-
On Sierpiński and Riesel Repdigits and Repintegers
Authors:
Chris Bispels,
Matthew Cohen,
Joshua Harrington,
Kaelyn Pontes,
Leif Schaumann,
Tony W. H. Wong
Abstract:
For positive integers $b\geq 2$, $k<b$, and $t$, we say that an integer $k_b^{(t)}$ is a $b$-repdigit if $k_b^{(t)}$ can be expressed as the digit $k$ repeated $t$ times in base-$b$ representation, i.e., $k_b^{(t)} =k(b^t-1)/(b-1)$. In the case of $k=1$, we say that $1_b^{(t)}$ is a $b$-repunit. In this article, we investigate the existsence of $b$-repdigits and $b$-repunits among the sets of Sier…
▽ More
For positive integers $b\geq 2$, $k<b$, and $t$, we say that an integer $k_b^{(t)}$ is a $b$-repdigit if $k_b^{(t)}$ can be expressed as the digit $k$ repeated $t$ times in base-$b$ representation, i.e., $k_b^{(t)} =k(b^t-1)/(b-1)$. In the case of $k=1$, we say that $1_b^{(t)}$ is a $b$-repunit. In this article, we investigate the existsence of $b$-repdigits and $b$-repunits among the sets of Sierpiński numbers and Riesel numbers. A Sierpiński number is defined as an odd integer $k$ for which $k\cdot 2^n+1$ is composite for all positive integers $n$ and Riesel numbers are similarly defined for the expression $k\cdot 2^n-1$.
△ Less
Submitted 1 May, 2025;
originally announced May 2025.
-
Sharp bounds for product and sum throttling numbers
Authors:
Ryan Blair,
Gabriel Elvin,
Veronika Furst,
Leslie Hogben,
Nandita Sahajpal,
Tony W. H. Wong
Abstract:
Throttling in graphs optimizes a sum or product of resources used, such as the number of vertices in an initial set, and time required, such as the propagation time, to complete a given task. We introduce a new technique to establish sharp upper bounds in terms of graph order for sum throttling and initial cost product throttling for power domination. Furthermore, we establish sharp bounds on poss…
▽ More
Throttling in graphs optimizes a sum or product of resources used, such as the number of vertices in an initial set, and time required, such as the propagation time, to complete a given task. We introduce a new technique to establish sharp upper bounds in terms of graph order for sum throttling and initial cost product throttling for power domination. Furthermore, we establish sharp bounds on possible changes of the product throttling number, both with and without initial cost, caused by certain graph operations for standard zero forcing, positive semidefinite forcing, and power domination.
△ Less
Submitted 13 January, 2025; v1 submitted 6 January, 2025;
originally announced January 2025.
-
Bounds on the mosaic number of Legendrian Knots
Authors:
Margaret Kipe,
Samantha Pezzimenti,
Leif Schaumann,
Luc Ta,
Wing Hong Tony Wong
Abstract:
Mosaic tiles were first introduced by Lomonaco and Kauffman in 2008 to describe quantum knots, and have since been studied for their own right. Using a modified set of tiles, front projections of Legendrian knots can be built from mosaics as well. In this work, we compute lower bounds on the mosaic number of Legendrian knots in terms of their classical invariants. We also provide a class of exampl…
▽ More
Mosaic tiles were first introduced by Lomonaco and Kauffman in 2008 to describe quantum knots, and have since been studied for their own right. Using a modified set of tiles, front projections of Legendrian knots can be built from mosaics as well. In this work, we compute lower bounds on the mosaic number of Legendrian knots in terms of their classical invariants. We also provide a class of examples that imply sharpness of these bounds in certain cases. An additional construction of Legendrian unknots provides an upper bound on the mosaic number of Legendrian unknots. We also adapt a result of Oh, Hong, Lee, and Lee to give an algorithm to compute the number of Legendrian link mosaics of any given size. Finally, we use a computer search to provide an updated census of known mosaic numbers for Legendrian knots, including all Legendrian knots whose mosaic number is 6 or less.
△ Less
Submitted 10 October, 2024;
originally announced October 2024.
-
A Fine-grained Analysis of Fitted Q-evaluation: Beyond Parametric Models
Authors:
Jiayi Wang,
Zhengling Qi,
Raymond K. W. Wong
Abstract:
In this paper, we delve into the statistical analysis of the fitted Q-evaluation (FQE) method, which focuses on estimating the value of a target policy using offline data generated by some behavior policy. We provide a comprehensive theoretical understanding of FQE estimators under both parameteric and nonparametric models on the $Q$-function. Specifically, we address three key questions related t…
▽ More
In this paper, we delve into the statistical analysis of the fitted Q-evaluation (FQE) method, which focuses on estimating the value of a target policy using offline data generated by some behavior policy. We provide a comprehensive theoretical understanding of FQE estimators under both parameteric and nonparametric models on the $Q$-function. Specifically, we address three key questions related to FQE that remain largely unexplored in the current literature: (1) Is the optimal convergence rate for estimating the policy value regarding the sample size $n$ ($n^{-1/2}$) achievable for FQE under a non-parametric model with a fixed horizon ($T$)? (2) How does the error bound depend on the horizon $T$? (3) What is the role of the probability ratio function in improving the convergence of FQE estimators? Specifically, we show that under the completeness assumption of $Q$-functions, which is mild in the non-parametric setting, the estimation errors for policy value using both parametric and non-parametric FQE estimators can achieve an optimal rate in terms of $n$. The corresponding error bounds in terms of both $n$ and $T$ are also established. With an additional realizability assumption on ratio functions, the rate of estimation errors can be improved from $T^{1.5}/\sqrt{n}$ to $T/\sqrt{n}$, which matches the sharpest known bound in the current literature under the tabular setting.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Tournament completions of bipartite tournaments and their augmented directed cycles
Authors:
H. W. Willie Wong
Abstract:
A tournament $T$ is a tournament completion of a bipartite tournament $D$ if $D$ is a spanning subdigraph of $T$, i.e., $V(D)=V(T)$ and $A(D)\subseteq A(T)$. If $C$ is a $k$-dicycle (i.e., directed cycle of length $k$) in a tournament completion $T$ of $D$ and $C$ is not a dicycle in $D$, i.e., $A(C)\subseteq A(T)$ and $A(C)\not\subseteq A(D)$, then we call $C$ an augmented $k$-dicycle of $T$. In…
▽ More
A tournament $T$ is a tournament completion of a bipartite tournament $D$ if $D$ is a spanning subdigraph of $T$, i.e., $V(D)=V(T)$ and $A(D)\subseteq A(T)$. If $C$ is a $k$-dicycle (i.e., directed cycle of length $k$) in a tournament completion $T$ of $D$ and $C$ is not a dicycle in $D$, i.e., $A(C)\subseteq A(T)$ and $A(C)\not\subseteq A(D)$, then we call $C$ an augmented $k$-dicycle of $T$. In this paper, we investigate the families of bipartite tournaments for which there exists a tournament completion with exactly one augmented $3$-dicycle and with no augmented $4$-dicycles. Our investigation may be viewed as a variant of the orientation completion problem initiated by Bang-Jensen et al..
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Paired $(n-1)$-to-$(n-1)$ disjoint path covers in bipartite transposition-like graphs
Authors:
Anna Coleman,
Gabrielle Fischberg,
Charles Gong,
Joshua Harrington,
Tony W. H. Wong
Abstract:
A paired $k$-to-$k$ disjoint path cover of a graph $G$ is a collection of pairwise disjoint path subgraphs $P_1,P_2,\dotsc,P_k$ such that each $P_i$ has prescribed vertices $s_i$ and $t_i$ as endpoints and the union of $P_1,P_2,\dotsc,P_k$ contains all vertices of $G$. In this paper, we introduce bipartite transposition-like graphs, which are inductively constructed from lower ranked bipartite tra…
▽ More
A paired $k$-to-$k$ disjoint path cover of a graph $G$ is a collection of pairwise disjoint path subgraphs $P_1,P_2,\dotsc,P_k$ such that each $P_i$ has prescribed vertices $s_i$ and $t_i$ as endpoints and the union of $P_1,P_2,\dotsc,P_k$ contains all vertices of $G$. In this paper, we introduce bipartite transposition-like graphs, which are inductively constructed from lower ranked bipartite transposition-like graphs. We show that every rank $n$ bipartite transposition-like graph $G$ admit a paired $(n-1)$-to-$(n-1)$ disjoint path cover for all choices of $S=\{s_1,s_2,\dotsc,s_{n-1}\}$ and $T=\{t_1,t_2,\dotsc,t_{n-1}\}$, provided that $S$ is in one partite set of $G$ and $T$ is in the other.
