-
Tamed Euler-Maruyama method for SDEs with non-globally Lipschitz drift and multiplicative noise
Authors:
Xiang Li,
Yingjun Mo,
Haoran Yang
Abstract:
Consider the following stochastic differential equation driven by multiplicative noise on $\mathbb{R}^d$ with a superlinearly growing drift coefficient, \begin{align*}
\mathrm{d} X_t = b (X_t) \, \mathrm{d} t + σ(X_t) \, \mathrm{d} B_t. \end{align*} It is known that the corresponding explicit Euler schemes may not converge. In this article, we analyze an explicit and easily implementable numeric…
▽ More
Consider the following stochastic differential equation driven by multiplicative noise on $\mathbb{R}^d$ with a superlinearly growing drift coefficient, \begin{align*}
\mathrm{d} X_t = b (X_t) \, \mathrm{d} t + σ(X_t) \, \mathrm{d} B_t. \end{align*} It is known that the corresponding explicit Euler schemes may not converge. In this article, we analyze an explicit and easily implementable numerical method for approximating such a stochastic differential equation, i.e. its tamed Euler-Maruyama approximation. Under partial dissipation conditions ensuring the ergodicity, we obtain the uniform-in-time convergence rates of the tamed Euler-Maruyama process under $L^{1}$-Wasserstein distance and total variation distance.
△ Less
Submitted 5 May, 2025;
originally announced May 2025.
-
Approximation to Deep Q-Network by Stochastic Delay Differential Equations
Authors:
Jianya Lu,
Yingjun Mo
Abstract:
Despite the significant breakthroughs that the Deep Q-Network (DQN) has brought to reinforcement learning, its theoretical analysis remains limited. In this paper, we construct a stochastic differential delay equation (SDDE) based on the DQN algorithm and estimate the Wasserstein-1 distance between them. We provide an upper bound for the distance and prove that the distance between the two converg…
▽ More
Despite the significant breakthroughs that the Deep Q-Network (DQN) has brought to reinforcement learning, its theoretical analysis remains limited. In this paper, we construct a stochastic differential delay equation (SDDE) based on the DQN algorithm and estimate the Wasserstein-1 distance between them. We provide an upper bound for the distance and prove that the distance between the two converges to zero as the step size approaches zero. This result allows us to understand DQN's two key techniques, the experience replay and the target network, from the perspective of continuous systems. Specifically, the delay term in the equation, corresponding to the target network, contributes to the stability of the system. Our approach leverages a refined Lindeberg principle and an operator comparison to establish these results.
△ Less
Submitted 1 May, 2025;
originally announced May 2025.
-
Existence and non-existence of the CLT for a family of SDEs driven by stable process
Authors:
Yingjun Mo,
Yu Wang
Abstract:
Stochastic differential equations (SDEs) without global Lipschitz drift often demonstrate unusual phenomena. In this paper, we consider the following SDE on $\mathbb R^d$:
\begin{align*}
\mathrm{d} \mathbf{X}_t=\mathbf{b}(\mathbf{X}_t) \mathrm{d} t+ \mathrm{d}\mathbf{Z}_t, \quad \mathbf{X}_0=\mathbf{x} \in \mathbb{R}^d, \end{align*} where $\mathbf{Z}_t$ is the rotationally symmetric $α$-stable…
▽ More
Stochastic differential equations (SDEs) without global Lipschitz drift often demonstrate unusual phenomena. In this paper, we consider the following SDE on $\mathbb R^d$:
\begin{align*}
\mathrm{d} \mathbf{X}_t=\mathbf{b}(\mathbf{X}_t) \mathrm{d} t+ \mathrm{d}\mathbf{Z}_t, \quad \mathbf{X}_0=\mathbf{x} \in \mathbb{R}^d, \end{align*} where $\mathbf{Z}_t$ is the rotationally symmetric $α$-stable process with $α\in(1,2)$ and $\mathbf{b}:\mathbb{R}^d \rightarrow \mathbb{R}^d$ is a differentiable function satisfying the following condition: there exist some $θ\ge 0$, and $K_1 , K_2 , L>0$, so that $$\langle \mathbf{b}(\mathbf{x})-\mathbf{b}(\mathbf{y}), \mathbf{x}-\mathbf{y}\rangle \leqslant K_1 |\mathbf{x}-\mathbf{y}|^2, \ \ \forall \ \ |\mathbf{x}-\mathbf{y}| \leqslant L, $$ $$\langle \mathbf{b}(\mathbf{x})-\mathbf{b}(\mathbf{y}), \mathbf{x}-\mathbf{y}\rangle \leqslant -K_2 |\mathbf{x}-\mathbf{y}|^{2+θ}, \ \ \forall \ \ |\mathbf{x}-\mathbf{y}| > L.$$ Under this assumption, the SDE admits a unique invariant measure $μ$.
We investigate the normal central limit theorem (CLT) of the empirical measures $$ \mathcal{E}_t^\mathbf{x}(\cdot)=\frac{1}{t} \int_0^t δ_{\mathbf{X}_s }(\cdot) \mathrm{d} s, \ \ \ \ \mathbf{X}_0=\mathbf{x} \in \mathbb{R}^d, \ \ t>0, $$ where $δ_{\mathbf{x}}(\cdot)$ is the Dirac delta measure.
Our results reveal that, for the bounded measurable function $h$, $$\sqrt t \left(\mathcal{E}_t^\mathbf{x}(h)-μ(h)\right)=\frac{1}{\sqrt t} \int_0^t \left(h\left(\mathbf{X}_s^\mathbf{x}\right)-μ(h)\right) \mathrm{d} s$$ admits a normal CLT for $θ\geqslant 0$. For the Lipschitz continuous function $h$, the normal CLT does not necessarily hold when $θ=0$, but it is satisfied for $θ>1-\fracα{2}$.
△ Less
Submitted 30 April, 2025;
originally announced April 2025.
