getdoce8c3. 137KB Jun 04 2011 12:05:08 AM

Elect. Comm. in Probab. 5 (2002) 63–76

ELECTRONIC
COMMUNICATIONS
in PROBABILITY

A LAW OF THE ITERATED LOGARITHM FOR
THE SAMPLE COVARIANCE MATRIX
STEVEN J. SEPANSKI
Department of Mathematical Sciences, Saginaw Valley State University, University Center, MI
48710
Email: sepanski@svsu.edu
Submitted 5 August 2002 Final version accepted 24 January 2003
AMS 2000 subject classifications: Primary 60F15; secondary 60F05.
Law of the iterated logarithm, central limit theorem, generalized domain of attraction, extreme
values, operator normalization, self normalization, t statistic.
Abstract
For a sequence of independent identically distributed Euclidean ran vectors, we prove a law of
the iterated logarithm for the sample covariance matrix when o(log log n) terms are omitted.
The result is proved under the hypotheses that the random vectors belong to the generalized
domain of attraction of the multivariate Gaussian law. As an application, we obtain a bounded

law of the iterated logarithm for the multivariate t-statistic.
Introduction:
Let X, X1 , X2 , · · · be independent identically distributed (iid) random column vectors taking
values in Euclidean space, IRd . We use the standard inner product h·, ·i and induced norm.
Assume that the law of X is full. That is, the law of X is not supported on any d−1 dimensional
hyperplane of IRd . We say that the law of X, or merely X, is in the generalized domain of
attraction of the multivariate Gaussian law (GDOAG)
if there exist operators T n and vectors
Pn
bn such that Tn Sn − bn ⇒ N (0, I). Here, Sn = i=1 Xi , I is the identity on IRd , N (0, I) is the
standard Gaussian distribution on IRd and ⇒ denotes weak convergence. Since the standard
Gaussian law is an affine transformation of any other Gaussian law, there is no loss of generality
in assuming the limit is standard. Also, if the law of X is in the GDOAG then EkXk < ∞ and
so, changing Tn accordingly, one can take bn = nEX. See [11], Proposition 8.1.6. Therefore,
there is no loss of generality in assuming that EX = 0. This will be assumed throughout the
article. If the law of X is in the GDOAG we then have that there exist nonsingular operators,
Tn , such that
Tn Sn ⇒ N (0, I).
(1)
In order to simplify the presentation we extend the definition of the normalizing operators

to noninteger values. Define Tx = T[x] , where [·] denotes the greatest integer function.
63

64

Electronic Communications in Probability

Meerschaert [10] uses regular variation in IRd to characterize GDOAs. The characterization
using regular variation will be central to our approach. The main result we will use from
Meerschaert [10] is that the norming operators in (1) can be chosen to satisfy
lim kTbx Tx−1 − b−1/2 Ik = 0

x→∞

(2)

if the law of X belongs to the GDOAG. Moreover, the convergence is uniform over compact
subsets of (0, ∞) Meerschaert [10], Theorem 3.1.
In this paper, we investigate
the law of the iterated logarithm behavior of the sample

Pn
covariance matrix Cn = i=1 Xi XiT . It is shown that if X is in the GDOAG, there exist Tn
satisfying (1) and a set Bn ⊂ {1, 2, · · · , n} with cardinality rn = o(log log n), such that
Tn/log log n (Cn − Rn )1/2

→I
log log n

a.s.

P
Here (·)1/2 is the symmetric square root and Rn = i∈Bn Xi XiT .
Moreover, from this one may obtain a self normalized bounded LIL. In particular, we will
show that if X is in the GDOAG, then
° C −1/2 S °
° n
n °
lim sup ° √
° = 1 a.s.
2 log log n


These results are multivariate analogues of some univariate results obtained by Griffin and
Kuelbs [7] and Gine and Mason [6].
Results:
For t > 0, let Lt = max(1, loge t) and let L2 t = LLt. Also, let α(t) = t/L2 t. For x ∈ IRd
and A ⊂ IRd , define the distance from x to A to be d(x, A) = inf y∈A kx − yk. For a sequence
of vectors, {xn }, denote the cluster set of {xn } by C({xn }) = {y : lim inf kxn − yk = 0}. Write
¯ = {x ∈ IRd : kxk ≤ 1}.
xn →
→ A if d(xn , A) → 0 and C({xn }) = A. Define tn = Ln2 n . Let B
We first describe what we mean by an extreme value. Assuming that X is in the GDOAG,
with EX = 0, let Tn be as in (1) and (2). For each n, rearrange X1 , · · · , Xn as Xn (1), · · · , Xn (n)
so that kTtn Xn (1)k ≥ kTtn Xn (2)k ≥ · · · ≥ kTtn Xn (n)k. Ties may be broken in any arbitrary
Pr
(r)
(0)
manner. Next, define Sn = Sn − i=1 Xn (i) and Sn = Sn . Finally, for any sequence rn > 0
Prn
T
define Rn = i=1 Xn (i)Xn (i) . If rn = 0, define Rn = 0.

Following are the statements of the main results contained in this article. Proofs and
technical lemmas are contained in the subsequent section.
Theorem 1: Let X be in the GDOAG with EX = 0. There exist operators Tn , satisfying (1)
and (2), and scalars rn = o(L2 n) such that
Ttn (Cn − Rn )Tt∗n
→I
L2 n

a.s.

If we can pass the operator square root through the limit in Theorem 1, we will obtain the
following corollary. To do so requires the operators Tn to be positive and symmetric. The proof
of Theorem 1 relies heavily on property (2). It is not clear whether one can obtain operators
using the techniques of Meerschaert to yield operators that satisfy (2) and are positive and

A Law of the Iterated Logarithm

65

symmetric. On the other hand, the operators of Hahn and Klass, [8], are positive and symmetric,

but may not satisfy (2). Therefore, we do not include this condition in the statement of the
corollary. Billingsley’s multivariate convergence of types theorem allows us to switch back and
forth between the two approaches to normalizing operators, utilizing whichever property we
need, regular variation or symmetry.
Corollary 2: Let X be in the GDOAG with EX = 0. There exist positive symmetric operators
An satisfying (1) and scalars rn = o(L2 n) such that
Atn (Cn − Rn )1/2

→I
L2 n

a.s.

