Given n points P in a Euclidean space, the Johnson-Lindenstrauss lemma guarantees that the distances between pairs of points is preserved up to a small constant factor with high probability by random projection into O(log n) dimensions. In this paper, we show that the persistent homology of the distance function to P is also preserved up to a comparable constant factor. One could never hope to preserve the distance function to P pointwise, but we show that it is preserved sufficiently at the critical points of the distance function to guarantee similar persistent homology. We prove these results in the more general setting of weighted k-th nearest neighbor distances, for which k=1 and all weights equal to zero gives the usual distance to P.
The document describes polar coordinates. Polar coordinates represent the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the positive x-axis and a line from O to P. θ is positive for counter-clockwise angles and negative for clockwise angles. The polar coordinate (r, θ) uniquely identifies the point P. Conversions between polar coordinates (r, θ) and rectangular coordinates (x, y) are given by the equations x=r*cos(θ), y=r*sin(θ), and r=√(x2+y2).
The document discusses calculating the area swept out by a polar function r=f(θ) between two angles θ=A and θ=B. It introduces the integral formula for finding this area, which is ∫f(θ)2dθ from A to B. It then provides examples of using this formula to calculate the areas of different polar curves, such as a circle, a cardioid, and a curve tracing a circle twice.
Polar coordinates provide an alternative way to specify the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the x-axis and a line from O to P. θ is measured counter-clockwise from the x-axis and can be either positive or negative. A point P's polar coordinates (r, θ) uniquely identify its location. Polar and rectangular coordinates can be converted between each using the relationships x=r*cos(θ), y=r*sin(θ), and r=√(x2+y2).
The document describes a control framework called the "stack of tasks" which provides hierarchical task-based control for real-time redundant manipulators. It allows implementation of a data flow graph controlled by Python scripting. Tasks are defined as functions of the robot configuration, time, and other parameters that should converge to zero. The framework computes joint velocities to minimize higher priority tasks while satisfying lower priority tasks when possible. It has been tested on robots including HRP-2, Nao, and Romeo.
This document presents algorithms for maintaining a topological ordering of vertices in a directed graph as edges are incrementally added. It begins by describing a simple "limited search" approach that takes O(m^2) time over all edge additions, where m is the number of edges. It then introduces several improved algorithms. A "two-way limited search" performs searches in both directions and takes O(m^{3/2} log n) time. A "semi-ordered search" relaxes constraints on the search order while still taking O(m^{3/2}) time. For dense graphs with m=Ω(n^2), a "topological search" approach balances vertices instead of edges and reorders vertices
The document discusses polar coordinates and graphs. Polar coordinates (r, θ) can be used to specify the location of a point P by giving the distance r from the origin and the angle θ. Conversion formulas allow changing between polar (r, θ) and rectangular (x, y) coordinates. Polar equations relate r and θ, and common ones like r = c (a circle) and θ = c (a line) are examined. Graphing polar equations involves plotting the r and θ values specified by the equation.
This document provides an overview of polar coordinates and complex numbers. It defines the polar coordinate system with a fixed point called the pole (O) and a fixed ray called the polar axis (OA). It explains that a point P has polar coordinates (r, θ) where r is the length of OP and θ is the angle measured from the polar axis. It shows examples of graphing points in the rθ plane and representing the same point in different ways based on the values of r and θ. Finally, it states that there are two basic types of polar equations: θ = k which represents a line and r = c which represents a circle.
35 tangent and arc length in polar coordinatesmath266
The document discusses parametric representations of polar curves. It begins by explaining that a rectangular curve given by y=f(x) can be parametrized as x=t and y=f(t). It then explains that a polar curve given by r=f(θ) can be parametrized as x=f(θ)cos(θ) and y=f(θ)sin(θ). Examples are given of parametrizing the Archimedean spiral r=θ and the cardioid r=1+sin(θ). Formulas are derived for calculating the slope of the tangent line to a polar curve at a given point in terms of r and θ. Examples are worked out for finding the slope
The document describes polar coordinates. Polar coordinates represent the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the positive x-axis and a line from O to P. θ is positive for counter-clockwise angles and negative for clockwise angles. The polar coordinate (r, θ) uniquely identifies the point P. Conversions between polar coordinates (r, θ) and rectangular coordinates (x, y) are given by the equations x=r*cos(θ), y=r*sin(θ), and r=√(x2+y2).
The document discusses calculating the area swept out by a polar function r=f(θ) between two angles θ=A and θ=B. It introduces the integral formula for finding this area, which is ∫f(θ)2dθ from A to B. It then provides examples of using this formula to calculate the areas of different polar curves, such as a circle, a cardioid, and a curve tracing a circle twice.
Polar coordinates provide an alternative way to specify the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the x-axis and a line from O to P. θ is measured counter-clockwise from the x-axis and can be either positive or negative. A point P's polar coordinates (r, θ) uniquely identify its location. Polar and rectangular coordinates can be converted between each using the relationships x=r*cos(θ), y=r*sin(θ), and r=√(x2+y2).
The document describes a control framework called the "stack of tasks" which provides hierarchical task-based control for real-time redundant manipulators. It allows implementation of a data flow graph controlled by Python scripting. Tasks are defined as functions of the robot configuration, time, and other parameters that should converge to zero. The framework computes joint velocities to minimize higher priority tasks while satisfying lower priority tasks when possible. It has been tested on robots including HRP-2, Nao, and Romeo.
This document presents algorithms for maintaining a topological ordering of vertices in a directed graph as edges are incrementally added. It begins by describing a simple "limited search" approach that takes O(m^2) time over all edge additions, where m is the number of edges. It then introduces several improved algorithms. A "two-way limited search" performs searches in both directions and takes O(m^{3/2} log n) time. A "semi-ordered search" relaxes constraints on the search order while still taking O(m^{3/2}) time. For dense graphs with m=Ω(n^2), a "topological search" approach balances vertices instead of edges and reorders vertices
The document discusses polar coordinates and graphs. Polar coordinates (r, θ) can be used to specify the location of a point P by giving the distance r from the origin and the angle θ. Conversion formulas allow changing between polar (r, θ) and rectangular (x, y) coordinates. Polar equations relate r and θ, and common ones like r = c (a circle) and θ = c (a line) are examined. Graphing polar equations involves plotting the r and θ values specified by the equation.
