Next Article in Journal
Entropy-Based Discovery of Summary Causal Graphs in Time Series
Previous Article in Journal
Relative Entropy of Distance Distribution Based Similarity Measure of Nodes in Weighted Graph Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lower Bounds on Multivariate Higher Order Derivatives of Differential Entropy †

1
Laboratory of Mathematics and Complex Systems, Ministry of Education, School of Mathematical Sciences, Beijing Normal University, Beijing 100875, China
2
KLMM, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China
3
University of Chinese Academy of Sciences, Beijing 100049, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2021 IEEE International Symposium on Information Theory.
Entropy 2022, 24(8), 1155; https://doi.org/10.3390/e24081155
Submission received: 27 June 2022 / Revised: 28 July 2022 / Accepted: 17 August 2022 / Published: 19 August 2022

Abstract

:
This paper studies the properties of the derivatives of differential entropy H ( X t ) in Costa’s entropy power inequality. For real-valued random variables, Cheng and Geng conjectured that for m 1 , ( 1 ) m + 1 ( d m / d t m ) H ( X t ) 0 , while McKean conjectured a stronger statement, whereby ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 ( d m / d t m ) H ( X G t ) . Here, we study the higher dimensional analogues of these conjectures. In particular, we study the veracity of the following two statements: C 1 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) 0 , where n denotes that X t is a random vector taking values in R n , and similarly, C 2 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 ( d m / d t m ) H ( X G t ) 0 . In this paper, we prove some new multivariate cases: C 1 ( 3 , i ) , i = 2 , 3 , 4 . Motivated by our results, we further propose a weaker version of McKean’s conjecture C 3 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 1 n ( d m / d t m ) H ( X G t ) , which is implied by C 2 ( m , n ) and implies C 1 ( m , n ) . We prove some multivariate cases of this conjecture under the log-concave condition: C 3 ( 3 , i ) , i = 2 , 3 , 4 and C 3 ( 4 , 2 ) . A systematic procedure to prove C l ( m , n ) is proposed based on symbolic computation and semidefinite programming, and all the new results mentioned above are explicitly and strictly proved using this procedure.

1. Introduction

Shannon’s entropy power inequality (EPI) is one of the most important information inequalities [1], which has many proofs, generalizations, and applications [2,3,4,5,6,7,8,9,10,11]. In particular, Costa presented a generalized version of the EPI in his seminal paper [12].
Let X be an n-dimensional random vector with finite variance and a probability density function p ( x ) . For t > 0 , define X t X + Z t , where Z t N n ( 0 , t I ) is an independent standard Gaussian random vector with the covariance matrix t × I . The probability density of X t is
p t ( x t ) = 1 ( 2 π t ) n / 2 R n p ( x ) exp x t x 2 2 t d x .
Thus, the heat equation holds for p t ( x t ) , i.e.,
d p t d t = 1 2 2 p t .
The differential entropy of X t is defined as
H ( X t ) = R n p t ( x t ) log p t ( x t ) d x t .
Costa [12] proved that the entropy power of X t , given by N ( X t ) = 1 2 π e e ( 2 / n ) H ( X t ) is a concave function in t. More precisely, Costa proved ( d / d t ) N ( X t ) 0 and ( d 2 / d t 2 ) N ( X t ) 0 .
Due to its importance, several new proofs and generalizations for Costa’s EPI have been given. Dembo [13] gave a simple proof for Costa’s EPI via the Fisher information inequality. Villani [14] proved Costa’s EPI with Cauchy–Schwarz inequality as well as the heat equation. Toscani [15] proved that ( d 3 / d t 3 ) N ( X t ) 0 if p t is log-concave. Cheng and Geng proposed a conjecture [16]:
Conjecture 1.
The first derivative of H ( X t ) (i.e., the Fisher information) iscompletely monotone in t, that is,
C 1 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) 0 .
Costa’s EPI implies C 1 ( 1 , n ) and C 1 ( 2 , n ) [12], and Cheng–Geng proved C 1 ( 3 , 1 ) and C 1 ( 4 , 1 ) [16].
Let X G N n ( μ , σ 2 I ) be an n-dimensional Gaussian random vector and X G t X G + Z t be the Gaussian X t . McKean [17] proved that X G t achieves the minimum of ( d / d t ) H ( X t ) and ( d 2 / d t 2 ) H ( X t ) is subject to Var ( X t ) = σ 2 + t , and conjectured the general case:
Conjecture 2.
The following inequality holds subject to Var ( X t ) = σ 2 + t ,
C 2 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 ( d m / d t m ) H ( X G t ) 0 .
McKean proved C 2 ( 1 , 1 ) and C 2 ( 2 , 1 ) [17]. Zhang–Anantharam–Geng [18] proved C 2 ( 3 , 1 ) , C 2 ( 4 , 1 ) and C 2 ( 5 , 1 ) if the probability density function of X t is log-concave. Note that C 2 ( 1 , n ) and C 2 ( 2 , n ) are immediate consequences of Entropy Power Inequality and Costa’s concavity of entropy power result [12], respectively. In this paper, we notice that in the multivariate case, Conjecture 2 might not be true for m > 2 even under the log-concave condition, which motivates us to propose the following weaker conjecture:
Conjecture 3.
The following inequality holds subject to Var ( X t ) = σ 2 + t ,
C 3 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 1 n ( d m / d t m ) H ( X G t ) 0 .
We see that Conjecture 3 coincides with Conjecture 2 for n = 1 (univariate case). Additionally, Conjecture 2 implies Conjecture 3 and Conjecture 3 implies Conjecture 1. The three conjectures give different lower bounds for the derivatives of ( 1 ) m + 1 H ( X t ) .
Remark 1.
The authors in [14,16] proved some cases of Conjecture 1 by writing the left-hand formula in Conjecture 1 as sums of squares and, hence, concluded their sign. We provide a systematic way to explore this idea using symbolic computation and semidefinite programming and prove several new results in the multivariate cases.
Our procedure for proving C s ( m , n ) consists of three main ingredients. First, a systematic method is proposed to compute the constraints R i , i = 1 , , N 1 that are satisfied by p t ( x t ) and its derivatives. The condition that p t is log-concave can also be reduced to a set of constraints, i.e., R j , j = 1 , , N 2 . Second, based on symbolic computation, proof for C s ( m , n ) is reduced to the following problem:
p i R and Q j s . t . ( E i = 1 N 1 p i R i j = 1 N 2 Q j R j = S )
where E , Q j , and S are polynomials in p t and its derivatives such that E represents the conjecture, Q j 0 , and S is a sum of squares (SOS). Third, problem (7) can be solved with semidefinite programming (SDP) [19,20]. Note that from Equation (7), we can give an explicit and strict proof for C s ( m , n ) .
Using the procedure proposed in this paper, we prove several new results about the three conjectures: C 1 ( 3 , 2 ) , C 1 ( 3 , 3 ) , C 1 ( 3 , 4 ) , and C 3 ( 3 , 2 ) , C 3 ( 3 , 3 ) , C 3 ( 3 , 4 ) , C 3 ( 4 , 2 ) under the log-concave condition.
In Table 1, we give the data for computing the SOS representation (7) using the Matlab software in Appendix A of [21], where Vars is the number of variables, and N 1 and N 2 are the numbers of constraints in (7).
The procedure is inspired by the work of [12,14,16,18], and uses basic ideas introduced therein. The specific contributions in this paper are:
(1)
Based on symbolic computation and semidefinite programming, C s ( m , n ) can be automatically verified with the aid of the software systems Maple and Matlab, and analytical proofs for C s ( m , n ) can also be efficiently produced.
(2)
The new concept of differentially homogenous polynomials is introduced and used to reduce the computational complexity. Compared with the pure SDP-based approach (such as [18]), the computational efficiency of our procedure is, in general, much higher. See Procedure 2 for details.
(3)
The results in [16,18] are generalized from the univariate cases to the multivariate cases (new results). This is the first attempt for the multivariate high order cases of the conjectures.
(4)
In comparison to the literature (such as [12,15,16,18]), the constraints (integral or log-concave) considered in this paper are more general.
The rest of this paper is organized as follows. In Section 2, we give the proof procedure. In Section 3, we prove C 1 ( 3 , 2 ) , C 1 ( 3 , 3 ) and C 1 ( 3 , 4 ) . In Section 4 we prove C 3 ( 3 , 2 ) , C 3 ( 3 , 3 ) , and C 3 ( 3 , 4 ) under the log-concave condition. In Section 5, we prove C 3 ( 4 , 2 ) under the log-concave condition. In Section 6, the conclusions are presented.

