首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In the present paper we present the tensor-product approximation of a multidimensional convolution transform discretized via a collocation-projection scheme on uniform or composite refined grids. Examples of convolving kernels are provided by the classical Newton, Slater (exponential) and Yukawa potentials, 1/‖x‖, and with xRd. For piecewise constant elements on the uniform grid of size nd, we prove quadratic convergence O(h2) in the mesh parameter h=1/n, and then justify the Richardson extrapolation method on a sequence of grids that improves the order of approximation up to O(h3). A fast algorithm of complexity O(dR1R2nlogn) is described for tensor-product convolution on uniform/composite grids of size nd, where R1,R2 are tensor ranks of convolving functions. We also present the tensor-product convolution scheme in the two-level Tucker canonical format and discuss the consequent rank reduction strategy. Finally, we give numerical illustrations confirming: (a) the approximation theory for convolution schemes of order O(h2) and O(h3); (b) linear-logarithmic scaling of 1D discrete convolution on composite grids; (c) linear-logarithmic scaling in n of our tensor-product convolution method on an n×n×n grid in the range n≤16384.  相似文献   

2.
A pivoting strategy of O(n) operations for the Neville elimination of n × n nonsingular sign regular matrices is introduced. Among other nice properties, it is proved that it preserves sign regularity. It is also shown its relationship with scaled partial pivoting strategies for Neville elimination.  相似文献   

3.
We describe how to maintain the triangular factor of a sparse QR factorization when columns are added and deleted and Q cannot be stored for sparsity reasons. The updating procedures could be thought of as a sparse counterpart of Reichel and Gragg’s package QRUP. They allow us to solve a sequence of sparse linear least squares subproblems in which each matrix Bk is an independent subset of the columns of a fixed matrix A, and Bk+1 is obtained by adding or deleting one column. Like Coleman and Hulbert [T. Coleman, L. Hulbert, A direct active set algorithm for large sparse quadratic programs with simple bounds, Math. Program. 45 (1989) 373-406], we adapt the sparse direct methodology of Björck and Oreborn of the late 1980s, but without forming ATA, which may be only positive semidefinite. Our Matlab 5 implementation works with a suitable row and column numbering within a static triangular sparsity pattern that is computed in advance by symbolic factorization of ATA and preserved with placeholders.  相似文献   

4.
The motivating problem for this paper is to find the expected covering time of a random walk on a balanced binary tree withn vertices. Previous upper bounds for general graphs ofO(|V| |E|)(1) andO(|V| |E|/d min)(2) imply an upper bound ofO(n 2). We show an upper bound on general graphs ofO( |E| log |V|), which implies an upper bound ofO(n log2 n). The previous lower bound was (|V| log |V|) for trees.(2) In our main result, we show a lower bound of (|V| (log d max |V|)2) for trees, which yields a lower bound of (n log2 n). We also extend our techniques to show an upper bound for general graphs ofO(max{E Ti} log |V|).  相似文献   

5.
设d是一个正整数, N d是d -维正整数格点.设{Xn , n∈N d} 是一同分布的负相伴随机场, 记Sn =∑k≤ n Xk, Sn(k)=Sn-Xk, 如果r >2, EX1 = 0 和σ2= Var(X1}, 则存在一个正数M:=100√(r-2)(1+σ2)使得下列条件等价 (I)E |X1|r (log|X1|)d-1-r/2 <∞; (II)∑n∈ Nd |n|r/2-2P(max1≤ k≤ n |Sn(k)|≥ (2d+1 )ε√|n| log |n |) <∞,∨ε > M; (III)∑n∈N d |n|r/2-2P(max1≤ k≤n |Sk |≥ε√| n} log| n |) <∞,∨ε > M. (III)\ \ $\sum\limits_{{{\bf n}}\in {{\cal N}}^{d}} |n|^{r/2-2} P(\max\limits_{{\bf 1}\leq{\bf k}\leq{\bf n}}|S_{{\bf k}}|\geq \varepsilon \sqrt{|{\bf n}|\log |{\bf n}|})<\infty$, $\forall\varepsilon>M$.  相似文献   

6.
A simple parallel randomized algorithm to find a maximal independent set in a graph G = (V, E) on n vertices is presented. Its expected running time on a concurrent-read concurrent-write PRAM with O(|E|dmax) processors is O(log n), where dmax denotes the maximum degree. On an exclusive-read exclusive-write PRAM with O(|E|) processors the algorithm runs in O(log2n). Previously, an O(log4n) deterministic algorithm was given by Karp and Wigderson for the EREW-PRAM model. This was recently (independently of our work) improved to O(log2n) by M. Luby. In both cases randomized algorithms depending on pairwise independent choices were turned into deterministic algorithms. We comment on how randomized combinatorial algorithms whose analysis only depends on d-wise rather than fully independent random choices (for some constant d) can be converted into deterministic algorithms. We apply a technique due to A. Joffe (1974) and obtain deterministic construction in fast parallel time of various combinatorial objects whose existence follows from probabilistic arguments.  相似文献   

