首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We propose a new Broyden method for solving systems of nonlinear equations, which uses the first derivatives, but is more efficient than the Newton method (measured by the computational time) for larger dense systems. The new method updates QR or LU decompositions of nonsymmetric approximations of the Jacobian matrix, so it requires O(n 2) arithmetic operations per iteration in contrast with the Newton method, which requires O(n 3) operations per iteration. Computational experiments confirm the high efficiency of the new method.  相似文献   

2.
It was proved that the complexity of square root computation in the Galois field GF(3s), s = 2kr, is equal to O(M(2k)M(r)k + M(r) log2r) + 2kkr1+o(1), where M (n) is the complexity of multiplication of polynomials of degree n over fields of characteristics 3. The complexity of multiplication and division in the field GF(3s) is equal to O(M(2k)M(r)) and O(M(2k)M(r)) + r1+o(1), respectively. If the basis in the field GF(3r) is determined by an irreducible binomial over GF(3) or is an optimal normal basis, then the summands 2kkr1+o(1) and r1+o(1) can be omitted. For M(n) one may take n log2nψ(n) where ψ(n) grows slower than any iteration of the logarithm. If k grow and r is fixed, than all the estimates presented here have the form Or (M (s) log 2s) = s (log 2s)2ψ(s).  相似文献   

3.
The functional equation f(x,ε) = 0 containing a small parameter ε and admitting regular and singular degeneracy as ε → 0 is considered. By the methods of small parameter, a function x n 0(ε) satisfying this equation within a residual error of O(ε n+1) is found. A modified Newton’s sequence starting from the element x n 0(ε) is constructed. The existence of the limit of Newton’s sequence is based on the NK theorem proven in this work (a new variant of the proof of the Kantorovich theorem substantiating the convergence of Newton’s iterative sequence). The deviation of the limit of Newton’s sequence from the initial approximation x n 0(ε) has the order of O(ε n+1), which proves the asymptotic character of the approximation x n 0(ε). The method proposed is implemented in constructing an asymptotic approximation of a system of ordinary differential equations on a finite or infinite time interval with a small parameter multiplying the derivatives, but it can be applied to a wider class of functional equations with a small parameters.  相似文献   

4.
The problem of solving a linear system with a Hankel or block-Hankel matrix, as well as Rissanen’s algorithm and its generalization to the block case, are considered. Modifications of these algorithms that use less memory (O(n) against O(n2)).  相似文献   

5.
We consider the m-Cycle Cover Problem of covering a complete undirected graph by m vertex-nonadjacent cycles of extremal total edge weight. The so-called TSP approach to the construction of an approximation algorithm for this problem with the use of a solution of the traveling salesman problem (TSP) is presented. Modifications of the algorithm for the Euclidean Max m-Cycle Cover Problem with deterministic instances (edge weights) in a multidimensional Euclidean space and the Random Min m-Cycle Cover Problem with random instances UNI(0,1) are analyzed. It is shown that both algorithms have time complexity O(n 3) and are asymptotically optimal for the number of covering cycles m = o(n) and \(m \leqslant \frac{{n^{1/3} }}{{\ln n}}\), respectively.  相似文献   

6.
We consider the following Turán-type problem: given a fixed tournament H, what is the least integer t = t(n,H) so that adding t edges to any n-vertex tournament, results in a digraph containing a copy of H. Similarly, what is the least integer t = t(T n ,H) so that adding t edges to the n-vertex transitive tournament, results in a digraph containing a copy of H. Besides proving several results on these problems, our main contributions are the following:
  • Pach and Tardos conjectured that if M is an acyclic 0/1 matrix, then any n × n matrix with n(log n) O(1) entries equal to 1 contains the pattern M. We show that this conjecture is equivalent to the assertion that t(T n ,H) = n(log n) O(1) if and only if H belongs to a certain (natural) family of tournaments.
  • We propose an approach for determining if t(n,H) = n(log n) O(1). This approach combines expansion in sparse graphs, together with certain structural characterizations of H-free tournaments. Our result opens the door for using structural graph theoretic tools in order to settle the Pach–Tardos conjecture.
  相似文献   

7.
We consider the solution of large-scale Lyapunov and Stein equations. For Stein equations, the well-known Smith method will be adapted, with $A_k = A^{2^k}$ not explicitly computed but in the recursive form $A_k = A_{k-1}^{2}$ , and the fast growing but diminishing components in the approximate solutions truncated. Lyapunov equations will be first treated with the Cayley transform before the Smith method is applied. For algebraic equations with numerically low-ranked solutions of dimension n, the resulting algorithms are of an efficient O(n) computational complexity and memory requirement per iteration and converge essentially quadratically. An application in the estimation of a lower bound of the condition number for continuous-time algebraic Riccati equations is presented, as well as some numerical results.  相似文献   