2. Proof Procedure

In this section, we provide a general procedure to prove C s ( m , n ) for specific values of s , m , and n.

2.1. Some Notations

Let [ n ] 0 = { 0 , 1 , , n } , [ n ] = { 1 , , n } , and x t = [ x 1 , t , , x n , t ] . To simplify the notations, we use p t to denote p t ( x t ) in the rest of the paper. Denote
P n = { h p t h 1 x 1 , t h n x n , t : h = i = 1 n h i , h i N }
to be the set of all derivatives of p t with respect to the differential operators x i , t , i = 1 , , n and R [ P n ] to be the set of polynomials in P n with coefficients in R . For v P n , let ord ( v ) be the order of v. For a monomial i = 1 r v i d i with v i P n , its degree, order, and total order are defined as i = 1 r d i , max i = 1 r ord ( v i ) , and i = 1 r d i · ord ( v i ) , respectively.
A polynomial in R [ P n ] is called a kth-order differentially homogeneous polynomial or simply a kth-order differential form, if all its monomials have a degree of k and a total order of k. Let M k , n be the set of all monomials which have a degree of k and a total order of k. Then, the set of kth-order differential forms is an R -linear vector space generated by M k , n , which is denoted as Span R ( M k , n ) .
We will use Gaussian elimination in Span R ( M k , n ) by treating the monomials as variables. We always use the lexicographic order for the monomials to be defined below unless mentioned otherwise. Consider two distinct derivatives v 1 = h p t h 1 x 1 , t h n x n , t and v 2 = s p t s 1 x 1 , t s n x n , t . We say v 1 > v 2 if h > s , or h = s , h l > s l and h j = s j for j = l + 1 , , n . Consider the two distinct monomials m 1 = i = 1 r v i d i and m 2 = i = 1 r v i e i , where v i P n and v i < v j for i < j . We define m 1 > m 2 if d l > e l , and d i = e i for i = l + 1 , , r .
From (1), p t : R n + 1 R is a function in x t and t. Therefore, each polynomial f R [ P n ] is also a function in x t and t, f ˜ ( t ) = R n f d x t is a function in t, and the expectation of f with respect to x t   E [ f ] R n p t f d x t is also a function in t. By f 0 , f ˜ 0 , and E [ f ] 0 , we mean f ( x t , t ) 0 , f ˜ ( t ) 0 , and E [ f ] ( t ) 0 for all x t R n and t > 0 .

2.2. Three Parts of the Proof

In this section, we give the procedure to prove C s ( m , n ) , which consists of three parts.

2.2.1. Part I

In step 1, we reduce the proof of C s ( m , n ) into the proof of an integral inequality, as shown by the following lemma, whose proof will be given in Section 2.3:
Lemma 1.
Proof that C s ( m , n ) , s = 1 , 2 , 3 can be reduced to show
R n E s , m , n p t 2 m 1 d x t 0
where
E s , m , n = a 1 = 1 n a m = 1 n E s , m , n , a m , a m = ( a 1 , , a m ) ,
E s , m , n , a m is a 2 m th-order differential form in R [ P m , n ] , and
P m , n = { h p t h 1 x a 1 , t h m x a m , t : h [ 2 m 1 ] 0 ; a i [ n ] , i [ m ] } .

2.2.2. Part II

In step 2, we compute the constraints which are relations satisfied by the probability density p t of X t . In this paper, we consider two types of constraints: integral constraints and log-concave constraints, which will be given in Lemmas 2 and 3, respectively. Since E s , m , n in (8) is a 2 m th-order differential form, we need only the constraints which are 2 m th-order differential forms.
Definition 1.
An mth-orderintegral constraint is the 2 m th-order differential form R in R [ P n ] such that
R n R p t 2 m 1 d x t = 0 .
Lemma 2
([22]). There is a systematic method to compute the mth-order integral constraints C m , n = { R i , i = 1 , , N 1 } .
A function f : R n R is called log-concave if log f is a concave function. In this paper, by the log-concave condition, we mean that the density function p t is log-concave.
Definition 2.
An mth-orderlog-concave constraint is a 2 m th-order differential form R in R [ P n ] such that R 0 under the log-concave condition.
The following lemma computes the log-concave constraints:
Lemma 3
([22]). Let H ( p t ) R [ P n ] n × n be the Hessian matrix of p t , p t = ( p t x 1 , t , , p t x n , t ) ,
L ( p t ) p t H ( p t ) T p t p t ,
and k , l , l = 1 , , L k be the kth-order principle minors of L ( p t ) . Then, the mth-order log-concave constraints are
C m , n = { i = 1 l ( 1 ) k i k i , l i T k 1 , , k l | i = 1 l k i m }
where T k 1 , , k l Span R ( M 2 m 2 i = 1 l k i , n ) and T k 1 , , k l 0 .
Note that T k 1 , , k l in (11) are not known. For convenience, denote
C m , n = { P j , j = 1 , , N 2 } ,
where P j represents i = 1 l ( 1 ) k i k i , l i in (11). From Lemma 3, it is easy to see that i = 1 l ( 1 ) k i k i , l i is a ( 2 i = 1 l k i ) th-order log-concave constraint.

2.2.3. Part III

In step 3, we give a procedure to write E s , m , n as an SOS under the constraints, the details of which will be given in Section 2.4.
Procedure 1.
For E s , m , n in Lemma 1, C m , n = { R i , i = 1 , , N 1 } in Lemma 2, and C m , n = { P j , j = 1 , , N 2 } in Lemma 3, the procedure computes e l R and Q j Span R ( M 2 m deg P j , n ) such that
E s , m , n i = 1 N 1 e i R i j = 1 N 2 P j Q j = S ,
and Q j 0 , j = 1 , , N 2 ,
where S is an SOS. If the log-concave condition is not needed, we may set Q j = 0 for all j.
To summarize the proof procedure, we have the following:
Theorem 1.
If Procedure 1 satisfies (13) and (14) for certain s , m , and n, then C s ( m , n ) is explicitly and strictly proved.
Proof. 
With Lemma 1, we have the following proof for C s ( m , n ) :
R E t , m , n p t 2 m 1 d x t = (13) R i = 1 N 1 e i R i + j = 1 N 2 P j Q j + S p t 2 m 1 d x t = S 1 R j = 1 N 2 P j Q j + S p t 2 m 1 d x t S 2 R S p t 2 m 1 d x t S 3 0 .
Equality S1 is true, because R i is an integral constraint by Lemma 2. By Lemma 3 and (14), P j Q j 0 is true under the log-concave condition, so inequality S2 is true under the log-concave condition. Finally, inequality S3 is true, because S 0 is an SOS. □