△ Less
Submitted 17 February, 2024;
originally announced February 2024.
-
Flexible Functional Treatment Effect Estimation
Authors:
Jiayi Wang,
Raymond K. W. Wong,
Xiaoke Zhang,
Kwun Chuen Gary Chan
Abstract:
We study treatment effect estimation with functional treatments where the average potential outcome functional is a function of functions, in contrast to continuous treatment effect estimation where the target is a function of real numbers. By considering a flexible scalar-on-function marginal structural model, a weight-modified kernel ridge regression (WMKRR) is adopted for estimation. The weight…
▽ More
We study treatment effect estimation with functional treatments where the average potential outcome functional is a function of functions, in contrast to continuous treatment effect estimation where the target is a function of real numbers. By considering a flexible scalar-on-function marginal structural model, a weight-modified kernel ridge regression (WMKRR) is adopted for estimation. The weights are constructed by directly minimizing the uniform balancing error resulting from a decomposition of the WMKRR estimator, instead of being estimated under a particular treatment selection model. Despite the complex structure of the uniform balancing error derived under WMKRR, finite-dimensional convex algorithms can be applied to efficiently solve for the proposed weights thanks to a representer theorem. The optimal convergence rate is shown to be attainable by the proposed WMKRR estimator without any smoothness assumption on the true weight function. Corresponding empirical performance is demonstrated by a simulation study and a real data application.
△ Less
Submitted 12 November, 2024; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Arithmetic progressions of integers that are relatively prime to their digital sums
Authors:
Ryan Blau,
Joshua Harrington,
Sarah Lohrey,
Eliel Sosis,
Tony W. H. Wong
Abstract:
For an integer $b\geq 2$, we call a positive integer $b$-anti-Niven if it is relatively prime to the sum of the digits in its base-$b$ representation. In this article, we investigate the maximum lengths of arithmetic progressions of $b$-anti-Niven numbers.
For an integer $b\geq 2$, we call a positive integer $b$-anti-Niven if it is relatively prime to the sum of the digits in its base-$b$ representation. In this article, we investigate the maximum lengths of arithmetic progressions of $b$-anti-Niven numbers.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Criteria for stabilizing a multi-delay stochastic system with multiplicative control-dependent noises
Authors:
Cheng Tan,
Zhengqiang Zhang,
Haoting Sui,
Wing Shing Wong
Abstract:
In this paper, we investigate the mean-square stabilization for discrete-time stochastic systems that endure both multiple input delays and multiplicative control-dependent noises. For such multi-delay stochastic systems, we for the first time put forward two stabilization criteria: Riccati type and Lyapunov type. On the one hand, we adopt a reduction method to reformulate the original multi-delay…
▽ More
In this paper, we investigate the mean-square stabilization for discrete-time stochastic systems that endure both multiple input delays and multiplicative control-dependent noises. For such multi-delay stochastic systems, we for the first time put forward two stabilization criteria: Riccati type and Lyapunov type. On the one hand, we adopt a reduction method to reformulate the original multi-delay stochastic system to a delay-free auxiliary system and present their equivalent proposition for stabilization. Then, by introducing a delay-dependent algebraic Riccati equation (DDARE), we prove that the system under consideration is stabilizable if and only if the developed DDARE has a unique positive definite solution. On the other hand, we characterize the delay-dependent Lyapunov equation (DDLE)-based criterion, which can be verified by linear matrix inequality (LMI) feasibility test. Besides, under some restricted structure, we propose an existence theorem of delay margin and more importantly, derive an explicit formula for computing its exact value.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Every arithmetic progression contains infinitely many $b$-Niven numbers
Authors:
Joshua Harrington,
Matthew Litman,
Tony W. H. Wong
Abstract:
For an integer $b\geq 2$, a positive integer is called a $b$-Niven number if it is a multiple of the sum of the digits in its base-$b$ representation. In this article, we show that every arithmetic progression contains infinitely many $b$-Niven numbers.
For an integer $b\geq 2$, a positive integer is called a $b$-Niven number if it is a multiple of the sum of the digits in its base-$b$ representation. In this article, we show that every arithmetic progression contains infinitely many $b$-Niven numbers.
△ Less
Submitted 11 March, 2023;
originally announced March 2023.
-
Beyond NaN: Resiliency of Optimization Layers in The Face of Infeasibility
Authors:
Wai Tuck Wong,
Sarah Kinsey,
Ramesha Karunasena,
Thanh Nguyen,
Arunesh Sinha
Abstract:
Prior work has successfully incorporated optimization layers as the last layer in neural networks for various problems, thereby allowing joint learning and planning in one neural network forward pass. In this work, we identify a weakness in such a set-up where inputs to the optimization layer lead to undefined output of the neural network. Such undefined decision outputs can lead to possible catas…
▽ More
Prior work has successfully incorporated optimization layers as the last layer in neural networks for various problems, thereby allowing joint learning and planning in one neural network forward pass. In this work, we identify a weakness in such a set-up where inputs to the optimization layer lead to undefined output of the neural network. Such undefined decision outputs can lead to possible catastrophic outcomes in critical real time applications. We show that an adversary can cause such failures by forcing rank deficiency on the matrix fed to the optimization layer which results in the optimization failing to produce a solution. We provide a defense for the failure cases by controlling the condition number of the input matrix. We study the problem in the settings of synthetic data, Jigsaw Sudoku, and in speed planning for autonomous driving, building on top of prior frameworks in end-to-end learning and optimization. We show that our proposed defense effectively prevents the framework from failing with undefined output. Finally, we surface a number of edge cases which lead to serious bugs in popular equation and optimization solvers which can be abused as well.
△ Less
Submitted 4 February, 2023; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Probabilistic chip-collecting games with modulo winning conditions
Authors:
Joshua Harrington,
Xuwen Hua,
Xufei Liu,
Alex Nash,
Rodrigo Rios,
Tony W. H. Wong
Abstract:
Let $a$, $b$, and $n$ be integers with $0<a<b<n$. In a certain two-player probabilistic chip-collecting game, Alice tosses a coin to determine whether she collects $a$ chips or $b$ chips. If Alice collects $a$ chips, then Bob collects $b$ chips, and vice versa. A player is announced the winner when they have accumulated a number of chips that is a multiple of $n$. In this paper, we settle two conj…
▽ More
Let $a$, $b$, and $n$ be integers with $0<a<b<n$. In a certain two-player probabilistic chip-collecting game, Alice tosses a coin to determine whether she collects $a$ chips or $b$ chips. If Alice collects $a$ chips, then Bob collects $b$ chips, and vice versa. A player is announced the winner when they have accumulated a number of chips that is a multiple of $n$. In this paper, we settle two conjectures from the literature related to this game.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
Application of some techniques in Sperner Theory: Optimal orientations of vertex-multiplications of trees with diameter 4
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Koh and Tay proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. They also showed that any vertex-multiplication of a tree with diameter at least 3 does not belong to the class $\mathscr{C}_2$. Of interest, $G$ vertex-multiplications are extensions of complete $n$-partite graphs and Gutin characterised complete bip…
▽ More
Koh and Tay proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. They also showed that any vertex-multiplication of a tree with diameter at least 3 does not belong to the class $\mathscr{C}_2$. Of interest, $G$ vertex-multiplications are extensions of complete $n$-partite graphs and Gutin characterised complete bipartite graphs with an ingenious use of Sperner's Theorem. In this paper, we investigate vertex-multiplications of trees with diameter $4$ in $\mathscr{C}_0$ (or $\mathscr{C}_1$) and exhibit its intricate connections with problems in Sperner Theory, thereby extending Gutin's approach. Let $s$ denote the vertex-multiplication of the central vertex. We almost completely characterise the case of even $s$ and give a complete characterisation for the case of odd $s\ge 3$.
