of the kinetic-to-magnetic dissipation ratio with Pm…
▽ More
We explore the effect of the magnetic Prandtl number Pm on energy and dissipation in fully resolved direct numerical simulations of steady-state, mechanically forced homogeneous magnetohydrodynamic turbulence in the range Pm = 1/32 to 32. We compare the spectra and show that if the simulations are not fully resolved, the steepness of the scaling of the kinetic-to-magnetic dissipation ratio with Pm is overestimated. We also present results of decaying turbulence with helical and nonhelical magnetic fields, where we find nonhelical reverse spectral transfer for Pm < 1. The results of this systematic analysis have applications including stars, planetary dynamos, and accretion disks.
△ Less
Submitted 15 January, 2019; v1 submitted 26 June, 2018;
originally announced June 2018.
-
Large-dimensional behavior of regularized Maronna's M-estimators of covariance matrices
Authors:
Nicolas Auguin,
David Morales-Jimenez,
Matthew R. McKay,
Romain Couillet
Abstract:
Robust estimators of large covariance matrices are considered, comprising regularized (linear shrinkage) modifications of Maronna's classical M-estimators. These estimators provide robustness to outliers, while simultaneously being well-defined when the number of samples does not exceed the number of variables. By applying tools from random matrix theory, we characterize the asymptotic performance…
▽ More
Robust estimators of large covariance matrices are considered, comprising regularized (linear shrinkage) modifications of Maronna's classical M-estimators. These estimators provide robustness to outliers, while simultaneously being well-defined when the number of samples does not exceed the number of variables. By applying tools from random matrix theory, we characterize the asymptotic performance of such estimators when the numbers of samples and variables grow large together. In particular, our results show that, when outliers are absent, many estimators of the regularized-Maronna type share the same asymptotic performance, and for these estimators we present a data-driven method for choosing the asymptotically optimal regularization parameter with respect to a quadratic loss. Robustness in the presence of outliers is then studied: in the non-regularized case, a large-dimensional robustness metric is proposed, and explicitly computed for two particular types of estimators, exhibiting interesting differences depending on the underlying contamination model. The impact of outliers in regularized estimators is then studied, with interesting differences with respect to the non-regularized case, leading to new practical insights on the choice of particular estimators.
△ Less
Submitted 26 April, 2018;
originally announced April 2018.
-
Exact Statistical Characterization of $2\times2$ Gram Matrices with Arbitrary Variance Profile
Authors:
Nicolas Auguin,
David Morales-Jimenez,
Matthew McKay
Abstract:
This paper is concerned with the statistical properties of the Gram matrix $\mathbf{W}=\mathbf{H}\mathbf{H}^\dagger$, where $\mathbf{H}$ is a $2\times2$ complex central Gaussian matrix whose elements have arbitrary variances. With such arbitrary variance profile, this random matrix model fundamentally departs from classical Wishart models and presents a significant challenge as the classical analy…
▽ More
This paper is concerned with the statistical properties of the Gram matrix $\mathbf{W}=\mathbf{H}\mathbf{H}^\dagger$, where $\mathbf{H}$ is a $2\times2$ complex central Gaussian matrix whose elements have arbitrary variances. With such arbitrary variance profile, this random matrix model fundamentally departs from classical Wishart models and presents a significant challenge as the classical analytical toolbox no longer directly applies. We derive new exact expressions for the distribution of $\mathbf{W}$ and that of its eigenvalues by means of an explicit parameterization of the group of unitary matrices. Our results yield remarkably simple expressions, which are further leveraged to study the outage data rate of a dual-antenna communication system under different variance profiles.
△ Less
Submitted 12 April, 2017;
originally announced May 2017.
-
Comparison of forcing functions in magnetohydrodynamic turbulence
Authors:
Mairi E. McKay,
Moritz Linkmann,
Daniel Clark,
Adam A. Chalupa,
Arjun Berera
Abstract:
Results are presented of direct numerical simulations of incompressible, homogeneous magnetohydrodynamic turbulence without a mean magnetic field, subject to different mechanical forcing functions commonly used in the literature. Specifically, the forces are negative damping (which uses the large-scale velocity field as a forcing function), a nonhelical random force, and a nonhelical static sinuso…
▽ More
Results are presented of direct numerical simulations of incompressible, homogeneous magnetohydrodynamic turbulence without a mean magnetic field, subject to different mechanical forcing functions commonly used in the literature. Specifically, the forces are negative damping (which uses the large-scale velocity field as a forcing function), a nonhelical random force, and a nonhelical static sinusoidal force (analogous to helical ABC forcing). The time evolution of the three ideal invariants (energy, magnetic helicity and cross helicity), the time-averaged energy spectra, the energy ratios and the dissipation ratios are examined. All three forcing functions produce qualitatively similar steady states with regards to the time evolution of the energy and magnetic helicity. However, differences in the cross helicity evolution are observed, particularly in the case of the static sinusoidal method of energy injection. Indeed, an ensemble of sinusoidally-forced simulations with identical parameters shows significant variations in the cross helicity over long time periods, casting some doubt on the validity of the principle of ergodicity in systems in which the injection of helicity cannot be controlled. Cross helicity can unexpectedly enter the system through the forcing function and must be carefully monitored.
△ Less
Submitted 22 November, 2017; v1 submitted 15 April, 2017;
originally announced April 2017.
-
Effects of magnetic and kinetic helicities on the growth of magnetic fields in laminar and turbulent flows by helical-Fourier decomposition
Authors:
Moritz Linkmann,
Ganapati Sahoo,
Mairi McKay,
Arjun Berera,
Luca Biferale
Abstract:
We present a numerical and analytical study of incompressible homogeneous conducting fluids using a helical Fourier representation. We analytically study both small- and large-scale dynamo properties, as well as the inverse cascade of magnetic helicity, in the most general minimal subset of interacting velocity and magnetic fields on a closed Fourier triad. We mainly focus on the dependency of mag…
▽ More
We present a numerical and analytical study of incompressible homogeneous conducting fluids using a helical Fourier representation. We analytically study both small- and large-scale dynamo properties, as well as the inverse cascade of magnetic helicity, in the most general minimal subset of interacting velocity and magnetic fields on a closed Fourier triad. We mainly focus on the dependency of magnetic field growth as a function of the distribution of kinetic and magnetic helicities among the three interacting wavenumbers. By combining direct numerical simulations of the full magnetohydrodynamics equations with the helical Fourier decomposition we numerically confirm that in the kinematic dynamo regime the system develops a large-scale magnetic helicity with opposite sign compared to the small-scale kinetic helicity, a sort of triad-by-triad $α$-effect in Fourier space. Concerning the small-scale perturbations, we predict theoretically and confirm numerically that the largest instability is achieved for the magnetic component with the same helicity of the flow, in agreement with the Stretch-Twist-Fold mechanism. Vice versa, in presence of a Lorentz feedback on the velocity, we find that the inverse cascade of magnetic helicity is mostly local if magnetic and kinetic helicities have opposite sign, while it is more nonlocal and more intense if they have the same sign, as predicted by the analytical approach. Our analytical and numerical results further demonstrate the potential of the helical Fourier decomposition to elucidate the entangled dynamics of magnetic and kinetic helicities both in fully developed turbulence and in laminar flows.
△ Less
Submitted 1 March, 2017; v1 submitted 6 September, 2016;
originally announced September 2016.
-
Instrumentation for the Citizen CATE Experiment: Faroe Islands and Indonesia
Authors:
M J Penn,
R Baer,
R Bosh,
D Garrison,
R Gelderman,
H Hare,
F Isberner,
L Jensen,
S Kovac,
M McKay,
A Mitchell,
M Pierce,
A Ursache,
J Varsik,
D Walter,
Z Watson,
D Young,
the Citizen CATE Team
Abstract:
The inner regions of the solar corona from 1-2.5 Rsun are poorly sampled both from the ground and space telescopes. A solar eclipse reduces the sky scattered background intensity by a factor of about 10,000 and opens a window to view this region directly. The goal of the Citizen {\it Continental-America Telescopic Eclipse} (CATE) Experiment is to take a 90-minute time sequence of calibrated white…
▽ More
The inner regions of the solar corona from 1-2.5 Rsun are poorly sampled both from the ground and space telescopes. A solar eclipse reduces the sky scattered background intensity by a factor of about 10,000 and opens a window to view this region directly. The goal of the Citizen {\it Continental-America Telescopic Eclipse} (CATE) Experiment is to take a 90-minute time sequence of calibrated white light images of this coronal region using 60 identical telescopes spread from Oregon to South Carolina during the 21 August 2017 total solar eclipse. Observations that can address questions of coronal dynamics in this region can be collected with rather modest telescope equipment, but the large dynamic range of the coronal brightness requires careful camera control. The instruments used for test runs on the Faroe Islands in 2015 and at five sites in Indonesia in 2016 are described. Intensity calibration of the coronal images is done and compared with previous eclipse measurements from November \& Koutchmy (1996) and Bazin et al. (2015). The change of coronal brightness with distance from the Sun seen in the 2016 eclipse agrees with observations from the 1991 eclipse but differ substantially from the 2010 eclipse. The 2015 observations agree with 2016 and 1991 solar radii near the Sun, but are fainter at larger distances. Problems encountered during these test runs are discussed as well the solutions which will be implemented for the 2017 eclipse experiment.