-
Regret Analysis with Almost Sure Convergence for OBF-ARX Filter
Authors:
Jiayun Li,
Yiwen Lu,
Yilin Mo
Abstract:
This paper considers the output prediction problem for an unknown Linear Time-Invariant (LTI) system. In particular, we focus our attention on the OBF-ARX filter, whose transfer function is a linear combination of Orthogonal Basis Functions (OBFs), with the coefficients determined by solving a least-squares regression. We prove that the OBF-ARX filter is an accurate approximation of the Kalman Fil…
▽ More
This paper considers the output prediction problem for an unknown Linear Time-Invariant (LTI) system. In particular, we focus our attention on the OBF-ARX filter, whose transfer function is a linear combination of Orthogonal Basis Functions (OBFs), with the coefficients determined by solving a least-squares regression. We prove that the OBF-ARX filter is an accurate approximation of the Kalman Filter (KF) by quantifying its online performance. Specifically, we analyze the average regret between the OBF-ARX filter and the KF, proving that the average regret over $N$ time steps converges to the asymptotic bias at the speed of $O(N^{-0.5+ε})$ almost surely for all $ε>0$. Then, we establish an upper bound on the asymptotic bias, demonstrating that it decreases exponentially with the number of OBF bases, and the decreasing rate $τ(\boldsymbolλ, \boldsymbolμ)$ explicitly depends on the poles of both the KF and the OBF. Numerical results on diffusion processes validate the derived bounds.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
The distributed biased min-consensus protocol revisited: pre-specified finite time control strategies and small-gain based analysis
Authors:
Yuanqiu Mo,
He Wang
Abstract:
Unlike the classical distributed consensus protocols enabling the group of agents as a whole to reach an agreement regarding a certain quantity of interest in a distributed fashion, the distributed biased min-consensus protocol (DBMC) has been proven to generate advanced complexity pertaining to solving the shortest path problem. As such a protocol is commonly incorporated as the first step of a h…
▽ More
Unlike the classical distributed consensus protocols enabling the group of agents as a whole to reach an agreement regarding a certain quantity of interest in a distributed fashion, the distributed biased min-consensus protocol (DBMC) has been proven to generate advanced complexity pertaining to solving the shortest path problem. As such a protocol is commonly incorporated as the first step of a hierarchical architecture in real applications, e.g., robots path planning, management of dispersed computing services, an impedance limiting the application potential of DBMC lies in, the lack of results regarding to its convergence within a user-assigned time. In this paper, we first propose two control strategies ensuring the state error of DBMC decrease exactly to zero or a desired level manipulated by the user, respectively. To compensate the high feedback gains incurred by these two control strategies, this paper further investigates the nominal DBMC itself. By leveraging small gain based stability tools, this paper also proves the global exponential input-to-state stability of DBMC, outperforming its current stability results. Simulations have been provided to validate the efficacy of our theoretical result.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
MPC-Inspired Reinforcement Learning for Verifiable Model-Free Control
Authors:
Yiwen Lu,
Zishuo Li,
Yihan Zhou,
Na Li,
Yilin Mo
Abstract:
In this paper, we introduce a new class of parameterized controllers, drawing inspiration from Model Predictive Control (MPC). The controller resembles a Quadratic Programming (QP) solver of a linear MPC problem, with the parameters of the controller being trained via Deep Reinforcement Learning (DRL) rather than derived from system models. This approach addresses the limitations of common control…
▽ More
In this paper, we introduce a new class of parameterized controllers, drawing inspiration from Model Predictive Control (MPC). The controller resembles a Quadratic Programming (QP) solver of a linear MPC problem, with the parameters of the controller being trained via Deep Reinforcement Learning (DRL) rather than derived from system models. This approach addresses the limitations of common controllers with Multi-Layer Perceptron (MLP) or other general neural network architecture used in DRL, in terms of verifiability and performance guarantees, and the learned controllers possess verifiable properties like persistent feasibility and asymptotic stability akin to MPC. On the other hand, numerical examples illustrate that the proposed controller empirically matches MPC and MLP controllers in terms of control performance and has superior robustness against modeling uncertainty and noises. Furthermore, the proposed controller is significantly more computationally efficient compared to MPC and requires fewer parameters to learn than MLP controllers. Real-world experiments on vehicle drift maneuvering task demonstrate the potential of these controllers for robotics and other demanding control tasks.
△ Less
Submitted 9 April, 2024; v1 submitted 8 December, 2023;
originally announced December 2023.
-
Probabilistic Reduced-Dimensional Vector Autoregressive Modeling for Dynamics Prediction and Reconstruction with Oblique Projections
Authors:
Yanfang Mo,
Jiaxin Yu,
S. Joe Qin
Abstract:
In this paper, we propose a probabilistic reduced-dimensional vector autoregressive (PredVAR) model with oblique projections. This model partitions the measurement space into a dynamic subspace and a static subspace that do not need to be orthogonal. The partition allows us to apply an oblique projection to extract dynamic latent variables (DLVs) from high-dimensional data with maximized predictab…
▽ More
In this paper, we propose a probabilistic reduced-dimensional vector autoregressive (PredVAR) model with oblique projections. This model partitions the measurement space into a dynamic subspace and a static subspace that do not need to be orthogonal. The partition allows us to apply an oblique projection to extract dynamic latent variables (DLVs) from high-dimensional data with maximized predictability. We develop an alternating iterative PredVAR algorithm that exploits the interaction between updating the latent VAR dynamics and estimating the oblique projection, using expectation maximization (EM) and a statistical constraint. In addition, the noise covariance matrices are estimated as a natural outcome of the EM method. A simulation case study of the nonlinear Lorenz oscillation system illustrates the advantages of the proposed approach over two alternatives.
△ Less
Submitted 3 September, 2023;
originally announced September 2023.
-
Markov Parameter Identification via Chebyshev Approximation
Authors:
Jiayun Li,
Yilin Mo
Abstract:
This paper proposes an identification algorithm for Single Input Single Output (SISO) Linear Time-Invariant (LTI) systems. In the noise-free setting, where the first $T$ Markov parameters can be precisely estimated, all Markov parameters can be inferred by the linear combination of the known $T$ Markov parameters, of which the coefficients are obtained by solving the uniform polynomial approximati…
▽ More
This paper proposes an identification algorithm for Single Input Single Output (SISO) Linear Time-Invariant (LTI) systems. In the noise-free setting, where the first $T$ Markov parameters can be precisely estimated, all Markov parameters can be inferred by the linear combination of the known $T$ Markov parameters, of which the coefficients are obtained by solving the uniform polynomial approximation problem, and the upper bound of the asymptotic identification bias is provided. For the finite-time identification scenario, we cast the system identification problem with noisy Markov parameters into a regularized uniform approximation problem. Numerical results demonstrate that the proposed algorithm outperforms the conventional Ho-Kalman Algorithm for the finite-time identification scenario while the asymptotic bias remains negligible.
△ Less
Submitted 10 April, 2023; v1 submitted 6 April, 2023;
originally announced April 2023.
