Dynamic Structure Estimation From Bandit Feedback Using Nonvanishing Exponential Sums
Motoya Ohnishi* mohnishi@cs.washington.edu Paul G. Allen School of Computer Science & Engineering University of Washington Isao Ishikawa* ishikawa.isao.zx@ehime-u.ac.jp Ehime University RIKEN Center for Advanced Intelligence Project Yuko Kuroki yuko.kuroki@centai.eu CENTAI Institute Masahiro Ikeda masahiro.ikeda@riken.jp RIKEN Center for Advanced Intelligence Project Keio University Reviewed on OpenReview: https: // openreview. net/ forum? id= xNkASJL0F6
Abstract
This work tackles the dynamic structure estimation problems for periodically behaved discrete dynamical system in the Euclidean space. We assume the observations become sequentially available in a form of bandit feedback contaminated by a sub-Gaussian noise.
Under such fairly general assumptions on the noise distribution, we carefully identify a set of recoverable information of periodic structures. Our main results are the (computation and sample) efficient algorithms that exploit asymptotic behaviors of exponential sums to effectively average out the noise effect while preventing the information to be estimated from vanishing. In particular, the novel use of the Weyl sum, a variant of exponential sums, allows us to extract spectrum information for linear systems. We provide sample complexity bounds for our algorithms, and we experimentally validate our theoretical claims on simulations of toy examples, including Cellular Automata.
1 Introduction
System identification has been of great interest in controls, economics, and statistical machine learning (cf. Tsiamis & Pappas (2019); Tsiamis et al. (2020); Lale et al. (2020); Lee (2022); Kakade et al. (2020); Ohnishi et al. (2024); Mania et al. (2022); Simchowitz & Foster (2020); Curi et al. (2020); Hazan et al.
(2018); Simchowitz et al. (2019); Lee & Zhang (2020)). In particular, estimations of periodic information, including eigenstructures for linear systems, under noisy and partially observable environments, are essential to a variety of applications such as biological data analysis (e.g., Hughes et al. (2017); Sokolove & Bushell (1978); Zielinski et al. (2014); also see Furusawa & Kaneko (2012) for how gene oscillation affects differentiation of cells), earthquake analysis (e.g., Rathje et al. (1998); Sabetta & Pugliese (1996); Wolfe (2006); see Allen & Kanamori (2003) for the connections of the frequencies and magnitude of earthquakes), chemical/asteroseismic analysis (e.g., Aerts et al. (2018)), and communication and information systems (e.g., Couillet & Debbah (2011); Derevyanko et al. (2016)), just to name a few.
- equal contributions In this paper, we focus on the periodic structure estimation problem for nearly periodically behaved discrete dynamical systems (cf. Arnold (1998); specifically, we mainly study theoretical aspects of recovering structural information under a novel set of model assumptions. We allow systems that are not exactly periodic with sequentially available bandit feedback. Due to the presence of noise and partial observability, our problem setups do not permit the recovery of the full set of period/eigenvalues information in general; as such we particularly ask the following question: what subset of information on dynamic structures can be statistically efficiently estimated? This work successfully answers this question by identifying and mathematically defining recoverable information, and proposes algorithms for efficiently extracting such information.
The technical novelty of our approach is highlighted by the careful adoption of the asymptotic bounds on the exponential sums that effectively cancel out noise effects while preserving the information to be estimated. When the dynamics is driven by a linear system, the use of the Weyl sum Weyl (1916), a variant of exponential sums, enables us to extract more detailed information. To our knowledge, this is the first attempt of employing asymptotic results of the Weyl sum for statistical estimation problems, and further studies on the relations between statistical estimation theory and exponential sums (or even other number theoretical results) are of independent interests.
With this summary of our work in place, we present our dynamical system model below followed by a brief introduction of the properties of the exponential sums used in this work.
Dynamic structure in bandit feedback. We define D ā R d as a (finite or infinite) collection of arms to be pulled. Let (Ī·t)ā t=1 be a noise sequence. Let Ī ā R d be a set of latent parameters. We assume that there exists a dynamical system f on Ī, equivalently, a map f : Ī ā Ī. At each time step t ā {1, 2*, . . .*}, a learner pulls an arm xt ā D and observes a reward rt(xt) := f t(Īø) ā¤xt + Ī·t, for some Īø ā Ī. In other words, the hidden parameters for the rewards may vary over time but follow only a rule f with initial value Īø. The function rt could be viewed as the specific instance of partial observation (cf. Ljung (2010)).
Brief overview of the properties of the exponential sums used in this work. Exponential sums, also known as trigonometric sums, have developed as a significant area of study in number theory, employing various methods from analytical and algebraic number theory (see Arkhipov et al. (2004) for an overview).
An exponential sum consists of a finite sum of complex numbers, each with an absolute value of one, and its absolute value can trivially be bounded by the number of terms in the sum. However, due to the cancellation among terms, nontrivial upper and lower bounds can sometimes be established. Several classes of exponential sums with such nontrivial bounds are known, and in this study, we apply bounds from a class known as Weyl sums to extract information from dynamical systems using bandit feedback. In the mathematical community, these bounds are valuable not only in themselves but also for applications in fields like analysis within mathematics (Katz, 1990). This research represents an application of these bounds in the context of machine learning (statistical learning/estimation problem) and is cast as one of the first attempts to open the applications of number theoretic results to learning theory.
In fact, even the standard results utilized in discrete Fourier transform can be leveraged, with their (non)asymptotic properties, to provably handle noisy observations to extract (nearly) periodic information. This process is illustrated in Figure 1 (the one for period estimation); where we show that one can effectively average out the noise through the exponential sum (which is denoted by R in Figure 1) while preventing the correct period estimation from vanishing. By multiplying the (scalar) observations by certain exponential value, the bounds of the Weyl sum (which is denoted by W in Figure 1) can be applied to guarantee the survival of desirable target eigenvalue information; this is illustrated in Figure 1 (the one for eigenstructure estimation).
Our contributions. The contributions of this work are three folds: First, we mathematically identify and define a recoverable set of periodic/eigenvalues information when the observations are available in a form of bandit feedback. The feedback is contaminated by a sub-Gaussian noise, which is more general than
Figure 1: Overview of how the exponential sum techniques are used in the work. For (nearly) period estimation problem, it is an application of discrete Fourier transform in our statistical settings, which ensures that the correct estimate remains while noise effect or wrong estimates are properly suppressed. When the system follows linear dynamics in addition to the (nearly) periodicity, our application of the Weyl sum, a variant of exponential sums, preserves some set of the eigenstructure information. those usually considered in system identification work. Second, we present provably correct algorithms for efficiently estimating such information; this constitutes the first attempt of adopting asymptotic results on the Weyl sum. Lastly, we implemented our algorithms for toy and simulated examples to experimentally validate our claims. Summary of technical contributions and challenges. Here, we showcase a summary of technical contributions and challenges to be overcome:
Exploiting the exponential sum techniques (including the discrete Fourier transform) studied in number theory community as a filtering within the context of statistical estimation problems.
Adapt the Weyl sum technique to deal with eigenvalues by extending it to matrix sum. - Defining novel mathematical concepts: (aliquot) nearly period and (Īø, k)-distinct eigenvalues.
Concurrently applying a set of filterings to statistically identify correct periodic structure (we call this as concurrent application of filterings in Algorithm 1).
System recovery through maintenance of isomorphic structure in observation (we call it as isomorphicity maintenance lemma; see Lemma C.1).
Notations. Throughout this paper, R, Rā„0, N, Z>0, Q, Q>0, and C denote the set of the real numbers, the nonnegative real numbers, the natural numbers ({0, 1, 2*, . . .}), the positive integers, the rational numbers, the positive rational numbers, and the complex numbers, respectively. Also, [T] := {1, 2, . . . T*} for T ā Z>0.
The Euclidean norm is given by ā„xā„Rd =pāØx, xā©Rd = āxā¤x for x ā R d, where (Ā·) ā¤ stands for transposition.
ā„Mā„ and ā„Mā„F are the spectral norm and Frobenius norm of a matrix M respectively, and I (M) and N (M) are the image space and the null space of M, respectively. If a is a divisor of b, it is denoted by a|b. The floor and the ceiling of a real number a is denoted by āaā and āaā, respectively. Finally, the least common multiple and the greatest common divisor of a set L of positive integers are denoted by lcm(L) and gcd(L), respectively.
Figure 2: Illustration of loss of dynamic information through concentration of measure. Left: An example of the law of large numbers showing the sample mean of the numbers given by throwing dice many times will converge towards the expected value as the number of throws increases. Right: An intuitive understanding of how the concentration of measures or process of averaging out the observations may erase not only the noise effect but also the dynamics information; in this case, the dynamics on the left side is a fixed point attractor and the right one is a limit cycle attractor, both of which may return (0, 0) when averaging the states over long time.
2 Motivations
As our main body of the work is largely theoretical with a new problem formulation, this section is intended to articulate the motivations behind this work from scientific (theoretical) and practical perspectives followed by the combined aspects for our formulation.
2.1 Scientific (Theoretical) Motivation
When dealing with noisy observation, it is advised to use concentrations of measure to extract the true target value by averaging out the noise effect over sufficiently many samples. On the other hand, when the samples are generated by a dynamical system, averaging over the samples will have an effect of averaging over time, which could lose some information on the evolution of dynamics. Dynamic information recovery from noisy observation. Consider for example a fixed point attractor and a limit cycle attractor dynamics as depicted in Figure 2; when averaging over samples generated by sufficiently long time horizon, both cases would output values that are close to (0, 0) which ambiguates the dynamical properties. In particular, properties of long-time average of the dynamics have been studied in ergodic theory (cf. Walters (2000)), and studying dynamical systems from both time and measure is of independent interest.
Dynamic information recovery from scalar observations. Also, linear bandit feedback system is a special case of partially observable systems, and specifically considers scalar (noisy) observations.
For reconstruction of attractor dynamics from noiseless scalar observations, as will be mentioned in Section 3, Takens' theorem (or delay embedding theorem; Takens (1981)) is famous, where an observation function is used to construct the embedding. It identifies the dynamical system properties that are preserved through the reconstruction as well.
If the noise is also present, the problems become extensively complicated and some attempts on the analysis have been made (Casdagli et al., 1991); which discusses the trade-off between the distortion and estimation errors.
2.2 Practical Motivation
Practically, periodic information estimation is of great interest as we have mentioned in Section 1; in addition, eigenvalue estimation problems are particularly important for analyzing linear systems.
Physical constant estimation. Some of the important linear systems include electric circuits and vibration (or oscillating) systems which are typically used to model an effect of earthquakes over buildings.
Eigenvalue estimation problems in such cases reduce to the estimation of physical constants. Also, they have been studied for channel estimation (Van De Beek et al., 1995) as well. Dynamic mode decomposition. At the same time, analyzing the modes of a target dynamical system by the technique named (extended) dynamic mode decomposition ((E)DMD; cf. Tu (2013); Kutz et al. (2016); Williams et al. (2015)) has been extensively researched. The results give spectrum information about the dynamics. Attractor reconstruction. With Takens' theorem, obtaining dynamic structure information of attractors in a finite-dimensional space from a finite number of scalar observations is useful in practice as well; see (Bakarji et al., 2022) for an application in deep autoencoder. Our problems are not dealing with general nonlinear attractor dynamics; however, the use of exponential sums in the estimation process would become a foundation for the future applications for modeling target dynamics.
Communication capacity. There has been an interest of studying novel paradigms for coding, transmitting, and processing information sent through optical communication systems (Turitsyn et al., 2017); when encoding information in (nearly) periodic signals to transmit, computing communication capacity that properly takes communication errors into account is of fundamental interest. If the observation is made as a mix of the outputs of multiple communication channels, the problem becomes relevant to bandit feedback as well. Bandit feedback - single-pixel camera. As widely studied in a context of compressed sensing (cf.
