CLASSIC TWO-STEP DURBIN-TYPE AND LEVINSON-TYPE ALGORITHMS FOR SKEW-SYMMETRIC TOEPLITZ MATRICES
|
|
- Jocelin Waters
- 5 years ago
- Views:
Transcription
1 CLASSIC TWO-STEP DURBIN-TYPE AND LEVINSON-TYPE ALGORITHMS FOR SKEW-SYMMETRIC TOEPLITZ MATRICES IYAD T ABU-JEIB Abstract We present ecient classic two-step Durbin-type and Levinsontype algorithms for even order skew-symmetric Toeplitz matrices AMS classications: 65F05, 5A57 Keywords: skew-symmetric Toeplitz matrix; Levinson algorithm; Durbin algorithm; skew-centrosymmetric Introduction We extend the classic Durbin's algorithm and the classic Levinson's algorithm for symmetric Toeplitz matrices to skew-symmetric Toeplitz matrices Levinson's algorithm is for solving the system Ax = b, where A is an n n real symmetric Toeplitz matrix (with some restrictions on A) and x and b are n vectors In our algorithms, we present an O(n 2 ) method to solve HX = B, where H is a nite n n real skew-symmetric Toeplitz matrix (with some restrictions) and B is n 2 (to solve Hx = b, where b is n, simply let b be one of the colummns of B) This method can be used to invert nonsingular skew-symmetric Toeplitz matrices Our algorithms are dierent than the algorithms presented in? They are simple and they use very similar techniques to those used by Durbin and Levinson They are easy to derive and easy to implement They are also two-step In addition, the restrictions we place on the matrix of coecients are less than the restrictions in Durbin's algorithm and in Levinson's algorithm Levinson's algorithm and a twostep version of it can be found in?,?,? We recall here that well-known researchers thought that the classic Durbin's algorithm and the classic Levinson's algorithm can not be generalized to skew-symmetric Toeplitz matrices But, we managed to generalize them Our algorithms were tested on skew-symmetric Toeplitz matrices that appear in Sinc methods They were tested on matrix S n of I n ( ), where I ( ) n where η ij = e i j, e k = 2 + s k, and s k = Thus, I ( ) n sinc(x) = = η ij n i,j= k 0 { sin(πx) πx,, for x = 0 can be expressed in the form I n ( ) = 2 sinc(x)dx, where + S n, for x 0
2 where 2 is the n n matrix whose elements are all equal to 2 algorithms also on matrix I n () of Sinc methods I n () Toeplitz matrix dened as follows I () n = ( ) n n ( ) n n 2 ( ) n 2 We tested the is an n n skew-symmetric ( ) n n ( ) n 2 n 2 ( ) n 3 n 3 n 3 0 Many Sinc methods are dependent on Sinc matrices For more about the matrices of Sinc methods and about Sinc methods, see?,?,?,?,?,? 2 Preliminaries We employ the following notation We denote the transpose of a matrix A by A T As usual, I k denotes the k k identity matrix When counting ops, we treat addition/subtraction the same as multiplication/division By the main counterdiagonal (or simply counterdiagonal) of a square matrix we mean the positions which proceed diagonally from the last entry in the rst row to the rst entry in the last row Denition 2 The counteridentity matrix, denoted J, is the square matrix whose elements are all equal to zero except those on the counterdiagonal, which are all equal to We note that multiplying a matrix A by J from the left results in reversing the rows of A and multiplying A by J from the right results in reversing the columns of A Throughout this paper, we will denote the k k counteridentity matrix by J k Note that multiplying a matrix or a vector by J does not contribute to the running time Denition 22 A matrix A is skew-centrosymmetric if JAJ = A, and Toeplitz if the elements along each diagonal are equal Note that skew-symmetric Toeplitz matrices are skew-symmetric skew-centrosymmetric Note also that if T n is an n n skew-symmetric Toeplitz matrix, then T n has the following form T n = 0 σ σ 2 σ n σ 0 σ σ n 2 σ 2 σ 0 σ n 3 σ n σ n 2 σ n 3 0 The above form is the form we will refer to in the next section Note that the rst row (excluding the rst element) generates (determines) T n, ie the vector h n = σ, σ 2,, σ n T is a generator of T n We will assume that {T n }, n 2Z +, is a family of real skew-symmetric Toeplitz matrices Note that to solve T n X = B, where T n is n n and B is n 2, we need T n+2 To be specic, we need only the elements σ n and σ n+ from the generator h n+2 of T n+2 This is not a shortcome of the algorithm because most of the skew-symmetric Toeplitz matrices
