SlideShare a Scribd company logo
Super Efficient Monte Carlo
Simulation
Cheng-An Yang
Advisor: Prof. Yao
Monte Carlo Simulation
• We want to evaluate
• Define
• Approximate I by the N-sample average:
2
Average
Xi
B(Xi)
Convergence Rate
• By LLN, sample average converges almost surely.
• Approximation error decays like 1/N.
3
Convergence Rate of Super-Efficient
MC Simulation
4
• Initial state
Chaotic Dynamical System
• Evolution of the state is
governed by a mapping
T such that
• Arbitrarily close initial
states grow apart
exponentially.
• State space:
• Mapping: pth order Chebyshev polynomial
Ex. Chebyshev dynamical system
6
Chaotic Monte Carlo Simulation
Time average Ensemble average
7
Chaotic sequence
Average
Xi
B(Xi)
Birkhoff theorem
Super-efficient MC Simulation
• First introduced by Umeno in 1999.
• Rewrite the error variance as
• We say the Chaotic MC simulation is Super-
Efficient (SE). 8
When is MC simulation Super-Efficient?
• Super-efficiency and Lebesgue spectrum:
9
…
…
0 1 2 ……
Necessary and Sufficient Condition for SE
• If the dynamical system has a Lebesgue
spectrum, then the chaotic MC simulation is
super-efficient if and only if
Generalized Fourier Series Expansion of B:
10
When is MC simulation Super-Efficient?
11
……
0 …
…
1 2
• If all the row sum equals to zero, then the
chaotic MC simulation is SE.
Approximate SEMC
• Key observation: adding zero-mean terms will
not affect the integral; but can improve
dynamical correlation:
• In practice we need to approximate dλ by the
finite sum
12
Mean = 0
ASE Algorithm
• Apply chaotic MC on the modified integrand
13
Compensator F(x)
Average
Xi
B(Xi)
F(Xi)
Ex. ASE
• Consider the integrand on (-1,1):
• Using Chebyshev dynamical system with order 2.
• Choose Λ = {1,3,5,7,9}, approximate B up to 5
terms for each λ in Λ.
14
Ex. ASE
10
3
10
4
10
5
10
6
10
7
10
-10
10
-8
10
-6
10
-4
N
sN
2
Conventional
SE
n = 100
n = 1000
n = 10000
n = 100000
• The more samples we spent on estimating dλ,
the better the convergence rate is.
15
for some ζ.
• The error variance:
• Effective convergence
rate: 1/Nα, 1≤ α ≤2.
Progressive ASE
• Idea: estimate dλ along the way.
• Leads to the Progressive ASE (PASE) variant.
16
Average
Xi
B(Xi)
F(Xi)
Ex. PASE
• Using the previous integrand
10
3
10
4
10
5
10
6
10
7
10
-10
10
-8
10
-6
10
-4
N
sN
2
Conventional
SE
n = 100
n = 1000
n = 10000
n = 100000
PASE
17
a(DecayExponent)
103 104 105 106
1
1.2
1.4
1.6
1.8
2
N (samples)
Conventional
SE
PASE
n = 100
n = 1000
n = 10000
n = 100000
Summary and Future Works
• Some Chaotic Monte Carlo simulations are
super-efficient:
• SE can be characterized by Lebesgue spectrum.
• Proposed a PASE algorithm:
• Find efficient ways to generalize SEMC to high
dimensional integrands.
18
• Denote the time average
• Autocorrelation:
Efficiency of Chaotic MC
• After some math, the error variance is given by
Statistical Dynamical
19
Ex. Chebyshev Dynamical System
• Recall the Chebyshev dynamical system with
order p has the mapping
• By the semi-group property of Tp, the (λ, j)-th
basis function is given by
• F = {0,1,2,…}, Λ = relative prime number to p.
20

More Related Content

Viewers also liked

Konda Hayat Tarzlari Ozet
Konda Hayat Tarzlari OzetKonda Hayat Tarzlari Ozet
Konda Hayat Tarzlari Ozet
timaroglan
 
GIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyGIS Applied to Mobile Technology
GIS Applied to Mobile Technology
Esri
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
John Holden
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo Simulation
Ayman Hassan
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
Christian Robert
 
