Home Validity and error analysis of calculating matrix exponential function and vector product
Article Open Access

Validity and error analysis of calculating matrix exponential function and vector product

  • Lihui Tu and Huanjie Hong EMAIL logo
Published/Copyright: June 27, 2024
Become an author with De Gruyter Brill

Abstract

In this study, an efficient calculation method of matrix exponential function and vector product is proposed to reduce the calculation error. This method is based on the flexible exponential integral scheme; using B-series theory and two-color tree theory, the numerical series expression is obtained, and the exponential integral of the matrix exponential function is solved. By constructing a specific numerical integration scheme and analyzing its convergence under the theoretical framework of analytic semigroups, the convergence analysis of numerical schemes is studied and perfected. The numerical results show that the proposed method of matrix exponential function and vector product has a small error, which shows obvious advantages in reducing the calculation error.

1 Introduction

The matrix exponential function f ( A ) or matrix function times vector f ( A ) v has a wide range of application background; its effective and reliable numerical calculation is one of the hotspots and difficulties in the field of numerical algebra in recent years [1]. In this study, the efficient calculation of matrix empirical function and vector product method will be studied.

The formulation and theoretical study of the matrix empirical function f ( A ) started almost at the same time as linear algebra. In 1850, the British mathematician Sylvester first proposed the concept of matrix, and then, Cayley, Sylvester, Frobenius, and other scientists began to study the algebraic properties of matrix, which promoted the development of the whole linear algebra [2]. The study of the matrix empirical function began in 1858 when Cayley discussed the square root function of the second- and third-order matrices. Then, researchers began to devote themselves to the research of pure mathematical theory, such as the definition and basic properties of the general matrix empirical function, and made a lot of progress. With the continuous development of applied science, the matrix empirical function is applied in different fields, and the attention of the matrix empirical function has gradually shifted from the field of pure mathematics to the numerical calculation of the vector product. A series of achievements have been made in the calculation condition number, algorithm analysis and design, and calculation stability of the matrix empirical function and vector product [3].

With the rapid development of computer performance, new problems are emerging in the application field. In recent 20 years, more and more attention has been paid to the numerical algorithm of Eq. (1) and its corresponding theoretical analysis, such as error analysis, stability analysis, space and time complexity analysis

(1) f ( A ) v , v C N × N , f ( z ) is complex-valued function .

For example, the solution of linear equations A x = b is one of the core problems in the field of scientific and engineering, which is equivalent to the reciprocal function of f ( z ) , namely, f ( z ) = z 1 . In addition, many mathematical models established by physics, chemistry, or economics include the following:

(2) y ( t ) = A y ( t ) , t 0 y ( 0 ) = v .

In fact, the efficient calculation of matrix empirical function and vector product has always been an active research topic in the field of numerical algebra. In addition to exponential integral, in many fields of science and engineering applications, it is often necessary to solve the matrix exponential function and vector product of the form:

(3) f ( A ) b , f : C C , A C n × n , b C n ,

Besides φ-1111 function, f common forms include symbolic function sign ( A ) , logarithmic function log ( A ) , and square root function A . For the application and calculation of the matrix empirical functions, please refer to the latest monograph of Higham [4], which introduces the basic methods and main results for solving the matrix empirical function and vector product.

In a sense, there are many mature and effective algorithms for the calculation of the matrix empirical function and vector product. However, in many practical applications, especially in the spatial discretization of PDEs (partial differential equations), matrix A is usually large and sparse or has some special structural characteristics. For such a matrix, direct calculation of the matrix empirical function f ( A ) will destroy the structural characteristics of the matrix, which leads to a large number of non-zero elements being filled and a large amount of storage and calculation. The required solution is the product of the matrix exponential function and the vector instead of the matrix exponential function alone. At present, the widely accepted method is to construct a numerical method based on the operation of the matrix A and the vector product, which is usually simpler than calculating the product of the matrix A and the vector b directly after calculating f ( A ) . So far, there have been some effective algorithms designed in this method, which do not need to be solved f ( A ) separately, but directly calculate the product of the matrix empirical function and the vector. In this process, it mainly betrays the product operation of the matrix and the vector [5].

2 Materials and methods

2.1 Exponential integral of the matrix exponential function

The exponential integral of the matrix exponential function is constructed by the constant variation formula based on the continuous linearization of some vector fields f at the numerical nodes.

Given value nodes u n , assume:

(4) J n = J ( u n ) = f u ( u n ) , T n ( u ( t ) ) = f ( u ( t ) ) J n u ( t ) ,

then the matrix exponential function can be regarded as

(5) u ( t ) = J n u ( t ) + r n ( u ( t ) ) + g ( u ( t ) ) , u ( t n ) = u n ,

(6) t n + 1 = t n + h n , n = 0 , 1 ,

According to the variation formula of the matrix empirical function, the analytical solution of this function at time node (6) can be expressed as follows:

(7) u ( t n + h n ) = t n t n + h n e J n ( t n + h n t ) r n ( u ( t ) ) d t ,

the nonlinear terms t n + h n t in the expression are interpolated and discretized on the interval [ 0 , 1 ] , such as Lagrange interpolation or Newton polynomial interpolation [6], then the following s-level exponential integral schemes with general form can be obtained:

(8) U n i = h n j = 1 i 1 a ˆ i j ( h n J n ) T n ( U n j ) + h n j = 1 i 1 a ˆ i j ( h n J n ) g ( U n j ) , u n + 1 = h n j = 1 s b ˆ j ( h n J n ) r n ( U n j ) + h n j = 1 s b ˆ j ( h n J n ) g ( U n j ) .

In the process of solving the exponential integral of the matrix exponential function, an important problem is to calculate the product of the exponential matrix function and the series. In fact, through direct verification, it can be found that the product of these matrix functions defined on h f and the series is still series [7]. Therefore, the remaining key problem is to express the coefficients of the newly generated TB (Taylor-Baker)-series.

In the aforementioned analysis, the relevant operations for solving semilinear equations are defined. These operations, with simple modifications, can be used directly to calculate the case corresponding to the FEI format [8]. Now, introduce the revised definition.

