Successive matrix squaring algorithm for computing outer inverses

نویسندگان

  • Predrag S. Stanimirovic
  • Dragana S. Cvetkovic-Ilic
چکیده

In this paper we derive a successive matrix squaring (SMS) algorithm to approximate an outer generalized inverse with prescribed range and null space of a given matrix A ∈ Cm×n r . We generalize the results from the papers [3], [16], [18], and obtain an algorithm for computing various classes of outer generalized inverses of A. Instead of particular matrices used in these articles, we use an appropriate matrix R ∈ Cn×m s , s ≤ r. Numerical examples are presented. AMS Subj. Class.: 15A09.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Full-rank representations of {2, 4}, {2, 3}-inverses and successive matrix squaring algorithm

We present the full-rank representations of {2, 4} and {2, 3}-inverses (with given rank as well as with prescribed range and null space) as particular cases of the full-rank representation of outer inverses. As a consequence, two applications of the successive matrix squaring (SMS) algorithm from [P.S. Stanimirović, D.S. Cvetković-Ilić, Successive matrix squaring algorithm for computing outer i...

متن کامل

Successive Matrix Squaring Algorithm for Computing the Generalized Inverse AT,S(2)

We investigate successive matrix squaring SMS algorithms for computing the generalized inverse A 2 T,S of a given matrix A ∈ C m×n .

متن کامل

Gauss-Jordan elimination method for computing outer inverses

This paper deals with the algorithm for computing outer inverse with prescribed range and null space, based on the choice of an appropriate matrix G and Gauss–Jordan elimination of the augmented matrix [G | I]. The advantage of such algorithms is the fact that one can compute various generalized inverses using the same procedure, for different input matrices. In particular, we derive representa...

متن کامل

Three Novel Theorems for Applied Cryptography

With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day‟s computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Applied Mathematics and Computation

دوره 203  شماره 

صفحات  -

تاریخ انتشار 2008