△ Less
Submitted 31 August, 2016;
originally announced September 2016.
-
Helical mode interactions and spectral transfer processes in magnetohydrodynamic turbulence
Authors:
Moritz F. Linkmann,
Arjun Berera,
Mairi E. McKay,
Julia Jäger
Abstract:
Spectral transfer processes in magnetohydrodynamic (MHD) turbulence are investigated analytically by decomposition of the velocity and magnetic fields in Fourier space into helical modes. Steady solutions of the dynamical system which governs the evolution of the helical modes are determined, and a stability analysis of these solutions is carried out. The interpretation of the analysis is that uns…
▽ More
Spectral transfer processes in magnetohydrodynamic (MHD) turbulence are investigated analytically by decomposition of the velocity and magnetic fields in Fourier space into helical modes. Steady solutions of the dynamical system which governs the evolution of the helical modes are determined, and a stability analysis of these solutions is carried out. The interpretation of the analysis is that unstable solutions lead to energy transfer between the interacting modes while stable solutions do not. From this, a dependence of possible interscale energy and helicity transfers on the helicities of the interacting modes is derived. As expected from the inverse cascade of magnetic helicity in 3D MHD turbulence, mode interactions with like helicities lead to transfer of energy and magnetic helicity to smaller wavenumbers. However, some interactions of modes with unlike helicities also contribute to an inverse energy transfer. As such, an inverse energy cascade for nonhelical magnetic fields is shown to be possible. Furthermore, it is found that high values of the cross-helicity may have an asymmetric effect on forward and reverse transfer of energy, where forward transfer is more quenched in regions of high cross-helicity than reverse transfer. This conforms with recent observations of solar wind turbulence. For specific helical interactions the relation to dynamo action is established.
△ Less
Submitted 1 September, 2015; v1 submitted 22 August, 2015;
originally announced August 2015.
-
Power Allocation Schemes for Multicell Massive MIMO Systems
Authors:
Qi Zhang,
Shi Jin,
Matthew McKay,
David Morales-Jimenez,
Hongbo Zhu
Abstract:
This paper investigates the sum-rate gains brought by power allocation strategies in multicell massive multipleinput multiple-output systems, assuming time-division duplex transmission. For both uplink and downlink, we derive tractable expressions for the achievable rate with zero-forcing receivers and precoders respectively. To avoid high complexity joint optimization across the network, we propo…
▽ More
This paper investigates the sum-rate gains brought by power allocation strategies in multicell massive multipleinput multiple-output systems, assuming time-division duplex transmission. For both uplink and downlink, we derive tractable expressions for the achievable rate with zero-forcing receivers and precoders respectively. To avoid high complexity joint optimization across the network, we propose a scheduling mechanism for power allocation, where in a single time slot, only cells that do not interfere with each other adjust their transmit powers. Based on this, corresponding transmit power allocation strategies are derived, aimed at maximizing the sum rate per-cell. These schemes are shown to bring considerable gains over equal power allocation for practical antenna configurations (e.g., up to a few hundred). However, with fixed number of users (N), these gains diminish as M turns to infinity, and equal power allocation becomes optimal. A different conclusion is drawn for the case where both M and N grow large together, in which case: (i) improved rates are achieved as M grows with fixed M/N ratio, and (ii) the relative gains over the equal power allocation diminish as M/N grows. Moreover, we also provide applicable values of M/N under an acceptable power allocation gain threshold, which can be used as to determine when the proposed power allocation schemes yield appreciable gains, and when they do not. From the network point of view, the proposed scheduling approach can achieve almost the same performance as the joint power allocation after one scheduling round, with much reduced complexity.
△ Less
Submitted 10 June, 2015;
originally announced June 2015.