Lecture1
Lecture1Lecture1
Lecture1
rjaeh
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
Ayee_Its_Bailey
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
Aram SE
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
OWASP Khartoum
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
Aram SE
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
Aqib Memon
 
Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010
home
 
Model inquiri
Model inquiriModel inquiri
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
aradhanalaw
 
Access lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying FormsAccess lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying Forms
Aram SE
 
Access lesson05
Access lesson05Access lesson05
Access lesson05
Aram SE
 
Unit 5 general principles, simulation software
Unit 5 general principles, simulation softwareUnit 5 general principles, simulation software
Unit 5 general principles, simulation software
raksharao
 
Agape explains the importance Of Computer Forensics.
Agape explains the importance Of Computer Forensics.Agape explains the importance Of Computer Forensics.
Agape explains the importance Of Computer Forensics.
Agape Inc
 

Viewers also liked (20)

Konda Hayat Tarzlari Ozet
Konda Hayat Tarzlari OzetKonda Hayat Tarzlari Ozet
Konda Hayat Tarzlari Ozet
 
GIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyGIS Applied to Mobile Technology
GIS Applied to Mobile Technology
 
Monte Carlo G P U Jan2010
Monte  Carlo  G P U  Jan2010Monte  Carlo  G P U  Jan2010
Monte Carlo G P U Jan2010
 
Monte Carlo Simulation
Monte Carlo SimulationMonte Carlo Simulation
Monte Carlo Simulation
 
Monte Carlo Statistical Methods
Monte Carlo Statistical MethodsMonte Carlo Statistical Methods
Monte Carlo Statistical Methods
 
Lecture1
Lecture1Lecture1
Lecture1
 
Database and Access Power Point
Database and Access Power PointDatabase and Access Power Point
Database and Access Power Point
 
Access lesson 06 Integrating Access
Access lesson 06  Integrating AccessAccess lesson 06  Integrating Access
Access lesson 06 Integrating Access
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Access lesson 02 Creating a Database
Access lesson 02 Creating a DatabaseAccess lesson 02 Creating a Database
Access lesson 02 Creating a Database
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010Chapter 4 microsoft access 2010
Chapter 4 microsoft access 2010
 
Model inquiri
Model inquiriModel inquiri
Model inquiri
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Access lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying FormsAccess lesson 04 Creating and Modifying Forms
Access lesson 04 Creating and Modifying Forms
 
Access lesson05
Access lesson05Access lesson05
Access lesson05
 
Unit 5 general principles, simulation software
Unit 5 general principles, simulation softwareUnit 5 general principles, simulation software
Unit 5 general principles, simulation software
 
Agape explains the importance Of Computer Forensics.
Agape explains the importance Of Computer Forensics.Agape explains the importance Of Computer Forensics.
Agape explains the importance Of Computer Forensics.
 

Similar to Super Efficient Monte Carlo Simulation

Superefficient Monte Carlo Simulations
Superefficient Monte Carlo SimulationsSuperefficient Monte Carlo Simulations
Superefficient Monte Carlo Simulations
Cheng-An Yang
 
DAC15 Hao Zhuang poster
DAC15 Hao Zhuang poster DAC15 Hao Zhuang poster
DAC15 Hao Zhuang poster
Hao Zhuang
 
Variational inference
Variational inference  Variational inference
Variational inference
Natan Katz
 
머피의 머신러닝: 17장 Markov Chain and HMM
머피의 머신러닝: 17장  Markov Chain and HMM머피의 머신러닝: 17장  Markov Chain and HMM
머피의 머신러닝: 17장 Markov Chain and HMM
Jungkyu Lee
 
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Alex Klibisz
 
sampling-alising.pdf
sampling-alising.pdfsampling-alising.pdf
sampling-alising.pdf
BangalirecipeLaboni
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networks
Natan Katz
 
CS221: HMM and Particle Filters
CS221: HMM and Particle FiltersCS221: HMM and Particle Filters
CS221: HMM and Particle Filters
zukun
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
Hao Zhuang
 
Monte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptxMonte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptx
HaibinSu2
 
Advanced Econometrics L5-6.pptx
Advanced Econometrics L5-6.pptxAdvanced Econometrics L5-6.pptx
Advanced Econometrics L5-6.pptx
akashayosha
 