Donoho (2006); Eldar & Kutyniok (2012); Candes et al. (2006)), reconstruction of the target image from the single-pixel camera (e.g., Duarte et al. (2008)) observations relies on a random observation matrix (or vector) to obtain a single pixel value for each observation. It is advantageous to concentrate light to one pixel for the cases where the light intensity is very low. Bandit feedback naturally coincides with a random observation matrix that the user can design. The observation through a random matrix coupled with compressed sensing has been studied for channel estimation, magnetic resonance imaging, visualization of black holes, and vibration analysis as well. Bandit feedback - recommendation system. Reward maximization problems from bandit feedback have been applied to recommendation system (e.g., Li et al. (2010)) for example, where the observations are in scalar form. Other applications of bandit problems include healthcare, dynamic pricing, dialogue systems and telecommunications. Although our problem formulation is not meant to maximize any reward, it is seamlessly connected to the bandit problems as described below. Connection to reward maximization problems. As we will briefly describe in Appendix E, thanks to the problem formulations in this work, one could use our estimation algorithms for downstream bandit problems (i.e., reward maximization problem with bandit feedback). A naive approach is an explore-then-commit type algorithm (cf. Robbins (1952); Anscombe (1963)) where the "explore" stage utilizes our estimation mechanism to identify the dynamics structure behind the system parameter. Devising efficient dynamic structure estimation algorithms for other types of information than the periodicity and eigenstructure under bandit feedback scenarios may also be an interesting direction of research.
2.3 Combined Aspects
In our work, we essentially consider periodic (and eigenstructure) information recovery from observation data, which as mentioned is crucial in some application domains. In particular, our formulation cares about the situation where the observation is made by a bandit feedback which produces a sequence of scalar observations. We mention that the bandit feedback is essentially just a (noisy) scalar observation where (possibly random) observation vectors are selected by users.
Figure 3: Illustration of the example practical case where our techniques may be applied; in this example, the target object is following nearly periodic motion, and requires concentration of light to be captured. A random filter could be employed and we observe a single value sequentially to predict its periodic information. One possible example scenario in which bandit feedback and dynamic structure estimation meet is illustrated in Figure 3 where the target system has some periodicity and the noisy observation is made through a singlepixel camera equipped with a random filter to be used to determine the periodic structure of the target system.
Also, as mentioned, we emphasize again that reconstruction of dynamical systems characteristics such as their attractor dynamics through (noisy, user-selected) scalar observation is an important area of research; we believe the use of exponential sums in the reconstruction of dynamics opens up further research directions and applications in a similar manner to Takens' theorem (see Section 3 as well).
3 Related Work
As we have seen in Section 2, our broad motivation stems from the reconstruction of dynamical system information from noisy and partial observations. The most relevant lines of work to this problem are (1) that of Takens (Takens, 1981) and its extensions, and (2) system identifications for partially observed dynamical systems.
While the former studies more general nonlinear attractor dynamics from a sequence of scalar observations made by certain observation function having desirable properties, it is originally for the noiseless case. Although there exist some attempts on extending it to noisy situations (e.g., Casdagli et al. (1991)), provable estimation of some dynamic structure information with sample complexity guarantees (or nonasymptotic result) under fairly general noise case is not elaborated. On the other hand, our work may be viewed as a special instance of system identifications for partially observed dynamical systems. Existing works for sample complexity analysis of partially observed linear systems (e.g., Menda et al. (2020); Hazan et al. (2018); Simchowitz et al. (2019); Lee & Zhang (2020); Tsiamis & Pappas (2019); Tsiamis et al. (2020); Lale et al.
(2020); Lee (2022); Adams et al. (2021); Bhouri & Perdikaris (2021); Ouala et al. (2020); Uy & Peherstorfer (2021); Subramanian et al. (2022); Bennett & Kallus (2021); Lee et al. (2020)) typically consider additive Gaussian noise and make controllability and/or observability assumptions (for autonomous case, transition with Gaussian noise with positive definite covariance is required). While (Mhammedi et al., 2020) considers nonlinear observation, it still assumes Gaussian noise and controllability. The work (Hazan et al., 2018) considers adversarial noise but with limited budget; we mention its wave-filtering approach is interesting and our use of exponential sums could also be viewed as filtering. Also, the work (Simchowitz et al., 2019) considers control inputs and bounded semi-adversarial noise, which is another set of strong assumptions.
Our work is based on the different set of assumptions and aims at estimating a specific set of information; i.e., while we restrict ourselves to the case of (nearly) periodic systems and allow observations in the form of bandit feedback, our goal is to estimate (nearly) periodic structure of the target system. In this regard, we are not proposing "better" algorithms than the existing lines of work but are considering different problem
Figure 4: Illustration of the position of our work as a study of reconstruction of dynamical system properties. We assume sub-Gaussian noise, bandit feedback (user-defined linear feedback contaminated by noise), autonomous system, and (nearly) periodicity which is the information to be extracted. To our knowledge, our assumptions do not subsume or are subsumed by those of other work as a problem of provably estimating periodic structure. In comparison to existing system identification techniques for partially observed dynamical systems, we do not assume Gaussian (or bounded) noise, limited budget for adversarial noise, controllability, observability or noisy transition, while we assume bandit feedback to identify a recoverable set of dynamic structure information. setups that we believe are well motivated from both theoretical and practical perspectives (see Section 2). We mention that there exist many period estimation methods (e.g., Moore et al. (2014); Tenneti & Vaidyanathan (2015)), and in the case of zero noise, this becomes a trivial problem. For intuitive understandings of how our work may be placed in the literature, we show the illustration in Figure 4.
We also mention that our model of bandit feedback is commonly studied within stochastic linear bandit literature (cf. Abe & Long (1999); Auer (2003); Dani et al. (2008); Abbasi-Yadkori et al. (2011)). Also, as we consider the dynamically changing system states (or reward vectors), it is closely related to adversarial bandit problems (e.g., Bubeck & Cesa-Bianchi (2012); Hazan (2016)). Recently, some studies on non-stationary rewards have been made (cf. Auer et al. (2019); Besbes et al. (2014); Chen et al. (2019); Cheung et al. (2022); Luo et al. (2018); Russac et al. (2019); Trovo et al. (2020); Wu et al. (2018)) although they do not deal with periodically behaved dynamical system properly (see discussions in (Cai et al., 2021) as well). For discrete action settings, (Oh et al., 2019) proposed the periodic bandit, which aims at minimizing the total regret. Also, if the period is known, Gaussian process bandit for periodic reward functions was proposed (Cai et al., 2021) under Gaussian noise assumption. While our results could be extended to the regret minimization problems by employing our algorithms for estimating the periodic information before committing to arms in a certain way, we emphasize that our primary goal is to estimate such periodic information in provably efficient ways. We thus mention that our work is orthogonal to the recent studies on regret minimization problems for non-stationary environments (or in particular, periodic/seasonal environments). Refer to (Lattimore & SzepesvƔri, 2020) for bandit algorithms that are not covered here.
4 Problem Definition
In this section, we describe our problem setting. In particular, we introduce some definitions on the properties of dynamical system.
4.1 Nearly Periodic Sequence
First, we define a general notion of nearly periodic sequence: Definition 4.1 (Nearly periodic sequence). Let (X , d) be a metric space. Let Āµ ā„ 0 and let L ā Z>0. We say a sequence (yt)ā t=1 ā X is Āµ*-nearly periodic* of length L if d(ys+Lt, ys) < Āµ for any *s, t* ā Z>0. We also call L the length of the Āµ-nearly period.
Intuitively, there exist L balls of diameter Āµ in X and the sequence y1, y2*, . . .* moves in the balls in order if (yt)ā t=1 is Āµ-nearly periodic of length L. Obviously, nearly periodic sequence of length L is also nearly periodic sequence of length mL for any m ā Z>0. We say a sequence is periodic if it is 0-nearly periodic.
We introduce a notion of aliquot nearly period to treat estimation problems of period: Definition 4.2 (Aliquot nearly period). Let (X , d) be a metric space. Let Ļ > 0 and Ī» ā„ 1. Assume a sequence {yt}ā t=1 ā X is Āµ*-nearly periodic* of length L for some Āµ ā„ 0 and L ā Z>0. A positive integer ā is a (Ļ, Ī»)-aliquot nearly period ((Ļ, Ī»)-anp) of (yt)ā t=1 if ā|L and the sequence (yt)ā t=1 is (Ļ+ 2Ī»Āµ)-nearly periodic.
We may identify the (Ļ, Ī»)-anp with a 2Ī»Āµ-nearly period under an error margin Ļ. When we estimate the length L of the nearly period of unknown sequence (yt)t, we sometimes cannot determine the L itself, but an aliquot nearly period.
Example 4.1. A trajectory of finite dynamical system is always periodic and it is the most simple but important example of (nearly) periodic sequence. We also emphasize that if we know the upper bound of the number of underlying space, the period is bounded above by the upper bound as well. These facts are summarized in Proposition 4.1. The cellular automata on finite cells is a specific example of finite dynamical systems. We will treat LifeGame Conway et al. (1970), a special cellular automata, in our simulation experiment (see Section 6).
Proposition 4.1. Let f : Ī ā Ī be a map on a set Ī. If |Ī| < ā, then for any t ā„ |Ī| and Īø ā Ī, f t+L(Īø) = f t(Īø) for some 1 ā¤ L ā¤ |Ī|.
Proof. Since |{Īø, f(Īø), . . . , f|Ī|(Īø)}| > |Ī|, there exist 0 ā¤ i < j ā¤ |Ī| such that f i(Īø) = f j(Īø) by the pigeon hole principal. Thus, f t(Īø) = f jāi+t(Īø) for all t ā„ |Ī|.
If a linear dynamical system generates a nearly periodic sequence, we can show the linear system has a specific structure as follows: Proposition 4.2. Let M : R d ā R dbe a linear map. Let C d = āĪ±VĪ± be the decomposition via generalized eigenspaces of M, where Ī± runs over the eigenvalues of M and VĪ± := N ((Ī±I ā M) d). Assume that there exists Āµ ā„ 0*, for any* Īø ā R d, (MtĪø)ā t=t0 is Āµ-nearly periodic for some t0 ā N*. Let* Īø =PĪ± ĪøĪ± ā āĪ±VĪ±. Then, each eigenvalue Ī± such that ĪøĪ± Ģø= 0 satisfies |Ī±| ā¤ 1*, in addition, if* |Ī±| = 1 and ĪøĪ± Ģø= 0, MĪøĪ± = Ī±ĪøĪ±.
Proof. We note that {Mtv}tā„0 is bounded for any v ā R d by the assumption on M. Thus, M cannot have an eigenvalue of magnitude greater than 1. We show that Ī± is in the form of Ī± = e i2Ļq for some q ā Q if |Ī±| = 1. Suppose that Ī± = e i2ĻĪ³ for an irrational number Ī³ ā R. Then, for an eigenvector w for ĪøĪ± with ā„wā„Rd > Āµ, {Mtw}t>t0 cannot become a Āµ-periodic sequence. Thus, we conclude Ī± = e i2Ļq for some q ā Q.
Next, we show MĪøĪ± = Ī±ĪøĪ± if |Ī±| = 1 and ĪøĪ± Ģø= 0. Suppose (M ā Ī±I)ĪøĪ± Ģø= 0. Since (M ā Ī±I) dĪøĪ± = 0, there exists 1 ā¤ d ā² < d such that (M ā Ī±I) d ā²+1ĪøĪ± = 0 but (M ā Ī±I) d ā²ĪøĪ± Ģø= 0. Let w ā²:= (M ā Ī±I) d ā²ā1ĪøĪ±. Then, we see that (M ā Ī±I) 2w ā² = 0 but (M ā Ī±I)w ā² Ģø= 0. By direct computation, we see that ā„Mtw ā²ā„Rd = ā„(M ā Ī±I + Ī±I) tw ā²ā„Rd ā„ tā„(M ā Ī±I)w ā²ā„Rd ā ā„w ā²ā„Rd .
Thus, we have ā„Mtw ā²ā„Rd ā ā as t ā ā, which contradicts the fact that {Mtw ā²}tā„0 is a bounded sequence.
The last statement is obvious.
Let W be a linear subspace of C d generated by the trajectory {MĪø, M2Īø, . . . } and denote dim(W) by d0.
