CLASSIC TWO-STEP DURBIN-TYPE AND LEVINSON-TYPE ALGORITHMS FOR SKEW-SYMMETRIC TOEPLITZ MATRICES

Size: px
Start display at page:

Download "CLASSIC TWO-STEP DURBIN-TYPE AND LEVINSON-TYPE ALGORITHMS FOR SKEW-SYMMETRIC TOEPLITZ MATRICES"

Transcription

1 CLASSIC TWO-STEP DURBIN-TYPE AND LEVINSON-TYPE ALGORITHMS FOR SKEW-SYMMETRIC TOEPLITZ MATRICES IYAD T ABU-JEIB Abstract We present ecient classic two-step Durbin-type and Levinsontype algorithms for even order skew-symmetric Toeplitz matrices AMS classications: 65F05, 5A57 Keywords: skew-symmetric Toeplitz matrix; Levinson algorithm; Durbin algorithm; skew-centrosymmetric Introduction We extend the classic Durbin's algorithm and the classic Levinson's algorithm for symmetric Toeplitz matrices to skew-symmetric Toeplitz matrices Levinson's algorithm is for solving the system Ax = b, where A is an n n real symmetric Toeplitz matrix (with some restrictions on A) and x and b are n vectors In our algorithms, we present an O(n 2 ) method to solve HX = B, where H is a nite n n real skew-symmetric Toeplitz matrix (with some restrictions) and B is n 2 (to solve Hx = b, where b is n, simply let b be one of the colummns of B) This method can be used to invert nonsingular skew-symmetric Toeplitz matrices Our algorithms are dierent than the algorithms presented in? They are simple and they use very similar techniques to those used by Durbin and Levinson They are easy to derive and easy to implement They are also two-step In addition, the restrictions we place on the matrix of coecients are less than the restrictions in Durbin's algorithm and in Levinson's algorithm Levinson's algorithm and a twostep version of it can be found in?,?,? We recall here that well-known researchers thought that the classic Durbin's algorithm and the classic Levinson's algorithm can not be generalized to skew-symmetric Toeplitz matrices But, we managed to generalize them Our algorithms were tested on skew-symmetric Toeplitz matrices that appear in Sinc methods They were tested on matrix S n of I n ( ), where I ( ) n where η ij = e i j, e k = 2 + s k, and s k = Thus, I ( ) n sinc(x) = = η ij n i,j= k 0 { sin(πx) πx,, for x = 0 can be expressed in the form I n ( ) = 2 sinc(x)dx, where + S n, for x 0

2 where 2 is the n n matrix whose elements are all equal to 2 algorithms also on matrix I n () of Sinc methods I n () Toeplitz matrix dened as follows I () n = ( ) n n ( ) n n 2 ( ) n 2 We tested the is an n n skew-symmetric ( ) n n ( ) n 2 n 2 ( ) n 3 n 3 n 3 0 Many Sinc methods are dependent on Sinc matrices For more about the matrices of Sinc methods and about Sinc methods, see?,?,?,?,?,? 2 Preliminaries We employ the following notation We denote the transpose of a matrix A by A T As usual, I k denotes the k k identity matrix When counting ops, we treat addition/subtraction the same as multiplication/division By the main counterdiagonal (or simply counterdiagonal) of a square matrix we mean the positions which proceed diagonally from the last entry in the rst row to the rst entry in the last row Denition 2 The counteridentity matrix, denoted J, is the square matrix whose elements are all equal to zero except those on the counterdiagonal, which are all equal to We note that multiplying a matrix A by J from the left results in reversing the rows of A and multiplying A by J from the right results in reversing the columns of A Throughout this paper, we will denote the k k counteridentity matrix by J k Note that multiplying a matrix or a vector by J does not contribute to the running time Denition 22 A matrix A is skew-centrosymmetric if JAJ = A, and Toeplitz if the elements along each diagonal are equal Note that skew-symmetric Toeplitz matrices are skew-symmetric skew-centrosymmetric Note also that if T n is an n n skew-symmetric Toeplitz matrix, then T n has the following form T n = 0 σ σ 2 σ n σ 0 σ σ n 2 σ 2 σ 0 σ n 3 σ n σ n 2 σ n 3 0 The above form is the form we will refer to in the next section Note that the rst row (excluding the rst element) generates (determines) T n, ie the vector h n = σ, σ 2,, σ n T is a generator of T n We will assume that {T n }, n 2Z +, is a family of real skew-symmetric Toeplitz matrices Note that to solve T n X = B, where T n is n n and B is n 2, we need T n+2 To be specic, we need only the elements σ n and σ n+ from the generator h n+2 of T n+2 This is not a shortcome of the algorithm because most of the skew-symmetric Toeplitz matrices