3 that arise in applications are of the form we mentioned above (ie they appear as classes/sequences of matrices) as it is the case with the skew-symmetric Toeplitz matrices that appear in Sinc methods For example, in matrix S n of I n ( ) described in the introduction, σ k = k sinc(x)dx, and in matrix I () 0 n, σ k = ( )k k Thus, σ k is dened for all k Z + Also, we recall that Durbin and Levinson used similar teqchniques in their algorithms; ie, to solve H n x = b, where H n is an n n real symmetric Toeplitz matrix, they use H n+ Denition 23 Let A be an n n matrix The leading principal matrix of A of order k is the matrix formed from A by deleting the last n k columns and the last n k rows of A 3 Algorithms for Skew-Symmetric Toeplitz Matrices Throughout the rest of the paper, let k be even, and let T k be a k k real skew-symmetric Toeplitz matrix and assume T i, i {2, 3,, k} 2Z, is nonsingular (ie all leading principal matrices of T k of even order are nonsingular) We recall that Durbin and Levinson have stronger restrictions in their algorithms We note also that it happens sometimes that all even-order matrices of a family of skew-symmetric Toeplitz matrices are non-singular as it is the case with matrix S n of I n ( ) and matrix I n () For the proofs, see?,? Note that odd-order skewsymmetric (and odd-order skew-centrosymmetric matrices) are singular, and hence, it is essential to have a two-step algorithm that skips the odd-order matrices Thus, our algorithm is a two-step algorithm because it moves from order k to order k + 2 instead of moving from order k to order k + Now note that T k+2 can be written as T T k+2 = k J k R k Rk T J, k T 2 σ σ 2 where R k = Once again, in each step we will move from T k to T k+2 σ k σ k+ instead of T k+ We start with T 2 Now, we extend Durbin's algorithm If we know the solution of T k Y = R k, where Y is k 2, then we can know the solution of T k J k R k Z Rk Rk T J =, k T 2 W S k σk+ σ where Z is k 2, W is 2 2, and S k = k+2 Note that T σ k+2 σ k and J k are k+3 k k, R k and Z are k 2, and T 2 and S k are 2 2 Now note that T k Z + J k R k W = R k, and R T k J k Z + T 2 W = S k Thus, Z = Y + J k Y W and W = (T 2 Rk T Y ) (S k + Rk T J ky ) Note that T 2 Rk T Y is nonsingular, because Hk T T T k+2 H k = k 0 Y T J k T k Rk T J k T 2 Rk T Y, where H k = Ik J k Y 0 I 2
4 (Note that T k J k Y + J k R k = 0 and Y T J k T k J k Y + Y T R k = 0 also) Hence, det(t k+2 ) = det(t k ) det(t 2 Rk T Y ) Now since we are assuming T k+2 is nonsingular, then T 2 Rk T Y is nonsingular Thus, our O(n2 ) algorithm is (we note that the inverse we have to nd in this algorithm and in all other algorithms is for a 2 2 matrix): Algorithm : Input: n (an even positive integer), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 P k = (T 2 Rk T Y k) W k = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W k Zk Y k+2 = W k end for Output: Y n (the solution of T n Y n = R n, where T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T and R n is as before) It is easy to see that the running time of the previous algorithm is n 2 k=2 24k = 6n 2 + O(n) Remark: We remind the reader that we dene a op to be one addition or one multiplication, while some people dene it to be one addition and one multiplication If we dene the op to be one addition and one multiplication, then the running time of the previous algorithm will be almost half of the running time we have above Now we derive a Levinson-type algorithm Let B = b c b 2 c 2 b k c k Assume we have the solution of T k X = B, where X is k 2, and assume also we have the solution (from the previous algorithm) of T k Y = R k, where Y is k 2 Now, we want to solve the next even higher order equation: T k J k R k R T k J k T 2 V M = B C,
5 where V is k 2, M and C are 2 2, and C = T k V + J k R k M = B, R T k J k V + T 2 M = C bk+ c k+ Then, we will have b k+2 c k+2 Thus, V = X + J k Y M and M = (T 2 Rk T Y ) (C + Rk T J kx) Now, all we need to do is to execute the steps above in parallel with the steps for solving T k Y = R k Therefore, our O(n 2 ) algorithm is: Algorithm 2 (Classic Levinson-Type Algorithm): Input: n (an even positive integer), b = b b 2 b n T, c = c c 2 c n T (b and c are the vectors of constant terms), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 b2 /σ X 2 = c 2 /σ b /σ c /σ for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 P k = (T 2 R T k Y k ) W k = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W k M k = P k (C k + Rk T J kx k ) V k = X k + J k Y k M k Y k+2 = X k+2 = Zk W k Vk M k end for Output: X n (the solution of T n X n = B n, where B n = b, c and T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T ) It is easy to see that the running time of the previous algorithm is n 2 k=2 40k = 0n 2 + O(n) Note that our algorithm solves for two vectors of constant terms at once Ie if we want to solve T n x = b and T n y = c, where b and c are n and n is even, then we solve the system T n Z = D, where D is an n 2 matrix whose rst column is b and second column is c Then, x will be the rst column of Z and y the second column Solving T n Z = D by our method costs 0n 2 + O(n) Thus, obtaining x costs 5n 2 + O(n) and obtaining y has the same cost 4 Examples In the following example we solve (calculations are done by Octave which is a math-oriented programming language similar to MATLAB) S 6 X = D, where S 6 is