Note that restriction of M to W induces a linear map from W to W. We denote by MĪø the induced linear map from W to W. Let W = āĪ±āĪWĪ± be the decomposition via the generalized eigenspaces of MĪø, where Ī is the set of eigenvalues of MĪø and WĪ± := N ((Ī±I ā MĪø) d0 ). We define
$$W_{<1}:=\oplus_{|\alpha|<1}W_{\alpha}.$$
Then, we have the following statement as a corollary of Proposition 4.2: Corollary 4.3. There exist linear maps M1, M<1 : W ā W such that 1. MĪø = M1 + M<1, 2. M1M<1 = M<1M1 = O, 3. M1 is diagonalizable and any eigenvalue of M1 is of magnitude 1*, and* 4. any eigenvalue of M<1 is of magnitude smaller than 1.
Proof. Let p : W ā W=1 be the projection and let i : W=1 ā W be the inclusion map. We define M1 := iMĪøp. We can construct M<1 in the similar manner and these matrices are desired ones.
Example 4.2. Let G be a finite group and let Ļ be a finite dimensional representation of G, namely, a group homomorphism Ļ : G ā GLm(C), where GLm(C) is the set of complex regular matrices of size m. Fix g ā G. Let B ā C nĆn be a matrix whose eigenvalues have magnitudes smaller than 1. We define a matrix of size m + n by
Then, (Mtx)ā t=t0 is a Āµ-nearly periodic sequence for any Āµ > 0, x ā C m, and sufficiently large t0. Moreover, we know that the length of the nearly period is |G|. We treat the permutation of variables in R din the simulation experiment (see Section 6), namely the case where G is the symmetric group Sd and Ļ is a homomorphism from G to GLd(C) defined by Ļ(g)((xj ) d j=1) := (xg(j)) d j=1, which is the permutation of variable via g.
4.2 Problem Setting
Here, we state our problem settings. We use the notation introduced in the previous sections. First, we summarize our technical assumptions as follows: Assumption 1 (Conditions on arms). The set of arms D contains the unit hypersphere. Assumption 2 (Assumptions on noise). The noise sequence {Ī·t}ā t=1 is conditionally R*-sub-Gaussian (R ā Rā„0), i.e., given* t,
and E[Ī·t|Ftā1] = 0, Var[Ī·t|Ftā1] ā¤ R2, where {FĻ }ĻāN is an ascending family and we assume that x1, . . . , xĻ+1, Ī·1, . . . , Ī·Ļ are measurable with respect to FĻ .
Assumption 3 (Assumptions on dynamical systems). There exists Āµ > 0 such that for any Īø ā Ī, the sequence (f t(Īø))ā t=t0 is Āµ-nearly periodic of length L for some t0 ā N. We denote by BĪø the radius of the smallest ball containing {f t(Īø)}ā t=0.
Remark 4.4. Assumption 1 excludes the lower bound arguments of the minimally required samples for our work since taking sufficiently large vector (arm) makes the noise effect negligible. Considering more restrictive conditions for discussing lower bounds is out of scope of this work. Then, our questions are described as follows:
- Can we estimate the length L from the collection of rewards (rt(xt))T t=1 efficiently ?
Algorithm 1 Period estimation (DFT) Input: Current time t0 ā Z>0; Tp; Ļµ > 0; Lmax > 1; orthogonal basis {u1*, . . . ,* ud} of R d Output: Estimated length LĖ 1: ā ā 1; Ī² ā 1 2: for m = 1*, . . . , d* do 3: for t = t0, t0 + 1*, . . . , t*0 + Tp ā 1 do 4: Sample arm um and observe rt(um) 5: end for 6: while ā Ā· Ī² ā¤ Lmax do 7: ā ā ā + 1 8: for (s, b) = (0, 1),(0, 2), . . . ,(0, ā ā 1),(1, 1),(1, 2), . . . ,(Ī² ā 1, ā ā 1) do 9: if R (rt0+s+Ī²t(um))āTp/Ī²ā t=1 ; b/ā} 2
Ļµ then 10: Ī² ā Ī²ā 11: ā ā 1 12: Break 13: end if 14: end for 15: end while 16: t0 ā t0 + Tp 17: end for 18: LĖ ā Ī²
If we assume the dynamical system is linear, can we further obtain the eigenvalues of f from a collection of rewards ?
How many samples do we need to provably estimate the length L or eigenvalues of f ?
We will answer these questions in the following sections and via simulation experiments.
5 Algorithms And Theory
With the above settings in place, we present a (computationally efficient) algorithm for each presented problem, and show its sample complexity for estimating certain information.
5.1 Period Estimation
Here, we describe an algorithm for period estimation followed by its theoretical analysis. The overall procedure is summarized in Algorithm 1. Line 8 executes concurrent application of filterings. To analyze the sample complexity of this estimation algorithm, we first introduce an exponential sum that plays a key role: Definition 5.1. For a positive rational number q ā Q>0 and T complex numbers a1*, . . . , a*T ā C, we define
For a Āµ-nearly periodic sequence a := (at)ā t=1 of length L, we define the supremum of the standard deviations of the L sequential data of a:
$\downarrow$ 4. 2 . The exponential sum R(Ā·; Ā·) can extract a divisor of the nearly period of a Āµ-nearly periodic sequence if Āµ is "sufficiently smaller" than the variance of the sequence even when the sequence is contaminated by noise; more precisely, we have the following lemma: Lemma 5.1. Let a := (aj )ā j=1 be a Āµ-nearly periodic sequence of length L. Then, we have the following statements:
- if $L>1$, then there exists $s\in\mathbb{Z}{>0}$ with $s<L$ _such that_ $$\left|\mathcal{R}\left((a_{j})_{j=1}^{T};s/L\right)\right|>\sqrt{\frac{\sigma^{2}-2\mu\sigma}{L}}-\mu-\frac{L\sup{\mathbb{C}\geq1}|a_{t}|}{T},$$ 2. if $\beta$ is not a divisor of $L$, then for any $\alpha\in\mathbb{Z}{>0}$,_ $$L^{2}\alpha_{j}(\mu+\exp_{\alpha}|a_{t}|)$$ if $\beta$ is not a divisor of $L$, then for any $\alpha\in\mathbb{Z}{>0}$,_ $$\left|\mathcal{R}\left(a_{j}\right){i=1}^{T};\alpha/\beta\right|<\mu+\frac{L^{2}\mathcal{C}{0}(\mu+\sup_{t\geq1}|a_{t}|)}{T},\tag{5.2}$$ where $\mathcal{C}{0}:=1+2/\sqrt{2}\pi(3/4)^{\pi^{2}/6}=1.72257196806914....$_ Proof. As (at)ā t=1 is Āµ-almost periodic, there exist (bt)ā t=1 of period L and (ct)ā t=1 with suptā„1 |ct| < Āµ such that at = bt + ct.
First, we prove (5.1). Let
We claim that
lality is obvious. The equality follows from the Plancherel formula for a finite al group (see, for example, (Serre, 1977, Excercise 6.2)). As for the last inequality, take arbitrary t0 ā Z>0 and
define aĖ = L ā1 Pt0+Lā1 t=t0at and cĖ = L ā1 Pt0+Lā1 t=t0ct. Then, we have 1 L X L t=1 |bt ā Ėb| 2 ā„ 1 L t0+ X Lā1 t=t0 |at ā aĖ| 2 + 1 L t0+ X Lā1 t=t0 |ct ā cĖ| 2 ā 2 L t0+ X Lā1 t=t0 |at ā aĖ| Ā· |ct ā cĖ| ā„ 1 L t0+ X Lā1 t=t0 |at ā aĖ| 2 + 1 L t0+ X Lā1 t=t0 |ct ā cĖ| 2 ā 2 vuut 1 L t0+ X Lā1 t=t0 |at ā aĖ| 2 Ā· vuut 1 L t0+ X Lā1 t=t0 |ct ā cĖ| 2 ā„ 1 L t0+ X Lā1 t=t0 |at ā aĖ| 2 ā 2ĀµĻ. Here, we used the Cauchy-Schwartz inequality in the second inequality. Since t0 is arbitrary, we have (5.3).
Let s ā argmaxs=1*,...,L*ā1 | Ėbs/L| 2 and let q := s/L. Let T = LTā² + Ī³ for some T ā², Ī³ ā N with 0 ā¤ Ī³ < L.
Then, we have
$$>\left|\hat{b}{q}\right|-\mu-\frac{L\sup{t\geq1}\left|a_{t}\right|}{T}$$ $$\geq\sqrt{\frac{\sigma^{2}-2\mu\sigma}{L}}-\mu-\frac{L\sup_{t\geq1}\left|a_{t}\right|}{T}.$$
Next, we prove (5.2). As in the same computation as above, we have
1 Tā² T Xā²ā1 t=0 e i2ĻĪ±Lt/Ī² "1 L X L s=1 aLt+se i2ĻĪ±s/Ī²# + Lsupt>0 |at| T R(aj ) T j=1; Ī±/Ī² ā¤ LTā² T 1 Tā² T Xā²ā1 t=0 e i2ĻĪ±Lt/Ī² Ā· 1 L X L s=1 bse i2ĻĪ±s/Ī² + Āµ + Lsupt>0 |at| T < LTā² T <2 1 ā e i2ĻĪ±L/Ī² Ā· Āµ + sup tā„1 |at| Ā· L T + Āµ + Lsupt>0 |at| T. Since |1 ā e i2Ļa| ā„ ā2(1 ā a 2) Ļ 2/6a for a ā (0, 1) by (Chesneau & Bagul, 2020, Proposition 3.2), we have R(aj ) T j=1; Ī±/Ī² < Āµ + sup tā„1 |at| 2Ī²L ā2(3/4)Ļ2/6T + Āµ + Lsuptā„1 |at| T < Āµ + LĪ²C0(Āµ + suptā„1 |at|) T. Then, we obtain the explicit lower bound of the samples for period estimation: Proposition 5.2. Let a := (at)ā t=1 be a Āµ-nearly periodic sequence of length L*. Fix a positive integer* Lmax > 1 with L ā¤ Lmax, Ī“ ā (0, 1), Ī¾ ā (0, 1), and Ļ0 > 0*. Let* (Ī·t)ā t=1 be a noise sequence satisfying Assumption 2. Put Ī³ := 1/(1 + ā4Lmax + 1) and Ī» := Āµ/(Ļ0Ī³). We define Īµ := Ļ0Ī³Ī¾.
If Āµ/(Ī³Ī¾) < Ļ0 ā¤ ĻL(a), then, for any
the set of rational numbers ST ,Īµ := q ā Q ā© (0, 1) : qL ā Z>0 andR(at + Ī·t) T t=1; q > Īµ is non-empty with probability at least 1 ā Ī“.
If we apply several collections of rewards (rt(xt))T t=1 for sufficiently large T indicated in Proposition 5.2, we obtain various divisors of L. Finally, we provide the precise inputs and output of Algorithm 1 in the following Theorem: Theorem 5.3. Suppose Assumptions 1, 2 and 3 hold. Let r ā [0, 1) be a non-negative real number, and suppose Ļ > 0 and Ī“ ā (0, 1) are given. Fix a positive integer Lmax > 1 with L ā¤ Lmax*. We define*
Assume that rĪµ ā„ Āµ. Let Tp be an integer satisfying
where A := R2log(4dL2max log Lmax/Ī“). Then, the output LĖ of Algorithm 1 is a (Ļ, ād)-anp of (f t(Īø))ā t=t0 with probability at least 1 ā Ī“.
If Āµ is sufficiently small, we may set r as a small positive number, in particular r = 0 if the system is periodic. Remark 5.4. If random arm selection is adopted rather than the orthogonal basis, it may underestimate an error margin on some dimensions, which could lead to the nearly period with much larger error margin than expected; considering failure probability of such a case may potentially produce a variant of our algorithm.
Algorithm 2 Eigenvalue Estimation
Input: Effective sample size N ā Z>0; threshold Ī³(N) Output: Matrix A1(N)AĖ0(N) ā 1: Independently draw random unit vectors xĖm, m ā [d], from uniform distribution over the unit sphere in R d.
2: Wait N time steps.
3: for t = N + 1, Ā· Ā· Ā· , N + 2N d2 do 4: m0 ā {(t ā N ā 1) mod 2d 2} + 1 5: m ā ām0/2dā 6: Sample arm xt = Ėxm and observe rĖt := rt(Ėxm).