8.
The cable equation is one of the most fundamental equations for modeling neuronal dynamics. These equations can be derived from the Nernst-Planck equation for electro-diffusion in smooth homogeneous cylinders. Fractional cable equations are introduced to model electrotonic properties of spiny neuronal dendrites. In this paper, a Galerkin finite element method(GFEM) is presented for the numerical simulation of the fractional cable equation(FCE) involving two integro-differential operators. The proposed method is based on a semi-discrete finite difference approximation in time and Galerkin finite element method in space. We prove that the numerical solution converges to the exact solution with order O(τ+hl+1) for the lth-order finite element method. Further, a novel Galerkin finite element approximation for improving the order of convergence is also proposed. Finally, some numerical results are given to demonstrate the theoretical analysis. The results show that the numerical solution obtained by the improved Galerkin finite element approximation converges to the exact solution with order O(τ2+hl+1).  相似文献   

9.
The problem considered here can be viewed as the analogue in higher dimensions of the one variable polynomial interpolation of Lagrange and Newton. Let x1,...,xr be closed points in general position in projective spacePn, then the linear subspaceV ofH0 (?n,O(d)) (the space of homogeneous polynomials of degreed on ?n) formed by those polynomials which are singular at eachxi, is given by r(n + 1) linear equations in the coefficients, expressing the fact that the polynomial vanishes with its first derivatives at x1,...,xr. As such, the “expected” value for the dimension ofV is max(0,h0(O(d))?r(n+1)). We prove thatV has the “expected” dimension for d≥5 (theorem A). This theorem was first proven in [A] using a very complicated induction with many initial cases. Here we give a greatly simplified proof using techniques developed by the authors while treating the corresponding problem in lower degrees.  相似文献   

10.
We consider the problem of scheduling n jobs on m parallel machines with inclusive processing set restrictions. Each job has a given release date, and all jobs have equal processing times. The objective is to minimize the makespan of the schedule. Li and Li (2015) have developed an O(n2+mn log?n) time algorithm for this problem. In this note, we present a modified algorithm with an improved time complexity of O(min{m, log?n} ? n log?n).  相似文献   

11.
A fast algorithm is proposed for solving symmetric Toeplitz systems. This algorithm continuously transforms the identity matrix into the inverse of a given Toeplitz matrix T. The memory requirements for the algorithm are O(n), and its complexity is O(log κ(T)nlogn), where (T) is the condition number of T. Numerical results are presented that confirm the efficiency of the proposed algorithm.  相似文献   

12.
Let O ? R d be a bounded domain of class C 1,1. Let 0 < ε - 1. In L 2(O;C n ) we consider a positive definite strongly elliptic second-order operator B D,ε with Dirichlet boundary condition. Its coefficients are periodic and depend on x/ε. The principal part of the operator is given in factorized form, and the operator has lower order terms. We study the behavior of the generalized resolvent (B D,ε ? ζQ 0(·/ε))?1 as ε → 0. Here the matrix-valued function Q 0 is periodic, bounded, and positive definite; ζ is a complex-valued parameter. We find approximations of the generalized resolvent in the L 2(O;C n )-operator norm and in the norm of operators acting from L 2(O;C n ) to the Sobolev space H 1(O;C n ) with two-parameter error estimates (depending on ε and ζ). Approximations of the generalized resolvent are applied to the homogenization of the solution of the first initial-boundary value problem for the parabolic equation Q 0(x/ε)? t v ε (x, t) = ?(B D,ε v ε )(x, t).  相似文献   

13.
Let f(n) be the largest integer such that every poset on n elements has a 2-dimensional subposet on f(n) elements. What is the asymptotics of f(n)? It is easy to see that f(n) = n 1/2. We improve the best known upper bound and show f(n) = O (n 2/3). For higher dimensions, we show \(f_{d}(n)=\O \left (n^{\frac {d}{d + 1}}\right )\), where f d (n) is the largest integer such that every poset on n elements has a d-dimensional subposet on f d (n) elements.  相似文献   

14.
An approximation algorithm is suggested for the problem of finding a d-regular spanning connected subgraph of maximum weight in a complete undirected weighted n-vertex graph. Probabilistic analysis of the algorithm is carried out for the problem with random input data (some weights of edges) in the case of a uniform distribution of the weights of edges and in the case of a minorized type distribution. It is shown that the algorithm finds an asymptotically optimal solution with time complexity O(n 2) when d = o(n). For the minimization version of the problem, an additional restriction on the dispersion of weights of the graph edges is added to the condition of the asymptotical optimality of the modified algorithm.  相似文献   

