• No results found

A note on subset selection for matrices

N/A
N/A
Protected

Academic year: 2021

Share "A note on subset selection for matrices"

Copied!
10
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

A note on subset selection for matrices

Citation for published version (APA):

Hoog, de, F. R., & Mattheij, R. M. M. (2008). A note on subset selection for matrices. (CASA-report; Vol. 0829). Technische Universiteit Eindhoven.

Document status and date: Published: 01/01/2008 Document Version:

Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication:

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website.

• The final author version and the galley proof are versions of the publication after peer review.

• The final published version features the final layout of the paper including the volume, issue and page numbers.

Link to publication

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal.

If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:

www.tue.nl/taverne

Take down policy

If you believe that this document breaches copyright please contact us at:

openaccess@tue.nl

(2)

A Note on Subset Selection for Matrices

F.R. de Hoog, CSIRO Mathematical and Information Sciences PO Box 664, Canberra, ACT 2601, Australia.

email: Frank.deHoog@csiro.au

R.M.M. Mattheij, Department of Mathematics and Computer Science,

Technische Universiteit Eindhoven, PO Box 513, 5600 MB Eindhoven, The Netherlands. email:

r.m.m.mattheij@tue.nl

Abstract

In an earlier papers the authors established a result to select subsets of a matrix that are as “non-singular” as possible in a numerical sense. The major result was not constructive. In this note we give a constructive proof and moreover a sharper bound.

1. Introduction

In [2] the problem of selecting k rows from an m ×n matrix such that the resulting

matrix was as non-singular as possible was examined. That is, for RRRRm×n

X find a permutation matrix RRRRm×m P so that , , ∈ k×n       = A RRRR B A PX (1)

where A is the matrix in question, m,k >n andrank

( )

X =n.

To motivate this problem, consider the problem of regression where we have a vector of

nobservations

δ

y= + ,

where A∈RRRRk ×nis a design matrix whose rows are a subset of the rows of m×n

∈RRRR X , n R R R R ∈

θ is a vector of unknown parameters that is to be determined and δRRRRkis a vector

whose components are independent and identically normally distributed. Such problems occur when observations are expensive and only a subset of all possible measurements is feasible. The least squares estimate of the unknown parameters is θˆ =A+ywhere A is +

the Moore-Penrose inverse. For a given design matrix A and confidence coefficient, the

confidence ellipsoid for θ is given by

(

)

(

)

      constant ˆ ˆ A Aθ θ θ θ θ T T . The content of

this ellipsoid is proportional to

(

)

2 1

detATA − and it is natural to make this as small as possible. That is, we choose the design matrix A to maximisedetATA. Such designs are called D-optimal designs (see Silvey [5] for a more detailed discussion). However, optimality will depend on the application. For example minimising

(3)

(

)

1 Trace − + = A A A T

F ensures that the expected mean squared error of θ is minimised.

E-optimal designs (see Silvey [5]) maximise the smallest singular value of A (or

equivalently, maximise

(

)

2 1 2 1 2 − + = A A

A T ). Further applications are described in [2]

Row selection is often implemented using a QR decomposition of X with column T interchange to maximize the size of the pivots (see [1] and also [3], section 12.2). This algorithm usually works well but there are examples [4, p31] where the pivot size does not adequately reflect the size of the singular values. As a consequence bounds from the analysis of such algorithms would lead to poor bounds for the singular values and related quantities such asdetATA.

In [2] the present authors derived upper bound for

F

+

A and the singular values of A . In this note, we extend these results by deriving a constructive derivation for the bounds on the singular values and new lower bounds fordetATA.

In section 2 we give the main results and in particular a sharper bound for

F

+

A . In

section 3 we show that this bound is sharper than the one obtained earlier, at least asymptotically.. 2. Results We can rewrite (1) as

(

)

2 1 A A Y Q B A PX T      =       = (2) where

(

)

(

)

1 2 1 2 : : T T − − = = Q A A A Y B A A It follows that,

(

) (

)(

)

2 1 2 1 A A Y Y I A A X XT = T + T T (3) Thus

(

XTX

)

(

I YTY

) (

ATA

)

det det det = + (4)

(4)

and so maximising detATAis equivalent to minimizingdet

(

I+YTY

)

. From the arithmetic-geometric inequality we have

(

)

(

)

n

F n T 1 1 2

det I+Y Y ≤ + Y (5)

This suggests that when P is chosen so that Y is not too large, then detATAwill not be small. By applying the usual variational formulation for singular values to (3), we obtain

( )

2

( )

(

1 22

)

2

( )

, 1, ,n 2 + = L l l l l A σ X Y σ A σ (6)

where

σ

l

( )

A and

σ

l

( )

X are the singular values of A and X respectively. Thus, the

singular values of X will not be small if ||Y||2is not large.