3 that arise in applications are of the form we mentioned above (ie they appear as classes/sequences of matrices) as it is the case with the skew-symmetric Toeplitz matrices that appear in Sinc methods For example, in matrix S n of I n ( ) described in the introduction, σ k = k sinc(x)dx, and in matrix I () 0 n, σ k = ( )k k Thus, σ k is dened for all k Z + Also, we recall that Durbin and Levinson used similar teqchniques in their algorithms; ie, to solve H n x = b, where H n is an n n real symmetric Toeplitz matrix, they use H n+ Denition 23 Let A be an n n matrix The leading principal matrix of A of order k is the matrix formed from A by deleting the last n k columns and the last n k rows of A 3 Algorithms for Skew-Symmetric Toeplitz Matrices Throughout the rest of the paper, let k be even, and let T k be a k k real skew-symmetric Toeplitz matrix and assume T i, i {2, 3,, k} 2Z, is nonsingular (ie all leading principal matrices of T k of even order are nonsingular) We recall that Durbin and Levinson have stronger restrictions in their algorithms We note also that it happens sometimes that all even-order matrices of a family of skew-symmetric Toeplitz matrices are non-singular as it is the case with matrix S n of I n ( ) and matrix I n () For the proofs, see?,? Note that odd-order skewsymmetric (and odd-order skew-centrosymmetric matrices) are singular, and hence, it is essential to have a two-step algorithm that skips the odd-order matrices Thus, our algorithm is a two-step algorithm because it moves from order k to order k + 2 instead of moving from order k to order k + Now note that T k+2 can be written as T T k+2 = k J k R k Rk T J, k T 2 σ σ 2 where R k = Once again, in each step we will move from T k to T k+2 σ k σ k+ instead of T k+ We start with T 2 Now, we extend Durbin's algorithm If we know the solution of T k Y = R k, where Y is k 2, then we can know the solution of T k J k R k Z Rk Rk T J =, k T 2 W S k σk+ σ where Z is k 2, W is 2 2, and S k = k+2 Note that T σ k+2 σ k and J k are k+3 k k, R k and Z are k 2, and T 2 and S k are 2 2 Now note that T k Z + J k R k W = R k, and R T k J k Z + T 2 W = S k Thus, Z = Y + J k Y W and W = (T 2 Rk T Y ) (S k + Rk T J ky ) Note that T 2 Rk T Y is nonsingular, because Hk T T T k+2 H k = k 0 Y T J k T k Rk T J k T 2 Rk T Y, where H k = Ik J k Y 0 I 2

4 (Note that T k J k Y + J k R k = 0 and Y T J k T k J k Y + Y T R k = 0 also) Hence, det(t k+2 ) = det(t k ) det(t 2 Rk T Y ) Now since we are assuming T k+2 is nonsingular, then T 2 Rk T Y is nonsingular Thus, our O(n2 ) algorithm is (we note that the inverse we have to nd in this algorithm and in all other algorithms is for a 2 2 matrix): Algorithm : Input: n (an even positive integer), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 P k = (T 2 Rk T Y k) W k = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W k Zk Y k+2 = W k end for Output: Y n (the solution of T n Y n = R n, where T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T and R n is as before) It is easy to see that the running time of the previous algorithm is n 2 k=2 24k = 6n 2 + O(n) Remark: We remind the reader that we dene a op to be one addition or one multiplication, while some people dene it to be one addition and one multiplication If we dene the op to be one addition and one multiplication, then the running time of the previous algorithm will be almost half of the running time we have above Now we derive a Levinson-type algorithm Let B = b c b 2 c 2 b k c k Assume we have the solution of T k X = B, where X is k 2, and assume also we have the solution (from the previous algorithm) of T k Y = R k, where Y is k 2 Now, we want to solve the next even higher order equation: T k J k R k R T k J k T 2 V M = B C,

5 where V is k 2, M and C are 2 2, and C = T k V + J k R k M = B, R T k J k V + T 2 M = C bk+ c k+ Then, we will have b k+2 c k+2 Thus, V = X + J k Y M and M = (T 2 Rk T Y ) (C + Rk T J kx) Now, all we need to do is to execute the steps above in parallel with the steps for solving T k Y = R k Therefore, our O(n 2 ) algorithm is: Algorithm 2 (Classic Levinson-Type Algorithm): Input: n (an even positive integer), b = b b 2 b n T, c = c c 2 c n T (b and c are the vectors of constant terms), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 b2 /σ X 2 = c 2 /σ b /σ c /σ for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 P k = (T 2 R T k Y k ) W k = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W k M k = P k (C k + Rk T J kx k ) V k = X k + J k Y k M k Y k+2 = X k+2 = Zk W k Vk M k end for Output: X n (the solution of T n X n = B n, where B n = b, c and T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T ) It is easy to see that the running time of the previous algorithm is n 2 k=2 40k = 0n 2 + O(n) Note that our algorithm solves for two vectors of constant terms at once Ie if we want to solve T n x = b and T n y = c, where b and c are n and n is even, then we solve the system T n Z = D, where D is an n 2 matrix whose rst column is b and second column is c Then, x will be the rst column of Z and y the second column Solving T n Z = D by our method costs 0n 2 + O(n) Thus, obtaining x costs 5n 2 + O(n) and obtaining y has the same cost 4 Examples In the following example we solve (calculations are done by Octave which is a math-oriented programming language similar to MATLAB) S 6 X = D, where S 6 is

6 the 6 6 matrix of I ( ) mentioned in the introduction, ie S 6 = , D = , and the generator σ of S 8 is T Note that the inputs to the algorithm are 6, b, c, and σ, where b is the rst column of D and c is the second column of D Initializations: Y 2 = T 2 = Iterations: k = 2: X 2 = R 2 = S 2 = C 2 = e e + 00 P 2 = 2872e e W 2 = Z 2 = M 2 = V 2 =

7 k = 4: Y 4 = X 4 = R 4 = S 4 = C 4 = e e + 00 P 4 = 2270e e W 4 = Z 4 = M 4 = V 4 = Y 6 = X 6 =

8 End of Iterations The solution X is We note that the solution above is exactly the same as the solution obtained from solving the system using Maple The two solutions even match for a much higher number of decimal places As another example, we solve the system I () 8 X = D, where D is an 8 2 matrix whose rst solumn is the 8 zero vector (call this vector b) and whose second column is c = I () 8 e, where e is the 8 vector of ones; ie (rounded up to 6 digits) c = Note that D was chosen so that the true solution is the matrix whose rst column is the 8 zero vector and whose second column is the 8 vector of ones Solving the system by our algorithm with input 8, b, c, and σ, where σ = /2 /3 /4 /5 /6 /7 /8 /9, gives us the solution