6 the 6 6 matrix of I ( ) mentioned in the introduction, ie S 6 = , D = , and the generator σ of S 8 is T Note that the inputs to the algorithm are 6, b, c, and σ, where b is the rst column of D and c is the second column of D Initializations: Y 2 = T 2 = Iterations: k = 2: X 2 = R 2 = S 2 = C 2 = e e + 00 P 2 = 2872e e W 2 = Z 2 = M 2 = V 2 =
7 k = 4: Y 4 = X 4 = R 4 = S 4 = C 4 = e e + 00 P 4 = 2270e e W 4 = Z 4 = M 4 = V 4 = Y 6 = X 6 =
8 End of Iterations The solution X is We note that the solution above is exactly the same as the solution obtained from solving the system using Maple The two solutions even match for a much higher number of decimal places As another example, we solve the system I () 8 X = D, where D is an 8 2 matrix whose rst solumn is the 8 zero vector (call this vector b) and whose second column is c = I () 8 e, where e is the 8 vector of ones; ie (rounded up to 6 digits) c = Note that D was chosen so that the true solution is the matrix whose rst column is the 8 zero vector and whose second column is the 8 vector of ones Solving the system by our algorithm with input 8, b, c, and σ, where σ = /2 /3 /4 /5 /6 /7 /8 /9, gives us the solution
9 5 Improved Algorithms First, we present a 4n 2 +O(n) Durbin-type algorithm The idea here is to reduce the cost of computing Rk T Y k Here we will use the same notation (but we will replace Y by Y k, Z by Z k and W by W k ) we used when we derived the rst two algorithms Now consider Rk T Y k = Rk 2 T Z k 2 ST k 2 W k 2 But, Z k 2 = Y k 2 + J k 2 Y k 2 W k 2 Thus, R T k Y k = R T k 2Y k 2 + (T 2 R T k 2Y k 2 )W 2 k 2 Therefore, we can use the previously computed values of W and R T Y to compute the new value of R T Y which we will call E Algorithm 3 (Classic Durbin-Type Algorithm): Input: n (an even positive integer), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 σ σ R 2 = 2 E = R 2 T Y W = 0 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = S k = σ k σ k+ σk+ σ k+2 σ k+2 σ k+3 E = E + (T 2 E)W 2 P k = (T 2 E) W = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W Zk Y k+2 = W end for Output: Y n (the solution of T n Y n = R n, where T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T and R n is as before) It is easy to see that the running time of the previous algorithm is n 2 k=2 6k = 4n 2 + O(n) Algorithm 4 (Improved Classic Levinson-Type Algorithm): Input: n (an even positive integer), b = b b 2 b n T, c = c c 2 c n T (b and c are the vectors of constant terms), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 )
10 σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 b2 /σ X 2 = c 2 /σ b /σ c /σ σ σ R 2 = 2 E = R 2 T Y W = 0 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 E = E + (T 2 E)W 2 P k = (T 2 E) W = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W M k = P k (C k + Rk T J kx k ) V k = X k + J k Y k M k Zk Y k+2 = W Vk X k+2 = M k end for Output: X n (the solution of T n X n = B n, where B n = b, c and T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T ) It is easy to see that the running time of the previous algorithm is n 2 k=2 32k = 8n 2 + O(n) Note that our algorithm solves for two vectors of constant terms at once Ie if we want to solve T n x = b and T n y = c, where b and c are n and n is even, then we solve the system T n Z = D, where D is an n 2 matrix whose rst column is b and second column is c Then, x will be the rst column of Z and y the second column Solving T n Z = D by our method costs 8n 2 + O(n) Thus, obtaining x costs 4n 2 + O(n) and obtaining y has the same cost Solving the rst system we solved in Section?? by the improved Levinson algorithm (using Octave) gives the same solution we got in that section All variables we get here are the same as those in that example except that we do not have W k here, and we have the following additional ones In the initializations part, we have R 2 =
11 555e e 0 E = 8742e 0 860e W = 0 0 When k = 2 in the iterations, we get 555e e 0 E = 8742e 0 860e W = When k = 4 in the iterations, we get 58234e e 0 E = 22553e 0 569e W = An Octave Program for the Improved Levinson-Type Algorithm We note that we do not have to compute the counteridentity matrix, J, in the program below We can write the program without it We included it in the program for the sake of clarity We note also that the program can be shortened if we use Octave's built-in functions and operators But, we decided to write it as above to make it easy to understand for readers who do not know Octave # ; function J = Counter(n) # usage: J = Counter(n) # description: Creates the counteridentity matrix of order n J=zeros(n); for i=:n J(i,n-i+)=; endfor; endfunction function Z = solve(sigma,d) # description : Solves the system T n Z = D, where n is even and # T n is a real skew-symmetric Toeplitz matrix generated by # sigma() sigma(2) sigma(n ) T # The input sigma = sigma() sigma(2) sigma(n + ) T # is the generator of T n+2 It is an (n + ) column vector # The input D is an n 2 matrix (matrix of constant terms) # usage: Z = solve(sigma,d) n = rows(sigma)- ; b = D(:,); # b is the rst column of D c = D(:,2); # c is the second column of D Y = -sigma(2)/sigma(),-sigma(3)/sigma();,sigma(2)/sigma(); T2 = 0,sigma();-sigma(),0;