7.
Summary Nested dissection is an algorithm invented by Alan George for preserving sparsity in Gaussian elimination on symmetric positive definite matrices. Nested dissection can be viewed as a recursive divide-and-conquer algorithm on an undirected graph; it usesseparators in the graph, which are small sets of vertices whose removal divides the graph approximately in half. George and Liu gave an implementation of nested dissection that used a heuristic to find separators. Lipton and Tarjan gave an algorithm to findn 1/2-separators in planar graphs and two-dimensional finite element graphs, and Lipton, Rose, and Tarjan used these separators in a modified version of nested dissection, guaranteeing bounds ofO (n logn) on fill andO(n 3/2) on operation count. We analyze the combination of the original George-Liu nested dissection algorithm and the Lipton-Tarjan planar separator algorithm. This combination is interesting because it is easier to implement than the Lipton-Rose-Tarjan version, especially in the framework of existïng sparse matrix software. Using some topological graph theory, we proveO(n logn) fill andO(n 3/2) operation count bounds for planar graphs, twodimensional finite element graphs, graphs of bounded genus, and graphs of bounded degree withn 1/2-separators. For planar and finite element graphs, the leading constant factor is smaller than that in the Lipton-Rose-Tarjan analysis. We also construct a class of graphs withn 1/2-separators for which our algorithm does not achieve anO(n logn) bound on fill.The work of this author was supported in part by the Hertz Foundation under a graduate fellowship and by the National Science Foundation under Grant MCS 82-02948The work of this author was supported in part by the National Science Foundation under Grant MCS 78-26858 and by the Office of Naval Research under Contract N00014-76-C-0688  相似文献   

8.
Let {q} j =0n–1 be a family of polynomials that satisfy a three-term recurrence relation and let {t k } k =1n be a set of distinct nodes. Define the Vandermonde-like matrixW n =[w jk ] k,j =1n ,w jk =q j–1(t k ). We describe a fast algorithm for computing the elements of the inverse ofW n inO(n 2) arithmetic operations. Our algorithm generalizes a scheme presented by Traub [22] for fast inversion of Vandermonde matrices. Numerical examples show that our scheme often yields higher accuracy than the LINPACK subroutine SGEDI for inverting a general matrix. SGEDI uses Gaussian elimination with partial pivoting and requiresO(n 3) arithmetic operations.Dedicated to Gene H. Golub on his 60th birthdayResearch supported by NSF grant DMS-9002884.  相似文献   

9.
The LDLT factorization of a symmetric indefinite matrix, although efficient computationally, may not exist and can be unstable in the presence of round off error. The use of block diagonal 2×2 pivots is attractive, but there are some difficulties in determining an efficient and stable pivot strategy. Previous suggestions have required O(n>3) operations (either multiplications or comparisons) just to implement the pivot strategy. A new strategy is described which in practice only requires O(n2) operations. Indeed, the effort required by this pivot strategy is less than that required when using partial pivoting with an unsymmetric LU factorization, which is the usual way of factorizing indefinite matrices.  相似文献   

10.
A Hilbert space operator AB(H) is p-hyponormal, A∈(p-H), if |A|2p?|A|2p; an invertible operator AB(H) is log-hyponormal, A∈(?-H), if log(TT)?log(TT). Let dAB=δAB or ?AB, where δABB(B(H)) is the generalised derivation δAB(X)=AX-XB and ?ABB(B(H)) is the elementary operator ?AB(X)=AXB-X. It is proved that if A,B∈(?-H)∪(p-H), then, for all complex λ, , the ascent of (dAB-λ)?1, and dAB satisfies the range-kernel orthogonality inequality ‖X‖?‖X-(dAB-λ)Y‖ for all X∈(dAB-λ)-1(0) and YB(H). Furthermore, isolated points of σ(dAB) are simple poles of the resolvent of dAB. A version of the elementary operator E(X)=A1XA2-B1XB2 and perturbations of dAB by quasi-nilpotent operators are considered, and Weyl’s theorem is proved for dAB.  相似文献   

11.
Denote by C A the set of functions that are analytic in the disk |z| < 1 and continuous on its closure |z| ≤ 1; let ? n , n = 0, 1, 2, ..., be the set of rational functions of degree at most n. Denote by R n (f) (R n (f) A ) the best uniform approximation of a function fC A on the circle |z| = 1 (in the disk |z| ≤ 1) by the set ? n . The following equality is proved for any n ≥ 1: sup{R n (f) A /R n (f): fC A ? ? n } = 2. We also consider a similar problem of comparing the best approximations of functions in C A by polynomials and trigonometric polynomials.  相似文献   

12.
LetA, A+E be Hermitian positive definite matrices. Suppose thatA=LL H andA+E=(L+G)(L+G)H are the Cholesky factorizations ofA andA+E, respectively. In this paper lower bounds and upper bounds on |G|/|L| in terms of |E|/|A| are given. Moreover, perturbation bounds are given for the QR factorization of a complexm ×n matrixA of rankn.This research was supported by the National Science Foundation of China and the Department of Mathematics of Linköping University in Sweden.  相似文献   