-
Linear Model Predictive Control under Continuous Path Constraints via Parallelized Primal-Dual Hybrid Gradient Algorithm
Authors:
Zishuo Li,
Bo Yang,
Jiayun Li,
Jiaqi Yan,
Yilin Mo
Abstract:
In this paper, we consider a Model Predictive Control (MPC) problem of a continuous-time linear time-invariant system subject to continuous-time path constraints on the states and the inputs. By leveraging the concept of differential flatness, we can replace the differential equations governing the system with linear mapping between the states, inputs, and flat outputs (including their derivatives…
▽ More
In this paper, we consider a Model Predictive Control (MPC) problem of a continuous-time linear time-invariant system subject to continuous-time path constraints on the states and the inputs. By leveraging the concept of differential flatness, we can replace the differential equations governing the system with linear mapping between the states, inputs, and flat outputs (including their derivatives). The flat outputs are then parameterized by piecewise polynomials, and the model predictive control problem can be equivalently transformed into a Semi-Definite Programming (SDP) problem via Sum-of-Squares (SOS), ensuring constraint satisfaction at every continuous-time interval. We further note that the SDP problem contains a large number of small-size semi-definite matrices as optimization variables. To address this, we develop a Primal-Dual Hybrid Gradient (PDHG) algorithm that can be efficiently parallelized to speed up the optimization procedure. Simulation results on a quadruple-tank process demonstrate that our formulation can guarantee strict constraint satisfaction, while the standard MPC controller based on the discretized system may violate the constraint inside a sampling period. Moreover, the computational speed superiority of our proposed algorithm is collaborated by numerical simulation.
△ Less
Submitted 17 April, 2023; v1 submitted 31 March, 2023;
originally announced March 2023.
-
The structure of simply colored coalgebras
Authors:
Yang Mo
Abstract:
A simply colored coalgebra is a coassociative counital coalgebra $C$ over an arbitrary ring $R$, which can be decomposed into a direct sum of two $R$-modules: one generated by set-like elements and another consisting of conilpotent elements. Our main result is the equivalence between simply colored coalgebras over a field $k$ and pointed coalgebras with a choice of splitting of its coradical. Addi…
▽ More
A simply colored coalgebra is a coassociative counital coalgebra $C$ over an arbitrary ring $R$, which can be decomposed into a direct sum of two $R$-modules: one generated by set-like elements and another consisting of conilpotent elements. Our main result is the equivalence between simply colored coalgebras over a field $k$ and pointed coalgebras with a choice of splitting of its coradical. Additionally, we also prove that the category of simply colored coalgebras is both complete and cocomplete.
△ Less
Submitted 24 September, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Almost Surely $\sqrt{T}$ Regret for Adaptive LQR
Authors:
Yiwen Lu,
Yilin Mo
Abstract:
The Linear-Quadratic Regulation (LQR) problem with unknown system parameters has been widely studied, but it has remained unclear whether $\tilde{ \mathcal{O}}(\sqrt{T})$ regret, which is the best known dependence on time, can be achieved almost surely. In this paper, we propose an adaptive LQR controller with almost surely $\tilde{ \mathcal{O}}(\sqrt{T})$ regret upper bound. The controller featur…
▽ More
The Linear-Quadratic Regulation (LQR) problem with unknown system parameters has been widely studied, but it has remained unclear whether $\tilde{ \mathcal{O}}(\sqrt{T})$ regret, which is the best known dependence on time, can be achieved almost surely. In this paper, we propose an adaptive LQR controller with almost surely $\tilde{ \mathcal{O}}(\sqrt{T})$ regret upper bound. The controller features a circuit-breaking mechanism, which circumvents potential safety breach and guarantees the convergence of the system parameter estimate, but is shown to be triggered only finitely often and hence has negligible effect on the asymptotic performance of the controller. The proposed controller is also validated via simulation on Tennessee Eastman Process~(TEP), a commonly used industrial process example.
△ Less
Submitted 27 January, 2025; v1 submitted 13 January, 2023;
originally announced January 2023.
-
Distribution estimation and change-point estimation for time series via DNN-based GANs
Authors:
Jianya Lu,
Yingjun Mo,
Zhijie Xiao,
Lihu Xu,
Qiuran Yao
Abstract:
The generative adversarial networks (GANs) have recently been applied to estimating the distribution of independent and identically distributed data, and have attracted a lot of research attention. In this paper, we use the blocking technique to demonstrate the effectiveness of GANs for estimating the distribution of stationary time series. Theoretically, we derive a non-asymptotic error bound for…
▽ More
The generative adversarial networks (GANs) have recently been applied to estimating the distribution of independent and identically distributed data, and have attracted a lot of research attention. In this paper, we use the blocking technique to demonstrate the effectiveness of GANs for estimating the distribution of stationary time series. Theoretically, we derive a non-asymptotic error bound for the Deep Neural Network (DNN)-based GANs estimator for the stationary distribution of the time series. Based on our theoretical analysis, we propose an algorithm for estimating the change point in time series distribution. The two main results are verified by two Monte Carlo experiments respectively, one is to estimate the joint stationary distribution of $5$-tuple samples of a 20 dimensional AR(3) model, the other is about estimating the change point at the combination of two different stationary time series. A real world empirical application to the human activity recognition dataset highlights the potential of the proposed methods.
△ Less
Submitted 7 February, 2023; v1 submitted 26 November, 2022;
originally announced November 2022.