9 5 Improved Algorithms First, we present a 4n 2 +O(n) Durbin-type algorithm The idea here is to reduce the cost of computing Rk T Y k Here we will use the same notation (but we will replace Y by Y k, Z by Z k and W by W k ) we used when we derived the rst two algorithms Now consider Rk T Y k = Rk 2 T Z k 2 ST k 2 W k 2 But, Z k 2 = Y k 2 + J k 2 Y k 2 W k 2 Thus, R T k Y k = R T k 2Y k 2 + (T 2 R T k 2Y k 2 )W 2 k 2 Therefore, we can use the previously computed values of W and R T Y to compute the new value of R T Y which we will call E Algorithm 3 (Classic Durbin-Type Algorithm): Input: n (an even positive integer), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 ) σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 σ σ R 2 = 2 E = R 2 T Y W = 0 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = S k = σ k σ k+ σk+ σ k+2 σ k+2 σ k+3 E = E + (T 2 E)W 2 P k = (T 2 E) W = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W Zk Y k+2 = W end for Output: Y n (the solution of T n Y n = R n, where T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T and R n is as before) It is easy to see that the running time of the previous algorithm is n 2 k=2 6k = 4n 2 + O(n) Algorithm 4 (Improved Classic Levinson-Type Algorithm): Input: n (an even positive integer), b = b b 2 b n T, c = c c 2 c n T (b and c are the vectors of constant terms), σ = σ σ 2 σ n+ T (a generator of a real skew-symmetric Toeplitz matrix T n+2 )

10 σ2 /σ Y 2 = σ 3 /σ σ 2 /σ 0 σ T 2 = σ 0 b2 /σ X 2 = c 2 /σ b /σ c /σ σ σ R 2 = 2 E = R 2 T Y W = 0 0 for k = 2,, n 2, step 2 Let J k be the counteridentity matrix of order k σ σ 2 R k = σ k σ k+ σk+ σ S k = k+2 σ k+2 σ k+3 E = E + (T 2 E)W 2 P k = (T 2 E) W = P k (S k + Rk T J ky k ) Z k = Y k + J k Y k W M k = P k (C k + Rk T J kx k ) V k = X k + J k Y k M k Zk Y k+2 = W Vk X k+2 = M k end for Output: X n (the solution of T n X n = B n, where B n = b, c and T n is the skew-symmetric Toeplitz matrix whose generator is σ σ 2 σ n T ) It is easy to see that the running time of the previous algorithm is n 2 k=2 32k = 8n 2 + O(n) Note that our algorithm solves for two vectors of constant terms at once Ie if we want to solve T n x = b and T n y = c, where b and c are n and n is even, then we solve the system T n Z = D, where D is an n 2 matrix whose rst column is b and second column is c Then, x will be the rst column of Z and y the second column Solving T n Z = D by our method costs 8n 2 + O(n) Thus, obtaining x costs 4n 2 + O(n) and obtaining y has the same cost Solving the rst system we solved in Section?? by the improved Levinson algorithm (using Octave) gives the same solution we got in that section All variables we get here are the same as those in that example except that we do not have W k here, and we have the following additional ones In the initializations part, we have R 2 =

11 555e e 0 E = 8742e 0 860e W = 0 0 When k = 2 in the iterations, we get 555e e 0 E = 8742e 0 860e W = When k = 4 in the iterations, we get 58234e e 0 E = 22553e 0 569e W = An Octave Program for the Improved Levinson-Type Algorithm We note that we do not have to compute the counteridentity matrix, J, in the program below We can write the program without it We included it in the program for the sake of clarity We note also that the program can be shortened if we use Octave's built-in functions and operators But, we decided to write it as above to make it easy to understand for readers who do not know Octave # ; function J = Counter(n) # usage: J = Counter(n) # description: Creates the counteridentity matrix of order n J=zeros(n); for i=:n J(i,n-i+)=; endfor; endfunction function Z = solve(sigma,d) # description : Solves the system T n Z = D, where n is even and # T n is a real skew-symmetric Toeplitz matrix generated by # sigma() sigma(2) sigma(n ) T # The input sigma = sigma() sigma(2) sigma(n + ) T # is the generator of T n+2 It is an (n + ) column vector # The input D is an n 2 matrix (matrix of constant terms) # usage: Z = solve(sigma,d) n = rows(sigma)- ; b = D(:,); # b is the rst column of D c = D(:,2); # c is the second column of D Y = -sigma(2)/sigma(),-sigma(3)/sigma();,sigma(2)/sigma(); T2 = 0,sigma();-sigma(),0;

12 X = -b(2)/sigma(),-c(2)/sigma();b()/sigma(),c()/sigma(); R = sigma(),sigma(2);sigma(2),sigma(3); E = R * Y; # The prime is used in Octave for transpose W = zeros(2,2); # W is the 2 2 zero matrix for k = 2:n-2 if (rem(k, 2)!= 0) continue; endif; R = zeros(k,2); for i=:k R(i,)=sigma(i); R(i,2) = sigma(i+); endfor; S = zeros(2,2); S(,) = sigma(k+); S(,2) = sigma(k+2); S(2,) = sigma(k+2); S(2,2) = sigma(k+3); C = zeros(2,2); C(,) = b(k+); C(2,) = b(k+2); C(,2) = c(k+); C(2,2) = c(k+2); J = Counter(k); E = E + (T2 - E) * W * W; P = inv(t2 - E); W = P * (S + R * J * Y); Z = Y + J * Y * W; M = P * (C + R * J * X); V = X + J * Y * M; Y = Z;W; X = V;M; endfor; Z = X; endfunction; References I T Abu-Jeib and T S Shores, On properties of matrix I ( ) of Sinc methods, New Zealand J Math 32 (2003) -0 2 D Delsarte and Y Genin, The split Levinson algorithm, IEEE Transactions on Acoustics Speech and Signal Processing ASSP-34 (986) P Gierke, PhD thesis, University of Nebraska-Lincoln, G Heinig and K Rost, Fast algorithms for skewsymmetric Toeplitz matrices, Toeplitz matrices and singular integral equations (Pobershau, 200) , Oper Theory Adv Appl, 35, Birkhäuser, Basel, J Lund and K Bowers, Sinc Methods for Quadrature and Dierential Equations, SIAM, Philadelphia, A Melman, The even-odd split Levinson algorithm for Toeplitz systems, SIAM J Matrix Anal Appl 23, (200)

13 7 A Melman, A two step even-odd split Levinson algorithm for Toeplitz systems, Linear Algebra Appl 338 (200) F Stenger, Numerical Methods Based on Sinc and Analytic Functions, Springer-Verlag, New York, F Stenger, Collocating convolutions, Math Comp 64 (995) F Stenger, Matrices of sinc methods, J Comput Appl Math 86 (997) Department of Mathematics and Computer Science, Fenton Hall, SUNY College at Fredonia, Fredonia, NY 4063, USA address: abu-jeib@csfredoniaedu

Direct Methods for linear systems Ax = b basic point: easy to solve triangular systems

Direct Methods for linear systems Ax = b basic point: easy to solve triangular systems NLA p.1/13 Direct Methods for linear systems Ax = b basic point: easy to solve triangular systems... 0 0 0 etc. a n 1,n 1 x n 1 = b n 1 a n 1,n x n solve a n,n x n = b n then back substitution: takes n

More information

Lecture 3: Factor models in modern portfolio choice

Lecture 3: Factor models in modern portfolio choice Lecture 3: Factor models in modern portfolio choice Prof. Massimo Guidolin Portfolio Management Spring 2016 Overview The inputs of portfolio problems Using the single index model Multi-index models Portfolio

More information

Markowitz portfolio theory

Markowitz portfolio theory Markowitz portfolio theory Farhad Amu, Marcus Millegård February 9, 2009 1 Introduction Optimizing a portfolio is a major area in nance. The objective is to maximize the yield and simultaneously minimize

More information

Some Bounds for the Singular Values of Matrices

Some Bounds for the Singular Values of Matrices Applied Mathematical Sciences, Vol., 007, no. 49, 443-449 Some Bounds for the Singular Values of Matrices Ramazan Turkmen and Haci Civciv Department of Mathematics, Faculty of Art and Science Selcuk University,

More information

ELEMENTS OF MATRIX MATHEMATICS

ELEMENTS OF MATRIX MATHEMATICS QRMC07 9/7/0 4:45 PM Page 5 CHAPTER SEVEN ELEMENTS OF MATRIX MATHEMATICS 7. AN INTRODUCTION TO MATRICES Investors frequently encounter situations involving numerous potential outcomes, many discrete periods

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

MAT 4250: Lecture 1 Eric Chung

MAT 4250: Lecture 1 Eric Chung 1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

Extend the ideas of Kan and Zhou paper on Optimal Portfolio Construction under parameter uncertainty

Extend the ideas of Kan and Zhou paper on Optimal Portfolio Construction under parameter uncertainty Extend the ideas of Kan and Zhou paper on Optimal Portfolio Construction under parameter uncertainty George Photiou Lincoln College University of Oxford A dissertation submitted in partial fulfilment for

More information

Exercise List: Proving convergence of the (Stochastic) Gradient Descent Method for the Least Squares Problem.

Exercise List: Proving convergence of the (Stochastic) Gradient Descent Method for the Least Squares Problem. Exercise List: Proving convergence of the (Stochastic) Gradient Descent Method for the Least Squares Problem. Robert M. Gower. October 3, 07 Introduction This is an exercise in proving the convergence

More information

Follow links Class Use and other Permissions. For more information, send to:

Follow links Class Use and other Permissions. For more information, send  to: COPYRIGHT NOTICE: : is published by Princeton University Press and copyrighted, 2009, by Princeton University Press. All rights reserved. No part of this book may be reproduced in any form by any electronic

More information

Chapter 14 : Statistical Inference 1. Note : Here the 4-th and 5-th editions of the text have different chapters, but the material is the same.

Chapter 14 : Statistical Inference 1. Note : Here the 4-th and 5-th editions of the text have different chapters, but the material is the same. Chapter 14 : Statistical Inference 1 Chapter 14 : Introduction to Statistical Inference Note : Here the 4-th and 5-th editions of the text have different chapters, but the material is the same. Data x

More information

1 Shapley-Shubik Model

1 Shapley-Shubik Model 1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i

More information

Determinants II Linear Algebra, Fall 2008

Determinants II Linear Algebra, Fall 2008 Determinants II Linear Algebra, Fall 2008 1 Basic Properties of Determinants Here are the basic properties of determinants which you proved in the exercises to the previous handout Theorem 1 Let A be an

More information

Adjusting Nominal Values to Real Values *

Adjusting Nominal Values to Real Values * OpenStax-CNX module: m48709 1 Adjusting Nominal Values to Real Values * OpenStax This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 4.0 By the end of this

More information

Polynomials * OpenStax

Polynomials * OpenStax OpenStax-CNX module: m51246 1 Polynomials * OpenStax This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 4.0 In this section students will: Abstract Identify

More information

NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE

NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE Trends in Mathematics - New Series Information Center for Mathematical Sciences Volume 13, Number 1, 011, pages 1 5 NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE YONGHOON

More information

Deterministic Income under a Stochastic Interest Rate

Deterministic Income under a Stochastic Interest Rate Deterministic Income under a Stochastic Interest Rate Julia Eisenberg, TU Vienna Scientic Day, 1 Agenda 1 Classical Problem: Maximizing Discounted Dividends in a Brownian Risk Model 2 Maximizing Discounted

More information

1 Answers to the Sept 08 macro prelim - Long Questions

1 Answers to the Sept 08 macro prelim - Long Questions Answers to the Sept 08 macro prelim - Long Questions. Suppose that a representative consumer receives an endowment of a non-storable consumption good. The endowment evolves exogenously according to ln

More information

MATH 141 (Extra Practice 1)

MATH 141 (Extra Practice 1) MATH 141 (Extra Practice 1) 1. If matrices A = w 0.5 3 2 values of y and w? and B = 4 1 y 2 are inverses of each other, what are the 2. The company that produces a toothpaste has a fixed costs of $5000.