We now show that a permutation exists so that the matrix Y that is not large. This result was established in [2] by assuming that P was chosen to maximise ATA

det ; the poof,

however, as not constructive. In the present note, we give a construction based on a greedy algorithm where rows of X are deleted, one at a time, so as to minimise the Frobenius norm of Y at each step.

Theorem 1. There is a permutation matrix P so that (2) holds with

(

)

. 1 2 + − − ≤ n k n k m F Y Proof: Let           =           =           = − T k m T T k T T k T y y Y q q Q a a A M M M 1 1 1 , , ,

and note that the columns of Q are orthogonal. Indeed,

1 2 , and 1. k T T r r r r = = = ≤

q q Q Q I q .

(5)

1 1 1 : , : , T T T j j j T j j T k − +           =  =              a a a A B B a a M M

and can then write for some permutation matrix P%j

(k-1)n (m-k 1)n , , ~ × + × ∈ ∈       =

R

R

R

R

R

R

R

R

j j j j j A B B A X P .

From this it follows that

(

)

(

)

(

)

1 2 1 1 2 2 , where , . j j T j j j j j T T j j j j j j j j − −     = =     = = A Q P X A A B Y Q A A A Y B A A % We have

(

)

(

)

(

)

(

)

(

)

(

)(

)

(

)

(

)(

)

(

)

(

)

1 1 2 2 2 1 1 1 2 2 2 2 2 2 2 Trace Trace Trace Trace 1 1 T T T j F j j j j j j T T j j j j T T T T j j j j T T T j j j j j j F j − − − − − = = = + − = + − = + + − Y A A B B A A B B A A B B a a A A a a Y Y q q I q q Y Yq q q Now let F j

Y be minimized whenp = j. Then,

(

2

)

2

(

2

)

2

(

2 2

)

2 2 2 2

1 j p 1 j F j j .

F

(6)

On summing over j and noting that 2 2 1 2 2 2 1 , , k j j k j F j n = = = =

q Yq Y we obtain

(

k n

)

(

k n 1

)

2 n F 2 F p ≤ − + + − Y Y . (7)

We can use this construction, starting with X and then deleting a row at the time whilst insuring that H F = Y Fis minimised at each step to construct

( ) n k > ∈ ∈       = × × , , , A

R

R

R

R

k n B

R

R

R

R

m-k n B A PX .

From (7) it follows by induction that such a construction satisfies

(

)

1 2 + − − ≤ n k n k m F Y . #

Theorem 1 and (4), (5) imply:

Corollary 1 There is a permutation matrix P so that

(

T

)

(

T

)

n n m n k       + − + − ≥ 1 1 det det A A X X . (8)

In [2, cf Theorem 2], a greedy algorithm was presented where rows of X are deleted, one at a time, so as to minimise the Frobenius norm of A at each step was, which read + Theorem 2 There is a permutation matrix P

R

R

R

R

m×m such that (1) holds with

. 1 1 2 2 F F k n n m + + + − + − ≤ X A

(7)

Proof (of Corollary 1, alternative): If we apply Theorem 2 to

(

)

2 1 − X X X T , there is a

permutation matrix P such that

(

)

2 , k n, 1 × − ∈       = W RRRR Z W X X PX T with

(

)

(

)

12 2 1 2 1 1 Trace 1 1 T T F F m n m n n k n k n+ − + −  − +  = ≤ =  − +  − +  W W W X X X . Moreover,

(

)

      =       = B A X X Z W PX 2 1 T , and hence

(

ATA

)

det

(

WTW

) (

det XTX

)

det = . (9). From the geometric-arithmetic mean inequality, we have

(

)

(

(

)

)

n n T n T n k n m       + − + − ≤ ≤ − − 1 1 Trace det W W 1 1 W W 1 ,

and the result follows on substitution of this inequality in (9). #

The bound for ATA

det in corollary 1 follows from bounds on

F

Y , and proof above on

F

+

A respectively. A somewhat tighter bound can be obtained by analysing a greedy algorithm where detATAis maximized at each step.

Theorem 3 There is a permutation matrix P

R

R

R

R

m×m such that (1) holds with

(

)

(

)

(

)

(

)

(

X X

)

X X A A T m k j T T n k m n m k j n j det ! ! ! ! det det 1 − − = − ≥

+ = . (10)

Proof: As in theorem 1, we have

(

)

12 , T     = =      A Q PX A A B Y where

(8)

          =           =           = − T k m T T k T T k T y y Y q q Q a a A M M M 1 1 1 , , ,

and the columns of Q are orthogonal.