From Sepanski [15], wherein was proved a trimmed LIL with the operators Tn , and Corollary
2 above, we will obtain the following self normalized LIL.
Corollary 3: Let X be in the GDOAG with EX = 0. There exist rn = o(L2 n) such that
(r )

(Cn − Rn )−1/2 Sn n
¯



→B
2L2 n

a.s.

Theorem 4: If X is in the GDOAG with EX = 0, then
° C −1/2 S °
° n
n °
lim sup ° √
° = 1 a.s.
2 log log n
n

Theorem 4 stands in comparison to the real valued Theorem 1 of Griffin and Kuelbs [7].
There they show that if X is in the Domain of Attraction of a Gaussian Law in IR, then
Pn
(Xi − EXi )

pi=1 Pn

→ [−1, 1]
2L2 n i=1 Xi2

a.s.

To see why results such as Theorem 1 and its corollaries may be true, consider first the case
where EkXk2 < ∞. In this case, the covariance matrix, C = E(XX T ) exists. Moreover, by the
classical case of the Central Limit Theorem, one may take Tn = (nC)−1/2 in (1) and (2). In
which case,
1/2
1/2
C −1/2 Cn
Ttn Cn


=
→ I a.s.
n

L2 n
by the Strong Law of Large Numbers. Hence, Corollary 2 holds with rn ≡ 0, and therefore
Rn ≡ 0. From this, and the classical LIL, one may infer the conclusions of the other three
results.
The main impetus of this article is to extend the results to the case where X is in the
GDOAG but EkXk2 = ∞. Here, accounting for the influence of extreme terms is paramount.
Although there may be extreme terms, they are few in number. In fact, they are on the order
of o(L2 n). Also, note that Theorem 4 contains no trimming. Heuristically, this is due to the
fact that when any extreme reappear in the sum, they are essentially cancelled out when they
reappear in the inverse of the sample covariance matrix.

66

Electronic Communications in Probability

Proofs: We begin by constructing the sequence {rn }. This construction mirrors that of Kuelbs
and Ledoux [9]. Define Γ(t) = sups≥t sP (kTs Xk ≥ 1). By Gaussian convergence criteria (see,
for example, Araujo and Gine, [1], Theorem 5.9), Γ(t) ↓ 0, as t ↑ ∞. We let
µ ³
¶−1/2

1 ´

.
ξn = L
Γ( n)
³
´
ξn
Gaussian convergence guarantees that ξn ↓ 0. By basic calculus, ξn L Γ(δt
→ ∞, ∀δ > 0.
n)
Replacing ξn by anything larger does³ not alter
´ the second of these, so we may assume,
ξn
without loss of generality that ξn ↓ 0, ξn L Γ(δt
→ ∞, ∀δ > 0, and also that rn = [ξn L2 n] ↑
n)
∞. Having defined the sequence rn , we now proceed to the proof of Theorem 1.
Proof of Theorem 1: Fix a > 1, ρ > 0. Let nk = [ak ], and Ik = (nk , nk+1 ]. For 1 ≤ j ≤ nk+1 ,
define the random matrices,

uj = uj (k, a, ρ) = Xj XjT I[kTtnk Xj k ≤ ρ]

wj = wj (k, a, ρ) = Xj XjT I[kTtnk Xj k > ρ]
Next, for n ∈ Ik define the random truncated covariance matrices
Un = Un (a, ρ) =
Wn = Wn (a, ρ) =

n
X

(uj − Euj )

j=1
n
X

wj

j=1

We analyze each of the sequences according to the following Lemmas. Note that C n − Rn =
Un + Wn − Rn + nEXX T I[kTtnk Xk ≤ ρ].
Lemma 5: Assume that X has mean zero and is in the GDOAG. For all ρ > 0, a > 1, v > 0,
and for all unit vectors θ, φ,
¯ T
¯
¯ θ Ttn Un Tt∗ φ ¯ ρvev
ρ
nk
¯
¯
k
a+
a.s.
lim sup max ¯
¯≤
n∈Ik ¯
¯
L2 n
2
v
k

Lemma 6: Assume that X has mean zero and is in the GDOAG. For all ρ > 0, and a > 1,
°
°
° Ttn (Wn − Rn )Tt∗ °
nk °
° k
lim sup max °
° = 0 a.s.
n∈Ik °
°
L2 n
k

Lemma 7: Assume that X has mean zero and is in the GDOAG. For all ρ > 0, and a > 1,
°
°
°
°
°
°

T
lim sup max °tn Ttnk E(XX I[kTtnk Xk ≤ ρ])Ttn − I ° ≤ a − 1
k
n∈I
°
°
k
k

Assuming each lemma to be true for the time being and deferring the proofs of them
until later, we continue with the proof of Theorem 1. Combining Lemmas 5-7 via the triangle
inequality yields, for every pair of unit vectors φ, θ, and for every v > 0, ρ > 0, a > 1,
¯
¯ T
¯ ρvev
¯ θ Ttn (Cn − Rn )Tt∗ φ
ρ
nk
¯
¯
k
− hθ, φi¯ ≤
a + + a − 1 a.s.
lim sup max ¯
n∈I
¯
¯
L
n
2
v
k
2
k

A Law of the Iterated Logarithm

67


Note that the left side here no longer depends on ρ and v. First, we let v = ρ, and then let
ρ ↓ 0. Then we have that for every pair of unit vectors φ, θ, and for every a > 1,
¯
¯ T
¯ θ Ttn (Cn − Rn )Tt∗ φ
¯
nk
¯
¯
k
lim sup max ¯
− hθ, φi¯ ≤ a − 1 a.s.
n∈Ik ¯
¯
L2 n
k
Intersecting over θ and φ in a countable dense subset of the unit sphere yields for every a > 1,
°
°
°
° Ttn (Cn − Rn )Tt∗
nk
°
° k
− I ° ≤ a − 1 a.s.
lim sup max °
n∈Ik °
°
L2 n
k

Finally, we need to eliminate the dependence on a > 1 by eliminating the subsequence n k from
the left side. This essentially follows from (2).
First, observe that since tn is eventually increasing we have that for n ∈ Ik , tnk ≤ tn ≤ tnk+1 .

