Successive matrix squaring algorithm for computing outer inverses
نویسندگان
چکیده
In this paper we derive a successive matrix squaring (SMS) algorithm to approximate an outer generalized inverse with prescribed range and null space of a given matrix A ∈ Cm×n r . We generalize the results from the papers [3], [16], [18], and obtain an algorithm for computing various classes of outer generalized inverses of A. Instead of particular matrices used in these articles, we use an appropriate matrix R ∈ Cn×m s , s ≤ r. Numerical examples are presented. AMS Subj. Class.: 15A09.
منابع مشابه
Full-rank representations of {2, 4}, {2, 3}-inverses and successive matrix squaring algorithm
We present the full-rank representations of {2, 4} and {2, 3}-inverses (with given rank as well as with prescribed range and null space) as particular cases of the full-rank representation of outer inverses. As a consequence, two applications of the successive matrix squaring (SMS) algorithm from [P.S. Stanimirović, D.S. Cvetković-Ilić, Successive matrix squaring algorithm for computing outer i...
متن کاملSuccessive Matrix Squaring Algorithm for Computing the Generalized Inverse AT,S(2)
We investigate successive matrix squaring SMS algorithms for computing the generalized inverse A 2 T,S of a given matrix A ∈ C m×n .
متن کاملGauss-Jordan elimination method for computing outer inverses
This paper deals with the algorithm for computing outer inverse with prescribed range and null space, based on the choice of an appropriate matrix G and Gauss–Jordan elimination of the augmented matrix [G | I]. The advantage of such algorithms is the fact that one can compute various generalized inverses using the same procedure, for different input matrices. In particular, we derive representa...
متن کاملThree Novel Theorems for Applied Cryptography
With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day‟s computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Applied Mathematics and Computation
دوره 203 شماره
صفحات -
تاریخ انتشار 2008