-
Safe and Efficient Switching Mechanism Design for Uncertified Linear Controller
Authors:
Yiwen Lu,
Yilin Mo
Abstract:
Sustained research efforts have been devoted to learning optimal controllers for linear stochastic dynamical systems with unknown parameters, but due to the corruption of noise, learned controllers are usually uncertified in the sense that they may destabilize the system. To address this potential instability, we propose a "plug-and-play" modification to the uncertified controller which falls back…
▽ More
Sustained research efforts have been devoted to learning optimal controllers for linear stochastic dynamical systems with unknown parameters, but due to the corruption of noise, learned controllers are usually uncertified in the sense that they may destabilize the system. To address this potential instability, we propose a "plug-and-play" modification to the uncertified controller which falls back to a known stabilizing controller when the norm of the difference between the uncertified and the fall-back control input exceeds a certain threshold. We show that the switching strategy is both safe and efficient, in the sense that: 1) the linear-quadratic cost of the system is always bounded even if original uncertified controller is destabilizing; 2) in case the uncertified controller is stabilizing, the performance loss caused by switching converges super-exponentially to $0$ for Gaussian noise, while the converging polynomially for general heavy-tailed noise. Finally, we demonstrate the effectiveness of the proposed switching strategy via numerical simulation on the Tennessee Eastman Process.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Optimal $(0,1)$-Matrix Completion with Majorization Ordered Objectives (To the memory of Pravin Varaiya)
Authors:
Yanfang Mo,
Wei Chen,
Keyou You,
Li Qiu
Abstract:
We propose and examine two optimal $(0,1)$-matrix completion problems with majorization ordered objectives. They elevate the seminal study by Gale and Ryser from feasibility to optimality in partial order programming (POP), referring to optimization with partially ordered objectives. We showcase their applications in electric vehicle charging, portfolio optimization, and secure data storage. Solvi…
▽ More
We propose and examine two optimal $(0,1)$-matrix completion problems with majorization ordered objectives. They elevate the seminal study by Gale and Ryser from feasibility to optimality in partial order programming (POP), referring to optimization with partially ordered objectives. We showcase their applications in electric vehicle charging, portfolio optimization, and secure data storage. Solving such integer POP (iPOP) problems is challenging because of the possible non-comparability among objective values and the integer requirements. Nevertheless, we prove the essential uniqueness of all optimal objective values and identify two particular ones for each of the two inherently symmetric iPOP problems. Furthermore, for every optimal objective value, we decompose the construction of an associated optimal~$(0,1)$-matrix into a series of sorting processes, respectively agreeing with the rule of thumb "peak shaving" or "valley filling." We show that the resulting algorithms have linear time complexities and verify their empirical efficiency via numerical simulations compared to the standard order-preserving method for POP.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
Ensuring the Safety of Uncertified Linear State-Feedback Controllers via Switching
Authors:
Yiwen Lu,
Yilin Mo
Abstract:
Sustained research efforts have been devoted to learning optimal controllers for linear stochastic dynamical systems with unknown parameters, but due to the corruption of noise, learned controllers are usually uncertified in the sense that they may destabilize the system. To address this potential instability, we propose a "plug-and-play" modification to the uncertified controller which falls back…
▽ More
Sustained research efforts have been devoted to learning optimal controllers for linear stochastic dynamical systems with unknown parameters, but due to the corruption of noise, learned controllers are usually uncertified in the sense that they may destabilize the system. To address this potential instability, we propose a "plug-and-play" modification to the uncertified controller which falls back to a known stabilizing controller when the norm of the state exceeds a certain threshold. We show that the switching strategy enhances the safety of the uncertified controller by making the linear-quadratic cost bounded even if the underlying linear feedback gain is destabilizing. We also prove the near-optimality of the proposed strategy by quantifying the maximum performance loss caused by switching as asymptotically negligible. Finally, we demonstrate the effectiveness of the proposed switching strategy using simulation on an industrial process example.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
Shapley values and machine learning to characterize metamaterials for seismic applications
Authors:
D. Oniz,
Y. L. Mo,
K. B. Nakshatrala
Abstract:
Given the damages from earthquakes, seismic isolation of critical infrastructure is vital to mitigate losses due to seismic events. A promising approach for seismic isolation systems is metamaterials-based wave barriers. Metamaterials -- engineered composites -- manipulate the propagation and attenuation of seismic waves. Borrowing ideas from phononic and sonic crystals, the central goal of a meta…
▽ More
Given the damages from earthquakes, seismic isolation of critical infrastructure is vital to mitigate losses due to seismic events. A promising approach for seismic isolation systems is metamaterials-based wave barriers. Metamaterials -- engineered composites -- manipulate the propagation and attenuation of seismic waves. Borrowing ideas from phononic and sonic crystals, the central goal of a metamaterials-based wave barrier is to create band gaps that cover the frequencies of seismic waves. The two quantities of interest (QoIs) that characterize band-gaps are the first-frequency cutoff and the band-gap's width. Researchers often use analytical (band-gap analysis), experimental (shake table tests), and statistical (global variance) approaches to tailor the QoIs. However, these approaches are expensive and compute-intensive. So, a pressing need exists for alternative easy-to-use methods to quantify the correlation between input (design) parameters and QoIs. To quantify such a correlation, in this paper, we will use Shapley values, a technique from the cooperative game theory. In addition, we will develop machine learning models that can predict the QoIs for a given set of input (material and geometrical) parameters.
△ Less
Submitted 16 June, 2024; v1 submitted 1 August, 2021;
originally announced August 2021.
-
Optimal Online Algorithms for Peak-Demand Reduction Maximization with Energy Storage
Authors:
Yanfang Mo,
Qiulin Lin,
Minghua Chen,
Si-Zhao Joe Qin
Abstract:
The high proportions of demand charges in electric bills motivate large-power customers to leverage energy storage for reducing the peak procurement from the outer grid. Given limited energy storage, we expect to maximize the peak-demand reduction in an online fashion, challenged by the highly uncertain demands and renewable injections, the non-cumulative nature of peak consumption, and the coupli…
▽ More
The high proportions of demand charges in electric bills motivate large-power customers to leverage energy storage for reducing the peak procurement from the outer grid. Given limited energy storage, we expect to maximize the peak-demand reduction in an online fashion, challenged by the highly uncertain demands and renewable injections, the non-cumulative nature of peak consumption, and the coupling of online decisions. In this paper, we propose an optimal online algorithm that achieves the best competitive ratio, following the idea of maintaining a constant ratio between the online and the optimal offline peak-reduction performance. We further show that the optimal competitive ratio can be computed by solving a linear number of linear-fractional programs. Moreover, we extend the algorithm to adaptively maintain the best competitive ratio given the revealed inputs and actions at each decision-making round. The adaptive algorithm retains the optimal worst-case guarantee and attains improved average-case performance. We evaluate our proposed algorithms using real-world traces and show that they obtain up to 81% peak reduction of the optimal offline benchmark. Additionally, the adaptive algorithm achieves at least 20% more peak reduction against baseline alternatives.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Pathlike Co/Bialgebras and their Antipodes with Applications to Bi- and Hopf Algebras Appearing in Topology, Number Theory and Physics
Authors:
Ralph M. Kaufmann,
Yang Mo
Abstract:
We develop an algebraic theory of colored, semigrouplike-flavored and pathlike co-, bi- and Hopf algebras. This is the right framework in which to discuss antipodes for bialgebras naturally appearing in combinatorics, topology, number theory and physics. In particular, we can precisely give conditions for the invertibility of characters that is needed for renormalization in the formulation of Conn…
▽ More
We develop an algebraic theory of colored, semigrouplike-flavored and pathlike co-, bi- and Hopf algebras. This is the right framework in which to discuss antipodes for bialgebras naturally appearing in combinatorics, topology, number theory and physics. In particular, we can precisely give conditions for the invertibility of characters that is needed for renormalization in the formulation of Connes and Kreimer. These are met in the relevant examples. In order to construct antipodes, we discuss formal localization constructions and quantum deformations. These allow to define and explain the appearance of Brown style coactions. Using previous results, we can interpret all the relevant coalgebras as stemming from a categorical construction, tie the bialgebra structures to Feynman categories, and apply the developed theory in this setting.
△ Less
Submitted 11 July, 2022; v1 submitted 18 April, 2021;
originally announced April 2021.