tnk+1
tnk . The latter converges to a and
tn
therefore is eventually bounded by 2a. Hence, for large k, { tn }n∈Ik ⊂ [1, 2a]. Applying (2) over
k
− ( ttnn )−1/2 Ik ≤ supb∈[1,2a] kTbtnk Tt−1
this compact set yields maxn∈Ik kTtn Tt−1
− b−1/2 Ik → 0.
nk
nk

Therefore, dividing through by tnk , we have that 1 ≤

−(
k ≤ lim sup max kTtn Tt−1
lim sup max kTtn Tt−1
n
n
n∈Ik



k

From this we obtain
k

tn
tnk

k

k

n∈Ik

k

tn −1/2
tn −1/2
)
Ik + lim sup max(
)
≤1
n∈Ik tnk
tnk
k

Also by (2), and the fact that kT k = kT ∗ k, we obtain uniformly over n ∈ Ik
³
tn −1/2 ´
tn −1/2 ´³ ∗ −1 ∗
)
I
T
)
I
T

(

(
o(1) = Ttn Tt−1
t
t
nk
nk
n
tnk
tnk
r
³
tnk ´
tnk ³
tn −1/2 ´
tn −1/2
−1
∗ −1 ∗
∗ −1 ∗
T
= Ttn Tt−1
T

I
+
)
I
+
T
)
I
T

(

(
T
T
t
tn
tnk
tn
n tn
nk tnk
k
tn
tn
tnk
tnk
³
tn ´
T ∗ −1 Tt∗n − k I + O(1)o(1)
= Ttn Tt−1
nk tnk
tn
tn

Finally, we note that 1 ≤ ttnn ≤ tnk+1 implies 0 ≤ maxn∈Ik (1 −
k
k
Putting the three facts outlined above together yields,
°
° T (C − R )T ∗
n
n tn
°
° t
− I°
lim sup max ° n
n∈I
L
n
k
2
k

tnk
tn

) ≤ 1−

tnk
tnk+1

→ 1 − a1 .

° Ttn (Cn − Rn )Tt∗
°
nk
° k
°
2
k
lim
sup
max
≤ lim sup max kTtn Tt−1

I
°
°
nk
n∈Ik
n∈Ik
L2 n
k
k
°¡
°
tnk ¢ °
tnk °
°
°
°
°
∗ −1 ∗
1

+
lim
sup
max
I

+ lim sup max °Ttn Tt−1
T
T

°
°
t
t
nk
nk
n
n∈I
n∈I
tn
tn
k
k
k
k
³

≤ (1)(a − 1) + 0 + 1 −
a.s.
a
To complete the proof of Theorem 1 (subject to Lemmas 5-7) let a ↓ 1 through a countable set.
Proof of Lemma 5: The proof uses classical blocking arguments and the Borel-Cantelli Lemma
along the subsequence nk . A maximal inequality (Ottaviani’s) allows us to pass to the full
sequence.

68

Electronic Communications in Probability

Fix unit vectors θ, φ. Let ǫ > 0, ξ > 0 be given. Apply Ottaviani’s inequality (see, for
example, Dudley, [3], p.251) to obtain
¯
¯
¯ T
¯
¯
¯
´
³
´
³
¯θ Ttnk Un Tt∗nk φ¯
¯
¯
P max
≥ (1 + ξ)ǫ ≤ P max ¯θT Ttnk Un Tt∗n φ¯ ≥ (1 + ξ)ǫL2 nk
k
n∈Ik
n∈Ik
(3)
L2 n
¯
³¯
´
¯
¯ T

≤ 2P ¯θ Ttnk Unk+1 Ttn φ¯ ≥ ǫL2 nk
k
Pnk+1 T
as long as maxn∈Ik P (| j=n+1 θ Ttnk (uj − Euj )Tt∗n φ| ≥ ǫL2 nk ) ≤ 12 . To verify that this is the
k
case, at least for sufficiently large k, we apply Chebychev’s inequality.
k+1
¯
³¯ nX
´
¯
¯
P ¯
θT Ttnk (uj − Euj )Tt∗n φ¯ ≥ ǫL2 nk
k
j=n+1

k+1
´
³ nX
1
V
ar
θT Ttnk (uj − Euj )Tt∗n φ
2
2
k
ǫ L2 nk
j=n+1
°2
ρ2 nk+1 °
°
°
E °Ttnk X ° I[kTtnk Xk ≤ ρ]
≤ 2
2
ǫ L2 nk
°2
°
nk+1
ρ2
°
°
·
· tnk E °Ttnk X ° I[kTtnk Xk ≤ ρ].
= 2
ǫ L2 nk
nk
This converges to zero, as k goes to infinity, due to the fact that the first factor does, while the
second factor converges to a and the third factor is bounded by the truncated variance condition
of Gaussian convergence.
We will show that the last series in (3) is finitely summable over k. In order to do so,
we require another Lemma. The lemma is based on an inequality of Pruitt [12]. For iid random vectors, Yj and unit vectors θ, φ, define
PnZj (θ, φ) = hYj , θihYj , φiI[kYj k ≤ ρ]. Also, write
K(θ, φ, ρ) = ρ−2 EZ 2 (θ, φ), and Mn (θ, φ) = j=1 Zj (θ, φ).
Lemma 8: Let Y1 , · · · , Yn be iid random vectors in Euclidean space, IRd . For any ρ > 0, s >
0, v > 0, and for any unit vectors θ, φ
¯ v
³¯
sρ ´
¯
¯
P ¯Mn (θ, φ) − EMn (θ, φ)¯ > evρ nρK(θ, φ, ρ) +
≤ 2e−s
2
v
Proof: By Taylor’s expansion for the exponential function, if x ∈ (−ρ2 , ρ2 ) then eux ≤ 1 + ux +
u2 x2 uρ2
. Also, 1 + t ≤ et , ∀t. Dropping subscripts, applying these inequalities to the random
2 e
variable Z(θ, φ), (note that |Z(θ, φ)| ≤ ρ2 ), taking expectations, and using Jensen’s inequality,
we have that
2
u2 ρ2 euρ
K(θ, φ, ρ)
EeuZ(θ,φ) ≤ 1 + uEZ(θ, φ) +
2
2
´
³
u2 ρ2 euρ
K(θ, φ, ρ) .
≤ exp uEZ(θ, φ) +
2
Below, we apply Markov’s inequality in the second step and the previous inequality in the last
step. We have the following.