2.3. Proof of Lemma 1

Costa [12] proved the following basic properties for p t and H ( X t ) ,
d H ( X t ) d t = 1 2 E 2 log p t = 1 2 R n p t 2 p t d x t = 1 2 J ( X t ) ,
where
p t = p t x 1 , t , , p t x n , t , 2 p t = i = 1 n 2 p t 2 x i , t ,
and J ( X t ) E p t 2 p t 2 is the Fisher information [6]. Equation (16) implies C 1 ( 1 , n ) : d d t H ( X t ) 0 .
For s = 1 , Lemma 1 was proved by
Lemma 4
([22]). For m N m > 1 , we have
( 1 ) m + 1 ( d m / d t m ) H ( X t ) = R n E 1 , m , n p t 2 m 1 ( x t ) d x t ,
where
E 1 , m , n = ( 1 ) m + 1 p t 2 m 1 2 d m 1 d t m 1 ( p t 2 p t ) = a 1 = 1 n a m = 1 n E 1 , m , n , a m
is a 2 m th-order differential form in R [ P m , n ] .
To prove Lemma 1 for s = 2 , 3 , we need to compute ( d m / d t m ) H ( X G t ) . Let X G N n ( μ , σ 2 I ) be an n-dimensional Gaussian random vector and X G t X G + Z t , where Z t N n ( 0 , t I ) is introduced in Section 1. Then, X G t N n ( μ , ( σ 2 + t ) I ) and the probability density of X G t is
p ^ t = 1 ( 2 π ( σ 2 + t ) ) n / 2 exp ( 1 2 ( σ 2 + t ) x t μ 2 ) .
Lemma 5
([22]). Let T = 2 log p t and T G = 2 log p ^ t . Then, under the log-concave condition, we have
E [ ( T ) m ] ( a ) [ E ( T ) ] m ( b ) [ E ( T G ) ] m = ( c ) ( 1 ) m + 1 2 n m 1 ( m 1 ) ! ( d m / d t m ) H ( X G t ) .
Lemma 6
([22]). For T = 2 log p t and m N m > 1 , we have
E [ ( T ) m ] = R n E 0 , m , n p t 2 m 1 d x t
where
E 0 , m , n = a 1 = 1 n a m = 1 n E 0 , m , n , a m , a m = ( a 1 , , a m ) ,
and E 0 , m , n , a m is a 2 m th-order differential form in R [ P m , n ] .
We can now prove Lemma 1 for s = 2 , 3 . Let
E 2 , m , n = E 1 , m , n ( m 1 ) ! 2 n m 1 E 0 , m , n , E 3 , m , n = E 1 , m , n ( m 1 ) ! 2 n m E 0 , m , n ,
where E 1 , m , n and E 0 , m , n are from Lemmas 4 and 6, respectively. By Lemma 5, C s ( m , n ) is true if R n E s , m , n p t 2 m 1 d x t 0 for l = 2 , 3 . Together with Lemma 4, Lemma 1 is proved.

2.4. Main Result (Procedure 1)

In this section, we present the detailed Procedure 1, called Procedure 2, which is based on symbolic computation and the SOS theory.
Procedure 2. Input: E s , m , n and R i , i = 1 , , N 1 are 2 m th-order differential forms in R [ P n ] ; P j , j = 1 , , N 2 are 2 k j th-order differential forms in in R [ P n ] .
Output: e i R and Q j Span R ( M 2 ( m k j ) , n ) such that (13) and (14) are true, or fail meaning such that e i and Q j are not found.
S1. Treat the monomials in M m , n as new variables m l , l = 1 , , N m , n , which are all the monomials in R [ P n ] with the degree m and the total order m. We call m l m s a quadratic monomial.
S2. Write monomials in C m , n = { R i , i = 1 , , N 1 } as quadratic monomials if possible. By performing Gaussian elimination on C m , n by treating the monomials as variables and according to a monomial order such that a quadratic monomial is less than a non-quadratic monomial, we obtain
C ˜ m , n = C m , n , 1 C m , n , 2 ,
where C m , n , 1 is the set of quadratic forms in m i , C m , n , 2 is the set of non-quadratic forms, and Span R ( C m , n ) = Span R ( C ˜ m , n ) .
S3. There may exist relationships among the variables m i , which are called intrinsic constraints. For instance, for m 1 = p t 2 ( 2 p t 2 x 1 , t ) 2 , m 2 = p t ( p t x 1 , t ) 2 2 p t 2 x 1 , t , and m 3 = ( p t x 1 , t ) 4 in M 4 , n , an intrinsic constraint is m 1 m 3 m 2 2 = 0 . By adding the intrinsic constraints which are quadratic forms in m i to C m , n , 1 , we obtain
C ^ m , n , 1 = { R ^ i , i = 1 , , N 3 } .
S4. Let M 2 ( m k j ) , n = { m j , k , k = 1 , , V j } and Q j = k = 1 V j q j , k m j , k , where q j , k are variables to be found later. Let R ¯ j be obtained from P j Q j by writing monomials in P j Q j as quadratic monomials in m i , and eliminating the non-quadratic monomials with C m , n , 2 , such that R ¯ j P j Q j Span R ( C m , n ) and R ¯ j = l = 1 V j q j , l h j , l , where h j , l R [ m i , P n ] . If an h j , l is not a quadratic form in m i , then delete R ¯ j ; hence, the R ¯ j ’s in quadratic form are selected. Then, denote these constraints as R j , j = 1 , , N 2 , which form the reduced set C ^ m , n .
S5. Let E ^ s , m , n be obtained from E s , m , n by eliminating the non-quadratic monomials using C m , n , 2 such that E s , m , n E ^ s , m , n Span R ( C m , n , 2 ) Span R ( C m , n ) .
S6. Since E ^ s , m , n , R ^ i , i = 1 , , N 3 and R j , j = 1 , , N 2 are quadratic forms in m i , we can use the Matlab codes given in Appendix A [21] to compute p i , q j , s R such that
E ^ s , m , n i = 1 N 3 p i R ^ i j = 1 N 2 R j = S , R j = l = 1 V j q j , l h j , l , j = 1 , , N 2
Q j = l = 1 V j q j , l m j , l 0 , j = 1 , , N 2
where
S = i = 1 N m , n c i ( j = i N m , n e i j m j ) 2
is an SOS, c i , e i j R and c i 0 . If (21) and (22) cannot be found, return FAIL.
S7. Since R ^ i , E s , m , n E ^ s , m , n , R j P j Q j are all in Span R ( C m , n ) , Equations (13) and (14) can be obtained from (21) and (22), respectively.
Remark 2.
Procedure 2 can be implemented automatically by Maple and Matlab on a computer. In Procedure 2, stepsS2,S4andS5are based on the symbolic computation theory for reduction, which makes our method more efficient than the pure SDP-based method [18] or a direct theoretical proof [16]. The use of symbolic computation also ensures that our calculation is strict and free of numerical errors.
Remark 3.
Let R be an intrinsic constraint. Then, R becomes zero when replacing m i by its corresponding monomial in M m , n . Therefore, Span R ( C ^ m , n , 1 ) = Span R ( C m , n , 1 ) Span R ( C m , n ) in R [ P n ] ; that is, we do not need to include the intrinsic constraints in (21). However, these intrinsic constraints are needed when using the Matlab software in Appendix A of [21].