12 X = -b(2)/sigma(),-c(2)/sigma();b()/sigma(),c()/sigma(); R = sigma(),sigma(2);sigma(2),sigma(3); E = R * Y; # The prime is used in Octave for transpose W = zeros(2,2); # W is the 2 2 zero matrix for k = 2:n-2 if (rem(k, 2)!= 0) continue; endif; R = zeros(k,2); for i=:k R(i,)=sigma(i); R(i,2) = sigma(i+); endfor; S = zeros(2,2); S(,) = sigma(k+); S(,2) = sigma(k+2); S(2,) = sigma(k+2); S(2,2) = sigma(k+3); C = zeros(2,2); C(,) = b(k+); C(2,) = b(k+2); C(,2) = c(k+); C(2,2) = c(k+2); J = Counter(k); E = E + (T2 - E) * W * W; P = inv(t2 - E); W = P * (S + R * J * Y); Z = Y + J * Y * W; M = P * (C + R * J * X); V = X + J * Y * M; Y = Z;W; X = V;M; endfor; Z = X; endfunction; References I T Abu-Jeib and T S Shores, On properties of matrix I ( ) of Sinc methods, New Zealand J Math 32 (2003) -0 2 D Delsarte and Y Genin, The split Levinson algorithm, IEEE Transactions on Acoustics Speech and Signal Processing ASSP-34 (986) P Gierke, PhD thesis, University of Nebraska-Lincoln, G Heinig and K Rost, Fast algorithms for skewsymmetric Toeplitz matrices, Toeplitz matrices and singular integral equations (Pobershau, 200) , Oper Theory Adv Appl, 35, Birkhäuser, Basel, J Lund and K Bowers, Sinc Methods for Quadrature and Dierential Equations, SIAM, Philadelphia, A Melman, The even-odd split Levinson algorithm for Toeplitz systems, SIAM J Matrix Anal Appl 23, (200)
13 7 A Melman, A two step even-odd split Levinson algorithm for Toeplitz systems, Linear Algebra Appl 338 (200) F Stenger, Numerical Methods Based on Sinc and Analytic Functions, Springer-Verlag, New York, F Stenger, Collocating convolutions, Math Comp 64 (995) F Stenger, Matrices of sinc methods, J Comput Appl Math 86 (997) Department of Mathematics and Computer Science, Fenton Hall, SUNY College at Fredonia, Fredonia, NY 4063, USA address: abu-jeib@csfredoniaedu
Direct Methods for linear systems Ax = b basic point: easy to solve triangular systems
NLA p.1/13 Direct Methods for linear systems Ax = b basic point: easy to solve triangular systems... 0 0 0 etc. a n 1,n 1 x n 1 = b n 1 a n 1,n x n solve a n,n x n = b n then back substitution: takes n
More informationLecture 3: Factor models in modern portfolio choice
Lecture 3: Factor models in modern portfolio choice Prof. Massimo Guidolin Portfolio Management Spring 2016 Overview The inputs of portfolio problems Using the single index model Multi-index models Portfolio
More informationMarkowitz portfolio theory
Markowitz portfolio theory Farhad Amu, Marcus Millegård February 9, 2009 1 Introduction Optimizing a portfolio is a major area in nance. The objective is to maximize the yield and simultaneously minimize
More informationSome Bounds for the Singular Values of Matrices
Applied Mathematical Sciences, Vol., 007, no. 49, 443-449 Some Bounds for the Singular Values of Matrices Ramazan Turkmen and Haci Civciv Department of Mathematics, Faculty of Art and Science Selcuk University,
More informationELEMENTS OF MATRIX MATHEMATICS
QRMC07 9/7/0 4:45 PM Page 5 CHAPTER SEVEN ELEMENTS OF MATRIX MATHEMATICS 7. AN INTRODUCTION TO MATRICES Investors frequently encounter situations involving numerous potential outcomes, many discrete periods
More informationAlgebra homework 8 Homomorphisms, isomorphisms
MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5
More informationMAT 4250: Lecture 1 Eric Chung
1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationExtend the ideas of Kan and Zhou paper on Optimal Portfolio Construction under parameter uncertainty
Extend the ideas of Kan and Zhou paper on Optimal Portfolio Construction under parameter uncertainty George Photiou Lincoln College University of Oxford A dissertation submitted in partial fulfilment for
More informationExercise List: Proving convergence of the (Stochastic) Gradient Descent Method for the Least Squares Problem.
Exercise List: Proving convergence of the (Stochastic) Gradient Descent Method for the Least Squares Problem. Robert M. Gower. October 3, 07 Introduction This is an exercise in proving the convergence
More informationFollow links Class Use and other Permissions. For more information, send to:
COPYRIGHT NOTICE: : is published by Princeton University Press and copyrighted, 2009, by Princeton University Press. All rights reserved. No part of this book may be reproduced in any form by any electronic
More informationChapter 14 : Statistical Inference 1. Note : Here the 4-th and 5-th editions of the text have different chapters, but the material is the same.