△ Less
Submitted 11 March, 2023; v1 submitted 17 October, 2021;
originally announced October 2021.
-
Arc reversals of cycles in orientations of $G$ vertex-multiplications
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Ryser proved that any two tournaments with the same score sequence are $C_3$-equivalent while Beineke and Moon proved the $C_4$-equivalence for any two bipartite tournaments with the same score lists. In this paper, we extend these results to orientations of $G$ vertex-multiplications. We focus on two main areas, namely orientations with the same score list and with score-list parity. Our main too…
▽ More
Ryser proved that any two tournaments with the same score sequence are $C_3$-equivalent while Beineke and Moon proved the $C_4$-equivalence for any two bipartite tournaments with the same score lists. In this paper, we extend these results to orientations of $G$ vertex-multiplications. We focus on two main areas, namely orientations with the same score list and with score-list parity. Our main tools are extensions of the refinement technique, directed difference graph and a reduction lemma.
△ Less
Submitted 28 August, 2021;
originally announced August 2021.
-
Matrix Completion with Model-free Weighting
Authors:
Jiayi Wang,
Raymond K. W. Wong,
Xiaojun Mao,
Kwun Chuen Gary Chan
Abstract:
In this paper, we propose a novel method for matrix completion under general non-uniform missing structures. By controlling an upper bound of a novel balancing error, we construct weights that can actively adjust for the non-uniformity in the empirical risk without explicitly modeling the observation probabilities, and can be computed efficiently via convex optimization. The recovered matrix based…
▽ More
In this paper, we propose a novel method for matrix completion under general non-uniform missing structures. By controlling an upper bound of a novel balancing error, we construct weights that can actively adjust for the non-uniformity in the empirical risk without explicitly modeling the observation probabilities, and can be computed efficiently via convex optimization. The recovered matrix based on the proposed weighted empirical risk enjoys appealing theoretical guarantees. In particular, the proposed method achieves a stronger guarantee than existing work in terms of the scaling with respect to the observation probabilities, under asymptotically heterogeneous missing settings (where entry-wise observation probabilities can be of different orders). These settings can be regarded as a better theoretical model of missing patterns with highly varying probabilities. We also provide a new minimax lower bound under a class of heterogeneous settings. Numerical experiments are also provided to demonstrate the effectiveness of the proposed method.
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
An integral equation for the identification of causal effects in nonlinear models
Authors:
Wing Hung Wong
Abstract:
When the causal relationship between X and Y is specified by a structural equation, the causal effect of X on Y is the expected rate of change of Y with respect to changes in X, when all other variables are kept fixed. This causal effect is not identifiable from the distribution of (X,Y). We give conditions under which this causal effect is identified as the solution of an integral equation based…
▽ More
When the causal relationship between X and Y is specified by a structural equation, the causal effect of X on Y is the expected rate of change of Y with respect to changes in X, when all other variables are kept fixed. This causal effect is not identifiable from the distribution of (X,Y). We give conditions under which this causal effect is identified as the solution of an integral equation based on the distributions of (X,Z) and (Y,Z), where Z is an instrumental variable.
△ Less
Submitted 11 May, 2021;
originally announced May 2021.
-
A calculus for causal inference with instrumental variables
Authors:
Wing Hung Wong
Abstract:
Under a general structural equation framework for causal inference, we provide a definition of the causal effect of a variable X on another variable Y, and propose an approach to estimate this causal effect via the use of instrumental variables.
Under a general structural equation framework for causal inference, we provide a definition of the causal effect of a variable X on another variable Y, and propose an approach to estimate this causal effect via the use of instrumental variables.
△ Less
Submitted 23 April, 2021; v1 submitted 21 April, 2021;
originally announced April 2021.
-
Extremal Graphs for a Spectral Inequality on Edge-Disjoint Spanning Trees
Authors:
Sebastian M. Cioabă,
Anthony Ostuni,
Davin Park,
Sriya Potluri,
Tanay Wakhare,
Wiseley Wong
Abstract:
Liu, Hong, Gu, and Lai proved if the second largest eigenvalue of the adjacency matrix of graph $G$ with minimum degree $δ\ge 2m+2 \ge 4$ satisfies $λ_2(G) < δ- \frac{2m+1}{δ+1}$, then $G$ contains at least $m+1$ edge-disjoint spanning trees, which verified a generalization of a conjecture by Cioabă and Wong. We show this bound is essentially the best possible by constructing $d$-regular graphs…
▽ More
Liu, Hong, Gu, and Lai proved if the second largest eigenvalue of the adjacency matrix of graph $G$ with minimum degree $δ\ge 2m+2 \ge 4$ satisfies $λ_2(G) < δ- \frac{2m+1}{δ+1}$, then $G$ contains at least $m+1$ edge-disjoint spanning trees, which verified a generalization of a conjecture by Cioabă and Wong. We show this bound is essentially the best possible by constructing $d$-regular graphs $\mathcal{G}_{m,d}$ for all $d \ge 2m+2 \ge 4$ with at most $m$ edge-disjoint spanning trees and $λ_2(\mathcal{G}_{m,d}) < d-\frac{2m+1}{d+3}$. As a corollary, we show that a spectral inequality on graph rigidity by Cioabă, Dewar, and Gu is essentially tight.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Covering systems with odd moduli
Authors:
Joshua Harrington,
Yewen Sun,
Wing Hong Tony Wong
Abstract:
The concept of a covering system was first introduced by Erdős in 1950. Since their introduction, a lot of the research regarding covering systems has focused on the existence of covering systems with certain restrictions on the moduli. Arguably, the most famous open question regarding covering systems is the odd covering problem. In this paper, we explore a variation of the odd covering problem,…
▽ More
The concept of a covering system was first introduced by Erdős in 1950. Since their introduction, a lot of the research regarding covering systems has focused on the existence of covering systems with certain restrictions on the moduli. Arguably, the most famous open question regarding covering systems is the odd covering problem. In this paper, we explore a variation of the odd covering problem, allowing a single odd prime to appear as a modulus in the covering more than once, while all other moduli are distinct, odd, and greater than $1$. We also consider this variation while further requiring the moduli of the covering system to be square-free.
△ Less
Submitted 1 April, 2021;
originally announced April 2021.
-
Exploration Enhancement of Nature-Inspired Swarm-based Optimization Algorithms
Authors:
Kwok Pui Choi,
Enzio Hai Hong Kam,
Tze Leung Lai,
Xin T. Tong,
Weng Kee Wong
Abstract:
Nature-inspired swarm-based algorithms have been widely applied to tackle high-dimensional and complex optimization problems across many disciplines. They are general purpose optimization algorithms, easy to use and implement, flexible and assumption-free. A common drawback of these algorithms is premature convergence and the solution found is not a global optimum. We provide sufficient conditions…
▽ More
Nature-inspired swarm-based algorithms have been widely applied to tackle high-dimensional and complex optimization problems across many disciplines. They are general purpose optimization algorithms, easy to use and implement, flexible and assumption-free. A common drawback of these algorithms is premature convergence and the solution found is not a global optimum. We provide sufficient conditions for an algorithm to converge almost surely (a.s.) to a global optimum. We then propose a general, simple and effective strategy, called Perturbation-Projection (PP), to enhance an algorithm's exploration capability so that our convergence conditions are guaranteed to hold. We illustrate this approach using three widely used nature-inspired swarm-based optimization algorithms: particle swarm optimization (PSO), bat algorithm (BAT) and competitive swarm optimizer (CSO). Extensive numerical experiments show that each of the three algorithms with the enhanced PP strategy outperforms the original version in a number of notable ways.