Presentation on weno lbfs
Presentation on weno lbfsPresentation on weno lbfs
Presentation on weno lbfs
Krunal Gangawane
 
Coordinate Descent method
Coordinate Descent methodCoordinate Descent method
Coordinate Descent method
Sanghyuk Chun
 
An overview of Hidden Markov Models (HMM)
An overview of Hidden Markov Models (HMM)An overview of Hidden Markov Models (HMM)
An overview of Hidden Markov Models (HMM)
ananth
 
Dynamic Response Of A Vibrating Structure To Sinusoidal Excitation
Dynamic Response Of A Vibrating Structure To Sinusoidal ExcitationDynamic Response Of A Vibrating Structure To Sinusoidal Excitation
Dynamic Response Of A Vibrating Structure To Sinusoidal Excitation
tapoore
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
The Statistical and Applied Mathematical Sciences Institute
 
Firefly exact MCMC for Big Data
Firefly exact MCMC for Big DataFirefly exact MCMC for Big Data
Firefly exact MCMC for Big Data
Gianvito Siciliano
 
Dynamics and global stability of three-dimensional flows
Dynamics and global stability of three-dimensional flowsDynamics and global stability of three-dimensional flows
Dynamics and global stability of three-dimensional flows
Jean-Christophe Loiseau
 
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
eXascale Infolab
 
Paper Study - Demand-Driven Computation of Interprocedural Data Flow
Paper Study - Demand-Driven Computation of Interprocedural Data FlowPaper Study - Demand-Driven Computation of Interprocedural Data Flow
Paper Study - Demand-Driven Computation of Interprocedural Data Flow
Min-Yih Hsu
 

Similar to Super Efficient Monte Carlo Simulation (20)

Superefficient Monte Carlo Simulations
Superefficient Monte Carlo SimulationsSuperefficient Monte Carlo Simulations
Superefficient Monte Carlo Simulations
 
DAC15 Hao Zhuang poster
DAC15 Hao Zhuang poster DAC15 Hao Zhuang poster
DAC15 Hao Zhuang poster
 
Variational inference
Variational inference  Variational inference
Variational inference
 
머피의 머신러닝: 17장 Markov Chain and HMM
머피의 머신러닝: 17장  Markov Chain and HMM머피의 머신러닝: 17장  Markov Chain and HMM
머피의 머신러닝: 17장 Markov Chain and HMM
 
Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)Reservoir Computing Overview (with emphasis on Liquid State Machines)
Reservoir Computing Overview (with emphasis on Liquid State Machines)
 
sampling-alising.pdf
sampling-alising.pdfsampling-alising.pdf
sampling-alising.pdf
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networks
 
CS221: HMM and Particle Filters
CS221: HMM and Particle FiltersCS221: HMM and Particle Filters
CS221: HMM and Particle Filters
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
 
Monte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptxMonte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptx
 
Advanced Econometrics L5-6.pptx
Advanced Econometrics L5-6.pptxAdvanced Econometrics L5-6.pptx
Advanced Econometrics L5-6.pptx
 
Presentation on weno lbfs
Presentation on weno lbfsPresentation on weno lbfs
Presentation on weno lbfs
 
Coordinate Descent method
Coordinate Descent methodCoordinate Descent method
Coordinate Descent method
 
An overview of Hidden Markov Models (HMM)
An overview of Hidden Markov Models (HMM)An overview of Hidden Markov Models (HMM)
An overview of Hidden Markov Models (HMM)
 
Dynamic Response Of A Vibrating Structure To Sinusoidal Excitation
Dynamic Response Of A Vibrating Structure To Sinusoidal ExcitationDynamic Response Of A Vibrating Structure To Sinusoidal Excitation
Dynamic Response Of A Vibrating Structure To Sinusoidal Excitation
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Firefly exact MCMC for Big Data
Firefly exact MCMC for Big DataFirefly exact MCMC for Big Data
Firefly exact MCMC for Big Data
 
Dynamics and global stability of three-dimensional flows
Dynamics and global stability of three-dimensional flowsDynamics and global stability of three-dimensional flows
Dynamics and global stability of three-dimensional flows
 
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
HistoSketch: Fast Similarity-Preserving Sketching of Streaming Histograms wit...
 