7: end for 8: Construct matrices A0(N) and A1(N) as in (5.6), respectively.
9: Obtain the low rank approximation AĖ0(N) of A0(N) via SVD with the threshold Ī³(N).
10: Output A1(N)AĖ0(N) ā .
5.2 Eigenvalue Estimation
If the underlying system has certain structures, more detailed information about the system is expected to be obtained. In this section, we assume the following condition, linearity of the underlying dynamical system f on Ī, in addition to Assumption 1, 2, and 3: Assumption 4 (Linear dynamical systems). The dynamical system f : Ī ā Ī is linear and is represented by a matrix M ā R dĆd.
Let C d = āĪ±VĪ± be the decomposition via generalized eigenspaces of M, where Ī± runs over the eigenvalues of M and VĪ± := N ((Ī±I ā M) d). We describe Īø =PĪ± ĪøĪ± with ĪøĪ± ā VĪ±. We remark that an eigenvalue Ī± of M such that ĪøĪ± Ģø= 0 is in the form of e 2Ļiā/L unless |Ī±| < 1 by Proposition 4.2.
Our objective is to estimate some of, if not all of, the eigenvalues of M with high probability within some error that decreases by the sample size. To this end, we define the meaningful subset of eigenvalues of M.
Definition 5.2 ((Īø, k)-distinct eigenvalues). For a vector Īø ā C d and k ā Z>0, we define a (Īø, k)-distinct eigenvalue by an eigenvalue Ī² of Mksuch that |Ī²| = 1 and ĪøĪ² Ģø= 0.
In our case, starting from a vector Īø, the effect of the eigenvalues that are not of (Īø, d)-distinct eigenvalues of M may not be observable. Basically, once being able to ignore the effects of eigenvalues of magnitudes less than 1, the system becomes nearly periodic and we aim at estimating (Īø, d)-distinct eigenvalues as we obtain more samples.
Our eigenvalue estimation algorithm is summarized in Algorithm 2; it maintains the following matrices. For N ā Z>0, d random unit vectors xĖ1*, . . . ,* xĖd, and s = 0, 1, we define the matrix As(N) ā C dĆdso that its (k, ā) element is given by
4L . (5.6) That is, after N steps, the reward multiplied by exp(i2Ļj2/4L) is placed from the top row of A0 and then the top row of A1, followed by the second rows of them, and so on. Then, those values are summed up for every 2d 2steps or every jth cycle. Here, after throwing away N samples, the effects of eigenvalues of magnitude less than 1 become negligible, and the trajectory becomes nearly periodically behaved under Assumption 4. The rest of the samples is used to average out the observation noise while maintaining some meaningful information about M.
The aforementioned exponential sum can be characterized by the Weyl-type sum of matrices, a key machinery for our algorithm, which we define below:
Definition 5.3. Let W be a linear space and let M1*, . . . , M*N for N ā Z>0 be linear maps on W. For L ā Z>0, we define
Remark 5.5. Let Es,n := (Ī·2di+N+sd+j+1+2d2n)i,j=0*,...,d*ā1 be a noise matrix for s = 0, 1. Let
Then, As(N) has an alternative description as follows:
As in Proposition 5.7 below, the Weyl-type sum has a crucial property. Define Īŗ ā„ 1 by
P where JM is a Jordan normal form of M. Also, we define ā ā (0, 1] to be a value such that, for any eigenvalue Ī± of M satisfying |Ī±| < 1, |Ī±| ā¤ 1 ā ā (define ā = 1 if no such eigenvalue exists). Note by Proposition 4.2, the existence of such spectral gap is guaranteed without any further assumptions.
Roughly speaking, Algorithm 2 estimates "A1(N)A0(N) ā1 = XMdXā1". Of course, the formula in "..." is not valid as X, K, and the Weyl-type sum are not necessarily invertible and we cannot recover full information of Mdin general. However, we can still reconstruct information of Mdrestricted on the eigenspaces for (Īø, d)- distinct eigenvalues.
To see this, we introduce the Weyl sum and its lower bound: Lemma 5.6 (Lower bound on the Weyl sum Bourgain (1993); Oh). Define the Weyl sum by
for some b ā N, q ā Z>0, b < q and N ā Z>0*. Then, for* N ā„ 16q 2*, it holds that*
Proof. It is immediate from Proposition 3.1 in Oh because gcd(1, 4q) = 1, 4q ā” 0 mod 4, and 2b is even.
We define Cws(L) > 0 by
$C_{\rm ws}(L)>0$ by $$C_{\rm ws}(L):=\inf\left{C>0:C^{-1}<\left|\frac{1}{N}\mathscr{W}(N,b,L)\right|<C\text{for any}N\geq16L^{2},0\leq b<L\right}.$$ $\bullet$ Then, we have the following proposition: Proposition 5.7. Let M1 and M<1 be matrices as in Corollary 4.3. We define linear maps on W by
Then, we have the following statements:
- for any N ā„ 16L 2, QN (M1) is invertible on W=1, 3. for any r ā„ 0 and for any N ā„ 16L 2, ā„Mr 1QN (M1)|W=1 ā„, ā„(Mr 1QN (M1))| ā1 W=1 ā„ ā¤ ĪŗCws(L),
- for any r ā„ 2(d ā 1), we have
Proof. We prove 1. By the properties 1 and 2 in Corollary 4.3, we have W ((M2d 2j) Nā1 j=0 ) = QN (M1) + QN (M<1). Next, we prove 2. When we regard QN (M1)|W=1 as a linear map on W=1, it is represented as a diagonal matrix diag(W (N, b1, L), . . . , W (N, bm, L)), where m = dimW=1. Therefore, by Lemma 5.6, QN (M1) is a bijective linear map on W=1. Next, we prove 3. We estimate ā„Mr 1QN (M1)ā„. Let p : C d ā W be the orthogonal projection and let i : W ā C d be the inclusion map. Let MĖ1 := iM1p ā C dĆd. Then, we have
Next, we estimate ā„Mr<1QN (M<1)ā„. Let MĖ<1 := iM<1p. Then, iMr<1QN (M<1)p = W ((MĖ 2d 2j+r <1) Nā1 j=0 ) and ā„iMr<1QN (M<1)pā„ = ā„Mr<1QN (M<1)ā„. Let P be a regular matrix such that
where J is the Jordan normal form. Then, for r ā„ 2(d ā 1), we see that
$$\leq\frac{\kappa}{N}\sum_{j=0}^{N-1}|J^{2d^{2}j+r}|<\frac{d^{2}\kappa}{N}\sum_{j=0}^{\infty}{2d^{2}j+r\choose d-1}(1-\Delta)^{2d^{2}j+r-d+1}$$ $$\leq\frac{d^{2}\kappa(1-\Delta)^{r-d+1}}{N\Delta^{d-1}}\leq\frac{d^{2}\kappa e^{-\Delta(r-d+1)}}{N\Delta^{d-1}}.$$
The second last inequality is proved as follows: for |a| < 1, n ā„ 1 and r ā„ m ā„ 0,
$$\leq\frac{1}{m!}\sum_{j=0}^{m}\binom{m}{j}\frac{r!}{(r-m+j)!}|a|^{r-m+j}\left|\frac{d^{j}}{dx^{j}}\frac{1}{1-x^{n}}\right|{x=a}\right|$$ $$\leq\frac{1}{m!}\sum{j=0}^{m}\binom{m}{j}\frac{r!}{(r-m+j)!}\frac{j!|a|^{r-m+j}}{(1-|a|)^{j}}=\sum_{j=0}^{m}\binom{r}{j}\frac{|a|^{r-m+j}}{(1-|a|)^{j}},$$ but is quite difficult as where, the last inequality follows from
Thus, we have
Proposition 5.7 plays an essential role in our analysis and guarantees that the information in As(N) about (Īø, d)-distinct eigenvalues does not vanish while noise effects are canceled out. Now, we state our main theoretical result for the eigenvalue estimation algorithm. Before stating the theorem, we introduce lower rank approximation via the singular value threshold.
Definition 5.4. Let A ā C nĆm be a matrix. Let A = U (D O) V ā be a singular valued decomposition of A where U ā C nĆn and V ā C mĆm are unitary matrices and D := diag(Ļ1*, . . . , Ļr, o ā¤) is a diagonal matrix with nonnegative components. Let Ī³ > 0. We define a low rank approximation AĪ³ of A via the singular value threshold Ī³ by the matrix AĪ³ defined by AĪ³ = U (DĪ³ O) V ā, where, DĪ³ := diag(1[Ī³,ā)(Ļ1)Ļ1, . . . ,* 1[Ī³,ā)(Ļr)Ļr, o ā¤) and 1I is defined to be the characteristic function supported on I ā R.
Given this definition, we are ready to present the following main result: Theorem 5.8. Suppose Assumptions 1, 2, 3, and 4 hold. Given Ī“ ā (0, 1], let the effective sample size
and Ī³(N) = (p4d 2R2 log (4d 2/Ī“) + 1)/ āN. Then, there exists a matrix A whose eigenvalues are zeros except for (Īø, d)-distinct eigenvalues of M*, such that the output of Algorithm 2, i.e.* A1(N)AĖ0(N) ā , satisfies, with probability at least 1 ā Ī“*, that*
Here, AĖ0(N) ā is the Moore-Penrose pseudo inverse of a lower rank approximation of A0(N) via the singular value threshold Ī³(N). The constant C > 0 depends on Īø, M, d, (Ėxm) d m=1*, and* Cws(L).
We mention that by using the results shown in Song (2002), the bound on spectral norm (5.9) can be translated to the bounds on eigenvalues, where the constant depends on the form of A. As described in Theorem 5.8, the constant is not the absolute constant for any problem instance but depends on several factors; however, for the same execution, this rate is useful to judge how many samples one collects to estimate eigenvalues. Remark 5.9. We note that we can reconstruct the (Īø, 1)-distinct eigenvalues of M via Algorithm 2 using the following trick: Fix non-negative integer r ā„ 0. Take d + r random unit vectors xĖ1*, . . . ,* xĖd+r. Then, for s = 0, 1, we may define a matrix As(N; r) ā C (d+r)Ć(d+r)so that its (k, ā) element is given by
$\sum_{j=0}^{N-1}r_{2}(k-1)(d+r)+s(d+r)+2(d+r)^{2}j+N+\ell\big{(}\tilde{x}_{k}\big{)}e^{\frac{i2\pi j^{2}}{4L}}$.
Then, we see that Algorithm 2 outputs a matrix AĖ(r) that well approximates the (Īø, d+r)-distinct eigenvalues of M since the matrix As(N; r) coincides with As(N) in the case when we replace M and Īø with M(r) and Īø(r) defined by
Let r be an integer such that r +d is prime to L and fix a positive integer m such that m(r +d) ā” 1 mod L.
Then, the eigenvalues of AĖ(r) m is close to those of (Īø, 1)-distinct eigenvalues if we take sufficiently large N.
6 Simulated Experiments
In this section, we present simulated experiments that complement the theoretical claims. In particular, we conducted period estimations for an instance of LifeGame Conway et al. (1970), which is a special case
$\phi^{\pi}\cdot\phi^{\pi}\cdot\phi^{\pi}\cdot\phi^{\pi}$ 3. $\frac{\pi}{4}$ 3. Figure 5: Left: Illustration of a period eight instance of LifeGame; (top) original transitions. (down) an instance of noisy observation. Right: Āµ-nearly periodic dynamics (6.1). of cellular automata Von Neumann et al. (1966), and for a nearly periodic toy system, and an eigenvalue estimation for a linear system, where some dimensions are for permutations and the rest is for shrinking.
Period estimation: LifeGame. We use a specific instance of LifeGame which is illustrated in Figure 5.
