-
Voting on Cyclic Orders, Group Theory, and Ballots
Authors:
Karl-Dieter Crisman,
Abraham Holleran,
Micah Martin,
Josephine Noonan
Abstract:
A cyclic order may be thought of informally as a way to seat people around a table, perhaps for a game of chance or for dinner. Given a set of agents such as $\{A,B,C\}$, we can formalize this by defining a cyclic order as a permutation or linear order on this finite set, under the equivalence relation where $A\succ B\succ C$ is identified with both $B\succ C\succ A$ and $C\succ A\succ B$. As with…
▽ More
A cyclic order may be thought of informally as a way to seat people around a table, perhaps for a game of chance or for dinner. Given a set of agents such as $\{A,B,C\}$, we can formalize this by defining a cyclic order as a permutation or linear order on this finite set, under the equivalence relation where $A\succ B\succ C$ is identified with both $B\succ C\succ A$ and $C\succ A\succ B$. As with other collections of sets with some structure, we might want to aggregate preferences of a (possibly different) set of voters on the set of possible ways to choose a cyclic order.
However, given the combinatorial explosion of the number of full rankings of cyclic orders, one may not wish to use the usual voting machinery. This raises the question of what sort of ballots may be appropriate; a single cyclic order, a set of them, or some other ballot type? Further, there is a natural action of the group of permutations on the set of agents. A reasonable requirement for a choice procedure would be to respect this symmetry (the equivalent of neutrality in normal voting theory).
In this paper we will exploit the representation theory of the symmetric group to analyze several natural types of ballots for voting on cyclic orders, and points-based procedures using such ballots. We provide a full characterization of such procedures for two quite different ballot types for $n=4$, along with the most important observations for $n=5$.
△ Less
Submitted 8 November, 2022;
originally announced November 2022.
-
Covering of high-dimensional sets
Authors:
Anatoly Zhigljavsky,
Jack Noonan
Abstract:
Let $(\mathcal{X},ρ)$ be a metric space and $λ$ be a Borel measure on this space defined on the $σ$-algebra generated by open subsets of $\mathcal{X}$; this measure $λ$ defines volumes of Borel subsets of $\mathcal{X}$. The principal case is where $\mathcal{X} = \mathbb{R}^d$, $ρ$ is the Euclidean metric, and $λ$ is the Lebesgue measure. In this article, we are not going to pay much attention to t…
▽ More
Let $(\mathcal{X},ρ)$ be a metric space and $λ$ be a Borel measure on this space defined on the $σ$-algebra generated by open subsets of $\mathcal{X}$; this measure $λ$ defines volumes of Borel subsets of $\mathcal{X}$. The principal case is where $\mathcal{X} = \mathbb{R}^d$, $ρ$ is the Euclidean metric, and $λ$ is the Lebesgue measure. In this article, we are not going to pay much attention to the case of small dimensions $d$ as the problem of construction of good covering schemes for small $d$ can be attacked by the brute-force optimization algorithms. On the contrary, for medium or large dimensions (say, $d\geq 10$), there is little chance of getting anything sensible without understanding the main issues related to construction of efficient covering designs.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Improving exploration strategies in large dimensions and rate of convergence of global random search algorithms
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
We consider global optimization problems, where the feasible region $\X$ is a compact subset of $\mathbb{R}^d$ with $d \geq 10$. For these problems, we demonstrate the following. First: the actual convergence of global random search algorithms is much slower than that given by the classical estimates, based on the asymptotic properties of random points. Second: the usually recommended space explor…
▽ More
We consider global optimization problems, where the feasible region $\X$ is a compact subset of $\mathbb{R}^d$ with $d \geq 10$. For these problems, we demonstrate the following. First: the actual convergence of global random search algorithms is much slower than that given by the classical estimates, based on the asymptotic properties of random points. Second: the usually recommended space exploration schemes are inefficient in the non-asymptotic regime. Specifically, (a) uniform sampling on entire~$\X$ is much less efficient than uniform sampling on a suitable subset of $\X$, and (b) the effect of replacement of random points by low-discrepancy sequences is negligible.
△ Less
Submitted 24 February, 2023; v1 submitted 24 August, 2022;
originally announced August 2022.