△ Less
Submitted 20 March, 2021;
originally announced March 2021.
-
Residue sums of Dickson polynomials over finite fields
Authors:
Thomas Brazelton,
Joshua Harrington,
Matthew Litman,
Tony W. H. Wong
Abstract:
Given a polynomial with integral coefficients, one can inquire about the possible residues it can take in its image modulo a prime $p$. The sum over the distinct residues can sometimes be computed independent of the prime $p$; for example, Gauss showed that the sum over quadratic residues vanishes modulo a prime. In this paper we provide a closed form for the sum over distinct residues in the imag…
▽ More
Given a polynomial with integral coefficients, one can inquire about the possible residues it can take in its image modulo a prime $p$. The sum over the distinct residues can sometimes be computed independent of the prime $p$; for example, Gauss showed that the sum over quadratic residues vanishes modulo a prime. In this paper we provide a closed form for the sum over distinct residues in the image of Dickson polynomials of arbitrary degree over finite fields of odd characteristic, and prove a complete characterization of the size of the image set. Our result provides the first non-trivial classification of such a sum for a family of polynomials of unbounded degree.
△ Less
Submitted 10 February, 2022; v1 submitted 16 March, 2021;
originally announced March 2021.
-
The Edge-Distinguishing Chromatic Number of Petal Graphs, Chorded Cycles, and Spider Graphs
Authors:
Grant Fickes,
Wing Hong Tony Wong
Abstract:
The edge-distinguishing chromatic number (EDCN) of a graph $G$ is the minimum positive integer $k$ such that there exists a vertex coloring $c:V(G)\to\{1,2,\dotsc,k\}$ whose induced edge labels $\{c(u),c(v)\}$ are distinct for all edges $uv$. Previous work has determined the EDCN of paths, cycles, and spider graphs with three legs. In this paper, we determine the EDCN of petal graphs with two peta…
▽ More
The edge-distinguishing chromatic number (EDCN) of a graph $G$ is the minimum positive integer $k$ such that there exists a vertex coloring $c:V(G)\to\{1,2,\dotsc,k\}$ whose induced edge labels $\{c(u),c(v)\}$ are distinct for all edges $uv$. Previous work has determined the EDCN of paths, cycles, and spider graphs with three legs. In this paper, we determine the EDCN of petal graphs with two petals and a loop, cycles with one chord, and spider graphs with four legs. These are achieved by graph embedding into looped complete graphs.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
Geodesic motion on $\mathsf{SL}(n)$ with the Hilbert-Schmidt metric
Authors:
Audrey Rosevear,
Samuel Sottile,
Willie WY Wong
Abstract:
We study the geometry of geodesics on $\mathsf{SL}(n)$, equipped with the Hilbert-Schmidt metric which makes it a Riemannian manifold. These geodesics are known to be related to affine motions of incompressible ideal fluids. The $n = 2$ case is special and completely integrable, and the geodesic motion was completely described by Roberts, Shkoller, and Sideris; when $n = 3$, Sideris demonstrated s…
▽ More
We study the geometry of geodesics on $\mathsf{SL}(n)$, equipped with the Hilbert-Schmidt metric which makes it a Riemannian manifold. These geodesics are known to be related to affine motions of incompressible ideal fluids. The $n = 2$ case is special and completely integrable, and the geodesic motion was completely described by Roberts, Shkoller, and Sideris; when $n = 3$, Sideris demonstrated some interesting features of the dynamics and analyzed several classes of explicit solutions. Our analysis shows that the geodesics in higher dimensions exhibit much more complex dynamics. We generalize the Virial-identity-based criterion of unboundedness of geodesic given by Sideris, and use it to give an alternative proof of the classification of geodesics in 2D obtained by Roberts--Shkoller--Sideris. We study several explicit families of solutions in general dimensions that generalize those found by Sideris in 3D. We additionally classify all "exponential type" geodesics, and use it to demonstrate the existence of purely rotational solutions whenever $n$ is even. Finally, we study "block diagonal" solutions using a new formulation of the geodesic equation in first order form, that isolates the conserved angular momenta. This reveals the existence of a rich family of bounded geodesic motions in even dimension $n \geq 4$. This in particular allows us to conclude that the generalization of the swirling and shear flows of Sideris to even dimensions $n \geq 4$ are in fact dynamically unstable.
△ Less
Submitted 10 August, 2021; v1 submitted 22 January, 2021;
originally announced January 2021.
-
On binomial coefficients associated with Sierpiński and Riesel numbers
Authors:
Ashley Armbruster,
Grace Barger,
Sofya Bykova,
Tyler Dvorachek,
Emily Eckard,
Joshua Harrington,
Yewen Sun,
Tony W. H. Wong
Abstract:
In this paper, we investigate the existence of Sierpiński numbers and Riesel numbers as binomial coefficients. We show that for any odd positive integer $r$, there exist infinitely many Sierpiński numbers and Riesel numbers of the form $\binom{k}{r}$. Let $S(x)$ be the number of positive integers $r$ satisfying $1\leq r\leq x$ for which $\binom{k}{r}$ is a Sierpiński number for infinitely many…
▽ More
In this paper, we investigate the existence of Sierpiński numbers and Riesel numbers as binomial coefficients. We show that for any odd positive integer $r$, there exist infinitely many Sierpiński numbers and Riesel numbers of the form $\binom{k}{r}$. Let $S(x)$ be the number of positive integers $r$ satisfying $1\leq r\leq x$ for which $\binom{k}{r}$ is a Sierpiński number for infinitely many $k$. We further show that the value $S(x)/x$ gets arbitrarily close to 1 as $x$ tends to infinity. Generalizations to base $a$-Sierpiński numbers and base $a$-Riesel numbers are also considered. In particular, we prove that there exist infinitely many positive integers $r$ such that $\binom{k}{r}$ is simultaneously a base $a$-Sierpiński and base $a$-Riesel number for infinitely many $k$.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Optimal orientations of vertex-multiplications of cartesian products of graphs
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Koh and Tay proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. In this paper, we prove that vertex-multiplications of cartesian products of graphs $G\times H$ lie in $\mathscr{C}_0$ ($\mathscr{C}_0\cup \mathscr{C}_1$ resp.) if $G^{(2)}\in \mathscr{C}_0$ ($\mathscr{C}_1$ resp.), $d(G)\ge 2$ and…
▽ More
Koh and Tay proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. In this paper, we prove that vertex-multiplications of cartesian products of graphs $G\times H$ lie in $\mathscr{C}_0$ ($\mathscr{C}_0\cup \mathscr{C}_1$ resp.) if $G^{(2)}\in \mathscr{C}_0$ ($\mathscr{C}_1$ resp.), $d(G)\ge 2$ and $d(G\times H)\ge 4$. We also focus on cartesian products involving trees, paths and cycles and show that most of them lie in $\mathscr{C}_0$.
△ Less
Submitted 16 March, 2022; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Multichannel Conflict-Avoiding Codes of Weights Three and Four
Authors:
Yuan-Hsun Lo,
Kenneth W. Shum,
Wing Shing Wong,
Yijin Zhang
Abstract:
Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration,…
▽ More
Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration, no matter what the relative time offsets between the source nodes are. In this paper, we extend CACs to multichannel CACs for providing such a hard guarantee over multiple orthogonal channels. Upper bounds on the number of codewords for multichannel CACs of weights three and four are derived, and constructions that are optimal with respect to these bounds are presented.
△ Less
Submitted 20 April, 2021; v1 submitted 24 September, 2020;
originally announced September 2020.