-
Safe Linear-Quadratic Dual Control with Almost Sure Performance Guarantee
Authors:
Yiwen Lu,
Yilin Mo
Abstract:
This paper considers the linear-quadratic dual control problem where the system parameters need to be identified and the control objective needs to be optimized in the meantime. Contrary to existing works on data-driven linear-quadratic regulation, which typically provide error or regret bounds within a certain probability, we propose an online algorithm that guarantees the asymptotic optimality o…
▽ More
This paper considers the linear-quadratic dual control problem where the system parameters need to be identified and the control objective needs to be optimized in the meantime. Contrary to existing works on data-driven linear-quadratic regulation, which typically provide error or regret bounds within a certain probability, we propose an online algorithm that guarantees the asymptotic optimality of the controller in the almost sure sense. Our dual control strategy consists of two parts: a switched controller with time-decaying exploration noise and Markov parameter inference based on the cross-correlation between the exploration noise and system output. Central to the almost sure performance guarantee is a safe switched control strategy that falls back to a known conservative but stable controller when the actual state deviates significantly from the target state. We prove that this switching strategy rules out any potential destabilizing controllers from being applied, while the performance gap between our switching strategy and the optimal linear state feedback is exponentially small. Under our dual control scheme, the parameter inference error scales as $O(T^{-1/4+ε})$, while the suboptimality gap of control performance scales as $O(T^{-1/2+ε})$, where $T$ is the number of time steps, and $ε$ is an arbitrarily small positive number. Simulation results on an industrial process example are provided to illustrate the effectiveness of our proposed strategy.
△ Less
Submitted 19 November, 2021; v1 submitted 24 March, 2021;
originally announced March 2021.
-
Optimal Online Peak Minimization Using Energy Storage
Authors:
Yanfang Mo,
Qiulin Lin,
Minghua Chen,
Si-Zhao Joe Qin
Abstract:
The significant presence of demand charges in electric bills motivates large-load customers to utilize energy storage to reduce the peak procurement from the grid. We herein study the problem of energy storage allocation for peak minimization, under the online setting where irrevocable decisions are sequentially made without knowing future demands. The problem is uniquely challenging due to (i) th…
▽ More
The significant presence of demand charges in electric bills motivates large-load customers to utilize energy storage to reduce the peak procurement from the grid. We herein study the problem of energy storage allocation for peak minimization, under the online setting where irrevocable decisions are sequentially made without knowing future demands. The problem is uniquely challenging due to (i) the coupling of online decisions across time imposed by the inventory constraints and (ii) the noncumulative nature of the peak procurement. We apply the CR-Pursuit framework and address the challenges unique to our minimization problem to design an online algorithm achieving the optimal competitive ratio (CR) among all online algorithms. We show that the optimal CR can be computed in polynomial time by solving a linear number of linear-fractional problems. More importantly, we generalize our approach to develop an \emph{anytime-optimal} online algorithm that achieves the best possible CR at any epoch, given the inputs and online decisions so far. The algorithm retains the optimal worst-case performance and attains adaptive average-case performance. Trace-driven simulations show that our algorithm can decrease the peak demand by an extra 19% compared to baseline alternatives under typical settings.
△ Less
Submitted 17 September, 2022; v1 submitted 26 February, 2021;
originally announced March 2021.
-
Entanglement entropy of two disjoint intervals separated by one spin in a chain of free fermion
Authors:
L. Brightmore,
G. P. Geher,
A. R. Its,
V. E. Korepin,
F. Mezzadri,
M. Y. Mo,
J. A. Virtanen
Abstract:
We calculate the entanglement entropy of a non-contiguous subsystem of a chain of free fermions. The starting point is a formula suggested by Jin and Korepin, \texttt{arXiv:1104.1004}, for the reduced density of states of two disjoint intervals with lattice sites $P=\{1,2,\dots,m\}\cup\{2m+1,2m+2,\dots, 3m\}$, which applies to this model. As a first step in the asymptotic analysis of this system,…
▽ More
We calculate the entanglement entropy of a non-contiguous subsystem of a chain of free fermions. The starting point is a formula suggested by Jin and Korepin, \texttt{arXiv:1104.1004}, for the reduced density of states of two disjoint intervals with lattice sites $P=\{1,2,\dots,m\}\cup\{2m+1,2m+2,\dots, 3m\}$, which applies to this model. As a first step in the asymptotic analysis of this system, we consider its simplification to two disjoint intervals separated just by one site, and we rigorously calculate the mutual information between these two blocks and the rest of the chain. In order to compute the entropy we need to study the asymptotic behaviour of an inverse Toeplitz matrix with Fisher-Hartwig symbol using the the Riemann--Hilbert method.
△ Less
Submitted 15 June, 2020; v1 submitted 18 December, 2019;
originally announced December 2019.
-
A Structure-Tensor Approach to Integer Matrix Completion with Applications to Differentiated Energy Services
Authors:
Yanfang Mo,
Wei Chen,
Sei Zhen Khong,
Li Qiu
Abstract:
Efficient resource allocation is one of the main driving forces of human civilizations. Of the many existing approaches to resource allocation, matrix completion is one that is frequently applied. In this paper, we investigate a special type of matrix completion problem concerning the class of $(0,1)$-matrices with given row/column sums and certain zeros prespecified. We provide a necessary and su…
▽ More
Efficient resource allocation is one of the main driving forces of human civilizations. Of the many existing approaches to resource allocation, matrix completion is one that is frequently applied. In this paper, we investigate a special type of matrix completion problem concerning the class of $(0,1)$-matrices with given row/column sums and certain zeros prespecified. We provide a necessary and sufficient condition under which such a class is nonempty. The condition is stated in the form of the nonnegativity of a structure tensor constructed from the information regarding the given row/column sums and fixed zeros. Moreover, we show that a more general matrix completion problem can be studied in a similar manner, namely that involving the class of nonnegative integer matrices with prescribed row/column sums, predetermined zeros, and different bounds across the rows. To illustrate the utility of our results, we apply them to demand response applications in smart grids. Specifically, we address two adequacy problems in differentiated energy services, namely, the problems of supply/demand matching and minimum purchase profile.
△ Less
Submitted 18 May, 2019;
originally announced May 2019.
