scispace - formally typeset
Search or ask a question
Author

Zhong-Zhi Bai

Bio: Zhong-Zhi Bai is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Iterative method & System of linear equations. The author has an hindex of 49, co-authored 160 publications receiving 9600 citations. Previous affiliations of Zhong-Zhi Bai include Fudan University & Southern Federal University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors review the recently developed Hermitian/skew-Hermitian splitting (HSS) iteration, normal/Skew Hermitians splitting (NSS), PSS iteration, and block triangular/Hermitians split (BTSS) iteration.
Abstract: For large sparse system of linear equations with a non-Hermitian positive definite coefficient matrix, we review the recently developed Hermitian/skew-Hermitian splitting (HSS) iteration, normal/skew-Hermitian splitting (NSS) iteration, positive-definite/skew-Hermitian splitting (PSS) iteration, and block triangular/skew-Hermitian splitting (BTSS) iteration. These methods converge unconditionally to the exact solution of the linear system, with the upper bounds of their convergence factors being only dependent on the spectrum of the Hermitian (or normal, or positive-definite) splitting matrix, but independent of the spectrum of the skew-Hermitian splitting matrix as well as the eigenvectors of all matrices involved.

49 citations

Journal ArticleDOI
TL;DR: The main contribution is to construct effective preconditioners for this structured coefficient matrix and to derive tight bounds for eigenvalues of the preconditionsed matrices.
Abstract: We consider the system of linear equations Lu=f, where L is a nonsymmetric block Toeplitz-like-plus-diagonal matrix, which arises from the Sinc-Galerkin discretization of differential equations. Our main contribution is to construct effective preconditioners for this structured coefficient matrix and to derive tight bounds for eigenvalues of the preconditioned matrices. Moreover, we use numerical examples to show that the new preconditioners, when applied to the preconditioned GMRES method, are efficient for solving the system of linear equations.

49 citations

Journal ArticleDOI
TL;DR: In this paper, sufficient conditions for the convergent splitting of a non-Hermitian positive definite matrix are presented. And these results are applicable to identify the convergence of iterative methods for solving large sparse systems of linear equations.

49 citations

Journal ArticleDOI
TL;DR: When the coefficient matrix is assumed to be of full column rank, it is proved the convergence and derive an upper bound for the expected convergence rate of the partially randomized extended Kaczmarz method.

48 citations

Journal ArticleDOI
TL;DR: Numerical experiments show that MINRES preconditioned by the exact and the inexact additive block diagonal preconditionsers are effective, robust and scalable solvers for the block two-by-two linear systems arising from the Galerkin finite-element discretizations of a class of distributed control problems.
Abstract: For a class of block two-by-two systems of linear equations with certain skew-Hamiltonian coefficient matrices, we construct additive block diagonal preconditioning matrices and discuss the eigen-properties of the corresponding preconditioned matrices. The additive block diagonal preconditioners can be employed to accelerate the convergence rates of Krylov subspace iteration methods such as MINRES and GMRES. Numerical experiments show that MINRES preconditioned by the exact and the inexact additive block diagonal preconditioners are effective, robust and scalable solvers for the block two-by-two linear systems arising from the Galerkin finite-element discretizations of a class of distributed control problems.

48 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2015

3,828 citations

Journal ArticleDOI
TL;DR: A large selection of solution methods for linear systems in saddle point form are presented, with an emphasis on iterative methods for large and sparse problems.
Abstract: Large linear systems of saddle point type arise in a wide variety of applications throughout computational science and engineering. Due to their indefiniteness and often poor spectral properties, such linear systems represent a significant challenge for solver developers. In recent years there has been a surge of interest in saddle point problems, and numerous solution techniques have been proposed for this type of system. The aim of this paper is to present and discuss a large selection of solution methods for linear systems in saddle point form, with an emphasis on iterative methods for large and sparse problems.

2,253 citations

Journal ArticleDOI
TL;DR: In this article, a mathematical framework for cyber-physical systems, attacks, and monitors is proposed, and fundamental monitoring limitations from both system-theoretic and graph-based perspectives are characterized.
Abstract: Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial control processes, and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations from system-theoretic and graph-theoretic perspectives; and (ii) we design centralized and distributed attack detection and identification monitors. Finally, we validate our findings through compelling examples.

1,430 citations

Posted Content
TL;DR: This paper proposes a mathematical framework for cyber-physical systems, attacks, and monitors, and describes fundamental monitoring limitations from system-theoretic and graph- theoretic perspectives and designs centralized and distributed attack detection and identification monitors.
Abstract: Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.

1,190 citations