-
A Robust Statistics Approach to Minimum Variance Portfolio Optimization
Authors:
Liusha Yang,
Romain Couillet,
Matthew R. McKay
Abstract:
We study the design of portfolios under a minimum risk criterion. The performance of the optimized portfolio relies on the accuracy of the estimated covariance matrix of the portfolio asset returns. For large portfolios, the number of available market returns is often of similar order to the number of assets, so that the sample covariance matrix performs poorly as a covariance estimator. Additiona…
▽ More
We study the design of portfolios under a minimum risk criterion. The performance of the optimized portfolio relies on the accuracy of the estimated covariance matrix of the portfolio asset returns. For large portfolios, the number of available market returns is often of similar order to the number of assets, so that the sample covariance matrix performs poorly as a covariance estimator. Additionally, financial market data often contain outliers which, if not correctly handled, may further corrupt the covariance estimation. We address these shortcomings by studying the performance of a hybrid covariance matrix estimator based on Tyler's robust M-estimator and on Ledoit-Wolf's shrinkage estimator while assuming samples with heavy-tailed distribution. Employing recent results from random matrix theory, we develop a consistent estimator of (a scaled version of) the realized portfolio risk, which is minimized by optimizing online the shrinkage intensity. Our portfolio optimization method is shown via simulations to outperform existing methods both for synthetic and real market data.
△ Less
Submitted 27 March, 2015;
originally announced March 2015.
-
Large Dimensional Analysis of Robust M-Estimators of Covariance with Outliers
Authors:
David Morales-Jimenez,
Romain Couillet,
Matthew R. McKay
Abstract:
A large dimensional characterization of robust M-estimators of covariance (or scatter) is provided under the assumption that the dataset comprises independent (essentially Gaussian) legitimate samples as well as arbitrary deterministic samples, referred to as outliers. Building upon recent random matrix advances in the area of robust statistics, we specifically show that the so-called Maronna M-es…
▽ More
A large dimensional characterization of robust M-estimators of covariance (or scatter) is provided under the assumption that the dataset comprises independent (essentially Gaussian) legitimate samples as well as arbitrary deterministic samples, referred to as outliers. Building upon recent random matrix advances in the area of robust statistics, we specifically show that the so-called Maronna M-estimator of scatter asymptotically behaves similar to well-known random matrices when the population and sample sizes grow together to infinity. The introduction of outliers leads the robust estimator to behave asymptotically as the weighted sum of the sample outer products, with a constant weight for all legitimate samples and different weights for the outliers. A fine analysis of this structure reveals importantly that the propensity of the M-estimator to attenuate (or enhance) the impact of outliers is mostly dictated by the alignment of the outliers with the inverse population covariance matrix of the legitimate samples. Thus, robust M-estimators can bring substantial benefits over more simplistic estimators such as the per-sample normalized version of the sample covariance matrix, which is not capable of differentiating the outlying samples. The analysis shows that, within the class of Maronna's estimators of scatter, the Huber estimator is most favorable for rejecting outliers. On the contrary, estimators more similar to Tyler's scale invariant estimator (often preferred in the literature) run the risk of inadvertently enhancing some outliers.
△ Less
Submitted 4 March, 2015;
originally announced March 2015.
-
Nonuniversality and finite dissipation in decaying magnetohydrodynamic turbulence
Authors:
Moritz F. Linkmann,
Arjun Berera,
W. David McComb,
Mairi E. McKay
Abstract:
A model equation for the Reynolds number dependence of the dimensionless dissipation rate in freely decaying homogeneous magnetohydrodynamic turbulence in the absence of a mean magnetic field is derived from the real-space energy balance equation, leading to $C_{\varepsilon}=C_{\varepsilon, \infty}+C/R_- +O(1/R_-^2))$, where $R_-$ is a generalized Reynolds number. The constant…
▽ More
A model equation for the Reynolds number dependence of the dimensionless dissipation rate in freely decaying homogeneous magnetohydrodynamic turbulence in the absence of a mean magnetic field is derived from the real-space energy balance equation, leading to $C_{\varepsilon}=C_{\varepsilon, \infty}+C/R_- +O(1/R_-^2))$, where $R_-$ is a generalized Reynolds number. The constant $C_{\varepsilon, \infty}$ describes the total energy transfer flux. This flux depends on magnetic and cross helicities, because these affect the nonlinear transfer of energy, suggesting that the value of $C_{\varepsilon,\infty}$ is not universal. Direct numerical simulations were conducted on up to $2048^3$ grid points, showing good agreement between data and the model. The model suggests that the magnitude of cosmological-scale magnetic fields is controlled by the values of the vector field correlations. The ideas introduced here can be used to derive similar model equations for other turbulent systems.
△ Less
Submitted 12 May, 2015; v1 submitted 23 February, 2015;
originally announced February 2015.