P (Mn (θ, φ) > t)P (euMn (θ,φ) > eut )
≤ e−ut EeuMn (θ,φ)
´n
³
= e−ut EeuZ(θ,φ)

2
³
´
u2 ρ2 euρ
≤ exp nuEZ(θ, φ) + n
K(θ, φ, ρ) − ut .
2

A Law of the Iterated Logarithm

69

2 uρ2

Take t = nEZ(θ, φ) + n uρ 2e K(θ, φ, ρ) + us , v = uρ. Observe that nEZ(θ, φ) = EMn (θ, φ),
and then apply the same argument to −Mn (θ, φ) to complete the proof of Lemma 8.
Continuing on with the proof of Lemma 5, we will apply Lemma 8 with Yj = Ttnk Xj . We
begin by analyzing
tnk K(θ, φ, ρ) = tnk ρ−2 EhTtnk X, θi2 hTtnk X, φi2 I[kTtnk Xk ≤ ρ]
≤ tnk EhTtnk X, θi2 I[kTtnk Xk ≤ ρ] → 1,

by the basic convergence criteria for a standard Gaussian limit (see [11], Cor. 3.3.12). Using
the above, and the fact that nk+1 /nk → a, we have that for all ξ > 0, and for sufficiently large
k,
vρevρ
(1 + ξ)ρ
vρevρ nk+1 K(θ, φ, ρ) (1 + ξ)ρ
+

a(1 + ξ) +
2L2 nk
v
2
v
Let the right hand side of this inequality be ǫ. Continuing the string of inequalities started in
(3), by containment we then have that, for sufficiently large k,
¯
³¯
´
¯
¯
P ¯θT Ttnk Unk+1 Tt∗n φ¯ ≥ ǫL2 nk
k
¯
³¯
´
¯
¯
= P ¯Mnk+1 (θ, φ) − EMnk+1 (θ, φ)¯ ≥ ǫL2 nk
¯ 1
³¯
L2 nk (1 + ξ)ρ ´
¯
¯
≤ P ¯Mnk+1 (θ, φ) − EMnk+1 (θ, φ)¯ ≥ nk+1 ρvevρ K(θ, φ, ρ) +
2
v
−(1+ξ)L2 nk
≤ 2e
This last series is finitely summable. Therefore, recalling the definition of ǫ, the above display,
(3), and the Borel-Cantelli Lemma yield that for all ξ > 0, ρ > 0, a > 1, v > 0, and for all unit
vectors θ, φ,
¯ T
¯
¯ θ Ttn Un Tt∗ φ ¯
(1 + ξ)2 ρ
ρvevρ
nk
¯
¯
k
lim sup max ¯
a(1 + ξ)2 +
a.s.
¯ ≤ ǫ(1 + ξ) =
n∈Ik ¯
¯
L2 n
2
v
k

Now let ξ ↓ 0. Note that the left side does not depend on ξ. This completes the proof of Lemma
5.
Proof of Lemma 6: Recall that Xn (1), · · · , Xn (n) are an ordering of X1 , · · · , Xn under the
operator Ttn . Because in Lemma 6 we are normalizing by the operator Ttnk , we must also
consider an ordering of X1 , · · · , Xn under the operator Ttnk . It is possible that the two orderings
are different. However, due to (2), for n ∈ Ik , they are not significantly different. To this end,
we let Xn′ (1), · · · , Xn′ (n) denote an ordering of X1 , · · · , Xn under Ttnk such that kTtnk Xn′ (1)k ≥
kTtnk Xn′ (2)k ≥ · · · kTtnk Xn′ (n)k. Recalling the definition of wj ,
rn
n
° °
°
°
´
³X
X
° °
°
°
T
Xn (j)Xn (j) Tt∗n °
wj −
°Ttnk (Wn − Rn )Tt∗nk ° = °Ttnk
k
j=1

j=1

rn
n
°
°X
X
°
°
T
T ∗
Ttnk Xn′ (j)Xn′ (j) Tt∗n °
Ttnk Xj Xj Ttn I[kTtnk Xj k > ρ] −
≤°
k
k
j=1

j=1

rn
rn
°
°X
X
°
°
T
T
Ttnk Xn (j)Xn (j) Tt∗n °

Ttnk Xn′ (j)Xn′ (j) Tt∗n −
k
k
j=1

j=1

(4)

70

Electronic Communications in Probability

Pn
We now try to bound each of the two terms in (4). For n ∈ Ik , let pn = i=1 I[kTtnk Xi k >
Pn
ρ], and let qn = i=1 I[kTtn Xi k > ρa−1 ]. Note that pn and qn depend on k and are random.
By (2), observe that
°
°
°
³ t ´−1/2
³ t ´−1/2 °

°
°
°
°
nk
nk
−1
I ° + max
→ a.
max °Ttnk Tt−1

max

T
T
°
°
tnk tn
n
n∈Ik
n∈Ik
n∈Ik
tn
tn

Therefore, for sufficiently large k, it can be made less than a, ( since a > a,). We assume that
this holds for the rest of the proof. Therefore, pn ≤ qn , for k sufficiently large. Assume, for the
moment, that maxn∈Ik qn ≤ rnk . Note that since rn ↑, this also implies that pn ≤ qn ≤ rn .
Observe that if Xi ∈
/ {Xn′ (1), · · · , Xn′ (pn )} then kTtnk Xi k ≤ ρ. Otherwise we would have