More information

Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem

Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem Application of an Interval Backward Finite Difference Method for Solving the One-Dimensional Heat Conduction Problem Malgorzata A. Jankowska 1, Andrzej Marciniak 2 and Tomasz Hoffmann 2 1 Poznan University

More information

Simulating more interesting stochastic processes

Simulating more interesting stochastic processes Chapter 7 Simulating more interesting stochastic processes 7. Generating correlated random variables The lectures contained a lot of motivation and pictures. We'll boil everything down to pure algebra

More information

CS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0.

CS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0. CS134: Networks Spring 2017 Prof. Yaron Singer Section 0 1 Probability 1.1 Random Variables and Independence A real-valued random variable is a variable that can take each of a set of possible values in

More information

Computer Exercise 2 Simulation

Computer Exercise 2 Simulation Lund University with Lund Institute of Technology Valuation of Derivative Assets Centre for Mathematical Sciences, Mathematical Statistics Fall 2017 Computer Exercise 2 Simulation This lab deals with pricing

More information

SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) Syllabus for PEA (Mathematics), 2013

SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) Syllabus for PEA (Mathematics), 2013 SYLLABUS AND SAMPLE QUESTIONS FOR MSQE (Program Code: MQEK and MQED) 2013 Syllabus for PEA (Mathematics), 2013 Algebra: Binomial Theorem, AP, GP, HP, Exponential, Logarithmic Series, Sequence, Permutations

More information

Australian Journal of Basic and Applied Sciences. Conditional Maximum Likelihood Estimation For Survival Function Using Cox Model

Australian Journal of Basic and Applied Sciences. Conditional Maximum Likelihood Estimation For Survival Function Using Cox Model AENSI Journals Australian Journal of Basic and Applied Sciences Journal home page: wwwajbaswebcom Conditional Maximum Likelihood Estimation For Survival Function Using Cox Model Khawla Mustafa Sadiq University

More information

Introduction to Supply and Use Tables, part 3 Input-Output Tables 1

Introduction to Supply and Use Tables, part 3 Input-Output Tables 1 Introduction to Supply and Use Tables, part 3 Input-Output Tables 1 Introduction This paper continues the series dedicated to extending the contents of the Handbook Essential SNA: Building the Basics 2.

More information

Write legibly. Unreadable answers are worthless.

Write legibly. Unreadable answers are worthless. MMF 2021 Final Exam 1 December 2016. This is a closed-book exam: no books, no notes, no calculators, no phones, no tablets, no computers (of any kind) allowed. Do NOT turn this page over until you are

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

BOUNDS FOR THE LEAST SQUARES RESIDUAL USING SCALED TOTAL LEAST SQUARES

BOUNDS FOR THE LEAST SQUARES RESIDUAL USING SCALED TOTAL LEAST SQUARES BOUNDS FOR THE LEAST SQUARES RESIDUAL USING SCALED TOTAL LEAST SQUARES Christopher C. Paige School of Computer Science, McGill University Montreal, Quebec, Canada, H3A 2A7 paige@cs.mcgill.ca Zdeněk Strakoš

More information

Option Pricing Formula for Fuzzy Financial Market

Option Pricing Formula for Fuzzy Financial Market Journal of Uncertain Systems Vol.2, No., pp.7-2, 28 Online at: www.jus.org.uk Option Pricing Formula for Fuzzy Financial Market Zhongfeng Qin, Xiang Li Department of Mathematical Sciences Tsinghua University,

More information

Curriculum Map for Mathematics and Statistics MS (Predoctoral Studies in Mathematics) Pure* Math Applied** Math

Curriculum Map for Mathematics and Statistics MS (Predoctoral Studies in Mathematics) Pure* Math Applied** Math slkent@ysu.edu PHONE: 330-941-3302 Dept. Office Leave A Message MS (Predoctoral Studies in Mathematics) Pure* Math Applied** Math MATH 6980 Topology I MATH 6975 Complex Analysis I MATH 6965 Abstract Analysis

More information

Allocation of shared costs among decision making units: a DEA approach

Allocation of shared costs among decision making units: a DEA approach Computers & Operations Research 32 (2005) 2171 2178 www.elsevier.com/locate/dsw Allocation of shared costs among decision making units: a DEA approach Wade D. Cook a;, Joe Zhu b a Schulich School of Business,

More information

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu

Chapter 5 Finite Difference Methods. Math6911 W07, HM Zhu Chapter 5 Finite Difference Methods Math69 W07, HM Zhu References. Chapters 5 and 9, Brandimarte. Section 7.8, Hull 3. Chapter 7, Numerical analysis, Burden and Faires Outline Finite difference (FD) approximation

More information

Probability and Stochastics for finance-ii Prof. Joydeep Dutta Department of Humanities and Social Sciences Indian Institute of Technology, Kanpur

Probability and Stochastics for finance-ii Prof. Joydeep Dutta Department of Humanities and Social Sciences Indian Institute of Technology, Kanpur Probability and Stochastics for finance-ii Prof. Joydeep Dutta Department of Humanities and Social Sciences Indian Institute of Technology, Kanpur Lecture - 07 Mean-Variance Portfolio Optimization (Part-II)

More information

Chapter 10: Mixed strategies Nash equilibria, reaction curves and the equality of payoffs theorem

Chapter 10: Mixed strategies Nash equilibria, reaction curves and the equality of payoffs theorem Chapter 10: Mixed strategies Nash equilibria reaction curves and the equality of payoffs theorem Nash equilibrium: The concept of Nash equilibrium can be extended in a natural manner to the mixed strategies

More information

Financial Market Models. Lecture 1. One-period model of financial markets & hedging problems. Imperial College Business School

Financial Market Models. Lecture 1. One-period model of financial markets & hedging problems. Imperial College Business School Financial Market Models Lecture One-period model of financial markets & hedging problems One-period model of financial markets a 4 2a 3 3a 3 a 3 -a 4 2 Aims of section Introduce one-period model with finite

More information

The Binomial Theorem. Step 1 Expand the binomials in column 1 on a CAS and record the results in column 2 of a table like the one below.