Supposek >nand that we wish to delete a row of A . We define

      =                     = + − B a B a a a a A T j j T k T j T j T j , 1 1 1 M M ,

and can then write

(k-1)n (m-k 1)n , , ~ × + ×       =

R

R

R

R

R

R

R

R

j j j j j A B B A X P .

from which it follows that

(

)

(

)

(

)

1 2 1 1 2 2 , , . j j T j j j j j T T j j j j j j j j − −     = =     = = A Q P X A A B Y Q A A A Y B A A % Note that,

(

)

(

)

(

2

)

(

)

2

det T det T T 1 det T .

j j = − j j = − j A A A A a a q A A Now let

(

j

)

T jA A

det be maximised whenp = j. Then,

(

ATpAp

)

(

1 qj

)

det

(

ATA

)

det 2

2

≥ ,

(9)

(

ATpAp

)

(

k n

)

(

ATA

)

kdet ≥ − det . (11)

We can use this construction, starting with X and then deleting a row at the time whilst insuring that det

(

ATA

)

is minimised at each step to construct

( ) n k > ∈ ∈       = , A

R

R

R

R

k×n, B

R

R

R

R

m-k×n, B A PX .

From (11), it follows by induction that this construction satisfies

(

)

(

)

(

)

(

)

(

X X

)

X X A A T m k j T T n k m n m k j n j det ! ! ! ! det det 1 − − = − ≥

+ = . # 3 Discussion

We now compare the bounds given in corollary 1 and Theorem 3 which are the same for 1 = n . We have

(

)(

)

(

)(

)

(

)

1 2 1 1 1 1 1

log log log log

1 1

1 1

log log log

1 1

1 1 1

log log 1 log 1

1 1 1 1 m m j k j k m k j n k n m n j n j k m j k n m n x n dx k m x m k n k n n n m k k m n m n m + = + = + + +  −   + −   + −   −  = − +         + +         + − + − −       ≥  −  +   + +       + + −  + −    = +  + +  − − + + −  + −   + 

(

1 log 1

)

1 1

log log 1 log 1 .

1 1 1 n k k n n n n m k m n m k   +  −  +   + −       =  +  − −  −  + − + +       Thus, for n≥2 0 1 1 log 1 1 log 1 1 log log 1 ≥       + − −       + − ≥       − + − + −       −

+ = k n k m n m n m n k n j n j m k j .

This demonstrates that the bound (10) given in Theorem 3 is superior to the bounds given by (8) in Corollary 1. This difference can be substantial when k is relatively small. For example, if mis large relative to nand k =n, then

(10)

1 1 / 1 / 1 1 1 1 1 . n m k m j k n j n k n n n j m n m k n e = +    + −      ≥ − −         + − + +         +   ≈    

In order to compare the bounds on the singular values given by (6), it makes sense to consider the thn root of ATA

det as this is the square of the geometric mean of the singular values of A . Given the construction, we find that the bound (8) given in

Corollary 1 is similar to that given by (6). However, the bound given by (10) in Theorem 3, provides a substantially sharper estimate.

References

1. P.A. Businger and G.H. Golub, Linear least squares solution by Householder transformations, Numer. Math., 7 (1965), pp 269-276.

2. F.R. de Hoog and R.M.M. Mattheij, Subset Selection for Matrices, Linear Algebra and its Applications, 422 (2007), pp 349 – 359.

3. G.H. Golub and C.F. van Loan, Matrix Computations, John Hopkins University Press, Baltimore 1983.

4. C.L. Lawson and R.J. Hanson, Solving Least Squares Problems, Prentice Hall, Englewood Cliffs 1974.

Referenties

GERELATEERDE DOCUMENTEN

Chapter 4 proposed an efficient MPC strategy for optimizing the traffic flows that cross intersections in order to improve the urban road network throughput. The proposed MPC

Deze kunnen weliswaar weggestreept worden tegen de niet-gemaakte vervoersbewegingen van klanten naar de winkels of restaurants (dus marginaal verandert de CO 2 -uitstoot niet),

Door gebruik te maken van een nieuwe wetenschappelijke methode om lange termijn trends in een breder perspectief te plaatsen kan een duidelijk beeld geschetst worden van de kansen

Maar waar je wél wat aan kunt doen, is kijken (en oefenen) of je niet te veel – of te weinig – materiaal hebt om te presenteren voor dat tijdslot.. Daarom zijn die try-outs

En dan niet alleen van technische materialen, maar van alle relevante natuurlijke hulpbronnen in de gebouwde omgeving, hoewel ook toepasbaar daarbuiten: energie, lucht,

Het belang van territorium op kantoor wordt dus niet alleen bepaald door 'oerinstincten', maar ook door de 'logische' koppeling van het concept aan het type werk dat mensen doen en

Een richtinggevend verhaal voor een gebiedstransformatie hoeft niet uitgekristalliseerd te zijn, maar enige kaders worden juist ook door marktpartijen verlangt.. Visievorming kan

Deze Gedragscode specificeert wat de DIRECT- kernwaarden en de Integriteitsverklaring betekenen voor hoe we, als leden van deze gemeenschap, zouden moeten handelen, wat onze