2.5. An Illustrative Example

As an illustrative example, we prove C 2 ( 3 , 1 ) under the log-concave condition using the proof procedure given in Section 2.2. Since n = 1 , denote
x t = x 1 , t , f : = f 0 : = p t , f n : = n p t n x 1 , t , n N > 0 .
In step 1, by Lemma 1 and (8), we have
d 3 H ( X t ) d t 3 2 ! 2 E ( f 1 2 f f 2 ) 3 f 6 = (16) 1 2 d 2 d t 2 f 1 2 f ( f 1 2 f f 2 ) 3 f 5 d x t = (8) E 2 , 3 , 1 f 5 d x t
where
E 2 , 3 , 1 = 1 4 f 4 f 3 2 1 2 f 3 f 1 f 3 f 2 + 1 4 f 4 f 1 f 5 11 4 f 2 f 1 2 f 2 2 1 8 f 3 f 1 2 f 4 + f 3 f 2 3 + 3 f f 1 4 f 2 f 1 6
is a sixth-order differential form.
In step 2, we compute the constraints with Lemmas 2 and 3. With Lemma 2, we find six third-order integral constraints: C 3 , 1 = { R i , i = 1 , , 6 } :
R 1 = 5 f f 1 4 f 2 4 f 1 6 , R 2 = 2 f 3 f 1 f 2 f 3 + f 3 f 2 3 2 f 2 f 1 2 f 2 2 , R 3 = f 4 f 1 f 5 + f 4 f 2 f 4 f 3 f 1 2 f 4 , R 4 = f 3 f 1 2 f 4 + 2 f 3 f 1 f 2 f 3 2 f 2 f 1 3 f 3 , R 5 = f 2 f 1 3 f 3 + 3 f 2 f 1 2 f 2 2 3 f f 1 4 f 2 , R 6 = f 4 f 2 f 4 + f 4 f 3 2 f 3 f 1 f 2 f 3 .
With Lemma 3, we obtain one third-order log-concave constraint: C 3 , 1 = { P 1 Q 1 } , where
P 1 = f f 2 f 1 2 , Q 1 Span R ( M 4 , 1 ) , and Q 1 0 .
In step 3, we use Procedure 2 to compute the SOS representation (13) and (14) with the input E 2 , 3 , 1 , C 3 , 1 = { R i , i = 1 , , 6 } , P 1 = f 1 2 f f 2 .
S1. The new variables are M 3 , 1 = { m 1 = f 2 f 3 , m 2 = f f 1 f 2 , m 3 = f 1 3 } , which are listed from high to low in the lexicographical monomial order.
S2. By writing monomials in C 3 , 1 as quadratic monomials in m i if possible and performing Gaussian elimination on C 3 , 1 , we have
C 3 , 1 , 1 = { R ^ 1 = 5 m 2 m 3 4 m 3 2 , R ^ 2 = m 1 m 3 + 3 m 2 2 12 5 m 3 2 } , C 3 , 1 , 2 = { R ˜ 1 = f 3 f 2 3 + 2 m 1 m 2 2 m 2 2 , R ˜ 2 = f 4 f 1 f 5 m 1 2 + 3 m 1 m 2 + 6 m 2 2 24 5 m 3 2 , R ˜ 3 = f 4 f 2 f 4 + m 1 2 m 1 m 2 , R ˜ 4 = f 3 f 1 2 f 4 + 2 m 1 m 2 + 6 m 2 2 24 5 m 3 2 } .
S3. There exist no intrinsic constraints and thus, C ^ 3 , 1 , 1 = { R ^ 1 , R ^ 2 } and N 3 = 2 .
S4. M 4 , 1 = { f 3 f 4 , f 2 f 1 f 3 , f 2 f 2 2 , f f 1 2 f 2 , f 1 4 } . Then, Q 1 = q 1 , 1 f 2 f 2 2 + q 1 , 2 f f 1 2 f 2 + q 1 , 3 f 1 4 .
Monomials f 3 f 4 , f 2 f 1 f 3 do not appear in Q 1 due to Q 1 0 . By writing monomials in P 1 Q 1 as quadratic monomials if possible and using C 3 , 1 , 2 to eliminate non-quadratic monomials, we obtain
R 1 = P 1 Q 1 ( 1 5 q 1 , 2 R ^ 1 q 1 , 1 R ˜ 1 1 5 q 1 , 3 R ^ 1 ) = q 1 , 1 ( 2 m 1 m 2 m 2 2 ) + q 1 , 2 ( 4 5 m 3 2 m 2 2 ) + q 1 , 3 5 m 3 2 .
S5. By writing E 2 , 3 , 1 as a quadratic form in m i , we have
E ^ 2 , 3 , 1 = E 2 , 3 , 1 3 5 R ^ 1 R ˜ 1 1 4 R ˜ 2 + 1 8 R ˜ 4 = 1 2 m 1 2 3 m 1 m 2 3 2 m 2 2 + 2 m 3 2 .
S6. Since E ^ 3 , 1 , R ^ 1 , R ^ 2 , R 1 are quadratic forms in m i , we can use the Matlab software in Appendix A of [21] to obtain the following SOS representation
E ^ 2 , 3 , 1 = i = 1 2 p i R ^ i + R 1 + i = 1 3 c i ( j = i 3 e i , j m j ) 2 , Q 1 0 ,
where
p 1 = 6 5 , p 2 = 2 , c 1 = 1 2 , e 1 , 1 = 1 , e 1 , 2 = 3 , e 1 , 3 = 2 , q 1 , 1 = q 1 , 2 = q 1 , 3 = c 2 = c 3 = 0 .
S7. We obtain
E 2 , 3 , 1 = 3 4 R 1 + R 2 + 1 4 R 3 + 1 8 R 4 7 4 R 5 1 4 R 6 + i = 1 3 c i ( j = i 3 e i , j m j ) 2 .
From Theorem 1 and (23), we have
d 3 H ( X t ) d t 3 2 ! 2 E ( f 1 2 f f 2 ) 3 f 6 = R E 2 , 3 , 1 p t 5 d x t = R 1 p t 5 ( 3 4 R 1 + R 2 + 1 4 R 3 + 1 8 R 4 7 4 R 5 1 4 R 6 + i = 1 3 c i ( j = i 3 e i , j m j ) 2 ) d x t = R ( m 1 3 m 2 + 2 m 3 ) 2 2 p t 5 d x t 0 .
Thus, an explicit and strict proof is given for C 2 ( 3 , 1 ) . Note that this example is also considered in [18] by the pure SDP-based method, which is a semi-automatic algorithm. See Table 1 for the time used to provide analytical proof of this example by our automatic method on a computer.

3. Proof of C1(3, n ) for n = 2, 3, 4

In this section, we use the procedure in Section 2.2 to prove C 1 ( 3 , n ) for n = 2 , 3 , 4 .

3.1. Compute E1,3,n

In step 1, we compute E 1 , 3 , n in (8) and (20):
1 2 d 2 d t 2 R n p t 2 p t d x t = ( 2 ) R n E 1 , 3 , n p t 5 d x t ,
where
E 1 , 3 , n = a = 1 n b = 1 n c = 1 n F 3 , a , b , c
and
F 3 , a , b , c = p t 4 4 3 p t x a , t 2 x c , t 3 p t x a , t 2 x b , t p t 3 4 p t x a , t 3 p t x a , t 2 x b , t 2 p t 2 x c , t + p t 4 4 p t x a , t 5 p t x a , t 2 x b , t 2 x c , t p t 3 4 p t x a , t 3 p t x a , t 2 x c , t 2 p t 2 x b , t + p t 2 4 p t x a , t 2 2 p t 2 x b , t 2 p t 2 x c , t p t 3 8 p t x a , t 2 4 p t 2 x b , t 2 x c , t .