-
Distributed Consensus over Markovian Packet Loss Channels
Authors:
Liang Xu,
Yilin Mo,
Lihua Xie
Abstract:
This paper studies the consensusability problem of multi-agent systems (MASs), where agents communicate with each other through Markovian packet loss channels. We try to determine conditions under which there exists a linear distributed consensus controller such that the MAS can achieve mean square consensus. We first provide a necessary and sufficient consensus condition for MASs with single inpu…
▽ More
This paper studies the consensusability problem of multi-agent systems (MASs), where agents communicate with each other through Markovian packet loss channels. We try to determine conditions under which there exists a linear distributed consensus controller such that the MAS can achieve mean square consensus. We first provide a necessary and sufficient consensus condition for MASs with single input and i.i.d.\ channel losses, which complements existing results. Then we proceed to study the case with identical Markovian packet losses. A necessary and sufficient consensus condition is firstly derived based on the stability of Markov jump linear systems. Then a numerically verifiable consensus criterion in terms of the feasibility of linear matrix inequalities (LMIs) is proposed. Furthermore, analytic sufficient conditions and necessary conditions for mean square consensusability are provided for general MASs. The case with nonidentical packet loss is studied subsequently. The necessary and sufficient consensus condition and a sufficient consensus condition in terms of LMIs are proposed. In the end, numerical simulations are conducted to verify the derived results.
△ Less
Submitted 8 October, 2018;
originally announced October 2018.
-
Remote State Estimation with Stochastic Event-triggered Sensor Schedule in the Presence of Packet Drops
Authors:
Liang Xu,
Yilin Mo,
Lihua Xie
Abstract:
This paper studies the remote state estimation problem of linear time-invariant systems with stochastic event-triggered sensor schedules in the presence of packet drops between the sensor and the estimator. It is shown that the system state conditioned on the available information at the estimator side is Gaussian mixture distributed. Minimum mean square error (MMSE) estimators are subsequently de…
▽ More
This paper studies the remote state estimation problem of linear time-invariant systems with stochastic event-triggered sensor schedules in the presence of packet drops between the sensor and the estimator. It is shown that the system state conditioned on the available information at the estimator side is Gaussian mixture distributed. Minimum mean square error (MMSE) estimators are subsequently derived for both open-loop and closed-loop schedules. Since the optimal estimators require exponentially increasing computation and memory, sub-optimal estimators to reduce the computational complexities are further provided. In the end, simulations are conducted to illustrate the performance of the optimal and sub-optimal estimators.
△ Less
Submitted 3 April, 2019; v1 submitted 8 October, 2018;
originally announced October 2018.
-
An On-line Design of Physical Watermarks
Authors:
Hanxiao Liu,
Jiaqi Yan,
Yilin Mo,
Karl Henrik Johansson
Abstract:
This paper considers the problem to design physical watermark signals to protect a control system against replay attacks. We first define the replay attack model, where an adversary replays the previous sensory data in order to fool the system. The physical watermarking scheme, which leverages a random control input as a watermark, to detect the replay attack is introduced. The optimal watermark s…
▽ More
This paper considers the problem to design physical watermark signals to protect a control system against replay attacks. We first define the replay attack model, where an adversary replays the previous sensory data in order to fool the system. The physical watermarking scheme, which leverages a random control input as a watermark, to detect the replay attack is introduced. The optimal watermark signal design problem is then proposed as an optimization problem, which achieves the optimal trade-off between the control performance and attack detection performance. For the system with unknown parameters, we provide a procedure to asymptotically derive the optimal watermarking signal. Numerical examples are provided to illustrate the effectiveness of the proposed strategy.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
Attack-Resilient H2, H-infinity, and L1 State Estimator
Authors:
Yorie Nakahira,
Yilin Mo
Abstract:
This paper considers the secure state estimation problem for noisy systems in the presence of sparse sensor integrity attacks. We show a fundamental limitation: that is, 2r-detectability is necessary for achieving bounded estimation errors, where r is the number of attacks. This condition is weaker than the 2r-observability condition typically assumed in the literature. Conversely, we propose a re…
▽ More
This paper considers the secure state estimation problem for noisy systems in the presence of sparse sensor integrity attacks. We show a fundamental limitation: that is, 2r-detectability is necessary for achieving bounded estimation errors, where r is the number of attacks. This condition is weaker than the 2r-observability condition typically assumed in the literature. Conversely, we propose a real-time state estimator that achieves the fundamental limitation. The proposed state estimator is inspired by robust control and FDI: that is, it consists of local Luenberger estimators, local residual detectors, and a global fusion process. We show its performance guarantees for H2, H-infinity, and L1 systems. Finally, numerical examples show that it has relatively low estimation errors among existing algorithms and average computation time for systems with a sufficiently small number of compromised sensors.
△ Less
Submitted 19 March, 2018;
originally announced March 2018.
-
Binary Hypothesis Testing with Byzantine Sensors: Fundamental Trade-off Between Security and Efficiency
Authors:
Xiaoqiang Ren,
Jiaqi Yan,
Yilin Mo
Abstract:
This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we ex…
▽ More
This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we expect the attack on sensors to be sporadic, and therefore the system may operate with all the sensors being benign for extended period of time. This motivates us to consider the trade-off between the detection performance of a detector, i.e., the probability of error, when the attacker is absent (defined as efficiency) and the worst-case detection performance when the attacker is present (defined as security). We first provide the fundamental limits of this trade-off, and then propose a detection strategy that achieves these limits. We then consider a special case, where there is no trade-off between security and efficiency. In other words, our detection strategy can achieve the maximal efficiency and the maximal security simultaneously. Two extensions of the secure hypothesis testing problem are also studied and fundamental limits and achievability results are provided: 1) a subset of sensors, namely "secure" sensors, are assumed to be equipped with better security countermeasures and hence are guaranteed to be benign, 2) detection performance with unknown number of compromised sensors. Numerical examples are given to illustrate the main results.
△ Less
Submitted 19 January, 2018; v1 submitted 30 July, 2017;
originally announced July 2017.
-
Mean Square Stabilization of Vector LTI Systems over Power Constrained Lossy Channels
Authors:
Liang Xu,
Yilin Mo,
Lihua Xie
Abstract:
This paper studies the mean square stabilization problem of vector LTI systems over power constrained lossy channels. The communication channel is with packet dropouts, additive noises and input power constraints. To overcome the difficulty of optimally allocating channel resources among different sub-dynamics, schedulers are designed with time division multiplexing of channels. An adaptive TDMA (…
▽ More
This paper studies the mean square stabilization problem of vector LTI systems over power constrained lossy channels. The communication channel is with packet dropouts, additive noises and input power constraints. To overcome the difficulty of optimally allocating channel resources among different sub-dynamics, schedulers are designed with time division multiplexing of channels. An adaptive TDMA (Time Division Multiple Access) scheduler is proposed first, which is shown to be able to achieve a larger stabilizability region than the conventional TDMA scheduler, and is optimal under some special cases. In particular, for two-dimensional systems, an optimal scheduler is designed, which provides the necessary and sufficient condition for mean square stabilization.
△ Less
Submitted 30 October, 2015;
originally announced October 2015.
