A note on 'Efficient numerically stabilized rank-one eigenstructure updating' [and reply]

نویسندگان

  • Marc Moonen
  • Paul Van Dooren
  • Joos Vandewalle
  • Ronald D. DeGroat
چکیده

In an recent paper [1], DeGroat and Roberts developed a re-orthogonalization scheme for stabilizing eigenstructure updating algorithms. In this note, we show that only part of this scheme, namely the re-normalization, is essential for the stability, so that a cheaper scheme –with roughly half as many computations– can perform equally well. EDICS classification : 5.2 5.2.4 Mailing address : Marc Moonen ESAT-KUL K. Mercierlaan 94 3030 Heverlee Belgium tel. 32/16/22 09 31 email : [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recursive blind channel identification and equalization by ULV decomposition

Most eigenstructure-based blind channel identi cation and equalization algorithms with second-order statistics need SVD or EVD of the correlation matrix of the output signal. In this paper, we show new algorithms based on QR factorization of the output data directly. A recursive algorithm is developed by updating a rank-revealing ULV decomposition. Compared with existing algorithms in the same ...

متن کامل

Eigenstructure Assignment Algorithm for Mechanical Second-Order Systems

Introduction E IGENSTRUCTURE assignment algorithms are widely used to design control systems.Most of the available eigenstructure assignment algorithms assign all of the eigenvalues to the desired values.The eigenstructureassignmentalgorithmcan be dividedinto two groups, that is, the null space approach and Sylvester equation approach.The null spaceapproachis used to solvemode decoupling proble...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Signal Processing

دوره 39  شماره 

صفحات  -

تاریخ انتشار 1991