kTtnk Xn (1)k ≥ kTtnk Xn′ (2)k ≥ · · · ≥ kTtnk Xn′ (pn )k ≥ kTtnk Xi k > ρ. This is contrary
/
to the definition of pn . Moreover, kTtnk Xn′ (i)k > ρ for i = 1, · · · , pn . Similarly, if Xi ∈
{Xn (1), · · · , Xn (qn )} then kTtn Xi k ≤ ρ/a, and kTtn Xn (i)k > ρ/a for i = 1, · · · , qn .
Consider the first term in (4). If at most rn of X1 , · · · , Xnk+1 satisfy kTtnk Xi k > ρ, then
since n ≤ nk+1 , at most rn of X1 , · · · , Xn satisfy kTtnk Xi k > ρ. Such summands will then apPr n
Pn
T
Ttnk Xn′ (j)Xn′ (j) Tt∗n . They therefore
pear in both j=1 Ttnk Xj Xj Tt∗n I[kTtnk k > ρ] and j=1
k
k
cancel out in subtraction. If there are any other such summands, they appear only in the latter,
not the former, because they will be zeroed out by the indicator. By the preceeding paragraph,
such summands satisfy kTtnk Xi XiT Tt∗n k = kTtnk Xi k 2 ≤ ρ2 . Furthermore, there are at most
k
rn − pn ≤ rn such summands. Therefore,
rn
n
°
°X
X
°
°
Ttnk Xj XjT Tt∗n I[kTtnk k > ρ] −
Ttnk Xn′ (j)Xn′ (j)T Tt∗n ° ≤ rn ρ2 .
°
k
k

(5)

j=1

j=1

To handle the second term in (4) we have to consider the possibility that X 1 , · · · , Xn may
be ordered differently under Ttn and Ttnk . However, as noted, by (2), the orderings are not
significantly different.
By the definition of pn and qn , we have that for n sufficiently large, {Xn′ (1), · · · , Xn′ (pn )} ⊂
{Xn (1), · · · , Xn (qn )}. If not, Xn′ (i) ∈
/ {Xn (1), · · · , Xn (qn )} for some i = 1, · · · , pn . In which case,
as observed above, kTtn Xn′ (i)k ≤ ρ/a. So, kTtnk Xn′ (i)k ≤ ρ. On the other hand, since i ≤ pn ,
as observed above, kTtnk Xn′ (i)k > ρ. A contradiction.
Because of this containment, there is cancellation in the second term in (4). Indeed,
rn
X
j=1

T

Ttnk Xn (j)Xn (j) Tt∗n −
k

=

X
1

Ttnk Xj XjT Tt∗n −
k

rn
X

T

Ttnk Xn′ (j)Xn′ (j) Tt∗n

j=1
rn
X

k

T

Ttnk Xn′ (j)Xn′ (j) Tt∗n +
k

rn
X

T

Ttnk Xn (j)Xn (j) Tt∗n .
k

j=qn +1

j=pn +1

P
Here, 1 extends over all j such that Xj ⊂ {Xn (1), · · · , Xn (qn )} \ {Xn′ (1), · · · , Xn′ (pn )}. However, for any such Xj , kTtnk Xj k ≤ ρa−1 < ρ. Furthermore, the number of such possible j
is qn − pn ≤ rn . In the third summation, each summand is bounded because for j > qn ,
kTtnk Xn (j)k ≤ ρ. The number of such j is rn − qn ≤ rn . For the middle term, if j > pn , then
kTtnk Xn′ (j)k ≤ ρ. The number of such j is rn − pn ≤ rn . Therefore,
rn
rn
°
°X
X
°
°
T
T
Ttnk Xn′ (j)Xn′ (j) Tt∗n ° ≤ 3rn ρ2
Ttnk Xn (j)Xn (j) Tt∗n −
°
k
k
j=1

j=1

(6)

A Law of the Iterated Logarithm

71

Summarizing, by combining (4-6) , and since rn ≤ rnk+1 , for n ∈ Ik we have that
¸
·
°
°
°
2
∗ °
[max qn ≤ rnk ] ⊂ max °Ttnk (Wn − Rn )Ttn ° ≤ 4rnk+1 ρ
k
n∈Ik

n∈Ik

Now, let ǫ > 0. Since rn = o(L2 n), and nk+1 /nk → a we have that for sufficiently large k,
4rnk+1 ρ2
L2 nk

< ǫ. We then obtain

° Ttn (Wn − Rn )Tt∗ °
°
°
³
´
³
´
nk °
°
°
°
P max ° k
° > ǫ ≤ P max °Ttnk (Wn − Rn )Tt∗nk ° > ǫL2 nk
n∈Ik
n∈Ik
L2 n
rn
n
°
°
´
³
X
X
°
°
Xn (j))° > 4rnk+1 ρ2
wj −
≤ P max °Ttnk (
n∈Ik

³

j=1

j=1

≤ P max qn ≥ rnk+1 + 1
n∈Ik

´

(7)

Our goal is now to show that the quantity in (7) is finitely summable. By (2), observe that
°
°
°
³ t ´−1/2
³ t ´−1/2 °
°
°
°
°
n
n
−1
I
→ 1.
+
max
max °Ttn Tt−1

max

T
T
°
°
°
tn tn
nk
k
n∈Ik
n∈Ik tnk
n∈Ik
tnk

Therefore, for sufficiently large k, it can be made less than a, ( since a > 1). Then,
nk+1
n
n
X £
X
X
£
¤
£
ρ¤
ρ¤
I kTtnk Xj k > 2 .
I kTtnk Xj k > 2 ≤
I kTtn Xj k > ρ/a ≤ max
n∈Ik
n∈Ik
a
a
j=1
j=1
j=1

max qn = max
n∈Ik

¤ £ Pnk+1
£
Therefore, maxn∈Ik qn ≥ rnk+1 + 1 ⊂
j=1 I[kTtnk Xj k >
reduced to showing that

ρ
a2 ]

¤
≥ rnk+1 + 1 The proof is now

k+1
´
X ³nX
ρ
P
I[kTtnk Xj k > 2 ] ≥ rnk+1 + 1 < ∞.
a
j=1

(8)

k

The probability here is Binomial, so we need a bound on probabilities, P (B ≥ α + 1), where
B has a binomial distribution with parameters n = nk+1 , and p = P (kTtnk Xk > aρ2 ). Take
α = rnk+1 . The bound we use is from Feller, [4], p. 173, equation (10.9),
Z p
n!
P (B ≥ α + 1) =
tα (1 − t)n−α−1 dt
α!(n − 1 − α)! 0
n!
pα+1