-
Stochastic Sensor Scheduling for Energy Constrained Estimation in Multi-Hop Wireless Sensor Networks
Authors:
Yilin Mo,
Emanuele Garone,
Alessandro Casavola,
Bruno Sinopoli
Abstract:
Wireless Sensor Networks (WSNs) enable a wealth of new applications where remote estimation is essential. Individual sensors simultaneously sense a dynamic process and transmit measured information over a shared channel to a central fusion center. The fusion center computes an estimate of the process state by means of a Kalman filter. In this paper we assume that the WSN admits a tree topology wit…
▽ More
Wireless Sensor Networks (WSNs) enable a wealth of new applications where remote estimation is essential. Individual sensors simultaneously sense a dynamic process and transmit measured information over a shared channel to a central fusion center. The fusion center computes an estimate of the process state by means of a Kalman filter. In this paper we assume that the WSN admits a tree topology with fusion center at the root. At each time step only a subset of sensors can be selected to transmit observations to the fusion center due to a limited energy budget. We propose a stochastic sensor selection algorithm that randomly selects a subset of sensors according to certain probability distribution, which is opportunely designed to minimize the asymptotic expected estimation error covariance matrix. We show that the optimal stochastic sensor selection problem can be relaxed into a convex optimization problem and thus solved efficiently. We also provide a possible implementation of our algorithm which does not introduce any communication overhead. The paper ends with some numerical examples that show the effectiveness of the proposed approach.
△ Less
Submitted 8 July, 2011;
originally announced July 2011.
-
The rank 1 real Wishart spiked model
Authors:
M. Y. Mo
Abstract:
In this paper, we consider N-dimensional real Wishart matrices Y in the class $W_{\mathbb{R}}(Σ,M)$ in which all but one eigenvalues of $Σ$ is 1. Let the non-trivial eigenvalue of $Σ$ be $1+τ$, then as N, $M\rightarrow\infty$, with $M/N=γ^2$ finite and non-zero, the eigenvalue distribution of $Y$ will converge into the Marchenko-Pastur distribution inside a bulk region. When $τ$ increases from zer…
▽ More
In this paper, we consider N-dimensional real Wishart matrices Y in the class $W_{\mathbb{R}}(Σ,M)$ in which all but one eigenvalues of $Σ$ is 1. Let the non-trivial eigenvalue of $Σ$ be $1+τ$, then as N, $M\rightarrow\infty$, with $M/N=γ^2$ finite and non-zero, the eigenvalue distribution of $Y$ will converge into the Marchenko-Pastur distribution inside a bulk region. When $τ$ increases from zero, one starts to see a stray eigenvalue of Y outside of the support of the Marchenko-Pastur density. As the this stray eigenvalue leaves the bulk region, a phase transition will occur in the largest eigenvalue distribution of the Wishart matrix. In this paper we will compute the asymptotics of the largest eigenvalue distribution when the phase transition occur. We will first establish the results that are valid for all N and M and will use them to carry out the asymptotic analysis. In particular, we have derived a contour integral formula for the Harish-Chandra Itzykson-Zuber integral $\int_{O(N)}e^{-\tr(XgYg^T)}g^T\D g$ when X, Y are real symmetric and Y is a rank 1 matrix. This allows us to write down a Fredholm determinant formula for the largest eigenvalue distribution and analyze it using orthogonal polynomial techniques. As a result, we obtain an integral formula for the largest eigenvalue distribution in the large N limit characterized by Painleve transcendents. The approach used in this paper is very different from a recent paper (Bloemendal and Virag ArXiv:1011.1877), in which the largest eigenvalue distribution was obtained using stochastic operator method. In particular, the Painleve formula for the largest eigenvalue distribution obtained in this paper is new.
△ Less
Submitted 26 January, 2011;
originally announced January 2011.
-
The rank 1 real Wishart spiked model I. Finite N analysis
Authors:
M. Y. Mo
Abstract:
This is the first part of a paper that studies the phase transition in the asymptotic limit of the rank 1 real Wishart spiked model. In this paper, we consider $N$-dimensional real Wishart matrices $S$ in the class $W_{\mathbb{R}}\left(Σ,M\right)$ in which all but one eigenvalues of $Σ$ is $1$. Let the non-trivial eigenvalue of $Σ$ be $1+τ$, then as $N$, $M\rightarrow\infty$, with $N/M=γ^2$ finite…
▽ More
This is the first part of a paper that studies the phase transition in the asymptotic limit of the rank 1 real Wishart spiked model. In this paper, we consider $N$-dimensional real Wishart matrices $S$ in the class $W_{\mathbb{R}}\left(Σ,M\right)$ in which all but one eigenvalues of $Σ$ is $1$. Let the non-trivial eigenvalue of $Σ$ be $1+τ$, then as $N$, $M\rightarrow\infty$, with $N/M=γ^2$ finite and non-zero, the eigenvalue distribution of $S$ will converge into the Machenko-Pastur distribution inside a bulk region. As $τ$ increases from zero, one starts seeing stray eigenvalues of $S$ outside of the support of the Machenko-Pastur density. As the first of these stray eigenvalues leaves the bulk region, a phase transition will occur in the largest eigenvalue distribution of the Wishart matrix. In this paper will compute the asymptotics of the largest eigenvalue distribution when the phase transition occur. In the this first half of the paper, we will establish the results that are valid for all $N$ and $M$ and will use them to carry out the asymptotic analysis in the second half of the paper, which will follow shortly. In particular, we have derived a formula for the integral $\int_{O(N)}e^{-\tr(XgYg^T)}g^T\D g$ when $X$, $Y$ are symmetric and $Y$ is a rank 1 matrix. This allows us to write down a Fredholm determinant formula for the largest eigenvalue distribution and analyze it using orthogonal polynomial techniques. This approach is very different from a recent paper by Bloemendal and Virag, in which the largest eigenvalue distribution was obtained using stochastic operator method.
△ Less
Submitted 24 November, 2010;
originally announced November 2010.
-
The Hermitian two matrix model with an even quartic potential
Authors:
Maurice Duits,
Arno B. J. Kuijlaars,
Man Yue Mo
Abstract:
We consider the two matrix model with an even quartic potential W(y)=y^4/4+alpha y^2/2 and an even polynomial potential V(x). The main result of the paper is the formulation of a vector equilibrium problem for the limiting mean density for the eigenvalues of one of the matrices M_1. The vector equilibrium problem is defined for three measures, with external fields on the first and third measures a…
▽ More
We consider the two matrix model with an even quartic potential W(y)=y^4/4+alpha y^2/2 and an even polynomial potential V(x). The main result of the paper is the formulation of a vector equilibrium problem for the limiting mean density for the eigenvalues of one of the matrices M_1. The vector equilibrium problem is defined for three measures, with external fields on the first and third measures and an upper constraint on the second measure. The proof is based on a steepest descent analysis of a 4 x 4 matrix valued Riemann-Hilbert problem that characterizes the correlation kernel for the eigenvalues of M_1. Our results generalize earlier results for the case alpha=0, where the external field on the third measure was not present.