-
Online change-point detection for a transient change
Authors:
Jack Noonan
Abstract:
We consider a popular online change-point problem of detecting a transient change in distributions of i.i.d. random variables. For this change-point problem, several change-point procedures are formulated and some advanced results for a particular procedure are surveyed. Some new approximations for the average run length to false alarm are offered and the power of these procedures for detecting a…
▽ More
We consider a popular online change-point problem of detecting a transient change in distributions of i.i.d. random variables. For this change-point problem, several change-point procedures are formulated and some advanced results for a particular procedure are surveyed. Some new approximations for the average run length to false alarm are offered and the power of these procedures for detecting a transient change in mean of a sequence of normal random variables is compared.
△ Less
Submitted 6 April, 2021;
originally announced April 2021.
-
Random and quasi-random designs in group testing
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
For large classes of group testing problems, we derive lower bounds for the probability that all significant items are uniquely identified using specially constructed random designs. These bounds allow us to optimize parameters of the randomization schemes. We also suggest and numerically justify a procedure of constructing designs with better separability properties than pure random designs. We i…
▽ More
For large classes of group testing problems, we derive lower bounds for the probability that all significant items are uniquely identified using specially constructed random designs. These bounds allow us to optimize parameters of the randomization schemes. We also suggest and numerically justify a procedure of constructing designs with better separability properties than pure random designs. We illustrate theoretical considerations with a large simulation-based study. This study indicates, in particular, that in the case of the common binary group testing, the suggested families of designs have better separability than the popular designs constructed from disjunct matrices. We also derive several asymptotic expansions and discuss the situations when the resulting approximations achieve high accuracy.
△ Less
Submitted 16 February, 2022; v1 submitted 15 January, 2021;
originally announced January 2021.
-
Non-lattice covering and quanitization of high dimensional sets
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
The main problem considered in this paper is construction and theoretical study of efficient $n$-point coverings of a $d$-dimensional cube $[-1,1]^d$. Targeted values of $d$ are between 5 and 50; $n$ can be in hundreds or thousands and the designs (collections of points) are nested. This paper is a continuation of our paper \cite{us}, where we have theoretically investigated several simple schemes…
▽ More
The main problem considered in this paper is construction and theoretical study of efficient $n$-point coverings of a $d$-dimensional cube $[-1,1]^d$. Targeted values of $d$ are between 5 and 50; $n$ can be in hundreds or thousands and the designs (collections of points) are nested. This paper is a continuation of our paper \cite{us}, where we have theoretically investigated several simple schemes and numerically studied many more. In this paper, we extend the theoretical constructions of \cite{us} for studying the designs which were found to be superior to the ones theoretically investigated in \cite{us}. We also extend our constructions for new construction schemes which provide even better coverings (in the class of nested designs) than the ones numerically found in \cite{us}. In view of a close connection of the problem of quantization to the problem of covering, we extend our theoretical approximations and practical recommendations to the problem of construction of efficient quantization designs in a cube $[-1,1]^d$. In the last section, we discuss the problems of covering and quantization in a $d$-dimensional simplex; practical significance of this problem has been communicated to the authors by Professor Michael Vrahatis, a co-editor of the present volume.
△ Less
Submitted 4 June, 2020;
originally announced June 2020.
-
Efficient quantization and weak covering of high dimensional cubes
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
Let $\mathbb{Z}_n = \{Z_1, \ldots, Z_n\}$ be a design; that is, a collection of $n$ points $Z_j \in [-1,1]^d$. We study the quality of quantization of $[-1,1]^d$ by the points of $\mathbb{Z}_n$ and the problem of quality of coverage of $[-1,1]^d$ by ${\cal B}_d(\mathbb{Z}_n,r)$, the union of balls centred at $Z_j \in \mathbb{Z}_n$. We concentrate on the cases where the dimension $d$ is not small (…
▽ More
Let $\mathbb{Z}_n = \{Z_1, \ldots, Z_n\}$ be a design; that is, a collection of $n$ points $Z_j \in [-1,1]^d$. We study the quality of quantization of $[-1,1]^d$ by the points of $\mathbb{Z}_n$ and the problem of quality of coverage of $[-1,1]^d$ by ${\cal B}_d(\mathbb{Z}_n,r)$, the union of balls centred at $Z_j \in \mathbb{Z}_n$. We concentrate on the cases where the dimension $d$ is not small ($d\geq 5$) and $n$ is not too large, $n \leq 2^d$. We define the design ${\mathbb{D}_{n,δ}}$ as a $2^{d-1}$ design defined on vertices of the cube $[-δ,δ]^d$, $0\leq δ\leq 1$. For this design, we derive a closed-form expression for the quantization error and very accurate approximations for {the coverage area} vol$([-1,1]^d \cap {\cal B}_d(\mathbb{Z}_n,r))$. We provide results of a large-scale numerical investigation confirming the accuracy of the developed approximations and the efficiency of the designs ${\mathbb{D}_{n,δ}}$.