α!(n − 1 − α)! α + 1
n
→ 1, as k → ∞, since rn = o(L2 n). Therefore, its square root is bounded
Note that n−α−1
by two eventually. Also, note that as k → ∞, so do n, α, and n − α − 1. Since each of the
three factorials is going to infinity with k, we may apply Stirling’s Formula to each. Hence for
sufficiently large k,

³ n(α + 1) ´
´n
n
n!
2 ³
2
nα+1 α−(α+1/2)
≤ √
nα+1 α−(α+1/2) ≤ √ exp
α!(n − 1 − α)!
n−α−1
e π n−α−1
e π

72

Electronic Communications in Probability

The last inequality here follows from the fact that (1 + nx )n ≤ ex ∀x, n.
Substituting this into the Binomial bound from Feller yields
³ n(α + 1) ´
2
pα+1
nα+1 α−(α+1/2)
P (B ≥ α + 1) ≤ √ exp
n−α−1
α+1
e π
√ ³
´α+1
n
2
α
α−1 np exp(
= √
)
n−α−1
e πα+1
´α+1
n
2 ³
)
≤ √ α−1 np exp(
n−α−1
e π
The last inequality follows from the fact that


α
α+1

→ 0, and so is eventually bounded above by

−1
k → δ, and so,
By regular variation of Tt , (2), we have that kTtnk Tδt
one. Next, let δ =
nk

−1
k kTδtnk Xk ≤ a δkTδtnk Xk, for large k. So, [kTtnk Xk >
since a > 1, kTtnk Xk ≤ kTtnk Tδt
nk
ρ
a2 ] ⊂ [kTδtnk Xk > 1], by definition of δ. Recalling the construction of r n and the definition of
Γ(s) at the outset of this section, we’ve shown that p = P (kTtnk Xk > aρ2 ) ≤ P (kTδtnk Xk >
1) ≤ δt1n Γ(δtnk ).
ρ2
a6 .

k

ξn
) → ∞, we have that for large
Next, fix M > 0, to be specified later. Since ξn L( Γ(δt
n)
ξ

enough k, ξnk L( Γ(δtnnk ) ) ≥ M. A little algebra yields, Γ(δtnk ) ≤ ξnk e−M/ξnk .
k
Organizing the preceding paragraphs shows that the series in (8) is, for some constant C > 0
which may increase from one line to the next,
¶rnk+1 +1

nk+1
1
−1
Γ(δtnk ) exp(
)
≤C
rnk+1 nk+1
δtnk
nk+1 − rnk+1 − 1
k
¶rnk+1 +1

nk+1
1
−M/ξnk
exp(
ξ
e
)
≤C
rn−1
n
n
k+1
k+1
δtnk k
nk+1 − rnk+1 − 1
k
µ
¶rnk+1 +1
X 1 nk+1 L2 nk ξn
nk+1
k
=C
)
e−M/ξnk exp(
δ nk
rnk+1
nk+1 − rnk+1 − 1
k

µ
rnk+1 +1
X a2 ea
(9)
e−M/ξnk
≤C
δ
k

To see (9) we bound the tail of the series as follows. nk+1 /nk → a, so eventually it is bounded by

a3/2 . Also, since ξnk L2 nk ↑,

ξnk L2 nk
rnk+1



ξnk+1 L2 nk+1
[ξnk+1 L2 nk+1 ]

→ 1, so eventually it is bounded by a1/2 .

k+1
k+1
Finally, nk+1n−r
→ 1, so eventually it is bounded by a. Exponentiating, exp( nk+1n−r
)≤
nk −1
nk −1
a
e .
2
Next, given a > 1, and δ > 0, there exists x0 (a, δ), such that for x ≥ x0 , ex/2 ≥ aδ ea .
2 a
≥ x0 for large k. Hence, a δe e−M/ξnk ≤ e−M/2ξnk . Also, rnk+1 + 1 =
Since ξnk ↓ 0, ξM
n
k

−M (rn

+1)

k+1
2 nk
≤ −M L
.
[ξnk+1 L2 nk+1 ] + 1 ≥ ξnk+1 L2 nk+1 ≥ ξnk L2 nk . So,
2ξnk
2
Utilizing the previous paragraph in (9), for some constants C > 0, which may increase from
one inequality to the next,
¶rnk +1
³ −M L n ´
³ −M (r + 1) ´
Xµ a2 ea
X
X
nk
2 k
−M/ξnk
≤C
exp
.
≤C
exp
e
δ
2ξnk
2

k

k

k

A Law of the Iterated Logarithm

73

This converges as long as M > 2. This shows the series in (7) converges and since ǫ > 0 was
arbitrary, this completes the proof of Lemma 6.
Proof of Lemma 7: First, we would like to replace the tn with tnk . This can be done via the
triangle inequality, and tn ↑ . Also, note that the quantity in the expectation is nothing but
u = u(k, a, ρ).
°
° ¯t ¯
° ¯ n¯
°
¯
°tn Ttnk EuTt∗nk − I ° ≤ ¯
tnk
tn
≤ k+1
tnk

°
° ¯t
¯
°
° ¯ n
¯
− 1¯
°tnk Ttnk EuTt∗nk − I ° + ¯
tnk
°
¯
° ¯t
°
¯
° ¯ nk+1
− 1¯
°tnk Ttnk EuTt∗nk − I ° + ¯
tnk