This document provides an overview of polar coordinates and complex numbers. It defines the polar coordinate system with a fixed point called the pole (O) and a fixed ray called the polar axis (OA). It explains that a point P has polar coordinates (r, θ) where r is the length of OP and θ is the angle measured from the polar axis. It shows examples of graphing points in the rθ plane and representing the same point in different ways based on the values of r and θ. Finally, it states that there are two basic types of polar equations: θ = k which represents a line and r = c which represents a circle.
35 tangent and arc length in polar coordinatesmath266
The document discusses parametric representations of polar curves. It begins by explaining that a rectangular curve given by y=f(x) can be parametrized as x=t and y=f(t). It then explains that a polar curve given by r=f(θ) can be parametrized as x=f(θ)cos(θ) and y=f(θ)sin(θ). Examples are given of parametrizing the Archimedean spiral r=θ and the cardioid r=1+sin(θ). Formulas are derived for calculating the slope of the tangent line to a polar curve at a given point in terms of r and θ. Examples are worked out for finding the slope
The polar coordinate system uses a point called the pole and a fixed ray called the polar axis to identify the location of a point P using polar coordinates (r, θ). R represents the distance from the pole to point P, while θ is the angle between the polar axis and a line extending from the pole to point P. Equations in polar coordinates take the form of r = k sinθ or r = j cosθ, where r is the distance and θ is the angle.
In this paper we have defined Dk
integral and proved the integration by parts formula.
Key Words and phrases: Absolutely Continuous function, Generalised absolutely continuous function,
Denjoy integration. 2000 Mathematics subject Classification: Primary 26A24 Secondary 26A21, 26A48,
44A10.
This document provides information about polar coordinates including:
- Relations between Cartesian and polar coordinates
- Sketching graphs in polar coordinates such as circles, cardioids, and roses
- Finding intersections of curves, slopes of tangents, and areas bounded by polar curves
- Computing arc lengths and surfaces of revolution generated by polar curves
It discusses key concepts like symmetry properties and provides examples of computing specific values related to polar curves.
A Commutative Alternative to Fractional Calculus on k-Differentiable FunctionsMatt Parker
This document presents a method for creating a commutative operator that acts parallel to fractional calculus operators on continuous functions. It defines spaces Ck that contain images of continuous functions and combines these into a space Cdiff that contains a subset isomorphic to the space of continuous functions C(R). An operator Dk is defined on Cdiff that commutes with itself and acts equivalently to fractional derivatives on C(R) up to the differentiability of the function. This provides a commutative alternative to fractional calculus on continuous functions.
This document contains the syllabus and introduction for a Theory of Computation course. The syllabus outlines 6 topics that will be covered in the course, including finite automata, context free languages, Turing machines, undecidability, and computational complexity. The introduction provides definitions and examples related to sets, relations, functions, languages, and formal proofs. It also gives an overview of basic set theory concepts such as unions, intersections, complements, and Cartesian products.
On complementarity in qec and quantum cryptographywtyru1989
The document discusses complementarity in quantum error correction and quantum cryptography. It begins with an introduction and outline. It then covers the Stinespring dilation theorem, purification of mixed states, conjugate/complementary channels, private quantum codes including for single qubits, and the complementarity of quantum codes. An example is also provided to illustrate complementarity between a swap channel and its conjugate.
The document discusses polar coordinates and graphs. It begins by explaining how polar coordinates (r, θ) track the location of a point P in the plane, where r is the distance from the origin and θ is the angle from the x-axis. It then provides the conversions between rectangular (x, y) and polar coordinates. The document gives examples of basic polar graphs for constant equations like r = c, which describes a circle, and θ = c, which describes a line. It concludes by explaining how to graph other polar equations using a polar graph paper.
The document discusses parametric equations, which describe the motion of a particle in a plane by giving its position (x, y) at time t as functions of t, known as parametric equations. Examples are provided of parametric equations defining circles, ellipses, and other curves. The parameter does not need to be time. Slopes of parametric curves can be found from the derivatives of the parametric equations with respect to t. Standard parameterizations of functions y=f(x) are also discussed.
The document describes polar coordinates, which specify the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the x-axis and a line from O to P measured counterclockwise. Conversion formulas between polar (r, θ) and rectangular (x, y) coordinates are provided. An example problem converts several polar coordinates to rectangular form and plots the points on a graph.
Code of the multidimensional fractional pseudo-Newton method using recursive ...mathsjournal
The following paper presents one way to define and classify the fractional pseudo-Newton method through a group of fractional matrix operators, as well as a code written in recursive programming to implement this method, which through minor modifications, can be implemented in any fractional fixed-point method that allows solving nonlinear algebraic equation systems.
Unit 2 analysis of continuous time signals-mcq questionsDr.SHANTHI K.G
The document discusses key concepts regarding continuous time signals and their analysis using Fourier transforms. Some key points covered include:
- The trigonometric Fourier series of an even function contains only cosine terms, while an odd function contains only sine terms. A half-wave symmetric signal contains only odd harmonic terms.
- For a signal to be represented by a Fourier series, it must satisfy Dirichlet conditions such as being absolutely integrable over its period.
- The Fourier transform of a continuous time signal x(t) is defined as X(jω)=∫x(t)e-jωtdt from -∞ to ∞. The inverse Fourier transform is defined as x(t)=1
This document discusses temporal graphs, which are graphs where nodes and edges are active for specific time instances. It provides examples of temporal graphs and compares them to non-temporal graphs. It then covers temporal graph traversal methods like depth-first search and breadth-first search, accounting for temporal constraints. Various path types in temporal graphs are defined, such as foremost paths, latest-departure paths, and fastest paths. Algorithms for finding these paths using a stream representation or graph transformation approach are outlined.
This document discusses calculating volumes of solids formed by rotating line segments in space. It provides formulas for finding horizontal and vertical distances between points on the real line and in the xy-plane. These distances are used to calculate areas of surfaces formed when line segments are revolved. Examples are provided to demonstrate expressing variables as functions of each other and finding horizontal and vertical distances between points on graphs of equations.
This document outlines various logical implication and inference laws including:
1. Modus ponens, modus tollens, modus tollendo ponens, addition, and simplification.
2. De Morgan's laws, exportation, conditional disjunction, association laws, biconditional laws, distributive laws, and contraposition.
3. It also discusses conmutative, conditional conjunction, and negation conditional laws as they relate to logical equivalences.
This online mathematics class document discusses set theory and proves that A - B = A - (A intersection B). It defines the sets A and B, takes the left hand side and right hand side of the equation, finds the intersection of A and B, and shows that the left and right sides are equal, proving the statement.
