Ifeast

نویسندگان

  • Brendan Gavin
  • Eric Polizzi
چکیده

The FEAST eigenvalue algorithm is a subspace iteration algorithm that uses contour integration in the complex plane to obtain the eigenvectors of a matrix for the eigenvalues that are located in any user-defined search interval. By computing small numbers of eigenvalues in specific regions of the complex plane, FEAST is able to naturally parallelize the solution of eigenvalue problems by solving for multiple eigenpairs simultaneously. The traditional FEAST algorithm is implemented by directly solving collections of shifted linear systems of equations; in this paper, we describe a variation of the FEAST algorithm that uses iterative Krylov subspace algorithms for solving the shifted linear systems inexactly. We show that this iterative FEAST algorithm (which we call IFEAST) is mathematically equivalent to a block Krylov subspace method for solving eigenvalue problems. By using Krylov subspaces indirectly through solving shifted linear systems, rather than directly for projecting the eigenvalue problem, IFEAST is able to solve eigenvalue problems using very large dimension Krylov subspaces, without ever having to store a basis for those subspaces. IFEAST thus combines the flexibility and power of Krylov methods, requiring only matrix-vector multiplication for solving eigenvalue problems, with the natural parallelism of the traditional FEAST algorithm. We discuss the relationship between IFEAST and more traditional Krylov methods, and provide numerical examples illustrating its behavior.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gains from diversification on convex combinations: A majorization and stochastic dominance approach

By incorporating both majorization theory and stochastic dominance theory, this paper presents a general theory and a unifying framework for determining the diversification preferences of risk-averse investors and conditions under which they would unanimously judge a particular asset to be superior. In particular, we develop a theory for comparing the preferences of different convex combination...

متن کامل

Improved immunogenicity of tetanus toxoid by Brucella abortus S19 LPS adjuvant.

BACKGROUND Adjuvants are used to increase the immunogenicity of new generation vaccines, especially those based on recombinant proteins. Despite immunostimulatory properties, the use of bacterial lipopolysaccharide (LPS) as an adjuvant has been hampered due to its toxicity and pyrogenicity. Brucella abortus LPS is less toxic and has no pyrogenic properties compared to LPS from other gram negati...

متن کامل

Steady electrodiffusion in hydrogel-colloid composites: macroscale properties from microscale electrokinetics.

A rigorous microscale electrokinetic model for hydrogel-colloid composites is adopted to compute macroscale profiles of electrolyte concentration, electrostatic potential, and hydrostatic pressure across membranes that separate electrolytes with different concentrations. The membranes are uncharged polymeric hydrogels in which charged spherical colloidal particles are immobilized and randomly d...

متن کامل

Perturbative Analysis of Dynamical Localisation

In this paper we extend previous results on convergent perturbative solutions of the Schrödinger equation of a class of periodically timedependent two-level systems. The situation treated here is particularly suited for the investigation of two-level systems exhibiting the phenomenon of (approximate) dynamical localisation. We also present a convergent perturbative expansion for the secular fre...

متن کامل

Collinear contextual suppression

The context of a target can modulate behavioral as well as neural responses to that target. For example, target processing can be suppressed by iso-oriented surrounds whereas it can be facilitated by collinear contextual elements. Here, we present experiments in which collinear elements exert strong suppression whereas iso-oriented contextual surrounds yield no contextual modulation--contrary t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017