FOCM 2002 QUESTION What is ‘foundations of computational mathematics’?

Slides:



Advertisements
Similar presentations
Sublinear-time Algorithms for Machine Learning Ken Clarkson Elad Hazan David Woodruff IBM Almaden Technion IBM Almaden.
Advertisements

ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: The Linear Prediction Model The Autocorrelation Method Levinson and Durbin.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Computational Modeling for Engineering MECN 6040
Chapter 8 Elliptic Equation.
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
IMI 1 Approximation Theory Metric: Complicated Function Signal Image Solution to PDE Simple Function Polynomials Splines Rational Func.
How to do control theory and discrete maths at the same time?
MULTISCALE COMPUTATIONAL METHODS Achi Brandt The Weizmann Institute of Science UCLA
Geometric (Classical) MultiGrid. Hierarchy of graphs Apply grids in all scales: 2x2, 4x4, …, n 1/2 xn 1/2 Coarsening Interpolate and relax Solve the large.
Asymptotic error expansion Example 1: Numerical differentiation –Truncation error via Taylor expansion.
Data mining and statistical learning - lecture 6
1cs542g-term Notes  In assignment 1, problem 2: smoothness = number of times differentiable.
Total Recall Math, Part 2 Ordinary diff. equations First order ODE, one boundary/initial condition: Second order ODE.
Finite Element Method Introduction General Principle
Lecture 2 Linear Variational Problems (Part II). Conjugate Gradient Algorithms for Linear Variational Problems in Hilbert Spaces 1.Introduction. Synopsis.
Spatial and Temporal Data Mining
Weak Formulation ( variational formulation)
Basic Concepts and Definitions Vector and Function Space. A finite or an infinite dimensional linear vector/function space described with set of non-unique.
Background vs. foreground segmentation of video sequences = +
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
NEW APPROACH TO CALCULATION OF RANGE OF POLYNOMIALS USING BERNSTEIN FORMS.
CS Subdivision I: The Univariate Setting Peter Schröder.
Numerical Methods for Partial Differential Equations
Nonlinear Stochastic Programming by the Monte-Carlo method Lecture 4 Leonidas Sakalauskas Institute of Mathematics and Informatics Vilnius, Lithuania EURO.
CISE-301: Numerical Methods Topic 1: Introduction to Numerical Methods and Taylor Series Lectures 1-4: KFUPM.
Numerical methods for PDEs PDEs are mathematical models for –Physical Phenomena Heat transfer Wave motion.
Daniel Kroening and Ofer Strichman Decision Procedures An Algorithmic Point of View Deciding ILPs with Branch & Bound ILP References: ‘Integer Programming’
© 2011 Autodesk Freely licensed for use by educational institutions. Reuse and changes require a note indicating that content has been modified from the.
 Limit Cycle Isolated closed trajectories Analysis is, in general, quite difficult. For nonlinear systems, two simple results exist. Limit Cycle
Colorado Center for Astrodynamics Research The University of Colorado STATISTICAL ORBIT DETERMINATION Project Report Unscented kalman Filter Information.
Ch. Eick: Support Vector Machines: The Main Ideas Reading Material Support Vector Machines: 1.Textbook 2. First 3 columns of Smola/Schönkopf article on.
Overview of Kernel Methods Prof. Bennett Math Model of Learning and Discovery 2/27/05 Based on Chapter 2 of Shawe-Taylor and Cristianini.
Decision Procedures An Algorithmic Point of View
Fall 2004 TDIDT Learning CS478 - Machine Learning.
Computational Stochastic Optimization: Bridging communities October 25, 2012 Warren Powell CASTLE Laboratory Princeton University
CHAPTER FIVE Orthogonality Why orthogonal? Least square problem Accuracy of Numerical computation.
CIS V/EE894R/ME894V A Case Study in Computational Science & Engineering HW 5 Repeat the HW associated with the FD LBI except that you will now use.
Adaptive Multigrid FE Methods -- An optimal way to solve PDEs Zhiming Chen Institute of Computational Mathematics Chinese Academy of Sciences Beijing
Page 1 JASS 2004 Tobias Weinzierl Sophisticated construction ideas of ansatz- spaces How to construct Ritz-Galerkin ansatz-spaces for the Navier-Stokes.
Finite Element Method.
MA5251: Spectral Methods & Applications
1 Discretization of Fluid Models (Navier Stokes) Dr. Farzad Ismail School of Aerospace and Mechanical Engineering Universiti Sains Malaysia Nibong Tebal.
Constructing Optimal Wavelet Synopses Dimitris Sacharidis Timos Sellis
Practical Dynamic Programming in Ljungqvist – Sargent (2004) Presented by Edson Silveira Sobrinho for Dynamic Macro class University of Houston Economics.
Discontinuous Galerkin Methods Li, Yang FerienAkademie 2008.
Progress in identification of damping: Energy-based method with incomplete and noisy data Marco Prandina University of Liverpool.
1 Computational Methods II (Elliptic) Dr. Farzad Ismail School of Aerospace and Mechanical Engineering Universiti Sains Malaysia Nibong Tebal Pulau.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Colorado Center for Astrodynamics Research The University of Colorado 1 STATISTICAL ORBIT DETERMINATION ASEN 5070 LECTURE 11 9/16,18/09.
© 2011 Autodesk Freely licensed for use by educational institutions. Reuse and changes require a note indicating that content has been modified from the.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
RSVM: Reduced Support Vector Machines Y.-J. Lee & O. L. Mangasarian First SIAM International Conference on Data Mining Chicago, April 6, 2001 University.
MECN 3500 Inter - Bayamon Lecture 9 Numerical Methods for Engineering MECN 3500 Professor: Dr. Omar E. Meza Castillo
Lecture #14 Computational methods to construct multiple Lyapunov functions & Applications João P. Hespanha University of California at Santa Barbara Hybrid.
AMS 691 Special Topics in Applied Mathematics Lecture 8
Discretization Methods Chapter 2. Training Manual May 15, 2001 Inventory # Discretization Methods Topics Equations and The Goal Brief overview.
MULTISCALE COMPUTATIONAL METHODS Achi Brandt The Weizmann Institute of Science UCLA
Generalized Finite Element Methods
Finite Element Method. History Application Consider the two point boundary value problem.
A Parallel Hierarchical Solver for the Poisson Equation Seung Lee Deparment of Mechanical Engineering
Xing Cai University of Oslo
Computation of the solutions of nonlinear polynomial systems
The Johns Hopkins University
Solving Linear Systems Ax=b
Nodal Methods for Core Neutron Diffusion Calculations
Background: Lattices and the Learning-with-Errors problem
Foundation of Video Coding Part II: Scalar and Vector Quantization
CISE-301: Numerical Methods Topic 1: Introduction to Numerical Methods and Taylor Series Lectures 1-4: KFUPM CISE301_Topic1.
Presentation transcript:

FOCM 2002 QUESTION What is ‘foundations of computational mathematics’?

FOCM 2002 FOCM DATA COMPRESSION ADAPTIVE PDE SOLVERS

FOCM 2002 COMPRESSION - ENCODING DATA SET Image Signal Surface BIT STREAM Function f B(f)=(B 1,…,B n )

FOCM 2002 COMPRESSION - ENCODING f B(f)=(B 1,…,B n )

FOCM 2002 DECODER BIT STREAM B FUNCTION g B B Image Signal Surface

FOCM 2002 DECODER BIT STREAM B FUNCTION g B B

FOCM 2002 Who’s Algorithm is Best?  Test examples?  Heuristics?  Fight it out?  Clearly define problem (focm)

FOCM 2002 MUST DECIDE  METRIC TO MEASURE ERROR  MODEL FOR OBJECTS TO BE COMPRESSED

FOCM 2002 Model “Real Images” Metric “Human Visual System” Stochastic Mathematical Metric Deterministic Lp Norms Smoothness Classes K L p Norms IMAGE PROCESSING

FOCM 2002  Given  > 0, N  (K) smallest number of  balls that cover K Kolmogorov Entropy

FOCM 2002 Kolmogorov Entropy  Given  > 0, N  (K) smallest number of  balls that cover K

FOCM 2002 Kolmogorov Entropy  Given  > 0, N  (K) smallest number of  balls that cover K  H  (K):= log (N  (K)) Best encoding with distortion  of K