Beginnig with reviewing Basyain Theorem and chain rule, then explain MAP Estimation; Maximum A Posteriori Estimation.
In the framework of MAP Estimation, we can describe a lot of famous models; naive bayes, regularized redge regression, logistic regression, log-linear model, and gaussian process.
MAP estimation is powerful framework to understand the above models from baysian point of view and cast possibility to extend models to semi-supervised ones.
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
In this paper spaces of entire function represented by Dirichlet Series have been considered. A
norm has been introduced and a metric has been defined. Properties of this space and a characterization of
continuous linear functionals have been established.
Second order active RC blocks, known as biquads, are useful building blocks for filter design due to their simplicity and mathematical properties. The biquad transfer function has two pairs of complex conjugate poles and zeros. The poles are located in the left half of the s-plane to ensure stability, while the zeros can be located anywhere except the positive real axis. By adjusting the numerator coefficients, different types of filters can be designed, including low pass, high pass, band pass, band reject, all pass, and gain equalizers. The quality factors Q determine the selectivity and shape of the magnitude response curves for each type of filter.
The document describes a Prolog program for planning flight routes between locations on a given day. It defines predicates for finding direct and indirect flight routes based on a timetable database. The timetable stores flights between locations with departure and arrival times, flight numbers, and valid days. The route predicate uses the flight predicate to recursively find valid multi-segment routes that ensure a minimum transfer time between connections. Sample queries and timetable facts are provided to demonstrate the program's operation.
In this talk, I address two new ideas in sampling geometric objects. The first is a new take on adaptive sampling with respect to the local feature size, i.e., the distance to the medial axis. We recently proved that such samples acn be viewed as uniform samples with respect to an alternative metric on the Euclidean space. The second is a generalization of Voronoi refinement sampling. There, one also achieves an adaptive sample while simultaneously "discovering" the underlying sizing function. We show how to construct such samples that are spaced uniformly with respect to the $k$th nearest neighbor distance function.
Sensors and Samples: A Homological ApproachDon Sheehy
In their seminal work on homological sensor networks, de Silva and Ghrist showed the surprising fact that its possible to certify the coverage of a coordinate free sensor network even with very minimal knowledge of the space to be covered. We give a new, simpler proof of the de Silva-Ghrist Topological Coverage Criterion that eliminates any assumptions about the smoothness of the boundary of the underlying space, allowing the results to be applied to much more general problems. The new proof factors the geometric, topological, and combinatorial aspects of this approach. This factoring reveals an interesting new connection between the topological coverage condition and the notion of weak feature size in geometric sampling theory. We then apply this connection to the problem of showing that for a given scale, if one knows the number of connected components and the distance to the boundary, one can also infer the higher betti numbers or provide strong evidence that more samples are needed. This is in contrast to previous work which merely assumed a good sample and gives no guarantees if the sampling condition is not met.
The polar coordinate system uses a point called the pole and a fixed ray called the polar axis to identify the location of a point P using polar coordinates (r, θ). R represents the distance from the pole to point P, while θ is the angle between the polar axis and a line extending from the pole to point P. Equations in polar coordinates take the form of r = k sinθ or r = j cosθ, where r is the distance and θ is the angle.
In this paper we have defined Dk
integral and proved the integration by parts formula.
Key Words and phrases: Absolutely Continuous function, Generalised absolutely continuous function,
Denjoy integration. 2000 Mathematics subject Classification: Primary 26A24 Secondary 26A21, 26A48,
44A10.
This document provides information about polar coordinates including:
- Relations between Cartesian and polar coordinates
- Sketching graphs in polar coordinates such as circles, cardioids, and roses
- Finding intersections of curves, slopes of tangents, and areas bounded by polar curves
- Computing arc lengths and surfaces of revolution generated by polar curves
It discusses key concepts like symmetry properties and provides examples of computing specific values related to polar curves.
A Commutative Alternative to Fractional Calculus on k-Differentiable FunctionsMatt Parker
This document presents a method for creating a commutative operator that acts parallel to fractional calculus operators on continuous functions. It defines spaces Ck that contain images of continuous functions and combines these into a space Cdiff that contains a subset isomorphic to the space of continuous functions C(R). An operator Dk is defined on Cdiff that commutes with itself and acts equivalently to fractional derivatives on C(R) up to the differentiability of the function. This provides a commutative alternative to fractional calculus on continuous functions.
This document contains the syllabus and introduction for a Theory of Computation course. The syllabus outlines 6 topics that will be covered in the course, including finite automata, context free languages, Turing machines, undecidability, and computational complexity. The introduction provides definitions and examples related to sets, relations, functions, languages, and formal proofs. It also gives an overview of basic set theory concepts such as unions, intersections, complements, and Cartesian products.
On complementarity in qec and quantum cryptographywtyru1989
The document discusses complementarity in quantum error correction and quantum cryptography. It begins with an introduction and outline. It then covers the Stinespring dilation theorem, purification of mixed states, conjugate/complementary channels, private quantum codes including for single qubits, and the complementarity of quantum codes. An example is also provided to illustrate complementarity between a swap channel and its conjugate.
The document discusses polar coordinates and graphs. It begins by explaining how polar coordinates (r, θ) track the location of a point P in the plane, where r is the distance from the origin and θ is the angle from the x-axis. It then provides the conversions between rectangular (x, y) and polar coordinates. The document gives examples of basic polar graphs for constant equations like r = c, which describes a circle, and θ = c, which describes a line. It concludes by explaining how to graph other polar equations using a polar graph paper.
The document discusses parametric equations, which describe the motion of a particle in a plane by giving its position (x, y) at time t as functions of t, known as parametric equations. Examples are provided of parametric equations defining circles, ellipses, and other curves. The parameter does not need to be time. Slopes of parametric curves can be found from the derivatives of the parametric equations with respect to t. Standard parameterizations of functions y=f(x) are also discussed.
The document describes polar coordinates, which specify the location of a point P in a plane using two numbers: r, the distance from P to the origin O, and θ, the angle between the x-axis and a line from O to P measured counterclockwise. Conversion formulas between polar (r, θ) and rectangular (x, y) coordinates are provided. An example problem converts several polar coordinates to rectangular form and plots the points on a graph.
Code of the multidimensional fractional pseudo-Newton method using recursive ...mathsjournal
The following paper presents one way to define and classify the fractional pseudo-Newton method through a group of fractional matrix operators, as well as a code written in recursive programming to implement this method, which through minor modifications, can be implemented in any fractional fixed-point method that allows solving nonlinear algebraic equation systems.
Unit 2 analysis of continuous time signals-mcq questionsDr.SHANTHI K.G
The document discusses key concepts regarding continuous time signals and their analysis using Fourier transforms. Some key points covered include:
- The trigonometric Fourier series of an even function contains only cosine terms, while an odd function contains only sine terms. A half-wave symmetric signal contains only odd harmonic terms.
- For a signal to be represented by a Fourier series, it must satisfy Dirichlet conditions such as being absolutely integrable over its period.
- The Fourier transform of a continuous time signal x(t) is defined as X(jω)=∫x(t)e-jωtdt from -∞ to ∞. The inverse Fourier transform is defined as x(t)=1
This document discusses temporal graphs, which are graphs where nodes and edges are active for specific time instances. It provides examples of temporal graphs and compares them to non-temporal graphs. It then covers temporal graph traversal methods like depth-first search and breadth-first search, accounting for temporal constraints. Various path types in temporal graphs are defined, such as foremost paths, latest-departure paths, and fastest paths. Algorithms for finding these paths using a stream representation or graph transformation approach are outlined.
This document discusses calculating volumes of solids formed by rotating line segments in space. It provides formulas for finding horizontal and vertical distances between points on the real line and in the xy-plane. These distances are used to calculate areas of surfaces formed when line segments are revolved. Examples are provided to demonstrate expressing variables as functions of each other and finding horizontal and vertical distances between points on graphs of equations.
This document outlines various logical implication and inference laws including:
1. Modus ponens, modus tollens, modus tollendo ponens, addition, and simplification.
2. De Morgan's laws, exportation, conditional disjunction, association laws, biconditional laws, distributive laws, and contraposition.
3. It also discusses conmutative, conditional conjunction, and negation conditional laws as they relate to logical equivalences.
This online mathematics class document discusses set theory and proves that A - B = A - (A intersection B). It defines the sets A and B, takes the left hand side and right hand side of the equation, finds the intersection of A and B, and shows that the left and right sides are equal, proving the statement.
Beginnig with reviewing Basyain Theorem and chain rule, then explain MAP Estimation; Maximum A Posteriori Estimation.
In the framework of MAP Estimation, we can describe a lot of famous models; naive bayes, regularized redge regression, logistic regression, log-linear model, and gaussian process.
MAP estimation is powerful framework to understand the above models from baysian point of view and cast possibility to extend models to semi-supervised ones.
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
In this paper spaces of entire function represented by Dirichlet Series have been considered. A
norm has been introduced and a metric has been defined. Properties of this space and a characterization of
continuous linear functionals have been established.
Second order active RC blocks, known as biquads, are useful building blocks for filter design due to their simplicity and mathematical properties. The biquad transfer function has two pairs of complex conjugate poles and zeros. The poles are located in the left half of the s-plane to ensure stability, while the zeros can be located anywhere except the positive real axis. By adjusting the numerator coefficients, different types of filters can be designed, including low pass, high pass, band pass, band reject, all pass, and gain equalizers. The quality factors Q determine the selectivity and shape of the magnitude response curves for each type of filter.
The document describes a Prolog program for planning flight routes between locations on a given day. It defines predicates for finding direct and indirect flight routes based on a timetable database. The timetable stores flights between locations with departure and arrival times, flight numbers, and valid days. The route predicate uses the flight predicate to recursively find valid multi-segment routes that ensure a minimum transfer time between connections. Sample queries and timetable facts are provided to demonstrate the program's operation.
In this talk, I address two new ideas in sampling geometric objects. The first is a new take on adaptive sampling with respect to the local feature size, i.e., the distance to the medial axis. We recently proved that such samples acn be viewed as uniform samples with respect to an alternative metric on the Euclidean space. The second is a generalization of Voronoi refinement sampling. There, one also achieves an adaptive sample while simultaneously "discovering" the underlying sizing function. We show how to construct such samples that are spaced uniformly with respect to the $k$th nearest neighbor distance function.
Sensors and Samples: A Homological ApproachDon Sheehy
In their seminal work on homological sensor networks, de Silva and Ghrist showed the surprising fact that its possible to certify the coverage of a coordinate free sensor network even with very minimal knowledge of the space to be covered. We give a new, simpler proof of the de Silva-Ghrist Topological Coverage Criterion that eliminates any assumptions about the smoothness of the boundary of the underlying space, allowing the results to be applied to much more general problems. The new proof factors the geometric, topological, and combinatorial aspects of this approach. This factoring reveals an interesting new connection between the topological coverage condition and the notion of weak feature size in geometric sampling theory. We then apply this connection to the problem of showing that for a given scale, if one knows the number of connected components and the distance to the boundary, one can also infer the higher betti numbers or provide strong evidence that more samples are needed. This is in contrast to previous work which merely assumed a good sample and gives no guarantees if the sampling condition is not met.
Characterizing the Distortion of Some Simple Euclidean EmbeddingsDon Sheehy
This talk addresses some upper and lower bounds techniques for bounding the distortion between mappings between Euclidean metric spaces including circles, spheres, pairs of lines, triples of planes, and the union of a hyperplane and a point.
Talk at CIRM on Poisson equation and debiasing techniquesPierre Jacob
- The document discusses debiasing techniques for Markov chain Monte Carlo (MCMC) algorithms.
- It introduces the concept of "fishy functions" which are solutions to Poisson's equation and can be used for control variates to reduce bias and variance in MCMC estimators.
- The document outlines different sections including revisiting unbiased estimation through Poisson's equation, asymptotic variance estimation using a novel "fishy function" estimator, and experiments on different examples.
Construction of BIBD’s Using Quadratic Residuesiosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Approximate Nearest Neighbour in Higher DimensionsShrey Verma
This document discusses approximate nearest neighbor (ANN) search in high dimensional spaces. It begins by introducing the ANN problem and noting the "curse of dimensionality" that makes exact searches inefficient in high dimensions. It then discusses constructing a (1+ε)-approximate NN data structure for the Hamming cube using locality sensitive hashing (LSH). The data structure uses O(dn + n1+ρ) space and O(nρ) hash probes per query, where ρ depends on sensitivity properties of the hash family. The document also discusses using LSH for ANN search in Euclidean spaces by projecting points to random lines, using multiple projections to amplify probabilities of nearby points hashing to the same value.
On maximal and variational Fourier restrictionVjekoslavKovac1
Workshop talk slides, Follow-up workshop to trimester program "Harmonic Analysis and Partial Differential Equations", Hausdorff Institute, Bonn, May 2019.