3.2. Compute the Third-Order Constraints

In step 2, we obtain the third-order constraints. We introduce the notation
V a , b , c = { h p t h 1 x a , t h 2 x b , t h 3 x c , t : h = h 1 + h 2 + h 3 [ 5 ] 0 } ,
where a , b , c are variables taking values in [ n ] . Then,
P 3 , n = a = 1 n b = 1 n c = 1 n V a , b , c .
The third-order integral constraints are:
C 3 , n = { R i , a , b , c ( 3 ) , : i = 1 , , 955 ; a , b , c [ n ] } ,
where R i , a , b , c ( 3 ) in the form of lengthy formulas can be found in [23]. Note that we do not use all the third-order constraints in [23].

3.3. Proof of C1(3,2)

The proof follows Procedure 2 with E 1 , 3 , 2 given in (26) as the input. To make the proof explicit, we will give the key expressions.
In Step S1, the new variables are M 3 , 2 and are listed in the lexicographical monomial order:
m 1 = p t 2 p t 3 3 x 2 , t , m 2 = p t 2 3 p t x 1 , t 2 x 2 , t , m 3 = p t 2 3 p t 2 x 1 , t x 2 , t , m 4 = p t 2 p t 3 3 x 1 , t , m 5 = p t 2 p t 2 x 2 , t p t x 2 , t , m 6 = p t 2 p t 2 x 2 , t p t x 1 , t , m 7 = p t 2 p t x 1 , t x 2 , t p t x 2 , t , m 8 = p t 2 p t x 1 , t x 2 , t p t x 1 , t , m 9 = p t 2 p t x 1 , t 2 p t x 2 , t , m 10 = p t 2 p t x 1 , t 2 p t x 1 , t , m 11 = p t x 2 , t 3 , m 12 = p t x 2 , t 2 p t x 1 , t , m 13 = p t x 2 , t p t x 1 , t 2 , m 14 = p t x 1 , t 3 .
In Step S2, the constraints are
C 3 , 2 = { R j , a , b , c ( 3 ) : j = 1 , , 955 ; a , b , c [ 2 ] } .
Removing the repeated ones, we have N 1 = 135 . We obtain C 3 , 2 , 1 and C 3 , 2 , 2 , which contain 48 and 52 constraints, respectively.
In Step S3, there exist 15 intrinsic constraints:
m 5 m 8 = m 6 m 7 , m 5 m 10 = m 6 m 9 , m 5 m 12 = m 6 m 11 , m 5 m 13 = m 6 m 12 , m 5 m 14 = m 6 m 13 , m 7 m 10 = m 8 m 9 , m 7 m 12 = m 8 m 11 , m 7 m 13 = m 8 m 12 , m 7 m 14 = m 8 m 13 , m 9 m 12 = m 10 m 11 , m 9 m 13 = m 10 m 12 , m 9 m 14 = m 10 m 13 , m 11 m 13 = m 12 2 , m 11 m 14 = m 12 m 13 , m 12 m 14 = m 13 2 .
Thus, C ^ 3 , 2 , 1 contains 63 constraints and N 3 = 63 .
Step S4 is not needed in the proof of this case.
In Step S5, by eliminating the non-quadratic monomials in E 1 , 3 , 2 using C 3 , 2 , 2 to obtain a quadratic form in m i and then simplifying the quadratic form using C 3 , 2 , 1 , we have
E ^ 1 , 3 , 2 = E 1 , 3 , 2 ( 3 4 R ^ 17 1 6 R ^ 12 1 6 R ^ 13 + 7 6 R ^ 18 1 2 R ^ 32 1 2 R ^ 34 5 8 R ^ 35 1 2 R ^ 40 1 12 R ˜ 2 1 8 R ˜ 5 1 4 R ˜ 6 + 1 2 R ˜ 7 + 1 4 R ˜ 8 + 1 2 R ˜ 18 + 1 4 R ˜ 19 1 8 R ˜ 39 1 4 R ˜ 46 + 1 2 R ˜ 48 1 8 R ˜ 49 + 1 4 R ˜ 53 ) = 1 2 m 1 2 m 1 m 5 + 3 2 m 2 2 3 m 2 m 6 + 3 2 m 3 2 + 1 2 m 4 2 2 m 4 m 6 m 4 m 7 m 4 m 10 1 2 m 5 2 + 3 2 m 6 2 3 m 7 2 2 m 7 m 10 + 3 m 8 2 5 2 m 9 2 3 2 m 9 m 11 + 21 m 9 m 13 1 2 m 10 2 + 3 5 m 11 2 + 3 m 12 2 15 m 13 2 + 3 5 m 14 2 .
In Step S6, using the Matlab program in [23] with E ^ 1 , 3 , 2 and C ^ 3 , 2 , 1 as the input, we find an SOS representation for E ^ 1 , 3 , 2 . Thus, by Theorem 1, C 1 ( 3 , 2 ) is strictly proved.

3.4. Proof of C1(3,3)

The proof follows Procedure 2 with E 1 , 3 , 3 given in (29) as the input. The detailed lengthy formulas can be seen in [23].
In Step S1, the new variables are M 3 , 3 = { m i , i = 1 , , 38 } which is the set of all monomials in R [ P 3 , 3 ] with a degree of 3 and a total order of 3, and which are listed in the lexicographical monomial order.
In Step S2, the constraints are: C 3 , n = { R i , a , b , c ( 3 ) : i = 1 , , 955 } , N 1 = 955 . We obtain C 3 , n , 1 and C 3 , n , 2 , which contain 350 and 328 constraints, respectively.
In Step S3, there exist 189 intrinsic constraints. In total, C ^ 3 , n , 1 contains 539 constraints. Using R -Gaussian elimination in Span R ( C ^ 3 , n , 1 ) shows that 512 of these 539 constraints are linearly independent, so N 3 = 512 .
Step S4 is not needed in the proof of this case.
In Step S5, by eliminating the non-quadratic monomials in E 1 , 3 , 3 using C 3 , 3 , 2 and then simplifying the expression using C 3 , 3 , 1 , we obtain E ^ 1 , 3 , 3 written as a quadratic form in m i .
In Step S6, using the Matlab program in [23] with E ^ 1 , 3 , 3 and C ^ 3 , 3 , 1 as the input, we find an SOS representation for F ^ 3 , 3 . Thus, using Theorem 1, C 1 ( 3 , 3 ) is strictly proved.

3.5. Proof of C1(3,4)

The proof follows Procedure 2 with E 1 , 3 , 4 given in (29) as the input. The detailed lengthy formulas can be seen in [23].
In Step S1, the new variables are M 3 , 4 = { m i , i = 1 , , 80 } which is the set of all monomials in R [ P 3 , 4 ] with a degree of 3 and a total order of 3, and which are listed in the lexicographical monomial order.
In Step S2, we obtain C 3 , 4 = { R i , a , b , c ( 3 ) , R j ( 0 ) , R k , a , b ( 2 ) , : i = 1 , , 955 , j = 1 , , 8 , k = 1 , , 20 , a , b , c [ 4 ] } . Removing the repeated ones, we have N 1 = 3172 . We obtain C 3 , 4 , 1 and C 3 , 4 , 2 which contain 1120 and 975 constraints, respectively.
In Step S3, there exist 1080 intrinsic constraints. In total, C ^ 3 , 4 , 1 contains 2200 constraints. Only 1966 constraints in C ^ 3 , 4 , 1 are R -linearly independent, so N 2 = 1966 .
Step S4 is not needed in the proof of this case.
In Step S5, by eliminating the non-quadratic monomials in E 1 , 3 , 4 using C 3 , 4 , 2 to obtain a quadratic form in m i and then simplifying the quadratic form with C 3 , 4 , 1 , we obtain E ^ 1 , 3 , 4 which is written as a quadratic form in m i .
In Step S6, using the Matlab program in [23] with E ^ 1 , 3 , 4 and C ^ 3 , 4 , 1 as the input, we find an SOS representation for E ^ 1 , 3 , 4 . Thus, using Theorem 1, C 1 ( 3 , 4 ) is strictly proved.