13.
An implicit version of the shifted QR eigenvalue algorithm given in Bini et al. [D.A. Bini, Y. Eidelman, I. Gohberg, L. Gemignani, SIAM J. Matrix Anal. Appl. 29(2) (2007) 566-585] is presented for computing the eigenvalues of an n×n companion matrix using O(n2) flops and O(n) memory storage. Numerical experiments and comparisons confirm the effectiveness and the stability of the proposed method.  相似文献   

14.
Both of the following conditions are equivalent to the absoluteness of a norm ν in Cn: (1) for all n×n diagonal matrices D=(dk), the subordinate operator norm Nν(D)=maxk|dk|; (2) for all n×n matrices A, Nν(A) ?Nν(|A|). These conditions are modified for partitioned matrices by replacing absolute values with norms of blocks. A generalization of absoluteness is thus obtained.  相似文献   

15.
Let A be an n×n matrix with eigenvalues λ1,λ2,…,λn, and let m be an integer satisfying rank(A)?m?n. If A is real, the best possible lower bound for its spectral radius in terms of m, trA and trA2 is obtained. If A is any complex matrix, two lower bounds for are compared, and furthermore a new lower bound for the spectral radius is given only in terms of trA,trA2,‖A‖,‖AA-AA‖,n and m.  相似文献   

16.
Let A be a contraction on a Hilbert space H. The defect index dA of A is, by definition, the dimension of the closure of the range of I-AA. We prove that (1) dAn?ndA for all n?0, (2) if, in addition, An converges to 0 in the strong operator topology and dA=1, then dAn=n for all finite n,0?n?dimH, and (3) dA=dA implies dAn=dAn for all n?0. The norm-one index kA of A is defined as sup{n?0:‖An‖=1}. When dimH=m<, a lower bound for kA was obtained before: kA?(m/dA)-1. We show that the equality holds if and only if either A is unitary or the eigenvalues of A are all in the open unit disc, dA divides m and dAn=ndA for all n, 1?n?m/dA. We also consider the defect index of f(A) for a finite Blaschke product f and show that df(A)=dAn, where n is the number of zeros of f.  相似文献   

17.
Computing a function f(A) of an n-by-n matrix A is a frequently occurring problem in control theory and other applications. In this paper we introduce an effective approach for the determination of matrix function f(A). We propose a new technique which is based on the extension of Newton divided difference and the interpolation technique of Hermite and using the eigenvalues of the given matrix A. The new algorithm is tested on several problems to show the efficiency of the presented method. Finally, the application of this method in control theory is highlighted.  相似文献   

18.
The spectral and Jordan structures of the Web hyperlink matrix G(c)=cG+(1−c)evT have been analyzed when G is the basic (stochastic) Google matrix, c is a real parameter such that 0<c<1, v is a nonnegative probability vector, and e is the all-ones vector. Typical studies have relied heavily on special properties of nonnegative, positive, and stochastic matrices. There is a unique nonnegative vector y(c) such that y(c)TG(c)=y(c)T and y(c)Te=1. This PageRank vector y(c) can be computed effectively by the power method.We consider a square complex matrix A and nonzero complex vectors x and v such that Ax=λx and vx=1. We use standard matrix analytic tools to determine the eigenvalues, the Jordan blocks, and a distinguished left λ-eigenvector of A(c)=cA+(1−c)λxv as a function of a complex variable c. If λ is a semisimple eigenvalue of A, there is a uniquely determined projection N such that limc→1y(c)=Nv for all v; this limit may fail to exist for some v if λ is not semisimple. As a special case of our results, we obtain a complex analog of PageRank for the Web hyperlink matrix G(c) with a complex parameter c. We study regularity, limits, expansions, and conditioning of y(c) and we propose algorithms (e.g., complex extrapolation, power method on a modified matrix etc.) that may provide an efficient way to compute PageRank also with c close or equal to 1. An interpretation of the limit vector Nv and a related critical discussion on the model, on its adherence to reality, and possible ways for its improvement, represent the contribution of the paper on modeling issues.  相似文献   

19.
20.
To a given immersion ${i:M^n\to \mathbb S^{n+1}}$ with constant scalar curvature R, we associate the supremum of the squared norm of the second fundamental form sup |A|2. We prove the existence of a constant C n (R) depending on R and n so that R ≥ 1 and sup |A|2 = C n (R) imply that the hypersurface is a H(r)-torus ${\mathbb S^1(\sqrt{1-r^2})\times\mathbb S^{n-1} (r)}$ . For R > (n ? 2)/n we use rotation hypersurfaces to show that for each value C > C n (R) there is a complete hypersurface in ${\mathbb S^{n+1}}$ with constant scalar curvature R and sup |A|2 = C, answering questions raised by Q. M. Cheng.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号