-
Inference of dynamic systems from noisy and sparse data via manifold-constrained Gaussian processes
Authors:
Shihao Yang,
Samuel W. K. Wong,
S. C. Kou
Abstract:
Parameter estimation for nonlinear dynamic system models, represented by ordinary differential equations (ODEs), using noisy and sparse data is a vital task in many fields. We propose a fast and accurate method, MAGI (MAnifold-constrained Gaussian process Inference), for this task. MAGI uses a Gaussian process model over time-series data, explicitly conditioned on the manifold constraint that deri…
▽ More
Parameter estimation for nonlinear dynamic system models, represented by ordinary differential equations (ODEs), using noisy and sparse data is a vital task in many fields. We propose a fast and accurate method, MAGI (MAnifold-constrained Gaussian process Inference), for this task. MAGI uses a Gaussian process model over time-series data, explicitly conditioned on the manifold constraint that derivatives of the Gaussian process must satisfy the ODE system. By doing so, we completely bypass the need for numerical integration and achieve substantial savings in computational time. MAGI is also suitable for inference with unobserved system components, which often occur in real experiments. MAGI is distinct from existing approaches as we provide a principled statistical construction under a Bayesian framework, which incorporates the ODE system through the manifold constraint. We demonstrate the accuracy and speed of MAGI using realistic examples based on physical experiments.
△ Less
Submitted 21 February, 2021; v1 submitted 15 September, 2020;
originally announced September 2020.
-
On the properties of fibotomic polynomials
Authors:
Cameron Byer,
Tyler Dvorachek,
Emily Eckard,
Joshua Harrington,
Lindsey Wise,
Tony W. H. Wong
Abstract:
Define the $n$-th fibotomic polynomial to be the product of the monic irredicible factors of the $n$-th Fibonacci polynomial which are not factors of any Fibonacci polynomial of smaller degree. In this paper, we prove a number of properties of the fibotomic polynomials. This includes determining the discriminant of the fibotomic polynomials and the resultant of pairs of fibotomic polynomials. Furt…
▽ More
Define the $n$-th fibotomic polynomial to be the product of the monic irredicible factors of the $n$-th Fibonacci polynomial which are not factors of any Fibonacci polynomial of smaller degree. In this paper, we prove a number of properties of the fibotomic polynomials. This includes determining the discriminant of the fibotomic polynomials and the resultant of pairs of fibotomic polynomials. Furthermore, we completely determine the factorization form of the fibotomic polynomials in prime fields. Results are also generalized for the bivariate homogenous fibotomic polynomials.
△ Less
Submitted 7 September, 2020;
originally announced September 2020.
-
Sum index and difference index of graphs
Authors:
Joshua Harrington,
Eugene Henninger-Voss,
Kedjar Karhadkar,
Emily Robinson,
Tony W. H. Wong
Abstract:
Let $G$ be a nonempty simple graph with a vertex set $V(G)$ and an edge set $E(G)$. For every injective vertex labeling $f:V(G)\to\mathbb{Z}$, there are two induced edge labelings, namely $f^+:E(G)\to\mathbb{Z}$ defined by $f^+(uv)=f(u)+f(v)$, and $f^-:E(G)\to\mathbb{Z}$ defined by $f^-(uv)=|f(u)-f(v)|$. The sum index and the difference index are the minimum cardinalities of the ranges of $f^+$ an…
▽ More
Let $G$ be a nonempty simple graph with a vertex set $V(G)$ and an edge set $E(G)$. For every injective vertex labeling $f:V(G)\to\mathbb{Z}$, there are two induced edge labelings, namely $f^+:E(G)\to\mathbb{Z}$ defined by $f^+(uv)=f(u)+f(v)$, and $f^-:E(G)\to\mathbb{Z}$ defined by $f^-(uv)=|f(u)-f(v)|$. The sum index and the difference index are the minimum cardinalities of the ranges of $f^+$ and $f^-$, respectively. We provide upper and lower bounds on the sum index and difference index, and determine the sum index and difference index of various families of graphs. We also provide an interesting conjecture relating the sum index and the difference index of graphs.
△ Less
Submitted 14 April, 2021; v1 submitted 20 August, 2020;
originally announced August 2020.
-
The Toughness of Kneser Graphs
Authors:
Davin Park,
Anthony Ostuni,
Nathan Hayes,
Amartya Banerjee,
Tanay Wakhare,
Wiseley Wong,
Sebastian Cioabă
Abstract:
The \textit{toughness} $t(G)$ of a graph $G$ is a measure of its connectivity that is closely related to Hamiltonicity. Brouwer proved the lower bound $t(G) > \ell / λ- 2$ on the toughness of any connected $\ell$-regular graph, where $ λ$ is the largest nontrivial eigenvalue of the adjacency matrix. He conjectured that this lower bound can be improved to $\ell / λ-1$ and this conjecture is still o…
▽ More
The \textit{toughness} $t(G)$ of a graph $G$ is a measure of its connectivity that is closely related to Hamiltonicity. Brouwer proved the lower bound $t(G) > \ell / λ- 2$ on the toughness of any connected $\ell$-regular graph, where $ λ$ is the largest nontrivial eigenvalue of the adjacency matrix. He conjectured that this lower bound can be improved to $\ell / λ-1$ and this conjecture is still open. Brouwer also observed that many families of graphs (in particular, those achieving equality in the Hoffman ratio bound for the independence number) have toughness exactly $\ell / λ$. Cioabă and Wong confirmed Brouwer's observation for several families of graphs, including Kneser graphs $K(n,2)$ and their complements, with the exception of the Petersen graph $K(5,2)$. In this paper, we extend these results and determine the toughness of Kneser graphs $K(n,k)$ when $k\in \{3,4\}$ and $n\geq 2k+1$ as well as for $k\geq 5$ and sufficiently large $n$ (in terms of $k$). In all these cases, the toughness is attained by the complement of a maximum independent set and we conjecture that this is the case for any $k\geq 5$ and $n\geq 2k+1$.
△ Less
Submitted 28 June, 2021; v1 submitted 18 August, 2020;
originally announced August 2020.
-
A complete characterisation of vertex-multiplications of trees with diameter 5
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Koh and Tay introduced a new family of graphs, $G$ vertex-multiplications, as an extension of complete $n$-partite graphs. They proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. It was shown that any vertex-multiplication of a tree with diameter at least 3 does not belong to the class $\mathscr{C}_2$. Furthermor…
▽ More
Koh and Tay introduced a new family of graphs, $G$ vertex-multiplications, as an extension of complete $n$-partite graphs. They proved a fundamental classification of $G$ vertex-multiplications into three classes $\mathscr{C}_0, \mathscr{C}_1$ and $\mathscr{C}_2$. It was shown that any vertex-multiplication of a tree with diameter at least 3 does not belong to the class $\mathscr{C}_2$. Furthermore, for vertex-multiplications of trees with diameter $5$, some necessary and sufficient conditions for $\mathscr{C}_0$ were established. In this paper, we give a complete characterisation of vertex-multiplications of trees with diameter $5$ in $\mathscr{C}_0$ and $\mathscr{C}_1$.
△ Less
Submitted 13 July, 2020;
originally announced July 2020.
-
Application of Mean Curvature Flow for Surface Parametrizations
Authors:
Ka Wai Wong
Abstract:
This is an expository article describing the conformalized mean curvature flow, originally introduced by Kazhdan, Solomon, and Ben-Chen. We are interested in applying mean curvature flow to surface parametrizations. We discuss our own implementation of their algorithm and some limitations.
This is an expository article describing the conformalized mean curvature flow, originally introduced by Kazhdan, Solomon, and Ben-Chen. We are interested in applying mean curvature flow to surface parametrizations. We discuss our own implementation of their algorithm and some limitations.
△ Less
Submitted 12 June, 2020;
originally announced June 2020.
-
Perverse equivalence in $SL(2,q)$
Authors:
William Wong
Abstract:
We will be defining a type of perverse equivalence that always corresponds to a derived equivalence with two-term tilting complexes. We are going to show that the tilting considered by Okuyama and Yoshii for the proof of Broué's conjecture for $SL(2,q)$ in defining characteristic is a composition of such perverse equivalences.
