Differential approximation of the Gaussian by short cosine sums with exponential error decay

07/25/2023
by   Nadiia Derevianko, et al.
0

In this paper we propose a method to approximate the Gaussian function on ℝ by a short cosine sum. We extend the differential approximation method proposed in [4,39] to approximate e^-t^2/2σ in the weighted space L_2(ℝ, e^-t^2/2ρ) where σ, ρ >0. We prove that the optimal frequency parameters λ_1, … , λ_N for this method in the approximation problem min_λ_1,…, λ_N, γ_1…γ_Ne^-·^2/2σ - ∑_j=1^Nγ_j e^λ_j·_L_2(ℝ, e^-t^2/2ρ), are zeros of a scaled Hermite polynomial. This observation leads us to a numerically stable approximation method with low computational cost of 𝑂(N^3) operations. Furthermore, we derive a direct algorithm to solve this approximation problem based on a matrix pencil method for a special structured matrix. The entries of this matrix are determined by hypergeometric functions. For the weighted L_2-norm, we prove that the approximation error decays exponentially with respect to the length N of the sum. An exponentially decaying error in the (unweighted) L^2-norm is achieved using a truncated cosine sum.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/07/2022

ESPRIT versus ESPIRA for reconstruction of short cosine sums and its application

In this paper we introduce two new algorithms for stable approximation w...
research
04/12/2019

Low-rank binary matrix approximation in column-sum norm

We consider ℓ_1-Rank-r Approximation over GF(2), where for a binary m× n...
research
02/22/2022

Stable approximation of functions from equispaced samples via Jacobi frames

In this paper, we study the Jacobi frame approximation with equispaced s...
research
11/15/2021

ReLU Network Approximation in Terms of Intrinsic Parameters

This paper studies the approximation error of ReLU networks in terms of ...
research
04/05/2023

Chebyshev approximation of exponential data

In this paper we present an algorithm to fit data via exponentials when ...
research
01/21/2023

Exponential sum approximations of finite completely monotonic functions

Bernstein's theorem (also called Hausdorff–Bernstein–Widder theorem) ena...
research
12/20/2021

Vulnerability Analysis of the Android Kernel

We describe a workflow used to analyze the source code of the Android OS...

Please sign up or login with your details

Forgot password? Click here to reset