△ Less
Submitted 16 February, 2022; v1 submitted 16 May, 2020;
originally announced May 2020.
-
Covering of high-dimensional cubes and quantization
Authors:
Anatoly Zhigljavsky,
Jack Noonan
Abstract:
As the main problem, we consider covering of a $d$-dimensional cube by $n$ balls with reasonably large $d$ (10 or more) and reasonably small $n$, like $n=100$ or $n=1000$. We do not require the full coverage but only 90\% or 95\% coverage. We establish that efficient covering schemes have several important properties which are not seen in small dimensions and in asymptotical considerations, for ve…
▽ More
As the main problem, we consider covering of a $d$-dimensional cube by $n$ balls with reasonably large $d$ (10 or more) and reasonably small $n$, like $n=100$ or $n=1000$. We do not require the full coverage but only 90\% or 95\% coverage. We establish that efficient covering schemes have several important properties which are not seen in small dimensions and in asymptotical considerations, for very large $n$. One of these properties can be termed `do not try to cover the vertices' as the vertices of the cube and their close neighbourhoods are very hard to cover and for large $d$ there are far too many of them. We clearly demonstrate that, contrary to a common belief, placing balls at points which form a low-discrepancy sequence in the cube, makes for a very inefficient covering scheme. For a family of random coverings, we are able to provide very accurate approximations to the coverage probability. We then extend our results to the problems of coverage of a cube by smaller cubes and quantization, the latter being also referred to as facility location. Along with theoretical considerations and derivation of approximations, we discuss results of a large-scale numerical investigation.
△ Less
Submitted 14 February, 2020;
originally announced February 2020.
-
Approximations for the boundary crossing probabilities of moving sums of random variables
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
In this paper we study approximations for the boundary crossing probabilities of moving sums of i.i.d. normal r.v. We approximate a discrete time problem with a continuous time problem allowing us to apply established theory for stationary Gaussian processes. By then subsequently correcting approximations for discrete time, we show that the developed approximations are very accurate even for small…
▽ More
In this paper we study approximations for the boundary crossing probabilities of moving sums of i.i.d. normal r.v. We approximate a discrete time problem with a continuous time problem allowing us to apply established theory for stationary Gaussian processes. By then subsequently correcting approximations for discrete time, we show that the developed approximations are very accurate even for small window length. Also, they have high accuracy when the original r.v. are not exactly normal and when the weights in the moving window are not all equal. We then provide accurate and simple approximations for ARL, the average run length until crossing the boundary.
△ Less
Submitted 3 January, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.
-
First passage time for Slepian process with linear barrier
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
In this paper we extend results of L.A. Shepp by finding explicit formulas for the first passage probability $F_{a,b}(T\, |\, x)={\rm Pr}(S(t)<a+bt \text{ for all } t\in[0,T]\,\, | \,\,S(0)=x)$, for all $T>0$, where $S(t)$ is a Gaussian process with mean 0 and covariance $\mathbb{E} S(t)S(t')=\max\{0,1-|t-t'|\}\,.$ We then extend the results to the case of piecewise-linear barriers and outline app…
▽ More
In this paper we extend results of L.A. Shepp by finding explicit formulas for the first passage probability $F_{a,b}(T\, |\, x)={\rm Pr}(S(t)<a+bt \text{ for all } t\in[0,T]\,\, | \,\,S(0)=x)$, for all $T>0$, where $S(t)$ is a Gaussian process with mean 0 and covariance $\mathbb{E} S(t)S(t')=\max\{0,1-|t-t'|\}\,.$ We then extend the results to the case of piecewise-linear barriers and outline applications to change-point detection problems. Previously, explicit formulas for $F_{a,b}(T\, |\, x)$ were known only for the cases $b=0$ (constant barrier) or $T\leq 1$ (short interval).