△ Less
Submitted 20 October, 2010;
originally announced October 2010.
-
Towards Finding the Critical Value for Kalman Filtering with Intermittent Observations
Authors:
Yilin Mo,
Bruno Sinopoli
Abstract:
In [1], Sinopoli et al. analyze the problem of optimal estimation for linear Gaussian systems where packets containing observations are dropped according to an i.i.d. Bernoulli process, modeling a memoryless erasure channel. In this case the authors show that the Kalman Filter is still the optimal estimator, although boundedness of the error depends directly upon the channel arrival probability, p…
▽ More
In [1], Sinopoli et al. analyze the problem of optimal estimation for linear Gaussian systems where packets containing observations are dropped according to an i.i.d. Bernoulli process, modeling a memoryless erasure channel. In this case the authors show that the Kalman Filter is still the optimal estimator, although boundedness of the error depends directly upon the channel arrival probability, p. In particular they also prove the existence of a critical value, pc, for such probability, below which the Kalman filter will diverge. The authors are not able to compute the actual value of this critical probability for general linear systems, but provide upper and lower bounds. They are able to show that for special cases, i.e. C invertible, such critical value coincides with the lower bound. This paper computes the value of the critical arrival probability, under minimally restrictive conditions on the matrices A and C.
△ Less
Submitted 13 May, 2010;
originally announced May 2010.
-
The global parametrix in the Riemann-Hilbert steepest descent analysis for orthogonal polynomials
Authors:
Arno Kuijlaars,
Man Yue Mo
Abstract:
In the application of the Deift-Zhou steepest descent method to the Riemann-Hilbert problem for orthogonal polynomials, a model Riemann-Hilbert problem that appears in the multi-cut case is solved with the use of hyperelliptic theta functions. We present here an alternative approach which uses meromorphic differentials instead of theta functions to construct the solution of the model Riemann-Hilbe…
▽ More
In the application of the Deift-Zhou steepest descent method to the Riemann-Hilbert problem for orthogonal polynomials, a model Riemann-Hilbert problem that appears in the multi-cut case is solved with the use of hyperelliptic theta functions. We present here an alternative approach which uses meromorphic differentials instead of theta functions to construct the solution of the model Riemann-Hilbert problem.
△ Less
Submitted 28 July, 2010; v1 submitted 30 September, 2009;
originally announced September 2009.
-
Universality in Complex Wishart ensembles: The 1 cut case
Authors:
M. Y. Mo
Abstract:
We studied universality of Wishart ensembles whose covariance matrix has 2 distinct eigenvalues and the number of each of these eigenvalue goes to infinity in the asymptotic limit. In this case, the limiting eigenvalue distribution can be supported on 1 or 2 disjoint intervals. In our previous work the case when the support consists of 2 intervals was studied. This paper complements our previous…
▽ More
We studied universality of Wishart ensembles whose covariance matrix has 2 distinct eigenvalues and the number of each of these eigenvalue goes to infinity in the asymptotic limit. In this case, the limiting eigenvalue distribution can be supported on 1 or 2 disjoint intervals. In our previous work the case when the support consists of 2 intervals was studied. This paper complements our previous analysis and studied the case when the support consists of a single interval. By using Riemann-Hilbert analysis, we have shown that under proper rescaling of the eigenvalues, the limiting correlation kernel is given by the sine kernel and the Airy kernel in the bulk and the edge of the spectrum respectively. As a consequence, the behavior of the largest eigenvalue in this model is described by the Tracy-Widom distribution.
△ Less
Submitted 15 December, 2008;
originally announced December 2008.
-
Universality in Complex Wishart ensembles: The 2 cut case
Authors:
M. Y. Mo
Abstract:
We studied the universality of Wishart ensembles whose covariance matrix has 2 distinct eigenvalues. We studied the asymptotic limit when the number of both eigenvalues goes to infinity and obtained universality results. In this case, the limiting eigenvalue distribution can be supported on 1 or 2 disjoint intervals. We obtained a necessary and sufficient condition on the parameters such that th…
▽ More
We studied the universality of Wishart ensembles whose covariance matrix has 2 distinct eigenvalues. We studied the asymptotic limit when the number of both eigenvalues goes to infinity and obtained universality results. In this case, the limiting eigenvalue distribution can be supported on 1 or 2 disjoint intervals. We obtained a necessary and sufficient condition on the parameters such that the limiting distribution is supported on 2 disjoint intervals and have computed the eigenvalue density in the limit. Furthermore, by using Riemann-Hilbert analysis, we have shown that under proper rescaling of the eigenvalues, the limiting correlation kernel is given by the sine kernel and the Airy kernel in the bulk and the edge of the spectrum respectively. As a consequence, the behavior of the largest eigenvalue in this model is described by the Tracy-Widom distribution.
△ Less
Submitted 26 September, 2008; v1 submitted 22 September, 2008;
originally announced September 2008.
-
Surfaces associated with theta function solutions of the periodic 2D-Toda lattice
Authors:
A. M. Grundland,
M. Y. Mo
Abstract:
The objective of this paper is to present some geometric aspects of surfaces associated with theta function solutions of the periodic 2D-Toda lattice. For this purpose we identify the $(N^2-1)$-dimensional Euclidean space with the ${\frak su}(N)$ algebra which allows us to construct the generalized Weierstrass formula for immersion for such surfaces. The elements characterizing surface like its…
▽ More
The objective of this paper is to present some geometric aspects of surfaces associated with theta function solutions of the periodic 2D-Toda lattice. For this purpose we identify the $(N^2-1)$-dimensional Euclidean space with the ${\frak su}(N)$ algebra which allows us to construct the generalized Weierstrass formula for immersion for such surfaces. The elements characterizing surface like its moving frame, the Gauss-Weingarten and the Gauss-Codazzi-Ricci equations, the Gaussian curvature, the mean curvature vector and the Wilmore functional of a surface are expressed explicitly in terms of any theta function solution of the Toda lattice model. We have shown that these surfaces are all mapped into subsets of a hypersphere in $\mathbb{R}^{N^2-1}$. A detailed implementations of the obtained results are presented for surfaces immersed in the ${\frak su}(2)$ algebra and we show that different Toda lattice data correspond to different subsets of a sphere in $\mathbb{R}^3$.
△ Less
Submitted 2 May, 2006;
originally announced May 2006.