Suppose α G 0 , h f is represented by J , and then, it is defined as follows:

(9) J a = t 2 T a ( t ) [ t ] f ,

where t is a mapping belonging to G 0 , which needs to meet the following requirements:

(10) t ( x ) = 1 , x = t 0 , x t .

More generally, suppose p ( j ) be the power series function of j :

(11) p ( j ) = p 0 + p 1 j + p 2 j 2 + ,

then,

(12) p ( t ) a = t 2 t a ( t ) ( p 0 t + p 1 t f + ) ,

When a G 0 ,

(13) φ ( h f ) TB ( a , u 0 ) = TB ( φ ( j ) a , u 0 ) ,

where φ ( ) is an exponential matrix function, which can be expanded into power series.

Based on the aforementioned preparations, it is easy to establish the recursive relationship between the intermediate stage value u 0 of the numerical formats and the TB-coefficient of the output vector u 1 . If η i G 1 is the TB-coefficient corresponding to U 0 i and η i G 1 is the output term u 1 , then the TB-series of numerical format can be expressed as follows:

(14) U 0 i = TB ( η i , u 0 ) , 1 i s u 1 = TB ( η , u 0 ) .

The corresponding TB-coefficient meets the following requirements:

(15) η i = 1 + c i φ 1 ( c i , j ) D f , η = 1 + φ 1 ( j ) D f ,

Once the value of the obtained coefficient is compared with the exact solution, the classical order condition satisfied by the numerical scheme can be obtained [9]. If it is true for t 2 t in matrix A , when p ( t ) = E ( t ) , then the classical order of the scheme is p .

The above-mentioned method is considered to solve the initial value problem of nonlinear ordinary differential equation, which can be decomposed into rigid term and nonrigid term by the right-end term:

(16) u ̇ ̇ = F ( u ) = f ( u ) + g ( u ) ,

where f corresponds to the rigid term and g corresponds to the nonrigid term. It is a natural idea to construct an effective numerical method using the structural characteristics of the right-hand term, which can be decomposed into initial value problems with different functions. The general solution method often ignores the structural characteristics of this kind of problems. The matrix exponential function and vector product are solved by constructing a flexible exponential integral based on exponential time differencing. These schemes are general and flexible and can make more effective use of the structural characteristics of the matrix. This method combines the characteristics of the exponential method [10]. Compared with the exponential method, its construction is based on the linearization of partial vector field F rather than the whole vector field. There are at least two advantages in this method: first, it is simpler to linearize partial vector field than to linearize the whole vector field, the linearization of partial vector field F is simpler than that of the whole vector field F , i.e., the matrix of F is simpler than that of the whole vector field. At the same time, since F is a rigid term, this does not affect its stability. Second, in many applications, the right-hand term F often has a special structure, and its exponential function matrix also has a special form, such as symmetric matrix, antisymmetric matrix, or Hamiltonian matrix. The special structure of matrix plays an important role in the calculation of matrix function, which can greatly reduce the workload of calculation in many cases.

2.2 Calculation algorithm of the matrix empirical function and vector product

Schur–Parlett algorithm [11] is the best choice for calculating the general matrix empirical function f (A), which is based on Schur decomposition of matrix and is forward stable in most cases. Next, the design idea and implementation details of the algorithm will be given. According to the property of the matrix empirical function, f ( X A X 1 ) = X f ( A ) X 1 , so theoretically, if the form of B = X A X 1 is simple (such as diagonal matrix), f ( B ) is also easy to obtain. However, in the case of finite precision operation, it is necessary to require a small number of X’s conditions k ( X ) = X X 1 to ensure the stability of the algorithm. In particular, if x is a unitary matrix, k ( X ) = 1 is an ideal case. Therefore, in order to ensure the reliability of the results of general matrix A, it is necessary to find its simplest form (Schur decomposition A = Q T Q H ), under unitary similar transformation, where Q is unitary matrix and T = ( t i , j ) is upper triangular matrix. At the moment, f ( A ) = Q f ( T ) Q H , and the calculation of the upper triangular matrix function f ( T ) becomes the key of the problem. F = f ( T ) is also the upper triangular matrix function, its diagonal element F i , j = f ( t i , j ) , and F T = T F . According to these properties, if the matrix T is an N-order upper triangular matrix and the diagonal elements are different from each other, and the function f ( z ) is defined on the spectrum of T, then F = ( f i , j ) = f ( T ) can be obtained from the Parlett recurrence formula [12].

There are two points to explain about the algorithm of the matrix empirical function and vector product:

  1. The calculation amount of the algorithm is 2 N 3 / 3 flops (N is the order of matrix A);

  2. If t i , j = t j , j , i j , the algorithm will be interrupted.

In order to avoid the aforementioned problems, the algorithm can be extended to the calculation of block upper triangular matrix functions. By unitary similar transformation, A = Q T Q H is rearranged so that T becomes a block upper triangular matrix T = ( T i , j ) , and when i j , diagonal blocks T i , i and T j , j have no same eigenvalue. F = ( F i , j ) = f ( T ) is a block upper triangular matrix, which has the same block structure as matrix T, and satisfies F i , i = f ( T i , i ) . According to T F = F T , the recurrence formula for calculating F i , j is as follows:

(17) T i , i F i , j F i , j T j , j = F i , i T i , j T i , j F j , j + k i + 1 j 1 ( F i , k T k , j T i , k F k , j ) , i < j .

According to the theory of function approximation, there are polynomials or rational polynomials r ( z ) , so in a certain region, f ( z ) r ( z ) , and then, the matrix function can be calculated approximately by f ( A ) r ( A ) . However, even if r ( z ) is a good approximation of function f ( z ) , the approximation effect of r ( A ) and f ( A ) is questionable, which is closely related to the spectral properties of matrix A. If A = X D X 1 , then

(18) f ( A ) r ( A ) = X ( f ( D ) r ( D ) ) X 1 .

It can be seen from the aforementioned section that when the norm of matrix A is small, it is possible to obtain a better approximation of function f ( A ) by truncated Taylor approximation. In most cases, the generated matrix cannot meet this requirement. Fortunately, for some special functions, the problem that A is bigger can be resolved by scaling the square algorithm. Take the matrix exponential function e A as the example, and there is:

(19) e A = ( e A / 2 s ) 2 , s N ,

The selection of parameter s determines that the value of A / 2 s (in general, A / 2 s and 1 are of the same order) can be calculated stably and accurately. Set B = R m , m ( A / 2 s ) e A / 2 s , then:

(20) e A B 2 s , s N ,

The backward error analysis of the scaling square algorithm shows that if A / 2 s 0.5 , there is B 2 ' = e A + E , among which:

(21) E A 8 A 2 s 2 m ( m ! ) 2 ( 2 m ) ! ( 2 m + 1 ) ! .

The calculation amount of R m , m ( A / 2 S ) 2 is about:

(22) ( m + s + 1 / 3 ) N 3 flops,

where N is the order of matrix A , so if you want to calculate the relative error reach of e A ( E / A e ) , you can obtain the method to determine the “optimal” parameters m and s. Here, the “optimal” parameter refers to the m and s that make the calculation amount of the scaling square algorithm minimum. Similarly, the truncated Taylor expansion T k ( A / 2 S ) can be used to calculate e A / 2 ' . According to the same analysis method, the method to determine the “optimal” parameters k and s can also be obtained [13]. Two kinds of scaling square algorithm give the determination value of the optimal parameter and point out when A is small, the calculation of function approximation is only half of the truncated Taylor expansion. With the increase of A , the difference between the two is narrowing. As a whole, the efficiency of function approximation is higher.

For other matrix functions (such as logarithmic function log ( A ) , trigonometric function sin ( A ) and cos ( A ) ), the algorithm expression of the matrix empirical function and vector product can be obtained as follows:

(23) log ( A ) = 2 s log ( A 1 / 2 ' ) , sin ( 2 A ) = 2 sin ( A ) cos ( A ) , cos ( 2 A ) = 2 cos 2 ( A ) I .

2.3 Error analysis of the matrix empirical function and vector product

In the aforementioned algorithm, the main step is to truncate the first finite term of the series of exponential function e T of matrix T. This process has the following error results:

Suppose that M is the k-step iteration of the aforementioned algorithm for the nonnegative matrix defined above, and T k ( M ) is the calculated solution of M, then there is:

(24) | T k ( M ) M | [ ( k n + k n ) u + O ( u 2 ) ] T k ( M ) .

Proof

For the convenience of writing, T k is used instead. The aforementioned algorithms are as follows:

(25) T k = f l ( T k 1 + p k 1 ) .

First,

(26) | p ˆ k p k | [ k ( n + 1 ) u + O ( u 2 ) ] p k ,

as p ˆ 0 = p 0 = M , when k = 1 , p ˆ 1 = f l M M 2 , it can be known that

(27) | p ˆ 1 p 1 | [ ( n + 1 ) u + O ( u 2 ) ] p 1 .

That is, when k = 1 , the conclusion is true. If k = i , it is true, then when k = i + 1 , the following formula can be obtained from p ˆ i + 1 = f l p ˆ i M i + 2 :

(28) p ˆ i + 1 ( 1 + n u + O ( u 2 ) ) ( 1 + u ) p ˆ i M i + 2 ,

In the same method, it can be obtained that

(29) p ˆ i + 1 [ 1 ( i + 1 ) ( n + 1 ) u + O ( u 2 ) ] p i + 1 ,

and then,

(30) | p ˆ i + 1 p i + 1 | [ ( i + 1 ) ( n + 1 ) u + O ( u 2 ) ] p i + 1 ,

Therefore, when k = i + 1 , the conclusion is also true.

When k = 1 , since T ˆ 0 = T 0 = I , the following can be given:

(31) | T ˆ 1 T 1 | u T 1 .

Now, if k = i , it is true. When k = i + 1 , form T ˆ i + 1 = f l ( T ˆ i + p ˆ i ) , it can see that

(32) T ˆ i + 1 ( 1 + u ) ( T ˆ i + p ˆ i ) ( 1 + u ) [ 1 + ( i n + i n ) u + O ( u 2 ) ] T i ( 1 + u ) ( 1 + i ( n + 1 ) u + O ( u 2 ) ) .

In the same method, the following formula can be obtained:

(33) T ˆ i + 1 [ 1 ( ( i + 1 ) n + ( i + 1 ) n ) u + O ( u 2 ) ] T i + 1 .

That is, when k = i + 1 , the conclusion is also true.

In fact, the aforementioned algorithm includes a process of shifting and a process of truncation of e T series. For the truncation process, the influence of the calculation error on the calculation accuracy of the process is clearly explained here. Therefore, it is easy to get the influence of the error of the matrix empirical function and vector product on the algorithm. Here is the rounding error of our algorithm.

It can be seen from the error analysis results that since the maximum number of iteration steps of the algorithm is m = j + n 1 1111, the relative error bound of each element of the calculated solution obtained by the algorithm with respect to the accurate solution is not more than ( ( j + n 1 ) n + j ) u + tol + O ( u 2 ) at most. It can be seen that the maximum relative bound is O ( u 2 ) u , which is very small. Therefore, the aforementioned algorithm can accurately calculate every element of the matrix index of the essentially nonnegative upper triangular matrix with similar diagonal elements, which cannot be solved by traditional methods.

In addition, the minimum j that makes k = j + 1 δ k k ! tol hold increases with the increase of δ ( δ 1 ) . When tol = 100 u is taken in the actual calculation and u = 2 53 is double machine accuracy, the minimum j that makes k = j + 1 δ k k ! tol hold is 16. Therefore, the maximum number of iteration steps of this algorithm satisfies m 16 + n 1 = n + 15 , so the speed of this algorithm is self-evident.

Now, let us consider the influence of the calculation error of the algorithm to calculate the general essential nonnegative triangular matrix. Obviously, the aforementioned algorithm only includes a scaling process and the process of invoking the algorithm. Through the aforementioned theorems, the calculation errors generated in the process of calling the algorithm are studied. Similarly, the error bound of the whole algorithm process can be easily obtained. In the face of different types of matrices, for sparse matrices, special preprocessing technology and Krylov subspace method are used to maintain the sparsity of the calculation, so as to improve the efficiency. For symmetric matrices, the method takes advantage of their unique properties, such as a numerical integration scheme that preserves symmetry, to ensure the accuracy of the calculation. As for non-square matrices, although this method is primarily concerned with square matrices, it can also be applied to non-square matrices in principle, although the algorithm may need to be adjusted appropriately to handle this type of matrix structure. Future research will continue to explore these questions in depth and make the necessary modifications to the method to ensure that it can be effectively applied to these special types of matrices.

2.4 Calculation of the matrix empirical function and vector product

The solution of block Krylov subspace is as the calculation of the matrix empirical function and vector product in:

(34) φ 0 ( A ) b 0 + φ 1 ( A ) b 1 + φ 2 ( A ) b 2 + + φ p ( A ) b p , ( 0 p < < n ) ,

where A R n × n is a large sparse matrix, i = 0 , 1 , , p , and b i R n . φ-functions have been introduced in the aforementioned analysis.

Among them,

(35) φ 0 ( z ) = e z , φ j ( z ) = 0 1 e ( 1 0 ) z θ j 1 ( j 1 ) ! d θ , j 1 .

They satisfy the recursion relation as follows:

(36) φ j + 1 ( z ) = φ j ( z ) 1 j ! z , φ 0 ( z ) = e z , j 0

They can be represented by exponential functions e z , such as:

(37) φ 1 ( z ) = e z 1 z , φ 2 ( z ) = e z 1 z z 2 , φ 3 ( z ) = e z 1 z z 2 2 z 3 ,

Several expressions need to be calculated for each time step of exponential integration. Therefore, the efficient solution of these expressions directly determines the calculation efficiency of the exponential integral.

When dealing with singular matrices or matrices with eigenvalues close to zero, various strategies are adopted to ensure the robustness and accuracy of the proposed method. First of all, for singular matrix, we study to improve the condition number of the matrix by introducing small regularization terms, which can make the matrix invertible without significantly affecting the characteristics of the matrix. In addition, for matrices with eigenvalues close to zero, we adopt preprocessing technology to improve the numerical stability of the matrix by appropriate transformation. In practical applications, these challenges can lead to numerical instability in the calculation process, especially when performing calculations of matrix exponential functions and vector products. Therefore, the adaptive selection of eigenvalues by the Krylov subspace method is used to avoid calculation errors caused by eigenvalues approaching zero.

In the past 20 years, the calculation of exponential matrix function and vector product has attracted the attention of many scholars, especially the calculation of the matrix exponential function and vector product. As pointed out earlier, Krylov subspace method is one of the most effective methods to solve large exponential matrix functions [14]. Many scholars at home and abroad are devoted to the application research of this method in matrix index, including the design and analysis of algorithm, the improvement of W and standard subspace method, etc. At present, the Krylov subspace has been solved by a wealth of algorithm skills and theoretical analysis, but for the general form of the problem, the relevant research is relatively less.

In Section 2.3, the calculation error of the matrix exponential function and vector product is analyzed in detail. The initial value problem of the matrix exponential function is given by:

(38) y ( t ) = φ 0 ( t A ) b 0 + j = 0 p 1 t j + 1 φ j + 1 ( t A ) b j + 1 ,

(39) y ' ( t ) = A y ( t ) + j = 0 p 1 t j j ! b j + 1 , y ( 0 ) = b 0 .

Similar to the standard block Krylov subspace method, this study still use the aforementioned relationship to complete the construction.

Without losing generality, the initial value problem with zero initial condition is considered:

(40) y ( t ) = A y ( t ) + j = 0 p 1 t j j ! b j + 1 , y ( 0 ) = 0 .

Suppose that B = [ b 1 , b 2 , , b p ] , P ( t ) = 1 , t , t 2 2 ! , , t p 1 ( p 1 ) ! T , the matrix exponential function can be written in the form of matrix as follows:

(41) y ( t ) = A y ( t ) + B P ( t ) , y ( 0 ) = 0 .

Multiply both sides of the matrix empirical function y ' ( t ) by A ˆ = ( I + γ A ) 1 at the same time, and there is

(42) A ˆ y ( t ) = ( I A ) γ y ( t ) + A ˆ B P ( t ) , y ( 0 ) = 0 .

where γ is predetermined.

QR decomposition of matrix B: B = V 1 R , where V 1 is a n × p -order orthogonal normal matrix, and R is a p-order upper triangular matrix. Applying block calculation to Krylov’s subspace K m ( A , V 1 ) , a set of orthogonal bases of linear space K m ( A , V 1 ) can be generated, which satisfies the product relationship between the matrix empirical function and the vector:

(43) ( I + γ A ) 1 V m = V m H m + V m + 1 H m + 1 , E m T = V m + 1 H m ,

where V m = [ V 1 , V 2 , , V m ] R m p × p , E m R m p × p , and H m = ( H i j ) is a matrix generated by the first m p lines of H m on a ( m + 1 ) p × m p -order block.

It should be noted that when the algorithm of the matrix exponential function and vector product is applied to a matrix ( I + γ A ) 1 , the product of the matrix exponential function and vector of (44) needs to be calculated in each step:

(44) ( I + γ A ) 1 V .

That is to solve the linear combination of the following formula:

(45) ( I + γ A ) x = V .

In this study, a sparse solution is used to calculate the product of the matrix exponential function and the vector. In the entire calculation process, only one calculation is required:

Suppose that T m = ( H m 1 I ) γ , then the matrix empirical function is rewritten as:

(46) V m T m = A V m + ( I + γ A ) γ V m + 1 H m + 1 E m T H m 1 .

In summary, the block Krylov subspace method is used to solve the product of exponential matrix functions and vectors, the error of the algorithm is analyzed, and a simple and reliable posterior error estimate is established. In order to keep the dimension of the Krylov subspace within a reasonable range, the block Krylov subspace method based on time step is introduced. By optimizing the time step h and the dimension m of the Krylov subspace, the minimum workload of the algorithm can meet the accuracy requirements to complete the calculation [15]. In addition, in order to solve the problem of potential numerical instability in the calculation of large matrices, the proposed method adopts a variety of techniques to ensure stability. In particular, when dealing with matrices with specific properties such as sparsity or symmetry, algorithms adapted to these properties are employed to reduce computational errors and enhance stability. For sparse matrix, Krylov subspace method combined with preprocessing technology is studied, which can not only effectively use the sparse structure of matrix to accelerate the calculation, but also reduce the numerical instability caused by the large number of matrix conditions. For symmetric matrices, the numerical integration scheme of symmetry preservation is adopted to ensure that the symmetry of the matrix is maintained in the integration process, which is crucial to maintain the stability and accuracy of the algorithm.

3 Results

The validity of the calculation method of the matrix exponential function and vector product is verified by numerical experiments. All experiments were performed on a laptop computer with an operating system of Windows 8 (Intel core i5, 2.6 GHz, and 6 GB of memory) using MATLAB software.

The relative errors used in the experiment are as follows:

(47) Error = | | y y m | | | | y | | ,

where y is the exact solution, which is the numerical solution. If there is no special explanation, the exact solution of each experiment is always calculated by the function ode45 of MATLAB.

Relative posterior error estimation is also used in error estimation. For convenience, this study still uses ε m 1 , ε m 2 , ε m 3 , and ε m 4 to represent the relative form of posterior error estimation, namely,

(48) ε m i ε m i | | y | | , y = 1 , 2 , 3 , 4 .

For calculations of medium and small (n < 1000) matrix exp (H), use MATLAB’s own function expm to directly solve.

This experiment is mainly to test the effectiveness of backward error estimation. To calculate the value of φ 0 ( t A ) b 0 + φ 1 ( t A ) b 1 + + φ 5 ( t A ) b 5 at t = ± 1 using the algorithm of the matrix exponential function and vector product, this study chose b 0 = 0 , b i = e i , and i = 1 , 2 , 3 , 4 , 5 . In this experiment, two commonly used test matrices are selected. The first matrix is a Markov chains matrix, from the package Expokit, recorded as c1024. The matrix is an asymmetric matrix with order n = 1.024 and nnz = 11.264 non-zero factors. The second matrix is a block-symmetric triangular matrix of 9801-order, which is discretely obtained by a two-dimensional Laplacian operator through standard finite difference methods, and can be generated by MATLAB commands [16]. In determining the convergence of the proposed numerical scheme, a strict set of criteria is used, including the analysis of the local truncation error, the monitoring of the spectral radius of the matrix, and the evaluation of the stability of the algorithm through various test cases. These criteria have been carefully chosen to ensure that they are consistent with the fundamental mathematical properties of matrices, exponential functions, and vector products. The robustness of the numerical scheme is reflected in its ability to consistently provide accurate results on different sets of matrices, including those with properties such as sparsity and symmetry, and even non-square matrices. This robustness is critical to the reliability of the proposed method and has been verified by a large number of numerical experiments. Therefore, convergence criteria are integral to the credibility of research methods, as they guarantee that the results are not only accurate but also stable, even with the potential numerical challenges inherent in large-scale matrix computation.

First, the problem of calculating matrix exponential function and vector product is defined as an abstract initial value problem. In this framework, matrix exponential functions are treated as generators of analytic semigroups, while vector products correspond to initial values. Using the theory of analytic semigroups, we can ensure the existence and uniqueness of analytic solutions when time tends to infinity. Next, by introducing B-series theory and two-color tree theory, we study the extraction of sequence expressions from numerical formats, in which the specific properties of matrices (such as sparsity and symmetry) are considered. The application of these theories allows accurate control of local truncation errors of numerical schemes, thus ensuring the convergence of numerical solutions. In addition, in order to verify the convergence of the numerical scheme, the stability and consistency conditions satisfied by the numerical scheme are analyzed. The stability condition ensures the stability of the numerical solution over time, while the consistency condition ensures that the error between the numerical solution and the analytical solution decreases as the step size decreases. By combining these theoretical analyses and conditions, the convergence of the numerical scheme is established: the proposed numerical scheme can converge to the analytical solution as long as the appropriate stability and consistency conditions are met. Figure 1 shows a graph of the true relative error of the first test matrix and the function of the relative posterior error estimate with respect to the number of iteration steps. The test results of the second test matrix are shown in Figure 2. It can be seen from the figure that first, in all cases, the algorithm of the matrix exponential function and vector product has a super-linear convergence speed and has completed a high calculation accuracy, reaching about 10 14 . Second, the extracted backward error estimation is also very effective, and it is basically completely consistent with the change trend of the real error. In some cases, these error estimates almost coincide with real errors. Among them, the error estimation is more effective, and the modified algorithm of the matrix exponential function and vector product has slightly higher accuracy, which is completely consistent with the previous discussion. It is worth pointing out that when t = −1, it is < 10 in the first few iteration steps, and the error estimation performance is not ideal. This is mainly because the vectors generated in the first few steps contain less effective information. The true error is almost horizontal in the first few steps, without noticeable changes. As the number of iteration steps increases, the effective information carried by the vector also gradually increases, and the error estimate gradually approaches the true error, which accurately reflects the changing characteristics of the true error. Similar phenomena have appeared in some other calculations of the matrix exponential function. In the initial iteration process, especially when the numerical solution does not change significantly, some more effective error estimates can be constructed to be used in conjunction. In this experiment, two commonly used test matrices are selected. The first matrix is a Markov chain matrix from the package exokit, recorded as c1024. The matrix is an asymmetric matrix with an order of n = 1.024 with nnz = 1,264 nonzero vultures. The second matrix is a block symmetric triangular matrix of order 9801, which is derived from a two-dimensional Laplacian operator discretized by a standard finite difference method and can be generated by the matlab command. Using [1] algorithm and this algorithm to test the error, and compare its error, the results are shown in Figures 14.

Figure 1 
               Comparison of estimated and actual errors.
Figure 1

Comparison of estimated and actual errors.

Figure 2 
               Comparison of estimated and actual errors.
Figure 2

Comparison of estimated and actual errors.

Figure 3 
               Comparison of estimated and actual errors.
Figure 3

Comparison of estimated and actual errors.

Figure 4 
               Comparison of estimated and actual errors.
Figure 4

Comparison of estimated and actual errors.

Figures 1 and 2 show the function image of [1] algorithm and the algorithm in this paper for the true relative error of the first test matrix as well as the relative posterior error estimate for the number of iterative steps. The test fruit for the second test matrix is placed in Figures 3 and 4. It can be seen in the figure: first of all, in all cases, [1] algorithm and the present algorithm have a superlinear convergence speed, all of which have completed a higher calculation accuracy of about 10–12; second, the extracted backward error estimation is also very effective, which is completely consistent with the actual error changing trend. In some cases, these error estimates are almost and the actual error is heavy. In this study, the source of error in matrix exponential function and vector product calculation methods is analyzed in detail, especially the error introduced by exponential function series truncation of matrix T. Through careful selection of the truncated series, the error caused by the truncated series is minimized. The experimental results show that although the series truncation will introduce some errors, this error can be effectively controlled by carefully selecting the truncation points and will not have a significant impact on the accuracy of the final calculation results. In addition, in practical applications, the propagation of errors is mainly affected by the cumulative effect of errors during calculation. To this end, the research adopts a variety of strategies to reduce error propagation, including the use of high-precision numerical integration schemes and optimization algorithms, which can reduce the accumulation of errors during iteration. Therefore, experimental verification ensures the stability and reliability of the proposed method in a wide range of application scenarios.

Four 10,000-order matrices were selected to compare the proposed method with the existing advanced algorithms, including [1,5] and [6], to verify the accuracy and computational complexity of the algorithm. The results are shown in Table 1.

Table 1

Experimental results of the 10,000-order matrix with existing advanced algorithms and this algorithm

Algorithm name −Wilkinson (10000) Gallery (“lesp,” 10,000) −2,500 × gallery (Poisson 99) con-diff-pe100
Error Time Error Time Error Time Error Time
[1] Algorithm 8.11 × 10−12 0.28 s 1.19 × 10−11 7.95 s 1.80 × 10−11 0.69 s 7.85 × 10−12 1.15 s
Algorithm of this paper 7.47 × 10−12 0.27 s 2.26 × 10−11 0.16 s 1.02 × 10−11 0.18 s 3.92 × 10−13 0.65 s
[5] Algorithm 2.84 × 10−11 0.93 s 4.14 × 10−10 5.64 s 1.63 × 10−10 1.64 s 4.24 × 10−12 2.41 s
[6] Algorithm 5.52 × 10−11 1.53 s 7.53 × 10−10 4.65 s 2.05 × 10−10 3.41 s 1.34 × 10−12 4.24 s
Reference [1] Algorithm F.c F.c F.c F.c
Algorithm of this paper 9.60 × 10−11 0.42 s 1.83 × 10−11 0.26 s 5.27 × 10−12 0.28 s 9.34 × 10−13 1.33 s
[5] Algorithm F.c F.c F.c F.c
[6] Algorithm 4.52 × 10−10 7.53 s 6.35 × 10−10 8.46 s 6.14 × 10−10 4.13 4.25 × 10−11 3.42 s

As can be seen from the table, in the comparison results of estimation errors, [1] the calculation method is quite different from the matrix exponential function and vector product methods proposed in the research. The stability of the proposed method is improved by 13.6% compared with the algorithm [1]. In addition, the calculation method of matrix exponential function and vector product can reduce the calculation error of matrix exponential function and vector product. The experimental results prove the validity of this study.

4 Conclusions

The exponential function method has a long history, but it is considered to be impractical for a long time. The need to compute the product of the dimension of the exponential matrix and the dimension of the vector is the main reason. In recent years, with the development of numerical algebra, especially the emergence of related algorithms for solving matrix functions and vector products based on the Krylov subspace method, the effective implementation of the exponential integration has become possible. First, the exponential integration of the problem is solved, and an exponential integration is constructed to solve the initial value of the large ordinary differential equation with a right-end term composed of a combination of non-linear functions with different characteristics. The general method for extracting these format order conditions is given by the two-color tree theory, and then, several specific numerical integration formats are constructed. Numerical experiments verify that these formats are valid. In addition, the numerical theoretical orders are basically the same. It is worth noting that the main advantage of this method is its robustness and accuracy when solving large-scale problems. This method is especially effective for equations composed of various nonlinear functions and has practical applicability in exponential integration of matrix functions. However, while the computational overhead has been shown to be minimal, the method does have its limitations. One of the limitations is its potential sensitivity to the choice of parameters and initial conditions, which can affect the speed and accuracy of the solution convergence. Although the method has been shown to be effective, the study was limited by experimental conditions and did not test its performance on different computational conditions such as high-performance computing systems, so adjustments may be required when applied to certain types of matrices that exhibit special spectral properties or when dealing with boundary conditions that deviate from standard assumptions. Future research will focus on the aforementioned aspects. In addition, regarding the inherent limitations of series truncation of exponential functions for a matrix T, the study realizes that truncation may introduce numerical errors. Although the appropriate truncation order is used to minimize the error, the number of series terms required may increase when the spectral radius of the matrix is large, thus affecting the computational efficiency. The numerical experiments of the study show that for most cases, this error is manageable and does not have a significant impact on the accuracy of the solution. Future work will explore strategies to reduce such errors.

  1. Funding information: None.

  2. Author contributions: Lihui Tu wrote original draft; Huanjie Hong conducted data analysis and method guidance.

  3. Conflict of interest: The authors declare that they have no conflict of interest.

  4. Data availability statement: The data that support the findings of this study are available from the corresponding author upon reasonable request. I confirm that all images are original.

References

[1] Nagiev AG, Sadikhov VV. The problem of aperture delay in digital measurement systems and its analytic solution by the matrix exponential method. Meas Tech. 2017;60(9):874–80.10.1007/s11018-017-1286-0Search in Google Scholar

[2] Gábor H, Miklós T. Matrix-analytic solution of infinite, finite and level-dependent second-order fluid models. Queueing Syst. 2017;87(1):1–19.Search in Google Scholar

[3] Zhao Q. Revised equation of enzymatic kinetics and thermodynamic mechanisms for directed evolution of enzymes. Int J Chem Kinet. 2022;54(5):295–9.10.1002/kin.21558Search in Google Scholar

[4] James VB, Gao Y, Tim H. Convex geometry of the generalized matrix-fractional function. SIAM J Optim. 2017;28(3):2189–200.10.1137/17M1119524Search in Google Scholar

[5] Hidekazu I. Spherical Bessel transform via exponential sum approximation of spherical Bessel function. J Comput Phys. 2017;355:426–35.10.1016/j.jcp.2017.11.016Search in Google Scholar

[6] Bancroft AJ, Levy CW, Jowitt TA. The major secreted protein of the whipworm parasite tethers to matrix and inhibits interleukin-13 function. Nat Commun. 2019;10(1):2344.10.1038/s41467-019-09996-zSearch in Google Scholar PubMed PubMed Central

[7] Gong XF, Jiang JC, Li H. Spatially spread dipole/loop quint for vector-cross-product based direction finding and polarization estimation. IET Signal Process. 2018;12(5):636–42.10.1049/iet-spr.2017.0232Search in Google Scholar

[8] Soer MC, Klumperink EA, van den Broek DJ, Nauta B, van Vliet FE. Beamformer with constant-gm vector modulators and its spatial intermodulation distortion. IEEE J Solid-State Circuits. 2017;99:1–12.10.1109/JSSC.2016.2639545Search in Google Scholar

[9] Wang YA, Shen B, Zou L. Recursive fault estimation with energy harvesting sensors and uniform quantization effects. IEEE/CAA J Automat Sin. 2022;9(5):926–9.10.1109/JAS.2022.105572Search in Google Scholar

[10] Li B, Ma S. Exponential convolution quadrature for nonlinear subdiffusion equations with nonsmooth initial data. SIAM J Numer Anal. 2022;60(2):503–28.10.1137/21M1421386Search in Google Scholar

[11] Thibos LN. Calculation of the geometrical point: pread function from wavefront aberrations. Ophthalmic Physiol Opt. 2019;39(4):232–44.10.1111/opo.12619Search in Google Scholar PubMed

[12] Viatcheslav B, Boris R, Lis GAM. First-principles X-ray absorption dose calculation for time-dependent mass and optical density. J Synchrotron Radiat. 2018;25(3):833–47.10.1107/S1600577518002655Search in Google Scholar PubMed

[13] Aziza JNA. Perbandingan Metode Moving Average, Single Exponential Smoothing, dan Double Exponential Smoothing Pada Peramalan Permintaan Tabung Gas LPG PT Petrogas Prima Services. J Teknol Manaj Ind. 2022;1(1):35–41.10.55826/tmit.v1iI.8Search in Google Scholar

[14] Ye L, Zhang Y, Ju Y. Gaussian mixture model for probabilistic power flow calculation of system integrated wind farm. Proc Chin Soc Electr Eng. 2017;37(15):4379–87.Search in Google Scholar

[15] Mou W, Ni S, Bai Y. Parallel correlation algorithm based on vector dot product. J Natl Univ Def Technol. 2017;39(5):50–5.Search in Google Scholar

[16] Gao W, Yel G, Baskonus HM, Cattani C. Complex solitons in the conformable (2 + 1)-dimensional Ablowitz-Kaup-Newell-Segur equation. Aims Math. 2020;5(1):507–21.10.3934/math.2020034Search in Google Scholar

Received: 2023-12-04
Revised: 2024-03-05
Accepted: 2024-03-31
Published Online: 2024-06-27

© 2024 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Editorial
  2. Focus on NLENG 2023 Volume 12 Issue 1
  3. Research Articles
  4. Seismic vulnerability signal analysis of low tower cable-stayed bridges method based on convolutional attention network
  5. Robust passivity-based nonlinear controller design for bilateral teleoperation system under variable time delay and variable load disturbance
  6. A physically consistent AI-based SPH emulator for computational fluid dynamics
  7. Asymmetrical novel hyperchaotic system with two exponential functions and an application to image encryption
  8. A novel framework for effective structural vulnerability assessment of tubular structures using machine learning algorithms (GA and ANN) for hybrid simulations
  9. Flow and irreversible mechanism of pure and hybridized non-Newtonian nanofluids through elastic surfaces with melting effects
  10. Stability analysis of the corruption dynamics under fractional-order interventions
  11. Solutions of certain initial-boundary value problems via a new extended Laplace transform
  12. Numerical solution of two-dimensional fractional differential equations using Laplace transform with residual power series method
  13. Fractional-order lead networks to avoid limit cycle in control loops with dead zone and plant servo system
  14. Modeling anomalous transport in fractal porous media: A study of fractional diffusion PDEs using numerical method
  15. Analysis of nonlinear dynamics of RC slabs under blast loads: A hybrid machine learning approach
  16. On theoretical and numerical analysis of fractal--fractional non-linear hybrid differential equations
  17. Traveling wave solutions, numerical solutions, and stability analysis of the (2+1) conformal time-fractional generalized q-deformed sinh-Gordon equation
  18. Influence of damage on large displacement buckling analysis of beams
  19. Approximate numerical procedures for the Navier–Stokes system through the generalized method of lines
  20. Mathematical analysis of a combustible viscoelastic material in a cylindrical channel taking into account induced electric field: A spectral approach
  21. A new operational matrix method to solve nonlinear fractional differential equations
  22. New solutions for the generalized q-deformed wave equation with q-translation symmetry
  23. Optimize the corrosion behaviour and mechanical properties of AISI 316 stainless steel under heat treatment and previous cold working
  24. Soliton dynamics of the KdV–mKdV equation using three distinct exact methods in nonlinear phenomena
  25. Investigation of the lubrication performance of a marine diesel engine crankshaft using a thermo-electrohydrodynamic model
  26. Modeling credit risk with mixed fractional Brownian motion: An application to barrier options
  27. Method of feature extraction of abnormal communication signal in network based on nonlinear technology
  28. An innovative binocular vision-based method for displacement measurement in membrane structures
  29. An analysis of exponential kernel fractional difference operator for delta positivity
  30. Novel analytic solutions of strain wave model in micro-structured solids
  31. Conditions for the existence of soliton solutions: An analysis of coefficients in the generalized Wu–Zhang system and generalized Sawada–Kotera model
  32. Scale-3 Haar wavelet-based method of fractal-fractional differential equations with power law kernel and exponential decay kernel
  33. Non-linear influences of track dynamic irregularities on vertical levelling loss of heavy-haul railway track geometry under cyclic loadings
  34. Fast analysis approach for instability problems of thin shells utilizing ANNs and a Bayesian regularization back-propagation algorithm
  35. Validity and error analysis of calculating matrix exponential function and vector product
  36. Optimizing execution time and cost while scheduling scientific workflow in edge data center with fault tolerance awareness
  37. Estimating the dynamics of the drinking epidemic model with control interventions: A sensitivity analysis
  38. Online and offline physical education quality assessment based on mobile edge computing
  39. Discovering optical solutions to a nonlinear Schrödinger equation and its bifurcation and chaos analysis
  40. New convolved Fibonacci collocation procedure for the Fitzhugh–Nagumo non-linear equation
  41. Study of weakly nonlinear double-diffusive magneto-convection with throughflow under concentration modulation
  42. Variable sampling time discrete sliding mode control for a flapping wing micro air vehicle using flapping frequency as the control input
  43. Error analysis of arbitrarily high-order stepping schemes for fractional integro-differential equations with weakly singular kernels
  44. Solitary and periodic pattern solutions for time-fractional generalized nonlinear Schrödinger equation
  45. An unconditionally stable numerical scheme for solving nonlinear Fisher equation
  46. Effect of modulated boundary on heat and mass transport of Walter-B viscoelastic fluid saturated in porous medium
  47. Analysis of heat mass transfer in a squeezed Carreau nanofluid flow due to a sensor surface with variable thermal conductivity
  48. Navigating waves: Advancing ocean dynamics through the nonlinear Schrödinger equation
  49. Experimental and numerical investigations into torsional-flexural behaviours of railway composite sleepers and bearers
  50. Novel dynamics of the fractional KFG equation through the unified and unified solver schemes with stability and multistability analysis
  51. Analysis of the magnetohydrodynamic effects on non-Newtonian fluid flow in an inclined non-uniform channel under long-wavelength, low-Reynolds number conditions
  52. Convergence analysis of non-matching finite elements for a linear monotone additive Schwarz scheme for semi-linear elliptic problems
  53. Global well-posedness and exponential decay estimates for semilinear Newell–Whitehead–Segel equation
  54. Petrov-Galerkin method for small deflections in fourth-order beam equations in civil engineering
  55. Solution of third-order nonlinear integro-differential equations with parallel computing for intelligent IoT and wireless networks using the Haar wavelet method
  56. Mathematical modeling and computational analysis of hepatitis B virus transmission using the higher-order Galerkin scheme
  57. Mathematical model based on nonlinear differential equations and its control algorithm
  58. Bifurcation and chaos: Unraveling soliton solutions in a couple fractional-order nonlinear evolution equation
  59. Space–time variable-order carbon nanotube model using modified Atangana–Baleanu–Caputo derivative
  60. Minimal universal laser network model: Synchronization, extreme events, and multistability
  61. Valuation of forward start option with mean reverting stock model for uncertain markets
  62. Geometric nonlinear analysis based on the generalized displacement control method and orthogonal iteration
  63. Fuzzy neural network with backpropagation for fuzzy quadratic programming problems and portfolio optimization problems
  64. B-spline curve theory: An overview and applications in real life
  65. Nonlinearity modeling for online estimation of industrial cooling fan speed subject to model uncertainties and state-dependent measurement noise
  66. Quantitative analysis and modeling of ride sharing behavior based on internet of vehicles
  67. Review Article
  68. Bond performance of recycled coarse aggregate concrete with rebar under freeze–thaw environment: A review
  69. Retraction
  70. Retraction of “Convolutional neural network for UAV image processing and navigation in tree plantations based on deep learning”
  71. Special Issue: Dynamic Engineering and Control Methods for the Nonlinear Systems - Part II
  72. Improved nonlinear model predictive control with inequality constraints using particle filtering for nonlinear and highly coupled dynamical systems
  73. Anti-control of Hopf bifurcation for a chaotic system
  74. Special Issue: Decision and Control in Nonlinear Systems - Part I
  75. Addressing target loss and actuator saturation in visual servoing of multirotors: A nonrecursive augmented dynamics control approach
  76. Collaborative control of multi-manipulator systems in intelligent manufacturing based on event-triggered and adaptive strategy
  77. Greenhouse monitoring system integrating NB-IOT technology and a cloud service framework
  78. Special Issue: Unleashing the Power of AI and ML in Dynamical System Research
  79. Computational analysis of the Covid-19 model using the continuous Galerkin–Petrov scheme
  80. Special Issue: Nonlinear Analysis and Design of Communication Networks for IoT Applications - Part I
  81. Research on the role of multi-sensor system information fusion in improving hardware control accuracy of intelligent system
  82. Advanced integration of IoT and AI algorithms for comprehensive smart meter data analysis in smart grids
Downloaded on 7.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/nleng-2024-0007/html
Scroll to top button