Chapter 14 : Statistical Inference 1 Chapter 14 : Introduction to Statistical Inference Note : Here the 4-th and 5-th editions of the text have different chapters, but the material is the same. Data x
More information1 Shapley-Shubik Model
1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i
More informationDeterminants II Linear Algebra, Fall 2008
Determinants II Linear Algebra, Fall 2008 1 Basic Properties of Determinants Here are the basic properties of determinants which you proved in the exercises to the previous handout Theorem 1 Let A be an
More informationAdjusting Nominal Values to Real Values *
OpenStax-CNX module: m48709 1 Adjusting Nominal Values to Real Values * OpenStax This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 4.0 By the end of this
More informationPolynomials * OpenStax
OpenStax-CNX module: m51246 1 Polynomials * OpenStax This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 4.0 In this section students will: Abstract Identify
More informationNUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE
Trends in Mathematics - New Series Information Center for Mathematical Sciences Volume 13, Number 1, 011, pages 1 5 NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE YONGHOON
More informationDeterministic Income under a Stochastic Interest Rate
Deterministic Income under a Stochastic Interest Rate Julia Eisenberg, TU Vienna Scientic Day, 1 Agenda 1 Classical Problem: Maximizing Discounted Dividends in a Brownian Risk Model 2 Maximizing Discounted
More information1 Answers to the Sept 08 macro prelim - Long Questions
Answers to the Sept 08 macro prelim - Long Questions. Suppose that a representative consumer receives an endowment of a non-storable consumption good. The endowment evolves exogenously according to ln
More informationMATH 141 (Extra Practice 1)
MATH 141 (Extra Practice 1) 1. If matrices A = w 0.5 3 2 values of y and w? and B = 4 1 y 2 are inverses of each other, what are the 2. The company that produces a toothpaste has a fixed costs of $5000.
More informationApplication of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem
Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem Malgorzata A. Jankowska 1, Andrzej Marciniak 2 and Tomasz Hoffmann 2 1 Poznan University
More informationSimulating more interesting stochastic processes
Chapter 7 Simulating more interesting stochastic processes 7. Generating correlated random variables The lectures contained a lot of motivation and pictures. We'll boil everything down to pure algebra
More informationCS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0.
CS134: Networks Spring 2017 Prof. Yaron Singer Section 0 1 Probability 1.1 Random Variables and Independence A real-valued random variable is a variable that can take each of a set of possible values in
More informationComputer Exercise 2 Simulation
Lund University with Lund Institute of Technology Valuation of Derivative Assets Centre for Mathematical Sciences, Mathematical Statistics Fall 2017 Computer Exercise 2 Simulation This lab deals with pricing
More informationSYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) Syllabus for PEA (Mathematics), 2013
SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) 2013 Syllabus for PEA (Mathematics), 2013 Algebra: Binomial Theorem, AP, GP, HP, Exponential, Logarithmic Series, Sequence, Permutations
More informationAustralian Journal of Basic and Applied Sciences. Conditional Maximum Likelihood Estimation For Survival Function Using Cox Model
AENSI Journals Australian Journal of Basic and Applied Sciences Journal home page: wwwajbaswebcom Conditional Maximum Likelihood Estimation For Survival Function Using Cox Model Khawla Mustafa Sadiq University
More informationIntroduction to Supply and Use Tables, part 3 Input-Output Tables 1
Introduction to Supply and Use Tables, part 3 Input-Output Tables 1 Introduction This paper continues the series dedicated to extending the contents of the Handbook Essential SNA: Building the Basics 2.
More informationWrite legibly. Unreadable answers are worthless.
MMF 2021 Final Exam 1 December 2016. This is a closed-book exam: no books, no notes, no calculators, no phones, no tablets, no computers (of any kind) allowed. Do NOT turn this page over until you are
More informationPalindromic Permutations and Generalized Smarandache Palindromic Permutations
arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,
More informationBOUNDS FOR THE LEAST SQUARES RESIDUAL USING SCALED TOTAL LEAST SQUARES
BOUNDS FOR THE LEAST SQUARES RESIDUAL USING SCALED TOTAL LEAST SQUARES Christopher C. Paige School of Computer Science, McGill University Montreal, Quebec, Canada, H3A 2A7 paige@cs.mcgill.ca Zdeněk Strakoš
More informationOption Pricing Formula for Fuzzy Financial Market
Journal of Uncertain Systems Vol.2, No., pp.7-2, 28 Online at: www.jus.org.uk Option Pricing Formula for Fuzzy Financial Market Zhongfeng Qin, Xiang Li Department of Mathematical Sciences Tsinghua University,
More informationCurriculum Map for Mathematics and Statistics MS (Predoctoral Studies in Mathematics) Pure* Math Applied** Math
slkent@ysu.edu PHONE: 330-941-3302 Dept. Office Leave A Message MS (Predoctoral Studies in Mathematics) Pure* Math Applied** Math MATH 6980 Topology I MATH 6975 Complex Analysis I MATH 6965 Abstract Analysis
More informationAllocation of shared costs among decision making units: a DEA approach
Computers & Operations Research 32 (2005) 2171 2178 www.elsevier.com/locate/dsw Allocation of shared costs among decision making units: a DEA approach Wade D. Cook a;, Joe Zhu b a Schulich School of Business,
More informationChapter 5 Finite Difference Methods. Math6911 W07, HM Zhu
Chapter 5 Finite Difference Methods Math69 W07, HM Zhu References. Chapters 5 and 9, Brandimarte. Section 7.8, Hull 3. Chapter 7, Numerical analysis, Burden and Faires Outline Finite difference (FD) approximation
More informationProbability and Stochastics for finance-ii Prof. Joydeep Dutta Department of Humanities and Social Sciences Indian Institute of Technology, Kanpur
Probability and Stochastics for finance-ii Prof. Joydeep Dutta Department of Humanities and Social Sciences Indian Institute of Technology, Kanpur Lecture - 07 Mean-Variance Portfolio Optimization (Part-II)
More informationChapter 10: Mixed strategies Nash equilibria, reaction curves and the equality of payoffs theorem
Chapter 10: Mixed strategies Nash equilibria reaction curves and the equality of payoffs theorem Nash equilibrium: The concept of Nash equilibrium can be extended in a natural manner to the mixed strategies
More informationFinancial Market Models. Lecture 1. One-period model of financial markets & hedging problems. Imperial College Business School
Financial Market Models Lecture One-period model of financial markets & hedging problems One-period model of financial markets a 4 2a 3 3a 3 a 3 -a 4 2 Aims of section Introduce one-period model with finite
More informationThe Binomial Theorem. Step 1 Expand the binomials in column 1 on a CAS and record the results in column 2 of a table like the one below.