-
Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback
Authors:
Xi Zhang,
Matthew R. McKay,
Xiangyun Zhou,
Robert W. Heath Jr
Abstract:
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver. To deal with beamformer quantization errors as well as unknown eavesdropper channel characteristics, our approach is aimed at maximizing throughput under dual performance constraints - a connection outage constraint on the des…
▽ More
We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver. To deal with beamformer quantization errors as well as unknown eavesdropper channel characteristics, our approach is aimed at maximizing throughput under dual performance constraints - a connection outage constraint on the desired communication channel and a secrecy outage constraint to guard against eavesdropping. We propose an adaptive transmission strategy that judiciously selects the wiretap coding parameters, as well as the power allocation between the artificial noise and the information signal. This optimized solution reveals several important differences with respect to solutions designed previously under the assumption of perfect feedback. We also investigate the problem of how to most efficiently utilize the feedback bits. The simulation results indicate that a good design strategy is to use approximately 20% of these bits to quantize the channel gain information, with the remainder to quantize the channel direction, and this allocation is largely insensitive to the secrecy outage constraint imposed. In addition, we find that 8 feedback bits per transmit antenna is sufficient to achieve approximately 90% of the throughput attainable with perfect feedback.
△ Less
Submitted 21 January, 2015;
originally announced January 2015.
-
Tomlinson-Harashima Precoding for Multiuser MIMO Systems with Quantized CSI Feedback and User Scheduling
Authors:
Liang Sun,
Matthew R. McKay
Abstract:
This paper studies the sum rate performance of a low complexity quantized CSI-based Tomlinson-Harashima (TH) precoding scheme for downlink multiuser MIMO tansmission, employing greedy user selection. The asymptotic distribution of the output signal to interference plus noise ratio of each selected user and the asymptotic sum rate as the number of users K grows large are derived by using extreme va…
▽ More
This paper studies the sum rate performance of a low complexity quantized CSI-based Tomlinson-Harashima (TH) precoding scheme for downlink multiuser MIMO tansmission, employing greedy user selection. The asymptotic distribution of the output signal to interference plus noise ratio of each selected user and the asymptotic sum rate as the number of users K grows large are derived by using extreme value theory. For fixed finite signal to noise ratios and a finite number of transmit antennas $n_T$, we prove that as K grows large, the proposed approach can achieve the optimal sum rate scaling of the MIMO broadcast channel. We also prove that, if we ignore the precoding loss, the average sum rate of this approach converges to the average sum capacity of the MIMO broadcast channel. Our results provide insights into the effect of multiuser interference caused by quantized CSI on the multiuser diversity gain.
△ Less
Submitted 3 August, 2014;
originally announced August 2014.
-
On the Equivalence between Interference and Eavesdropping in Wireless Communications
Authors:
Gerardo Gomez,
F. Javier Lopez-Martinez,
David Morales-Jimenez,
Matthew R. McKay
Abstract:
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustra…
▽ More
We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustrate the applicability of the connection unveiled herein to provide new results for the secrecy outage probability in different scenarios.
△ Less
Submitted 25 February, 2015; v1 submitted 31 July, 2014;
originally announced July 2014.
-
Transmit Designs for the MIMO Broadcast Channel with Statistical CSI
Authors:
Yongpeng Wu,
Shi Jin,
Xiqi Gao,
Matthew R. McKay,
Chengshan Xiao
Abstract:
We investigate the multiple-input multiple-output broadcast channel with statistical channel state information available at the transmitter. The so-called linear assignment operation is employed, and necessary conditions are derived for the optimal transmit design under general fading conditions. Based on this, we introduce an iterative algorithm to maximize the linear assignment weighted sum-rate…
▽ More
We investigate the multiple-input multiple-output broadcast channel with statistical channel state information available at the transmitter. The so-called linear assignment operation is employed, and necessary conditions are derived for the optimal transmit design under general fading conditions. Based on this, we introduce an iterative algorithm to maximize the linear assignment weighted sum-rate by applying a gradient descent method. To reduce complexity, we derive an upper bound of the linear assignment achievable rate of each receiver, from which a simplified closed-form expression for a near-optimal linear assignment matrix is derived. This reveals an interesting construction analogous to that of dirty-paper coding. In light of this, a low complexity transmission scheme is provided. Numerical examples illustrate the significant performance of the proposed low complexity scheme.
△ Less
Submitted 30 June, 2014;
originally announced June 2014.