The Binomial Theorem. Step 1 Expand the binomials in column 1 on a CAS and record the results in column 2 of a table like the one below. Lesson 13-6 Lesson 13-6 The Binomial Theorem Vocabulary binomial coeffi cients BIG IDEA The nth row of Pascal s Triangle contains the coeffi cients of the terms of (a + b) n. You have seen patterns involving

More information

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Lars Holden PhD, Managing director t: +47 22852672 Norwegian Computing Center, P. O. Box 114 Blindern, NO 0314 Oslo,

More information

Applications of Exponential Functions Group Activity 7 Business Project Week #10

Applications of Exponential Functions Group Activity 7 Business Project Week #10 Applications of Exponential Functions Group Activity 7 Business Project Week #10 In the last activity we looked at exponential functions. This week we will look at exponential functions as related to interest

More information

November 2006 LSE-CDAM

November 2006 LSE-CDAM NUMERICAL APPROACHES TO THE PRINCESS AND MONSTER GAME ON THE INTERVAL STEVE ALPERN, ROBBERT FOKKINK, ROY LINDELAUF, AND GEERT JAN OLSDER November 2006 LSE-CDAM-2006-18 London School of Economics, Houghton

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMSN50)

Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMSN50) Monte Carlo and Empirical Methods for Stochastic Inference (MASM11/FMSN50) Magnus Wiktorsson Centre for Mathematical Sciences Lund University, Sweden Lecture 2 Random number generation January 18, 2018

More information

Minimum Downside Volatility Indices

Minimum Downside Volatility Indices Minimum Downside Volatility Indices Timo Pfei er, Head of Research Lars Walter, Quantitative Research Analyst Daniel Wendelberger, Quantitative Research Analyst 18th July 2017 1 1 Introduction "Analyses

More information

PREPRINT 2007:3. Robust Portfolio Optimization CARL LINDBERG

PREPRINT 2007:3. Robust Portfolio Optimization CARL LINDBERG PREPRINT 27:3 Robust Portfolio Optimization CARL LINDBERG Department of Mathematical Sciences Division of Mathematical Statistics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY Göteborg Sweden 27

More information

A No-Arbitrage Theorem for Uncertain Stock Model

A No-Arbitrage Theorem for Uncertain Stock Model Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe

More information

On equation. Boris Bartolomé. January 25 th, Göttingen Universität & Institut de Mathémathiques de Bordeaux

On equation. Boris Bartolomé. January 25 th, Göttingen Universität & Institut de Mathémathiques de Bordeaux Göttingen Universität & Institut de Mathémathiques de Bordeaux Boris.Bartolome@mathematik.uni-goettingen.de Boris.Bartolome@math.u-bordeaux1.fr January 25 th, 2016 January 25 th, 2016 1 / 19 Overview 1

More information

symmys.com 3.2 Projection of the invariants to the investment horizon

symmys.com 3.2 Projection of the invariants to the investment horizon 122 3 Modeling the market In the swaption world the underlying rate (3.57) has a bounded range and thus it does not display the explosive pattern typical of a stock price. Therefore the swaption prices

More information

Math 101, Basic Algebra Author: Debra Griffin

Math 101, Basic Algebra Author: Debra Griffin Math 101, Basic Algebra Author: Debra Griffin Name Chapter 5 Factoring 5.1 Greatest Common Factor 2 GCF, factoring GCF, factoring common binomial factor 5.2 Factor by Grouping 5 5.3 Factoring Trinomials

More information

JDEP 384H: Numerical Methods in Business

JDEP 384H: Numerical Methods in Business Basic Financial Assets and Related Issues A Peek at Optimization Theory: Linear Programming Instructor: Thomas Shores Department of Mathematics Lecture 8, February 1, 2007 110 Kaufmann Center Instructor:

More information

(2/3) 3 ((1 7/8) 2 + 1/2) = (2/3) 3 ((8/8 7/8) 2 + 1/2) (Work from inner parentheses outward) = (2/3) 3 ((1/8) 2 + 1/2) = (8/27) (1/64 + 1/2)

(2/3) 3 ((1 7/8) 2 + 1/2) = (2/3) 3 ((8/8 7/8) 2 + 1/2) (Work from inner parentheses outward) = (2/3) 3 ((1/8) 2 + 1/2) = (8/27) (1/64 + 1/2) Exponents Problem: Show that 5. Solution: Remember, using our rules of exponents, 5 5, 5. Problems to Do: 1. Simplify each to a single fraction or number: (a) ( 1 ) 5 ( ) 5. And, since (b) + 9 + 1 5 /

More information

A RIDGE REGRESSION ESTIMATION APPROACH WHEN MULTICOLLINEARITY IS PRESENT

A RIDGE REGRESSION ESTIMATION APPROACH WHEN MULTICOLLINEARITY IS PRESENT Fundamental Journal of Applied Sciences Vol. 1, Issue 1, 016, Pages 19-3 This paper is available online at http://www.frdint.com/ Published online February 18, 016 A RIDGE REGRESSION ESTIMATION APPROACH

More information

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the

More information

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

A Bayesian Control Chart for the Coecient of Variation in the Case of Pooled Samples

A Bayesian Control Chart for the Coecient of Variation in the Case of Pooled Samples A Bayesian Control Chart for the Coecient of Variation in the Case of Pooled Samples R van Zyl a,, AJ van der Merwe b a PAREXEL International, Bloemfontein, South Africa b University of the Free State,

