On computing the maximum corank in the Frisch scheme
نویسنده
چکیده
The paper concerns the Frisch scheme for identii-cation of linear relations from static noisy data. The central problem is, for a given non-singular nn noisy, linearly independent data covariance matrix n , determine the maximal corank of n ? n , and associated maximizers ? n , over the set of diagonal uncorre-lated additive noise covariance matrices n such that n n , i.e. such that n ? ? n is the covariance matrix of some real data satisfying a maximal number of linear relations. The key tools are results connecting the corank of partitioned sign-deenite matrices with their associated Schur complements. These are used to provide an alternative derivation of the well-known conditions for unity maximal corank and upper bounds on the maximal corank in the general case. A procedure for computation of the maximum is also proposed and its relation to the work of previous authors discussed. Finally, related results on a recursive approach to the problem are given.
منابع مشابه
An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment
Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملPothole Detection by Soft Computing
Subject- Potholes on roads are regarded as serious problems in the transportation domain and ignoring them leads to the increase of accidents, traffic, vehicle fuel consumption and waste of time and energy. As a result, pothole detection has attracted researchers’ attention and different methods have been presented for it up to now. Background- The major part of previous research is based on i...
متن کاملAn EM Algorithm for Estimating the Parameters of the Generalized Exponential Distribution under Unified Hybrid Censored Data
The unified hybrid censoring is a mixture of generalized Type-I and Type-II hybrid censoring schemes. This article presents the statistical inferences on Generalized Exponential Distribution parameters when the data are obtained from the unified hybrid censoring scheme. It is observed that the maximum likelihood estimators can not be derived in closed form. The EM algorithm for computing the ma...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007