skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Microlocal properties of seven-dimensional lemon and apple Radon transforms with applications in Compton scattering tomography
Abstract We present a microlocal analysis of two novel Radon transforms of interest in Compton scattering tomography, which map compactly supported L 2 functions to their integrals over seven-dimensional sets of apple and lemon surfaces. Specifically, we show that the apple and lemon transforms are elliptic Fourier integral operators, which satisfy the Bolker condition. After an analysis of the full seven-dimensional case, we focus our attention on n D subsets of apple and lemon surfaces with fixed central axis, where n < 7. Such subsets of surface integrals have applications in airport baggage and security screening. When the data dimensionality is restricted, the apple transform is shown to violate the Bolker condition, and there are artifacts which occur on apple–cylinder intersections. The lemon transform is shown to satisfy the Bolker condition, when the support of the function is restricted to the strip 0 < z < 1 .  more » « less
Award ID(s):
1712207
PAR ID:
10349713
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Inverse Problems
Volume:
38
Issue:
6
ISSN:
0266-5611
Page Range / eLocation ID:
064001
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract This paper addresses the overdetermined problem of inverting the n -dimensional cone (or Compton) transform that integrates a function over conical surfaces in R n . The study of the cone transform originates from Compton camera imaging, a nuclear imaging method for the passive detection of gamma-ray sources. We present a new identity relating the n -dimensional cone and Radon transforms through spherical convolutions with arbitrary weight functions. This relationship, which generalizes a previously obtained identity, leads to various inversion formulas in n -dimensions under a mild assumption on the geometry of detectors. We present two such formulas along with the results of their numerical implementation using synthetic phantoms. Compared to our previously discovered inversion techniques, the new formulas are more stable and simpler to implement numerically. 
    more » « less
  2. Abstract We establish the sharp growth rate, in terms of cardinality, of the $L^p$ norms of the maximal Hilbert transform $$H_\Omega $$ along finite subsets of a finite order lacunary set of directions $$\Omega \subset \mathbb{R}^3$$, answering a question of Parcet and Rogers in dimension $n=3$. Our result is the first sharp estimate for maximal directional singular integrals in dimensions greater than 2. The proof relies on a representation of the maximal directional Hilbert transform in terms of a model maximal operator associated to compositions of 2D angular multipliers, as well as on the usage of weighted norm inequalities, and their extrapolation, in the directional setting. 
    more » « less
  3. A direct solver is introduced for solving overdetermined linear systems involving nonuniform discrete Fourier transform matrices. Such matrices can be transformed into a Cauchy-like form that has hierarchical low rank structure. The rank structure of this matrix is explained, and it is shown that the ranks of the relevant submatrices grow only logarithmically with the number of columns of the matrix. A fast rank-structured hierarchical approximation method based on this analysis is developed, along with a hierarchical least-squares solver for these and related systems. This result is a direct method for inverting nonuniform discrete transforms with a complexity that is usually nearly linear with respect to the degrees of freedom in the problem. This solver is benchmarked against various iterative and direct solvers in the setting of inverting the one-dimensional type-II (or forward) transform, for a range of condition numbers and problem sizes (up to 4 × 10 by 2 × 10 ). These experiments demonstrate that this method is especially useful for large problems with multiple right-hand sides. 
    more » « less
  4. null (Ed.)
    A bstract The 1/2-BPS Wilson loop in $$ \mathcal{N} $$ N = 4 supersymmetric Yang-Mills theory is an important and well-studied example of conformal defect. In particular, much work has been done for the correlation functions of operator insertions on the Wilson loop in the fundamental representation. In this paper, we extend such analyses to Wilson loops in the large-rank symmetric and antisymmetric representations, which correspond to probe D3 and D5 branes with AdS 2 × S 2 and AdS 2 × S 4 worldvolume geometries, ending at the AdS 5 boundary along a one-dimensional contour. We first compute the correlation functions of protected scalar insertions from supersymmetric localization, and obtain a representation in terms of multiple integrals that are similar to the eigenvalue integrals of the random matrix, but with important differences. Using ideas from the Fermi Gas formalism and the Clustering method, we evaluate their large N limit exactly as a function of the ’t Hooft coupling. The results are given by simple integrals of polynomials that resemble the Q -functions of the Quantum Spectral Curve, with integration measures depending on the number of insertions. Next, we study the correlation functions of fluctuations on the probe D3 and D5 branes in AdS. We compute a selection of three- and four-point functions from perturbation theory on the D-branes, and show that they agree with the results of localization when restricted to supersymmetric kinematics. We also explain how the difference of the internal geometries of the D3 and D5 branes manifests itself in the localization computation. 
    more » « less
  5. null (Ed.)
    In this paper we consider the following sparse recovery problem. We have query access to a vector 𝐱 ∈ ℝ^N such that x̂ = 𝐅 𝐱 is k-sparse (or nearly k-sparse) for some orthogonal transform 𝐅. The goal is to output an approximation (in an 𝓁₂ sense) to x̂ in sublinear time. This problem has been well-studied in the special case that 𝐅 is the Discrete Fourier Transform (DFT), and a long line of work has resulted in sparse Fast Fourier Transforms that run in time O(k ⋅ polylog N). However, for transforms 𝐅 other than the DFT (or closely related transforms like the Discrete Cosine Transform), the question is much less settled. In this paper we give sublinear-time algorithms - running in time poly(k log(N)) - for solving the sparse recovery problem for orthogonal transforms 𝐅 that arise from orthogonal polynomials. More precisely, our algorithm works for any 𝐅 that is an orthogonal polynomial transform derived from Jacobi polynomials. The Jacobi polynomials are a large class of classical orthogonal polynomials (and include Chebyshev and Legendre polynomials as special cases), and show up extensively in applications like numerical analysis and signal processing. One caveat of our work is that we require an assumption on the sparsity structure of the sparse vector, although we note that vectors with random support have this property with high probability. Our approach is to give a very general reduction from the k-sparse sparse recovery problem to the 1-sparse sparse recovery problem that holds for any flat orthogonal polynomial transform; then we solve this one-sparse recovery problem for transforms derived from Jacobi polynomials. Frequently, sparse FFT algorithms are described as implementing such a reduction; however, the technical details of such works are quite specific to the Fourier transform and moreover the actual implementations of these algorithms do not use the 1-sparse algorithm as a black box. In this work we give a reduction that works for a broad class of orthogonal polynomial families, and which uses any 1-sparse recovery algorithm as a black box. 
    more » « less