The document discusses harmonic maps from the Riemann surface M=S1×R or CP1\{0,1,∞} into the complex projective space CPn. It presents the DPW method for constructing harmonic maps using loop groups. Specifically, it constructs equivariant harmonic maps in CPn from degree one potentials in the loop algebra Λgσ, relating these to whether the maps are isotropic, weakly conformal, or non-conformal. It then considers the system of ODEs and scalar ODE that must be solved to generate the harmonic maps using this method.
Algorithm Design and Complexity - Course 11Traian Rebedea
This document discusses algorithms for solving the all-pairs shortest paths (APSP) problem. It begins by defining the problem and describing the input as a weighted graph. It then discusses several approaches to solving APSP, including using single-source shortest path algorithms repeatedly, and specialized dynamic programming algorithms like Floyd-Warshall and Johnson's algorithm. Floyd-Warshall finds shortest paths by considering intermediate vertices between pairs of vertices. It works in O(n3) time and space for a graph with n vertices. Johnson's algorithm improves the running time for sparse graphs with negative weights.
Scattering theory analogues of several classical estimates in Fourier analysisVjekoslavKovac1
This document summarizes some classical estimates in Fourier analysis and their analogues in nonlinear Fourier analysis. It discusses Carleson's theorem on convergence of Fourier series and Fourier transforms, Hausdorff-Young inequalities bounding Lp norms, and results on lacunary trigonometric series and products. Open questions are presented about extending these classical estimates to the nonlinear setting of the SU(1,1) Fourier transform and lacunary SU(1,1) trigonometric products.
Variants of the Christ-Kiselev lemma and an application to the maximal Fourie...VjekoslavKovac1
1. The document discusses variants of the Christ-Kiselev lemma and its application to maximal Fourier restriction estimates.
2. The Christ-Kiselev lemma allows block-diagonal and block-triangular truncations of operators while controlling their operator norms.
3. These lemmas can be used to prove maximal and variational estimates for the restriction of the Fourier transform to surfaces, which has applications in harmonic analysis.
The document discusses statistical representation of random inputs in continuum models. It provides examples of representing random fields using the Karhunen-Loeve expansion, which expresses a random field as the sum of orthogonal deterministic basis functions and random variables. Common choices for the covariance function in the expansion include the radial basis function and limiting cases of fully correlated and uncorrelated fields. The covariance function can be approximated from samples of the random field to enable representation in applications.
Classification with mixtures of curved Mahalanobis metricsFrank Nielsen
This document discusses curved Mahalanobis distances in Cayley-Klein geometries and their application to classification. Specifically:
1. It introduces Mahalanobis distances and generalizes them to curved distances in Cayley-Klein geometries, which can model both elliptic and hyperbolic geometries.
2. It describes how to learn these curved Mahalanobis metrics using an adaptation of Large Margin Nearest Neighbors (LMNN) to the elliptic and hyperbolic cases.
3. Experimental results on several datasets show that curved Mahalanobis distances can achieve comparable or better classification accuracy than standard Mahalanobis distances.
One of many important generalizations of ordinary Voronoi diagrams is the higher-order Voronoi diagram. The order-k Voronoi diagram is the partitioning of the plane into regions, such that each point within a fixed region has the same k nearest sites. Many algorithms have been developed that construct the higher-order Voronoi diagram of point-sites. In this talk we will discuss randomized algorithms that can be used for a larger class of sites—specifically, polygonal objects and the abstract setting. We describe the algorithms in combinatorial rather than geometric terms, which makes it possible to construct higher-order Voronoi diagrams that have bisectors satisfying certain combinatorial properties.
This document summarizes two algorithms for computing properties of high-dimensional polytopes given access to certain oracle functions:
1. An algorithm for computing the edge-skeleton of a polytope in oracle polynomial-time using an oracle that returns the vertex maximizing a linear function.
2. A randomized algorithm for approximating the volume of a polytope by generating random points within it using a hit-and-run process, and estimating the volume from these points. The algorithm runs in oracle polynomial-time and provides an approximation with high probability.
Experimental results show the volume algorithm can approximate volumes of polytopes up to 100 dimensions within 1% error in under 2 hours, outperforming exact
This document summarizes research on quantum chaos, including the principle of uniform semiclassical condensation of Wigner functions, spectral statistics in mixed systems, and dynamical localization of chaotic eigenstates. It discusses how in the semiclassical limit, Wigner functions condense uniformly on classical invariant components. For mixed systems, the spectrum can be seen as a superposition of regular and chaotic level sequences. Localization effects can be observed if the Heisenberg time is shorter than the classical diffusion time. The document presents an analytical formula called BRB that describes the transition between Poisson and random matrix statistics. An example is given of applying this to analyze the level spacing distribution for a billiard system.
Slides: Total Jensen divergences: Definition, Properties and k-Means++ Cluste...Frank Nielsen
The document defines total Jensen divergences, which are a generalization of total Bregman divergences. Total Jensen divergences incorporate a double-sided conformal factor that makes them invariant to rotations. They reduce to total Bregman divergences when distributions are close. The square root of the total Jensen-Shannon divergence is not a metric. Jensen centroids are not always robust. However, total Jensen k-means++ clustering does not require calculating centroids and provides approximation guarantees.
- An NFA can be converted to an equivalent DFA using the subset construction. This involves constructing states of the DFA that correspond to subsets of states of the NFA.
- The subset construction results in an exponential blow-up in the number of states between the NFA and DFA. There is an NFA with n+1 states that requires a DFA with at least 2^n states.
- An epsilon-NFA (ε-NFA) allows epsilon transitions and can be converted to an equivalent DFA using a similar subset construction approach.
Wits Node Seminar: Dr Sunandan Gangopadhyay (NITheP Stellenbosch)
TITLE: Path integral action of a particle in the noncommutative plane and the Aharonov-Bohm effect
Similar to The Persistent Homology of Distance Functions under Random Projection (20)
Persistent Homology and Nested DissectionDon Sheehy
The document discusses using nested dissection and geometric separators to speed up computations of persistent homology. It proposes combining mesh filtrations, geometric separators, nested dissection, and output-sensitive persistence algorithms. This would allow beating the matrix multiplication time bound for computing persistent homology of functions defined on well-spaced point clouds. The technique exploits properties of meshes and separators to allow choosing a pivot order that improves the computation time.
In this talk, I give a gentle introduction to geometric and topological data analysis and then segue into some natural questions that arise when one combines the topological view with the perhaps more well-studied linear algebraic view.