15.
In this paper we present an infeasible-interior-point algorithm, based on a new wide neighbourhood N(τ1, τ2, η), for linear programming over symmetric cones. We treat the classical Newton direction as the sum of two other directions. We prove that if these two directions are equipped with different and appropriate step sizes, then the new algorithm has a polynomial convergence for the commutative class of search directions. In particular, the complexity bound is O(r1.5logε?1) for the Nesterov-Todd (NT) direction, and O(r2logε?1) for the xs and sx directions, where r is the rank of the associated Euclidean Jordan algebra and ε > 0 is the required precision. If starting with a feasible point (x0, y0, s0) in N(τ1, τ2, η), the complexity bound is \(O\left( {\sqrt r \log {\varepsilon ^{ - 1}}} \right)\) for the NT direction, and O(rlogε?1) for the xs and sx directions. When the NT search direction is used, we get the best complexity bound of wide neighborhood interior-point algorithm for linear programming over symmetric cones.  相似文献   

16.
In the paper, the additive complexity of matrices formed by positive integer powers of greatest common divisors and least common multiples of the indices of the rows and columns is considered. It is proved that the complexity of the n × n matrix formed by the numbers GCDr(i, k) over the basis {x + y} is asymptotically equal to rn log2n as n→∞, and the complexity of the n × n matrix formed by the numbers LCMr(i, k) over the basis {x + y,?x} is asymptotically equal to 2rn log2n as n→∞.  相似文献   

17.
Traffic volatility and network reliability are important issues in the provision of high speed network services. We consider the construction of a second network, the protection network which can carry overload traffic due to the failure or congestion of any two links in the original network. The level of protection against such contingencies can be specified by a traffic requirement matrix. We construct a fully connected protection network, for an n node network, using an O(n2) heuristic based on the largest two traffic requirements for each node. This procedure is then modified to generate a more effective O(n4) heuristic, both methods facilitate fast processing for two-hop dynamic routing. We compare the performance of the heuristics with the O(n15) optimal solution.  相似文献   

18.
We consider abstract non-negative self-adjoint operators on L2(X) which satisfy the finite-speed propagation property for the corresponding wave equation. For such operators, we introduce a restriction type condition, which in the case of the standard Laplace operator is equivalent to (p, 2) restriction estimate of Stein and Tomas. Next, we show that in the considered abstract setting, our restriction type condition implies sharp spectral multipliers and endpoint estimates for the Bochner-Riesz summability. We also observe that this restriction estimate holds for operators satisfying dispersive or Strichartz estimates. We obtain new spectral multiplier results for several second order differential operators and recover some known results. Our examples include Schrödinger operators with inverse square potentials on Rn, the harmonic oscillator, elliptic operators on compact manifolds, and Schr¨odinger operators on asymptotically conic manifolds.  相似文献   

19.
In this paper, we improve existing results in the field of compressed sensing and matrix completion when sampled data may be grossly corrupted. We introduce three new theorems. (1) In compressed sensing, we show that if the m×n sensing matrix has independent Gaussian entries, then one can recover a sparse signal x exactly by tractable ? 1 minimization even if a positive fraction of the measurements are arbitrarily corrupted, provided the number of nonzero entries in x is O(m/(log(n/m)+1)). (2) In the very general sensing model introduced in Candès and Plan (IEEE Trans. Inf. Theory 57(11):7235–7254, 2011) and assuming a positive fraction of corrupted measurements, exact recovery still holds if the signal now has O(m/(log2 n)) nonzero entries. (3) Finally, we prove that one can recover an n×n low-rank matrix from m corrupted sampled entries by tractable optimization provided the rank is on the order of O(m/(nlog2 n)); again, this holds when there is a positive fraction of corrupted samples.  相似文献   

20.
A critical step in a cutting plane algorithm is separation, i.e., establishing whether a given vector x violates an inequality belonging to a specific class. It is customary to express the time complexity of a separation algorithm in the number of variables n. Here, we argue that a separation algorithm may instead process the vector containing the positive components of x,  denoted as supp(x),  which offers a more compact representation, especially if x is sparse; we also propose to express the time complexity in terms of |supp(x)|. Although several well-known separation algorithms exploit the sparsity of x,  we revisit this idea in order to take sparsity explicitly into account in the time-complexity of separation and also design faster algorithms. We apply this approach to two classes of facet-defining inequalities for the three-index assignment problem, and obtain separation algorithms whose time complexity is linear in |supp(x)| instead of n. We indicate that this can be generalized to the axial k-index assignment problem and we show empirically how the separation algorithms exploiting sparsity improve on existing ones by running them on the largest instances reported in the literature.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号