As shown on the top eight pictures, starting from certain configuration of cells, it shows transitions of period eight. The sample size is computed as the smallest integer satisfying (5.5), and the threshold Īµ is given by (5.4). To prevent the dimension from becoming too large, we used five cells that correctly display period eight; that is d = 5. Noise Ī·t is given by i.i.d. Gaussian with proxy R = 0.3, and the down eight pictures of Figure 5 are some instances of noisy observations. We tested 50 different random seeds (i.e., 1, 51, 101, 151, ... , 2451), and computed the error rate (the number of runs producing a wrong estimate other than the fundamental period eight, which is divided by 50); and it was zero. Period estimation: Simple Āµ**-nearly periodic system.** We consider the following Āµ-nearly periodic system that circulates over a circle with small variations:
where r and Īø are the radius and angle, and Ī± /ā Q. We use Āµ = 0.001, L = 5, and Ī± = Ļ. Noise Ī·t is drawn i.i.d. from the uniform distribution within [āR, R] for R = 0.3. We tested 50 different random seeds (i.e., 1, 51, 101, 151, ... , 2451), and computed the error rate; and it was zero.
Eigenvalue estimation: Permutation and shrink. We use d = 5, and M ā R 5Ć5is made such that 1) the first four dimensions are for permutation (i.e., each of row and column of 4 Ć 4 sub-matrix has only one nonzero element that is one.), and 2) the last dimension is simply shrinking; we gave 0.7 for (5, 5)-element of M. Initial vector Īø0 and each arm xĖm, m ā [d], are uniformly sampled from the unit sphere in R 5. The value L is computed by 4! = 24. We used the smallest integer N that satisfies (5.8), multiplied by Csim > 0. The results are shown in Table 1; it is observed that the more samples we use the more accurate the estimates become to (Īø0, 5)-distinct eigenvalues of M. Noise Ī·t is drawn i.i.d. from the uniform distribution within [āR, R] for R = 0.3, and the Table 1 is of the random seed 1234. We also tested 50 different random seeds (i.e., 1, 51, 101, 151, ... , 2451) for Csim = 30, and computed the mean absolute error between the true (Īø0, 5)-distinct eigenvalues and their nearest estimated values; it was 0.0019, which is sufficiently small.
Attempt on applications to more realistic data: Worm simulation. Finally, we present an attempt on applications to more realistic situation, which will demonstrate some of the important aspects that need to be taken into account when naively applying our algorithms to the real world problems. In particular, we use OpenWorm (https://openworm.org/) (Szigeti et al., 2014) to simulate a worm motion (we ran more than around 10 hours for simulations); example images from this simulation is shown in Figure 6 (left). It is known that the behavior of worm has some periodicity (e.g., Ahamed et al. (2021)). We resized the images to 6 Ć 6 (i.e., d = 36), and downsampled the video by extracting one per eight images. Also, we repeat the same video in the way that the entire video still shows smooth flow (i.e., cut the video so that the end image is similar to the image in the beginning, and concatenate the same videos) so that we can sample a large number of data.
Table 1: Results for the eigenvalue estimation. The top-most row shows the true eigenvalues of M5, and the second row shows its (Īø0, 5)-distinct eigenvalues. From the third to sixth row, it shows the estimated eigenvalues for different values of Csim.
eigenvalues of M5 | 1.000 | 1.000 | ā0.500 ā 0.866i | ā0.500 + 0.866i | 0.168 |
---|---|---|---|---|---|
(Īø0, 5) | 1.000 | 0 | ā0.500 ā 0.866i | ā0.500 + 0.866i | 0 |
when Csim = 1 | 1.000 + 0.008i | 0 | ā0.489 ā 0.860i | ā0.510 + 0.869i | 0 |
when Csim = 5 | 0.999 ā 0.000i | 0 | ā0.495 ā 0.867i | ā0.501 + 0.862i | 0 |
when Csim = 10 | 1.000 + 0.003i | 0 | ā0.497 ā 0.867i | ā0.501 + 0.864i | 0 |
when Csim = 30 | 1.000 + 0.001i | 0 | ā0.500 ā 0.866i | ā0.500 + 0.864i | 0 |
Figure 6: Left: OpenWorm (https://openworm.org/) simulation of a worm motion. Middle: The extracted sequence of images with 6 Ć 6 resolution for our experiment. Right: Diagram of how the worm motion is viewed as a (nearly) periodic motion. First, we assume we have no access to reasonable values for the hyperparameters, and show what happens when we use hyperparameters that do not reflect the target system. With such a choice of parameters (see Appendix F.4), the algorithm outputs an estimate that contradicts to the hyperparemters; with the value Lmax = 25, it outputs the estimate 40. In particular, there exist dimensions that output the estimates 8 and 20, from which the final estimate becomes 40. Note that, in this experiment, we use a fixed number of samples Tp since we have no access to the reasonable hyperparameters. On the other hand, we increased the margin Ļ significantly, and then the output becomes 20 ā¤ Lmax where each dimension shows 1 or 20 in this case. In fact, one segment of our video data (recall we concatenate the same video to create a sequence of an indefinite number of images) consists of 120 images and contains 6 periods of sequence.
We mention that the aforementioned fact implies that the choice of hyperparameters may be practically validated by confirming that the outputs are consistent to the parameters.
Next, we assume that the system is linear and run the DMD over this canonical basis of the state space. Let MDMD be the solution to the exact DMD over the video data, and we compute the eigenvalues of MdDMD and of the output of Algorithm 2. We tested the algorithm with the fixed hyperparameters given in Appendix F.4 and with varying number of N, namely, 103, 104, and 105. For the cases of 103 and 104, we only obtained one eigenvalue which is close to 1 + 0i and the others were almost zero. For N = 105, we obtained three nonzero eigenvalues which are plotted in Figure 7 against the top four eigenvalues of MdDMD. The actual nonzero eigenvalues and the estimated errors for all three cases are given in Table 2.
From the results, we argue that, for some real applications where the system is not exactly linear, the eigenvalue estimation algorithm may not work well although it does not output insane values.
N | Nonzero eigenvalues | Errors |
---|---|---|
103 | 1.000 + 0.002i | 0.199 |
104 | 1.000 + 0.002i | 0.199 |
1.001 + 0.001i | ||
105 | 0.288 + 0.884i | 0.172 |
0.290 + 0.867i |
Figure 7: Estimated eigenvalues having large magnitudes (red) and the top four DMD eigenvalues (blue).
Table 2: Estimated nonzero eigenvalues for N = 103, 104, 105, and the total errors to the true DMD matrix MdDMD.
7 Discussion And Conclusion
This work proposed novel algorithms for estimating periodic information about the dynamical systems from bandit feedback contaminated by a sub-Gaussian noise. Since we consider a rather novel problem setup, the setting itself would be seen as a limitation of our work, and we present a potentially important list of future works below.
Choice of hyperparameters such as Lmax, N: If those hyperparameters are correctly chosen for nearly periodic systems, the outputs of our algorithms are consistent and reasonable across runs, which follows the theoretical insights; therefore, practically, one can check if the hyperparameters are properly chosen by running the algorithms. Refer to Section 6 for related discussions; in short, inappropriate choice of hyperparameters leads to contradicting outputs (e.g., period estimate larger than the assumed maximum value). On the other hand, studying if it is possible to theoretically ensure correctness of hyperparameters (e.g., by standard doubling trick (Cesa-Bianchi et al., 1997) for efficient guessing) or to identify non-periodic systems is an important future work.
Extension to general spectrum information estimation problems: We only impose nearly periodicity on the dynamical systems on top of the linearity for the eigenvalue estimation problem. Nevertheless, additional studies are needed to allow other forms of observations (not limited to bandit feedback) and non-periodic systems to consider eigenvalues with arguments of 2Ļ times irrational numbers. Actually, the asymptotic bounds of the Weyl sum themselves are still valid when it is sufficiently well approximated by a rational number (Bourgain, 1993; Oh). Moreover, allowing control inputs would make eigenvalues of magnitudes smaller than one efficiently recoverable.
Extensions to random dynamical systems: This work studied deterministic dynamical systems; however, we conjecture that, under the condition that the variance of trajectories generated by a random dynamical system (RDS) (cf. Arnold (1998)) is sufficiently small, the similar estimation procedure is adopted for such RDSs. It is important to study if the estimation problem becomes easier when the system is driven by a particular noise as it could be treated as a random control input. Also, studying other dynamic structures such as the Lyapunov exponents for nonlinear systems is an interesting future work. Study of statistical estimation leveraged by other number theoretical results: The proper use of exponential sums enables us to average out the noise while preserving particular information. Studying when this separation is feasible for different sets of information, noise, and class of problems should be important.
Optimality of the results: Although we gave a sufficient number of samples for provably guaranteeing (approximate) correctness of the estimates, it is unclear if our sample complexity is what one can best achieve under particular problem settings. Recall that the current problem settings without an assumption on boundedness of the set of arms D exclude the lower bound arguments of the minimally required samples as mentioned in Remark 4.4.
As such, instead of arguing the tightness, to justify the complexity of our algorithms, we hence mention that the very naive approach for (nearly) period estimation would cost the order of Lmax! sample complexity. To see this, suppose we know the maximum possible (nearly) period Lmax then it follows that Lmax! is a true (nearly) period as a multiple of the fundamental (nearly) period. As such, one could employ the concentration of measures to average out the sample. With sufficiently many sequences of length Lmax! depending on the rate of concentration, one could approximately reconstruct the original (noiseless) sequence of length Lmax!
from which one could estimate a desired L ā¤ Lmax which is an (aliquot) nearly period.
Lower bound of the minimally required samples may be discussed by using similar arguments to the best arm identification problems (cf. Kaufmann et al. (2016)); however, our problems consider dynamical systems, and we have no clue on potential technical tools to deal with the arguments at this point.
Acknowledgments
We thank the constructive comments by anonymous reviewers for improving this work. Motoya Ohnishi thanks Sham Kakade, Yoshinobu Kawahara, Emanuel Todorov, Jacob Sacks, Tomoharu Iwata, and Hiroya Nakao for valuable discussions and thanks Sham Kakade for computational supports. This work of Motoya Ohnishi, Isao Ishikawa, and Masahiro Ikeda was supported by JST CREST Grant, Number JPMJCR1913, including AIP challenge program, Japan. Also, Motoya Ohnishi is supported in part by Funai Overseas Fellowship. Isao Ishikawa is supported by JST ACT-X Grant, Number JPMJAX2004, Japan. This work of Yuko Kuroki was supported by Microsoft Research Asia and JST ACT-X JPMJAX200E.
References
Y. Abbasi-Yadkori, D. PƔl, and C. SzepesvƔri. Improved algorithms for linear stochastic bandits. Advances in neural information processing systems, 24, 2011.
N. Abe and P. M. Long. Associative reinforcement learning using linear probabilistic concepts. In ICML, pp. 3ā11, 1999.
J. Adams, N. Hansen, and K. Zhang. Identification of partially observed linear causal models: Graphical conditions for the non-Gaussian and heterogeneous cases. Advances in Neural Information Processing Systems, 34, 2021.
C. Aerts, G. Molenberghs, M. Michielsen, MG. Pedersen, R. Bjƶrklund, C. Johnston, JSG. Mombarg, DM.
Bowman, B. Buysschaert, PI. PƔpics, et al. Forward asteroseismic modeling of stars with a convective core from gravity-mode oscillations: parameter estimation and stellar model selection. The Astrophysical Journal Supplement Series, 237(1):15, 2018.
T. Ahamed, A. C. Costa, and G. J. Stephens. Capturing the continuous complexity of behaviour in Caenorhabditis elegans. Nature Physics, 17(2):275ā283, 2021.
R. M. Allen and H. Kanamori. The potential for earthquake early warning in southern California. Science, 300(5620):786ā789, 2003.
F. J. Anscombe. Sequential medical trials. Journal of the American Statistical Association, 58(302):365ā383, 1963.
G. I. Arkhipov, V. N. Chubarikov, and A. A. Karatsuba. Trigonometric Sums in Number Theory and Analysis. De Gruyter, Berlin, New York, 2004.
L. Arnold. Random dynamical systems. Springer-Verlag, 1998.
P. Auer. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research, 3:397ā422, 2003.
P. Auer, Y. Chen, P. Gajane, C. Lee, H. Luo, R. Ortner, and C. Wei. Achieving optimal dynamic regret for non-stationary bandits without prior information. In Conference on Learning Theory, pp. 159ā163. PMLR, 2019.
J. Bakarji, K. Champion, J. N. Kutz, and S. L. Brunton. Discovering governing equations from partial measurements with deep delay autoencoders. arXiv preprint arXiv:2201.05136, 2022.