4. Proof of C3(3, n ) for n = 2, 3, 4 under the Log-Concave Condition

In this section, we use the procedure in Section 2.2 to prove C 3 ( 3 , n ) for n = 2 , 3 , 4 under the log-concave condition. The detailed lengthy formulas can be seen in [21].

4.1. Compute E3,3,n

In step 1, we compute E 3 , 3 , n in (8) and (20):
1 2 d 2 d t 2 p t 2 p t 1 n 3 E p t 2 p t 2 p t p t 2 3 = ( 2 ) R n E 3 , 3 , n p t 5 d x t
where
E 3 , 3 , n = a = 1 n b = 1 n c = 1 n E 3 , a , b , c
and
E 3 , a , b , c = p t 4 4 3 p t x a , t 2 x c , t 3 p t x a , t 2 x b , t p t 3 4 p t x a , t 3 p t x a , t 2 x b , t 2 p t 2 x c , t + p t 4 4 p t x a , t 5 p t x a , t 2 x b , t 2 x c , t p t 3 4 p t x a , t 3 p t x a , t 2 x c , t 2 p t 2 x b , t + p t 2 4 p t x a , t 2 2 p t 2 x b , t 2 p t 2 x c , t p t 3 8 p t x a , t 2 4 p t 2 x b , t 2 x c , t 1 n 3 ( p t x a , t ) 2 p t ( 2 p t 2 x a , t ) ( p t x b , t ) 2 p t ( 2 p t 2 x b , t ) ( p t x c , t ) 2 p t ( 2 p t 2 x c , t ) .

4.2. Compute the Third-Order Log-Concave Constraints

In step 2, we obtain the third-order log-concave constraints.
From Lemma 3, we can compute the third-order log-concave constraints:
C 3 , 2 = { R 1 = 1 , 1 Q 1 , R 2 = 1 , 2 Q 2 , R 3 = 2 , 1 Q 3 } ,
where Q 1 , Q 2 Span R ( M 4 , 4 ) and Q 3 Span R ( M 2 , 2 ) . Note that C 3 , 2 does not contain all the log-concave constraints in Lemma 3. The constraints C 3 , 2 are enough for our purpose in this paper.
For n > 2 , we give certain log-concave constraints in a special form, which are needed in the proof procedure in Section 4.3. Let
1 p t = p t x a , t , p t x b , t , p t x c , t , L 1 ( p t ) p t H 1 ( p t ) 1 T p t 1 p t ,
where
H 1 ( p t ) = 2 p t 2 x a , t 2 p t x a , t x b , t 2 p t x a , t x c , t 2 p t x a , t x b , t 2 p t 2 x b , t 2 p t x b , t x c , t 2 p t x a , t x c , t 2 p t x b , t x c , t 2 p t 2 x c , t ,
and k , l , l = 1 , , L k the kth-order principle minors of L 1 ( p t ) . Let M k be the set of all monomials in V a , b , c (defined in (27)) which have a degree of k and a total order of k. We have
C 3 , n = { 1 , 1 Q 1 , 1 , 1 , 2 Q 1 , 2 , 1 , 3 Q 1 , 3 , 2 , 1 Q 2 , 1 , 2 , 2 Q 2 , 2 , 2 , 3 Q 2 , 3 , 3 , 1 Q 3 , 1 }
where Q 1 , i Span R ( M 4 ) , Q 2 , j Span R ( M 2 ) , and Q 3 , 1 R .

4.3. Proof of C3(3,2)

The proof follows Procedure 2 with E 3 , 3 , 2 given in (29) and the constraints in (28) and (30) as the input.
Steps S1S3 are the same with the proof of the case C 1 ( 3 , 2 ) .
In Step S4, we obtain C ^ ( 3 , 2 ) which contains three quadratic-form constraints.
In Step S5, by eliminating the non-quadratic monomials in E 3 , 3 , 2 using C 3 , 2 , 2 to obtain a quadratic form in m i and then simplifying the quadratic form using C 3 , 2 , 1 , we have
E ^ 3 , 3 , 2 = 31 40 m 14 2 147 8 m 13 2 5 2 m 7 m 10 + 15 4 m 8 2 25 8 m 9 2 31 16 m 9 m 11 + 207 8 m 9 m 13 5 8 m 10 2 + 1 2 m 1 2 5 4 m 1 m 5 + 31 40 m 11 2 + 31 8 m 12 2 + 1 2 m 4 2 5 2 m 4 m 6 5 4 m 4 m 7 + 3 2 m 3 2 15 4 m 7 2 5 4 m 4 m 10 5 8 m 5 2 + 15 8 m 6 2 + 3 2 m 2 2 15 4 m 2 m 6 .
In Step S6, using the Matlab software in Appendix A [21] with E ^ 3 , 3 , 2 , C ^ 3 , 2 , 1 and C ^ 3 , 2 as the input, we find an SOS representation for E ^ 3 , 3 , 2 . Thus, C 3 ( 3 , 2 ) is proved under the log-concave condition. The Maple program for proving C 3 ( 3 , 2 ) can be found at https://github.com/cmyuanmmrc/codeforepi/ (accessed on 15 July 2020).
Remark 4.
We fail to prove C 2 ( 3 , 2 ) even under the log-concave condition using the above procedure. Specifically, we cannot find an SOS representation for E ^ 2 , 3 , 2 in StepS6. Since the SDP algorithm is not complete for problem (21), we cannot say that an SOS representation does not exist for E ^ 2 , 3 , 2 . The Maple program for C 2 ( 3 , 2 ) can be found at https://github.com/cmyuanmmrc/codeforepi/ (accessed on 15 July 2020).