-
Hypergeometric Functions of Matrix Arguments and Linear Statistics of Multi-Spiked Hermitian Matrix Models
Authors:
Damien Passemier,
Matthew R. Mckay,
Yang Chen
Abstract:
This paper derives central limit theorems (CLTs) for general linear spectral statistics (LSS) of three important multi-spiked Hermitian random matrix ensembles. The first is the most common spiked scenario, proposed by Johnstone, which is a central Wishart ensemble with fixed-rank perturbation of the identity matrix, the second is a non-central Wishart ensemble with fixed-rank noncentrality parame…
▽ More
This paper derives central limit theorems (CLTs) for general linear spectral statistics (LSS) of three important multi-spiked Hermitian random matrix ensembles. The first is the most common spiked scenario, proposed by Johnstone, which is a central Wishart ensemble with fixed-rank perturbation of the identity matrix, the second is a non-central Wishart ensemble with fixed-rank noncentrality parameter, and the third is a similarly defined non-central $F$ ensemble. These CLT results generalize our recent work to account for multiple spikes, which is the most common scenario met in practice. The generalization is non-trivial, as it now requires dealing with hypergeometric functions of matrix arguments. To facilitate our analysis, for a broad class of such functions, we first generalize a recent result of Onatski to present new contour integral representations, which are particularly suitable for computing large-dimensional properties of spiked matrix ensembles. Armed with such representations, our CLT formulas are derived for each of the three spiked models of interest by employing the Coulomb fluid method from random matrix theory along with saddlepoint techniques. We find that for each matrix model, and for general LSS, the individual spikes contribute additively to yield a $O(1)$ correction term to the asymptotic mean of the linear statistic, which we specify explicitly, whilst having no effect on the leading order terms of the mean or variance.
△ Less
Submitted 4 June, 2014; v1 submitted 3 June, 2014;
originally announced June 2014.
-
Analysis and Design of Multiple-Antenna Cognitive Radios with Multiple Primary User Signals
Authors:
David Morales-Jimenez,
Raymond H. Y. Louie,
Matthew R. McKay,
Yang Chen
Abstract:
We consider multiple-antenna signal detection of primary user transmission signals by a secondary user receiver in cognitive radio networks. The optimal detector is analyzed for the scenario where the number of primary user signals is no less than the number of receive antennas at the secondary user. We first derive exact expressions for the moments of the generalized likelihood ratio test (GLRT)…
▽ More
We consider multiple-antenna signal detection of primary user transmission signals by a secondary user receiver in cognitive radio networks. The optimal detector is analyzed for the scenario where the number of primary user signals is no less than the number of receive antennas at the secondary user. We first derive exact expressions for the moments of the generalized likelihood ratio test (GLRT) statistic, yielding approximations for the false alarm and detection probabilities. We then show that the normalized GLRT statistic converges in distribution to a Gaussian random variable when the number of antennas and observations grow large at the same rate. Further, using results from large random matrix theory, we derive expressions to compute the detection probability without explicit knowledge of the channel, and then particularize these expressions for two scenarios of practical interest: 1) a single primary user sending spatially multiplexed signals, and 2) multiple spatially distributed primary users. Our analytical results are finally used to obtain simple design rules for the signal detection threshold.
△ Less
Submitted 23 April, 2015; v1 submitted 25 May, 2014;
originally announced May 2014.
-
Asymptotic Linear Spectral Statistics for Spiked Hermitian Random Matrix Models
Authors:
Damien Passemier,
Matthew R. Mckay,
Yang Chen
Abstract:
Using the Coulomb Fluid method, this paper derives central limit theorems (CLTs) for linear spectral statistics of three "spiked" Hermitian random matrix ensembles. These include Johnstone's spiked model (i.e., central Wishart with spiked correlation), non-central Wishart with rank-one non-centrality, and a related class of non-central $F$ matrices. For a generic linear statistic, we derive simple…
▽ More
Using the Coulomb Fluid method, this paper derives central limit theorems (CLTs) for linear spectral statistics of three "spiked" Hermitian random matrix ensembles. These include Johnstone's spiked model (i.e., central Wishart with spiked correlation), non-central Wishart with rank-one non-centrality, and a related class of non-central $F$ matrices. For a generic linear statistic, we derive simple and explicit CLT expressions as the matrix dimensions grow large. For all three ensembles under consideration, we find that the primary effect of the spike is to introduce an $O(1)$ correction term to the asymptotic mean of the linear spectral statistic, which we characterize with simple formulas. The utility of our proposed framework is demonstrated through application to three different linear statistics problems: the classical likelihood ratio test for a population covariance, the capacity analysis of multi-antenna wireless communication systems with a line-of-sight transmission path, and a classical multiple sample significance testing problem.
