scispace - formally typeset
Search or ask a question
Author

Zhong-Zhi Bai

Bio: Zhong-Zhi Bai is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Iterative method & System of linear equations. The author has an hindex of 49, co-authored 160 publications receiving 9600 citations. Previous affiliations of Zhong-Zhi Bai include Fudan University & Southern Federal University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, sufficient convergence conditions for splitting iteration methods for non-Hermitian systems of linear equations when the coefficient matrix is nonsingular were studied. But the convergence conditions were not studied for the generalized saddle-point problem.

25 citations

Journal ArticleDOI
TL;DR: It is shown that inexact solutions of inner linear systems associated with the matrix splittings may considerably influence the accuracy of the approximate solutions computed in finite precision arithmetic.
Abstract: We study the numerical behavior of stationary one-step or two-step matrix splitting iteration methods for solving large sparse systems of linear equations. We show that inexact solutions of inner linear systems associated with the matrix splittings may considerably influence the accuracy of the approximate solutions computed in finite precision arithmetic. For a general stationary matrix splitting iteration method, we analyze two mathematically equivalent implementations and discuss the conditions when they are componentwise or normwise forward or backward stable. We distinguish two different forms of matrix splitting iteration methods and prove that one of them is significantly more accurate than the other when employing inexact inner solves. The theoretical results are illustrated by numerical experiments with an inexact one-step and an inexact two-step splitting iteration method.

25 citations

Journal ArticleDOI
TL;DR: In this article, the authors set up the monotone convergence theory for the two-stage iterative method proposed by Frommer and Szyld in [1] and investigated the influence of splitting matrices and the inner iteration number sequence on the convergence rate of this method.

24 citations

Journal ArticleDOI
TL;DR: It has been shown that a combination of the Newton/fixed-point iteration with the preconditioned GMRES method is efficient and robust for solving the systems of nonlinear equations arising from the sinc-Galerkin discretization of the time-dependent partial differential equations.
Abstract: When the Newton method or the fixed-point method is employed to solve the systems of nonlinear equations arising in the sinc-Galerkin discretization of certain time-dependent partial differential equations, in each iteration step we need to solve a structured subsystem of linear equations iteratively by, for example, a Krylov subspace method such as the preconditioned GMRES. In this paper, based on the tensor and the Toeplitz structures of the linear subsystems we construct structured preconditioners for their coefficient matrices and estimate the eigenvalue bounds of the preconditioned matrices under certain assumptions. Numerical examples are given to illustrate the effectiveness of the proposed preconditioning methods. It has been shown that a combination of the Newton/fixed-point iteration with the preconditioned GMRES method is efficient and robust for solving the systems of nonlinear equations arising from the sinc-Galerkin discretization of the time-dependent partial differential equations.

24 citations

Journal ArticleDOI
TL;DR: A class of asynchronous parallel matrix multisplitting relaxation methods suitable to the MIMD-systems are constructed under the condition that the coefficient matrix A is a monotone matrix.
Abstract: In this paper, a class of asynchronous parallel matrix multisplitting relaxation methods suitable to the MIMD-systems are constructed. The convergence and the convergence rate of it are discussed in a detailed manner under the condition that the coefficient matrix A is a monotone matrix. Moreover, when the matrix A is an L-matrix, we give sufficient and necessary conditions ensuring the convergence of the methods, too.

22 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2015

3,828 citations

Journal ArticleDOI
TL;DR: A large selection of solution methods for linear systems in saddle point form are presented, with an emphasis on iterative methods for large and sparse problems.
Abstract: Large linear systems of saddle point type arise in a wide variety of applications throughout computational science and engineering. Due to their indefiniteness and often poor spectral properties, such linear systems represent a significant challenge for solver developers. In recent years there has been a surge of interest in saddle point problems, and numerous solution techniques have been proposed for this type of system. The aim of this paper is to present and discuss a large selection of solution methods for linear systems in saddle point form, with an emphasis on iterative methods for large and sparse problems.

2,253 citations

Journal ArticleDOI
TL;DR: In this article, a mathematical framework for cyber-physical systems, attacks, and monitors is proposed, and fundamental monitoring limitations from both system-theoretic and graph-based perspectives are characterized.
Abstract: Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial control processes, and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations from system-theoretic and graph-theoretic perspectives; and (ii) we design centralized and distributed attack detection and identification monitors. Finally, we validate our findings through compelling examples.

1,430 citations

Posted Content
TL;DR: This paper proposes a mathematical framework for cyber-physical systems, attacks, and monitors, and describes fundamental monitoring limitations from system-theoretic and graph- theoretic perspectives and designs centralized and distributed attack detection and identification monitors.
Abstract: Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.

1,190 citations