Geometric Separators and the Parabolic LiftDon Sheehy
We present a simplification of the geometric separator algorithm of Miller and Thurston that uses parabolic lifting rather than stereographic projection. The result entirely eliminates the middle phase of that algorithm, which finds a conformal transformation to arrange the points nicely on the sphere.
A New Approach to Output-Sensitive Voronoi Diagrams and Delaunay TriangulationsDon Sheehy
We describe a new algorithm for computing the Voronoi diagram of a set of $n$ points in constant-dimensional Euclidean space. The running time of our algorithm is $O(f \log n \log \spread)$ where $f$ is the output complexity of the Voronoi diagram and $\spread$ is the spread of the input, the ratio of largest to smallest pairwise distances. Despite the simplicity of the algorithm and its analysis, it improves on the state of the art for all inputs with polynomial spread and near-linear output size. The key idea is to first build the Voronoi diagram of a superset of the input points using ideas from Voronoi refinement mesh generation. Then, the extra points are removed in a straightforward way that allows the total work to be bounded in terms of the output complexity, yielding the output sensitive bound. The removal only involves local flips and is inspired by kinetic data structures.
The word optimal is used in different ways in mesh generation. It could mean that the output is in some sense, "the best mesh" or that the algorithm is, by some measure, "the best algorithm". One might hope that the best algorithm also produces the best mesh, but maybe some tradeoffs are necessary. In this talk, I will survey several different notions of optimality in mesh generation and explore the different tradeoffs between them. The bias will be towards Delaunay/Voronoi methods.
Output-Sensitive Voronoi Diagrams and Delaunay Triangulations Don Sheehy
Voronoi diagrams and their duals, Delaunay triangulations, are used in many areas of computing and the sciences. Starting in 3-dimensions, there is a substantial (i.e. polynomial) difference between the best case and the worst case complexity of these objects when starting with n points. This motivates the search for algorithms that are output-senstiive rather than relying only on worst-case guarantees. In this talk, I will describe a simple, new algorithm for computing Voronoi diagrams in d-dimensions that runs in O(f log n log spread) time, where f is the output size and the spread of the input points is the ratio of the diameter to the closest pair distance. For a wide range of inputs, this is the best known algorithm. The algorithm is novel in the that it turns the classic algorithm of Delaunay refinement for mesh generation on its head, working backwards from a quality mesh to the Delaunay triangulation of the input. Along the way, we will see instances of several other classic problems for which no higher-dimensional results are known, including kinetic convex hulls and splitting Delaunay triangulations.
Mesh Generation and Topological Data AnalysisDon Sheehy
The document discusses mesh generation as a preprocessing step for topological data analysis (TDA). It describes how mesh generation can be used to decompose a domain into simple elements to approximate functions and compute persistence diagrams. Specifically, generating a quality Voronoi mesh allows the Voronoi filtration to approximate the sublevel filtration of the function and provide a good approximation of the persistence diagram. While meshing may not seem like an obvious approach for TDA, the document argues it can provide the necessary geometric and topological guarantees to make it a valid preprocessing step.
SOCG: Linear-Size Approximations to the Vietoris-Rips FiltrationDon Sheehy
The document describes the Vietoris-Rips filtration, which encodes the topology of a metric space when viewed at different scales. It introduces two tricks to create a linear-size approximation of the Vietoris-Rips filtration: 1) embedding the zigzag filtration in a topologically equivalent standard filtration, and 2) perturbing the metric so that the persistence module does not zigzag. The result is that given a metric space with n points, there exists a zigzag filtration of size O(n) whose persistence diagram approximates that of the Rips filtration. It then describes how to construct this approximating zigzag filtration using net trees and projecting the metric space onto a Delone set.
Linear-Size Approximations to the Vietoris-Rips Filtration - Presented at Uni...Don Sheehy
This document describes a method for approximating the Vietoris-Rips filtration of a finite metric space using a zigzag filtration. The method involves two key steps: 1) embedding the zigzag filtration in a topologically equivalent standard filtration, and 2) perturbing the metric so that the persistence module does not zigzag at the homology level. The result is that given a metric space with n points, there exists a zigzag filtration of size O(n) whose persistence diagram (1+ε)-approximates that of the Rips filtration. This provides a linear-size approximation to compute topological persistence for large data sets.
Often, high dimensional data lie
close to a low-dimensional submanifold and it is of interest to understand the geometry of these submanifolds.
The homology groups of a manifold are important topological invariants that provide an algebraic summary of the manifold.
These groups contain rich topological information, for instance, about the connected components, holes, tunnels and sometimes the dimension of the manifold.
In this paper, we consider the statistical problem of estimating the homology of a manifold from noisy samples under several different noise models.
We derive upper and lower bounds on the minimax risk for this problem.
Our upper bounds are based on estimators which are constructed from a union of balls of appropriate radius around carefully selected points.
In each case we establish complementary lower bounds using Le Cam's lemma.
A Multicover Nerve for Geometric InferenceDon Sheehy
We show that filtering the barycentric decomposition of a Cech complex by the cardinality of the vertices captures precisely the topology of k-covered regions among a collection of balls for all values of k.
Moreover, we relate this result to the Vietoris-Rips complex to get an approximation in terms of the persistent homology.
ATMCS: Linear-Size Approximations to the Vietoris-Rips FiltrationDon Sheehy
1) The paper presents a method to approximate the Vietoris-Rips filtration using a zigzag filtration of linear size.
2) It embeds the zigzag filtration into an equivalent standard filtration and perturbs the metric so that the zigzag does not occur at the homology level.
3) This results in a zigzag filtration of size O(n) whose persistence diagram provides a (1+ε)-approximation of the persistence diagram for the Vietoris-Rips filtration.
New Bounds on the Size of Optimal MeshesDon Sheehy
The document discusses mesh generation, which involves decomposing a domain into simple elements like triangles or tetrahedra. An optimal mesh has good element quality, conforms to the input domain, and uses the minimum number of points needed to make all Voronoi cells sufficiently "fat" or well-shaped according to metrics like radius-edge ratios. The talk presents analysis showing that the optimal mesh size is determined by the "feature size measure" of the input points, which involves the distance to each point's second nearest neighbor.