4.4. Proof of C3(3,3) and C3(3,4)

In this subsection, we prove C 3 ( 3 , 3 ) , C 3 ( 3 , 4 ) . Motivated by symmetric functions, for any function f ( a , b , c ) , we have
a , b , c = 1 n f ( a , b , c ) = 1 a < b < c n 2 ( n 1 ) ( n 2 ) [ f ( a , a , a ) + f ( b , b , b ) + f ( c , c , c ) ] + 1 n 2 [ f ( a , a , b ) + f ( a , b , a ) + f ( b , a , a ) + f ( a , a , c ) + f ( a , c , a ) + f ( c , a , a ) + f ( b , b , a ) + f ( b , a , b ) + f ( a , b , b ) + f ( b , b , c ) + f ( b , c , b ) + f ( c , b , b ) + f ( c , c , a ) + f ( c , a , c ) + f ( a , c , c ) + f ( c , c , b ) + f ( c , b , c ) + f ( b , c , c ) ] + [ f ( a , b , c ) + f ( a , c , b ) + f ( b , a , c ) + f ( b , c , a ) + f ( c , a , b ) + f ( c , b , a ) ] } .
From (29) and (32), we obtain
E 3 , 3 , n = a = 1 n b = 1 n c = 1 n E 3 , a , b , c = 1 a < b < c n n J 3 , 3 , n ,
where
J 3 , 3 , n = 2 ( n 1 ) ( n 2 ) E 3 , a , a , a + E 3 , b , b , b + E 3 , c , c , c + 1 n 2 [ E 3 , a , a , b + E 3 , a , b , a + E 3 , b , a , a + E 3 , a , a , c + E 3 , a , c , a + E 3 , c , a , a + E 3 , b , b , a + E 3 , b , a , b + E 3 , a , b , b + E 3 , b , b , c + E 3 , b , c , b + E 3 , c , b , b + E 3 , c , c , a + E 3 , c , a , c + E 3 , a , c , c + E 3 , c , c , b + E 3 , c , b , c + E 3 , b , c , c ] + [ E 3 , a , b , c + E 3 , a , c , b + E 3 , b , a , c + E 3 , b , c , a + E 3 , c , a , b + E 3 , c , b , a ]
From (33), if we prove J 3 , 3 , n 0 , then E 3 , 3 , n 0 . It is clear that J 3 , 3 , n has many fewer terms than E 3 , 3 , n .
In J 3 , 3 , n given in (33) and the constraints in (28) and (31), we may consider x a , t , x b , t , and x c , t as the differential operators without giving concrete values to a , b , and c.
First, we prove C 3 ( 3 , 3 ) using Procedure 2 with J 3 , 3 , 3 given in (33) and the constraints in (28) and (31) as the input.
In Step S1, the new variables are M 3 = { m i , i = 1 , , 38 } , which is the set of all the monomials in R [ V a , b , c ] with a degree of 3 and a total order of 3.
In Step S2, the constraints are: C 3 , n = { R i , a , b , c ( 3 ) : i = 1 , , 955 } , N 1 = 955 . We obtain C 3 , n , 1 and C 3 , n , 2 , which contain 350 and 328 constraints, respectively.
In Step S3, there exist 189 intrinsic constraints. In total, C ^ 3 , n , 1 contains 539 constraints. Using R -Gaussian elimination in Span R ( C ^ 3 , n , 1 ) shows that 512 of these 539 constraints are linearly independent, thus N 3 = 512 .
In Step S4, we obtain C ^ 3 , n from C 3 , n which contains six constraints.
In Step S5, eliminating the non-quadratic monomials in J 3 , 3 , 3 using C 3 , n , 2 and then simplifying the expression using C 3 , n , 1 , we obtain J ^ 3 , 3 , 3 , which is written as a quadratic form in m i .
In Step S6, using the Matlab software in Appendix A [21] with J ^ 3 , 3 , 3 , C ^ 3 , n , 1 and C ^ 3 , n as the input, we find an SOS representation for J ^ 3 , 3 , 3 . Thus, using Theorem 1, C 3 ( 3 , 3 ) is strictly proved. The Maple program used to prove C 3 ( 3 , 3 ) can be found at https://github.com/cmyuanmmrc/codeforepi/ (accessed on 15 July 2020).
To prove C 3 ( 3 , 4 ) , we just need to replace the input from J 3 , 3 , 3 with J 3 , 3 , 4 in Step S5 in the above procedure. In the same way, C 3 ( 3 , 4 ) can be strictly proved. The Maple program used to prove C 3 ( 3 , 4 ) can be found at https://github.com/cmyuanmmrc/codeforepi/ (accessed on 15 July 2020).

5. Proof of C3(4,2)

In this section, we use the procedure in Section 2.2 to prove C 3 ( 4 , 2 ) under the log-concave condition.
In step 1, we compute E 3 , 4 , n in (8) and (20):
1 2 d 3 d t 3 p t 2 p t 3 n 4 E p t 2 p t 2 p t p t 2 4 = ( 2 ) R n E 3 , 4 , n p t 7 d x t ,
where E 3 , 4 , n = a = 1 n b = 1 n c = 1 n d = 1 n E 4 , a , b , c , d . For brevity, we omit the concrete expression of E 4 , a , b , c , d .
In step 2, based on Lemma 2, we obtain 589 fourth-order constraints:
C 4 , 2 = { R i ( 2 ) : i = 1 , , 589 } R [ P 4 , 2 ] and N 1 = 589 .
Using Lemma 3, we obtain three fourth-order log-concave constraints:
C 4 , 2 = { 1 , 1 Q 1 , 1 , 1 , 2 Q 1 , 2 , 2 , 1 Q 2 , 1 }
where Q 1 , 1 , Q 1 , 2 Span R ( M 6 , 2 ) and Q 2 , 1 Span R ( M 4 , 2 ) .
In step 3, we use Procedure 2 to compute the SOS representations (13) and (14) with E 3 , 4 , n , C 4 , 2 , and C 4 , 2 as the input.
In Step S1, the new variables are M 4 , 2 = { m i , i = 1 , , 33 } , which is the set of all monomials in R [ P 4 , 2 ] with a degree of 4 and a total order of 4, and which is listed in the lexicographical monomial order.
In Step S2, using Gaussian elimination for C 4 , 2 = { R i ( 2 ) : i = 1 , , 589 } , we obtain C 4 , 2 , 1 and C 4 , 2 , 2 , which contain 266 and 182 constraints, respectively.
In Step S3, there exist 182 intrinsic constraints. Thus, C ^ 4 , 2 , 1 contains 448 constraints. Using R -Gaussian elimination in Span R ( C ^ 4 , 2 , 1 ) shows that 417 of these 448 constraints are linearly independent, so N 3 = 417 .
In Step S4, we obtain C ^ ( 4 , 2 ) , which contain three log-concave constraints, so N 2 = 3 .
In Step S5, by eliminating the non-quadratic monomials in E 3 , 4 , 2 using C 4 , 2 , 2 to obtain a quadratic form in m i and then simplifying the quadratic form using C 4 , 2 , 1 , we obtain E ^ 3 , 4 , 2 which is written as a quadratic form in m i .
In Step S6, using the Matlab software in Appendix A of [21] with E ^ 3 , 4 , 2 , C ^ 4 , 2 , 1 and C ^ ( 4 , 2 ) as the input, we find an SOS representation for E ^ 3 , 4 , 2 . Thus, using Theorem 1, C 3 ( 4 , 2 ) is strictly proved under the log-concave condition. The Maple program used to prove C 3 ( 4 , 2 ) can be found at https://github.com/cmyuanmmrc/codeforepi/ (accessed on 15 July 2020).

6. Conclusions

In this paper, three conjectures C l ( m , n ) for l = 1 , 2 , 3 concerning the lower bound for the derivatives of H ( X t ) are considered. We propose a general procedure to prove inequities similar to C l ( m , n ) . We first consider one of the conjectures of McKean C 1 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) 0 in the multivariate case, and prove C 1 ( 3 , 2 ) , C 1 ( 3 , 3 ) and C 1 ( 3 , 4 ) . This conjecture is also mentioned in Villani’s paper [14], and is named the super-H theorem. Motivated by C 2 ( m , n ) , we further propose the following weaker conjecture C 3 ( m , n ) : ( 1 ) m + 1 ( d m / d t m ) H ( X t ) ( 1 ) m + 1 1 n ( d m / d t m ) H ( X G t ) . Using our procedure, we prove C 3 ( 3 , 2 ) , C 3 ( 3 , 3 ) , C 3 ( 3 , 4 ) and C 3 ( 4 , 2 ) under the log-concave condition.
In the univariate case ( n = 1 ), C 1 ( 3 , 1 ) and C 1 ( 4 , 1 ) were proved [16] and C 1 ( 5 , 1 ) cannot be proved with the SDP approach (In this paper, when we say C s ( m , n ) cannot be proved with the SDP approach, we mean that the software in Appendix A of [21] terminates and gives a negative answer for problem (21)) [18,22]. C 2 ( 3 , 1 ) , C 2 ( 4 , 1 ) , and C 2 ( 5 , 1 ) were proved under the log-concave condition [18]. We try to prove C 2 ( 6 , 1 ) under the log-concave condition. However, due to the accuracy of the SDP software, we cannot find an explicit SOS representation. In the multivariate case, C 1 ( 3 , 2 ) , C 1 ( 3 , 3 ) , and C 1 ( 3 , 4 ) were proved and C 1 ( 4 , 2 ) cannot be proved with the SDP approach [22]. For C 1 ( 3 , n ) , n > 4 , the corresponding SDP problem is too large for the Matlab software in Appendix A [23]. In this paper, C 3 ( 3 , 2 ) , C 3 ( 3 , 3 ) , C 3 ( 3 , 4 ) , and C 3 ( 4 , 2 ) were proved under the log-concave condition, and C 2 ( 3 , 2 ) , C 2 ( 3 , 3 ) , C 2 ( 3 , 4 ) , and C 2 ( 4 , 2 ) cannot be proved with the SDP approach under the log-concave condition. For C 3 ( 3 , n ) , n > 4 and C 3 ( 4 , n ) , n > 2 , the corresponding SDP problems are too large for the Matlab software in Appendix A [21].
In order to use the SDP approach to prove more difficult problems, two kinds of improvements are needed. First, it is easy to see that the size of E s ( m , n ) and the numbers of the constraints increase exponentially as m and n become larger. Thus, we need to find certain rules which could be used to simplify the computation to solve problems such as C 1 ( 3 , n ) ( n > 4 ) and C 3 ( 3 , n ) ( n > 4 ) under the log-concave condition. Second, in many cases, such as C 1 ( 5 , 1 ) and C 2 ( 3 , 2 ) under the log-concave constraint, the SDP software terminates and gives a negative answer. Since the SDP method is not complete for our problem, we do not know whether an SOS representation exists. We thus need a complete method to solve problem (13). Another problem is to find more constraints besides those used in this paper in order to increase the power of the approach.