More information

Error Bounds for P-matrix Linear Complementarity Problems and Their Applications

Error Bounds for P-matrix Linear Complementarity Problems and Their Applications Error Bounds for P-matrix Linear Complementarity Problems and Their Applications Xiaojun Chen The Hong Kong Polytechnic University NPA2008, Beijing, 7-9 April Outline Computational Global Error Bounds

More information

MARKOWITS EFFICIENT PORTFOLIO (HUANG LITZENBERGER APPROACH)

MARKOWITS EFFICIENT PORTFOLIO (HUANG LITZENBERGER APPROACH) MARKOWITS EFFICIENT PORTFOLIO (HUANG LITZENBERGER APPROACH) Huang-Litzenberger approach allows us to find mathematically efficient set of portfolios Assumptions There are no limitations on the positions'

More information

The Binomial Model. Chapter 3

The Binomial Model. Chapter 3 Chapter 3 The Binomial Model In Chapter 1 the linear derivatives were considered. They were priced with static replication and payo tables. For the non-linear derivatives in Chapter 2 this will not work

More information

Generating all nite modular lattices of a given size

Generating all nite modular lattices of a given size Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

Optimization Methods. Lecture 16: Dynamic Programming

Optimization Methods. Lecture 16: Dynamic Programming 15.093 Optimization Methods Lecture 16: Dynamic Programming 1 Outline 1. The knapsack problem Slide 1. The traveling salesman problem 3. The general DP framework 4. Bellman equation 5. Optimal inventory

More information

2 Maximizing pro ts when marginal costs are increasing

2 Maximizing pro ts when marginal costs are increasing BEE14 { Basic Mathematics for Economists BEE15 { Introduction to Mathematical Economics Week 1, Lecture 1, Notes: Optimization II 3/12/21 Dieter Balkenborg Department of Economics University of Exeter

More information

Stochastic Proximal Algorithms with Applications to Online Image Recovery

Stochastic Proximal Algorithms with Applications to Online Image Recovery 1/24 Stochastic Proximal Algorithms with Applications to Online Image Recovery Patrick Louis Combettes 1 and Jean-Christophe Pesquet 2 1 Mathematics Department, North Carolina State University, Raleigh,

More information

High Volatility Medium Volatility /24/85 12/18/86

High Volatility Medium Volatility /24/85 12/18/86 Estimating Model Limitation in Financial Markets Malik Magdon-Ismail 1, Alexander Nicholson 2 and Yaser Abu-Mostafa 3 1 malik@work.caltech.edu 2 zander@work.caltech.edu 3 yaser@caltech.edu Learning Systems

More information

No-Arbitrage Conditions for a Finite Options System

No-Arbitrage Conditions for a Finite Options System No-Arbitrage Conditions for a Finite Options System Fabio Mercurio Financial Models, Banca IMI Abstract In this document we derive necessary and sufficient conditions for a finite system of option prices

More information

Equilibrium payoffs in finite games

Equilibrium payoffs in finite games Equilibrium payoffs in finite games Ehud Lehrer, Eilon Solan, Yannick Viossat To cite this version: Ehud Lehrer, Eilon Solan, Yannick Viossat. Equilibrium payoffs in finite games. Journal of Mathematical

More information

2.1 Mathematical Basis: Risk-Neutral Pricing

2.1 Mathematical Basis: Risk-Neutral Pricing Chapter Monte-Carlo Simulation.1 Mathematical Basis: Risk-Neutral Pricing Suppose that F T is the payoff at T for a European-type derivative f. Then the price at times t before T is given by f t = e r(t

More information

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization

More information

The Assignment Problem

The Assignment Problem The Assignment Problem E.A Dinic, M.A Kronrod Moscow State University Soviet Math.Dokl. 1969 January 30, 2012 1 Introduction Motivation Problem Definition 2 Motivation Problem Definition Outline 1 Introduction

More information

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017

Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 Ph.D. Preliminary Examination MICROECONOMIC THEORY Applied Economics Graduate Program June 2017 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

SCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT. BF360 Operations Research

SCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT. BF360 Operations Research SCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT BF360 Operations Research Unit 3 Moses Mwale e-mail: moses.mwale@ictar.ac.zm BF360 Operations Research Contents Unit 3: Sensitivity and Duality 3 3.1 Sensitivity

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

Math 546 Homework Problems. Due Wednesday, January 25. This homework has two types of problems.

Math 546 Homework Problems. Due Wednesday, January 25. This homework has two types of problems. Math 546 Homework 1 Due Wednesday, January 25. This homework has two types of problems. 546 Problems. All students (students enrolled in 546 and 701I) are required to turn these in. 701I Problems. Only

More information

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice. CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular

More information

Probability. An intro for calculus students P= Figure 1: A normal integral

Probability. An intro for calculus students P= Figure 1: A normal integral Probability An intro for calculus students.8.6.4.2 P=.87 2 3 4 Figure : A normal integral Suppose we flip a coin 2 times; what is the probability that we get more than 2 heads? Suppose we roll a six-sided

More information

Sandringham School Sixth Form. AS Maths. Bridging the gap

Sandringham School Sixth Form. AS Maths. Bridging the gap Sandringham School Sixth Form AS Maths Bridging the gap Section 1 - Factorising be able to factorise simple expressions be able to factorise quadratics The expression 4x + 8 can be written in factor form,

More information

A Fast Procedure for Transmission Loss Allocation of Power Systems by Using DC-OPF

A Fast Procedure for Transmission Loss Allocation of Power Systems by Using DC-OPF Bangladesh J. Sci. Ind. Res. 42(3), 249-256, 2007 Introduction A Fast Procedure for Transmission Loss Allocation of Power Systems by Using DC-OPF M. H. Kabir Department of Computer Science and Telecommunication

More information

Robust portfolio optimization

Robust portfolio optimization Robust portfolio optimization Carl Lindberg Department of Mathematical Sciences, Chalmers University of Technology and Göteborg University, Sweden e-mail: h.carl.n.lindberg@gmail.com Abstract It is widely