In this talk, we will be looking at a basic primitive in computational geometry, the flip. Also known as bistellar flips, edge-flips, rotations, and Pachner moves, this local change operation has been discovered and rediscovered in a variety of fields (thus the many names) and has proven useful both as an algorithmic tool as well as a proof technology. For algorithm designers working outside of computational geometry, one can consider the flip move as a higher dimensional analog of the tree rotations used in binary trees. I will survey some of the most important results about flips with an emphasis on developing a general geometric intuition that has led to many advances.
Beating the Spread: Time-Optimal Point MeshingDon Sheehy
We present NetMesh, a new algorithm that produces a conforming Delaunay mesh for point sets in any fixed dimension with guaranteed optimal mesh size and quality.
Our comparison based algorithm runs in time $O(n\log n + m)$, where $n$ is the input size and $m$ is the output size, and with constants depending only on the dimension and the desired element quality bounds.
It can terminate early in $O(n\log n)$ time returning a $O(n)$ size Voronoi diagram of a superset of $P$ with a relaxed quality bound, which again matches the known lower bounds.
The previous best results in the comparison model depended on the log of the <b>spread</b> of the input, the ratio of the largest to smallest pairwise distance among input points.
We reduce this dependence to $O(\log n)$ by using a sequence of $\epsilon$-nets to determine input insertion order in an incremental Voronoi diagram.
We generate a hierarchy of well-spaced meshes and use these to show that the complexity of the Voronoi diagram stays linear in the number of points throughout the construction.
Here's a toy problem: What is the SMALLEST number of unit balls you can fit in a box such that no more will fit?
In this talk, I will show how just thinking about a naive greedy approach to this problem leads to a simple derivation of several of the most important theoretical results in the field of mesh generation.
We'll prove classic upper and lower bounds on both the number of balls and the complexity of their interrelationships.
Then, we'll relate this problem to a similar one called the Fat Voronoi Problem, in which we try to find point sets such that every Voronoi cell is fat
(the ratio of the radii of the largest contained to smallest containing ball is bounded).
This problem has tremendous promise in the future of mesh generation as it can circumvent the classic lowerbounds presented in the first half of the talk.
Unfortunately the simple approach no longer works.
In the end we will show that the number of neighbors of any cell in a Fat Voronoi Diagram in the plane is bounded by a constant
(if you think that's obvious, spend a minute to try to prove it).
We'll also talk a little about the higher dimensional version of the problem and its wide range of applications.
What is the difference between a mesh and a net?
What is the difference between a metric space epsilon-net and a range space epsilon-net?
What is the difference between geometric divide-and-conquer and combinatorial divide-and-conquer?
In this talk, I will answer these questions and discuss how these different ideas come together to finally settle the question of how to compute conforming point set meshes in optimal time. The meshing problem is to discretize space into as few pieces as possible and yet still capture the underlying density of the input points. Meshes are fundamental in scientific computing, graphics, and more recently, topological data analysis.
This is joint work with Gary Miller and Todd Phillips
In topological inference, the goal is to extract information about a shape, given only a sample of points from it. There are many approaches to this problem, but the one we focus on is persistent homology. We get a view of the data at different scales by imagining the points are balls and consider different radii. The shape information we want comes in the form of a persistence diagram, which describes the components, cycles, bubbles, etc in the space that persist over a range of different scales.
To actually compute a persistence diagram in the geometric setting, previous work required complexes of size n^O(d). We reduce this complexity to O(n) (hiding some large constants depending on d) by using ideas from mesh generation.
This talk will not assume any knowledge of topology. This is joint work with Gary Miller, Benoit Hudson, and Steve Oudot.
In topological inference, the goal is to extract information about a shape, given only a sample of points from it. There are many approaches to this problem, but the one we focus on is persistent homology. We get a view of the data at different scales by imagining the points are balls and consider different radii. The shape information we want comes in the form of a persistence diagram, which describes the components, cycles, bubbles, etc in the space that persist over a range of different scales.
To actually compute a persistence diagram in the geometric setting, previous work required complexes of size n^O(d). We reduce this complexity to O(n) (hiding some large constants depending on d) by using ideas from mesh generation.
This talk will not assume any knowledge of topology. This is joint work with Gary Miller, Benoit Hudson, and Steve Oudot.
5. Unions of Balls
Finite Point Set Union of Balls
Topologically uninteresting Potentially Interesting
6. Unions of Balls
Finite Point Set Union of Balls
Topologically uninteresting Potentially Interesting
Idea: Fill in the gaps in the ambient space.
Examples: Molecules and Manifolds
9. Unions of balls are sublevels of the distance.
P↵
=
[
p2P
ball(p, ↵) = {x 2 Rd
| d(x, P) ↵}
P ⇢ RdInput:
10. Unions of balls are sublevels of the distance.
P↵
=
[
p2P
ball(p, ↵) = {x 2 Rd
| d(x, P) ↵}
Persistent Homology was invented to track changes
in the homology of P↵
as ↵ ranges from 0 to 1.
P ⇢ RdInput:
11. Unions of balls are sublevels of the distance.
P↵
=
[
p2P
ball(p, ↵) = {x 2 Rd
| d(x, P) ↵}
Persistent Homology was invented to track changes
in the homology of P↵
as ↵ ranges from 0 to 1.
Pers({P↵
})
P ⇢ RdInput:
12. Unions of balls are sublevels of the distance.
P↵
=
[
p2P
ball(p, ↵) = {x 2 Rd
| d(x, P) ↵}
Persistent Homology was invented to track changes
in the homology of P↵
as ↵ ranges from 0 to 1.
Pers({P↵
})
P ⇢ RdInput:
27. Johnson Lindenstrauss Projection
Idea: Project to lower dimensions. Preserve pairwise distances.
Let f : RD
! Rd
be a linear map where d = O(log n/"2
) such that:
28. Johnson Lindenstrauss Projection
Idea: Project to lower dimensions. Preserve pairwise distances.
(1 ")ka bk2
kf(a) f(b)k2
(1 + ")ka bk2
Squared distances preserved up to multiplicative factor.
1
Let f : RD
! Rd
be a linear map where d = O(log n/"2
) such that:
29. Johnson Lindenstrauss Projection
Idea: Project to lower dimensions. Preserve pairwise distances.
(1 ")ka bk2
kf(a) f(b)k2
(1 + ")ka bk2
Squared distances preserved up to multiplicative factor.
1
|(b a)>
(c a) (f(b) f(a))>
(f(b) f(a))| "kb akkc ak.
Inner products preserved up to additive factor.
