Academia.eduAcademia.edu

QR Factorization

description587 papers
group17 followers
lightbulbAbout this topic
QR Factorization is a mathematical technique in linear algebra that decomposes a matrix into a product of an orthogonal matrix Q and an upper triangular matrix R. This factorization is used to solve linear systems, perform least squares fitting, and compute eigenvalues.
lightbulbAbout this topic
QR Factorization is a mathematical technique in linear algebra that decomposes a matrix into a product of an orthogonal matrix Q and an upper triangular matrix R. This factorization is used to solve linear systems, perform least squares fitting, and compute eigenvalues.
For the investigation of extrinsic pro-apoptotic signaling pathways, systems of stochastic differential equations are solved by Euler-Maruyama approximation. Forces and moments between particles are computed in parallel on GPGPU Density... more
For the investigation of extrinsic pro-apoptotic signaling pathways, systems of stochastic differential equations are solved by Euler-Maruyama approximation. Forces and moments between particles are computed in parallel on GPGPU Density... more
The sparse matrix-vector multiplication (SpMxV) is a kernel operation widely used in iterative linear solvers. The same sparse matrix is multiplied by a dense vector repeatedly in these solvers. Matrices with irregular sparsity patterns... more
LU decomposition is a fundamental in linear algebra. Numerous tools exists that provide this important factorization. The authors present the conditions for a matrix to have none, one, or infinitely many LU factorizations. In the case... more
LU decomposition is a fundamental in linear algebra. Numerous tools exists that provide this important factorization. The authors present the conditions for a matrix to have none, one, or infinitely many LU factorizations. In the case... more
Discrete inverse problems correspond to solving a system of equations in a stable way with respect to noise in the data. A typical approach to enforce uniqueness and select a meaningful solution is to introduce a regularizer. While for... more
International audienceGiven a full column rank matrix A ∈ R m×n (m ≥ n), we consider a special class of linear systems of the form A ⊤ Ax = A ⊤ b + c with x, c ∈ R n and b ∈ R m. The occurrence of c in the right-hand side of the equation... more
Abstract. Given a full column rank matrix A ∈ R (m ≥ n), we consider a special class of linear systems of the form AAx = Ab+ c with x, c ∈ R and b ∈ R. The occurrence of c in the right-hand side of the equation prevents the direct... more
Many problems of industrial and scientific interest require the solving of tridiagonal linear systems. This paper presents several implementations for the parallel solving of large tridiagonal systems on multi-core architectures, using... more
The Partitioned Global Address Space (PGAS) programming model is one of the most relevant proposals to improve the ability of developers to exploit distributed memory systems. However, despite its important advantages with respect to the... more
We present theory and algorithms for the equality constrained indefinite least squares problem, which requires minimization of an indefinite quadratic form subject to a linear equality constraint. A generalized hyperbolic QR factorization... more
We show that a fast algorithm for the QR factorization of a Toeplitz or Hankel matrix A is weakly stable in the sense that R T R is close to A T A. Thus, when the algorithm is used to solve the semi-normal equations R T Rx = A T b, we... more
Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is... more
Internet simplified digital data transferring. This data needs to be secured; so securing digital data becomes an important concern. Steganography provides security for data by inserting it into a cover and concealing it. In this paper, a... more
This note reports an unexpected and rather erratic behavior of the LAPACK software implementation of the QR factorization with Businger-Golub column pivoting. It is shown that, due to finite precision arithmetic, software implementation... more
Simultaneous iteration methods are extensions of the power method that were devised for approximating several dominant eigenvalues of a matrix and the corresponding eigenvectors. The convergence analysis of these methods has been given... more
The m-th root of the diagonal of the upper triangular matrix R m in the QR decomposition of AX m B = Q m R m converges and the limit is given by the moduli of the eigenvalues of X with some ordering, where A, B, X ∈ C n×n are nonsingular.... more
CG, SYMMLQ, and MINRES are Krylov subspace methods for solving symmetric systems of linear equations. When these methods are applied to an incompatible system (that is, a singular symmetric least-squares problem), CG could break down and... more
In this paper, we derive the general expression of the r th power (r ∈ N) for one type of tridiagonal matrix.