Lesson 13-6 Lesson 13-6 The Binomial Theorem Vocabulary binomial coeffi cients BIG IDEA The nth row of Pascal s Triangle contains the coeffi cients of the terms of (a + b) n. You have seen patterns involving
More informationOptimal rebalancing of portfolios with transaction costs assuming constant risk aversion
Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Lars Holden PhD, Managing director t: +47 22852672 Norwegian Computing Center, P. O. Box 114 Blindern, NO 0314 Oslo,
More informationApplications of Exponential Functions Group Activity 7 Business Project Week #10
Applications of Exponential Functions Group Activity 7 Business Project Week #10 In the last activity we looked at exponential functions. This week we will look at exponential functions as related to interest
More informationNovember 2006 LSE-CDAM
NUMERICAL APPROACHES TO THE PRINCESS AND MONSTER GAME ON THE INTERVAL STEVE ALPERN, ROBBERT FOKKINK, ROY LINDELAUF, AND GEERT JAN OLSDER November 2006 LSE-CDAM-2006-18 London School of Economics, Houghton
More informationNon replication of options
Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial
More informationMonte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMSN50)
Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMSN50) Magnus Wiktorsson Centre for Mathematical Sciences Lund University, Sweden Lecture 2 Random number generation January 18, 2018
More informationMinimum Downside Volatility Indices
Minimum Downside Volatility Indices Timo Pfei er, Head of Research Lars Walter, Quantitative Research Analyst Daniel Wendelberger, Quantitative Research Analyst 18th July 2017 1 1 Introduction "Analyses
More informationPREPRINT 2007:3. Robust Portfolio Optimization CARL LINDBERG
PREPRINT 27:3 Robust Portfolio Optimization CARL LINDBERG Department of Mathematical Sciences Division of Mathematical Statistics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY Göteborg Sweden 27
More informationA No-Arbitrage Theorem for Uncertain Stock Model
Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe
More informationOn equation. Boris Bartolomé. January 25 th, Göttingen Universität & Institut de Mathémathiques de Bordeaux
Göttingen Universität & Institut de Mathémathiques de Bordeaux Boris.Bartolome@mathematik.uni-goettingen.de Boris.Bartolome@math.u-bordeaux1.fr January 25 th, 2016 January 25 th, 2016 1 / 19 Overview 1
More informationsymmys.com 3.2 Projection of the invariants to the investment horizon
122 3 Modeling the market In the swaption world the underlying rate (3.57) has a bounded range and thus it does not display the explosive pattern typical of a stock price. Therefore the swaption prices
More informationMath 101, Basic Algebra Author: Debra Griffin
Math 101, Basic Algebra Author: Debra Griffin Name Chapter 5 Factoring 5.1 Greatest Common Factor 2 GCF, factoring GCF, factoring common binomial factor 5.2 Factor by Grouping 5 5.3 Factoring Trinomials
More informationJDEP 384H: Numerical Methods in Business
Basic Financial Assets and Related Issues A Peek at Optimization Theory: Linear Programming Instructor: Thomas Shores Department of Mathematics Lecture 8, February 1, 2007 110 Kaufmann Center Instructor:
More information(2/3) 3 ((1 7/8) 2 + 1/2) = (2/3) 3 ((8/8 7/8) 2 + 1/2) (Work from inner parentheses outward) = (2/3) 3 ((1/8) 2 + 1/2) = (8/27) (1/64 + 1/2)
Exponents Problem: Show that 5. Solution: Remember, using our rules of exponents, 5 5, 5. Problems to Do: 1. Simplify each to a single fraction or number: (a) ( 1 ) 5 ( ) 5. And, since (b) + 9 + 1 5 /
More informationA RIDGE REGRESSION ESTIMATION APPROACH WHEN MULTICOLLINEARITY IS PRESENT
Fundamental Journal of Applied Sciences Vol. 1, Issue 1, 016, Pages 19-3 This paper is available online at http://www.frdint.com/ Published online February 18, 016 A RIDGE REGRESSION ESTIMATION APPROACH
More informationA THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES
Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the
More informationMath 167: Mathematical Game Theory Instructor: Alpár R. Mészáros
Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationA Bayesian Control Chart for the Coecient of Variation in the Case of Pooled Samples
A Bayesian Control Chart for the Coecient of Variation in the Case of Pooled Samples R van Zyl a,, AJ van der Merwe b a PAREXEL International, Bloemfontein, South Africa b University of the Free State,
