Persistently positive inverses of perturbed M-matrices

نویسندگان

  • Ronald D. Haynes
  • Manfred R. Trummer
  • Shannon C. Kennedy
چکیده

A well known property of anM-matrixA is that the inverse is element-wise non-negative, which we write asA−1 0. In this paper we consider perturbations ofM-matrices and obtain bounds on the perturbations so that the non-negative inverse persists. The bounds are written in terms of decay estimates which characterize the decay (along rows) of the elements of the inverse matrix. We obtain results for diagonal and rank-1 perturbations of symmetric tridiagonal M-matrices and rank-1 perturbations of non-symmetric tridiagonal M-matrices. © 2007 Elsevier Inc. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perturbation bounds for $g$-inverses with respect to the unitarily invariant norm

Let complex matrices $A$ and $B$ have the same sizes. Using the singular value decomposition, we characterize the $g$-inverse $B^{(1)}$ of $B$ such that the distance between a given $g$-inverse of $A$ and the set of all $g$-inverses of the matrix $B$ reaches minimum under the unitarily invariant norm. With this result, we derive additive and multiplicative perturbation bounds of the nearest per...

متن کامل

Inequalities with Determinants of Perturbed Positive Matrices

We prove two inequalities regarding the ratio det(A+D)/detA of the determinant of a positive-definite matrix A and the determinant of its perturbation A+D. In the first problem, we study the perturbations that happen when positive matrices are added to diagonal blocks of the original matrix. In the second problem, the perturbations are added to the inverses of the matrices.

متن کامل

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

Perturbation of Null Spaces with Application to the Eigenvalue Problem and Generalized Inverses

We consider properties of a null space of an analytically perturbed matrix. In particular, we obtain Taylor expansions for the eigenvectors which constitute a basis for the perturbed null space. Furthermore, we apply these results to the calculation of Puiseux expansion of the perturbed eigenvectors in the case of general eigenvalue problem as well as to the calculation of Laurent series expans...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006