We will be defining a type of perverse equivalence that always corresponds to a derived equivalence with two-term tilting complexes. We are going to show that the tilting considered by Okuyama and Yoshii for the proof of Broué's conjecture for $SL(2,q)$ in defining characteristic is a composition of such perverse equivalences.
△ Less
Submitted 1 March, 2020;
originally announced March 2020.
-
On Cross-intersecting Sperner Families
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Two sets $\mathscr{A}$ and $\mathscr{B}$ are said to be cross-intersecting if $X\cap Y\neq\emptyset$ for all $X\in\mathscr{A}$ and $Y\in\mathscr{B}$. Given two cross-intersecting Sperner families (or antichains) $\mathscr{A}$ and $\mathscr{B}$ of $\mathbb{N}_n$, we prove that $|\mathscr{A}|+|\mathscr{B}|\le 2{{n}\choose{\lceil{n/2}\rceil}}$ if $n$ is odd, and…
▽ More
Two sets $\mathscr{A}$ and $\mathscr{B}$ are said to be cross-intersecting if $X\cap Y\neq\emptyset$ for all $X\in\mathscr{A}$ and $Y\in\mathscr{B}$. Given two cross-intersecting Sperner families (or antichains) $\mathscr{A}$ and $\mathscr{B}$ of $\mathbb{N}_n$, we prove that $|\mathscr{A}|+|\mathscr{B}|\le 2{{n}\choose{\lceil{n/2}\rceil}}$ if $n$ is odd, and $|\mathscr{A}|+|\mathscr{B}|\le {{n}\choose{n/2}}+{{n}\choose{(n/2)+1}}$ if $n$ is even. Furthermore, all extremal and almost-extremal families for $\mathscr{A}$ and $\mathscr{B}$ are determined.
△ Less
Submitted 30 April, 2022; v1 submitted 7 January, 2020;
originally announced January 2020.
-
On optimal orientations of complete tripartite graphs
Authors:
W. H. W. Wong,
E. G. Tay
Abstract:
Given a connected and bridgeless graph $G$, let $\mathscr{D}(G)$ be the family of strong orientations of $G$. The orientation number of $G$ is defined to be $\bar{d}(G):=min\{d(D)|D\in \mathscr{D}(G)\}$, where $d(D)$ is the diameter of the digraph $D$. In this paper, we focus on the orientation number of complete tripartite graphs. We prove a conjecture raised by Rajasekaran and Sampathkumar. Spec…
▽ More
Given a connected and bridgeless graph $G$, let $\mathscr{D}(G)$ be the family of strong orientations of $G$. The orientation number of $G$ is defined to be $\bar{d}(G):=min\{d(D)|D\in \mathscr{D}(G)\}$, where $d(D)$ is the diameter of the digraph $D$. In this paper, we focus on the orientation number of complete tripartite graphs. We prove a conjecture raised by Rajasekaran and Sampathkumar. Specifically, for $q\ge p\ge 3$, if $\bar{d}(K(2,p,q))=2$, then $q\le{{p}\choose{\lfloor{p/2}\rfloor}}$. We also present some sufficient conditions on $p$ and $q$ for $\bar{d}(K(p,p,q))=2$.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
Geometric analysis of 1+1 dimensional quasilinear wave equations
Authors:
Leonardo Enrique Abbrescia,
Willie Wai Yeung Wong
Abstract:
We prove global well-posedness of the initial value problem for a class of variational quasilinear wave equations, in one spatial dimension, with initial data that is not-necessarily small. Key to our argument is a form of quasilinear null condition (a "nilpotent structure") that persists for our class of equations even in the large data setting. This in particular allows us to prove global well-p…
▽ More
We prove global well-posedness of the initial value problem for a class of variational quasilinear wave equations, in one spatial dimension, with initial data that is not-necessarily small. Key to our argument is a form of quasilinear null condition (a "nilpotent structure") that persists for our class of equations even in the large data setting. This in particular allows us to prove global well-posedness for $C^2$ initial data of moderate decrease, provided the data is sufficiently close to that which generates a simple traveling wave.
We take here a geometric approach inspired by works in mathematical relativity and recent works on shock formation for fluid systems. First we recast the equations of motion in terms of a dynamical double-null coordinate system; we show that this formulation semilinearizes our system and decouples the wave variables from the null structure equations. After solving for the wave variables in the double-null coordinate system, we next analyze the null structure equations, using the wave variables as input, to show that the dynamical coordinates are $C^1$ regular and covers the entire space-time.
△ Less
Submitted 15 October, 2020; v1 submitted 10 December, 2019;
originally announced December 2019.
-
Irreducible representations of the symmetric groups from slash homologies of p-complexes
Authors:
Aaron Chan,
William Wong
Abstract:
In the 40s, Mayer introduced a construction of (simplicial) $p$-complex by using the unsigned boundary map and taking coefficients of chains modulo $p$. We look at such a $p$-complex associated to an $(n-1)$-simplex; in which case, this is also a $p$-complex of representations of the symmetric group of rank $n$ - specifically, of permutation modules associated to two-row compositions. In this arti…
▽ More
In the 40s, Mayer introduced a construction of (simplicial) $p$-complex by using the unsigned boundary map and taking coefficients of chains modulo $p$. We look at such a $p$-complex associated to an $(n-1)$-simplex; in which case, this is also a $p$-complex of representations of the symmetric group of rank $n$ - specifically, of permutation modules associated to two-row compositions. In this article, we calculate the so-called slash homology - a homology theory introduced by Khovanov and Qi - of such a $p$-complex. We show that every non-trivial slash homology group appears as an irreducible representation associated to two-row partitions, and how this calculation leads to a basis of these irreducible representations given by the so-called $p$-standard tableaux.
△ Less
Submitted 29 May, 2020; v1 submitted 21 November, 2019;
originally announced November 2019.
-
Dispersive estimates for Klein-Gordon equations via a physical space approach
Authors:
Willie Wai Yeung Wong
Abstract:
Building on the hyperboloidal foliation approach of Lefloch and Ma, we extend Klainerman's physical-space approach to dispersive estimates to recover the frequency-restricted $L^1$--$L^\infty$ dispersive estimates for Klein-Gordon equations. The hyperboloidal foliation approach naturally only provide estimates within a fixed forward light-cone, and is based on an initial data norm that is not tran…
▽ More
Building on the hyperboloidal foliation approach of Lefloch and Ma, we extend Klainerman's physical-space approach to dispersive estimates to recover the frequency-restricted $L^1$--$L^\infty$ dispersive estimates for Klein-Gordon equations. The hyperboloidal foliation approach naturally only provide estimates within a fixed forward light-cone, and is based on an initial data norm that is not translation invariant. Both of these problems can be handled with frequency-dependent physical-space truncations. To handle the lack of scaling symmetry for the Klein-Gordon equation and complete the argument, we also need to keep track of the effectiveness of our estimates in the vanishing mass limit.
△ Less
Submitted 6 March, 2020; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Global versions of Gagliardo-Nirenberg-Sobolev inequality and applications to wave and Klein-Gordon equations
Authors:
Leonardo Abbrescia,
Willie Wai Yeung Wong
Abstract:
We prove global, or space-time weighted, versions of the Gagliardo-Nirenberg interpolation inequality, with $L^p$ ($p < \infty$) endpoint, adapted to a hyperboloidal foliation. The corresponding versions with $L^\infty$ endpoint was first introduced by Klainerman and is the basis of the classical vector field method, which is now one of the standard techniques for studying long-time behavior of no…
▽ More
We prove global, or space-time weighted, versions of the Gagliardo-Nirenberg interpolation inequality, with $L^p$ ($p < \infty$) endpoint, adapted to a hyperboloidal foliation. The corresponding versions with $L^\infty$ endpoint was first introduced by Klainerman and is the basis of the classical vector field method, which is now one of the standard techniques for studying long-time behavior of nonlinear evolution equations. We were motivated in our pursuit by settings where the vector field method is applied to an energy hierarchy with growing higher order energies. In these settings the use of the $L^p$ endpoint versions of Sobolev inequalities can allow one to gain essentially one derivative in the estimates, which would then give a corresponding gain of decay rate. The paper closes with the analysis of one such model problem, where our new estimates provide an improvement.