In this paper, an iterative method is proposed for solving matrix equation s j=1 A j X j B j = E. This method is based on the global least squares (GL-LSQR) method for solving the linear system of equations with the multiple right hand... more
A quantum logic gate of particular interest to both electrical engineers and game theorists is the quantum multiplexer. This shared interest is due to the facts that an arbitrary quantum logic gate may be expressed, up to arbitrary... more
We give an explicit formula for the solution to the initial value problem of the full symmetric Toda hierarchy. The formula is obtained by the orthogonalization procedure of Szegö, and is also interpreted as a consequence of the QR... more
We give an explicit formula for the solution to the initial value problem of the full symmetric Toda hierarchy. The formula is obtained by the orthogonalization procedure of Szegö, and is also interpreted as a consequence of the QR... more
In this paper, we compare with the inverse iteration algorithms on PowerXCell T M 8i processor, which has been known as a heterogeneous environment. When some of all the eigenvalues are close together or there are clusters of eigenvalues,... more
Example with a memory of size 2 data. The graph of input data dependencies is shown on the left. The figure on the right corresponds to the partition and schedule produced by the scheduler ▸ Deque Model Data Aware Ready (DMDAR): Deque... more
Recently neural style transfer (NST) has drawn a lot of interest of researchers, with notable advancements in color representation, texture, speed, and image quality. While previous studies focused on transferring artistic style across... more
The computational complexity of the Maximum Likelihood decoding algorithm in [1], [2] for orthogonal space-time block codes is smaller than specified.
Recently, assuming ideal brick-wall transmit filtering, we proposed a frequency-domain block signal detection (FDBD) with maximum likelihood detection employing QR decomposition and M-algorithm (called QRM-MLD) for the reception of... more
The needs for predictive simulation of electronic structure in chemistry and materials science calls for fast/reduced-scaling formulations of quantum n-body methods that replace the traditional dense tensors with element-, block-, rank-,... more
As the general purpose graphics processing units (GPGPU) are increasingly deployed for scientific computing for its raw performance advantages compared to CPUs, the fault tolerance issue has started to become more of a concern than before... more
Kepler is the newest GPU architecture from NVIDIA, and the GTX 680 is the first commercially available graphics card based on that architecture. Matrix multiplication is a canonical computational kernel, and often the main target of... more
We consider Givens QR factorization of banded Hessenberg–Toeplitz matrices of large order and relatively small bandwidth. We investigate the asymptotic behaviour of the R factor and Givens rotation when the order of the matrix goes to... more
In this modern era, it has become much simpler to replicate, sell, and copy the copyright owners' works without their permission as a result of the expansion of digitalization, and it is difficult to identify such violations, posing a... more
by beei iaes and 
1 more
Patients' information and images transfer among medical institutes represent a major tool for delivering better healthcare services. However, privacy and security for healthcare information are big challenges in telemedicine. Evidently,... more
Sn, k _. Z'_jXn+j , j=o where the yj are determined as follows: (i) (ii) (2.1) (2.2) (2.3) (2.4) Use the least squares method to solve the overdetermined and, in general, inconsistent linear system where c = (Co,C t ..... ck-I)1". Set ck... more
Functional iterations such as Newton's are a popular tool for polynomial root-finding. We consider a realistic situation where some roots have already been approximated (we say tamed), and one would like to restrict further root-finding... more
Most recent HPC platforms have heterogeneous nodes composed of a combination of multi-core CPUs and accelerators, like GPUs. Scheduling on such architectures relies on a static partitioning and cost model. In this paper, we present a... more
In this paper, we present a comparison of scheduling strategies for heterogeneous multi-CPU and multi-GPU architectures. We designed and evaluated four scheduling strategies on top of XKaapi runtime: work stealing, data-aware work... more
The preservation of symplectic Gram Schmidt Jorthogonality is crucial for structure preserving methods for the eigenvalue problem. In this paper, we present the symplectic Gram-Schmidt algorithm with re-orthogonalization and we study the... more
In this paper, we investigate some properties of eigenvalues and eigenvectors of Jacobi matrices. We propose a new algorithm for reconstructing a 2n-th order Jacobi matrix J 2n with a given n-th order leading principal submatrix J n and... more
Methods are given for computing the LDV factorization of a matrix B and
We present a probabilistic framework for overlapping community discovery and link prediction for relational data, given as a graph. The proposed framework has: (1) a deep architecture which enables us to infer multiple layers of latent... more
This article introduces new low cost algorithms for the adaptive estimation and tracking of principal and minor components. The proposed algorithms are based on the well-known OPAST method which is adapted and extended in order to achieve... more
Internet simplified digital data transferring. This data needs to be secured; so securing digital data becomes an important concern. Steganography provides security for data by inserting it into a cover and concealing it. In this paper, a... more
Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly... more
Download research papers for free!