2
Let f : RD
! Rd
be a linear map where d = O(log n/"2
) such that:
30. Johnson Lindenstrauss Projection
Idea: Project to lower dimensions. Preserve pairwise distances.
a
b
c f(c)
f(b)
f(a)
(1 ")ka bk2
kf(a) f(b)k2
(1 + ")ka bk2
Squared distances preserved up to multiplicative factor.
1
|(b a)>
(c a) (f(b) f(a))>
(f(b) f(a))| "kb akkc ak.
Inner products preserved up to additive factor.
2
Let f : RD
! Rd
be a linear map where d = O(log n/"2
) such that:
32. Can we use JL for P.H. of distances?
Yes, for Rips filtrations, but not a tight approximation.
33. Can we use JL for P.H. of distances?
Yes, for Rips filtrations, but not a tight approximation.
Distance function itself is not preserved.
34. Can we use JL for P.H. of distances?
Yes, for Rips filtrations, but not a tight approximation.
Distance function itself is not preserved.
Pairwise distances in sublevels are not preserved.
35. Can we use JL for P.H. of distances?
Yes, for Rips filtrations, but not a tight approximation.
Distance function itself is not preserved.
Pairwise distances in sublevels are not preserved.
Is topology preserved? Maybe yes, maybe no.
36. Can we use JL for P.H. of distances?
Yes, for Rips filtrations, but not a tight approximation.
Distance function itself is not preserved.
Pairwise distances in sublevels are not preserved.
Is topology preserved? Maybe yes, maybe no.
Is persistent homology preserved? YES.
38. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
39. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
40. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
Idea: If f “preserves M.E.B. radii”, then it preserves
the persistent homology of the distance function.
41. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
Idea: If f “preserves M.E.B. radii”, then it preserves
the persistent homology of the distance function.
42. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
Idea: If f “preserves M.E.B. radii”, then it preserves
the persistent homology of the distance function.
For S ✓ P, (1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
43. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
Idea: If f “preserves M.E.B. radii”, then it preserves
the persistent homology of the distance function.
For S ✓ P, (1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
For all ↵ 0, CP (
p
1 4") ✓ Cf(P )(↵) ✓ CP (
p
1 4")
44. Cech Filtration, MEBs, and Approximation
ˇCech Complex: CP (↵) = { ✓ P | rad( ) 2↵}
ˇCech Filtration: {CP (↵)}↵ 0
Let P ⇢ RD
and let f be any map from RD
to Rd
.
Idea: If f “preserves M.E.B. radii”, then it preserves
the persistent homology of the distance function.
For S ✓ P, (1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
For all ↵ 0, CP (
p
1 4") ✓ Cf(P )(↵) ✓ CP (
p
1 4")
So, Pers(d(·, f(P))) is a (1 + O("))-approximation
to Pers(d(·, P)).
46. MEBs under JL projection
Let S = {p1, . . . , pr} and let x 2 conv(S).
47. MEBs under JL projection
x =
rX
i=1
ipi, where
rX
i=1
i = 1.
Let S = {p1, . . . , pr} and let x 2 conv(S).
48. MEBs under JL projection
x =
rX
i=1
ipi, where
rX
i=1
i = 1.
kx pk2
=
rX
i=1
i(pi p)
2
=
rX
i=1
rX
j=1
i j(pi p)>
(pj p).For any p 2 S,
Let S = {p1, . . . , pr} and let x 2 conv(S).
49. MEBs under JL projection
kp xk2
kf(p) f(x)k2
=
rX
i=1
rX
j=1
i j (pi p)>
(pj p) (f(pi) f(p))>
(f(pj) f(p))
rX
i=1
rX
j=1
i j"kpi pkkpj pk
rX
i=1
rX
j=1
i j4" rad(S)2
= 4" rad(S)2
.
x =
rX
i=1
ipi, where
rX
i=1
i = 1.
kx pk2
=
rX
i=1
i(pi p)
2
=
rX
i=1
rX
j=1
i j(pi p)>
(pj p).For any p 2 S,
Let S = {p1, . . . , pr} and let x 2 conv(S).
51. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
52. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Let x = center(S).
53. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound:
Let x = center(S).
54. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound: rad(f(S))2
max
p2P
(kx pk2
+ 4" rad(S)2
)
max
p2P
((1 + 4")rad(S)2
)
= (1 + 4")rad(S)2
.
Let x = center(S).
55. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound: rad(f(S))2
max
p2P
(kx pk2
+ 4" rad(S)2
)
max
p2P
((1 + 4")rad(S)2
)
= (1 + 4")rad(S)2
.
Lower Bound:
Let x = center(S).
56. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound: rad(f(S))2
max
p2P
(kx pk2
+ 4" rad(S)2
)
max
p2P
((1 + 4")rad(S)2
)
= (1 + 4")rad(S)2
.
Lower Bound:
Let x = center(S).
Let q 2 S be such that kq xk = rad(S) and
kf(q) center(f(S))k kf(q) f(x)k.
57. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound: rad(f(S))2
max
p2P
(kx pk2
+ 4" rad(S)2
)
max
p2P
((1 + 4")rad(S)2
)
= (1 + 4")rad(S)2
.
Lower Bound:
Let x = center(S).
Let q 2 S be such that kq xk = rad(S) and
kf(q) center(f(S))k kf(q) f(x)k.
58. MEBs under JL projection
Theorem: Let P be a set of points in RD
and let f : RD
! Rd
be an "-JL
projection for P. For every subset S of P,
(1 4")rad(S)2
rad(f(S))2
(1 + 4")rad(S)2
.
Upper Bound: rad(f(S))2
max
p2P
(kx pk2
+ 4" rad(S)2
)
max
p2P
((1 + 4")rad(S)2
)
= (1 + 4")rad(S)2
.
Lower Bound:
Let x = center(S).
Let q 2 S be such that kq xk = rad(S) and
kf(q) center(f(S))k kf(q) f(x)k.
rad(f(S))2
kf(q) center(f(S))k2
kf(q) f(x)k2
kq xk2
4" rad(S)2
= (1 4")rad(S)2
.
61. Extension to k-NN distances.
dk
P (x) = distance from x to k points of P.
62. Extension to k-NN distances.
dk
P (x) = distance from x to k points of P.
Corollary: If f is an "-JL projection then for all k,
Pers(dk
f(P )) is a 1 + O(") approximation to Pers(dk
P ).
63. Extension to k-NN distances.
dk
P (x) = distance from x to k points of P.
Corollary: If f is an "-JL projection then for all k,
Pers(dk
f(P )) is a 1 + O(") approximation to Pers(dk
P ).
Bonus: Also works for weighted points.