More information

Iterative Refinement in Three Precisions

Iterative Refinement in Three Precisions Iterative Refinement in Three Precisions for Research Fast and Accurate MattersSolution of Ill-Conditioned February Sparse 25, 2009 Linear Systems Nick Nick Higham Higham Director Schoolof ofresearch Mathematics

More information

Multivariate Statistics Lecture Notes. Stephen Ansolabehere

Multivariate Statistics Lecture Notes. Stephen Ansolabehere Multivariate Statistics Lecture Notes Stephen Ansolabehere Spring 2004 TOPICS. The Basic Regression Model 2. Regression Model in Matrix Algebra 3. Estimation 4. Inference and Prediction 5. Logit and Probit

More information

Worksheet A ALGEBRA PMT

Worksheet A ALGEBRA PMT Worksheet A 1 Find the quotient obtained in dividing a (x 3 + 2x 2 x 2) by (x + 1) b (x 3 + 2x 2 9x + 2) by (x 2) c (20 + x + 3x 2 + x 3 ) by (x + 4) d (2x 3 x 2 4x + 3) by (x 1) e (6x 3 19x 2 73x + 90)

More information

Technical Report Doc ID: TR April-2009 (Last revised: 02-June-2009)

Technical Report Doc ID: TR April-2009 (Last revised: 02-June-2009) Technical Report Doc ID: TR-1-2009. 14-April-2009 (Last revised: 02-June-2009) The homogeneous selfdual model algorithm for linear optimization. Author: Erling D. Andersen In this white paper we present

More information

Math 1070 Final Exam Practice Spring 2014

Math 1070 Final Exam Practice Spring 2014 University of Connecticut Department of Mathematics Math 1070 Practice Spring 2014 Name: Instructor Name: Section: Read This First! This is a closed notes, closed book exam. You can not receive aid on

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #24 Scribe: Jordan Ash May 1, 2014

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #24 Scribe: Jordan Ash May 1, 2014 COS 5: heoretical Machine Learning Lecturer: Rob Schapire Lecture #24 Scribe: Jordan Ash May, 204 Review of Game heory: Let M be a matrix with all elements in [0, ]. Mindy (called the row player) chooses

More information

arxiv: v1 [math.st] 18 Sep 2018

arxiv: v1 [math.st] 18 Sep 2018 Gram Charlier and Edgeworth expansion for sample variance arxiv:809.06668v [math.st] 8 Sep 08 Eric Benhamou,* A.I. SQUARE CONNECT, 35 Boulevard d Inkermann 900 Neuilly sur Seine, France and LAMSADE, Universit

More information

In terms of covariance the Markowitz portfolio optimisation problem is:

In terms of covariance the Markowitz portfolio optimisation problem is: Markowitz portfolio optimisation Solver To use Solver to solve the quadratic program associated with tracing out the efficient frontier (unconstrained efficient frontier UEF) in Markowitz portfolio optimisation

More information

MA 1125 Lecture 05 - Measures of Spread. Wednesday, September 6, Objectives: Introduce variance, standard deviation, range.

MA 1125 Lecture 05 - Measures of Spread. Wednesday, September 6, Objectives: Introduce variance, standard deviation, range. MA 115 Lecture 05 - Measures of Spread Wednesday, September 6, 017 Objectives: Introduce variance, standard deviation, range. 1. Measures of Spread In Lecture 04, we looked at several measures of central

More information

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role

More information

REMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7

REMARKS ON K3 SURFACES WITH NON-SYMPLECTIC AUTOMORPHISMS OF ORDER 7 REMARKS ON K3 SURFACES WTH NON-SYMPLECTC AUTOMORPHSMS OF ORDER 7 SHNGO TAK Abstract. n this note, we treat a pair of a K3 surface and a non-symplectic automorphism of order 7m (m = 1, 3 and 6) on it. We

More information

A way to improve incremental 2-norm condition estimation

A way to improve incremental 2-norm condition estimation A way to improve incremental 2-norm condition estimation Jurjen Duintjer Tebbens Institute of Computer Science Academy of Sciences of the Czech Republic duintjertebbens@cs.cas.cz Miroslav Tůma Institute

More information

A distributed Laplace transform algorithm for European options

A distributed Laplace transform algorithm for European options A distributed Laplace transform algorithm for European options 1 1 A. J. Davies, M. E. Honnor, C.-H. Lai, A. K. Parrott & S. Rout 1 Department of Physics, Astronomy and Mathematics, University of Hertfordshire,

More information

The rm can buy as many units of capital and labour as it wants at constant factor prices r and w. p = q. p = q

The rm can buy as many units of capital and labour as it wants at constant factor prices r and w. p = q. p = q 10 Homework Assignment 10 [1] Suppose a perfectly competitive, prot maximizing rm has only two inputs, capital and labour. The rm can buy as many units of capital and labour as it wants at constant factor

More information

Principles of Financial Computing

Principles of Financial Computing Principles of Financial Computing Prof. Yuh-Dauh Lyuu Dept. Computer Science & Information Engineering and Department of Finance National Taiwan University c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University

More information

Double Ore Extensions versus Iterated Ore Extensions

Double Ore Extensions versus Iterated Ore Extensions Double Ore Extensions versus Iterated Ore Extensions Paula A. A. B. Carvalho, Samuel A. Lopes and Jerzy Matczuk Departamento de Matemática Pura Faculdade de Ciências da Universidade do Porto R.Campo Alegre

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

Microeconomic Theory August 2013 Applied Economics. Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY. Applied Economics Graduate Program

Microeconomic Theory August 2013 Applied Economics. Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY. Applied Economics Graduate Program Ph.D. PRELIMINARY EXAMINATION MICROECONOMIC THEORY Applied Economics Graduate Program August 2013 The time limit for this exam is four hours. The exam has four sections. Each section includes two questions.

More information

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network 8 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 8 WeC34 Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking

More information