△ Less
Submitted 28 March, 2019;
originally announced March 2019.
-
Global nearly-plane-symmetric solutions to the membrane equation
Authors:
Leonardo Abbrescia,
Willie Wai Yeung Wong
Abstract:
We prove that any simple planar travelling wave solution to the membrane equation in spatial dimension $d \geq 3$ with bounded spatial extent is globally nonlinearly stable under sufficiently small compactly-supported perturbations, where the smallness depends on the size of the support of the perturbation as well as on the initial travelling wave profile. The main novelty of the argument is the l…
▽ More
We prove that any simple planar travelling wave solution to the membrane equation in spatial dimension $d \geq 3$ with bounded spatial extent is globally nonlinearly stable under sufficiently small compactly-supported perturbations, where the smallness depends on the size of the support of the perturbation as well as on the initial travelling wave profile. The main novelty of the argument is the lack of higher-order peeling in our vector-field based method. In particular, the higher order energies (in fact, all energies at order $2$ or higher) are allowed to grow polynomially (but in a controlled way) in time. This is in contrast with classical global stability arguments where only the "top" order energies used in the bootstrap argument exhibit growth, and reflects the fact that the background travelling wave solution has "infinite energy" and the coefficients of the perturbation equation are not asymptotically Lorentz invariant. Nonetheless, we can prove that the perturbation converges to zero in $C^2$ by carefully analyzing the nonlinear interactions and exposing a certain "vestigial" null structure in the equations.
△ Less
Submitted 6 March, 2020; v1 submitted 8 March, 2019;
originally announced March 2019.
-
Alexander and Jones polynomials of surgerized tst links
Authors:
Wilson Wong,
Franky Mok
Abstract:
This paper is a continuation on the 2012 paper on "Cutting Twisted Solid Tori (TSTs)", in which we considered twisted solid torus links (tst links). We generalize the notion of tst links to "surgerized tst links": recall that when performing $Φ^μ(n(τ), d(τ), M)$ on a tst $\langle τ\rangle$ where $M$ is odd, we obtain the tst link, $[Φ^μ(n(τ), d(τ), M)]$ that contains a trivial knot as one of its c…
▽ More
This paper is a continuation on the 2012 paper on "Cutting Twisted Solid Tori (TSTs)", in which we considered twisted solid torus links (tst links). We generalize the notion of tst links to "surgerized tst links": recall that when performing $Φ^μ(n(τ), d(τ), M)$ on a tst $\langle τ\rangle$ where $M$ is odd, we obtain the tst link, $[Φ^μ(n(τ), d(τ), M)]$ that contains a trivial knot as one of its components. We then perform another operation $Φ^{μ'}(n(τ'), d(τ'), M')$ on that trivial knot to create a new link, which we call a "surgerized tst link" (stst link). If $M'$ is odd, we can repeat the process to give more complicated stst links. We compute braid words, Alexander and Jones polynomials of such links.
△ Less
Submitted 19 February, 2019; v1 submitted 15 February, 2019;
originally announced February 2019.
-
Online Inventory Management with Application to Energy Procurement in Data Centers
Authors:
Lin Yang,
Mohammad H. Hajiesmaili,
Ramesh Sitaraman,
Enrique Mallada,
Wing S. Wong,
Adam Wierman
Abstract:
Motivated by the application of energy storage management in electricity markets, this paper considers the problem of online linear programming with inventory management constraints. Specifically, a decision maker should satisfy some units of an asset as her demand, either form a market with time-varying price or from her own inventory. The decision maker is presented a price in slot-by-slot manne…
▽ More
Motivated by the application of energy storage management in electricity markets, this paper considers the problem of online linear programming with inventory management constraints. Specifically, a decision maker should satisfy some units of an asset as her demand, either form a market with time-varying price or from her own inventory. The decision maker is presented a price in slot-by-slot manner, and must immediately decide the purchased amount with the current price to cover the demand or to store in inventory for covering the future demand. The inventory has a limited capacity and its critical role is to buy and store assets at low price and use the stored assets to cover the demand at high price. The ultimate goal of the decision maker is to cover the demands while minimizing the cost of buying assets from the market. We propose BatMan, an online algorithm for simple inventory models, and BatManRate, an extended version for the case with rate constraints. Both BatMan and BatManRate achieve optimal competitive ratios, meaning that no other online algorithm can achieve a better theoretical guarantee. To illustrate the results, we use the proposed algorithms to design and evaluate energy procurement and storage management strategies for data centers with a portfolio of energy sources including the electric grid, local renewable generation, and energy storage systems.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
Matrix Completion under Low-Rank Missing Mechanism
Authors:
Xiaojun Mao,
Raymond K. W. Wong,
Song Xi Chen
Abstract:
Matrix completion is a modern missing data problem where both the missing structure and the underlying parameter are high dimensional. Although missing structure is a key component to any missing data problems, existing matrix completion methods often assume a simple uniform missing mechanism. In this work, we study matrix completion from corrupted data under a novel low-rank missing mechanism. Th…
▽ More
Matrix completion is a modern missing data problem where both the missing structure and the underlying parameter are high dimensional. Although missing structure is a key component to any missing data problems, existing matrix completion methods often assume a simple uniform missing mechanism. In this work, we study matrix completion from corrupted data under a novel low-rank missing mechanism. The probability matrix of observation is estimated via a high dimensional low-rank matrix estimation procedure, and further used to complete the target matrix via inverse probabilities weighting. Due to both high dimensional and extreme (i.e., very small) nature of the true probability matrix, the effect of inverse probability weighting requires careful study. We derive optimal asymptotic convergence rates of the proposed estimators for both the observation probabilities and the target matrix.
△ Less
Submitted 19 March, 2020; v1 submitted 19 December, 2018;
originally announced December 2018.
-
Integrated Stabilization Policy over a Software Defined Network
Authors:
Cheng Tan,
Wing Shing Wong,
Huanshui Zhang
Abstract:
In this paper, we mainly investigate an integrated system operating under a software defined network (SDN) protocol. SDN is a new networking paradigm in which network intelligence is centrally administered and data is communicated via channels that are physically separated from those conveying user data. Under the SDN architecture, it is feasible to set up multiple flows for transmitting control s…
▽ More
In this paper, we mainly investigate an integrated system operating under a software defined network (SDN) protocol. SDN is a new networking paradigm in which network intelligence is centrally administered and data is communicated via channels that are physically separated from those conveying user data. Under the SDN architecture, it is feasible to set up multiple flows for transmitting control signals to an actuator with high priority for each individual application. While each flow may suffer random transmission delay, we focus on the stabilization problem under the joint design of the event-driven strategy in actuator and the control policy in decision-maker. By introducing a predefined application time, the integrated system can be reformulated as the form of stochastic system with input delay and multiplicative noise. For such system, we propose a set of necessary and sufficient stabilization conditions. Specifically, for the scalar system, we derive the allowable sampling period bound that can guarantee stabilization in terms of the probability distributions of the random transmission delays. A simple example is included to show the performance of our theoretic results.
△ Less
Submitted 1 December, 2018;
originally announced December 2018.
-
An Investigation on Partitions with Equal Products
Authors:
Byungchul Cha,
Adam Claman,
Joshua Harrington,
Ziyu Liu,
Barbara Maldonado,
Alexander Miller,
Ann Palma,
Tony W. H. Wong,
Hongkwon V. Yi
Abstract:
An ordered triple $(s,p,n)$ is called admissible if there exist two different multisets $X=\{x_1,x_2,\dotsc,x_n\}$ and $Y=\{y_1,y_2,\dotsc,y_n\}$ such that $X$ and $Y$ share the same sum $s$, the same product $p$, and the same size $n$. We first count the number of $n$ such that $(s,p,n)$ are admissible for a fixed $s$. We also fully characterize the values $p$ such that $(s,p,n)$ is admissible. F…
▽ More
An ordered triple $(s,p,n)$ is called admissible if there exist two different multisets $X=\{x_1,x_2,\dotsc,x_n\}$ and $Y=\{y_1,y_2,\dotsc,y_n\}$ such that $X$ and $Y$ share the same sum $s$, the same product $p$, and the same size $n$. We first count the number of $n$ such that $(s,p,n)$ are admissible for a fixed $s$. We also fully characterize the values $p$ such that $(s,p,n)$ is admissible. Finally, we consider the situation where $r$ different multisets are needed, instead of just two. This project is also related to John Conway's wizard puzzle from the 1960s.