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
Large Dimensional Analysis and Optimization of Robust Shrinkage Covariance Matrix Estimators
Authors:
Romain Couillet,
Matthew R. McKay
Abstract:
This article studies two regularized robust estimators of scatter matrices proposed (and proved to be well defined) in parallel in (Chen et al., 2011) and (Pascal et al., 2013), based on Tyler's robust M-estimator (Tyler, 1987) and on Ledoit and Wolf's shrinkage covariance matrix estimator (Ledoit and Wolf, 2004). These hybrid estimators have the advantage of conveying (i) robustness to outliers o…
▽ More
This article studies two regularized robust estimators of scatter matrices proposed (and proved to be well defined) in parallel in (Chen et al., 2011) and (Pascal et al., 2013), based on Tyler's robust M-estimator (Tyler, 1987) and on Ledoit and Wolf's shrinkage covariance matrix estimator (Ledoit and Wolf, 2004). These hybrid estimators have the advantage of conveying (i) robustness to outliers or impulsive samples and (ii) small sample size adequacy to the classical sample covariance matrix estimator. We consider here the case of i.i.d. elliptical zero mean samples in the regime where both sample and population sizes are large. We demonstrate that, under this setting, the estimators under study asymptotically behave similar to well-understood random matrix models. This characterization allows us to derive optimal shrinkage strategies to estimate the population scatter matrix, improving significantly upon the empirical shrinkage method proposed in (Chen et al., 2011).
△ Less
Submitted 18 January, 2015; v1 submitted 16 January, 2014;
originally announced January 2014.
-
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks
Authors:
Xi Zhang,
Xiangyun Zhou,
Matthew R. McKay
Abstract:
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of…
▽ More
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the networkwide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.
△ Less
Submitted 24 August, 2013;
originally announced August 2013.
-
Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective
Authors:
Xiangyun Zhou,
Matthew R. McKay,
Behrouz Maham,
Are Hjorungnes
Abstract:
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance.
This letter studies information-theoretic security without knowing the eavesdropper's channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while achieving good throughput performance.
△ Less
Submitted 6 June, 2013;
originally announced June 2013.
-
Perturbed Laguerre Unitary Ensembles, Painlevé V and Information Theory
Authors:
Estelle Basor,
Yang Chen,
Matthew R. McKay
Abstract:
In this review, we investigate a key information-theoretic performance metric in multiple-antenna wireless communications, the so-called outage probability. This quantity may be expressed in terms of a moment generating function, for which we present two separate integral representations, one involving a particular $σ$-form of Painlevé V. We also present a representation involving a non-linear sec…
▽ More
In this review, we investigate a key information-theoretic performance metric in multiple-antenna wireless communications, the so-called outage probability. This quantity may be expressed in terms of a moment generating function, for which we present two separate integral representations, one involving a particular $σ$-form of Painlevé V. We also present a representation involving a non-linear second order difference equation.
△ Less
Submitted 11 April, 2014; v1 submitted 4 March, 2013;
originally announced March 2013.
-
On the Distribution of MIMO Mutual Information: An In-Depth Painlevé Based Characterization
Authors:
Shang Li,
Matthew R. McKay,
Yang Chen
Abstract:
This paper builds upon our recent work which computed the moment generating function of the MIMO mutual information exactly in terms of a Painlevé V differential equation. By exploiting this key analytical tool, we provide an in-depth characterization of the mutual information distribution for sufficiently large (but finite) antenna numbers. In particular, we derive systematic closed-form expansio…
▽ More
This paper builds upon our recent work which computed the moment generating function of the MIMO mutual information exactly in terms of a Painlevé V differential equation. By exploiting this key analytical tool, we provide an in-depth characterization of the mutual information distribution for sufficiently large (but finite) antenna numbers. In particular, we derive systematic closed-form expansions for the high order cumulants. These results yield considerable new insight, such as providing a technical explanation as to why the well known Gaussian approximation is quite robust to large SNR for the case of unequal antenna arrays, whilst it deviates strongly for equal antenna arrays. In addition, by drawing upon our high order cumulant expansions, we employ the Edgeworth expansion technique to propose a refined Gaussian approximation which is shown to give a very accurate closed-form characterization of the mutual information distribution, both around the mean and for moderate deviations into the tails (where the Gaussian approximation fails remarkably). For stronger deviations where the Edgeworth expansion becomes unwieldy, we employ the saddle point method and asymptotic integration tools to establish new analytical characterizations which are shown to be very simple and accurate. Based on these results we also recover key well established properties of the tail distribution, including the diversity-multiplexing-tradeoff.