FOCM 2002 Encoders and Kolmogorov Entropy  -balls with centers x j Compact set K ApproximantsCode x x x x …… x N(  ) b m …b 2 b 1 b 0 Codebook Max # of bits  log 2 N(  )

FOCM 2002 ENTROPY NUMBERS d n (K) := inf {  : H  (K)  n}  This is best distortion for K with bit budget n  Typically d n (K)  n -s

FOCM 2002 SUMMARY  Find right metric  Find right classes  Determine Kolmogorov entropy  Build encoders that give these entropy bounds

FOCM 2002 LpLp (1/p,0) LqLq 1/q  Smoothness L q Space (1/q, ) (1/q,  ) 2 COMPACT SETS IN L p FOR d=2 Sobolev embedding line 1/q=  /2+1/p

FOCM 2002 L2L2 (1,1) - BV (1/2,0) LqLq 1/q  Smoothness L q Space (1/q, ) (1/q,  ) 2 COMPACT SETS IN L 2 FOR d=2

FOCM 2002 ENTROPY OF K Entropy of Besov Balls B  (L q ) in L p is n  d Is there a practical encoder achieving this simultaneously for all Besov balls? ANSWER: YES Cohen-Dahmen-Daubechies-DeVore wavelet tree based encoder

FOCM 2002 COHEN-DAUBECHIES- DAHMEN-DEVORE  Partition growth into subtrees  Decompose image   j :=T j \ T j-1 f =  f =  c I  I I  j j [ T 0 | B 0 | S 0 | T 1 | U 1 | B 1 | S 1 | T 2 | U 2 | B 2 | S 2 |... ] Lead tree & bits Level 1 tree, update & new bits, signs Level 2 tree, update & new bits, signs

FOCM 2002 WHAT DOES THIS BUY YOU?  Explains performance of best encoders: Shapiro, Said-Pearlman  Classifies images according to their compressibility (DeVore-Lucier)  Handles metrics other than L 2  Tells where to improve performance: Better metric, Better classes (e.g. not rearrangement invariant)

FOCM 2002 DTED DATA SURFACE Grand Canyon

FOCM 2002 POSTINGS Postings Grid Z-Values

FOCM 2002 FIDELITY  L 2 metric not appropriate

FOCM 2002 FIDELITY  L 2 metric not appropriate  L  better

FOCM 2002 OFFSET If surface is offset by a lateral error of , the L  norm may be huge  L  error

FOCM 2002 OFFSET But Hausdorff error is not large. Hausdorff error  L  error

FOCM 2002 CAN WE FIND d n (K)?  K bounded functions : d N (K)  n -1 for N=n d+1  K continuous functions: d N (K)  n -1, for N= n d log n  K bounded variation in d=1: d n (K)  n -1  K class of characteristic functions of convex sets d n (K)  n -1

FOCM 2002 Example: functions in BV, d=1 Assume f monotone; encode first (j k ) and last (j k ) square in column. Then  k |j k -j k |  M n. Can encode all such j k with C M n bits. k jkjk jkjk

FOCM 2002 ANTICIPATED IMPACT DTED  Clearly define the problem  Expose new metrics to data compression community  Result in better and more efficient encoders

FOCM 2002 NUMERICAL PDEs u solution to PDE u h or u n is a numerical approximation u h typically piecewise polynomial (FEM) u n linear combination of n wavelets different from image processing because u is unknown

FOCM 2002 MAIN INGREDIENTS  Metric to measure error  Number of degrees of freedom / computations  Linear (SFEM) or nonlinear (adaptive) method of approximation using piecewise polynomials or wavelets  Inversion of an operator Right question: Compare error with best error that could be obtained using full knowledge of u

FOCM 2002 EXAMPLE OF ELLIPTIC EQUATION POISSON PROBLEM

FOCM 2002 CLASSICAL ELLIPTIC THEOREM Variational formulation gives energy norm H t THEOREM: If u in H t+s then SFEM gives ||u-u h || H t < h s |u| H t+s Can replace H t+s by B s+t (L 2 ) Approx. order h s equivalent to u in B s+t (L 2 ) 8 8 h.. )

FOCM 2002 HYPERBOLIC Conservation Law: u t + div x (f(u))=0, u(x,0)=u 0 (x) THEOREM: If u 0 in BV then ||u(,,t)-u h (.,t)|| L1 < h 1/2 |u 0 | BV u 0 in BV implies u in BV; this is equivalent to approximation of order h in L 1 )..