→a·0+a−1

as k → ∞, as we will show presently. The other two being obvious, we must show the second
factor of the first term goes to zero. However, this follows from ”Gaussian” convergence. Indeed,
Sepanski [16] shows that under mean 0 and GDOAG, Tn Cn Tn∗ → I in probability. Considering
this as a triangular array {Tn Xi XiT Tn∗ } of random elements in the space of operators from IRd
to IRd , we have Tn Cn Tn∗ is shift convergent to the zero operator, when centered by I. On the
other hand, (see Araujo and Gine, Theorem 5.9) if the triangular array is shift convergent it can
be centered by the truncated means. That is Tn Cn Tn∗ − nETn XX T Tn∗ I[kTn XX T Tn∗ k ≤ δ] is
convergent to the zero operator for all δ > 0. Replace δ with ρ2 and apply convergence of types
to yield nETn XX T Tn∗ I[kTn XX T Tn∗ k ≤ ρ2 ] − I → 0. Taking square roots inside the indicator,
(kTn XX T Tn∗ k = kTn Xk2 ) and applying this along the subsequence tnk completes the proof of
Lemma 7.
Proof of Corollary 2: Let Ttn be as in Theorem 1. Let An be the normalizing sequence
constructed by Hahn and Klass. In particular, the key property we will need is that A n satisfy
(1) and are positive and symmetric. Since both An and Tn satisfy (1), we may apply Billingsley’s multivariate Convergence of Types Theorem [2] to conclude that there exist orthogonal
transformations Pn , and a sequence of linear operators Bn → I such that Tn = Bn Pn An . From
this it follows that Theorem 1 holds for the sequence An , except that perhaps An may not
satisfy (2). However, the almost sure limit does hold as claimed in the corollary. Indeed, since
= Pt∗n Bt−1
Atn Tt−1
, we have that
n
n
°
° °
° A (C − R )A
h T (C − R )T ∗ i
n
n tn
tn
°
° °
° tn n
n
tn
− I ° = °Atn Tt−1
Atn − I °
Tt∗−1
°
n
n
L2 n
L2 n
°
°
h T (C − R )T ∗ i
n
n tn
tn
°
°
∗−1
= °Pt∗n Bt−1

I
P
B
°
tn
tn
n
L2 n
°
°
h T (C − R )T ∗ i
n
n tn
tn
°
°
∗−1
= °Bt−1

I
B
° → 0 a.s.,
tn
n
L2 n

since the outside factors converge to the identity and the inside factor converges to the identity
almost surely by Theorem 1. Since Atn are positive and symmetric and since Cn − Rn are
positive and symmetric as well,

Atn (Cn −Rn )1/2

L2 n

→I

a.s.

T

S (rn )

tn n
¯ a.s., for operators

→B
Proof of Corollary 3: In Sepanski [15] it was shown that √
2L2 n
satisfying (1) and (2). However, this will also hold for any other sequence of operators satisfying
¯ is invariant under orthogonal transformations.
(1) by convergence of types and the fact that B

74

Electronic Communications in Probability

Hence, it holds with Ttn replaced by the Hahn and Klass sequence of operators Atn . Now combine
with Corollary (2) to obtain the result.
Proof of Theorem 4: The point here is to eliminate the trimming from Corollary 3, both
from the normalizing operator, and from the partial sum. This can be done since the two types
of trimming, or lack thereof, basically cancel each other out. First, we prove a simple result
relating the norms of the trimmed operator to the untrimmed operator.
Pn
Lemma P
9: Let v1 , · · · , vn be vectors in IRd . Suppose S ⊂ {1, · · · , n}. Define A = i=1 vi viT ,
and B = i∈S vi viT . Assume that A is invertible, then kA−1/2 B 1/2 k ≤ 1.
Proof: First, clearly A and B are nonnegative and symmetric, therefore each has a nonnegative
and symmetric square root. We denote the unit sphere by S d−1 .
°
°
°
°
° −1/2 1/2 °2 ° −1/2 1/2
°
B ° = °(A
B )(A−1/2 B 1/2 )∗ °
°A
°
°
°
°
= °A−1/2 BA−1/2 °
D
E
= sup A−1/2 BA−1/2 θ, θ
θ∈S d−1

= sup
θ∈S d−1

D
E
BA−1/2 θ, A−1/2 θ

³ A1/2 θ ´E
³ A1/2 θ ´
D
, A−1/2
BA−1/2
1/2
kA θk
kA1/2 θk
θ∈S d−1

= sup

hBθ, θi
kA1/2 θk2
P
hvi , θi2
= sup Pi∈S
≤ 1.
n
2
θ∈S d−1
i=1 hvi , θi
= sup

θ∈S d−1

−1/2

From Lemma 9 we conclude that kCn (Cn − Rn )1/2 k ≤ 1. Combining this with Corollary 3,
we obtain
−1/2 (r )
Cn Sn n
¯ a.s.


→C⊂B
(10)
2L2 n
Of course, C is nonrandom due to the zero-one law.
C −1/2 S (rn )
C −1/2 S
Next, we show that, up to a set of measure zero, n√2L nn and √n2L nn have the same
2
2
cluster sets. We achieve this by showing the differencePgoes to zero with probability one.
Using the notation of Lemma 9, but denoting b = i∈S vi , and applying a similar argument,
we see that
kA−1/2 bk = sup |hA−1/2 b, θi|
θ∈S d−1

|hb, θi|
1/2 θk
θ∈S d−1 kA
P
| i∈S hvi , θi|
= sup ³
´1/2
Pn
θ∈S d−1
2
i=1 hvi , θi
P
i∈S |hvi , θi|
≤ sup ³
´1/2
P
n
θ∈S d−1
2
hv
,
θi
i=1 i

= sup

A Law of the Iterated Logarithm

75

³P
´1/2

2
#S
i∈S hvi , θi
≤ sup
³P
´1/2
n
θ∈S d−1
2
hv
,
θi
i=1 i
p
≤ #S

The second to last inequality follows from Cauchy-Schwarz. Here #S denotes the cardinality
Pr n

−1/2
(r )
Xn (i), yields kCn (Sn − Sn n )k ≤ rn .
of S. Applying the above to A = Cn , and b = i=1
From this we conclude that
° C −1/2 (S − S (rn ) ) ° r r
n
°
° n
n
√n
→ 0.
(11)
°
°≤
2L2 n
2L2 n
(10) and (11) combine to yield

−1/2

Cn Sn
¯


→C⊂B
2L2 n

a.s.