Paper Study - Demand-Driven Computation of Interprocedural Data Flow
Paper Study - Demand-Driven Computation of Interprocedural Data FlowPaper Study - Demand-Driven Computation of Interprocedural Data Flow
Paper Study - Demand-Driven Computation of Interprocedural Data Flow
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

Super Efficient Monte Carlo Simulation

  • 1. Super Efficient Monte Carlo Simulation Cheng-An Yang Advisor: Prof. Yao
  • 2. Monte Carlo Simulation • We want to evaluate • Define • Approximate I by the N-sample average: 2 Average Xi B(Xi)
  • 3. Convergence Rate • By LLN, sample average converges almost surely. • Approximation error decays like 1/N. 3
  • 4. Convergence Rate of Super-Efficient MC Simulation 4
  • 5. • Initial state Chaotic Dynamical System • Evolution of the state is governed by a mapping T such that • Arbitrarily close initial states grow apart exponentially.
  • 6. • State space: • Mapping: pth order Chebyshev polynomial Ex. Chebyshev dynamical system 6
  • 7. Chaotic Monte Carlo Simulation Time average Ensemble average 7 Chaotic sequence Average Xi B(Xi) Birkhoff theorem
  • 8. Super-efficient MC Simulation • First introduced by Umeno in 1999. • Rewrite the error variance as • We say the Chaotic MC simulation is Super- Efficient (SE). 8
  • 9. When is MC simulation Super-Efficient? • Super-efficiency and Lebesgue spectrum: 9 … … 0 1 2 ……
  • 10. Necessary and Sufficient Condition for SE • If the dynamical system has a Lebesgue spectrum, then the chaotic MC simulation is super-efficient if and only if Generalized Fourier Series Expansion of B: 10
  • 11. When is MC simulation Super-Efficient? 11 …… 0 … … 1 2 • If all the row sum equals to zero, then the chaotic MC simulation is SE.
  • 12. Approximate SEMC • Key observation: adding zero-mean terms will not affect the integral; but can improve dynamical correlation: • In practice we need to approximate dλ by the finite sum 12 Mean = 0
  • 13. ASE Algorithm • Apply chaotic MC on the modified integrand 13 Compensator F(x) Average Xi B(Xi) F(Xi)
  • 14. Ex. ASE • Consider the integrand on (-1,1): • Using Chebyshev dynamical system with order 2. • Choose Λ = {1,3,5,7,9}, approximate B up to 5 terms for each λ in Λ. 14
  • 15. Ex. ASE 10 3 10 4 10 5 10 6 10 7 10 -10 10 -8 10 -6 10 -4 N sN 2 Conventional SE n = 100 n = 1000 n = 10000 n = 100000 • The more samples we spent on estimating dλ, the better the convergence rate is. 15 for some ζ. • The error variance: • Effective convergence rate: 1/Nα, 1≤ α ≤2.
  • 16. Progressive ASE • Idea: estimate dλ along the way. • Leads to the Progressive ASE (PASE) variant. 16 Average Xi B(Xi) F(Xi)
  • 17. Ex. PASE • Using the previous integrand 10 3 10 4 10 5 10 6 10 7 10 -10 10 -8 10 -6 10 -4 N sN 2 Conventional SE n = 100 n = 1000 n = 10000 n = 100000 PASE 17 a(DecayExponent) 103 104 105 106 1 1.2 1.4 1.6 1.8 2 N (samples) Conventional SE PASE n = 100 n = 1000 n = 10000 n = 100000
  • 18. Summary and Future Works • Some Chaotic Monte Carlo simulations are super-efficient: • SE can be characterized by Lebesgue spectrum. • Proposed a PASE algorithm: • Find efficient ways to generalize SEMC to high dimensional integrands. 18
  • 19. • Denote the time average • Autocorrelation: Efficiency of Chaotic MC • After some math, the error variance is given by Statistical Dynamical 19
  • 20. Ex. Chebyshev Dynamical System • Recall the Chebyshev dynamical system with order p has the mapping • By the semi-group property of Tp, the (λ, j)-th basis function is given by • F = {0,1,2,…}, Λ = relative prime number to p. 20