FOCM 2002 ADAPTIVE METHODS Wavelet Methods (WAM) : approximates u by a linear combination of n wavelets AFEM: approximates u by piecewise polynomial on partition generated by adaptive subdivision

FOCM 2002 FORM OF NONLINEAR APPROXIMATION Good Theorem: For a range of s >0, if u can be approximated with accuracy O(n -s ) using full knowledge of u then numerical algorithm produces same accuracy using only information about u gained during the computation. Here n is the number of degrees of freedom Best Theorem: In addition bound the number of computations by Cn

FOCM 2002 AFEMs  Initial partition P 0 and Galerkin soln. u 0  General iterative step P j P j+1 and u j u j+1 i. Examine residual (a posteriori error estimators) to determine cells to be subdivided (marked cells) ii. Subdivide marked cells - results in hanging nodes. iii. Remove hanging nodes by further subdivision (completion) resulting in P j+1

FOCM 2002 FIRST FUNDAMENTAL THEOREMS Doerfler, Morin-Nochetto-Siebert: Introduce strategy for marking cells: a posterio estimators plus bulk chasing Rule for subdivision: newest vertex bisection · THEOREM (D,MNS): For Poisson problem algorithm convergence ).... )

FOCM 2002 BINEV-DAHMEN-DEVORE New AFEM Algorithm: 1. Add coarsening step 2. Fundamental analysis of completion 3. Utilize principles of nonlinear approximation

FOCM 2002 BINEV-DAHMEN-DEVORE THEOREM (BDD): Poisson problem, for a certain range of s >0. If u can be approximated with order O(n -s ) in energy norm using full knowledge of u, then BDD adaptive algorithm does the same. Moreover, the number of computations is of order O(n)... )

FOCM 2002 ADAPTIVE WAVELET METHODS General elliptic problem Au=f        Problem in wavelet coordinates A u= f A: l 2 l 2 ||Av|| ~ ||v||

FOCM 2002 FORM OF WAVELET METHODS  Choose a set  of wavelet indices  Find Gakerkin solution u  from span{   }  Check residual and update   

FOCM 2002 COHEN-DAHMEN-DEVORE FIRST VIEW For finite index set  A  u  = f  u  Galerkin sol. Generate sets  j, j = 0,1,2, … Form of algorithm: 1. Bulk chase on residual several iterations ·  j  j ~ · 2. Coarsen:  j ~    j+1 · 3. Stop when residual error small enough

FOCM 2002 ADAPTIVE WAVELETS: COHEN-DAHMEN-DEVORE · THEOREM (CDD): For SPD problems. If u can be approximated with O(n -s ) using full knowledge of u (best n term approximation), then CDD algorithm does same. Moreover, the number of computations is O(n).

FOCM 2002 CDD: SECOND VIEW u n+1 = u n -  (A u n -f ) This infinite dimensional iterative process converges Find fast and efficient methods to compute Au n, f when u n is finitely supported. Compression of matrix vector multiplication Au n

FOCM 2002 SECOND VIEW GENERALIZES  Wide range of semi-elliptic, and nonlinear THEOREM (CDD): For wide range of linear and nonlinear elliptic problems. If u can be approximated with O(n -s ) using full knowledge of u (best n term approximation), then CDD algorithm does same. Moreover, the number of computations is O(n).

FOCM 2002 WHAT WE LEARNED  Proper coarsening controls size of problem  Remain with infinite dimensional problem as long as possible  Adaptivity is a natural stabilizer, e.g. LBB conditions for saddle point problems are not necessary

FOCM 2002 WHAT focm CAN DO FOR YOU  Clearly frame the computational problem  Give benchmark of optimal performance  Discretization/Analysis/Solution interplay  Identify computational issues not apparent in computational heuristics  Guide the development of optimal algorithms