A. Bennett and N. Kallus. Proximal reinforcement learning: Efficient off-policy evaluation in partially observed Markov decision processes. arXiv preprint arXiv:2110.15332, 2021.
O. Besbes, Y. Gur, and A. Zeevi. Stochastic multi-armed-bandit problem with non-stationary rewards.
Advances in neural information processing systems, 27, 2014.
J. Bezanson, A. Edelman, S. Karpinski, and V. B. Shah. Julia: A fresh approach to numerical computing.
SIAM review, 59(1):65ā98, 2017.
M. A. Bhouri and P. Perdikaris. Gaussian processes meet NeuralODEs: A Bayesian framework for learning the dynamics of partially observed systems from scarce and noisy data. arXiv preprint arXiv:2103.03385, 2021.
J. Bourgain. Fourier transform restriction phenomena for certain lattice subsets and applications to nonlinear evolution equations. Geometric & Functional Analysis GAFA, 3(3):209ā262, 1993.
S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic and nonstochastic multi-armed bandit problems.
Foundations and TrendsĀ® in Machine Learning, 5:1ā122, 2012.
H. Cai, Z. Cen, L. Leng, and R. Song. Periodic-GP: Learning periodic world with Gaussian process bandits.
arXiv preprint arXiv:2105.14422, 2021.
E. J. Candes, J. K. Romberg, and T. Tao. Stable signal recovery from incomplete and inaccurate measurements. Communications on Pure and Applied Mathematics: A Journal Issued by the Courant Institute of Mathematical Sciences, 59(8):1207ā1223, 2006.
M. Casdagli, S. Eubank, J. D. Farmer, and J. Gibson. State space reconstruction in the presence of noise.
Physica D: Nonlinear Phenomena, 51(1-3):52ā98, 1991.
N. Cesa-Bianchi, Y. Freund, D. Haussler, D. P. Helmbold, R. E. Schapire, and M. K. Warmuth. How to use expert advice. Journal of the ACM, 44(3):427ā485, 1997.
Y. Chen, C. Lee, H. Luo, and C. Wei. A new algorithm for non-stationary contextual bandits: Efficient, optimal and parameter-free. In Conference on Learning Theory, pp. 696ā726. PMLR, 2019.
C. Chesneau and Y. J. Bagul. A note on some new bounds for trigonometric functions using infinite products.
Malaysian Journal of Mathematical Sciences, 14:273ā283, 07 2020.
W. Cheung, D. Simchi-Levi, and R. Zhu. Hedging the drift: Learning to optimize under nonstationarity.
Management Science, 68(3):1696ā1713, 2022.
J. Conway et al. The game of life. Scientific American, 223(4):4, 1970.
R. Couillet and M. Debbah. Random matrix methods for wireless communications. Cambridge University Press, 2011.
S. Curi, F. Berkenkamp, and A. Krause. Efficient model-based reinforcement learning through optimistic policy search and planning. Advances in Neural Information Processing Systems, 33:14156ā14170, 2020.
V. Dani, T. P. Hayes, and S. M. Kakade. Stochastic linear optimization under bandit feedback. In 21st Annual Conference on Learning Theory, pp. 355ā366, 2008.
S. A. Derevyanko, J. E. Prilepsky, and S. K. Turitsyn. Capacity estimates for optical transmission based on the nonlinear Fourier transform. Nature communications, 7(1):12710, 2016.
D. L. Donoho. Compressed sensing. IEEE Trans. Information Theory, 52(4):1289ā1306, 2006.
M. F. Duarte, M. A. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly, and R. G. Baraniuk. Single-pixel imaging via compressive sampling. IEEE Signal Processing Magazine, 25(2):83ā91, 2008.
Y. C. Eldar and G. Kutyniok. Compressed sensing: theory and applications. Cambridge university press, 2012.
C. Furusawa and K. Kaneko. A dynamical-systems view of stem cell biology. Science, 338(6104):215ā217, 2012.
E. Hazan. Introduction to online convex optimization. Foundations and TrendsĀ® in Optimization, 2(3-4): 157ā325, 2016.
E. Hazan, H. Lee, K. Singh, C. Zhang, and Y. Zhang. Spectral filtering for general linear dynamical systems.
Advances in Neural Information Processing Systems, 31, 2018.
M. E. Hughes, K. C. Abruzzi, R. Allada, R. Anafi, A. B. Arpat, G. Asher, P. Baldi, C. De Bekker, D. BellPedersen, J. Blau, et al. Guidelines for genome-scale analysis of biological rhythms. Journal of Biological Rhythms, 32(5):380ā393, 2017.
S. Kakade, A. Krishnamurthy, K. Lowrey, M. Ohnishi, and W. Sun. Information theoretic regret bounds for online nonlinear control. Advances in Neural Information Processing Systems, 33:15312ā15325, 2020.
N. M. Katz. Exponential Sums and Differential Equations. (AM-124). Princeton University Press, 1990. E. Kaufmann, O. CappĆ©, and A. Garivier. On the complexity of best-arm identification in multi-armed bandit models. The Journal of Machine Learning Research, 17(1):1ā42, 2016.
J. N. Kutz, S. L. Brunton, B. W. Brunton, and J. L. Proctor. Dynamic mode decomposition: data-driven modeling of complex systems. SIAM, 2016.
S. Lale, K. Azizzadenesheli, B. Hassibi, and A. Anandkumar. Logarithmic regret bound in partially observable linear dynamical systems. Advances in Neural Information Processing Systems, 33:20876ā20888, 2020.
T. Lattimore and C. SzepesvĆ”ri. Bandit algorithms. Cambridge University Press, 2020. A. X. Lee, A. Nagabandi, P. Abbeel, and S. Levine. Stochastic latent actor-critic: Deep reinforcement learning with a latent variable model. Advances in Neural Information Processing Systems, 33:741ā752, 2020.
H. Lee. Improved rates for prediction and identification of partially observed linear dynamical systems. In International Conference on Algorithmic Learning Theory, pp. 668ā698. PMLR, 2022.
H. Lee and C. Zhang. Robust guarantees for learning an autoregressive filter. In Algorithmic Learning Theory, pp. 490ā517. PMLR, 2020.
L. Li, W. Chu, J. Langford, and R. E. Schapire. A contextual-bandit approach to personalized news article recommendation. In Proc. International Conference on World Wide Web, pp. 661ā670, 2010.
L. Ljung. Perspectives on system identification. Annual Reviews in Control, 34(1):1ā12, 2010.
H. Luo, C. Wei, A. Agarwal, and J. Langford. Efficient contextual bandits in non-stationary worlds. In Conference on Learning Theory, pp. 1739ā1776. PMLR, 2018.
H. Mania, M. I. Jordan, and B. Recht. Active learning for nonlinear system identification with guarantees.
Journal of Machine Learning Research, 23(32):1ā30, 2022.
K. Menda, J. De B., J. Gupta, I. Kroo, M. Kochenderfer, and Z. Manchester. Scalable identification of partially observed systems with certainty-equivalent EM. In ICML, pp. 6830ā6840, 2020.
L. Meng and B. Zheng. The optimal perturbation bounds of the Moore-Penrose inverse under the Frobenius norm. Linear algebra and its applications, 432(4):956ā963, 2010.
Z. Mhammedi, D. J. Foster, M. Simchowitz, D. Misra, W. Sun, A. Krishnamurthy, A. Rakhlin, and J. Langford. Learning the linear quadratic regulator from nonlinear observations. Advances in Neural Information Processing Systems, 33:14532ā14543, 2020.
A. Moore, T. Zielinski, and A. J. Millar. Online period estimation and determination of rhythmicity in circadian data, using the BioDare data infrastructure. In Plant Circadian Networks, pp. 13ā44. Springer, 2014.
S. Oh, A. M. Appavoo, and S. Gilbert. Periodic bandits and wireless network selection. In 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), pp. 149:1ā149:15, 2019.
T. Oh. Note on a lower bound of the Weyl sum in Bourgain's NLS paper (GAFA'93).
M. Ohnishi, I. Ishikawa, K. Lowrey, M. Ikeda, S. M. Kakade, and Y. Kawahara. Koopman spectrum nonlinear regulators and efficient online learning. Transactions on Machine Learning Research, 2024.
S. Ouala, D. Nguyen, L. Drumetz, B. Chapron, A. Pascual, F. Collard, L. Gaultier, and R. Fablet. Learning latent dynamics for partially observed chaotic systems. Chaos: An Interdisciplinary Journal of Nonlinear Science, 30, 2020.
E. M. Rathje, N. A. Abrahamson, and J. D. Bray. Simplified frequency content estimates of earthquake ground motions. Journal of Geotechnical and Geoenvironmental Engineering, 124(2):150ā159, 1998.
H. Robbins. Some aspects of the sequential design of experiments. Bulletin of the American Mathematical Society, 58(5):527ā535, 1952.
Y. Russac, C. Vernade, and O. CappƩ. Weighted linear bandits for non-stationary environments. Advances in Neural Information Processing Systems, 32, 2019.
F. Sabetta and A. Pugliese. Estimation of response spectra and simulation of nonstationary earthquake ground motions. Bulletin of the Seismological Society of America, 86(2):337ā352, 1996.
J.-P. Serre. Linear Representations of Finite Groups. Springer New York, NY, 1977. doi: https://doi.org/ 10.1007/978-1-4684-9458-7.
M. Simchowitz and D. Foster. Naive exploration is optimal for online LQR. In ICML, pp. 8937ā8948. PMLR, 2020.
M. Simchowitz, R. Boczar, and B. Recht. Learning linear dynamical systems with semi-parametric least squares. In Conference on Learning Theory, pp. 2714ā2802. PMLR, 2019.
P. G. Sokolove and W. N. Bushell. The Chi square periodogram: its utility for analysis of circadian rhythms.
Journal of Theoretical Biology, 72(1):131ā160, 1978.
Y. Song. A note on the variation of the spectrum of an arbitrary matrix. Linear algebra and its applications, 342(1-3):41ā46, 2002.
J. Subramanian, A. Sinha, R. Seraj, and A. Mahajan. Approximate information state for approximate planning and reinforcement learning in partially observed systems. Journal of Machine Learning Research, 23(12):1ā83, 2022.
C. Summers, K. Lowrey, A. Rajeswaran, S. Srinivasa, and E. Todorov. Lyceum: An efficient and scalable ecosystem for robot learning. In Learning for Dynamics and Control, pp. 793ā803. PMLR, 2020.
B. Szigeti, P. Gleeson, M. Vella, S. Khayrulin, A. Palyanov, J. Hokanson, M. Currie, M. Cantarelli, G. Idili, and S. Larson. OpenWorm: an open-science approach to modeling Caenorhabditis elegans. Frontiers in Computational Neuroscience, 8:137, 2014.
F. Takens. Detecting strange attractors in turbulence. In Dynamical systems and turbulence, pp. 366ā381.
Springer, 1981.
S. V. Tenneti and P. Vaidyanathan. Nested periodic matrices and dictionaries: New signal representations for period estimation. IEEE Transactions on Signal Processing, 63(14):3736ā3750, 2015.
F. Trovo, S. Paladino, M. Restelli, and N. Gatti. Sliding-window Thompson sampling for non-stationary settings. Journal of Artificial Intelligence Research, 68:311ā364, 2020.
A. Tsiamis and G. J. Pappas. Finite sample analysis of stochastic system identification. In IEEE CDC, pp.
3648ā3654, 2019.
A. Tsiamis, N. Matni, and G. Pappas. Sample complexity of Kalman filtering for unknown systems. In Learning for Dynamics and Control, pp. 435ā444. PMLR, 2020.
J. H. Tu. Dynamic mode decomposition: Theory and applications. PhD thesis, Princeton University, 2013.
S. K. Turitsyn, J. E. Prilepsky, S. T. Le, S. Wahls, L. L. Frumin, M. Kamalian, and S. A. Derevyanko.
Nonlinear Fourier transform for optical data processing and transmission: advances and perspectives.
Optica, 4(3):307ā322, 2017.