△ Less
Submitted 14 April, 2019;
originally announced April 2019.
-
Approximating Shepp's constants for the Slepian process
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
Slepian process $S(t)$ is a stationary Gaussian process with zero mean and covariance $ E S(t)S(t')=\max\{0,1-|t-t'|\}\, . $ For any $T>0$ and $h>0$, define $F_T(h ) = {\rm Pr}\left\{\max_{t \in [0,T]} S(t) < h \right\} $ and the constants $Λ(h) = -\lim_{T \to \infty} \frac1T \log F_T(h)$ and $λ(h)=\exp\{-Λ(h) \}$; we will call them `Shepp's constants'. The aim of the paper is construction of accu…
▽ More
Slepian process $S(t)$ is a stationary Gaussian process with zero mean and covariance $ E S(t)S(t')=\max\{0,1-|t-t'|\}\, . $ For any $T>0$ and $h>0$, define $F_T(h ) = {\rm Pr}\left\{\max_{t \in [0,T]} S(t) < h \right\} $ and the constants $Λ(h) = -\lim_{T \to \infty} \frac1T \log F_T(h)$ and $λ(h)=\exp\{-Λ(h) \}$; we will call them `Shepp's constants'. The aim of the paper is construction of accurate approximations for $F_T(h)$ and hence for the Shepp's constants. We demonstrate that at least some of the approximations are extremely accurate.
△ Less
Submitted 16 April, 2019; v1 submitted 28 December, 2018;
originally announced December 2018.
-
Approximations for the boundary crossing probabilities of moving sums of normal random variables
Authors:
Jack Noonan,
Anatoly Zhigljavsky
Abstract:
In this paper we study approximations for boundary crossing probabilities for the moving sums of i.i.d. normal random variables. We propose approximating a discrete time problem with a continuous time problem allowing us to apply developed theory for stationary Gaussian processes and to consider a number of approximations (some well known and some not). We bring particular attention to the strong…
▽ More
In this paper we study approximations for boundary crossing probabilities for the moving sums of i.i.d. normal random variables. We propose approximating a discrete time problem with a continuous time problem allowing us to apply developed theory for stationary Gaussian processes and to consider a number of approximations (some well known and some not). We bring particular attention to the strong performance of a newly developed approximation that corrects the use of continuous time results in a discrete time setting. Results of extensive numerical comparisons are reported. These results show that the developed approximation is very accurate even for small window length.
△ Less
Submitted 27 April, 2019; v1 submitted 22 October, 2018;
originally announced October 2018.
-
The Enumeration of Permutations With a Prescribed Number of ``Forbidden'' Patterns
Authors:
John Noonan,
Doron Zeilberger
Abstract:
We initiate a general approach for the fast enumeration of permutations with a prescribed number of occurrences of `forbidden' patterns, that seems to indicate that the enumerating sequence is always P-recursive. We illustrate the method completely in terms of the patterns `abc',`cab' and `abcd'.
We initiate a general approach for the fast enumeration of permutations with a prescribed number of occurrences of `forbidden' patterns, that seems to indicate that the enumerating sequence is always P-recursive. We illustrate the method completely in terms of the patterns `abc',`cab' and `abcd'.
△ Less
Submitted 17 August, 1998;
originally announced August 1998.
-
The Goulden-Jackson Cluster Method: Extensions, Applications and Implementations
Authors:
John Noonan,
Doron Zeilberger
Abstract:
The powerful (and so far under-utilized) Goulden-Jackson Cluster method for finding the generating function for the number of words avoiding, as factors, the members of a prescribed set of `dirty words', is tutorialized and extended in various directions. The authors' Maple implementations, contained in several Maple packages available from this paper's website (http://www.math.temple.edu/~zeilb…
▽ More
The powerful (and so far under-utilized) Goulden-Jackson Cluster method for finding the generating function for the number of words avoiding, as factors, the members of a prescribed set of `dirty words', is tutorialized and extended in various directions. The authors' Maple implementations, contained in several Maple packages available from this paper's website (http://www.math.temple.edu/~zeilberg/gj.html), are described and explained.
△ Less
Submitted 8 June, 1998;
originally announced June 1998.