Author Contributions

Conceptualization, L.G.; formal analysis, L.G., C.-M.Y. and X.-S.G.; funding acquisition, L.G., C.-M.Y. and X.-S.G.; investigation, L.G. and X.-S.G.; methodology, L.G.; project administration, X.-S.G.; resources, L.G.; software, L.G.; supervision, X.-S.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by NSFC 11688101 and NKRDP 2018YFA0704705, Beijing Natural Science Foundation (No. Z190004), and the Fundamental Research Funds for the Central Universities 2021NTST32.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the reviewers for their invaluable comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shannon, C.E. A mathematical theory of communications. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  2. Stam, A.J. Some inequalities satisfied by the quantities of information of Fisher and Shannon. Inf. Control 1959, 2, 101–112. [Google Scholar] [CrossRef]
  3. Blachman, N.M. The convolution inequality for entropy powers. IEEE Trans. Inf. Theory 1965, 11, 267–271. [Google Scholar] [CrossRef]
  4. Lieb, E.H. Proof of an entropy conjecture of Wehrl. Commun. Math. Phys. 1978, 62, 35–41. [Google Scholar] [CrossRef]
  5. Verdú, S.; Guo, D. A simple proof of the entropy-power inequality. IEEE Trans. Inf. Theory 2006, 52, 2165–2166. [Google Scholar] [CrossRef]
  6. Rioul, O. Information theoretic proofs of entropy power inequalities. IEEE Trans. Inf. Theory 2011, 57, 33–55. [Google Scholar] [CrossRef]
  7. Bergmans, P.P. A simple converse for broadcast channels with additive white Gaussian noise. IEEE Trans. Inform. Theory 1974, 20, 279–280. [Google Scholar] [CrossRef]
  8. Zamir, R.; Feder, M. A generalization of the entropy power with respect to added Gaussian noise. IEEE Trans. Inf. Theory 1993, 39, 1723–1728. [Google Scholar] [CrossRef]
  9. Liu, T.; Viswanath, P. An extremal inequality motivated by multiterminal information-theoretic problems. IEEE Trans. Inf. Theory 2007, 53, 1839–1851. [Google Scholar] [CrossRef]
  10. Wang, L.; Madiman, M. A new approach to the entropy power inequality, via rearrangements. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 599–603. [Google Scholar]
  11. Guo, L.; Yuan, C.M.; Gao, X.S. A Generalization of the Concavity of Rényi Entropy Power. Entropy 2021, 23, 1593. [Google Scholar] [CrossRef] [PubMed]
  12. Costa, M.H.M. A new entropy power ineqaulity. IEEE Trans. Inf. Theory 1985, 31, 751–760. [Google Scholar] [CrossRef]
  13. Dembo, A. Simple proof of the concavity of the entropy power with respect to added Gaussian noise. IEEE Trans. Inf. Theory 1989, 35, 887–888. [Google Scholar] [CrossRef]
  14. Villani, C. A short proof of the concavity of entropy power. IEEE Trans. Inf. Theory 2000, 46, 1695–1696. [Google Scholar] [CrossRef]
  15. Toscani, G. A concavity property for the reciprocal of Fisher information and its consequences on Costa’s EPI. Phys. A Stat. Mech. Appl. 2015, 432, 352. [Google Scholar] [CrossRef]
  16. Cheng, F.; Geng, Y. Higher order derivatives in Costa’s entropy power inequality. IEEE Trans. Inf. Theory 2015, 61, 5892–5905. [Google Scholar] [CrossRef]
  17. McKean, H.P., Jr. Speed of approach to equilibrium for Kacs caricature of a Maxwellian gas. Arch. Ration. Mech. Anal. 1966, 21, 343–367. [Google Scholar] [CrossRef]
  18. Zhang, X.; Anantharam, V.; Geng, Y. Gaussian optimality for derivatives of differential entropy using linear matrix inequalities. Entropy 2018, 20, 182. [Google Scholar] [CrossRef] [PubMed]
  19. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, MA, USA, 2004. [Google Scholar]
  20. Vandenberghet, L.; Boyd, S. Semidefinite programming. SIAM Rev. 1996, 38, 49–95. [Google Scholar] [CrossRef]
  21. Guo, L.; Yuan, C.M.; Gao, X.S. Lower bound on derivatives of Costa’s differential entropy. arXiv 2020, arXiv:2007.10145. [Google Scholar]
  22. Guo, L.; Yuan, C.M.; Gao, X.S. Lower bound for derivatives of Costa’s differential entropy. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 12–20 July 2021; pp. 1516–1521. [Google Scholar]
  23. Guo, L.; Yuan, C.M.; Gao, X.S. Prove Costa’s entropy power inequality and high order inequality for differential entropy with semidefinite programming. arXiv 2020, arXiv:2004.08543. [Google Scholar]
Table 1. Data in computing the SOS with symbolic computation and SDP.
Table 1. Data in computing the SOS with symbolic computation and SDP.
C 2 ( 3 , 1 ) C 1 ( 3 , 2 ) C 1 ( 3 , 3 ) C 1 ( 3 , 4 ) C 3 ( 3 , 2 ) C 3 ( 3 , 3 ) C 3 ( 3 , 4 ) C 3 ( 4 , 2 )
Vars314388014383833
N 1 663512196663512512417
N 2 00000663
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Guo, L.; Yuan, C.-M.; Gao, X.-S. Lower Bounds on Multivariate Higher Order Derivatives of Differential Entropy. Entropy 2022, 24, 1155. https://doi.org/10.3390/e24081155

AMA Style

Guo L, Yuan C-M, Gao X-S. Lower Bounds on Multivariate Higher Order Derivatives of Differential Entropy. Entropy. 2022; 24(8):1155. https://doi.org/10.3390/e24081155

Chicago/Turabian Style

Guo, Laigang, Chun-Ming Yuan, and Xiao-Shan Gao. 2022. "Lower Bounds on Multivariate Higher Order Derivatives of Differential Entropy" Entropy 24, no. 8: 1155. https://doi.org/10.3390/e24081155

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop