scispace - formally typeset
Search or ask a question
Author

Zhong-Zhi Bai

Bio: Zhong-Zhi Bai is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Iterative method & System of linear equations. The author has an hindex of 49, co-authored 160 publications receiving 9600 citations. Previous affiliations of Zhong-Zhi Bai include Fudan University & Southern Federal University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a successive substitution Moser method and a Newton-Moser method are proposed to find nonnegative solutions for a class of nonlinear matrix equations in queueing, inventory, communications, and dam theories.

12 citations

Journal ArticleDOI
TL;DR: This work discusses unique solvability of the equality-constraint quadratic programming problem, establishes a class of preconditioned alternating variable minimization with multiplier (PAVMM) methods for iteratively computing its solution, and demonstrates asymptotic convergence property of these PAVMM methods.
Abstract: We discuss unique solvability of the equality-constraint quadratic programming problem, establish a class of preconditioned alternating variable minimization with multiplier (PAVMM) methods for iteratively computing its solution, and demonstrate asymptotic convergence property of these PAVMM methods. We also discuss an algebraic derivation of the PAVMM method by making use of matrix splitting, which reveals that the PAVMM method is actually a modified block Gauss–Seidel iteration method for solving the augmented Lagrangian linear system resulting from the weighted Lagrangian function with respect to the equality-constraint quadratic programming problem.

12 citations

Journal ArticleDOI
TL;DR: Under suitable constraints on the nonlinear multisplitting and the relaxation parameters, the local convergence theory of this class of new methods is established when the Jacobi matrix of the involved nonlinear mapping at the solution point of the non linear complementarity problem is an H-matrix.

12 citations

Journal ArticleDOI
TL;DR: In this article, a modified block-SSOR preconditioned conjugate gradient method was proposed to solve the signal and image restoration problems with the half-quadratic regularization technique by making use of the Newton method.
Abstract: Signal and image restoration problems are often solved by minimizing a cost function consisting of an l(2) data-fidelity term and a regularization term. We consider a class of convex and edge-preserving regularization functions. In specific, half-quadratic regularization as a fixed-point iteration method is usually employed to solve this problem. The main aim of this paper is to solve the above-described signal and image restoration problems with the half-quadratic regularization technique by making use of the Newton method. At each iteration of the Newton method, the Newton equation is a structured system of linear equations of a symmetric positive definite coefficient matrix, and may be efficiently solved by the preconditioned conjugate gradient method accelerated with the modified block SSOR preconditioner. Our experimental results show that the modified block-SSOR preconditioned conjugate gradient method is feasible and effective for further improving the numerical performance of the half-quadratic regularization approach.

12 citations

Journal ArticleDOI
TL;DR: A class of parallel decomposition-type accelerated over-relaxation methods, including four arbitrary parameters and suitable to the SIMD-systems, is established for solving the large sparse systems of linear equations in this paper, and sufficient conditions ensuring its convergence are deduced when the coefficient matrices of the linear systems of equations are respectively L -matrices, H-matrices and positive definite matrices.

11 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2015

3,828 citations

Journal ArticleDOI
TL;DR: A large selection of solution methods for linear systems in saddle point form are presented, with an emphasis on iterative methods for large and sparse problems.
Abstract: Large linear systems of saddle point type arise in a wide variety of applications throughout computational science and engineering. Due to their indefiniteness and often poor spectral properties, such linear systems represent a significant challenge for solver developers. In recent years there has been a surge of interest in saddle point problems, and numerous solution techniques have been proposed for this type of system. The aim of this paper is to present and discuss a large selection of solution methods for linear systems in saddle point form, with an emphasis on iterative methods for large and sparse problems.

2,253 citations

Journal ArticleDOI
TL;DR: In this article, a mathematical framework for cyber-physical systems, attacks, and monitors is proposed, and fundamental monitoring limitations from both system-theoretic and graph-based perspectives are characterized.
Abstract: Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial control processes, and critical infrastructures. These systems need to operate reliably in the face of unforeseen failures and external malicious attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations from system-theoretic and graph-theoretic perspectives; and (ii) we design centralized and distributed attack detection and identification monitors. Finally, we validate our findings through compelling examples.

1,430 citations

Posted Content
TL;DR: This paper proposes a mathematical framework for cyber-physical systems, attacks, and monitors, and describes fundamental monitoring limitations from system-theoretic and graph- theoretic perspectives and designs centralized and distributed attack detection and identification monitors.
Abstract: Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze the resilience of cyber-physical systems against attacks cast by an omniscient adversary. We model cyber-physical systems as linear descriptor systems, and attacks as exogenous unknown inputs. Despite its simplicity, our model captures various real-world cyber-physical systems, and it includes and generalizes many prototypical attacks, including stealth, (dynamic) false-data injection and replay attacks. First, we characterize fundamental limitations of static, dynamic, and active monitors for attack detection and identification. Second, we provide constructive algebraic conditions to cast undetectable and unidentifiable attacks. Third, by using the system interconnection structure, we describe graph-theoretic conditions for the existence of undetectable and unidentifiable attacks. Finally, we validate our findings through some illustrative examples with different cyber-physical systems, such as a municipal water supply network and two electrical power grids.

1,190 citations