A note on 'Efficient numerically stabilized rank-one eigenstructure updating' [and reply]
نویسندگان
چکیده
In an recent paper [1], DeGroat and Roberts developed a re-orthogonalization scheme for stabilizing eigenstructure updating algorithms. In this note, we show that only part of this scheme, namely the re-normalization, is essential for the stability, so that a cheaper scheme –with roughly half as many computations– can perform equally well. EDICS classification : 5.2 5.2.4 Mailing address : Marc Moonen ESAT-KUL K. Mercierlaan 94 3030 Heverlee Belgium tel. 32/16/22 09 31 email : [email protected]
منابع مشابه
Recursive blind channel identification and equalization by ULV decomposition
Most eigenstructure-based blind channel identi cation and equalization algorithms with second-order statistics need SVD or EVD of the correlation matrix of the output signal. In this paper, we show new algorithms based on QR factorization of the output data directly. A recursive algorithm is developed by updating a rank-revealing ULV decomposition. Compared with existing algorithms in the same ...
متن کاملAuthor’s Reply to “A Note on the Simulation of Gas Diffusion in Capillaries and Porous Solids”
متن کامل
Author’s Reply to “A Note on the Simulation of Gas Diffusion in Capillaries and Porous Solids”
متن کامل
Eigenstructure Assignment Algorithm for Mechanical Second-Order Systems
Introduction E IGENSTRUCTURE assignment algorithms are widely used to design control systems.Most of the available eigenstructure assignment algorithms assign all of the eigenvalues to the desired values.The eigenstructureassignmentalgorithmcan be dividedinto two groups, that is, the null space approach and Sylvester equation approach.The null spaceapproachis used to solvemode decoupling proble...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Signal Processing
دوره 39 شماره
صفحات -
تاریخ انتشار 1991