More informationError Bounds for P-matrix Linear Complementarity Problems and Their Applications
Error Bounds for P-matrix Linear Complementarity Problems and Their Applications Xiaojun Chen The Hong Kong Polytechnic University NPA2008, Beijing, 7-9 April Outline Computational Global Error Bounds
More informationMARKOWITS EFFICIENT PORTFOLIO (HUANG LITZENBERGER APPROACH)
MARKOWITS EFFICIENT PORTFOLIO (HUANG LITZENBERGER APPROACH) Huang-Litzenberger approach allows us to find mathematically efficient set of portfolios Assumptions There are no limitations on the positions'
More informationThe Binomial Model. Chapter 3
Chapter 3 The Binomial Model In Chapter 1 the linear derivatives were considered. They were priced with static replication and payo tables. For the non-linear derivatives in Chapter 2 this will not work
More informationGenerating all nite modular lattices of a given size
Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationOptimization Methods. Lecture 16: Dynamic Programming
15.093 Optimization Methods Lecture 16: Dynamic Programming 1 Outline 1. The knapsack problem Slide 1. The traveling salesman problem 3. The general DP framework 4. Bellman equation 5. Optimal inventory
More information2 Maximizing pro ts when marginal costs are increasing
BEE14 { Basic Mathematics for Economists BEE15 { Introduction to Mathematical Economics Week 1, Lecture 1, Notes: Optimization II 3/12/21 Dieter Balkenborg Department of Economics University of Exeter
More informationStochastic Proximal Algorithms with Applications to Online Image Recovery
1/24 Stochastic Proximal Algorithms with Applications to Online Image Recovery Patrick Louis Combettes 1 and Jean-Christophe Pesquet 2 1 Mathematics Department, North Carolina State University, Raleigh,
More informationHigh Volatility Medium Volatility /24/85 12/18/86
Estimating Model Limitation in Financial Markets Malik Magdon-Ismail 1, Alexander Nicholson 2 and Yaser Abu-Mostafa 3 1 malik@work.caltech.edu 2 zander@work.caltech.edu 3 yaser@caltech.edu Learning Systems
More informationNo-Arbitrage Conditions for a Finite Options System
No-Arbitrage Conditions for a Finite Options System Fabio Mercurio Financial Models, Banca IMI Abstract In this document we derive necessary and sufficient conditions for a finite system of option prices
More informationEquilibrium payoffs in finite games
Equilibrium payoffs in finite games Ehud Lehrer, Eilon Solan, Yannick Viossat To cite this version: Ehud Lehrer, Eilon Solan, Yannick Viossat. Equilibrium payoffs in finite games. Journal of Mathematical
More information2.1 Mathematical Basis: Risk-Neutral Pricing
Chapter Monte-Carlo Simulation.1 Mathematical Basis: Risk-Neutral Pricing Suppose that F T is the payoff at T for a European-type derivative f. Then the price at times t before T is given by f t = e r(t
More informationAlain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher
RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization
More informationThe Assignment Problem
The Assignment Problem E.A Dinic, M.A Kronrod Moscow State University Soviet Math.Dokl. 1969 January 30, 2012 1 Introduction Motivation Problem Definition 2 Motivation Problem Definition Outline 1 Introduction
More informationPh.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017
Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.
More informationLaurence Boxer and Ismet KARACA
THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.
More informationSCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT. BF360 Operations Research
SCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT BF360 Operations Research Unit 3 Moses Mwale e-mail: moses.mwale@ictar.ac.zm BF360 Operations Research Contents Unit 3: Sensitivity and Duality 3 3.1 Sensitivity
More informationApplied Mathematics Letters
Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi
More informationMath 546 Homework Problems. Due Wednesday, January 25. This homework has two types of problems.
Math 546 Homework 1 Due Wednesday, January 25. This homework has two types of problems. 546 Problems. All students (students enrolled in 546 and 701I) are required to turn these in. 701I Problems. Only
More informationTheorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.
CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular
More informationProbability. An intro for calculus students P= Figure 1: A normal integral
Probability An intro for calculus students.8.6.4.2 P=.87 2 3 4 Figure : A normal integral Suppose we flip a coin 2 times; what is the probability that we get more than 2 heads? Suppose we roll a six-sided
More informationSandringham School Sixth Form. AS Maths. Bridging the gap
Sandringham School Sixth Form AS Maths Bridging the gap Section 1 - Factorising be able to factorise simple expressions be able to factorise quadratics The expression 4x + 8 can be written in factor form,
More informationA Fast Procedure for Transmission Loss Allocation of Power Systems by Using DC-OPF
Bangladesh J. Sci. Ind. Res. 42(3), 249-256, 2007 Introduction A Fast Procedure for Transmission Loss Allocation of Power Systems by Using DC-OPF M. H. Kabir Department of Computer Science and Telecommunication
More informationRobust portfolio optimization
Robust portfolio optimization Carl Lindberg Department of Mathematical Sciences, Chalmers University of Technology and Göteborg University, Sweden e-mail: h.carl.n.lindberg@gmail.com Abstract It is widely
More informationIterative Refinement in Three Precisions
Iterative Refinement in Three Precisions for Research Fast and Accurate MattersSolution of Ill-Conditioned February Sparse 25, 2009 Linear Systems Nick Nick Higham Higham Director Schoolof ofresearch Mathematics
More informationMultivariate Statistics Lecture Notes. Stephen Ansolabehere
Multivariate Statistics Lecture Notes Stephen Ansolabehere Spring 2004 TOPICS. The Basic Regression Model 2. Regression Model in Matrix Algebra 3. Estimation 4. Inference and Prediction 5. Logit and Probit
More informationWorksheet A ALGEBRA PMT
Worksheet A 1 Find the quotient obtained in dividing a (x 3 + 2x 2 x 2) by (x + 1) b (x 3 + 2x 2 9x + 2) by (x 2) c (20 + x + 3x 2 + x 3 ) by (x + 4) d (2x 3 x 2 4x + 3) by (x 1) e (6x 3 19x 2 73x + 90)
More informationTechnical Report Doc ID: TR April-2009 (Last revised: 02-June-2009)
Technical Report Doc ID: TR-1-2009. 14-April-2009 (Last revised: 02-June-2009) The homogeneous selfdual model algorithm for linear optimization. Author: Erling D. Andersen In this white paper we present
More informationMath 1070 Final Exam Practice Spring 2014
University of Connecticut Department of Mathematics Math 1070 Practice Spring 2014 Name: Instructor Name: Section: Read This First! This is a closed notes, closed book exam. You can not receive aid on
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #24 Scribe: Jordan Ash May 1, 2014
COS 5: heoretical Machine Learning Lecturer: Rob Schapire Lecture #24 Scribe: Jordan Ash May, 204 Review of Game heory: Let M be a matrix with all elements in [0, ]. Mindy (called the row player) chooses
More informationarxiv: v1 [math.st] 18 Sep 2018
Gram Charlier and Edgeworth expansion for sample variance arxiv:809.06668v [math.st] 8 Sep 08 Eric Benhamou,* A.I. SQUARE CONNECT, 35 Boulevard d Inkermann 900 Neuilly sur Seine, France and LAMSADE, Universit
More informationIn terms of covariance the Markowitz portfolio optimisation problem is:
Markowitz portfolio optimisation Solver To use Solver to solve the quadratic program associated with tracing out the efficient frontier (unconstrained efficient frontier UEF) in Markowitz portfolio optimisation
More informationMA 1125 Lecture 05 - Measures of Spread. Wednesday, September 6, Objectives: Introduce variance, standard deviation, range.
MA 115 Lecture 05 - Measures of Spread Wednesday, September 6, 017 Objectives: Introduce variance, standard deviation, range. 1. Measures of Spread In Lecture 04, we looked at several measures of central
More informationDynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming
Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role
More informationREMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7
REMARKS ON K3 SURFACES WTH NON-SYMPLECTC AUTOMORPHSMS OF ORDER 7 SHNGO TAK Abstract. n this note, we treat a pair of a K3 surface and a non-symplectic automorphism of order 7m (m = 1, 3 and 6) on it. We
More informationA way to improve incremental 2-norm condition estimation
A way to improve incremental 2-norm condition estimation Jurjen Duintjer Tebbens Institute of Computer Science Academy of Sciences of the Czech Republic duintjertebbens@cs.cas.cz Miroslav Tůma Institute
More informationA distributed Laplace transform algorithm for European options
A distributed Laplace transform algorithm for European options 1 1 A. J. Davies, M. E. Honnor, C.-H. Lai, A. K. Parrott & S. Rout 1 Department of Physics, Astronomy and Mathematics, University of Hertfordshire,
More informationThe rm can buy as many units of capital and labour as it wants at constant factor prices r and w. p = q. p = q
10 Homework Assignment 10 [1] Suppose a perfectly competitive, prot maximizing rm has only two inputs, capital and labour. The rm can buy as many units of capital and labour as it wants at constant factor
More informationPrinciples of Financial Computing
Principles of Financial Computing Prof. Yuh-Dauh Lyuu Dept. Computer Science & Information Engineering and Department of Finance National Taiwan University c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University
More informationDouble Ore Extensions versus Iterated Ore Extensions
Double Ore Extensions versus Iterated Ore Extensions Paula A. A. B. Carvalho, Samuel A. Lopes and Jerzy Matczuk Departamento de Matemática Pura Faculdade de Ciências da Universidade do Porto R.Campo Alegre
More informationLECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS
LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to
More informationMicroeconomic Theory August 2013 Applied Economics. Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY. Applied Economics Graduate Program
Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY Applied Economics Graduate Program August 2013 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.
More informationMartingale Pricing Theory in Discrete-Time and Discrete-Space Models
IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,
More informationDistributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network
8 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 8 WeC34 Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking
More information