△ Less
Submitted 18 November, 2018;
originally announced November 2018.
-
Learning Based Control Policy and Regret Analysis for Online Quadratic Optimization with Asymmetric Information Structure
Authors:
Cheng Tan,
Wing Shing Wong
Abstract:
In this paper, we propose a learning approach to analyze dynamic systems with asymmetric information structure. Instead of adopting a game theoretic setting, we investigate an online quadratic optimization problem driven by system noises with unknown statistics. Due to information asymmetry, it is infeasible to use classic Kalman filter nor optimal control strategies for such systems. It is necess…
▽ More
In this paper, we propose a learning approach to analyze dynamic systems with asymmetric information structure. Instead of adopting a game theoretic setting, we investigate an online quadratic optimization problem driven by system noises with unknown statistics. Due to information asymmetry, it is infeasible to use classic Kalman filter nor optimal control strategies for such systems. It is necessary and beneficial to develop a robust approach that learns the probability statistics as time goes forward. Motivated by online convex optimization (OCO) theory, we introduce the notion of regret, which is defined as the cumulative performance loss difference between the optimal offline known statistics cost and the optimal online unknown statistics cost. By utilizing dynamic programming and linear minimum mean square biased estimate (LMMSUE), we propose a new type of online state feedback control policies and characterize the behavior of regret in finite time regime. The regret is shown to be sub-linear and bounded by O(ln T). Moreover, we address an online optimization problem with output feedback control policies.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
On the Domination Number of Permutation Graphs and an Application to Strong Fixed Points
Authors:
Theresa Baren,
Michael Cory,
Mia Friedberg,
Peter Gardner,
James Hammer,
Joshua Harrington,
Daniel McGinnis,
Riley Waechter,
Tony W. H. Wong
Abstract:
A permutation graph $G_π$ is a simple graph with vertices corresponding to the elements of $π$ and an edge between $i$ and $j$ when $i$ and $j$ are inverted in $π$. A set of vertices $D$ is said to dominate a graph $G$ when every vertex in $G$ is either an element of $D$, or adjacent to an element of $D$. The domination number $γ(G)$ is defined as the cardinality of a minimum dominating set of…
▽ More
A permutation graph $G_π$ is a simple graph with vertices corresponding to the elements of $π$ and an edge between $i$ and $j$ when $i$ and $j$ are inverted in $π$. A set of vertices $D$ is said to dominate a graph $G$ when every vertex in $G$ is either an element of $D$, or adjacent to an element of $D$. The domination number $γ(G)$ is defined as the cardinality of a minimum dominating set of $G$. A strong fixed point of a permutation $π$ of order $n$ is an element $k$ such that $π^{-1}(j)<π^{-1}(k)$ for all $j<k$, and $π^{-1}(i)>π^{-1}(k)$ for all $i>k$. In this article, we count the number of connected permutation graphs on $n$ vertices with domination number $1$ and domination number $\frac{n}{2}$. We further show that for a natural number $k\leq \frac{n}{2}$, there exists a connected permutation graph on $n$ vertices with domination number $k$. We find a closed expression for the number of permutation graphs dominated by a set with two elements, and we find a closed expression for the number of permutation graphs efficiently dominated by any set of vertices. We conclude by providing an application of these results to strong fixed points, proving some conjectures posed on the OEIS.
△ Less
Submitted 8 October, 2018;
originally announced October 2018.
-
The Undirected Optical Indices of Trees
Authors:
Yuan-Hsun Lo,
Hung-Lin Fu,
Yijin Zhang,
Wing Shing Wong
Abstract:
For a connected graph $G$, an instance $I$ is a set of pairs of vertices and a corresponding routing $R$ is a set of paths specified for all vertex-pairs in $I$. Let $\mathfrak{R}_I$ be the collection of all routings with respect to $I$. The undirected optical index of $G$ with respect to $I$ refers to the minimum integer $k$ to guarantee the existence of a mapping $φ:R\to\{1,2,\ldots,k\}$, such t…
▽ More
For a connected graph $G$, an instance $I$ is a set of pairs of vertices and a corresponding routing $R$ is a set of paths specified for all vertex-pairs in $I$. Let $\mathfrak{R}_I$ be the collection of all routings with respect to $I$. The undirected optical index of $G$ with respect to $I$ refers to the minimum integer $k$ to guarantee the existence of a mapping $φ:R\to\{1,2,\ldots,k\}$, such that $φ(P)\neqφ(P')$ if $P$ and $P'$ have common edge(s), over all routings $R\in\mathfrak{R}_I$. A natural lower bound of the undirected optical index is the edge-forwarding index, which is defined to be the minimum of the maximum edge-load over all possible routings. Let $w(G,I)$ and $π(G,I)$ denote the undirected optical index and edge-forwarding index with respect to $I$, respectively. In this paper, we derive the inequality $w(T,I_A)<\frac{3}{2}π(T,I_A)$ for any tree $T$, where $I_A:=\{\{x,y\}:\,x,y\in V(T)\}$ is the all-to-all instance.
△ Less
Submitted 15 December, 2024; v1 submitted 28 August, 2018;
originally announced August 2018.
-
On the circular correlation coefficients for bivariate von Mises distributions on a torus
Authors:
Saptarshi Chakraborty,
Samuel W. K. Wong
Abstract:
This paper studies circular correlations for the bivariate von Mises sine and cosine distributions. These are two simple and appealing models for bivariate angular data with five parameters each that have interpretations comparable to those in the ordinary bivariate normal model. However, the variability and association of the angle pairs cannot be easily deduced from the model parameters unlike t…
▽ More
This paper studies circular correlations for the bivariate von Mises sine and cosine distributions. These are two simple and appealing models for bivariate angular data with five parameters each that have interpretations comparable to those in the ordinary bivariate normal model. However, the variability and association of the angle pairs cannot be easily deduced from the model parameters unlike the bivariate normal. Thus to compute such summary measures, tools from circular statistics are needed. We derive analytic expressions and study the properties of the Jammalamadaka-Sarma and Fisher-Lee circular correlation coefficients for the von Mises sine and cosine models. Likelihood-based inference of these coefficients from sample data is then presented. The correlation coefficients are illustrated with numerical and visual examples, and the maximum likelihood estimators are assessed on simulated and real data, with comparisons to their non-parametric counterparts. Implementations of these computations for practical use are provided in our R package BAMBI.
△ Less
Submitted 26 May, 2020; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Analysis on the Projective Octagasket
Authors:
Yiran Mao,
Robert S. Strichartz,
Levente Szabo,
Wing Hong Wong
Abstract:
The existence of a self similar Laplacian on the Projective Octagasket, a non-finitely ramified fractal is only conjectured. We present experimental results using a cell approximation technique originally given by Kusuoka and Zhou. A rigorous recursive algorithm for the discrete Laplacian is given. Further, the spectrum and eigenfunctions of the Laplacian together with its symmetries are categoriz…
▽ More
The existence of a self similar Laplacian on the Projective Octagasket, a non-finitely ramified fractal is only conjectured. We present experimental results using a cell approximation technique originally given by Kusuoka and Zhou. A rigorous recursive algorithm for the discrete Laplacian is given. Further, the spectrum and eigenfunctions of the Laplacian together with its symmetries are categorized and utilized in the construction of solutions to the heat equation.
△ Less
Submitted 23 January, 2018;
originally announced January 2018.