△ Less
Submitted 21 January, 2013;
originally announced January 2013.
-
Random Matrix Models, Double-Time Painlevé Equations, and Wireless Relaying
Authors:
Yang Chen,
Nazmus S. Haq,
Matthew R. McKay
Abstract:
This paper gives an in-depth study of a multiple-antenna wireless communication scenario in which a weak signal received at an intermediate relay station is amplified and then forwarded to the final destination. The key quantity determining system performance is the statistical properties of the signal-to-noise ratio (SNR) γ at the destination. Under certain assumptions on the encoding structure,…
▽ More
This paper gives an in-depth study of a multiple-antenna wireless communication scenario in which a weak signal received at an intermediate relay station is amplified and then forwarded to the final destination. The key quantity determining system performance is the statistical properties of the signal-to-noise ratio (SNR) γ at the destination. Under certain assumptions on the encoding structure, recent work has characterized the SNR distribution through its moment generating function, in terms of a certain Hankel determinant generated via a deformed Laguerre weight. Here, we employ two different methods to describe the Hankel determinant. First, we make use of ladder operators satisfied by orthogonal polynomials to give an exact characterization in terms of a "double-time" Painlevé differential equation, which reduces to Painlevé V under certain limits. Second, we employ Dyson's Coulomb Fluid method to derive a closed form approximation for the Hankel determinant. The two characterizations are used to derive closed-form expressions for the cumulants of γ, and to compute performance quantities of engineering interest.
△ Less
Submitted 8 June, 2013; v1 submitted 17 December, 2012;
originally announced December 2012.
-
On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels
Authors:
Xi Zhang,
Xiangyun Zhou,
Matthew R. McKay
Abstract:
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code. We consider two scenarios with different complexity levels: i) the design parameters are chosen to be fixed for all transmissions, ii) they are adaptively adjusted…
▽ More
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code. We consider two scenarios with different complexity levels: i) the design parameters are chosen to be fixed for all transmissions, ii) they are adaptively adjusted based on the instantaneous channel feedback from the intended receiver. In both scenarios, we provide explicit design solutions for achieving the maximal throughput subject to a secrecy constraint, given by a maximum allowable secrecy outage probability. We then derive accurate approximations for the maximal throughput in both scenarios in the high signal-to-noise ratio region, and give new insights into the additional power cost for achieving a higher security level, whilst maintaining a specified target throughput. In the end, the throughput gain of adaptive transmission over non-adaptive transmission is also quantified and analyzed.
△ Less
Submitted 20 January, 2013; v1 submitted 14 December, 2012;
originally announced December 2012.
-
Distributions of Demmel and Related Condition Numbers
Authors:
Prathapasinghe Dharmawansa,
Matthew McKay,
Yang Chen
Abstract:
Consider a random matrix $\mathbf{A}\in\mathbb{C}^{m\times n}$ ($m \geq n$) containing independent complex Gaussian entries with zero mean and unit variance, and let $0<λ_1\leq λ_{2}\leq ...\leq λ_n<\infty$ denote the eigenvalues of $\mathbf{A}^{*}\mathbf{A}$ where $(\cdot)^*$ represents conjugate-transpose. This paper investigates the distribution of the random variables…
▽ More
Consider a random matrix $\mathbf{A}\in\mathbb{C}^{m\times n}$ ($m \geq n$) containing independent complex Gaussian entries with zero mean and unit variance, and let $0<λ_1\leq λ_{2}\leq ...\leq λ_n<\infty$ denote the eigenvalues of $\mathbf{A}^{*}\mathbf{A}$ where $(\cdot)^*$ represents conjugate-transpose. This paper investigates the distribution of the random variables $\frac{\sum_{j=1}^n λ_j}{λ_k}$, for $k = 1$ and $k = 2$. These two variables are related to certain condition number metrics, including the so-called Demmel condition number, which have been shown to arise in a variety of applications. For both cases, we derive new exact expressions for the probability densities, and establish the asymptotic behavior as the matrix dimensions grow large. In particular, it is shown that as $n$ and $m$ tend to infinity with their difference fixed, both densities scale on the order of $n^3$. After suitable transformations, we establish exact expressions for the asymptotic densities, obtaining simple closed-form expressions in some cases. Our results generalize the work of Edelman on the Demmel condition number for the case $m = n$.
△ Less
Submitted 2 November, 2012;
originally announced November 2012.