W. I. T. Uy and B. Peherstorfer. Operator inference of non-Markovian terms for learning reduced models from partially observed state trajectories. Journal of Scientific Computing, 88(3):1ā31, 2021.
J. Van De Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. Borjesson. On channel estimation in ofdm systems. In IEEE 45th Vehicular Technology Conference. Countdown to the Wireless Twenty-First Century, volume 2, pp. 815ā819, 1995.
J. Von Neumann, A. W. Burks, et al. Theory of self-reproducing automata. IEEE Transactions on Neural Networks, 5(1):3ā14, 1966.
P. Walters. An introduction to ergodic theory, volume 79. Springer Science & Business Media, 2000.
P. Wedin. Perturbation theory for pseudo-inverses. BIT Numerical Mathematics, 13(2):217ā232, 1973.
H. Weyl. Ćber die gleichverteilung von zahlen mod eins. Math. Ann., 77:31ā352, 1916. M. O. Williams, I. G. Kevrekidis, and C. W. Rowley. A dataādriven approximation of the Koopman operator: Extending dynamic mode decomposition. Journal of Nonlinear Science, 25:1307ā1346, 2015.
C. J. Wolfe. On the properties of predominant-period estimators for earthquake early warning. Bulletin of the Seismological Society of America, 96(5):1961ā1965, 2006.
Q. Wu, N. Iyer, and H. Wang. Learning contextual bandits in a non-stationary environment. In The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 495ā504, 2018.
T. Zielinski, A. M. Moore, E. Troup, K. J. Halliday, and A. J. Millar. Strengths and limitations of period estimation methods for circadian data. PloS one, 9(5):e96462, 2014.
A Proof Of Proposition 5.2
Proof.
Then, āT > 0 satisfies the following inequality
if and only if
Since Lmax ā„ 2, D ā„ B, Āµ < Ī³ suptā„1 |at|, C0(1 + Ī³) < 3, and
max (C +pC2 + 4(Īµ ā Āµ)B 2(Īµ ā Āµ), C +pC2 + 4(Īµ ā Āµ)D 2(Īµ ā Āµ) ) = C +pC2 + 4(Īµ ā Āµ)D 2(Īµ ā Āµ) ā¤ 2 sLmaxC2 4(Īµ ā Āµ) 2 +D (Īµ ā Āµ) ā¤ 2 s2L2maxC2 Ļ 2 0 (Ī¾ ā Ī») 2 + 6 ā2L 5/2 max suptā„1 |at| Ļ0(Ī¾ ā Ī») ā¤ 2 s2L2maxC2 Ļ 2 0 (Ī¾ ā Ī») 2 + 9L 5/2 max suptā„1 |at| Ļ0(Ī¾ ā Ī»), where we used ā1 ā 2Ī³ = 2Ī³ āLmax. Since 2Īµ ā¤p(Ļ 2 0 ā 2ĀµĻ0)/Lmax, the statement follows from Lemma 5.1.
B Proof Of Theorem 5.3
Proof. Let K be the set of all combinations (m, Ī², s, q) such that m ā [d], Ī² ā [Lmax], s ā {0, 1*, . . . , Ī²* ā 1} and {q = Ī±/ā : Ī± ā {1*, . . . , ā* ā 1}}. We remark that
$$\leq d\sum_{\beta=1}^{L_{\max}}\frac{L_{\max}}{2}\left(\frac{L_{\max}}{\beta}-1\right)$$ $$\leq\frac{dL_{\max}^{2}\log L_{\max}}{2}.$$
Also, let E Tp Īŗ be the event such that, for the combination Īŗ ā K ,
Because the error sequence satisfies conditionally R-sub-Gaussian, using Lemma D.1 and from the fact that any subsequence of the filtration {FĻ } is again a filtration, we obtain, for each Īŗ ā K ,
Define E Tp := TĪŗāK E Tp Īŗ . Then, it follows from the FrĆ©chet inequality that
$$=1-\frac{\delta|\mathcal{K}|}{dL_{\max}^{2}\log L_{\max}}\geq1-\delta.$$
Let Lb be the output of Algorithm 1. We show that, with probability 1 ā Ī“, Lb is (Ļ, ād)-anp of L. In fact, suppose Lb is not (Ļ, ād)-anp. We note that *L < L* b . There exists s ā {0*, . . . ,* Lb ā 1} and t1, t2 ā Z>0,
Let mā² ā argmaxm=1*,...,d* f s+Lt b 1 (Īø) $\hat{\iota}s+\hat{L}t_{1}(\theta)^{\top}\mathbf{u}{m}-f^{s+\hat{L}t{2}}(\theta)^{\top}\mathbf{u}{m}\big{|}$. Put $a{t}:=f^{s+\hat{L}t_{1}}$ s+Lt b 2 (Īø) . Put at := f s+Lt b (Īø) ā¤umā² . Then, for any t, tā² ā Z>0, we have $$\geq\frac{|f^{s+\widehat{L}t_{1}}(\theta)-f^{s+\widehat{L}t_{2}}(\theta)|_{\mathbb{R}^{d}}}{\sqrt{d}}-2\mu$$ $$>\frac{\rho}{\sqrt{d}}.$$ Thus, by definition, we have
Let Ļ0 = Ļ/2 ādLmax and Ī¾ := Ī³ ā1/3 āLmax. Then, Āµ/(Ī³Ī¾) < Ļ0 ā¤ ĻL/Lb ((at)t), and
8LmaxR2log(4/Ī“) Ļ 2 0 (Ī¾ ā Ī») 2+ 36L 5/2 max suptā„1 |at| Ļ0(Ī¾ ā Ī») ā¤ 32Ī¾ ā2dL2maxR2log(4/Ī“) Ļ 2(1 ā r) 2+ 72Ī¾ ā1 ādL3max suptā„1 |at| Ļ(1 ā r) ā¤ 72dL2maxR2log(4/Ī“) Ļ 2(1 ā r) 2+ 108ādL3max suptā„1 |at| Ļ(1 ā r). The last inequality follows from Ī¾ ā„ 2/3. Thus, by Proposition 5.2, the algorithm finds Ī² > Lb in mā²-th loop, and the output becomes an integer larger than Lb, which is contradiction.
C Proof Of Theorem 5.8
Here, we provide the proof of Theorem 5.8.
C.1 Proof Let
$K:=(M\theta,\ldots,M^{d}\theta):\mathbb{C}^{d}\to W,$ $E_{s}(N):=\mathscr{W}\left((E_{s,j})_{j=0}^{N-1}\right):\mathbb{C}^{d}\to\mathbb{C}^{d}.$ For a linear map M : W ā W, we define linear maps:
For s = 0, 1, we define linear maps on C d by
We note that As(N; MĪø) is identical to As(N) defined in (5.7). We impose the following assumption on X(MĪø): Assumption 5. The kernel of the linear map X(M1) is the same as N (M1).
Note that this assumption holds with probability 1 if we randomly choose xĖ1*, . . . ,* xĖd (see Lemma C.7).
The following isomorphicity maintenance lemma provides an explicit description of B0(N; M1) ā .
Lemma C.1 (Isomorphicity maintenance lemma). Suppose Assumption 5 holds. Assume N ā„ 16L 2*. Let*
Let i : U1 ā C dbe the inclusion map and p : C d ā U ā„ 2the orthogonal projection. Then, restriction of X(M1) (resp. M1K) to U3 (resp. U ā„ 2 ) induces an isomorphism onto U1 (resp. U3). If we denote the isomorphism by XĖ (resp, KĖ ). Then, B0(N; M1) ā is given by
2āN U3 QN (M1)| ā1 U3 XĖ ā1i ā. Proof. Since we have N (M1) = N (Mr+1 1) for all r ā„ 0 and Assumption 5, surjectivity of K by Proposition C.5, and bijectivity of QN (M1) on U3 by Proposition 5.7, we have
Thus, the restriction of X(M1) (resp. K) to U3 (resp. U ā„ 2 ) induces an isomorphism onto U1 (resp. U3). Let us denote the isomorphism by XĖ (resp. KĖ ). Then, the last statement follows from Proposition C.4.
Lemma C.2. Assume N ā„ 16L 2*. Let*
Then, A is independent of N and its eigenvalues are zeros except for (Īø, d)-distinct eigenvalues of M. Proof. We use the notation as in Lemma C.1. By Lemma C.1, we obtain B1(N; M1)B0(N; M1) ā = iXMĖ d 1 XĖ ā1i ā, which is independent of N and its eigenvalues are zeros except for (Īø, d)-distinct eigenvalues of M.
The following result will be used in the proof of Theorem 5.8 (but not essential).
Lemma C.3. We have
Proof. Considering the Jordan normal form, the first inequality is obvious. As for the second inequality, we define J ā R dĆd by the nilpotent matrix
. Then, we have
$$=\sum_{r=1}^{d}\sum_{j=0}^{d}\binom{r}{j}(d-j)$$ $$=\sum_{j=0}^{d}(d-j)\sum_{r=1}^{d}\binom{r}{j}$$ $$=d+\sum_{j=1}^{d}(d-j)\sum_{r=1}^{d}\binom{r}{j}$$ $$=d+\sum_{j=1}^{d}(d-j)\binom{r+1}{j+1}$$ $$=d+(d+1)2^{d}-(d+1)d-(d+1)$$ $$<(d+1)2^{d}.$$
Proof of Theorem 5.8. Let A be the matrix introduced in Lemma C.2. Let
Let M1 and M<1 be matrices as in Corollary 4.3. Then, by Proposition 4.2, we see that
We denote by AĖs(N; M) (resp, BĖs(N; M)) the low rank approximation via the singular value threshold Ī³(N) (see Definition 5.4). By direct computations, we have
$$\leq|A_{1}(N;M)|\cdot|\tilde{A}{0}(N;M)^{\dagger}-B{0}(N;M_{1})^{\dagger}|+|A_{1}(N;M)-B_{1}(N;M_{1})|\cdot|B_{0}(N;M_{1})^{\dagger}|$$ $$\leq(|B_{1}(N;M_{1})|+|B_{1}(N;M_{\epsilon1})|+|E_{1}(N)|)\cdot|\tilde{A}{0}(N;M)^{\dagger}-B{0}(N;M_{1})^{\dagger}|$$ $$\quad+|B_{1}(N;M_{\epsilon1})+E_{1}(N)|\cdot|B_{0}(N;M_{1})^{\dagger}|.$$ By Proposition 5.7, for s = 0, 1 and for N ā„ max{2d, 16L 2}, we have ā„Bs(N; M1)ā„ ā¤ ā„X(M1)ā„ Ā· ā„MN+sdā1 1 QN (M1)ā„ Ā· ā„Kā„ ā¤ ĪŗCws(L)ā„X(M1)ā„ā„Kā„ ā¤ BdĪŗ2Cws(L) ā„Bs(N; M<1)ā„ ā¤ ā„X(M<1)ā„ Ā· ā„MN+sdā1 <1 QN (M<1)ā„ Ā· ā„Kā„ ā¤ ā„X(M<1)ā„ Ā· ā„Kā„ Ā· d 2Īŗeāā(N+sdād) Nādā1 ā¤ BĪŗād(d + 1)2dĀ· d 2Īŗeāā(N+sdād) Nādā1 ā¤ BĪŗ2e d+6āā(N+sdād) Nādā1, where we used ā„Kā„ ā¤ ādB (Assumption 3), and ā„X(M<1)ā„ ā¤ Īŗ(d+1)2d(Lemma C.3), and ād(d+1)d 22 d < e d+6. By Lemma C.1 with Proposition 5.7, we see that
By using Lemma D.1 and union bounds, we obtain
with probability at least 1 ā Ī“. Assume that
N ā„ ā(d ā 1) log ā ā+ log(BĪŗ2) + d + 6 ā+ d. Then, we see that ā„Bs(N; M<1)ā„ ā¤ 1/N. Thus, by Lemma C.6, with probability at least 1 ā Ī“, we have ā„AĖ0(N; M) ā ā B0(N; M1) ā ā„ ā¤ 8(ā„E0(N)ā„ + ā„B0(N; M<1)ā„) Ā· ā„B0(N, M1) ā ā„ 2( ā d + 1) ā¤ 8Ī³(N) Ā· ā„B0(N, M1) ā ā„ 2( ā d + 1) ā¤ 8(1 + ād)Īŗ 2Cws(L) 2ā„XĖ ā1ā„ 2Ā· ā„KĖ ā1ā„ 2Ī³(N). Therefore, there exists $C>0$ depending on $|X(M)|$, $|K|$, $\kappa$, $C_{\mathsf{vol}}(L)$, $|\widehat{X}^{-1}|$, $|\widehat{K}^{-1}|$, and $d$ such that $$|A-A_{1}(N;M)\hat{A}{0}(N;M)^{\dagger}|<C\left(\frac{R^{2}\left(\log\left(1/\delta\right)+1\right)+1}{\sqrt{N}}\right),$$ with probability that $A{1}$ for $\alpha$ with probability at least 1 ā Ī“.
C.2 Miscellaneous
We provide an expression of Moore-Penrose pseudo inverse: Proposition C.4. Let A : C m ā C n be a linear map. Let i : I (A) ā C n be the inclusion map and let p : C m ā N (A) ā„ be the orthogonal projection. Let AĖ := A|N (A): N (A) ā„ ā I (A) be an isomorphism.
Then, the Moore-Penrose pseudo inverse Aā coincides with i āAĖā1p ā.
Proof. Let B := p āAĖā1i ā. We remark that A = iApĖ , i āi = id*, pp*ā = id, we see that ABA = A, BAB = B, (AB) ā = AB, and BA = (BA) ā. By the uniqueness of Moore-Penrose pseudo inverse, B = Aā .
Proposition C.5. Let A ā C dĆdbe a matrix and let v ā C dbe a vector. Let V ā C dbe a linear subspace generated by {Ajv}ā j=1. Then, V = I(Av, A2v, . . . , Adv).
Proof. Put W = I(Av, A2v, . . . , Adv). The inclusion W ā V is obvious, we prove the opposite inclusion.
It suffices to show that Aj P v ā W for any positive integer j > d. By the Cayley-Hamilton theorem, Ad = d j=1 cjAdājfor some cj ā C. Thus, by induction Ajis a linear combination of A, A2*, . . . , A*d, namely, Ajv ā W.
We give several lemmas here.
Lemma C.6 (Perturbation bounds of the Moore-Penrose inverse). Suppose A ā C dĆdis a matrix. Let E ā C dĆdbe a matrix satisfying
and let AĖE ā C dĆdbe the low rank approximation of A+E via SVD with the singular value threshold C/āN.
Then, we obtain
Proof. Let Ļmin = ā„Aā ā„ ā1 be the minimal singular value of A. From (Meng & Zheng, 2010, Theorem 1.1) (or originally Wedin (1973)) and from the fact
we obtain
For N such that 1 ā¤ N ā¤ 4C 2/Ļ2min, we have AĖā E ā¤ āN /C ā¤ 2/Ļmin. Suppose singular values Ļk, k ā [d], of A, and ĻĖk, k ā [d], of A + E are sorted in descending order. Then, it holds that
Therefore, for N > 4C 2/Ļ2min, the minimum singular value ĻĖd is greater than Ļmin/2. In this case, AĖE = A + E, and it follows that AĖā E ā¤ 2/Ļmin. Hence, for all N ā„ 1, we obtain
from which, it follows that
Lemma C.7 (Null space of random matrix). Suppose Mk ā R dĆd, k ā [d], have the same null space. Then, the null space of
, where xk, k ā [d], are unit vectors independently drawn from the uniform distribution over the unit hypersphere, is the same as those of Mk with probability one. Proof. Given any k ā1 dimensional linear subspace in N (Mk) ā„ for any k ā [d], it holds that the probability that x ā¤ k Mk lies on that space is zero. Therefore, by union bound, and by the fact that the row space is the orthogonal complement of the null space, we obtain the result.
D Azuma-Hoeffding Inequality For Exponential Sum
Lemma D.1. Let {Xj} n j=1 for n ā Z>0 be sub-Gaussian martingale difference with variance proxy R2 and a filtration {Fj}. Also, let {aj} ā C be a sequence of complex numbers satisfying |aj | ā¤ 1 for all j ā [n].
Then, the followings hold, where ā[Ā·] stands for Re[Ā·] or Im[Ā·].
$$\Pr\left[\frac{1}{n}\left|\sum_{j=1}^{n}a_{j}X_{j}\right|\leq\sqrt{\frac{4R^{2}\log\left(4/\delta\right)}{n}}\right]\geq1-\delta.$$
Proof. For a filtration {Fi}iā¤n, we have
where the first inequality follows from the assumption of filtration, and the second inequality follows from
By induction, we obtain
By using Markov inequality and the union bound, it follows that
Similarly, we have
Therefore, we obtain
$$\geq\Pr\left[\frac{1}{n}\left|\Re\epsilon\left[\sum_{j=1}^{n}a_{j}X_{j}\right]\right|\leq\sqrt{\frac{2R^{2}\log\left(4/\delta\right)}{n}}\right]$$ $$+\Pr\left[\frac{1}{n}\left|\Im\mathrm{m}\left[\sum_{j=1}^{n}a_{j}X_{j}\right]\right|\leq\sqrt{\frac{2R^{2}\log\left(4/\delta\right)}{n}}\right]+$$ $$\geq\left(1-\frac{\delta}{2}\right)+\left(1-\frac{\delta}{2}\right)-1\geq1-\delta,$$ follows from the $\Pr\left(\delta\right)$-th term.
ā 1
where the first inequality follows from the FrƩchet inequality.
E Applications To Bandit Problems
We briefly cover the applicability of our proposed algorithms to bandit problems (e.g., regret minimization) which is mentioned in the introduction. A naive approach is an explore-then-commit type algorithm (cf. Robbins (1952); Anscombe (1963)). One employs our algorithm to estimate a nearly period, followed by a certain periodic bandit algorithm such as the work in Cai et al. (2021) to obtain an asymptotic order of regret. Caveat here is, because our estimate is only an aliquot nearly period, one may need to take into account the regret caused by this misspecification when running bandit algorithms (e.g., Ļ and Āµ may lead to (small) linear regret). Avoiding this small linear regret would require the system to be 0-nearly periodic and that there exists a sufficiently large gap ensuring Āµ-nearly period with sufficiently small Āµ implies 0-nearly period. If one aims at designing an anytime algorithm, the straightforward application of our algorithms may not give near optimal asymptotic rate of expected regret because the failure probability of periodic structure estimations cannot be adjusted later. To remedy this, one can employ our algorithm repetitively, and gradually increase the span of such procedure. Importantly, samples from separated spans can contribute to the estimate together when the surplus beyond a multiple of period is properly dealt with. Since failure probability decreases exponentially with respect to sample size, we conjecture that increasing the span for bandit algorithm by a certain order will lead to the same rate (up to logarithm) of expected regret of the adopted bandit algorithm.
F Simulation Setups And Results
Throughout, we used the following version of Julia Bezanson et al. (2017); for each experiment, the running time was less than a few minutes. Julia Version 1.6.3 Platform Info: OS: Linux (x86_64-pc-linux-gnu) CPU: Intel(R) Core(TM) i7-6850K CPU @ 3.60GHz WORD_SIZE: 64 LIBM: libopenlibm
LifeGame hyperparameter | Value | Algorithm hyperparameter | Value |
---|---|---|---|
height | 12 | accuracy for estimation Ļ | 0.98 |
width | 12 | failure probability bound Ī“ | 0.2 |
observed dimension | 5 | maximum possible period Lmax | 10 |
observation noise proxy R | 0.3 | ||
ball radius B | ā 5 |
Table 3: Hyperparameters used for period estimation of LifeGame.
Figure 8: The area we focus on for the cellular automata experiment.
LLVM: libLLVM-11.0.1 (ORCJIT, broadwell) Environment: JULIA_NUM_THREADS = 12 We also used some tools and functionalities of Lyceum Summers et al. (2020). The licenses of Julia and Lyceum are [The MIT License; Copyright (c) 2009-2021: Jeff Bezanson, Stefan Karpinski, Viral B. Shah, and other contributors: https://github.com/JuliaLang/julia/contributors], and [The MIT License; Copyright (c) 2019 Colin Summers, The Contributors of Lyceum], respectively. In this section, we provide simulation setups, including the details of parameter settings.
F.1 Period Estimation: Lifegame
The hyperparameters of LifeGame environment and the algorithm are summarized in Table 3. Note Āµ = 0 because it is a periodic transition. Here, we used 12 Ć 12 blocks of cells and we focused on the five blocks surrounded by the red rectangle in Figure 8. The transition rule is given by 1. If the cell is alive and two or three of its surrounding eight cells are alive, then the cell remains alive.
If the cell is alive and more than three or less than two of its surrounding eight cells are alive, then the cell dies.
If the cell is dead and exactly three of its surrounding eight cells are alive, then the cell is revived.
F.2 Period Estimation: Simple Ī**-Nearly Periodic System**
The dynamical system
is Āµ-nearly periodic. See Figure 9 for the illustrations when Āµ = 0.2, L = 5, Ī± = Ļ. It is observed that there are five clusters. We mention that this system is not exactly periodic. The hyperparameters of this system and the algorithm are summarized in Table 4.
Table 4: Hyperparameters used for Āµ-nearly periodic system.
System hyperparameter | Value | Algorithm hyperparameter | Value |
---|---|---|---|
dimension | 2 | accuracy for estimation Ļ | 0.3 |
Āµ | 0.001 | failure probability bound Ī“ | 0.2 |
Ī± | Ļ | maximum possible nearly period Lmax | 8 |
observation noise proxy R | 0.3 | ||
ball radius B | 2 |
Figure 9: An example of Āµ-nearly periodic system.
F.3 Eigenvalue Estimation
We used the matrix M given by
0 0 0 1 0
. $\left|\begin{array}{c}1\ 0\ 0\end{array}\right.$ The first 4 Ć 4 block matrix is for permutation. After N steps, it is expected that the last dimension shrinks so that the system becomes nearly periodic. It follows that 4! = 24 is a multiple of the length L. Eigenvalues of M5 are given by 1.000, 1.000, ā0.500ā0.866i, ā0.500+ 0.866i, 0.168, and the (Īø0, 5)-distinct eigenvalues are 1.000, ā0.500 ā 0.866i, ā0.500 + 0.866i.
The hyperparameters of the environment and the algorithm are summarized in Table 5. Note we don't necessarily need Īŗ, B, and ā to run the algorithm as long as the effective sample size is sufficiently large; we used the values (satisfying the conditions) in Table 5 for simplicity.
Hyperparameter | Value | Hyperparameter | Value |
---|---|---|---|
Īŗ | 6 | a nearly period L | 24 |
ā | 0.1 | failure probability bound Ī“ | 0.2 |
dimension | 5 | observation noise proxy R | 0.3 |
ball radius B | 1 |
Table 5: Hyperparameters used for eigenvalue estimation.
F.4 Realistic Simulation
The hyperparameters used for period estimation that outputs an invalid estimate are summarized in Table 6 while those for a reasonable output are summarized in Table 7. Also, the hyperparameters used for the eigenvalue estimation are summarized in Table 8. Note for all of them, we used the fixed number of sample sizes.
System hyperparameter | Value | Algorithm hyperparameter | Value |
---|---|---|---|
dimension | 36 | accuracy for estimation Ļ | 1.0 |
sample number Tp | 3 Ć 105 | maximum possible nearly period Lmax | 25 |
observation noise proxy R | 0 | ||
--------------------------- | --------- | ------------------------------------- | --------- |
dimension | 36 | accuracy for estimation Ļ | 20.0 |
sample number Tp | 3 Ć 105 | maximum possible nearly period Lmax | 25 |
observation noise proxy R | 0 |
Hyperparameter | Value | Hyperparameter | Value |
---|---|---|---|
sample number N | 103 , 104 , 105 | failure probability bound Ī“ | 0.2 |
dimension | 36 | observation noise proxy R | 1.0 |
a nearly period L | 20 |
Table 6: Hyperparameters used for worm simulation that outputs incorrect value.
Table 7: Hyperparameters used for worm simulation that outputs reasonable value.
Table 8: Hyperparameters used for eigenvalue estimation of worm simulation.