(12)

This implies the upper bound in Theorem 4. To show the lower bound in Theorem 4, we
appeal to Theorem 1 of Griffin and Kuelbs, [7]. First, observe that by Cauchy-Schwarz,
n
³X
´1/2
hXi , θi2
|hSn , θi| = |hCn1/2 Cn−1/2 Sn , θi| = |hCn−1/2 Sn , Cn1/2 θi| ≤ kCn−1/2 Sn k kCn1/2 θk = kCn−1/2 Sn k
i=1

Dividing through this inequality by
1 ≤ lim sup

³P
´1/2

n
2
hX
,
θi
yields for any unit vector θ,
2L2 n
i
i=1
−1/2

|hSn , θi|
kCn Sn k
≤ 1 a.s.
³P
´1/2 ≤ lim sup √

2L2 n
n
2
2L2 n
hX
,
θi
i
i=1

The first inequality holds by Griffin and Kuelbs, [7], Theorem 1, which is applicable due to the
fact that if X is in the GDOA of the multivariate Gaussian law then, for any θ, hX, θi is in the
DOA of the univariate Gaussian law. The last inequality holds by (12).
REFERENCES
[1] Araujo, and Gine, E. (1980) The Central Limit Theorem for Real and Banach Valued Random
Variables. John Wiley and Sons. New York.
[2] Billingsley, P. (1966) Convergence of types in k-space. Z. Wahrsh. Verw. Gebiete.
5
175-179
[3] Dudley, R.M. (1989) Real Analysis and Probability. Chapman and Hall. New York.
[4] Feller, W.(1968) An Introduction to Probability Theory and its Applications, Volume 1. Third
Edition. John Wiley and Sons. New York.
[5] Feller, W.(1968) An extension of the law of the iterated logarithm to variables without
variance.J. Math. Mechan. 18, 343-355.
[6] Gine, E. and Mason, D.M. (1998) On the LIL for self-normalized sums of iid random variables.
J. Theor. Probab. v. 11 no. 2, 351-370.

76

Electronic Communications in Probability

[7] Griffin, P.S. and Kuelbs, J.D. (1989) Self normalized laws of the iterated logarithm. Ann.
Probab. 17, 1571-1601.
[8] Hahn, M.G. and Klass, M.J. (1980) Matrix normalization of sums of random vectors in the
domain of attraction of the multivariate normal. Ann. Probab. 8, 262-280.
[9] Kuelbs, J. and Ledoux M. (1987) Extreme values and the law of the iterated logarithm. Prob.
Theory and Rel. Fields. 74, 319-340.
[10] Meerschaert, M. (1994) Norming operators for generalized domains of attraction. J. Theoret.
Probab. 7, 793-798.
[11] Meerschaert, M.M. and Scheffler, H. P.(2001) Limit Theorems for Sums of Independent
Random Vectors. Wiley. New York.
[12] Pruitt, W.E. (1981) General one sided laws of the iterated logarithm. Ann. Probab. 9,
1-48.
[13] Sepanski, S. (1999) A compact Law of the Iterated Logarithm for random vectors in the
generalized domain of attraction of the multivariate gaussian law. J. Theoret. Probab. 12,
757-778
[14] Sepanski, S. (2001) Extreme Values and the multivariate compact Law of the Iterated
Logarithm. J. Theoret. Probab. To appear.
[15] Sepanski, S. (2001) A law of the iterated logarithm for multivariate trimmed sums. Preprint.
[16] Sepanski, S. (1994) Asymptotics for multivariate t statistic and Hotelling’s T 2 statistic
under infinite second moments via bootstrapping. J. Multivariate Analysis. v 49 41-54

Dokumen yang terkait

AN ALIS IS YU RID IS PUT USAN BE B AS DAL AM P E RKAR A TIND AK P IDA NA P E NY E RTA AN M E L AK U K A N P R AK T IK K E DO K T E RA N YA NG M E N G A K IB ATK AN M ATINYA P AS IE N ( PUT USA N N O MOR: 9 0/PID.B /2011/ PN.MD O)

0 82 16

ANALISIS FAKTOR YANGMEMPENGARUHI FERTILITAS PASANGAN USIA SUBUR DI DESA SEMBORO KECAMATAN SEMBORO KABUPATEN JEMBER TAHUN 2011

2 53 20

EFEKTIVITAS PENDIDIKAN KESEHATAN TENTANG PERTOLONGAN PERTAMA PADA KECELAKAAN (P3K) TERHADAP SIKAP MASYARAKAT DALAM PENANGANAN KORBAN KECELAKAAN LALU LINTAS (Studi Di Wilayah RT 05 RW 04 Kelurahan Sukun Kota Malang)

45 393 31

FAKTOR – FAKTOR YANG MEMPENGARUHI PENYERAPAN TENAGA KERJA INDUSTRI PENGOLAHAN BESAR DAN MENENGAH PADA TINGKAT KABUPATEN / KOTA DI JAWA TIMUR TAHUN 2006 - 2011

1 35 26

A DISCOURSE ANALYSIS ON “SPA: REGAIN BALANCE OF YOUR INNER AND OUTER BEAUTY” IN THE JAKARTA POST ON 4 MARCH 2011

9 161 13

Pengaruh kualitas aktiva produktif dan non performing financing terhadap return on asset perbankan syariah (Studi Pada 3 Bank Umum Syariah Tahun 2011 – 2014)

6 101 0

Pengaruh pemahaman fiqh muamalat mahasiswa terhadap keputusan membeli produk fashion palsu (study pada mahasiswa angkatan 2011 & 2012 prodi muamalat fakultas syariah dan hukum UIN Syarif Hidayatullah Jakarta)

0 22 0

Pendidikan Agama Islam Untuk Kelas 3 SD Kelas 3 Suyanto Suyoto 2011

4 108 178

ANALISIS NOTA KESEPAHAMAN ANTARA BANK INDONESIA, POLRI, DAN KEJAKSAAN REPUBLIK INDONESIA TAHUN 2011 SEBAGAI MEKANISME PERCEPATAN PENANGANAN TINDAK PIDANA PERBANKAN KHUSUSNYA BANK INDONESIA SEBAGAI PIHAK PELAPOR

1 17 40

KOORDINASI OTORITAS JASA KEUANGAN (OJK) DENGAN LEMBAGA PENJAMIN SIMPANAN (LPS) DAN BANK INDONESIA (BI) DALAM UPAYA PENANGANAN BANK BERMASALAH BERDASARKAN UNDANG-UNDANG RI NOMOR 21 TAHUN 2011 TENTANG OTORITAS JASA KEUANGAN

3 32 52