当前位置:网站首页>20220606 关于矩阵的Young不等式
20220606 关于矩阵的Young不等式
2022-06-13 08:55:00 【我起个什么名字呢】
定理:
合适维数的矩阵 A , B , C , D A, B, C, D A,B,C,D,合适维数的向量 x , y x, y x,y,有
2 x T ( ( A B ) ⊗ ( C D ) ) y ≤ x T ( A A T ⊗ C C T ) x + y T ( B T B ⊗ D T D ) y 2x^{T}\left(\left(AB\right) \otimes \left(CD\right)\right)y\leq x^T\left(AA^T \otimes CC^T\right)x + y^T\left(B^TB \otimes D^TD\right)y 2xT((AB)⊗(CD))y≤xT(AAT⊗CCT)x+yT(BTB⊗DTD)y
原因分析:
2 x T ( ( A B ) ⊗ ( C D ) ) y = 2 x T ( A ⊗ C ) ( B ⊗ D ) y = 2 ( ( A ⊗ C ) T x ) T ( B ⊗ D ) y ≤ ( ( A ⊗ C ) T x ) T ( ( A ⊗ C ) T x ) + ( ( B ⊗ D ) y ) T ( B ⊗ D ) y = x T ( A ⊗ C ) ( A ⊗ C ) T x + y T ( B ⊗ D ) T ( B ⊗ D ) y = x T ( A A T ⊗ C C T ) x + y T ( B T B ⊗ D T D ) y \begin{aligned} {}&2x^{T}\left(\left(AB\right) \otimes \left(CD\right)\right)y \\ ={}& 2x^{T}\left(A \otimes C\right)\left(B \otimes D\right)y \\ ={}& 2\left(\left(A \otimes C\right)^Tx\right)^T\left(B \otimes D\right)y \\ \leq{}& \left(\left(A \otimes C\right)^Tx\right)^T\left(\left(A \otimes C\right)^Tx\right) + \left(\left(B \otimes D\right)y\right)^T\left(B \otimes D\right)y \\ ={}& x^T\left(A \otimes C\right)\left(A \otimes C\right)^Tx + y^T\left(B \otimes D\right)^T\left(B \otimes D\right)y \\ ={}& x^T\left(AA^T \otimes CC^T\right)x + y^T\left(B^TB \otimes D^TD\right)y \end{aligned} ==≤==2xT((AB)⊗(CD))y2xT(A⊗C)(B⊗D)y2((A⊗C)Tx)T(B⊗D)y((A⊗C)Tx)T((A⊗C)Tx)+((B⊗D)y)T(B⊗D)yxT(A⊗C)(A⊗C)Tx+yT(B⊗D)T(B⊗D)yxT(AAT⊗CCT)x+yT(BTB⊗DTD)y

边栏推荐
- CentOS installing MySQL and setting up remote access
- 0. Quelques doutes au sujet de SolidWorks
- output. Interpretation of topk() function
- 20211108 能观能控,可稳可测
- Gbase 8A disk problems and Solutions
- Knowledge points related to system architecture 2
- Basic use of cesium, including loading images, terrain, models, vector data, etc
- Cesium view switching, locating, reading files, building data sources, entity control, model control, etc
- Four kinds of hooks in deep learning
- JS array method
猜你喜欢

关于RSA加密解密原理

Redirect vulnerability analysis of network security vulnerability analysis

0. Quelques doutes au sujet de SolidWorks

如何成为白帽子黑客?我建议你从这几个阶段开始学习

useRoutes() may be used only in the context of a <Router> component.

1. Learning sequence of SolidWorks modules

【 sécurité 】 comment devenir ingénieur de sécurité de 0 à 1 contre - attaque pour la Fondation zéro

File upload JS

Vscode define code block -- define cursor position

On the use of regular expressions (bracket problem)
随机推荐
Gbase 8A v95 vs v86 compression strategy analogy
How to save the video of wechat video number locally?
GBase 8a V95与V86压缩策略类比
PHP wechat special merchant incoming V3 packaging interface
Brief description of port, domain communication port and domain service
Review one flex knowledge point every day
centos 安装mysql及设置远程访问
20220524 如何把CoppeliaSim安装到D盘
GBase 8a磁盘问题及处理
Detailed explanation of C language callback function
You don't know the usage of stringstream
【 sécurité 】 comment devenir ingénieur de sécurité de 0 à 1 contre - attaque pour la Fondation zéro
File upload JS
2021-04-16
How many TCP connections can a machine create at most?
Invalid flex layout setting width
Margin:0 reason why auto does not take effect
Collection of various books
14. class initialization, default constructor, =default
The Jenkins console does not output custom shell execution logs