نتایج جستجو برای: block matrix

تعداد نتایج: 513605  

Journal: :journal of ai and data mining 2015
v. abolghasemi s. ferdowsi s. sanei

the focus of this paper is to consider the compressed sensing problem. it is stated that the compressed sensing theory, under certain conditions, helps relax the nyquist sampling theory and takes smaller samples. one of the important tasks in this theory is to carefully design measurement matrix (sampling operator). most existing methods in the literature attempt to optimize a randomly initiali...

2008
ALEXANDER DUDIN CHESOONG KIM VALENTINA KLIMENOK

In this paper we consider discrete-time multidimensional Markov chains having a block transition probability matrix which is the sum of a matrix with repeating block rows and a matrix of upper-Hessenberg, quasi-Toeplitz structure. We derive sufficient conditions for the existence of the stationary distribution, and outline two algorithms for calculating the stationary distribution.

2003
Chatchawit Aporntewan Prabhas Chongstitvatana

We propose a BB identification by simultaneity matrix (BISM) algorithm. The input is a set of -bit solutions denoted by S. The number of solutions is denoted by n = |S|. The output is a partition of bit positions {0, . . . , − 1}. The BISM is composed of Simultaneity-Matrix-Construction and Fine-Valid-Partition algorithms. Algorithm SMC is outlined as follows (aij denotes the matrix element at ...

2017
Yongge Tian George P. H. Styan GEORGE P. H. STYAN

A general method is presented for establishing universal factorization equalities for 2×2 and 4×4 block matrices. As applications, some universal factorization equalities for matrices over four-dimensional algebras are established, in particular, over the Hamiltonian quaternion algebra.

2007
Roger A. Horn

The pseudo-equivalence of a block lower triangular matrix T = [Tij ] over a regular ring and its block diagonal matrix D(T ) = [Tii] is characterized in terms of suitable Roth consistency conditions. The latter can in turn be expressed in terms of the solvability of certain matrix equations of the form TiiX − Y Tjj = Uij .

Journal: :SIAM J. Matrix Analysis Applications 2017
Caterina Fenu Desmond J. Higham

Many types of pairwise interaction take the form of a fixed set of nodes with edges that appear and disappear over time. In the case of discrete-time evolution, the resulting evolving network may be represented by a time-ordered sequence of adjacency matrices. We consider here the issue of representing the system as a single, higher dimensional block matrix, built from the individual time-slice...

2008
Holger Dette Bettina Reuther

In this paper we consider random block matrices, which generalize the general beta ensembles, which were recently investigated by Dumitriu and Edelmann (2002, 2005). We demonstrate that the eigenvalues of these random matrices can be uniformly approximated by roots of matrix orthogonal polynomials which were investigated independently from the random matrix literature. As a consequence we deriv...

2004
J. C. Zúñiga D. Henrion

Some block Toeplitz methods applied to polynomial matrices are reviewed. We focus on the computation of the structure (rank, null-space, infinite and finite structures) of an arbitrary rectangular polynomial matrix. We also introduce some applications of this structural information in control theory. All the methods outlined here are based on the computation of the null-spaces of suitable block...

2013
Lukás Polok Viorela Ila Pavel Smrz

Efficiently manipulating and operating on block matrices can be beneficial in many applications, among others those involving iteratively solving nonlinear systems. These types of problems consist of repeatedly assembling and solving sparse linear systems. In the case of very large systems, without a careful manipulation of the corresponding matrices, solving can become very time consuming. Thi...

2017
Jyoti Bharti Sanyam Shukla

This paper introduces a novel method based on auxiliary matrix to hide a text data in an RGB plane. To hide the data in RGB planes of image via scanning, encryption and decryption. To enhance the security, the scanning technique combines two different traversals – spiral and snake traversal. The encryption algorithm involves auxiliary matrix as a payload and consider the least significant bits ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید