# User manual | INTRODUCTION TO COMPUTATIONAL MATHEMATICS ### MATHEMATICS

Course Notes for

CM 271 / AM 341 / CS 371

H. De Sterck

P. Ullrich

Department of Applied Mathematics

University of Waterloo

March 20th, 2006

These notes have been funded by

2

### Contents

1 Errors and Error Propagation 7

1.1

Sources of Error . . . . . . . . . . . . . . . . . . . . . . . . . . .

8

1.2

Floating Point Numbers and Operations . . . . . . . . . . . . . .

12

1.2.1

A Binary Computer . . . . . . . . . . . . . . . . . . . . .

13

1.2.2

Standard floating point systems . . . . . . . . . . . . . . .

14

1.2.3

Machine Precision . . . . . . . . . . . . . . . . . . . . . .

15

1.2.4

Floating Point Operations . . . . . . . . . . . . . . . . . .

17

1.3

Condition of a Mathematical Problem . . . . . . . . . . . . . . .

17

1.4

Stability of a Numerical Algorithm . . . . . . . . . . . . . . . . .

23

2 Root Finding 27

2.1

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

27

2.2

Four Algorithms for Root Finding . . . . . . . . . . . . . . . . .

28

2.2.1

Bisection Method . . . . . . . . . . . . . . . . . . . . . . .

28

2.2.2

Fixed Point Iteration . . . . . . . . . . . . . . . . . . . . .

30

2.2.3

Newton’s Method . . . . . . . . . . . . . . . . . . . . . . .

31

2.2.4

Secant Method . . . . . . . . . . . . . . . . . . . . . . . .

32

2.2.5

Stopping Criteria for Iterative Functions . . . . . . . . . .

32

2.3

Rate of Convergence . . . . . . . . . . . . . . . . . . . . . . . . .

33

2.4

Convergence Theory . . . . . . . . . . . . . . . . . . . . . . . . .

34

2.4.1

Fixed Point Iteration . . . . . . . . . . . . . . . . . . . . .

34

2.4.2

Newton’s Method . . . . . . . . . . . . . . . . . . . . . . .

41

2.4.3

Secant Method . . . . . . . . . . . . . . . . . . . . . . . .

43

2.4.4

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . .

44

3 Interpolation 45

3.1

Polynomial Interpolation . . . . . . . . . . . . . . . . . . . . . . .

46

3.1.1

The Vandermonde Matrix . . . . . . . . . . . . . . . . . .

46

3.1.2

Lagrange Form . . . . . . . . . . . . . . . . . . . . . . . .

48

3.1.3

Hermite Interpolation . . . . . . . . . . . . . . . . . . . .

51

3.2

Piecewise Polynomial Interpolation . . . . . . . . . . . . . . . . .

52

3.2.1

Piecewise Linear Interpolation . . . . . . . . . . . . . . .

53

3.2.2

Spline Interpolation . . . . . . . . . . . . . . . . . . . . .

54

3.2.3

Further Generalizations . . . . . . . . . . . . . . . . . . .

55

3

4 CONTENTS

4 Integration 57

4.1

Integration of an Interpolating Polynomial . . . . . . . . . . . . .

57

4.1.1

Midpoint Rule: y(x) degree 0 . . . . . . . . . . . . . . . .

58

4.1.2

Trapezoid Rule: y(x) degree 1 . . . . . . . . . . . . . . .

58

4.1.3

Simpson Rule: y(x) degree 2 . . . . . . . . . . . . . . . .

59

4.1.4

Accuracy, Truncation Error and Degree of Precision . . .

60

4.2

Composite Integration . . . . . . . . . . . . . . . . . . . . . . . .

61

4.2.1

Composite Trapezoid Rule . . . . . . . . . . . . . . . . . .

62

4.2.2

Composite Simpson Rule . . . . . . . . . . . . . . . . . .

63

4.3

Gaussian Integration . . . . . . . . . . . . . . . . . . . . . . . . .

64

5 Discrete Fourier Methods 67

5.1

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

67

5.2

Fourier Series . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

69

5.2.1

Real form of the Fourier Series . . . . . . . . . . . . . . .

69

5.2.2

Complex form of the Fourier Series . . . . . . . . . . . . .

71

5.3

Fourier Series and Orthogonal Basis . . . . . . . . . . . . . . . .

74

5.4

Discrete Fourier Transform . . . . . . . . . . . . . . . . . . . . .

77

5.4.1

Aliasing and the Sample Theorem . . . . . . . . . . . . .

81

5.5

Fast Fourier Transform . . . . . . . . . . . . . . . . . . . . . . . .

84

5.6

DFT and Orthogonal Basis . . . . . . . . . . . . . . . . . . . . .

87

5.7

Power Spectrum and Parseval’s Theorem . . . . . . . . . . . . .

90

6 Numerical Linear Algebra 93

6.1

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

93

6.2

Gaussian Elimination . . . . . . . . . . . . . . . . . . . . . . . . .

94

6.2.1

LU Factorization . . . . . . . . . . . . . . . . . . . . . . .

94

6.2.2

Pivoting . . . . . . . . . . . . . . . . . . . . . . . . . . . .

98

6.2.3

Algorithm and Computational Cost . . . . . . . . . . . .

99

6.2.4

Determinants . . . . . . . . . . . . . . . . . . . . . . . . . 104

6.3

Condition and Stability . . . . . . . . . . . . . . . . . . . . . . . 107

6.3.1

The Matrix Norm . . . . . . . . . . . . . . . . . . . . . . 107

6.3.2

Condition of the problem A~x = ~b . . . . . . . . . . . . . . 108

6.3.3

Stability of the LU Decomposition Algorithm . . . . . . . 111

6.4

Iterative Methods for solving A~x = ~b . . . . . . . . . . . . . . . . 113

6.4.1

Jacobi and Gauss-Seidel Methods . . . . . . . . . . . . . . 114

6.4.2

Convergence of Iterative Methods . . . . . . . . . . . . . . 115

### Mathematics

The goal of computational mathematics, put simply, is to find or develop algorithms that solve mathematical problems computationally (ie. using computers). In particular, we desire that any algorithm we develop fulfills four primary properties:

• Accuracy. An accurate algorithm is able to return a result that is numerically very close to the correct, or analytical, result.

• Efficiency. An efficient algorithm is able to quickly solve the mathematical problem with reasonable computational resources.

• Robustness. A robust algorithm works for a wide variety of inputs x.

• Stability. A stable algorithm is not sensitive to small changes in the input x.

These notes have been funded by...

5

6 CONTENTS

Chapter 1

### Propagation

In examining computational mathematics problems, we shall generally consider a problem of the following form:

Problem Consider an arbitrary problem P with input x. We must compute the desired output z = f

P

(x).

In general our only tools for solving such problems are primitive mathematical operations (for example, addition, subtraction, multiplication and division) combined with flow constructs (if statements and loops). As such, even simple problems such as evaluating the exponential function may be difficult computationally.

Example 1.1 Consider the problem P defined by the evaluation of the exponencomputationally.

Algorithm A.

Recall from calculus that the Taylor series expansion of the exponential function is given by exp(x) = 1 + x + x

2

2!

+ x

3

3!

+ ... = i=0 x i i!

.

(1.1)

Since we obviously cannot compute an infinite sum computationally without also using infinite resources, consider the truncated series constructed by only summing the first n terms. This yields the expansion n

X x i i!

i=0

(1.2)

7

8 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

As we will later see, this is actually a poor algorithm for computing the exponential - although the reason for this may not be immediately obvious.

1.1

Sources of Error

Computational error can originate from several sources, although the most prominent forms of error (and the ones that we will worry about in this text) come from two main sources:

1. Errors introduced in the input x. In particular, this form of error can be generally classified to be from one of two sources: a) Measurement error, caused by a difference between the “exact” value b) Rounding error, caused by a difference between the “exact” value x

Since infinite precision cannot be achieved with finite resources, the computational representation is a finite precision approximation of the exact value.

Consider, for example, the decimal number x = 0.00012345876543.

In order to standardize the representation of these numbers we perform normalization (such that the number to the left of the decimal point is 0 and the first digit right of the decimal point is nonzero).

x = 0. 12345876543

| {z } mantissa

×10

−3

.

x = fl(x) = 0.12346 × 10

−3

.

(1.3)

However, a computer can only represent finite precision, so we are not guaranteed to retain all digits from the initial number. Let’s consider a hypothetical “decimal” computer with at most 5 digits in the mantissa. The floating-point representation of x obtained on this computer, after rounding, is given by

(1.4)

The process of conversion to a floating point number gives us a rounding error equal to ∆x = x − ˆx = −0.00000123457.

2. Errors as a result of the calculation, approximation or algorithm. This form of error can again be generally classified to be from one of two sources: a) Truncation error. When truncating an infinite series to provide a finite approximation, the method inherently introduces an error. In

1.1.

SOURCES OF ERROR 9 example 1.1 we first considered truncating the infinite expansion as follows: z = exp(x) = i=0 x i i!

= n

X x i i=0 i!

+ i=n+1 x i i!

i=n+1 x i!

i

(1.5)

In this case, the truncation error is given by

T = z − ˆz = i=n+1 x i i!

(1.6) b) Rounding errors in elementary steps of the algorithm. For example, consider the addition of 1.234×10

7 and 5.678×10

3 in a floating point number system where we only maintain 4 digit accuracy (in base 10).

The exact result should be 1.2345678 × 10

7 instead calculate the result to be 1.235 × 10

7 but due to rounding we

.

In analyzing sources of error, it is often useful to provide a mathematical basis for the error analysis. In particular, there are two principal ways for providing a measure of the generated error.

ated in a specified floating point number system. Then the absolute error is given by

∆z = z − ˆz, (1.7) and the relative error (assuming z 6= 0) is given by

δz = z − ˆz z

.

(1.8)

Of course, considering the mathematical hardships often involved in analyzing our algorithms for error, there must be some justification in bothering with error analysis. Although the errors may be first perceived as being negligible, some numerical algorithms are “numerically unstable” in the way they propagate errors. In doing error analysis, we will often run into one of the following situations in computational mathematics:

1. The algorithm may contain one or more “avoidable” steps that each greatly amplify errors.

2. The algorithm may propagate initially small errors such that the error is amplified without bound in many small steps.

Consider the following example of the first kind of generated error:

Example 1.2 Consider the problem P with input x defined by the evaluation of the exponential function z = exp(x) (as considered in (1.1)). However, in performing the calculation, assume the following conditions:

10 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

• Assume “decimal” computer with 5 digits in the mantissa.

• Assume no measurement error or initial rounding error in x.

Consider solving this problem with input x = −5.5; we find a numerical approximation to the exact value z = exp(−5.5) ≈ 0.0040868.

In solving this problem, we first apply Algorithm A, truncating the series

P

24 i=0 x i i!

. Performing z

A

=

0.0057563 which an observant reader will notice has no significant digits in common with the exact solution. We conclude that precision was lost in this calculation, and in fact notice that the relative error is δz

−0.41 = −41%. This is a substantial error!

A

=

1 z

(z − ˆz

A

) =

So why does this instability occur?

Our answer to this question can be found in a related problem: Consider the subtraction of two numbers that are almost equal to one another.

Let x

1

= 0.100134826 with floating-point representation fl(x

1

The relative error in performing this approximation is δx

1

=

1 x

1

(x

1

4.8 × 10

−5

= 0.0048%.

) = 0.10013.

− fl(x

1

)) =

Let x

2

= 0.100121111 with floating-point representation fl(x

The relative error in performing this approximation is δx

2

=

1 x

2

(x

1

2

1.1 × 10

−5

= 0.0011%.

) = 0.10012.

− fl(x

2

)) =

So, in general, the approximation of these two numbers to their floating-point equivalents produce relatively small errors. Now consider the subtraction z = x

1

−x

2

. The exact solution to this is z = 0.000013715 and the computed solution using the floating-point representations is ˆ

1

) − fl(x

2

) = 0.00001. The

1 z

(z − ˆz) ≈ 27%. So what was an almost negligible error when performing rounding becomes a substantial error after we have completed the subtraction.

Thus, if possible, we will need to avoid these kind of subtractions when we are developing our algorithms. Looking back at the additions we performed in calculating exp(−5.5) (see Table I), we see that there were several subtractions performed of numbers of similar magnitude. Fortunately, we have an easy way around this if we simply take advantage of a property of the exponential, namely exp(−x) = (exp(x))

−1

. This provides us with Algorithm B:

1.1.

SOURCES OF ERROR i

Table I: Algorithm A applied to x = −5.5

i th term in series i th truncated sum

0

1

1.0000000000000

-5.5000000000000

1.0000000000000

-4.5000000000000

2 15.1250000000000

10.6250000000000

3 -27.7300000000000

-17.1050000000000

4 38.1280000000000

21.0230000000000

5 -41.9400000000000

-20.9170000000000

6 38.4460000000000

17.5290000000000

7 -30.2060000000000

-12.6770000000000

8 20.7670000000000

8.0900000000000

9 -12.6910000000000

10 6.9803000000000

11 -3.4900000000000

12 1.5996000000000

13 -0.6767600000000

14 0.2658700000000

15 -0.0974840000000

16 0.0335100000000

17 -0.0108420000000

18 0.0033127000000

19 -0.0009589000000

20 0.0002637100000

21 -0.0000690670000

22 0.0000172670000

23 -0.0000041289000

24 0.0000009462300

25 -0.0000002081700

26 0.0000000440350

-4.6010000000000

2.3793000000000

-1.1107000000000

0.4889000000000

-0.1878600000000

0.0780100000000

-0.0194740000000

0.0140360000000

0.0031940000000

0.0065067000000

0.0055478000000

0.0058115000000

0.0057424000000

0.0057597000000

0.0057556000000

0.0057565000000

0.0057563000000

0.0057563000000

11

12 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

Algorithm B.

Applying the truncated Taylor expansion for exp(5.5), we get the following formula for exp(−5.5): exp(x) = (

24

X

(−x) i i!

)

−1 i=0

(1.9) z

B value.

= 0.0040865, which matches 4 out of 5 digits of the exact

We conclude that Algorithm B is numerically stable (largely since it avoids cancellation). Similarly, Algorithm A is unstable with respect to relative error for the input x = −5.5. However, it is also worth noting that for any positive value of the input we are better off using Algorithm A - Algorithm B would end up with the same cancellation issues we had originally with Algorithm A.

1.2

Floating Point Numbers and Operations

Floating point numbers are the standard tool for approximating real numbers on a computer. Unlike real numbers, floating point numbers only provide finite precision - effectively approximating real numbers while still attempting to provide full functionality. Consider the following definition of a floating point number system:

Definition 1.2 A floating point number system is defined by three components:

• The base, which defines the base of the number system being used in the representation. This is specified as a positive integer b f

.

• The mantissa, which contains the normalized value of the number being represented. Its maximal size is specified as a positive integer m f

, which represents the number of digits allowed in the mantissa.

• The exponent, which effectively defines the offset from normalization.

Its maximal size is specified by a positive integer e f

, which represents the number of digits allowed in the exponent.

In shorthand, we write F [b = b f

, m = m f

, e = e f

].

Combined, the three components allow us to approximate any real number in the following form:

0. x

1 x

2

· · · x m

| {z } mantissa

× b

|{z} base y

1 y

2

· · · y e

| {z } exponent

(1.10)

Example 1.3 Consider a “decimal” computer with a floating point number system defined by base 10, 5 digits in the mantissa and 3 digits in the exponent. In shorthand, we write the system as F [b = 10, m = 5, e = 3].

1.2.

FLOATING POINT NUMBERS AND OPERATIONS 13

Consider the representation of the number x = 0.000123458765 under this system. To find the representation, we first normalize the value and then perform rounding so both the mantissa and exponent have the correct number of digits: input round x = 0.000123458765

normalize x = 0.123458765 × 10

−3 x = fl(x) = 0.12346 × 10

−003

Under this system, our mantissa is bounded by 99999 and the exponent is bounded by 999 (each representing the largest numbers we can display under this base in 5 and 3 digits, respectively). The largest number we can represent under this system is 0.99999 × 10

999 represent is 0.00001 × 10

−999

.

and the smallest positive number we can

Note: Instead of rounding in the final step, we can also consider “chopping”.

With chopping, we simply drop all digits that cannot be represented under our

−003 since all other digits simply would be dropped.

1.2.1

A Binary Computer

Instead of working in decimal (base 10), almost all computers work in binary

(base 2). We normally write binary numbers as (x) b to indicate that they are represented in binary.

Example 1.4 Consider the binary number x = (1101.011) b

. Similar to decimal, this notation is equivalent to writing x = 1 · 2

3

+ 1 · 2

2

+ 0 · 2

1

+ 1 · 2

= 8 + 4 + 1 + 0.25 + 0.125

0

= 13.375

+ 0 · 2

−1

+ 1 · 2

−2

+ 1 · 2

−3

Floating-point number conversions from binary work exactly the same way as decimal conversions, except for the new base:

Example 1.5 Consider the binary number x = (1101.011) b point system F [b = 2, m = 4, e = 3].

under the floatinginput x = (1101.011) b normalize x = (0.1101011)

= (0.1101011) b b

× 2

4

× 2

(100) b round x = fl(x) = (0.1101) b

= (0.1101) b

× 2

(100) b

× (10)

(100) b b

14 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

1.2.2

Standard floating point systems

Single Precision Numbers.

Single precision is one of the standard floating point number systems, where numbers are represented on a computer in a 32-bit chunk of memory (4 bytes). Each number in this system is divided as follows: s m m = 23 bits s e e = 7 bits

Here s m is the sign bit of the mantissa and s e is the sign bit for the exponent.

Recall that we normally write floating point numbers in the form given by

(1.10). The typical convention for sign bits is to use 0 to represent positive numbers and 1 to represent negative numbers.

Example 1.6 Consider the decimal number x = −0.3125. We note that we may write this in binary as x = −0.3125

= −(0 · 2

−1

+ 1 · 2

−2

= −(0.0101) b

= −(0.101) b

× 2

−1

= −(0.101) b

× 2

−(1) b

+ 0 · 2

−3

+ 1 · 2

−4

)

In the single precision floating point system F [b = 2, m = 23, e = 7] we may

Under the single-precision floating point number system, the largest and smallest numbers that can be represented are given as follows (without consideration for normalization, in the case of the smallest number).

x max

= |0|11111111111111111111111|0|1111111|

= (1 − 2

−23

) · 2

127

≈ 2

127

≈ 1.7 × 10

38 x min

= |0|00000000000000000000001|1|1111111|

= 2

−23

· 2

−127

= 2

150

≈ 7.0 × 10

−46

Note that there are 64 ways to represent zero under the single precision system proposed here (we only require that the mantissa is zero, meaning that the signed bits and exponent can be arbitrary). Under the IEEE standard (which is used by real computers) there are some additional optimizations that take advantage of this “lost” space:

1.2.

FLOATING POINT NUMBERS AND OPERATIONS 15

1. use of a signed integer for the exponent

2. only allow for one way to represent zero and use the free space to represent some smaller numbers

3. do not store the first 1 in the mantissa (because it is always 1 for a normalized number)

Double Precision Numbers.

Double precision is the other standard floating point number system. Numbers are represented on a computer in a 64-bit chunk of memory (8 bytes), divided as follows: s m m = 52 bits s e e = 10 bits

In this case, the maximum and minimum numbers that can be represented are x max

≈ 9 × 10

307 and x min

≈ 2.5 × 10

−324

, respectively.

1.2.3

Machine Precision

Recall that the relative error (defined by equation (1.8)) when converting a real number x to a floating point number is

δx = x − fl(x) x

.

(1.11)

This motivates the question: Is there a bound on the absolute value of the relative error |δx| for a given floating point number system?

An answer to this requires some delving into the way in which floating point numbers are represented. Consider the floating point number given by

±0.x

1 x

2

· · · x m

× b

±t with 1 ≤ x i

< b for i = 1, . . . , m. We then define the machine epsilon:

(1.12)

Definition 1.3 The machine epsilon ǫ mach such that fl(1 + ǫ) > 1.

is the smallest number ǫ > 0

We then present the following proposition:

Proposition 1.1 The machine epsilon is given by a) ǫ mach

= b

1−m if chopping is used b) ǫ mach

=

1

2 b

1−m if rounding is used

16 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

Proof.

For simplicity we only prove part (a) of the proposition. If rounding is used a more complex analysis will yield the result of part (b).

Consider the following subtraction:

1 + ǫ

1 ǫ ǫ

= 0.

= 0.

= 0.

= b

1−m

0

1

|{z} b

−1

1

|{z} x

1

0

|{z} b

−2

0

|{z} x

2

0

|{z} b

−3

0

|{z} x

3

· · ·

· · ·

0 0 · · ·

0

|{z} b

−( m

−1)

0

|{z} x m

−1

1

|{z} b

− m

0

|{z} x m

×b

1

×b

1

0 1

|{z} b

− m

×b

1

Theorem 1.1 For any floating point system F under chopping,

|δx| = | x − fl(x) x

| ≤ ǫ mach

.

Proof.

Consider the following calculation: x = 0.d

1 d

2 fl(x) = 0.d

1 d

2

· · · d m d m+1 d m+2

· · · ·b t

· · · d m

·b t

Thus combining these two equations yields

(1.13) x−fl(x) x

=

=

0.00···0d m +1 d m +2

···

0.d

1 d

2

···d m d m

+1 d m

+2

0.d

m

+1 d m

+2

···

0.d

1 d

2

···d m d m +1 d m +2

···

· b

−m

.

But we know the numerator is less than or equal to 1 (1 = 1 · b

0 denominator is greater than or equal to 0.1 (0.1 = 1 · b

−1

) and the

). So we may write:

(x − fl(x)) · x

−1

≤ (1) · (b

−1

= b

−m+1

)

−1

= ǫ mach

· b

−m

Note.

Since δx =

1 x

(x − fl(x)), we may also write fl(x) = x(1 − δx) with

|δx| ≤ ǫ mach

. Hence we often say fl(x) = x(1 + η) with |η| ≤ ǫ mach

.

(1.14)

Single Precision.

10

−6

Under single precision, m = 23 and so ǫ = 2

. Thus |δx| ≤ 0.24 × 10

−6

−22

≈ 0.24 ×

, and so we expect 6 to 7 decimal digits of accuracy.

1.3.

CONDITION OF A MATHEMATICAL PROBLEM 17

Double Precision.

Under double precision, m = 52 and so ǫ = 2

−51

0.44 × 10

−15

. Thus |δx| ≤ 0.44 × 10

−15

, and so we expect 15 to 16 decimal digits of accuracy.

1.2.4

Floating Point Operations

Definition 1.4 The symbol ⊕ is used to denote floating point addition, defined as a ⊕ b = fl(fl(a) + fl(b)) (1.15)

Proposition 1.2 For any floating point number system F, a ⊕ b = (fl(a) + fl(b))(1 + η) with |η| ≤ ǫ mach

. This may also be written as

(1.16) a ⊕ b = (a(1 + η

1

) + b(1 + η

2

))(1 + η) (1.17) with |η

1

|, |η

2

|and|η| ≤ ǫ mach

. In general the operation of addition under F is not associative. That is,

(a ⊕ b) ⊕ c 6= a ⊕ (b ⊕ c).

(1.18)

Note: There are analogous operations for subtraction, multiplication and division, written using the symbols ⊖, ⊗, and ⊘.

1.3

Condition of a Mathematical Problem output z = f

P very sensitive to small deviations in the input data, in which case there are a variety of problems (such as rounding in input data) which make accurate approximation on a computer difficult.

Definition 1.5 We say that a problem P is well-conditioned with respect to the absolute error if small changes ∆~x in ~x result in small changes ∆~z in ~z.

Similarly, we say P is ill-conditioned with respect to the absolute error if small changes ∆~x in ~x result in large changes ∆~z in ~z.

Definition 1.6 The condition number of a problem P with respect to the absolute error is given by the absolute condition number κ

A

:

κ

A

= |∆z|/k∆~xk.

(1.19)

The condition number with respect to the relative error is given by the relative condition number κ

R

:

κ

R

=

|∆z|/|z| k∆~xk/k~xk

(1.20)

18 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

If κ

A and κ

R are “small” we can generally infer that P is well-conditioned.

As a guideline, if κ

A and κ

R are between 0.1 and 10 we can consider them to be “small.” Similarly, if κ

A and κ

R we can say that P is ill-conditioned.

are “large” (tend to ∞ or “blow up”) then

Example 1.

Consider the mathematical problem P defined by z = x + y.

We wish to examine how the errors in x and y propagate to z. We define our approximations by ∆x = x − ˆx or ˆx = x − ∆x, where ∆x is the error in x.

Similarly, we have ∆y = y − ˆy or ˆy = y − ∆y, where ∆y is the error in y. In and so we define our error by

∆z = z − ˆz = ∆x + ∆y.

(1.25) a) Condition with respect to the absolute error

We attempt to find an upper bound for κ

A

. Using equation (1.25) and the 1-norm (1.23), we can write

κ

A

=

|∆z| k(∆x, ∆y)k

1

=

|∆x + ∆y|

|∆x| + |∆y|

.

But by the triangle inequality we have |∆x + ∆y| ≤ |∆x| + |∆y| and so yield

κ

A

|∆x| + |∆y|

|∆x| + |∆y|

= 1.

(1.26)

We conclude that P is well-conditioned with respect to the absolute error.

b) Condition with respect to the relative error

We attempt to find an upper bound for κ

R

. Consider the relative error in z, given by

|δz| =

|∆z|

|z|

=

|∆x + ∆y|

.

|x + y|

We can clearly see here that if x ≈ −y then |δz| can be very large, even though |∆x|/|x| and |∆y|/|y| may not be large. The relative condition number is thus

κ

R

=

|∆z|/|z| k∆~xk

1

/k~xk

1

=

|∆x + ∆y|/|x + y|

|∆x + ∆y|/(|x| + |y|)

=

|x| + |y|

.

|x + y|

(1.27)

Thus we see that κ

R can grow arbitrarily large when x ≈ −y.

We conclude that the problem z = x + y is ill-conditioned with respect to the relative error only in the case x ≈ −y.

1.3.

CONDITION OF A MATHEMATICAL PROBLEM 19

Intermission: Vector Norms

Vector norms are a useful tool for providing a measure of the magnitude of a vector, and are particularly applicable to derivations for the condition number.

Definition 1.7 Suppose V is a vector space over R n

. Then k · k is a vector norm on V if and only if k~vk ≥ 0, and a) k~vk = 0 if and only if ~v = ~0 b) kλ~vk = |λ|k~vk ∀ ~v ∈ V, ∀ λ ∈ R c) k~u + ~vk ≤ k~uk + k~vk ∀ ~u, ~v ∈ V (triangle inequality)

There are three standard vector norms known as the 2-norm, the ∞-norm and the 1-norm.

Definition 1.8 The 2-norm over R n is defined as k~xk

2

= v u u t n

X x

2 i i=1

(1.21)

Definition 1.9 The ∞-norm over R n is defined as k~xk

= max

1≤i≤n

(x i

)

Definition 1.10 The 1-norm over R n is defined as k~xk

1

= n

X

|x i

| i=1

(1.22)

(1.23)

Further, all vector norms that are induced by an inner product (including the 1norm and 2-norm - but not the ∞-norm) satisfy the Cauchy-Schwartz Inequality, which will be of use later:

Theorem 1.2 Cauchy-Schwartz Inequality. Let k · k be a vector norm over a vector space V induced by an inner product. Then

|~x · ~y| ≤ k~xkk~yk (1.24)

20 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

Example 2.

Consider the mathematical problem P defined by z = x · y. We define our approximations by ∆x = x − ˆx and ∆y = y − ˆy as in Example 1. In and so we define our error by

= xy − y∆x − x∆y +

≈ xy − y∆x − x∆y neglect z }| {

∆x∆y

∆z ≈ y∆x + x∆y = (x, y) · (∆y, ∆x).

The relative error in z is given by

δz ≈

1 xy

(y∆x + x∆y) =

∆x x

+

∆y y

.

(1.28)

(1.29) a) Condition with respect to the absolute error

We attempt to find an upper bound for κ

A

. Using equation (1.28) and the Cauchy-Schwartz Inequality (1.24), we can write

κ

A

=

|∆z| k(∆x, ∆y)k

≤ k(x, y)k

2 k(∆x, ∆y)k

2 k(∆x, ∆y)k

2

= k(x, y)k

2

.

We conclude that P is well-conditioned with respect to the absolute error, except when x or y are large.

b) Condition with respect to the relative error

From (1.29) we have that

δz ≈

∆x x

+

∆y y

= δx + δy and so can immediately conclude that P is well-conditioned with respect to the relative error. In fact, in this particular case

κ

R

=

|∆z|/|z| k∆~xk/k~xk does not easily yield a useful bound.

1.3.

CONDITION OF A MATHEMATICAL PROBLEM 21

Intermission:

Asymptotic Behaviour of Polynomials

We wish to consider a general method of analyzing the behaviour of polynomials in two cases: when x → 0 and when x → ∞. In particular, if we are only interested in the asymptotic behaviour of the polynomial as opposed to the exact value of the function, we may employ the concept of Big-Oh notation.

Definition 1.11 Suppose that f (x) is a polynomial in x without a constant term. Then the following are equivalent: a) f (x) = O(x n

) as x → 0.

b) ∃ c > 0, x

0

> 0 such that |f(x)| < c|x| n

∀ x with |x| < |x

0

|.

c) f (x) is bounded from above by |x| n

, up to a constant c, as x → 0.

This effectively means that the dominant term in f (x) is the term with x n x → 0, or f(x) goes to zero with order n.

as

Example 1.7 Consider the polynomial g(x) = 3x

2 say

+ 7x g(x) = O(x

2 g(x) 6= O(x

3 g(x) = 3x

2

) as x → 0

) as x → 0

+ O(x

3

) as x → 0

3

+ 10x

4

+ 7x

12

. We

We note that g(x) = O(x) as well, but this statement is not so useful because it is not a sharp bound.

We may also consider the behaviour of a polynomial as x → ∞.

Definition 1.12 Suppose that f (x) is a polynomial in x. Then the following are equivalent: a) f (x) = O(x n

) as x → ∞.

b) ∃ c > 0, x

0

> 0 such that |f(x)| < c|x| n

∀ x with |x| > |x

0

|.

c) f (x) is bounded from above by |x| n

, up to a constant c, as x → ∞.

As before, this effectively means that the dominant term in f (x) is the term with x n as x → ∞, or f(x) goes to infinity with order n.

Example 1.8 Consider the polynomial g(x) = 3x

2 say

+ 7x g(x) = O(x

12

) as x → ∞ g(x) 6= O(x

8 g(x) = 7x

12

) as x → ∞

+ O(x

4

) as x → ∞

3

+ 10x

4

+ 7x

12

. We

22 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

Addition and Multiplication of Terms Involving Big-Oh

We can also add and multiply terms using Big-Oh notation, making sure to neglect higher order terms: f (x) = x + O(x

2

) g(x) = 2x + O(x

3

) as x → 0 as x → 0 f (x) + g(x) = 3x + O(x

2

) + O(x

3

)

= 3x + O(x

2

) as x → 0 as x → 0 f (x) · g(x) = 2x

2

= 2x

2

+ O(x

3

) + O(x

4

) + O(x

5

)

+ O(x

3

) as x → 0 as x → 0

Applications to the Taylor Series Expansion

Recall that the Taylor series expansion for a function f (x) around a point x

0 given by is f (x

0

+ ∆x) =

X n=0

1 n!

f

(n)

(x

0

)(∆x) n

(1.30)

We may expand this formula and write it in terms of Big-Oh notation as follows: f (x

0

+ ∆x) = f (x

0

+ f

+

+

1

2

1

6

′ f

(x

0

′′

)∆x

(x

0

)∆x

2 f

′′′

)

(x

+ O(∆x

4

0

)∆x

3

) as ∆x → 0

1.4.

STABILITY OF A NUMERICAL ALGORITHM 23

1.4

Stability of a Numerical Algorithm

Consider a problem P with input x which requires the computation of a desired output z = f

P

(x). If we assume that P is well-conditioned, then by definition we have that k∆~xk small ⇒ |∆z| small k∆~xk/k~xk small ⇒ |∆z/z| small

For this well-conditioned problem, some algorithms may be numerically unstable, i.e. they may produce large errors |∆z| or |δz|, while other algorithms may be stable.

Example 1.9 Stability with respect to the relative error. Consider the problem

P defined by z = exp(x) with x = 5.5. The approximate values for x and z are

(1.31)

A) We investigate the condition of P as follows: a) With respect to ∆ we have

κ

A

=

|∆z|

|∆x|

=

|z − ˆz|

|x − ˆx|

=

| exp(x) − exp(x − ∆x)|

.

|x − ˆx|

We apply the Taylor series expansion given by exp(x − ∆x) = exp(x) − exp(x)∆x + O(∆x

2

)

(1.32)

(1.33) to yield,

κ

A

= | exp(x) − (exp(x) − exp(x)∆x + O(∆x

2

))| / |x − ˆx|

≈ | exp(x)∆x| / |∆x|

= | exp(x)|, for small |∆x|. We conclude that the problem is well conditioned with respect to ∆, except for large x.

b) With respect to δ we have

κ

R

=

|∆z|/|z|

|∆x|/|x|

=

¯

¯

¯

∆z

∆x

¯

¯

¯

¯

¯

¯ x z

¯

¯

¯ ≈ | exp(x)|

|x|

| exp(x)|

= |x|.

(1.34)

We conclude that the problem is well conditioned with respect to δ, except for large x.

24 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

B) Now that we know that problem P is well conditioned, we can investigate the stability of our algorithms for P.

Recall Algorithm A, given by (1.2). We determined that this algorithm is unstable with respect to δ for x < 0. This was due to a cancellation of nearly equal values in the subtraction, and so the algorithm was unstable due to ill-conditioned steps that could be avoided.

Recall Algorithm B, given by (1.9). As opposed to Algorithm A, this algorithm is stable with respect to δ for x < 0.

Example 1.10 Instability with respect to absolute error ∆. Consider the problem P defined by z = z are denoted ˆ

R

1

0 x n x+α dx where α > 0. The approximate values for α and z respectively. It can be shown that P is well-conditioned

(for instance with respect to the integration boundaries 0 and 1).

We derive an algorithm for solving this problem using a recurrence relation.

In deriving a recurrence, we need to consider the base case (a) and the recursive case (b) and then ensure that they are appropriately related.

a) Consider n = 0:

I

0

=

R

0

1

1 x+α dx

¯

¯

1

= log(x + α)

0

= log(1 + α) − log(α) and so we get

I

0

= log(

1 + α

α

).

b) For general n we can derive the following recurrence:

I n

=

=

=

=

R 1

0

R

1

0

R

1 x

0 n n x n

−1 x x+α n

−1 x dx

(x+α−α) x+α x n−1 dx − α dx

R

1

0

¯

¯

1

0

− αI n−1 x n

−1 x+α dx which yields the expression

(1.35)

I n

=

1 n

− αI n−1

.

(1.36)

Thus we may formulate an algorithm using the base case and the recurrence:

1.4.

STABILITY OF A NUMERICAL ALGORITHM 25

Algorithm A.

1. Calculate I

0 from (1.35).

2. Calculate I

1

, I

2

, . . . , I n using (1.36).

An implementation of this algorithm on a computer provides the following results, for two sample values of α:

α = 0.5

−→ I

100

≈ 6.64 × 10

−3

α = 2.0

−→ I

100

≈ 2.1 × 10

22

For α = 2.0, we obtain a very large result! This may be a first indication that something is wrong. From the original equation we have that

I

100

=

Z

1

0 x

100 x + α dx ≤

1

1 + α

· 1 = 1/3.

(1.37)

Hence we conclude something is definitely amiss. We need to consider the propagation of the error in our algorithm, since we know that the algorithm is definitely correct using exact arithmetic.

Consider I n

I n the numerical approximation. Then the absolute error at each step of the algorithm is given by ∆I n

= I n

I n

. Thus the initial error is ∆I

0

The the exact value satisfies

= I

0

I

0

= I

0

− fl(I

0

).

I n

=

1 n

− αI n−1

(1.38) and the numerical approximation is calculated from

I n

=

1 n

I n−1

+ η n

, (1.39) where η n is the rounding error we introduce in step n.

For a first analysis, we neglect η n the initial error ∆I

0 only. Then and simply investigate the propagation of

∆I n

= I n

= (

1 n

I n

− αI n−1

) − (

= −α(I n−1

= −α∆I n−1

I n−1

.

)

1 n

I n−1

)

Applying recursion yields an expression for the accumulated error after n steps:

∆I n

= (−α) n

∆I

0

.

(1.40)

26 CHAPTER 1.

ERRORS AND ERROR PROPAGATION

Conclusion.

From this expression, we note that there are potentially two very different outcomes: a) If α > 1 then the initial error is propagated in such a way that blow-up occurs. Thus Algorithm A is numerically unstable with respect to ∆.

b) If α ≤ 1 then the initial error remains constant or dies out. Thus Algorithm A is numerically stable with respect to ∆.

We note that further analysis would lead to the conclusion that the rounding error η n is also propagated in the same way as the initial error ∆I

0

. These results confirm the experimental results observed in the implementation.

These notes have been funded by...

Chapter 2

### Root Finding

2.1

Introduction

The root finding problem is a classical example of numerical methods in practice.

The problem is stated as follows:

Problem Given any function f (x), find x

∗ x

∗ is called a root of the equation f (x) = 0.

such that f (x

) = 0. The value x

If f (x) = 0 has a root x

∗ there is no truly guaranteed method for finding computationally for an arbitrary function, but there are several techniques which are useful for many cases. A computational limitation inherent to this problem can be fairly easily seen by an observant reader: any interval of the real line contains an infinite number of points, but computationally we can solve this problem with only a finite number of evaluations of the function f .

Additionally, since the value x

∗ may not be defined in our floating point number system, we will not be able to find x

∗ exactly. Therefore, we consider a computational version of the same problem:

Problem (Computational) Given any f (x) and some error tolerance ǫ > 0, find x

∗ such that |f(x

)| < ǫ.

We will only consider functions which are continuous in our analysis.

Example 2.1

1) Consider the function f (x) = x

2

+ x − 6 = (x − 2)(x + 3). The function f (x) = 0 has two roots at x=2, -3.

2) With f (x) = x f (x

) = 0 and f

2

− 2x + 1 = (x − 1)

2

(x

) = 0).

= 0, x = 1 is a double root (i.e.

27

28 CHAPTER 2.

ROOT FINDING

3) f (x) = 3x

5

+ 5x

4

+

1

3 x

3

+ 1 = 0. We have no general closed form solution for the roots of a polynomial with degree larger than 4. As a result, we will need to use numerical approximation by iteration.

4) f (x) = x

2

1

2 exp(−x) = 0. This is naturally more difficult to solve because exp(−x) is a transcendental function. In fact, f(x) = 0 is called the transcendental equation and can only be solved with numerical approximation.

Definition 2.1 We say that x

∗ f (x

) = 0 and f

(x

) = 0.

is a double root of f (x) = 0 if and only if

We naturally examine this computational problem from an iterative standpoint. That is, we wish to generate a sequence of iterates (x k

) such that any iterate x k+1 can be written as some function of x k

, x k−1

, . . . , x

0

. We assume that some initial conditions are applied to the problem so that x p

, x p−1

, . . . x

0 are either given or arbitrarily chosen. Obviously, we require that the iterates actually converge to the solution of the problem, i.e. x

= lim k→∞ x k

.

A natural question to ask might be, “how do we know where a root of a function may approximately be located?” A simple result from first year calculus will help in answering this:

Theorem 2.1 (Intermediate Value Theorem) If f (x) is continuous on a closed interval [a, b] and c ∈ [f(a), f(b)], then ∃ x

∈ [a, b] such that f(x

) = c.

Thus if we can find [a, b] such that f (a) · f(b) < 0 then by the Intermediate Value Theorem, [a, b] will contain at least one root x

∗ as long as f (x) is continuous.

2.2

Four Algorithms for Root Finding

2.2.1

Bisection Method

The bisection method is one of the most simple methods for locating roots, but is also very powerful as it guarantees convergence as long as its initial conditions are met. To apply this method, we require a continuous function f (x) and an initial interval [a, b] such that f (a) · f(b) ≤ 0. This method effectively works by bisecting the interval and recursively using the Intermediate Value Theorem to determine a new interval where the initial conditions are met.

2.2.

FOUR ALGORITHMS FOR ROOT FINDING 29

Theorem 2.2 If f (x) is a continuous function on the interval [a

0

, b

0

] such that f (a

0

) · f(b

0

) ≤ 0 then the interval [a k

, b k

], defined by a k

=

 a k−1 if f ((a k−1

(a + b)/2 otherwise

+ b k−1

)/2) · f(a k−1

) ≤ 0

(2.1) b k

=

 b k−1

(a + b)/2 if f ((a k−1 otherwise

+ b k−1

)/2) · f(a k−1

) > 0

(2.2) fulfills the property f (a k

) · f(b k

) ≤ 0 ∀ k.

Algorithm: Bisection Method in: f (x), [a, b], tolerance t out: x, an approximation for x

∗ while |b-a| > t c = (a+b)/2 if f(a)*f(c) <= 0 keep a, b = c else keep b, a = c end if end while x = (a+b)/2

When applying the bisection method, we only require continuity of the function f (x) and an initial knowledge of two points a

0 and b

0 such that f (a

0

) · f(b

0

) ≤ 0. We are guaranteed the existence of a root in the interval

[a

0

, b

0

] by the Intermediate Value Theorem (2.1) and are further guaranteed that the bisection method will converge to a solution.

We consider the question of “speed of convergence,” namely given a, b and t, how many steps does it take to reach t? If we suppose that x then at each iteration the interval containing x

= lim k→∞ x k is halved. Thus, assuming it takes n steps to fulfill |b − a| ≤ t we have that

2

−n

|b − a| ≤ t n log 2 ≥ log(

|b−a| t n ≥

1 log 2 log(

)

|b−a| t

).

Thus we conclude that for a given tolerance t and initial interval [a, b], bisection will take

30 CHAPTER 2.

ROOT FINDING n ≥

1 log 2 log(

|b − a| t

) (2.3) steps to converge.

Example 2.2 Given |b − a| = 1 and t = 10

−6 converge? From (2.3) we have that

, how many steps does it take to n ≥

1 log

10

(2)

⇒ n ≥ 3.4 · 6

⇒ n ≥ 20.

log

10

(10

6

)

(compare with 2

20

≈ 1.05 × 10

6

).

2.2.2

Fixed Point Iteration

We note that we may rewrite the root-finding problem in an alternate way that may not be immediately obvious. Consider the real-valued function g, defined by g(x) = x − f(x). We note that this function inherits the continuity of f in an interval [a, b]. We can also write f (x) = x − g(x) in order to obtain our original function f (x). The problem of root-finding for our original function is hence equivalent to the problem of finding a solution to g(x) = x.

Definition 2.2 We say that x

∗ x

∗ is mapped to itself under g.

is a fixed point of g(x) if g(x

) = x

, i.e. if

We note that if our function g has certain desirable properties (in particular, as will be shown later, if |g

(x

)| < 1 and x

0 is ”close enough” to x

), then repeated application of g will actually cause us to converge to this fixed point.

This implies we can write our algorithm for fixed-point iteration as follows:

Algorithm: Fixed Point Iteration in: g(x), x

0

, tolerance t out: x, an approximation for x

∗ i = 0 repeat i = i + 1 x[i] = g(x[i-1]) until |x[i] - x[i-1]| < t x = x[i]

2.2.

FOUR ALGORITHMS FOR ROOT FINDING 31

We note that it is not required that we limit ourselves to the choice of g(x) = x −f(x) in applying this scheme. In general we can write g(x) = x−H(f(x)) as long as we choose H such that H(0) = 0. Not all choices will lead to a converging method. For convergence we must also choose H such that |g

′ later).

(x

)| < 1 (see

2.2.3

Newton’s Method

Certain additional information may be available about our function that may assist in constructing a root-finding method. In particular, knowledge of the first derivative of f (x) motivates the use of Newton’s method. Consider the

Taylor series expansion of f (x

) about an initial estimate x

0

: f (x

) = f (x

0

) + f

(x

0

)(x

− x

0

) + O((x

− x)

2

).

If we take this sequence to leading order, we have that

(2.4) f (x

) ≈ f(x

0

) + f

(x

0

)(x

− x

0

).

(2.5)

But we know that f (x

) = 0 and so we find a new, often better approximation x

1 from x

0 by requiring that f (x

0

) + f

(x

0

)(x

1

− x

0

) = 0.

(2.6)

Rearranging and taking the sequence in general yields the defining equation for

Newton’s method: x i+1

= x i

− f(x i

)/f

(x i

).

(2.7)

We note that we will need to look out for the case where f

(x i

) = 0, since this will lead to a division by zero. Otherwise, this derivation allows us to provide an algorithm for applying Newton’s method numerically:

Algorithm: Newton’s Method in: f (x), f

(x), x

0

, tolerance t out: x, an approximation for x

∗ i = 0 repeat i = i + 1 if f’(x[i-1]) == 0 stop x[i] = x[i-1] - f(x[i-1]) / f’(x[i-1]) until |x[i] - x[i-1]| < t x = x[i]

32 CHAPTER 2.

ROOT FINDING

2.2.4

Secant Method

Newton’s method provides very fast convergence, but relies on the knowledge of f

(x). If this derivative is not known, not easily computable, or if f (x) is not explicitly given but is the output of a computer program, then we will be unable to apply Newton’s method. However, we can approximate the derivative using a numerical scheme that requires only evaluations of the function f (x). From the definition of the derivative we know that f

(x i

) = lim

η→x i f (x i x

) − f(η) i

− η

≈ f (x i

) − f(η)

.

x i

− η

If we choose η = x i−1 then we approximate the derivative as

(2.8) f

(x i

) ≈ f (x i x

) − f(x i

− x i−1 i−1

)

.

(2.9)

This result can be plugged into Newton’s method to give the defining equation for the Secant method: x i+1

= x i

− f(x i

)

" x i

− x i−1 f (x i

) − f(x i−1

)

#

.

(2.10)

Note that this method actually requires the two previous values (x i and x i−1

) in order to compute x i+1

. Thus, we also need two initial values x

0 and x

1 in order to begin iteration. Also, as in Newton’s method where we needed to check for f

(x i

) = 0 here we need to be wary of the case where f (x i

) ≈ f(x i−1

), as this will potentially give undesirable results.

2.2.5

Stopping Criteria for Iterative Functions

For any iterative algorithm that approximates a root x

∗ we need to consider a stopping criterion. There are several general criteria for stopping, which can be combined if necessary.

1. Maximum number of steps. Using this method for stopping, we impose some maximum number of steps in the iteration i max and stop when i = i max

. This provides a safeguard against infinite loops, but is not very efficient - i.e. even if we are very close to the root after 1 iteration, this method will always run for the same number of iterations.

2. Tolerance on the size of the correction. Under this criterion, we are given some tolerance t and stop when |x i+1

− x i

| ≤ t. Under the bisection method and fixed-point iteration (with “spiral-wise” convergence, see later) we actually are able to guarantee that |x i+1

−x

∗ this criterion does not guarantee that |x i+1

− x

| ≤ t. Unfortunately,

| ≈ t, in general.

2.3.

RATE OF CONVERGENCE 33

This may not work very well if one desires a small function value in the approximate root for steep functions such as f (x) = a(x − x

) with a =

10

11

. Even a small error in x will mean a large value for f (x).

3. Tolerance on the size of the function value. Under this criterion, we are given some tolerance t and stop when |f(x i

)| < t. This may not work well for a flat function such as f (x) = a(x − x

) with a = 10

−9

. In this case, for x i far from x

, |f(x i

)| may be smaller than t.

In conclusion, choosing a good stopping criterion is difficult and dependent on the problem. Often trial and error is used to determine a good criterion and combines any of the aforementioned options.

2.3

Rate of Convergence

We wish to examine how quickly each of the four methods discussed here converges to the root x

, assuming that convergence occurs. In section 2.4 we will discuss the criteria necessary for convergence of each method.

In order to lay a foundation for this discussion, we must consider how rate of convergence is measured. We first consider the error at each step of the iteration:

Definition 2.3 For a sequence {x i

}

∞ i=0 and point x

, the error at iteration i is e i

= x i

− x

.

(2.11)

We will define the rate of convergence by how quickly the error converges to zero (and hence how quickly {x x

, then we note that lim i→∞ e i i

}

∞ i=0 converges to x

= ±∞.

). If {x i

}

∞ i=0 diverges from

Definition 2.4 The sequence {x i

} if {x i

}

∞ i=1 converges to x

, lim i→∞

∞ i=1 c i converges to x

∗ with order q if and only

= N when N ∈ [0, ∞) and

|e i+1

| = c i

|e i

| q

.

(2.12)

With these definitions in mind, we may consider the rate of convergence of each of our iteration methods. Consider the example given in Table 2.1 and

Table 2.2. We wish to determine the positive root of f (x) = x which has the exact value x

2

+

1

2 exp(−x)

= 0.53983527690282. We measure the value of the iterate x i in Table 2.1 and the value of the error e i in Table 2.2.

34 CHAPTER 2.

ROOT FINDING

Bisection Method.

From the derivation (2.3) we note that, on average,

|e i+1

| ≈

1

2

|e i

|. But the error may increase for certain iterations, depending on the initial interval. Thus, we cannot directly apply the definition for convergence to the bisection method, but we nonetheless say that the method behaves like a linearly convergent method, with the following justification:

Consider the sequence defined by {L i

} the interval at step i. We know that L

∞ i=1 i+1

= with L

1

2

L i i

= |b i

− a i

| the length of and so the sequence {L i

} converges to 0 linearly. We also know that |e i

| ≤ L i

, and so we say that {e i

} converges to 0 at least linearly.

Fixed Point Iteration.

The rate of convergence for this method is highly variable and depends greatly on the actual problem being solved. In the example at hand, we find that if we define c i by |e i+1

| = c i

|e i

| then, on average, it appears that lim i→∞ c i

= 0.37. Thus we note that fixed point iteration converges linearly as well.

Newton’s Method.

A thorough analysis of Newton’s method indicates that

Newton actually converges much faster than the other methods. In the example at hand, if we consider |e i+1

| = c i

|e i

|

2 we will find that we get lim i→∞

Thus Newton’s method converges quadratically in this example.

c i

= 0.62.

Secant Method.

With a thorough analysis of the Secant method, we find that the Secant method converges faster than fixed point iteration, but slower than Newton’s method. If we consider |e i+1

| = c i

|e i

| q q =

0.74.

1

2

(1+

√ we actually find that

5) ≈ 1.618. In the example at hand, we actually get that lim i→∞ c i

2.4

Convergence Theory

2.4.1

Fixed Point Iteration

For fixed point iteration, we construct the iteration sequence x i+1

= g(x i

) and iterate to approximate the fixed point x

= g(x

). We demonstrated previously that this is equivalent to root-finding if we use g(x) = x − H(f(x)) for any function H(x) = H(f (x)) where H(0) = 0. Since f (x

) = 0 by the definition of a root, we also have that H(x

) = H(f (x

)) = H(0) = 0 and so g(x

) = x

.

We will show now that this method converges when |g

(x

)| < 1.

The theory for the fixed point iteration method goes hand in hand with the theory behind contractions and contraction mapping from real analysis:

Definition 2.5 Suppose that g is a real-valued function, defined and continuous on a bounded closed interval [a, b] of the real line. Then, g is said to be a contraction on [a, b] if there exists a constant L ∈ (0, 1) such that

|g(x) − g(y)| ≤ L|x − y| ∀x, y ∈ [a, b] (2.16)

2.4.

CONVERGENCE THEORY

Table 2.1: Root-Finding Iteration x i

(f (x) = x

2

+

1

2 exp(−x))

Bisection Fixed Point Iteration Newton Secant

1.00000000000000

0.50000000000000

0.75000000000000

0.62500000000000

0.56250000000000

0.53125000000000

0.54687500000000

0.53906250000000

0.54296875000000

0.54101562500000

0.54003906250000

0.53955078125000

0.53979492187500

0.53991699218750

0.53985595703125

0.53982543945312

0.53984069824219

0.53983306884766

0.53983688354492

0.53983497619629

0.53983592987061

0.53983545303345

0.53983521461487

0.53983533382416

0.53983527421951

0.53983530402184

0.53983528912067

0.53983528167009

0.53983527794480

0.53983527608216

0.53983527701348

0.53983527654782

0.53983527678065

0.53983527689707

0.53983527695527

0.53983527692617

0.53983527691162

0.53983527690434

0.53983527690070

0.53983527690252

0.53983527690343

0.53983527690298

0.53983527690275

0.53983527690286

0.53983527690281

0.53983527690283

0.53983527690282

0.53983527690281

0.53983527690282

0.53983527690282

0.53983527690282

1.00000000000000

0.18393972058572

0.56609887674714

0.52949890451207

0.54357981007437

0.53843372706828

0.54035370380524

0.53964266286324

0.53990672286905

0.53980875946698

0.53984511672844

0.53983162533285

0.53983663196232

0.53983477404859

0.53983546350813

0.53983520765493

0.53983530260020

0.53983526736671

0.53983528044160

0.53983527558960

0.53983527739014

0.53983527672198

0.53983527696993

0.53983527687792

0.53983527691206

0.53983527689939

0.53983527690409

0.53983527690235

0.53983527690300

0.53983527690276

0.53983527690284

0.53983527690281

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

2.00000000000000

2.00000000000000

1.03327097864435

0.00000000000000

0.63686054270010

0.22561484995794

0.54511924037555

0.74269471761919

0.53985256974508

0.49760551690233

0.53983527708914

0.53494633480233

0.53983527690282

0.53996743772003

0.53983527690282

0.53983487323262

0.53983527690282

0.53983527686958

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

0.53983527690282

35

36 CHAPTER 2.

ROOT FINDING

Table 2.2: Root-Finding Iteration e i

(f (x) = x

2

+

1

2 exp(−x))

Bisection Fixed Point Iteration Newton Secant

0.46016472309718

-0.03983527690282

0.21016472309718

0.08516472309718

0.02266472309718

-0.00858527690282

0.00703972309718

-0.00077277690282

0.00313347309718

0.00118034809718

0.00020378559718

-0.00028449565282

-0.00004035502782

0.00008171528468

0.00002068012843

-0.00000983744969

0.00000542133937

-0.00000220805516

0.00000160664210

-0.00000030070653

0.00000065296779

0.00000017613063

-0.00000006228795

0.00000005692134

-0.00000000268331

0.00000002711902

0.00000001221785

0.00000000476727

0.00000000104198

-0.00000000082066

0.00000000011066

-0.00000000035500

-0.00000000012217

-0.00000000000575

0.00000000005245

0.00000000002335

0.00000000000880

0.00000000000152

-0.00000000000212

-0.00000000000030

0.00000000000061

0.00000000000016

-0.00000000000007

0.00000000000004

-0.00000000000001

0.00000000000001

0.00000000000000

-0.00000000000001

-0.00000000000000

-0.00000000000000

-0.00000000000000

0.46016472309718

-0.35589555631710

0.02626359984432

-0.01033637239075

0.00374453317155

-0.00140154983454

0.00051842690242

-0.00019261403958

0.00007144596623

-0.00002651743584

0.00000983982562

-0.00000365156997

0.00000135505950

-0.00000050285423

0.00000018660531

-0.00000006924789

0.00000002569738

-0.00000000953611

0.00000000353878

-0.00000000131322

0.00000000048732

-0.00000000018084

0.00000000006711

-0.00000000002490

0.00000000000924

-0.00000000000343

0.00000000000127

-0.00000000000047

0.00000000000018

-0.00000000000006

0.00000000000002

-0.00000000000001

0.00000000000000

-0.00000000000000

0.00000000000000

-0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

1.46016472309718

1.46016472309718

0.49343570174153

-0.53983527690282

0.09702526579728

-0.31422042694488

0.00528396347273

0.20285944071637

0.00001729284226

-0.04222976000049

0.00000000018632

-0.00488894210049

0.00000000000000

0.00013216081721

0.00000000000000

-0.00000040367020

0.00000000000000

-0.00000000003324

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

0.00000000000000

2.4.

CONVERGENCE THEORY 37

Intermission: The Golden Ratio

Φ

1

1 Φ−1

Figure 2.1: Two nested rectangles with equivalent aspect ratios

The golden ratio appears often in nature and in mathematics. It can be defined using two nested rectangles that have equivalent aspect ratios, as depicted in figure 2.1. The aspect ratio of the larger rectangle is given by

1

φ and the smaller rectangle has the aspect ratio

φ−1

1

. Equating these gives

1

φ

=

1 − φ

1

, (2.13) or equivalently

φ

2

− φ − 1 = 0.

(2.14)

Finally, we apply the quadratic formula and take the positive root to get

φ

1,2

=

1 +

2

5

, (2.15) the golden ratio.

38 CHAPTER 2.

ROOT FINDING

The definition of a contraction has two very important graphical interpretations:

y

y=x

g(a) g(b)

g(x)

a b

x

For one, we notice |g(a) − g(b)| is smaller than |a − b| and so we may say that the interval [a, b] has been contracted to a smaller interval [g(a), g(b)].

y

g(x) a x y b

x

Also, we note that for any x, y ∈ [a, b] such that x 6= y a simple manipulation indicates that a contraction fulfills

|g(x) − g(y)|

|x − y|

≤ L < 1.

(2.17)

Thus we notice that the slope of any secant line within the interval [a, b] cannot exceed L in absolute value.

An observant reader might notice that this definition of a contraction appears very similar to the definition for a derivative. In fact, if we have g(x) differentiable on [a, b] with |g

′ on [a, b] with

(x)| < 1 ∀ x ∈ [a, b], then g(x) is a contraction

L = max x∈[a,b]

|g

(x)|.

The proof of this fact is left as an exercise for the reader.

The definition of a contraction leads to a very important theorem that governs the behaviour of the contraction and, in fact, gives us the result we require for fixed point iteration.

2.4.

CONVERGENCE THEORY 39

Theorem 2.3 (Contraction Mapping Theorem) Let g be a real-valued function, defined and continuous on a bounded closed interval [a, b] of the real line, and assume that g(x) ∈ [a, b] for all x ∈ [a, b]. Suppose, further, that g is a contraction on [a, b]. Then,

1. g has a unique fixed point x

∗ in the interval [a, b].

2. The sequence {x k

} defined by x k+1

= g(x k

) converges to x

∗ any starting value x

0 in [a, b].

as k → ∞ for b

y

y=x

a

g(x)

a b

x

Figure 2.2: An illustration of the contraction mapping theorem.

Proof: Existence of the fixed point.

The existence of a fixed point x

∗ for g is a consequence of the Intermediate Value Theorem. Define u(x) = x − g(x).

Then u(a) = a − g(a) ≤ 0 and u(b) = b − g(b) ≥ 0.

Then by the Intermediate Value Theorem, there exists x u(x

) = 0. Thus x

− g(x

) = 0, or equivalently x

= g(x

∈ [a, b] such that

) and so x

∗ is a fixed point of g.

Uniqueness of the fixed point.

The uniqueness of this fixed point follows from (2.16) by contradiction. Suppose that g has a second fixed point, x

2

[a, b] such that g(x

) = x

∗ and g(x

2

) = x

2

. Then,

, in

|g(x

) − g(x

2

)| ≤ L|x

− x

2

|, (contraction property).

Using the definition of a fixed point, we have

|x

− x

2

| ≤ L|x

− x

2

|, or equivalently, L ≥ 1. However, from the contraction property we know L ∈

(0, 1). Thus we have a contradiction and so there is no second fixed point.

40 CHAPTER 2.

ROOT FINDING

Convergence property.

Let x

0 be any element of [a, b]. Consider the sequence {x i

} defined by x i+1

= g(x i

), where x i

∈ [a, b] implies x i+1

∈ [a, b].

We note for any x i−1 in the interval we have, by the contraction property

|g(x i−1

) − g(x

)| ≤ L|x i−1

− x

|, or equivalently

|x i

− x

| ≤ L|x i−1

− x

|.

Using the fact that this applies for all i, we may use recursion to get

|x i

− x

| ≤ L i

|x

0

− x

|.

We take the limit as i → ∞ to get lim i→∞

|x i

− x

| ≤ |x

0

− x

| lim i→∞

L i

.

But since we also know that L ∈ (0, 1) then lim i→∞

L i reduces to lim i→∞

|x i

− x

| = 0, or lim i→∞ x i

= x

.

¤

= 0. Thus our equation

From the contraction mapping theorem, we note that it appears that convergence to the fixed point x

∗ appears to be linear; in particular, we get from the contraction property that e i

≤ Le i−1

.

Intuitively, only one fixed point is allowed since we require a slope greater than 1 to get multiple fixed points (see Figure 2.3).

y

y=x

b

g(x)

a a b

x

Figure 2.3: In order to get multiple fixed points, we need the slope of g(x) to be greater than 1.

We can determine when a sequence converges from the following corollary to the Contraction Mapping Theorem:

2.4.

CONVERGENCE THEORY 41

Corollary 2.1 Let g be a real-valued function, defined and continuous on a bounded closed interval [a, b] of the real line, and assume that g(x) ∈ [a, b] for all x ∈ [a, b]. Let x

= g(x there exists δ such that g

) be a fixed point of g(x) with x

(x) is continuous in I

δ

= [x

− δ, x

∈ [a, b]. Assume

+ δ]. Define the sequence {x i

}

∞ i=0 by x i+1

= g(x i

). Then:

I. If |g x

(x)| < 1 then there exists ǫ such that {x i

} converges to x

| < ǫ. Further, convergence is linear with lim i→∞ c i

= |g

(x

)|.

for |x

0

II. If |g

(x)| > 1 then {x i

} diverges for any starting value x

0

.

Using this corollary, we can come up with a method of choosing our form for g(x) in terms of f (x) depending on the derivative at the point x

.

Example 2.3 Suppose that we somehow know that f

(x

) = 3/2 where we wish to solve for the root using f (x) = 0. Then if we add and subtract x from the equivalent equation −f(x) = 0 we get that x − x − f(x) = 0. We define g(x) = x + f (x) so we can apply fixed point iteration on g(x) to solve x = g(x).

Using this definition of g(x) we get that

|g

(x

)| = |1 + f

(x

)| = |1 + 3/2| = 5/2 > 1 and so from the corollary we note that we will not have convergence.

If we instead add and subtract x from f (x) = 0 we get that x − x + f(x) = 0.

We define g(x) = x − f(x) so we can apply fixed point iteration on g(x) as before. However, with this definition of g(x) we get that

|g

(x

)| = |1 − f

(x

)| = |1 − 3/2| = 1/2 < 1 and so from the corollary we can choose some x

0 close enough to x

∗ convergence.

to get

2.4.2

Newton’s Method

We need to use special care when applying Newton’s method. In particular, if x

0 is too far away from x

∗ we may not get convergence. Consider the following example:

42 CHAPTER 2.

ROOT FINDING

Convergence Behaviour of the Fixed Point

Method

There exist four different types of behaviour when considering convergence in fixed point iteration.

y

Spiral convergence

y=x

x

2 x

3 x

1

g(x)

x

1 x

3 x

2

−1 < g

(x

) < 0 x

0

x

x

1 x

2 x

4 x

3

y

Spiral divergence

y=x

x

4 x

2 x

1 g

(x

) < −1 x

3

g(x)

x

x

0

y

Staircase convergence

y=x

x

1 x

2

g(x)

x

2 x

1

0 < g

(x

) < 1 x

0

x

x

3 x

2 x

1

y

Staircase divergence

g(x) y=x

x

1 x

2 x

3 g

(x

) > 1

x

2.4.

CONVERGENCE THEORY

y

43 x

α x

β x

x

If x

0

= x

α then we will achieve convergence. However, if x

0

= x

β we will diverge since the function is monotone decreasing for x → ∞ but remains positive.

The convergence theorem for Newton’s method is not immediately obvious, but allows us to predict cases where we will achieve convergence:

Theorem 2.4 Convergence Theorem for Newton’s Method (Atkinson p.60) If f (x

[x

−δ, x

) = 0, f

+δ] with x quadratically to x

0

′ with

(x

) 6= 0 and f, f sufficiently close to x

∗ and f

′′ are all continuous in I

δ then the sequence {x i

}

∞ i=0

= converges lim i→∞ c i

=

|f

|2f

′′

(x

)|

(x

)|

.

(2.18)

Note that in this case, the defining equation for c

We note that if f

(x

∗ i is |x i−1

−x

| = c i

|x i

−x

|

2

) = 0 then the rate of convergence degrades to linear

.

convergence. If the conditions for Newton’s method are not met, we may not be able to achieve convergence for any starting value x

0

.

2.4.3

Secant Method

The secant method has a very similar convergence theorem to that of Newton’s method. In fact, all that changes is the order of convergence of the method.

Similar to Newton’s method, it can be shown that if f

(x

) = 0 then the rate of convergence degrades to linear.

Theorem 2.5 Convergence Theorem for Secant Method (Atkinson p.67)

If f (x

) = 0, f

δ] with x q =

1

2

0

(1 +

5).

(x

) 6= 0 and f, f

′ and f

′′ are all continuous in I

δ then the sequence {x i

}

∞ i=0

= [x

−δ, x

+ converges with order

44 CHAPTER 2.

ROOT FINDING

2.4.4

Overview

Each of the root-finding methods has their own strengths and weaknesses that make them particularly useful for some situations and inapplicable in others.

The following two tables provide a summary of the functionality of each rootfinding method:

Method Does the method converge?

Bisection yes, guaranteed

Fixed-point not always; depending on g(x) and x

0

Newton not always; depending on f (x) and x

0

Secant not always; depending on f (x), x

0 and x

1

Method Speed of convergence Require knowledge of f

Bisection slow (linear)

Fixed-point slow (linear)

Newton

Secant no no fast (quadratic) fast (q ≈

1

2

(1 +

√ yes

5)) no

In practice, MATLAB uses a combination of the Secant method, Bisection method and a method not discussed here called Inverse Quadratic Interpolation

(the combined method is accessible through the fzero command). It uses the method that converges fastest if possible, defaulting to the guaranteed convergence of Bisection if necessary. Further, it requires no knowledge of the derivative. This approach allows MATLAB’s general root-finding function fzero to be well-suited to a variety of applications.

These notes have been funded by...

Chapter 3

### Interpolation

We wish to now focus our attention on the problem of interpolation. If we have a set of discrete data, we may wish to determine a continuous function that interpolates all the data points. Consider the following statement of the problem:

Problem Given n + 1 discrete data points {(x i

, f i

)} n i=0 with x i

6= x j for i 6= j, determine a continuous function y(x) that interpolates the data: y(x i

) = f i for

0 ≤ i ≤ n.

y

y(x)

x

0 x

1 x

2

. . .

x n-1 x n

x i

The points (x i

, f i

) could come from measurements, expensive calculations, discrete data analysis, or computer graphics (2D and 3D). There are several reasons for which we require access to a continuous function y(x). For example,

• we may need to determine interpolated values at x 6= x i

.

• we may need to differentiate or integrate the interpolating function.

It may be impossible or infeasible to perform a continuous measurement of the function or to determine the function exactly, so interpolation is useful!

There are many ways for us to choose the function y(x), some which may be very difficult and require substantial computational resources. We will focus on polynomial interpolation, which is one of the most general and widely-used methods.

45

46 CHAPTER 3.

INTERPOLATION

3.1

Polynomial Interpolation

In polynomial interpolation, we wish to determine the coefficients of a polynomial that interpolates the set of points. We define the interpolating polynomial as follows:

Definition 3.1 Given n + 1 discrete data points {(x i

, f i

)} n i=0 with x i 6= j, the interpolating polynomial is the degree n polynomial i

6= x j for y n

(x) = a

0

+ a

1 x + a

2 x

2

+ · · · + a n x n

, (3.1) such that y n

(x i

) = f i for 0 ≤ i ≤ n.

In this problem we are given n + 1 unknowns a

0

, a

1

, · · · , a n and n + 1 conditions y n

(x i

) = f i

. In order to solve for the interpolating polynomial, we must solve for the unknowns under the given conditions. There are many methods to solve for these unknowns, but we will concentrate on the Vandermonde matrix solution and the Lagrange form of the polynomial.

3.1.1

The Vandermonde Matrix

The Vandermonde matrix method is the most straightforward algorithm for determining an interpolating polynomial. Since all the conditions are linear, we can write them as a (n + 1) × (n + 1) linear system: a a a

0

0

0

+ a

+ a

· · ·

1

1

+ a

1 x x

0

1 x n

+ a

2

+ a

2 x x

2

0

2

1

· · ·

+ a

2 x

2 n

+ · · · + a n x

+ · · · + a n x n

0 n

1

· · · · · ·

+ · · · + a n x n n

=

=

· · ·

= f which we may also write in matrix form:

.

..

1 x

0 x

1 x

1 x

2

0

2

1

.

..

.

..

1 x n x

2 n

· · ·

· · · x x

. .. ...

· · · x n

0 n

1 n n

 

 a

0 a

1

.

..

a n

=

 f

0 f

1

.

..

f n

.

f f

0

1 n

,

(3.2)

(3.3) trix. We can obtain the following explicit expression for the determinant of a

Vandermonde matrix:

Proposition 3.1 The determinant of V is given by det(V ) = (x

1

− x

0

)

(x

2

− x

0

)(x

2

− x

1

)

(x

3

− x

0

)(x

3

− x

1

)(x

3

− x

2

)

· · ·

(x n

− x

0

)(x n

− x

1

) · · · (x n

− x n−1

),

(3.4)

3.1.

POLYNOMIAL INTERPOLATION 47 or, in a more compact form, det(V ) =

Y

0≤i≤j≤n

(x j

− x i

).

(3.5)

Proof.

Recall that we may expand det(V ) about row i by writing det(V ) = n

X

(−1) i+j a ij j=0 det(V ij

), where V ij is the (n −1)×(n−1) matrix obtained by removing row i and column j from matrix V:

V ij

=

 v

00 v

10

.

..

v

(i−1)(0) v

(i+1)(0)

.

..

v n0 v

01 v

11

.

..

v

(i−1)(1) v

(i+1)(1)

.

..

v n1

· · · v

(0)(j−1)

· · · v

(1)(j−1)

.

..

· · · v

(i−1)(j−1)

· · · v

(i+1)(j−1)

.

..

· · · v

(n)(j−1) v

(0)(j+1) v

(1)(j+1)

.

..

v

(i−1)(j+1) v

(i+1)(j+1)

.

..

v

(n)(j+1)

· · ·

· · · v

0n v

1n

.

..

· · · v

(i−1)(n)

· · · v

(i+1)(n)

.

..

· · · v nn

.

We choose to expand det(V ) about row i = n: det(V ) = n

X

(−1) n+j v nj j=0

= (−1) n h det(V

1 · det(V n0 nj

)

) − x n

· det(V n1

) + x

2 n

· det(V n2

) −

· · · + (−1) n x n n

· det(V nn

) i

.

All of the sub-determinants (indicated by boxes) are independent of x n since they do not have any elements from the n th row: This is essentially a polynomial of degree n in x n

, so we may write det(V ) = p n

(x n

).

We know p n

(x

1

) = 0 because det(V ) = 0 when x n

= x

1

; V then has two equal rows. But we also know p n

(x

2

) = 0, p n

(x

3

) = 0, p n

(x

4

) = 0, · · · , p n

(x n−1

) = 0, which gives us n roots of p know that p n

(x) and may be written as: n

(x n

). From this information, we det(V ) = b(x n

− x

0

)(x n

− x

1

) · · · (x n

− x n−1

), (3.6) with b = (−1)

2n det(V nn

) = det(V nn

).

We define V

(i) as the i × i matrix formed by taking the first i rows and i columns of V . Then V

(n)

= V and V

(n−1)

= V nn

. We may write det(V det(V

(n)

) = det(V

(n−1)

) = det(V

(n−1)

)(x n

− x

0

)(x n

− x

1

) · · · (x n

− x n−1

)

(n−2)

)(x n−1

− x

0

)(x n−1

− x

1

) · · · (x n−1

− x n−2

)

· · ·

48 CHAPTER 3.

INTERPOLATION

Our result is obtained by repeating the decomposition (3.6) recursively to obtain the desired result. ¤

We may wish to consider when the interpolating polynomial is well-defined, i.e. when we may solve the linear system (3.3) to find a unique solution. It turns out that as long as x i

6= x j for i 6= j, we can always obtain a polynomial that interpolates the given points. This is proven in the following theorem:

Theorem 3.1 The interpolating polynomial y n

(x) exists and is unique.

Proof.

We consider the system V ~a = ~ i

6= x j for i 6= j then we know det(V ) 6= 0 from (3.5). Thus, by a standard result from linear algebra, we know the linear system has a unique solution (or, y n exists and is unique). ¤ reasons:

1. We note that this approach requires W = O(n

3

) time to solve the linear system. There are more efficient methods than this to find the interpolating polynomial.

2. V is a very ill-conditioned matrix, since κ

2

(V ) grows faster than exponentially as a function of n.

Instead, we consider a different approach which will allow us to write down the interpolating polynomial directly.

3.1.2

Lagrange Form

To motivate the Lagrange form of the interpolating polynomial, we ask the question: “is there a simply way to write down the interpolating polynomial without needing to solve a linear system?” Consider the most simple case of a non-constant polynomial:

Linear Case (n=1): We have two points (x

0

, f

0

) and (x

1

, f

1

). The polynomial is of the form y

1

(x) = a

0

+ a

1 x, with the conditions y

1

(x

0

) = f

0

, y

1

(x

1

) = f

1

.

With a little intuition, we may think to write y

1

(x) as y

1

(x) = x − x

1 x

0

− x

1 f

0

+ x − x

0 x

1

− x

0 f

1

.

3.1.

POLYNOMIAL INTERPOLATION 49

In this case, y

1

(x) takes the form y

1

(x) = ℓ

0

(x)f

0

+ ℓ

1

(x)f

1

, where ℓ

0

(x) and ℓ

1

(x) are both degree 1 polynomials. We verify that y

1

(x) is a interpolating polynomial: y

1

(x

0

) = 1 · f

0

+ 0 · f

1

= f

0

, y

1

(x

1

) = 0 · f

0

+ 1 · f

1

= f

1

,

OK!

OK!

By Theorem 3.1 we know that the interpolating polynomial is unique, so this must be the interpolating polynomial associated with the given points. If we collected the terms of this polynomial, we would find that this is simply another way of writing the solution we would get if we solved the Vandermonde system

(3.3).

We may generalize this method for writing the interpolating polynomial to an arbitrary number of points as follows:

Definition 3.2 The n+1 Lagrange polynomials for a set of points {(x i

, f i

)} are the degree n polynomials that satisfy the property n i=0 ℓ i

(x j

) =

½

1 if i = j

0 otherwise.

(3.7)

Explicitly, we may write the i th

Lagrange polynomial as ℓ i

(x) =

(x − x

0

)(x − x

1

) · · · (x − x i−1

)(x − x i+1

) · · · (x − x n

)

(x i

− x

0

)(x i

− x

1

) · · · (x i

− x i−1

)(x i

− x i+1

) · · · (x i

− x n

)

.

Using product notation, we may also write ℓ i

(x) = n

Y j=0,j6=i x − x j x i

− x j

.

(3.8)

(3.9)

In general, the Lagrange form of the interpolating polynomial may be written as follows: y n

(x) = ℓ

0

(x)f

0

+ ℓ

1

(x)f

1

+ · · · + ℓ n

(x)f n

, (3.10) or, using summation notation, y n

(x) = n

X ℓ i

(x)f i

, i=0

(3.11) with the Lagrange polynomials ℓ i

(x) defined by (3.8). This form is an alternative way of writing the interpolating polynomial y n

(x). Using this form, interpolation can be donw in O(n

2

) time without solving a linear system!

50 CHAPTER 3.

INTERPOLATION

Example 3.1 Write the interpolating polynomial of degree 2 for the set of points

{(2,

3

2

), (3, 2), (5, 1)}.

2

y

1

y(x)

0

1 2 3 4 5 6

x

The Lagrange form of the interpolating polynomial is y i

(x) =

(x − 3)(x − 5)

(2 − 3)(2 − 5)

(

3

2

) +

(x − 2)(x − 5)

(2) +

(3 − 2)(3 − 5)

(x − 2)(x − 3)

(1).

(5 − 3)(5 − 3)

The Lagrange Basis. Consider the set

P n

(x) = {y n

(x)|y n

(x) is a polynomial of degree ≤ n}.

(3.12)

This is the set of all polynomials of degree less than or equal to n. We note that

P n

(x) is a vector space with the standard basis

B = {1, x, x

2

, · · · , x n

}.

Hence we may write any polynomial y n

(x) as a linear combination of the basis vectors. In standard form, we write y n

(x) = a

0

+ a

1 x + · · · + a n x n

.

(3.13)

Similarly, the Lagrange polynomials form a different basis for the vector space

P n

(x):

B

= {ℓ

0

(x), ℓ

1

(x), · · · , ℓ n

(x)} (3.14)

(recall that in order to write a Lagrange basis, we require n points x with x i i

(1 ≤ i ≤ n)

6= x j for i 6= j.) Since this is also a basis, we may write any polynomial y n

(x) as a linear combination of the Lagrange polynomials: y n

(x) = n

X f i ℓ i

(x).

i=0

(3.15)

3.1.

POLYNOMIAL INTERPOLATION 51

3.1.3

Hermite Interpolation

Sometimes derivatives (or slopes) are given or known at interpolation points. In this case, we can find a polynomial that interpolates both the function values and the derivatives.

y

slope f

1

’ slope f

0

’ f

1 f

0 f

2 slope f

2

’ x

0 x

1 x

2

x i

Definition 3.3 Given {(x i

, f i

, f i

)} n i=0

, the Hermite interpolating polynomial is the polynomial y(x) of degree 2n + 1 which satisfies y y(x i

) = f i

(x i

) = f i

′ n+1 conditions n+1 conditions

2n + 2 conditions.

Since there are 2n+2 conditions, there must be 2n+2 polynomial coefficients in the minimal degree interpolating polynomial. We conclude that y(x) has degree 2n + 1.

Example 3.2 Consider the case of n = 1. We have two points (x

0

(x

1

, f

1

, f

1

, f

0

, f

0

) and

). The polynomial is of degree 2n + 1 = 2 · 1 + 1 = 3 (a cubic), so we may write y(x) = a

0

+ a

1 x + a

2 x

2

+ a

3 x

3

.

Similar to the standard polynomial interpolation problem, we must solve for these coefficients. We consider two methods:

Method 1: Undetermined Coefficients.

We note that we may write the polynomial and its first derivative as y(x) = a

0

+ a

1 x + a

2 x

2

+ a

3 x

3

, y

(x) = a

1

+ 2a

2 x + 3a

3 x

2

.

In matrix form, the linear system becomes y y y(x

0

) = f

0 y(x

1

) = f

1

(x

0

) = f

(x

1

) = f

0

1

1 x

1 x

0

1 x x

2

0

2

1 x x

0 1 2x

0

3x

0 1 2x

1

3x

3

0

3

1

3

0

3

1

 

 a

0 a

1 a

2 a

3

=

 f

0 f

1 f

2 f

3

.

52 CHAPTER 3.

INTERPOLATION

Since this is simply a matrix system, we may use known techniques to solve this system. This method suffers from the same shortfalls as the Vandermonde system however, since we are still required to solve a potentially costly linear system.

Method 2: Determine a, b, c, d Similar to the idea of the Lagrange form, we can actually write the Hermite polynomial in a form that makes solving for the polynomial coefficients much easier. We write the polynomial and its derivative as y(x) = a + b(x − x

0

) + c(x − x

0

)

2

+ d(x − x

2

0

)(x − x

1

) y

(x) = b + 2c(x − x

0

) + 2d(x − x

0

)(x − x

1

) + d(x − x

0

)

2

.

Substituting in the conditions yields the following linear system: y(x

0

) = f

0 a = f

0 y(x

1

) = f

1 a + b(x

1

− x

0

) + c(x

1

− x

0

)

2 y y

(x

(x

0

1

) = f

) = f

1

0 b = f

0 b + 2c(x

1

− x

0

) + d(x

1

− x

0

)

2

= f

1

= f

1

.

We note that c and d are the only coefficients we need to solve for, since a and b are immediately determined. We may rearrange the system to obtain c = d =

1

(x

1

− x

0

)

2

1

(f

1

(x

1

− x

0

)

2

(f

1

− f

− f

0

0

− f

0

(x

1

− x

0

))

2

(x

1

− x

0

)

(f

1

− f

0

− f

0

(x

1

− x

0

))).

So why does this work? Recall that we could write a basis for P either {1, x, x

2

3

(x) as

, x

3

} (standard basis) or {ℓ

0

(x), ℓ

1

(x), ℓ

2

(x), ℓ

3

(x)} (Lagrange basis). We may also choose the following basis for P

3

(x):

{1, x − x

0

, (x − x

0

)

2

, (x − x

0

)

2

(x − x

1

)}.

Writing y(x) under this basis yields the form we used in method 2. This particular basis is chosen such that the calculations are somewhat simplified.

3.2

Piecewise Polynomial Interpolation

There are many problems with standard high degree polynomial interpolation, including

• strong oscillations

• quickly divergent extrapolation.

We can remedy these drawbacks by using piecewise interpolation or least-squares fitting. In the former, we break the interpolation interval into regions and generate several interpolating polynomials that are valid over each region. In the latter, we allow the data points to be ‘close to’ y(x) instead of on y(x).

3.2.

PIECEWISE POLYNOMIAL INTERPOLATION 53

3.2.1

Piecewise Linear Interpolation

In piecewise linear interpolation we split the domain of the function into a set of intervals (each consisting of two adjacent points) and determine the interpolating polynomial of each interval. We use a line segment to interpolate the function in each interval, since each interval contains two points.

y

intervals x

0 x

1 x

2

I

1

I

2 x i-1 x i

I i x n-1 x n

I n

We define a set of n polynomials y i

(x), 1 ≤ i ≤ n where the domain of each y i

(x) is I i

= [x i−1

, x i

]. We may write y i

(x) = x x − x i i−1

− x i f i−1

+ x − x x i i−1

− x i−1 f i

.

Then, the interpolating piecewise polynomial y(x) is equal to y i

(x) over the interval I i

= [x i−1

, x i

] for all 1 ≤ i ≤ n.

This method of interpolation has the drawback of not being smooth at the interpolation points (we end up with jagged edges on the interpolating curve).

We may instead consider piecewise quadratic (see figure) or piecewise cubic interpolation, but these will also inevitably have jagged points at the boundaries.

y

intervals x

0 x

1 x

2

I

1 x

3 x

4

I

2 x

5 x

6

I

3

54

3.2.2

Spline Interpolation

y

CHAPTER 3.

INTERPOLATION intervals x

0 x

1 x

2

I

1

I

2 x i-1 x i

I i x n-1 x n

I n

We consider a generalization of piecewise linear interpolation on a set of points {(x i

, f i

)} n i=0 that takes into account our desire for smoothness at the boundaries. Instead of only using an interpolation condition, we impose three types of conditions:

• interpolation conditions

• smoothness conditions

• extra boundary conditions.

This leads us to a very powerful type of interpolation, known as spline interpolation.

Definition 3.4 y(x) is a degree k spline if and only if

1. y(x) is a piecewise polynomial of degree k in each interval I i

. We define y i

(x) as the restriction of y(x) (1 ≤ i ≤ n).

2. y i

(x i−1

) = f condition).

i−1 and y i

(x i

) = f i in interval I i

(0 ≤ i ≤ n) (interpolation

3. For each interior point j, there are k − 1 smoothness conditions: y y

′′ j

′ j

(x

(x j j

) = y

) = y

′ j+1

′′ j+1

(x j

(x j

)

)

 k − 1 smoothness conditions

(0 ≤ j ≤ n) y

(k−1) j

(x j

) = y

(k−1) j+1

(x j

)

Under this definition, there will be n intervals and k + 1 coefficients for each polynomial. In total, this gives n(k + 1) = nk + n unknowns.

We will have 2n interpolation conditions from part 2 and (k − 1)(n − 1) smoothness conditions (note that the smoothness conditions only apply to the n−1 internal points of the spline.) Thus, in total we will have 2n+kn−k−n+1 = kn + n − k + 1 conditions.

3.2.

PIECEWISE POLYNOMIAL INTERPOLATION 55

Comparing the number of unknowns and the number of conditions, it is clear we need to impose k −1 extra conditions. These are supplied by extra boundary conditions at x

0 and x n

.

Example 3.3 Consider the case of k = 3 (a cubic spline.) We will need to impose 2 extra boundary conditions.

y

intervals x i-1

I i x i

I i+1 x i+1

There are many different types of boundary conditions we could impose.

Three possible types of boundary conditions are

• “free boundary”: y

′′

1

(x

0

) = 0, y

′′ n

(x n

) = 0. A cubic spline with this boundary condition is known as a “natural” cubic spline.

• “clamped boundary”: We specify the first derivatives at the ends by choosing constants f

0 and f

′ n

. We then impose y

1

(x

0

) = f

0 and y

′ n

(x n

) = f

′ n

.

• “periodic boundary”: If f

0

= f n we may impose that the first and second derivatives of the first and last polynomial are equal at x

0 and x n

. We obtain the conditions y

1

(x

0

) = y

′ n

(x n

) and y

′′

1

(x

0

) = y

′′ n

(x n

).

When we impose the three types of conditions, we will produce a nk + n × nk + n linear system that may be uniquely solved for the coefficients a i

, b i

, c i and d i

(1 ≤ i ≤ n).

3.2.3

Further Generalizations

Further generalizations of these techniques are possible. For example:

• Bezier Curves

• B-Splines

56 CHAPTER 3.

INTERPOLATION

These notes have been funded by...

Chapter 4

### Integration

The problem of numerical integration is simply stated:

Problem Given a continuous function f (x) and an interval [a, b], find a numerical approximation for I =

R b a f (x)dx.

There are several cases where numerical integration is necessary:

1. if f (x) is given but no closed form solution can be found. For example, the integral of the function f (x) = e

−x

2 has no closed form solution and requires numerical integration to compute.

2. if f (x) is not given, but {(x i

, f i

)} n i=0 is given.

In each case, numerical integration may be the only method of determining the integral. We consider three methods for performing numerical integration: integration of an interpolating polynomial, composite integration and Gaussian integration.

4.1

Integration of an Interpolating Polynomial

Recall the definition of an interpolating polynomial y(x) of degree n for given data points {(x i

, f i

)} n i=0

. Since the interpolating polynomial provides an approximation to the function f (x), we may use it to determine an approximate solution to the integral. This is advantageous because y(x) may be easily integrated due to its simple form.

The exact solution, I of to the integration problem is given by

I =

Z b a f (x)dx, (4.1)

57

58 CHAPTER 4.

INTEGRATION by

Z b y(x)dx.

a

The truncation error T is then defined as

(4.2)

(4.3) the difference between the exact solution and our approximation.

4.1.1

Midpoint Rule: y (x) degree 0

We choose y(x) constant and sample at x

0

= f ( a+b

2

). The numerical approximation is then a+b

2

. We obtain y(x) = f

0

=

I

0

=

Z b a f

µ a + b ¶

2 dx = (b − a)f

µ a + b ¶

2

.

(4.4)

y

f ( a+b

2

) f(x) y(x) a a+b

2 b

x

4.1.2

Trapezoid Rule: y

(x) degree 1

We choose y(x) to be a linear function between the endpoints of the interval,

(x

0

= a, f

0

= f (x

0

)) and

(x

1

= b, f

1

= f (x

1

)).

We may immediately write the interpolating polynomial in Lagrange form: y(x) =

(x − x

(x

0

1

)

− x

1

) f

0

+

(x − x

(x

1

0

)

− x

0

) f

1

.

4.1.

INTEGRATION OF AN INTERPOLATING POLYNOMIAL 59

The numerical approximation using the interpolating polynomial is then

I

1

=

=

=

Z x

1

· (x − x

(x

0

1

)

− x

1

) f

0

+

(x − x

(x

1

0

)

− x

0

) f

1

¸ dx x

0 f (a) a − b f (a) a − b

(x − b)

2

µ

2

¯

¯

¯

¯ b a

(a − b)

2

2

+

¶ f (b) a − b

+

(x − a) f (b)

2

2

¯

¯ b

¯

¯ a

µ (b − a)

2 b − a 2

.

From this we obtain the trapezoid rule

I

1

= (b − a)

1

2

[f (a) + f (b)].

(4.5)

y

f(x) y(x) a b

x

4.1.3

Simpson Rule: y

(x) degree 2

We choose y(x) to be a parabola within the interval. We interpolate the points

(x

0

= a,

(x

(x

1

2

= a+b

= b,

2

, f

0

= f (a)), f f

1

2

= f ( a+b

2

= f (b)).

)), and

We may write the interpolating polynomial in Lagrange form: y(x) =

(x − x

(x

0

1

)(x − x

2

)

− x

1

)(x

0

− x

2

) f

0

+

(x − x

(x

1

0

)(x − x

2

)

− x

0

)(x

1

− x

2

) f

1

+

(x − x

(x

2

0

)(x − x

1

)

− x

0

)(x

2

− x

1

)

.

The numerical approximation using the interpolating polynomial is then

I

2

=

Z x

2 x

0

· (x − x

+

1

)(x − x

2

)

(x

0

− x

1

)(x

0

− x

2

) f

0

+

(x − x

(x

2

0

)(x − x

1

)

− x

0

)(x

2

− x

1

) f

2

¸

(x − x dx.

0

)(x − x

2

)

(x

1

− x

0

)(x

1

− x

2

) f

1

+

60 CHAPTER 4.

INTEGRATION

This may be written as a weighted linear combination of the f i

:

I

2

= w

0 f

0

+ w

1 f

1

+ w

2 f

2

, with w

0

=

Z x

2 x

0

(x − x

(x

0

1

)(x − x

2

)

− x

1

)(x

0

− x

2

) dx = b − a

6

.

Repeating a similar integration for w

1 and w

2 yields the Simpson rule

I

2

= b − a

6

(f

0

+ 4f

1

+ f

2

).

y

(4.6) y(x) f(x) a a+b

2 b

x

4.1.4

Accuracy, Truncation Error and Degree of Precision

There are two ways to study the accuracy of the integration formulas:

Truncation error: We can use Taylor’s theorem to compute the truncation error of each integration rule. For example, for the midpoint rule it can be shown that T

0

= I − I

0

=

(b−a)

3

24 f

′′

0

) with ξ

0

∈ [a, b].

Degree of Precision: The degree of precision of an integration formula is defined as follows:

Definition 4.1 The following statements are equivalent:

The three integration formulas we discussed are summarized in the following table, along with their accuracy:

4.2.

COMPOSITE INTEGRATION 61

Midpoint - eq. (4.4)

Trapezoid - eq. (4.5)

Simpson - eq. (4.6)

Degree of poly.

Truncation Error Degree of Precision

0

1

2

(b−a)

24

3

(b−a)

12

(b−a)

5

2880

3 f f f

′′

′′

(4)

0

)

1

2

)

)

1

1

3

Clearly the Simpson rule is the most accurate approximation, but also requires the most computation. Perhaps surprising is the fact that the midpoint rule seems to provide comparable accuracy to the more computationallyintensive trapezoid rule. We consider the application of these methods to the following example:

Example 4.1 The error function erf(x) is defined as erf(x) = √

π

Z x exp(−t

2

)dt.

0

We can compute erf(1) to high precision using MATLAB or an advanced calculator and obtain erf ≈ 0.842701 · · · .

Using the three integration algorithms described above, we obtain:

Midpoint

ˆ

0

=

π exp(−(

1

2

)

(one correct digit)

2

) ≈ 0.878783

Trapezoid

ˆ

1

=

π

[exp((−0)

2

) − exp((−1)

(zero correct digits)

2

)] ≈ 0.77173

Simpson I

2

=

π

[1 + 4 exp((−

(three correct digits)

1

2

)

2

) + exp(−1)] ≈ 0.8431028

As predicted, the Simpson rule is the most accurate. We also find, in this case, that the Midpoint rule is more accurate than the trapezoid rule.

4.2

Composite Integration

If we wish to attain higher accuracy in the result, we may divide the integration interval into several smaller subintervals and integrate each of the subintervals individually. If we split up [a, b] into n subintervals of equal length, each subinterval will have length h = b−a n

. The exact integral is then written as

I =

Z b a f (x)dx = n

X

Z x i i=1 x i

−1 f (x)dx = n

X

I i

, i=1

(4.7) with

I i

=

Z x i x i

−1 f (x)dx.

(4.8)

62 CHAPTER 4.

INTEGRATION

y

x

0

=a interval

1 x

1 x i-1 interval i x i x n-1 interval n b=x n

4.2.1

Composite Trapezoid Rule

We may use the trapezoid rule to approximate the integral over each subinterval.

We write:

I i

= h f (x i−1

) + f (x i

)

.

2

(4.9)

Summing over all intervals yields the complete expression for the composite trapezoid rule: n

X

ˆ i

= h

2

[f

0

+ 2f

1

+ 2f

2

+ · · · + 2f n−1

+ f n

].

i=1

(4.10)

Local Truncation Error: The local truncation error is the truncation error expected in each subinterval. We write

T loc,i

= I i

I i

= −

1

12

(x i

− x i−1

)

3 f

′′

(ξ i

), with ξ i

∈ [x i−1

, x

Hence, the local truncation error for the trapezoid rule is given by i

]

T loc,i

= −

1

12 f

′′

(ξ i

)h

3

.

We say that the local truncation error is of the order O(h

3

).

(4.11)

Global Truncation Error: The global truncation error is the total truncation error over all intervals. We write

T global n

X

(I i

I i

) = i=1 n

X

T loc,i

.

i=1

In order to relate T global theorem: to the interval length h, we will need the following

Theorem 4.1 The global truncation error for the composite trapezoid rule is

O(h

2

).

4.2.

COMPOSITE INTEGRATION 63

Proof.

The global truncation error, in terms of the local truncation error, is given by:

|T global

| = | n

X

T loc,i

| ≤ i=1 n

X

|T loc,i

| (by Triangle inequality).

i=1

From (4.10),

We define M = max a≤x≤b

|T global

| ≤ n

X

|f

′′

(ξ i

)| h

3

12

.

i=1

|f

′′

(x)| and so obtain

|T global

| ≤ nM h

3

12

.

Substituting n = b−a h yields

|T global

| ≤ (b − a)M h

2

12

.

We conclude |T global

| = O(h

2

). ¤

4.2.2

Composite Simpson Rule define the midpoint of the subinterval [x i−1

, x i b−a

6

(f (a) + 4f (

] as x i−1/2

= a+b

2 x i

−1

2

) + f (b)). We

+x i (see figure).

y

interval

1 interval i interval n x

0

=a x

1/2 x

1 x i-1 x i-1/2 x i x n-1 x n-1/2 b=x n

Using this definition, we may write the Simpson rule over one subinterval as

ˆ i

= h

6

(f i−1

+ 4f i−1/2

+ f i

).

(4.12)

Summing over all intervals yields the expression for the composite Simpson rule: n

X

I i i=1

= h

6

[f

0

+ 4f

1/2

+ 2f

1

+ · · · + 4f n−1/2

+ f n

].

(4.13)

Finally, we can devise a theorem for the global truncation error of this expansion:

Theorem 4.2 The global truncation error for the Simpson rule is O(h

4

).

64 CHAPTER 4.

INTEGRATION

Proof.

The proof is similar to the proof for the Trapezoid rule, except uses

T loc,i

= O(h

5

). This is left as an exercise for the reader.

4.3

Gaussian Integration

Gaussian integration applies a different approach to integration than we have seen so far in this chapter. Consider the following example:

Assume we wish to determine the integral of a function f (x) over the interval

[−1, 1]. We write

Z

1

I = f (x)dx (4.14)

−1 and propose the following form of the numerical approximation:

I = w

1 f (x

1

) + w

2 f (x

2

).

(4.15)

This expression has four unknowns (namely w

1

, w

2

, x

1 and x

2

.) We want to determine these unknowns so that the degree of precision is maximal. Note that the location of function evaluation is now also a variable that will be determined optimally, in addition to the function weights.

Recall the degree of precision of an integration formula is the highest degree of polynomials that are integrated exactly. Since there are 4 unknowns in this problem, we assume we can require exact integration of polynomials up to degree

3. The four conditions imposed on the problem are then:

1. f (x) = 1 is integrated exactly.

2. f (x) = x is integrated exactly.

3. f (x) = x

2 is integrated exactly.

4. f (x) = x

3 is integrated exactly.

(Note: these form a basis for all polynomials of degree ≤ 3). Mathematically, these conditions are written as the following non-linear system in the four unknowns:

1

2

3

4

R

1

−1

R

1

−1

R 1

−1

R

1

−1

1 · dx = w

1

+ w

2 x x

2

3

· dx = w

1 x

2

1

· dx = w

1 x

3

1

+ w

+ w

2

2 x x

3

2

2

2

⇒ x · dx = w

1 x

1

+ w

2 x

2

⇒ 0 = w

1 x

1

+ w

2 x

2

⇒ 2/3 = w

1 x

2

1

2 = w

0 = w

1

1

+ w x

3

1

2

+ w

+ w

2 x

2

3

2 x

2

2

.

With some manipulation, we may solve the system for x

1

= −

3

, x

2

=

3

, w

1

= 1, w

2

= 1.

4.3.

GAUSSIAN INTEGRATION 65

Substituting these constants back into (4.15) yields

µ

3

+ 1 · f

3

.

(4.16)

We conclude that this is an approximation for

R 1

−1 f (x)dx with degree of precision m = 3. By a change of integration variable, result (4.16) can be generalized as follows:

Proposition 4.1 (Gaussian Integration.) b − a

2 h f (( b−a

2

)(−

3

) + ( b+a

2

)) + f (( b−a

2

)

3

+ ( b+a

2

)) i is an approximation for I =

R b a f (x)dx with degree of precision m = 3.

(4.17)

Proof.

We can express x in terms of a new integration variable t as follows: x = a

(1 − t)

2

+ b

(1 + t)

2

.

Note that x = a when t = −1 and x = b when t = 1. Also, dx = b − a dt.

2

Using this substitution we get

I =

Z b f (x)dx = a

=

Z

1

−1 f (( b−a

2

)t +

Z

1 b−a

2

−1 g(t)dt, b+a

2

) b−a

2 dt with g(t) = f

¡

( b−a

2

)t + ( b+a

2

)

¢

.

Using (4.16) we obtain: b − a

2

³ g(−

3

) + g(

3

)

´

, which leads to the desired result. ¤

(4.18)

These notes have been funded by...

66 CHAPTER 4.

INTEGRATION

Chapter 5

### Discrete Fourier Methods

5.1

Introduction imaginary part, and i =

−1. As such, we may depict a complex number z = a + ib as a vector in the complex plane:

Im(z) z = a+ib b

0 a

Re(z)

Recall that for any complex number z = a + ib we have:

Term Definition

Complex conjugate ¯

Real part Re(z) = a

Imaginary part

Modulus

Phase angle

Im(z) = b

√ r = |z| = a

2

+ b

2

θ = arctan(b/a)

We may write the complex number in terms of the modulus and phase angle z = r exp(iθ), (5.1) in conjunction with the Euler formulas: exp(iθ) = cos(θ) + i sin(θ), exp(−iθ) = cos(θ) − i sin(θ).

(5.2)

(5.3)

67

68 CHAPTER 5.

DISCRETE FOURIER METHODS

We may invert these formulas in order to write sinusoids in terms of complex exponentials: cos(θ) = sin(θ) =

1

2

1

(exp(iθ) + exp(−iθ)),

2i

(exp(iθ) − exp(−iθ)).

(5.4)

(5.5)

Consider an arbitrary wave signal given by y(t) = sin(2π · kt) for some constant k. The frequency of the wave is defined by f = k, (5.6) and has dimensions of oscillations per second (or Hz). The period is defined as the time required to complete one oscillation. It is related to the frequency by

T =

1 f

=

1 k

, (5.7) and has dimensions of seconds. The angular frequency ω is related to the frequency by

ω = 2π f (5.8) with dimensions of radians per second. These definitions can be easily generalized to any periodic function (not just sinusoids). This characterization is broadly applicable to sound waves, water waves and any other periodic behaviour. Human audible sound, for example, occurs in the frequency range from

20Hz to 20kHz.

T

1

 y(t) = sin(2πt) f = 1 oscillation / sec = 1Hz

T = 1 sec

ω = 2π radians / sec

1

1

 y(t) = f = sin(2π ·

1

1

3 t) oscillation / sec =

3

T = 3 sec

ω =

2

3

π radians / sec

1

3

Hz

 y(t) = sin(2π · 3t) f = 3 oscillation / sec = 3Hz

T =

1

3 sec

ω = 6π radians / sec

5.2.

FOURIER SERIES 69

5.2

Fourier Series

5.2.1

Real form of the Fourier Series

Consider a continuous function f (x) on [a, b]. In general, f (x) can be expanded in a Fourier series as follows:

f(x)

a b

Definition 5.1 The Fourier series of f (x) with x ∈ [a, b] is g(x) = a

0

2

+ k=1

· a k cos

µ k

2πx b − a

+ b k sin

µ k

2πx b − a

¶¸

, (5.9) with a b k k

=

=

2 b − a

2 b − a

Z b a

Z b a f (x) cos

µ

2πx k b − a

¶ f (x) sin

µ

2πx k b − a

¶ dx dx.

(5.10)

(5.11)

Example 5.1 Compute the Fourier series of the function f (x) defined by f (x) =

½

π

4

π

4 x ∈ [−π, 0) x ∈ [0, π] over the interval [a, b] = [−π, π] ⇒ b − a = 2π.

π

4

−π π

π

4

We note that f (x) is an odd function. Since cos(kx) is even, it follows that f (x) cos(kx) is odd. Thus, a k

=

2

Z

π

−π f (x) cos(kx)dx = 0

70 CHAPTER 5.

DISCRETE FOURIER METHODS for all k. We compute b k as follows: b k

=

=

=

=

=

=

1

2k

1

2k

1

2

2

4

R π

−π

R

π f (x) sin(kx)dx f (x) sin(kx)dx (because odd × odd = even)

1

R

π

0

2

0 sin(kx)dx

1 k

[− cos(kx)]

π

0

(− cos(πk) + 1)

((−1) k+1

− 1).

Thus b k

=

(

1 k

0 if k is odd, if k is even.

The complete Fourier series for f (x), given by (5.9), may then be written as g(x) = sin(x) +

1

3 sin(3x) +

1

5 sin(5x) + · · · .

The Fourier coefficients of odd and even functions simplify under the following proposition:

Proposition 5.1 The Fourier coefficients of a function f (t) satisfy f (t) even =⇒ b k

= 0 ∀ k, f (t) odd =⇒ a k

= 0 ∀ k.

We may wonder: what functions can be expressed in terms of a Fourier series. The following fundamental theorem, originally proposed by Dirichlet, describes how the Fourier series g(x) is related to the original function f (x).

Theorem 5.1 Fundamental Convergence Theorem for Fourier Series.

Let

 s

Z b

V =

 f (x)

 a f (x)dx < ∞

.

Then for all f (x) ∈ V there exist coefficients a

0

, a k

, b k

(with 1 ≤ k < ∞) such that g n

(x) = a

2

0

+ n

X k=1

· a k cos

µ k

2πx b − a

+ b k sin

µ k

2πx b − a

¶¸ converges to f (x) for n → ∞ in the sense that g(x) = lim n→∞ g n

(x).

q

R b a

(f (x) − g(x)) = 0 with

Note that g n

(x) is sometimes also called S n

(x) (the n th partial sum of the

Fourier series). This theorem holds for any bounded interval [a, b], but for simplicity we will generally consider the interval to be [a, b] = [−π, π].

5.2.

FOURIER SERIES 71

V is called the set of square integrable functions over [a, b] and contains all polynomials, sinusoids and other nicely-behaved bounded functions. However, V does not contain many common functions, including f (x) = tan(x) and f (x) =

(x − a)

−1

.

In addition, V is a vector space of functions, i.e. if f

1

(x) ∈ V and f

2

(x) ∈

V , then c

1 f

1

(x) + c

2 f

2

(x) ∈ V (∀ c

1

, c

2

∈ R). We define a norm over V by kh(x)k

2

= s

Z b a h(x)

2 dx (L

2 norm).

(5.12)

As a norm, this measures the “size” of the function h(x). This implies a measure of the “distance” between f (x) ∈ V and g(x) ∈ V by kf(x) − g(x)k

2

= s

Z b

(f (x) − g(x))

2 dx.

a

(5.13)

We call the set of functions V that are defined on an interval [a, b] L

2

([a, b]).

We write

L

2

([a, b]) = {f(x) kf(x)k

2

< ∞} , (5.14) where k · k

2 is the L

2 norm defined by (5.12).

5.2.2

Complex form of the Fourier Series

Perhaps a more natural method of representing the Fourier series is its complex form. This form of the series has only one sequence of coefficients, but each coefficient is complex-valued. We will later demonstrate that this form is equivalent to the real form of the series.

Definition 5.2 The complex Fourier series of a function f (t) is h(t) =

X k=−∞ c k exp(ikt), with c k

=

1

Z

π

−π f (t) exp(−ikt)dt.

(5.15)

(5.16)

Note: In some books (and in MATLAB!)the complex form of the Fourier series is defined using a different sign convention, namely h(t) =

X c k exp(−ikt) with c k

=

1

Z π

−π f (t) exp(ikt)dt.

72 CHAPTER 5.

DISCRETE FOURIER METHODS

Relation between c k and a k

, b k

: We may apply Euler’s formula (5.3) to the complex form (5.15) to obtain c k

=

=

1

1

2

Z

µ 1

π

π

−π

Z f (t)(cos(−kt) + i sin(−kt))dt

π

−π f (t) cos(kt)dt − i

1

π

Z

π

−π f (t) sin(kt)dt

.

Comparing this expression with (5.10) and (5.11) reveals c k

=

1

2

(a k

− ib k

).

This holds for a ≤ k, but we can extend it to −∞ < k < ∞.

(5.17)

Proposition 5.2 The real and complex Fourier coefficients of a real function f (t) obey

1. c k

= c

−k

2. a

−k

= a k

, b

−k

= −b k

3. a k

= 2 Re(c k

), b k

= −2 Im(c k

)

4. f (t) even ⇒ Im(c k

) = 0, f (t) odd ⇒ Re(c k

) = 0

5. b

0

= 0, c

0

=

1

2 a

0

.

Proof.

1. From (5.16) we write c k

=

1

Z

π

−π f (t) exp(ikt)dt = c

−k

.

It also follows that Re(c

Im(c k

) = −Im(c

−k k

) = Re(c

−k

) (the real part of c

) (the imaginary part of c k k is even in k) and is odd in k).

2. This result follows from (5.10) and (5.11).

3. This result follows from (5.17).

4. This result follows from Proposition 5.1 in conjunction with (5.17).

5. This result follows from (5.11) and (5.17). ¤

Although the complex and real forms of the Fourier series appear very different, they describe the same Fourier series. We demonstrate this result in the following theorem:

Theorem 5.2 The complex and real forms of the Fourier series are equivalent

(h(t) = g(t)).

5.2.

FOURIER SERIES 73

Proof.

By the Euler formulas (5.4) and (5.5) we may write g(t) =

= a

0

2

+

X

(a k cos(kt) + b k sin(kt)) a

2

0 k=1

+ k=1

µ a k

2

(exp(ikt) + exp(−ikt)) + b k

2i

(exp(ikt) − exp(−ikt))

.

We use i

2

= −1 =⇒ i = −

1 i to write g(t) = a

0

2

+

X

·µ a k

− ib k

2 exp(ikt) +

µ a k

+ ib k

2 exp(−ikt)

¸

.

k=1

Then by Proposition 5.2, g(t) = c

0

+

X

·µ a k

− ib k

2

¶ exp(ikt) +

µ a

−k k=1

− ib

−k

2

¶ exp(−ikt)

¸

.

We apply the identity (5.17) and so write g(t) = c

0

+

X

[c k exp(ikt) + c

−k exp(−ikt)].

k=1

Thus, g(t) = k=−∞ c k exp(ikt) = h(t), which completes the proof. ¤

Example 5.2 Compute the complex Fourier series of the function f (x), defined by f (x) =

½

π

4

π

4 x ∈ [−π, 0] x ∈ [0, π] over the interval [a, b] = [−π, π] ⇒ b − a = 2π.

Recall from Example 5.1 that the real Fourier coefficients are a k

= 0 ∀ k, b k

=

½

1 k

, k odd

0, k even.

Then by (5.17) the complex coefficients are

½ c k

=

0, i

2k

, k odd k even.

The complex Fourier series is then h(t) = · · · + i

6 exp(−i3t) + i

2 exp(−it) − i

2 exp(it) − i

6 exp(i3t) − · · · .

74 CHAPTER 5.

DISCRETE FOURIER METHODS

5.3

Fourier Series and Orthogonal Basis

Recall that for the vector space V = R

2 we may define a standard basis B =

{~e

1

, ~e

2

} with ~e

1

= (1, 0) and ~e

2

= (0, 1). The number of elements in the basis

B must be equal to the dimension of the vector space (in this case 2). We may then write any vector ~x ∈ R

2 as a linear combination of the basis vectors:

~x = x

1

~e

1

+ x

2

~e

2

.

(5.18)

We define the scalar product between two vectors in V as

~x · ~y = x

1 y

1

+ x

2 y

2

=< ~x, ~y > .

Any scalar product also induces a norm over the vector space by k~xk

2

= p

< ~x, ~x > = q x

2

1

+ x

2

2

.

(5.19)

(5.20) x

(0,1) e

2 e

1

(1,0)

In particular, we wish to focus on a particular type of basis which has some useful properties:

Definition 5.3 We say that a basis B = {~e

1

, . . . , ~e n

} is an orthogonal basis if and only if

< ~e i

, ~e j

>= c ij for 1 ≤ i, j ≤ n, where c ij is nonzero if and only if i = j.

We note that the standard basis B = {~e

1

, ~e

2

} defined over V is orthogonal, since

< ~e

1

, ~e

1

>= 1, < ~e

2

, ~e

2

>= 1, < ~e

1

, ~e

2

>= 0.

Given an orthogonal basis {~e

1

, ~e

2

} we can easily find the components of any vector ~x in the basis. Consider the scalar product of ~x and ~e

1

:

< ~x, ~e

1

> = < x

1

~e

1

+ x

2

~e

2

, ~e

1

>

= x

1

< ~e

1

, ~e

1

> +x

2

< ~e

2

, ~e

1

>

| {z }

=0

= x

1

< ~e

1

, ~e

1

> .

5.3.

FOURIER SERIES AND ORTHOGONAL BASIS 75

Thus we may write x i

=< ~x, ~e i

> / < ~e i

, ~e i

> .

(5.21)

We now focus on the vector space of square integrable functions. We define our vector space by

V = L

2

([−π, π]) = {f(x) kf(x)k

2

< ∞} , (5.22) with basis

B = {1, cos(kt), sin(kt)} (1 ≤ k < ∞).

(5.23)

This vector space has an infinite (but countable) number of linearly independent basis vectors and so has infinite (but countable) dimension. Since B forms a basis for V , it follows that we may write any function f (t) ∈ V as a linear combination of the basis vectors: f (t) = a

0

· 1 +

"

X a k cos(kt)

#

+

"

X b k sin(kt)

#

.

k=1 k=1

(5.24)

The scalar product over this vector space is given by

< f (t), g(t) >=

Z

π

−π f (t)g(t)dt, which induces the standard 2-norm kf(t)k

2

= p

< f (t), f (t) > = s

Z

π

−π f (t)

2 dt.

(5.25)

(5.26)

In addition, we note that B is an orthogonal basis:

Proposition 5.3 B is an orthogonal basis for V .

Proof.

We note that B is a basis due to Theorem 5.1. In order to prove that

B is orthogonal, we need to consider the scalar product of all basis vectors:

< 1, 1 > =

< cos(kt), cos(kt) > =

< sin(kt), sin(kt) > =

Z

π

1

2 dt = 2π

−π

Z

π

−π

Z

π cos

2

(kt)dt = π (k ≥ 1) sin

2

(kt)dt = π (k ≥ 1).

−π

(If our basis vectors were normalized, each of these terms would equal 1).

We must now show that the scalar products between different basis vectors all vanish:

76 CHAPTER 5.

DISCRETE FOURIER METHODS

< 1, cos(kt) > =

< 1, sin(kt) > =

< cos(kt), sin(ℓt) > =

Z

π

−π

Z

π cos(kt)dt = 0 (k ≥ 1) sin(kt)dt = 0 (k ≥ 1)

−π

Z

π

−π cos(kt)

| {z } even sin(ℓt) dt = 0 (k, ℓ ≥ 1).

| {z } odd

The scalar product between different cosine basis vectors requires a more extensive derivation:

< cos(kt), cos(ℓt) > =

=

=

Z

π

−π

Z

π cos(kt) cos(ℓt)dt = 0 (k 6= ℓ)

1

2

[cos((k + ℓ)t) + cos((k − ℓ)t)] dt

1

−π

"

2

1 k + ℓ sin((k + ℓ)t)

¯

¯

π

¯

¯

−π

+

1 k − ℓ sin((k − ℓ)t)

¯

¯

π

¯

¯

−π

#

= 0.

We must also show < sin(kt), sin(ℓt) >= 0 for (k 6= ℓ ≥ 1). This is left as an exercise for the reader. ¤

Since B forms an orthogonal basis, we may use the projection formula (5.21) to determine the coefficients a k and b k

. By projection, we have a b a

2 k k

0

=

=

=

< f (t), cos(kt) >

< cos(kt), cos(kt) >

< f (t), sin(kt) >

< sin(kt), sin(kt) >

< f (t), 1 >

< 1, 1 >

=

1

=

=

1

π

1

−π

Z

π

π

Z

π

−π f (t) cos(kt)dt f (t) sin(kt)dt

Z

π

−π f (t)dt,

(5.27)

(5.28)

(5.29) which are simply (5.10) and (5.11), the standard formulae for the Fourier coefficients.

For the complex form of the Fourier series, we can recover formula (5.16) by choosing the alternate basis

(5.30) B = {exp(ikx)} (−∞ < k < ∞) and using the scalar product for complex functions,

< f (t), g(t) >=

Z

π

−π f (t)g(t)dt.

(5.31)

5.4.

DISCRETE FOURIER TRANSFORM 77

Then, the scalar product between two basis vectors is

< exp(ikt), exp(iℓt) >=

Z

π

−π exp(i(k − ℓ)t)dt = 2πδ kℓ

, (5.32) where δ kℓ is the Kroenecker delta. Applying the projection formula yields c k

=

< f (t), exp(ikt) >

< exp(ikt), exp(ikt) >

=

1

Z

π

−π f (t) exp(−ikt)dt, (5.33) which is (5.16).

5.4

Discrete Fourier Transform

The Fourier series is used to describe a continuous time signal f (t) with t ∈ [a, b], or f (t) periodic. We wish to turn our attention now to the discrete time signal f [n] over N points in 0 ≤ n ≤ N −1. This type of signal may arise from sampling or digital recording of a continuous time signal, such as in music, images, stock indexes or weather data. Applying the Discrete Fourier Transform (DFT) to a discrete signal yields the frequencies present in the signal (this will be explained in more detail later.)

In order to present an expression for the discrete Fourier transform, we first require some intermediate results:

Definition 5.4 The N th roots of unity are the integer powers of

W

N

= exp

µ i

N

.

(5.34)

We may write the N distinct N th roots of unity as

W k

N

= exp

µ i

2πk

N

(5.35) for 0 ≤ k < N.

Example 5.3 The N th roots of unity for N = 8 are

W

8 k

= exp

µ i

πk

4

.

In the complex plane, they may be depicted as

W

8

2

W

8

3

W

8

= W

8

9

W

8

8

= 1

-1 = W

8

4

W

8

5

W

8

7

W

8

6

78 CHAPTER 5.

DISCRETE FOURIER METHODS

Figure 5.1: A discrete temperature profile f [n] with Discrete Fourier transform

F [k].

5.4.

DISCRETE FOURIER TRANSFORM

Proposition 5.4 The N th roots of unity satisfy

(W k

N

)

N

= 1.

79

(5.36)

Proof.

By definition,

(W k

N

)

N

= exp

µ i kN 2π

N

= exp(ik2π) = 1. ¤

Proposition 5.5 The N th roots of unity satisfy

W

−k

N

= W

N −k

N

.

(5.37)

Proof.

By definition,

W

−k

N

= W

N

N

· W

−k

N

= W

N −k

N

. ¤

We are now prepared to define the discrete Fourier transform:

Definition 5.5 The discrete Fourier transform of a discrete time signal f [n] with 0 ≤ n ≤ N − 1 is

F [k] = DF T {f[n]} =

1

N n=0 f [n] W

−kn

N

, 0 ≤ k ≤ N − 1.

(5.38)

Definition 5.6 The inverse discrete Fourier transform of a discrete frequency signal F [k] with 0 ≤ k ≤ N − 1 is f [n] = IDF T {F [k]} =

N −1

X

F [k] W kn

N

, 0 ≤ k ≤ N − 1.

k=0

(5.39)

Note that these expressions are closely related to the complex form of the

Fourier series, given in equation (5.15). Recall that when we compute the Fourier series of a function, we enforce that it is periodic outside the interval we are examining. This requirement is analogous in the discrete case; we implicitly assume that the time signal f [n] is periodic when applying the discrete Fourier transform, which necessarily implies that the frequency signal is also periodic:

Proposition 5.6 The frequency signal F [k] given by (5.38) is periodic with period N :

F [k] = F [k + sN ] with s ∈ Z.

(5.40)

80 CHAPTER 5.

DISCRETE FOURIER METHODS

Proof.

This result follows from (5.38) and

W

−(k+sN)n

N

= W

−kn

N

W

−nsN

N

= W

−kn

N

. ¤ (5.41)

The discrete Fourier transform also leads to a set of symmetry properties for the frequency signal F [k]:

Proposition 5.7 For any real time signal f [n], the frequency signal F [k] satisfies

1. Re(F [k]) is even in k

2. Im(F [k]) is odd in k

3. F [k] = F [−k]

4. f [n] is even in n ⇒ Im(F [k]) = 0 (the DFT is real)

5. f [n] is odd in n ⇒ Re(F [k]) = 0 (the DFT is purely imaginary)

Example 5.4 Consider a cosine wave f (t) = cos(2πt), t ∈ [0, 1]. We sample at N = 6 points f [n] = cos(2πt n

), t n

= n

N

, 0 ≤ n ≤ N − 1.

(5.42)

1

0 1 2 3 4 5 6=N

1 t

-1

Using formula (5.4) we can rewrite f [n] as f [n] =

=

1

2

1 exp

2

W n

N

³ i2π n

N

+

1

2

W

´

−n

N

.

+

1

2 exp

³

−i2π n

N

´

By (5.39) we conclude that the transformed signal is F  =

1

2 and F [−1] = with all other F [k] zero. Recall that by periodicity, F [N − 1] = F [−1].

1

2

5.4.

DISCRETE FOURIER TRANSFORM

F[k]

1

2

81

-7 -6 -5 -4 -3 -2 -1 1 2 3 4 5 6 7

k

We note that cos(2πt n

) is a low frequency wave, but we still get higher frequency components like F . This effect is called aliasing.

5.4.1

Aliasing and the Sample Theorem

Consider a continuous time signal f (t) = cos(2πℓt) with t ∈ [0, 1] (the frequency is f = ℓ in Hz). We sample f (t) with N = 6 points at t n

=

0 ≤ n ≤ 6 to obtain a discrete time signal f[n] = cos(2πℓ n

N

F [k] = DF T {f[n]} for 0 ≤ ℓ ≤ 6: n

N

= n

6 with

). We consider ℓ = 0: The time signal is f [n] = cos

¡

2π · 0 ·

= 1 · W

0

N

, n

N

¢ with frequency signal

F  = 1 due to periodicity.

F  = 1, ℓ = 1: The time signal is f [n] =

= cos

1

2

¡

2π · 1 · exp

¡ i2π

N n n

N

¢

¢

+

1

2

=

1

2

W n

N exp

¡

−i2π n

N

¢

+

1

2

W

(N −1)n

N

, with frequency signal

F  =

1

2

, F  =

1

2

.

82 CHAPTER 5.

DISCRETE FOURIER METHODS ℓ = 2: The time signal is f [n] =

= cos

1

2

¡

2π · 2 · exp

¡ i2π

=

1

2

W

2n

N

+ n

N n

¢

N

· 2

¢

+

1

2

W

(N −2)n

N

,

1

2 exp

¡

−i2π n

N

· 4

¢ with frequency signal

F  =

1

2

, F  =

1

2

.

ℓ = 3: The time signal is f [n] =

=

= cos

1

2

1

2

¡

2π · 2 · exp

W

3n

N

¡ i2π

+ n

N n

¢

N

· 3

¢

+

1

2

W

(N −3)n

N

,

1

2 exp

¡

−i2π n

N

· 3

¢ with frequency signal

F  = 1.

ℓ = 4: The time signal is f [n] =

= cos

1

2

¡

2π · 4 · exp

¡ i2π

=

1

2

W

4n

N

+ n

N n

¢

N

· 4

¢

+

1

2

W

(N −4)n

N

,

1

2 exp

¡

−i2π n

N

· 2

¢ with frequency signal

F  =

1

2

, F  =

1

2

.

Examining these results, we may find it a little worrisome that the ℓ = 4 case and the ℓ = 2 case match. The sampling rate, or sampling frequency f s for this example is 6 samples / second, or 6Hz. The “critical frequency” for aliasing occurs at f = 3Hz (we have 2 f =f s

). In general, if f s

≥ 2 f then there will be no aliasing. If f s

< 2 f then aliasing will occur.

Theorem 5.3 “Sampling Theorem” (loosely formulated)

In order to avoid aliasing error, the sampling frequency f s should be at least twice the largest frequency present in the continuous time signal.

5.4.

DISCRETE FOURIER TRANSFORM 83

Figure 5.2: Left: Continuous time signal f (t) = cos(2πℓt) with 6 discrete sampling points f [n], 0 ≤ ℓ ≤ 6. Right: Discrete Fourier transforms of f[n].

Aliasing occurs for ℓ = 4, 5and6: sampled high frequency signals show up as low-frequency discrete signals when the sampling rate is not high enough.

84 CHAPTER 5.

DISCRETE FOURIER METHODS

For example, human audible sound falls in the range 20Hz to 20kHz. We will require a sampling frequency f s

≥ 2 · 20000Hz = 40kHz to avoid aliasing problems. As a result of this requirement, digital music CDs have a sampling frequency of f s

= 44.1kHz.

5.5

Fast Fourier Transform

We wish to numerically compute the discrete Fourier transform F [k] of a time signal f [n]. If we assume that the factors W

−kn

N are precomputed and stored in a table (there will be N factors), then we can use formula (5.38) directly to compute the N coefficients F [k] (0 ≤ k ≤ N − 1). The amount of work we must do per coefficient is then

W = (N − 1)A + (N + 1)M = 2N (complex) flops.

The total work required to compute all coefficients is

W = N · 2N = 2N

2

(complex) flops.

This process is fairly inefficient; for a typical one minute sound file sampled at 44.1kHz we require 2.656 × 10

6 samples for the time signal and 1.4 × 10

13

(complex) flops to compute the discrete Fourier transform which is very large, even for today’s fast computers. We pose the question: “how do we compute the discrete Fourier coefficients more efficiently?”

In order to answer this, we first require some intermediate results:

Theorem 5.4 If N = 2 m for some integer m, then the length N discrete

Fourier transform F [k] of discrete time signals f [n] can be calculated by combining two length

N

2 discrete Fourier transforms. We define g[n] = f [n] + f [n + N/2] (0 ≤ n ≤ N/2 − 1) h[n] = (f [n] − f[n + N/2])W

−n

N

(0 ≤ n ≤ N/2 − 1).

(5.43)

(5.44)

Then

F [2ℓ] =

F [2ℓ + 1] =

1

2

1

2

DF T {g[n]}

DF T {h[n]}

(even indices)

(odd indices).

(5.45)

(5.46)

5.5.

FAST FOURIER TRANSFORM

Proof.

From the direct formula for the discrete Fourier transform,

F [k] =

=

=

=

1

N

N −1

X f [n]W

−kn

N n=0

1

N

N/2−1

X f [n]W

−kn

N n=0

+

1

N

N −1

X n=N/2 f [n]W

−kn

N

1

N

N/2−1

X f [n]W

−kn

N n=0

+

1

N

N/2−1

X f [ℓ + N/2]W

−k(ℓ+N/2)

N ℓ=0

1

N

N/2−1

X

(f [n] + f [n + N/2]W

−kN/2

N

)W

−kn

N

.

n=0

The inner root of unity may be simplified:

W

−kN/2

N

= exp

µ

−i2π kN/2

N

= exp(−ikπ)

= (exp(−iπ)) k

= (−1) k

.

We now have two cases, based on whether k is even or odd:

Case 1 (k even): We have k = 2ℓ (0 ≤ ℓ ≤ N/2 − 1). Thus,

F [2ℓ] =

=

=

1

N/2−1

X

(f [n] + f [n + N/2])W

−2ℓn

N

N

 n=0

1

2

1

N/2

N/2−1

X n=0 g[n]W

−ℓn

N/2

1

2

DF T {g[n]}.

Case 2 (k odd): We have k = 2ℓ + 1 (0 ≤ ℓ ≤ N/2 − 1). Thus,

F [2ℓ + 1] =

=

=

1

N/2−1

X

(f [n] + f [n + N/2])W

−2ℓn−n

N

N

 n=0

1

2

1

N/2

N/2−1

X h[n]W

−ℓn

N/2

 n=0

1

2

DF T {h[n]}. ¤

85

86 CHAPTER 5.

DISCRETE FOURIER METHODS

If we split the discrete Fourier transform into two transforms (each of length

N/2), the total work required will be

W tot

= 2 · 2(N/2)

2 f lops = N

2 f lops.

Recall that the direct method requires 2N

2 flops. In splitting up the Fourier transform, we only require half as much work. But we may further apply the splitting method recursively!

In order to compute the splitting, we require N/2 additions for g[n], N/2 additions and multiplications for h[n], and N multiplications for the transform.

In total, we will require

5

2

N flops at each level (where N is the length at each level).

Theorem 5.5 The fast Fourier transform (FFT) requires O(N log

2

N ) flops.

Proof.

Assume N = 2 m

. We tabulate the results at each step, as follows

Level Length per DFT # of DFTs m 2 m

= N 1 m − 1 m − 2

.

..

1

0

2 m−1

2 m−2

.

..

2

1

2

4

.

..

2 m−1

2 m

2 ·

4 ·

2 m−1

·

5

2

5

2

5

2

·

·

Total work

5

2

· N flops

N

2

N

4

=

=

5

2

5

2

· N flops

· N flops

·

2

N m

−1

.

..

=

5

2

· N flops

None (F  = f )

We sum over the total work column:

5

2

N flops per level · log

2

(N ) levels =

5

2

N log

2

N flops, which is our desired result. ¤

The pseudo-code for this algorithm is given as follows:

5.6.

DFT AND ORTHOGONAL BASIS 87

Fast Fourier Transform function F = FastFT(f, N) m = log N if m = 0

F = f else build g[N] build h[N]

F[even] = (1/2) FastFT(g, N/2)

F[odd] = (1/2) FastFT(h, N/2) end

We note that this algorithm can also be applied to signals where N 6= 2 m by padding the signal with zeroes. In addition, this algorithm also works with complex f [n], but requires that all computations be done in complex flops.

Computationally, the fast Fourier transform is almost always used, due to its efficiency.

5.6

DFT and Orthogonal Basis

Recall that over the vector space V = R

2 we may define an orthogonal basis

B = {~e

1

, ~e

2

}, and an alternate orthogonal basis with < ~e i

, ~e j

>= δ ij

B

= { ~

1 f

2

}, with < ~ i f j

>= δ ij

.

Then any vector ~x can be expressed in terms of either basis (see figure).

x

(0,1) f

2 e

2 f

1 e

1

(1,0)

Consider the discrete Fourier transform with N = 4, for simplicity. The time signal f [n] (0 ≤ n ≤ N − 1 = 3) may be defined as a time signal vector

¡ f , f , f , f 

¢

∈ R

4

.

(5.47)

88 CHAPTER 5.

DISCRETE FOURIER METHODS

Since R

4 is a vector space, we may define an orthogonal basis f

0

, ~

1 f

2 f

3

} with f

2 f

3 f

0

= (1, 0, 0, 0),

~

1

= (0, 1, 0, 0),

=

=

(0, 0, 1, 0),

(0, 0, 0, 1).

Then the time signal vector may be written as

(5.48) f

0 f

1 f

2 f

3

.

(5.49)

From (5.39) we may also write the time signal vector as

Ã

X

F [k]W k0

N

, k=0 k=0

F [k]W k1

N

, k=0

F [k]W k2

N

, k=0

F [k]W k3

N

!

, or k=0

F k

F

0

F

1

F

2

F

3

, where ~ k is a vector in an alternate basis. We define

(5.50)

B

= { ~

0

, ~

1

, ~

2

F

3

}, (5.51) where

~

F

F

F

0

1

2

3

= (

= (

= (

= (

W

W

W

W

00

N

10

N

20

N

30

N

, W

, W

, W

, W

01

N

11

N

21

N

31

N

, W

, W

, W

, W

02

N

12

N

22

N

32

N

,

,

,

, W

W

W

W

03

N

13

N

23

N

33

N n = 0 n = 1 n = 2 n = 3

) −→ k = 0

) −→ k = 1

) −→ k = 2

) −→ k = 3

(5.52)

We conclude from (5.50) that the discrete Fourier coefficients F [k] of the basis B

. This is the same as saying that the DFT is nothing more than a basis transformation (with a basis that is useful to extract frequency information).

Is B

′ an orthogonal basis? Consider the vector space V = C n vectors). We define the scalar product between two vectors ~x, ~y ∈ C n

(complex as

< ~x, ~y >= ~x · ~y = n

X x j y j

.

j=1

(5.53)

5.6.

DFT AND ORTHOGONAL BASIS 89

Figure 5.3: A basis for the discrete Fourier transform over N = 8 points. For each basis vector ~ k

, the functions on the left represents the real component and the functions on the right represent the imaginary component.

90 CHAPTER 5.

DISCRETE FOURIER METHODS

Under this definition, the scalar product of the basis vectors in B

′ is

< ~ i

F j

>= k=0

¡

W ik

N

¢¡

W

−jk

N

¢

= k=0

W

(i−j)k

N

.

If i = j then

F i

F i

>= 1 = N.

k=0

If i 6= j then by the geometric series formula we may write

< ~ i

F j

>=

¡

W i−j

N

W

¢ i−j

N

N

− 1

.

− 1

But by the properties of W

N

, (W i−j

N

)

N

= (W

N

N

) i−j

= 1 so we get

< ~ i

F j

>= 0, i 6= j, and so B

′ is an orthogonal basis!

(5.54)

(5.55)

Recall that since B

′ is an orthogonal basis, we can use the projection formula

(5.21) in conjunction with expressions (5.47) and (5.52) to find F [k]:

F k

>

F [k] =

F k

F k

>

=

1

N

N −1

X f [n]W kn

N n=0

=

1

N

N −1

X f [n]W

−kn

N

.

n=0

This is just the discrete Fourier transform formula (5.38).

5.7

Power Spectrum and Parseval’s Theorem

Recall the Fourier series of a continuous function f (t). We assume that f (t) is the amplitude of a sound signal. From physics, we know that

R b a f (t)

2 dt is proportional to the power in a sound signal on a time interval [a, b]. In the frequency domain, we define the concept of the power spectrum:

Definition 5.7 Let F [k] be the complex Fourier coefficients of a discrete (or continuous) signal f [n] (or f (t)). Then the power spectrum of f [n] (or f (t)) is |F [k]|

2

.

Parseval’s theorem then provides a connection between the power of a signal in the time domain and the summed power spectrum in the frequency domain:

5.7.

POWER SPECTRUM AND PARSEVAL’S THEOREM

Theorem 5.6 (Parseval’s Theorem.)

91

(A) (Continuous case) Let F [k] be the complex Fourier coefficients of a real continuous signal f (t). Then

1 b − a

|

Z a b

{z f (t)

2 dt

} total power in time domain

= |F [k]|

2

.

k=−∞

| {z } total power in frequency domain

(5.56)

(B) (Discrete case) Let F [k] be the complex Fourier coefficients of a real discrete signal f [n]. Then

1

|f[n]|

2

N

| n=0

{z } total power in time domain

= |F [k]|

2

.

k=−∞

| {z } total power in frequency domain

(5.57)

Proof of (A).

1 b − a

Z b f (t)

2 dt = a

=

1 b − a

1 b − a

Z b f (t) · f(t)dt a

Z b

Ã

X a k=−∞

F [k] exp

µ i2π kt b − a

¶ f (t)dt

!

.

We assume we can interchange the order of the integration and summation:

1 b − a

Z b f (t)

2 dt = a k=−∞

F [k]

Ã

1 b − a

Z b a exp

µ i2π kt b − a

¶ f (t)dt

!

=

=

F [k] · F [k] k=−∞

X

|F [k]|

2

. ¤ k=−∞

The proof of (B) is analogous.

These notes have been funded by...

92 CHAPTER 5.

DISCRETE FOURIER METHODS

Chapter 6

### Numerical Linear Algebra

6.1

Introduction

Consider the linear system a

11 x

1

+ a

12 x

2

+ · · · + a

1n x n

= z

1 a

21 x

1

+ a

22 x

2

+ · · · + a

2n x n

= z

2

.

..

..

.

. ..

..

.

.

..

a n1 x

1

+ a n2 x

2

+ · · · + a nn x n

= z n

(6.1) with coefficients a ij and unknowns x i

. We may rewrite this as a matrix system

A~x = ~b where A ∈ R n×n and ~x,~b ∈ R n as follows:

 a a

21 a

11

.

..

n1 a a

12 a

22

.

..

n2

· · · a

1n

· · · a

2n

. ..

.

..

· · · a nn

 x

1 x

2 x

.

..

n

=

 b b

1 b

2

.

..

n

.

We consider the problem of solving for ~x computationally, where we desire

(6.2)

• accuracy (we must make sure that this is a well-conditioned problem and that we have a stable algorithm)

• efficiency (we wish to solve potentially large systems with limited resources)

This problem has several well-known applications. For example, the Google search engine uses linear systems in order to rank the results it retrieves for each keyword search. Here we see that efficiency is very important: the linear systems they use may contain more than three billion equations!

We may also ask if the problem of solving a given linear system is well posed, i.e., can we find a single unique solution ~x that satisfies the linear system? We may appeal to a standard result from linear algebra to answer this question:

93

94 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Theorem 6.1 Existence and Uniqueness Consider A~x = ~b.

Case 1: det(A) 6= 0 (A has linearly independent rows/columns, or A is invertible) if and only if ~x = A

−1

~b is the unique solution of A~x = ~b.

Case 2: det(A) = 0 (recall that range(A) = column space of A), then

Case 2a: If ~b ∈ range(A) then A~x = ~b has infinitely many solutions.

Case 2b: If ~b 6∈ range(A) then A~x = ~b has no solutions.

6.2

Gaussian Elimination

Gaussian elimination was originally described by Carl Friedrich Gauss in 1809 in his work on celestial mechanics entitled Theoria Motus Corporum Coelestium.

However, elimination in the form presented here was already in use well beforehand – in fact, it was even known in China in the first century B.C.

6.2.1

LU Factorization

Before continuing, we first consider the definition of a triangular matrix. Linear systems involving triangular matrices are very easy to solve and appear when performing Gaussian elimination.

Definition 6.1 A matrix A ∈ R n×n with components a ij is said to be uppertriangular if a ij

= 0 for all i > j. Similarly, A is said to be lower-triangular if a ij

= 0 for all i < j. A is triangular if it is either upper-triangular or lowertriangular.

Gaussian elimination may be performed in two phases:

• Phase 1: Reduce the matrix A to upper triangular form.

• Phase 2: Solve the reduced system by backward substitution.

We illustrate Gaussian elimination of a linear system with an example:

Example 6.1 Consider the system A~x = ~b with

 

A =

1 2 3

4 5 6

7 8 1

.

A

(2)

In the first step we choose the pivot element a

(1)

11

.

= 1 and use it to compute

Step i = 1 : A

(1)

Step i = 2 : A

(2)

=

=

1 2 3

4 5 6

7 8 1

1 2 3

0 −3 −6

0 −6 −20

6.2.

GAUSSIAN ELIMINATION 95

In this case A

(2) first row of A

(1) is obtained from A

(1) by taking linear combinations of the with each of the other rows so as to generate zeroes in the first column. This operation may also be represented by matrix multiplication on the left with the matrix M

1

:

M

1

1 0 0

4

1

7

1

1 0

0 1

In general, we may write

0 0

M

1

=

1 a

(1) a

21

(1) a

11

(1)

31 a

(1)

11

1

0

0

1

A

(1)

1 2 3

4 5 6

7 8 1

,

=

=

A

(2)

=

 a

(2) a

11

(2)

21

(2) a

31

1 2

A

(2)

3

0 −3 −6

0 −6 −20

.

a a

(2)

12

(2)

22

(2) a

32 a a

(2)

13

(2)

23

(2) a

33

 .

A

(3)

We now choose a

(2)

22 using M

2

· A

(2) as the pivot element. We may then compute the matrix

= A

(3)

:

Step i = 3 : M

2

=

 where we obtain A

(3) by

1 0

0

0 −

1

(−6)

−3

0

0

1

,

A

(3)

=

1 2 3

0 −3 −6

0 0 −8

,

M

2

1 0 0

0 1 0

0 −2 1

1

A

(2)

2 3

0 −3 −6

0 −6 −20

=

=

1

A

(3)

2 3

0 −3 −6

0 0 −8

.

We note that A

(3) is in upper triangular form, as desired.

Example 6.1 Recap:

M

A =

1

=

1 2 3

4 5 6

7 8 1

1 0 0

−4 1 0

−7 0 1

We may write

U

M

2

=

=

M

2

· (M

1

· A) = U

(M

2

· M

1

) · A = U

A = (M

2

· M

1

)

−1

U

A = M

−1

1

M

−1

2

U

1 2 3

0 −3 −6

0 0 8

1 0 0

0 1 0

0 −2 1

96 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

We will define a matrix L by M

−1

1

M

−1

2

= L and so may write the matrix A as the product A = LU . We now wish to consider the properties of the matrices

M i and L. Consider the matrix M

1

, introduced above, and its inverse:

M

1

=

1 0 0

−4 1 0

−7 0 1

M

−1

1

=

1 0 0

4 1 0

7 0 1

.

We define the matrix L i as the inverse of the matrix M i

(so L i

M i

= I). The following inversion property then follows from the structure of the matrix M i

:

Inversion Property: L i can be obtained from M i by swapping the signs of the off-diagonal elements.

Example 6.2 Consider the matrix M

2

, introduced above. A simple calculation allows us to obtain the following result:

L

2

= M

−1

2

=

1 0 0

0 1 0

0 −2 1

−1

=

1 0 0

0 1 0

0 2 1

, which satisfies the inversion property.

L i

In addition, the structure of L can be directly determined from the matrices using the combination property:

Combination Property: In general, L =

Q n−1 i=1

L i

= L

1

· L

2

· · · · · L n−1

. L can be obtained from the L i by placing all of the off-diagonal elements of the matrices L i in the corresponding position in L.

We note that the matrix L is a special type of lower-triangular matrix, defined as follows:

Definition 6.2 L is called a lower triangular matrix with unit diagonal if and only if the matrix elements of L vanish above the diagonal and are 1 on the diagonal (i.e. ℓ ij

= 0 ∀ j > i and ℓ ii

= 1 ∀ i).

Using these two properties, we may write the LU decomposition of A as follows:

M

2

M

1

A = U

A = M

−1

1

M

−1

2

U

A = LU, with L unit lower triangular and U upper triangular. For example 6.1, we write

A

1 2 3

4 5 6

7 8 1

=

=

L

1 0 0

4 1 0

7 2 1

1 2

U

3

0 −3 −6

0 0 −8

.

6.2.

GAUSSIAN ELIMINATION 97

The technique discussed here may be generalized to square matrices of any size and is more generally known as LU decomposition.

Procedure: LU Decomposition.

For any A ∈ R n×n

LU decomposition in n steps as follows: we may compute the

We obtain M i from

A

A

A

(1)

(2)

(3)

A

(n)

= A

= M

1

= M

.

..

2

· A

(1)

· A

(2)

= M

2

M

1

A

(1)

= M n−1

· A

(n−1)

1

M j

=

0

. ..

c

1 ij

. ..

0

,

1

After computing the product of all M i

, we have c ij

= − a

(j) ij a

(j) jj

.

M n−1

|

· M n−2

· · · M

2

· M

1

{z }

·A = U, which may be inverted to obtain

A = M

−1

1

|

· M

−1

2

· · · M

−1 n−2

{z

· M

−1 n−1

}

·U.

Since we defined L j

= M

−1 j

, we also have

A = L

1

· L

2

· · · L n−2

· L n−1

| {z }

·U and so obtain the LU decomposition of A,

A = L · U.

Since L and U are triangular matrices, we may easily compute the solution to a linear system with either matrix L or U . The decomposition then leads to the final step in our method of solving a general linear system:

98 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Procedure: Solving a Linear System by LU Decomposition.

Consider a linear system given by A~x = ~b. Since we now have a procedure for computing the LU decomposition of a matrix A, we may write an algorithm for performing

Gaussian Elimination computationally.

• Phase 1: Decompose A = LU so we may write the linear system as

LU~x = ~b.

• Phase 2: Solve L~y = ~b for ~y by forward substitution.

• Phase 3: Solve U~x = ~y for ~x by backward substitution.

Note: Retaining L and U is advantageous when systems have to be solved with the same A and multiple right-hand-side vectors ~b.

6.2.2

Pivoting

We observe that the LU decomposition algorithm breaks down when at some step i the pivot element a ii is equal to zero. However, this problem does not necessarily imply that the system is unsolvable.

Example 6.3 Consider the linear system A~x = ~b defined by

µ

0 1

2 1

¶ µ x

1 x

2

=

µ

1

3

.

We note that the pivot element in this example is zero in the first step, making it impossible to proceed using the LU decomposition algorithm described previously. However, we will have no problem proceeding if we swap the first and second rows before applying the LU decomposition.

µ

2 1

0 1

¶ µ x

1 x

2

=

µ

3

1

.

In this case, swapping rows reduces the system to upper-triangular form, and so we may solve it very easily. By inspection, this system has the solution

~x = (1 1)

T

.

More formally, the operation of swapping rows can be written as multiplication on the left with a permutation matrix P . For example, in the previous example we may write

P =

µ

0 1

1 0

, A =

µ

0 1

2 1

.

=⇒ P A =

µ

0 1

1 0

¶ µ

0 1

2 1

=

µ

2 1

0 1

.

Then we have A~x = ~b ⇐⇒ P A~x = P~b.

6.2.

GAUSSIAN ELIMINATION 99

Definition 6.3 P ∈ R n×n is a permutation matrix if and only if P is obtained from the unit matrix I n by swapping any number of rows.

Example 6.4 An example of a 4 × 4 permutation matrix is

P =

0 0 0 1

0 0 1 0

1 0 0 0

0 1 0 0

.

We may also (equivalently) define a permutation matrix P as an n×n matrix with elements 1 and 0 such that every row and column has exactly one 1. In general, we find that the addition of the permutation matrix step is all that is needed to make the LU decomposition algorithm applicable to any square matrix:

Theorem 6.2 For all A ∈ R n×n there exists a permutation matrix P , a unit lower triangular matrix L and an upper triangular matrix U (all of type R n×n

) such that P A = LU .

Corollary 6.1 If A is nonsingular then A~x = ~b can be solved by the LU decomposition algorithm applied to P A.

Proof.

We write our linear system as A~x = ~b and multiply both sides by the permutation matrix P (from Theorem 6.2) to obtain P A~x = P~b. From

Corollary 6.1, we have that P A = LU and so may write LU~x = P~b. Thus we may simply apply forward and backward substitution and so solve this system by LU decomposition. The substitution steps will not lead to divisions by zero as L and U do not have any vanishing diagonal elements. This follows because det(A) = det(U ) det(L)/ det(P ) 6= 0, which means that

Q n i=1

6= 0 as det(P ) = ±1 and det(L) = 1 (see Section 6.2.4.) ¤ u ii

6.2.3

Algorithm and Computational Cost

We now consider the computational implementation of Gaussian elimination using the LU decomposition. Recall that Gaussian elimination can be performed in two phases. We will assume that pivoting is not needed.

100 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Phase 1: Compute the LU decomposition, A = LU . The pseudocode for this algorithm is as follows:

LU-Decomposition

L = diag(1)

U = A for p = 1:n-1 for r = p+1:n m = -u(r,p)/u(p,p) u(r,p) = 0 for c = p+1:n u(r,c) = u(r,c) + m u(p,c) end for l(r,p) = -m end for end for

Here, the variable p represents the row of the pivot element, r is the current row and c is the current column.

Aside: An efficient storage method.

We can save memory by implementing this algorithm in a clever way. Recall that the LU decomposition of A is given by

A = LU =

1 0

×

. ..

× ×

. ..

× × × 1

× × × ×

. .. × × ×

. .. × ×

0

. .. ×

.

We may store L and U together as a single matrix since we know that the diagonal components of L are all equal to 1. Thus the diagonal and uppertriangular portion of the new combined matrix will consist of the elements of U and the lower-triangular portion will consist of the elements of L.

With this storage mechanism, we can also perform LU decomposition in place; i.e. perform all computations directly on top of the input matrix A.

However, using this technique we lose the original contents of the matrix A.

Computational Cost of Phase 1

In order to compute the computational cost of this algorithm, we consider two counters: Let M be the number of multiplications or divisions and let A be the

6.2.

GAUSSIAN ELIMINATION 101 number of additions or subtractions. The following summation identities will come in handy in performing our analysis: n−1

X

1 = n − 1, p=1 n−1

X p = p=1

1

2 n(n − 1), n−1

X p

2

= p=1

1

6 n(n − 1)(2n − 1).

• Count A: We sum over all loops in the algorithm to yield

W = n−1

X n

X n

X p=1 r=p+1 c=p+1

A

=

X

(n − p)

2

A p=1

=

=

=

=

X

(n

2

− 2np + p

2

)A p=1

· 1

6

·

(

2

6

· n · (n − 1) · (2n − 1) −

− 1 + 1)n

3

+ O(n

2

)

¸

A

· 1

3 n

3

+ O(n

2

)

¸

A.

1

2

· 2n · n · (n − 1) + n

2

· (n − 1)

¸

A

• Count M: Similarly we determine

W =

· 1

3 n

3

+ O(n

2

)

¸

M.

(close inspection reveals that the additional multiplication only affects the

O(n

2

) terms.)

Thus the total number of floating point operations is

W =

2

3 n

3

+ O(n

2

) flops.

(6.3)

(on modern CPUs, type A operations and type M operations take approximately the same amount of time.)

102 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Phase 2: We solve L~y = ~b by forward substitution.

1

L(i, j)

. ..

0

1

~y

=

 

.

The i th equation in this system is given by i

X

L(i, k)y(k) = b(i).

k=1

We rewrite this as y(i) = b(i) − k=1

L(i, k)y(k).

Thus we may formulate an algorithm for forward substitution by solving for each y(i) in turn:

Forward Substitution y = b for r = 2:n for c = 1:r-1 y(r) = y(r) - L(r,c) * y(c) end for end for

Here, r is the current row and c is the current column. We may determine the computational cost of the algorithm, as with LU decomposition:

W =

= n

X X

(1M + 1A) r=2 c=1 n

X

(r − 1)(1M + 1A) r=2

= s(1M + 1A) s=1

=

1

2 n(n − 1)(M + A)

= n(n − 1) flops

6.2.

GAUSSIAN ELIMINATION 103

Thus, the total number of floating point operations required for Forward

Substitution is

W = n

2

+ O(n) flops.

(6.4)

Phase 3: We solve U~x = ~y by backward substitution.

U (1, 1)

U (2, 2)

. ..

U (i, j)

U (n, n)

~x

=

~y

.

The i th equation in this system is given by i

X u(i, k)x(k) = y(i).

k=1

We rewrite this as x(i) =

" y(i) − n

X k=i+1 u(i, k)x(k)

#

1 u(i, i)

.

Thus we may formulate an algorithm for backward substitution by solving for each x(i) in turn:

Backward Substitution x = y for r = n:-1:1 for c = r+1:n x(i) = x(i) - U(i,j) * x(c) end for x(i) = x(i) / U(i,i) end for

Here, r is the current row and c is the current column. The computational complexity will be the same as with forward substitution:

W = n

2

+ O(n) flops.

(6.5)

Note: If u(i, i) = 0 for some i, the backward substitution algorithm breaks down, but this can never happen if det(A) 6= 0.

104 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

6.2.4

Determinants

Before continuing, we consider some of the properties of the determinant.

Definition 6.4 The determinant of a matrix A ∈ R n×n det(A) = n

X

(−1) i+j a ij j=1 det(A ij

), is given by for fixed i, (6.6) with

A ij

=

 a

11 a

21 a

(i−1)(1) a

(i+1)(1) a n1 a a a a

12

22

(i−1)(2)

(i+1)(2)

· · ·

· · · a

· · · a a

· · · a

(1)(j−1)

(2)(j−1)

(i−1)(j−1)

(i+1)(j−1) a a a a

(1)(j+1)

(2)(j+1)

(i−1)(j+1)

(i+1)(j+1)

· · ·

· · · a a

1n

2n

· · · a

(i−1)(n)

· · · a

(i+1)(n)

.

· · · a nn

.

a n2

· · · a

(n)(j−1) a

(n)(j+1) i.e. the matrix A ij is an (n − 1) × (n − 1) matrix obtained by removing row i and column j from the original matrix A.

This is the expansion of the determinant about row i for any 1 ≤ i ≤ n.

We may also consider the expansion of the determinant about column j for any

1 ≤ j ≤ n as follows: det(A) = n

X

(−1) i+j a ij det(A ij

), i=1 for fixed j.

(6.7)

Example 6.5 We compute the determinant of the matrix used in example 6.1

using an expansion of the first row: det

¯

¯

¯

¯

¯

¯

1

4

7

2 3

5 6

8 1

¯

¯

¯

¯

¯

¯

= 1 · det

¯

¯

¯

¯

5

8

6

1

¯

¯

¯

¯ −

2 · det

¯

¯

¯

¯

4 6

7 1

¯

¯

¯

¯

+ 3 · det

¯

¯

¯

¯

4 5

7 8

¯

¯

¯

¯

= 24.

The determinant satisfies several useful properties, which we may formulate in the following proposition:

Proposition 6.1 The following identities hold for determinants:

1. det(BC) = det(B) · det(C), (B, C ∈ R n×n

)

2. U ∈ R n×n

3. L ∈ R n×n upper triangular ⇒ det(U) =

Q n i=1 u ii lower triangular ⇒ det(L) =

Q n i=1 ℓ ii

4. P ∈ R n×n permutation matrix

½

⇒ det(P ) =

+1 even number of row changes to obtain P from I n

.

−1 odd number of row changes to obtain P from I n

.

6.2.

GAUSSIAN ELIMINATION 105

Proof of 2.

Consider the following upper-triangular matrix U :

U =

 u

11

0 u

× × · · · ×

22

× · · · ×

0 u

33

· · · ×

. ..

.

..

u nn

.

We expand on the first column to yield det(U ) = u

11 det(U

(2)

) +

0 z }| { u

21 det(· · · ) + · · ·

= u

11 u

22 det(U

(3)

) +

0 z }| { u

32 det(· · · ) + · · ·

= · · · n

Y

= u ii

.

i=1

¤

The proof of 1, 3, and 4 are similar and are left as an exercise for the reader.

Recall that we may solve the linear system A~x = ~b using Gaussian elimination as follows:

• Phase 1: P A = LU

• Phase 2: L~y = P~b

• Phase 3: U~x = ~y

However, recall that the algorithm for the LU decomposition (phase 1) can only be performed if there are no divisions by zero. How can we guarantee that this will not occur?

Proposition 6.2 Consider a matrix A ∈ R n×n if the decomposition P A = LU has u ii

6= 0 ∀ i.

. Then det(A) 6= 0 if and only

Proof.

P A = LU det(P A) = det(LU ) det(P )

| {z }

±1 det(A) = det(L)

| {z }

1 det(U )

| {z }

Q n i

=0 u ii

± det(A) = n

Y u ii

.

i=0

Thus we have det(A) 6= 0 ⇔ u ii

6= 0 ∀ i.

¤

106 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Intermission: Cramer’s Rule

Consider a set of linear equations in matrix form A~x = ~b as in equation (6.2).

The determinant det(A) is given by det(A) =

¯

¯

¯

¯

¯

¯ a

11 a

12 a

13 a

21 a

22 a

23 a

31 a

32 a

33

¯

¯

¯

¯

¯

¯

.

(6.8)

If we multiply det(A) by x

1 and apply a property of determinants, we may take the x

1 inside the determinant along one of the columns.

x

1 det(A) = x

1

¯

¯

¯

¯

¯

¯ a

11 a

12 a

13 a

21 a

22 a

23 a

31 a

32 a

33

¯

¯

¯

¯

¯

¯

=

¯

¯

¯

¯

¯

¯ x

1 a

11 a

12 a

13 x

1 a

21 a

22 a

23 x

1 a

31 a

32 a

33

¯

¯

¯

¯

¯

¯

.

(6.9)

By another property of determinants, we may add to a column a linear combination of the other columns without changing the determinant. We write x

1 det(A) =

¯

¯

¯

¯

¯

¯ x

1 a

11 x

1 a

21 x

1 a

31

+ x

2 a

12

+ x

2 a

22

+ x

2 a

32

+ x

3 a

13

+ x

3 a

23

+ x

3 a

33 a

12 a

22 a

32 a

13 a

23 a

33

¯

¯

¯

¯

¯

¯

=

¯

¯

¯

¯

¯

¯ b

1 b

2 b

3 a

12 a

22 a

32 a

13 a

23 a

33

¯

¯

¯

¯

¯

¯

. (6.10)

We define D i as the determinant of A with the i th column replaced with ~b. If det(A) 6= 0, it follows from (6.10) that x i

= D i

/ det(A). So, for our simple linear system: x

1

=

¯

¯

¯

¯

¯

¯ b

1 a

12 a

13 b

2 a

22 a

23 b

3 a

32 a

33

D

¯

¯

¯

¯

¯

¯ x

2

=

¯

¯

¯

¯

¯

¯ a

11 b

1 a

13 a

21 b

2 a

23 a

31 b

3 a

33

D

¯

¯

¯

¯

¯

¯ x

3

=

¯

¯

¯

¯

¯

¯ a

11 a

12 b

1 a

21 a

22 b

2 a

31 a

32 b

3

D

¯

¯

¯

¯

¯

¯

This procedure is known as Cramer’s Rule and can be generalized to a set of n equations. Using this method, we can solve our linear system by calculating the determinants of n + 1 matrices.

Consider the general case of A ∈ R n×n

. In order to apply Cramer’s Rule we must compute n + 1 determinants, each of a matrix of size n × n. If we use the recursive method to compute each of these determinants, for each of the n + 1 determinants, we must compute n determinants of a matrix of size

(n − 1) × (n − 1). A short calculation reveals that we need to compute (n + 1)!

determinants in the general case. This complexity is much higher than for any polynomial-time algorithm; in fact, it is even much worse than even an exponential time algorithm! Therefore, calculation of the determinant as in the proof of Proposition 6.2, which requires O(n

3

) operations, is a much better idea.

6.3.

CONDITION AND STABILITY 107

6.3

Condition and Stability

6.3.1

The Matrix Norm

The matrix norm and the vector norm are both tools designed to allow us to measure the size of either a matrix or a vector. We consider a particular set of matrix norms, namely those induced by a vector norm. These are also known as the set of “natural” matrix norms over the vector space of matrices (for matrices of the form A ∈ R n×n

, the set V = R n×n is a vector space over R.)

Definition 6.5 The natural matrix p-norm for p = 1, 2 or ∞ is defined by kAk p

= max k~xk6=0 kA~xk p

.

k~xk p

(6.11)

An inequality then follows from this definition by rearranging the defining equation (6.11).

Proposition 6.3 kA~xk p

≤ kAk p k~xk p

.

We note that we also have the following properties associated with the matrix norm:

Proposition 6.4 Consider a matrix A ∈ R n×n

1. kAk

1

= max

1≤j≤n

P n i=1 with elements a ij

. Then

|a ij

| (maximum absolute column sum)

2. kAk

= max

1≤i≤n

P n j=1

|a ij

| (maximum absolute row sum)

3. kAk

2

= max that λ i

= σ i

2

1≤i≤n

λ

1/2 i

, with σ i where λ i are the eigenvalues of A the singular values of A.

T

A. We note

We also note that the natural matrix norms satisfy the triangle inequality:

Proposition 6.5 Consider matrices A, B ∈ R n×n with p = 1, 2, ∞. Then kA + Bk p

≤ kAk p

+ kBk p

.

Proof.

For any matrix norm k · k = k · k p we have k(A + B)~xk = kA~x + B~xk ≤ kA~xk + kB~xk, from the vector triangle inequality. Then, by proposition 6.3, k(A + B)~xk ≤ kAkk~xk + kBkk~xk, and so k(A + B)~xk k~xk

≤ kAk + kBk.

Thus, by the definition of the matrix norm we obtain kA + Bk ≤ kAk + kBk.

¤

We can now show that the natural matrix norm satisfies the defining properties of a norm:

108 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Proposition 6.6 kAk p is a norm:

1. kAk p

≥ 0, kAk p

= 0 ⇔ A = 0.

2. kαAk p

= |α|kAk p

.

3. kA + Bk p

≤ kAk p

+ kBk p

.

Since the natural matrix p-norm satisfies the properties of a norm, it can be used as a mechanism for measuring the “size” of a matrix. This will be useful later when considering condition and stability.

6.3.2

Condition of the problem A~

= ~b

The linear system problem can be reformulated as follows:

Problem Find ~x from A~x = ~b (i.e., ~x = A

−1

~b).

consider the condition of this problem, there are then two dependent variables which can be perturbed and with contribute to the condition number. We want to consider the change ∆~x if we have inputs A + ∆A and ~b + ∆~b.

Example 6.6 Consider the linear system A~x = ~b and solution ~x given by

µ

1 2

0.499

1.001

¶ µ x

1 x

2

=

µ

3

1.5

, ~x =

µ

1

1

.

We perturb A by a small matrix ∆A to yield a new linear system and solution given by

µ

1 2

0.500

1.001

¶ µ x

1 x

2

=

µ

3

1.5

, ~x =

µ

3

0

.

Thus a small change in A results in a large change in ~x; this seems to imply that the problem is ill conditioned.

x

1

2

1

1 2 3

First equation

4 x

2 x

1

2

1

1 2 3

Second equation

4 x

2

6.3.

CONDITION AND STABILITY 109

In order to examine the condition of the initial problem P (A~x = ~b) we need to consider a slight perturbation on the input data A and ~b,

(A + ∆A)(~x + ∆~x) = ~b + ∆~b.

(6.12)

We now look for bounds on κ

R

. We note that it is difficult to derive a bound on κ

R without considering a simplification of the defining equation (6.12). As a result, we consider the two most obvious simplified cases:

Case 1: Consider the case of no perturbation in A, i.e. ∆A = 0 with ∆~b 6= 0.

Equation (6.12) becomes

A∆~x = ∆~b =⇒ ∆~x = A

−1

∆~b.

(6.13)

We take the norm of both sides of this expression to yield k∆~xk = kA

−1

∆~bk ≤ kA

−1 kk∆~bk.

We may also take the norm of both sides of A~x = ~b to yield k~bk = kA~xk ⇒ k~bk ≤ kAk · k~xk ⇒ k~bk · kAk

−1

≤ k~xk.

From equations (6.14) and (6.15) we have that

(6.14)

(6.15) k∆~xk k~xk

≤ kA

−1 kkAk k∆~bk k~bk

.

This may be rearranged to give the relative condition number

κ

R

= k∆~xk/k~xk

≤ kAkkA

−1 k.

k∆~bk/k~bk

Thus we know kAk · kA

−1 k is an upper bound for κ

R

.

(6.16)

Definition 6.6 The condition number of a matrix A is κ(A) = kAkkA

−1 k.

Thus if κ(A) is small, problem P is well conditioned. The natural error due to rounding in ~b produces an error of relative magnitude follows that there will be an error in ~x of relative magnitude k∆~bk k~bk k∆~xk k~xk

≈ ǫ mach

, so it

≤ κ(A)·ǫ mach

.

Case 2: We now consider the case of no perturbation in b, i.e. ∆A 6= 0 with

∆~b = 0. Equation (6.12) becomes

(A + ∆A)(~x + ∆~x) = ~b.

(6.17)

110 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

We expand this equation and subtract A~x = ~b. This allows us to bound k∆~xk.

A∆~x = −∆A(~x + ∆~x)

∆~x = −A

−1

∆A(~x + ∆~x) k∆~xk ≤ kA

−1 kk∆Akk~x + ∆~xk k∆~xk/k~x + ∆~xk ≤ kA

−1 kk∆AkkAkkAk

−1

.

We may apply the approximation k∆~xk/k~x + ∆~xk ≈ k∆~xk/k~xk for ∆x small.

This gives us an expression for the relative condition number in this case:

κ

R

= k∆~xk/k~xk k∆Ak/kAk

≤ kAkkA

−1 k.

(6.18)

Case 3: In the case of perturbations in A and b, i.e. ∆A 6= 0 and ∆~b 6= 0, it can also be shown that κ

R

≤ κ(A) = kAkkA

−1 k. However, the derivation is tedious and so will not be given here.

From these three cases, it appears that the condition number of a matrix

κ(A) is all we need to determine the condition number of the problem P defined by the linear system A~x = ~b. In particular, we note that the 2-condition number of a matrix (defined by using the 2-norm) has a useful property that makes it unnecessary to compute the inverse A

−1

:

Proposition 6.7 For a matrix A ∈ R n×n

,

κ

2

(A) = kAk

2 kA

−1 k

2

= s

λ max

(A

T

A)

λ min

(A

T

A)

=

σ max

(A)

σ min

(A)

.

(6.19)

Proof.

We know that kAk

2

= max

1≤i≤n and λ i are eigenvalues of A

T

A. Also,

(λ i

(A

T

A))

1/2

, where λ i

(A

T

A) > 0 ∀ i

B~x i

= λ i

~x i

⇒ ~x i

= λ i

B

−1

~x i

⇒ λ

−1 i

~x i

= B

−1

~x i

,

(if det(B) 6= 0) and so λ

(A

T

A)

−1

−1 i are eigenvalues of B

, we obtain

−1

= (A

T

A)

−1

. Using this property with B = kA

−1 k

2

= max

1≤i≤n

(λ i

((A

−1

)

T

A

−1

))

1/2

= max

1≤i≤n

(λ i

((AA

T

)

−1

))

1/2

= ( min

1≤i≤n

(λ i

(AA

T

))

1/2

)

−1

.

6.3.

CONDITION AND STABILITY 111

In addition, if λ i are eigenvalues of AA

T since then λ i are also eigenvalues of A

T

A,

AA

T

~x = λ i

~x

A

T

AA

T

~x = λ i

A

T

~x

A

T

A~y = λ i

~y.

Thus the result follows from the definition of the condition number of a matrix. ¤

Example 6.7 Compute the condition number of

A =

µ

1 2

0.5

1.001

.

The eigenvalues of A

From (6.19) we get κ

T

A may be calculated as λ

2

(A) = 6.25 × 10

1

≈ 1.6×10

−7 and λ

2

≈ 6.25.

3

, which is a large value. We conclude the problem A~x = ~b of example 6.6 is ill-conditioned (or the matrix A is illconditioned).

6.3.3

Stability of the LU Decomposition Algorithm

We wish to consider a related problem, namely:

Problem Consider the mathematical problem defined by z(x) = constant.

a x with a

We now wish to know the absolute and relative condition number of this problem. The absolute condition number is computed from

κ

A

=

¯

¯

¯

¯

∆z

∆x

¯

¯

¯

¯ ≈

¯

¯

¯

¯ dz(x) dx

¯

¯

¯

¯

=

¯

¯

¯− a x

2

¯

¯

¯ =

|a| x

2

.

Thus, if x is small then this problem is ill-conditioned with respect to the absolute error. The relative condition number is computed from

κ

R

=

|∆z|/|z|

|∆x|/|x|

¯

¯

¯

¯ dz(x) dx

¯

¯

¯

¯

¯

¯

¯ x z

¯

¯

¯ =

¯

¯

¯− a x

2

¯

¯

¯

¯

¯

¯

¯ x

2 a

¯

¯

¯

¯

= 1, so the problem is well-conditioned with respect to the relative error. These calculations indicate that dividing by a small number (or multiplying by a large number) is ill-conditioned; this is a bad step in any algorithm because the absolute error may increase by a lot.

We conclude that the problem of linear systems will be ill-conditioned if we have many divisions by small numbers. Consider the following example, with ǫ small.

112 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Example 6.8 Solve the linear system

µ

δ 1

1 1

¶ µ x

1 x

2

=

µ

1

2

.

Applying Gaussian elimination yields

µ

δ 1

0 1 −

1

δ

¶ µ x

1 x

2

=

µ

1

2 −

1

δ

.

We solve for x

1 and x

2 to obtain x

2

=

2 −

1 −

1

δ

1

δ

=

1

δ

1

δ

(2δ − 1)

(δ − 1)

=

2δ − 1

δ − 1

≈ 1 x

1

=

1

δ

(1−x

2

) =

1

δ

µ

1 −

2δ − 1

δ − 1

=

1

δ

µ δ − 1 − 2δ + 1 ¶

δ − 1

=

1

δ

µ −δ

δ − 1

= −

1

δ − 1

≈ 1.

Thus for small δ we have that (x

1 x

2

) ≈ (1 1).

Under the finite precision system F [b = 10, m = 4, e = 5] with δ = 10

−5 have by backward substitution we x

2

= fl(2 − fl(1 −

1

δ

1

δ

)

)

= fl(2 − 10

5

) fl(1 − 10

5

)

= fl(−99998) fl(−99999)

= 1 x

1

= fl(

1

δ

(1 − ˆx

2

)) = 0, x

1

.

Consider another approach to this problem, where we first interchange the two equations (and so use pivot 1 instead of ǫ). We rewrite the linear system as

µ

1 1

δ 1

¶ µ x

1 x

2

=

µ

2

1

.

Thus, after applying Gaussian elimination

µ

1 1

0 1 − δ

¶ µ x

1 x

2

=

µ

2

1 − 2δ

.

We recompute under the finite precision system x

2

= fl(1 − 2δ) fl(1 − δ)

= fl(1 − 2 · 10

−5

) fl(1 − 10

−5

)

= fl(0.99998) fl(0.99999)

= 1

ˆ

1

= fl(2 − ˆx

2

) = fl(2 − 1) = 1.

and so avoid the large error.

6.4.

ITERATIVE METHODS FOR SOLVING A ~ B 113

A

We now consider the general case. Recall

(2)

=

 a

11 a

12 a

(2)

22

(2) a

32

.

..

a

13 a

(2)

23

(2) a

33

.

..

· · ·

· · ·

· · ·

,

1

M

2

=

1

.

..

−a

(2) i

2

(2) a

22

.

..

. ..

. ..

1

.

We note that we divide by the pivot element a

(2)

22 in M

2

. In order to minimize the error, we should rearrange the rows in every step of the algorithm so that we get the largest possible pivot element (in absolute value). This will give us the most stable algorithm for computing the solution to the linear system since we avoid divisions by small pivot elements. This approach is called LU decomposition with partial pivoting.

6.4

Iterative Methods for solving A~

= ~b

Recall that the LU decomposition requires W = O(n

3

) time to compute. If we specialize the type of matrix we wish to solve, there are different algorithms that may be able to solve the matrix more efficiently. This is especially true for sparse matrices, where iterative methods are very useful (these techniques are similar to Fixed-point iteration).

Definition 6.7 A ∈ R n×n is a sparse matrix if and only if the number of nonzero elements in A is much smaller than n

2

.

For many sparse matrix applications, the number of nonzero elements per row is restricted to some small constant, e.g. 10. We can often store matrices of this type very efficiently (for example, compressed sparse row (CSR) format can be used). MATLAB supports a sparse storage format which can be invoked by B = sparse(A).

Consider the special type of matrix:

Definition 6.8 A ∈ R n×n is strictly diagonally dominant if and only if

|a ii

| > n

X j=1,j6=i

|a ij

| (6.20) for all rows i.

This type of matrix has the following useful property:

Proposition 6.8 A strictly diagonally dominant matrix is non-singular.

114 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Proof.

Left as an exercise for the reader (this can be easily proven with the

Gershgorin Circle Theorem).

Example 6.9 Consider the matrix A ∈ R

3×3

:

A =

7 2 0

3 5 −1

0 5 −6

7 > 2

5 > 3 + 1

6 > 5

Clearly, A is strictly diagonally dominant. In general if A is strictly diagonally dominant, the transpose of A does not necessarily retain the same property:

A

T

=

7 3

2 5

0

5

0 −1 −6

7 > 3

5 6> 2 + 5

6 > 1

6.4.1

Jacobi and Gauss-Seidel Methods

We wish to solve the linear system A~x = ~b using an iterative method. We write at each step

 

~x old

=

 x x x old

1 old

2 old

3

(6.21) and determine ~x new from ~x old by either the Jacobi or Gauss-Seidel algorithm.

Jacobi: We assume A ∈ R

3×3 and construct a system of equations as follows: a

11 x a

21 x a

31 x new

1 old

1 old

1

+ a

12 x

+ a

22 x

+ a

32 x old

2 new

2 old

2

+ a

13 x

+ a

23 x

+ a

33 x old

3 old

3 new

3

=

= b b

= b

1

2

3

.

(6.22)

This system may be easily rearranged to solve for ~x new

, giving us the defining equation for the Jacobi method: x new i

=

1 a ii

 b i

− n

X j=1,j6=i

 a ij x old j

.

(6.23)

Gauss-Seidel: In the Jacobi method we may write ~x new

= J(~x old function J. However, there is no reason to ignore the elements of x earlier in the same step: we can indeed construct a linear system as

) for some new i derived a

11 x a

21 x a

31 x new

1 new

1 new

1

+ a

12 x

+ a

22 x

+ a

32 x old

2 new

2 new

2

+ a

13 x

+ a

23 x

+ a

33 x old

3 old

3 new

3

=

= b b

= b

1

2

3

.

(6.24)

6.4.

ITERATIVE METHODS FOR SOLVING A ~ B 115

Rearranging yields the defining equation for the Gauss-Seidel method: x new i

=

1 a ii

 b i

− j=1 a ij x new j

− n

X j=i+1

 a ij x old j

.

(6.25)

For both of these methods, we must choose a starting vector ~x

(0) and generate the sequence ~x

(1)

, ~x

(2)

, . . . = {~x

(i)

}

∞ i=1

. We may also formulate these methods in matrix form using the decomposition A = A

L

+ A

D

+ A

R

:

. ..

A =

A

L

|

0

{z

A

L

0

. ..

 

. ..

+

0

} |

A

D

{z

A

D

 

0

. ..

+

} |

. ..

0

0

{z

A

R

A

R

.

(6.26)

. ..

}

Under the matrix decomposition, we may write the Jacobi method as

~x new

= A

−1

D

(~b − (A

L

+ A

R

)~x old

) and the Gauss-Seidel method as

~x new

= A

−1

D

(~b − (A

L

~x new

+ A

R

~x old

)).

(6.27)

(6.28)

These forms are equivalent to (6.23) and (6.25).

Can we guarantee convergence of the iterative methods? For some classes of matrices the answer is yes. It depends on the matrix A whether the sequence of iterates converges and if so, how quickly it does. We can prove the following sufficient condition for convergence:

Theorem 6.3 Consider A~x = ~b and let ~x

(0) be any starting vector. Let {~x

(i)

}

∞ i=0 be the sequence generated by either Jacobi or Gauss-Seidel iterative methods.

Then if A is strictly diagonally dominant the sequence converges to the unique solution of the system A~x = ~b.

Since this theorem is only a sufficient condition, we can have a matrix A that is not strictly diagonally dominant but leads to a convergent method.

In general, we note that often Gauss-Seidel will converge faster than Jacobi, but this is not always the case. For sparse matrices, we often obtain W = O(n

2

) for both methods.

6.4.2

Convergence of Iterative Methods

As a practical consideration, we need to determine when to stop iteration for a given iterative method. In particular, we need a measure of how close we are to a correct solution.

116 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

Definition 6.9 The residual of a linear system A~x = ~b for some vector ~u is

~r = ~b − A~u.

(6.29) t rel

We write the residual at step i as ~r

(i)

. As ~r

(i) becomes smaller, we approach convergence of the system. Hence, for a given relative tolerance t example), we compute the residual at each step and stop when k~r rel

(i)

= 10 k

2

/k~r

−6

(0)

(for k

2

.

For an iterative approximation ~u, the error is given by ~e = ~x − ~u. This leads to the following relation between the error and the residual:

A~e = A(~x − ~u)

= A~x − A~u

= ~b − A~u

= ~r.

There are several benefits to using the residual instead of the error:

• ~r can be calculated easily (because calculating a matrix-vector product is

“cheap” in terms of computational work compared with solving a linear system).

• ~e is generally unknown.

Sometimes ~r is small but ~e is large (this may happen when κ(A) is large).

Nevertheless, we will assume our linear system is well-conditioned and use ~r instead of ~e in the stopping criterion.

If we knew the error ~e for any approximation ~u we could write out the solution to the linear system directly:

~x

|{z} exact

= ~u + (~x − ~u) = ~u

|{z} approximate

+ ~e

|{z} error

.

However, since the error is unknown, we can instead use the residual:

~x = ~u + A

−1

~r.

(6.30)

Unfortunately, inverting A is an expensive operation (3 times as expensive as actually solving A~x = ~b). Instead of using A is easy to invert such that B

−1

−1

, we can choose a matrix B that is an approximation for A

−1

. Then, we can obtain an approximation for ~x by the formula

~x ≈ ~u + B

−1

~r.

(6.31)

Repeated application of this formula leads to a standard general form for an iterative method:

~x

(i+1)

= ~x

(i)

+ B

−1

~r

(i)

,

6.4.

ITERATIVE METHODS FOR SOLVING A ~ B 117 or with the definition of the residual

~x

(i+1)

= ~x

(i)

+ B

−1

(~b − A~x

(i)

).

If B is chosen appropriately then ~x

(i) will converge to ~x.

This approach is basically fixed point iteration: we have defined a function

G such that ~x

(i+1)

= G(~x

(i)

). If we choose ~x

(i)

= ~x then ~x

(i+1)

= ~x has to hold as well; thus ~x = G(~x) is a fixed point of G. The convergence theorem for iterative methods is stated as follows:

Theorem 6.4 (Convergence of Iterative Methods) Consider the iterative method

~x

(i+1)

= ~x

(i)

+ B

−1

(~b − A~x

(i)

) (6.32) with det(A) 6= 0. If there exists a p-norm for which kI − B

−1

Ak p

< 1 for a p-norm, then the iterative method will converge for any starting value ~x

(0)

.

Convergence will then hold in any p-norm.

Proof.

Consider the error ~e

(i)

= ~x − ~x

(i)

. By (6.32) we may write

~x

(i+1)

− ~x = ~x

(i)

−~e

(i+1)

= −~e

(i)

− ~x + B

−1

(A~x − A~x

(i)

)

+ B

−1

A~e

(i)

~e

(i+1)

= (I − B

−1

A)~e

(i) k~e

(i+1) k p

= k(I − B

−1

A)~e

(i) k p

≤ kI − B

−1

Ak p k~e

(i) k p

.

If we apply this result recursively, we obtain k~e

(i+1) k p

≤ kI − B

−1

Ak i+1 p k~e

(0) k p

.

Taking the limit as i → ∞ with kI − B

−1

Ak p

< 1 yields lim i→∞ k~e

(i+1) k p

= 0, which is equivalent to lim i→∞

~x

(i)

= ~x. ¤

We note that kI − B

−1

Ak p

< 1 means that I ≈ B

Recall from before that we require B

−1

−1

A, or B

−1

≈ A

−1 to be an approximation for A

−1 in

.

order to apply equation (6.31). The convergence theorem is very similar to

Theorem 2.3 (The Contraction Mapping Theorem), which governs convergence of the fixed point method. In fact, Banach’s Contraction Theorem (from real analysis) provides a generalization of both theorems.

Since (6.32) is a general form for iterative methods, we should be able to determine B for the Jacobi and Gauss-Seidel methods. We rewrite the matrix form of Jacobi into standard form:

118 CHAPTER 6.

NUMERICAL LINEAR ALGEBRA

~x

(i+1)

= A

−1

D

(~b − (A

L

+ A

R

)~x

(i)

)

= A

−1

D

(~b − (A − A

D

)~x

(i)

) (f rom(6.26))

= A

−1

D

A

D

~x

(i)

+ A

−1

D

(~b − A~x

(i)

)

= ~x

(i)

+ A

−1

D

(~b − A~x

(i)

).

This is the standard form of an iterative method with B approximated by A

−1

D manner to recover B

−1

= A

−1

D

(so A

−1 is

.) We can rewrite the Gauss-Seidel method in a similar

−1

= (A

D

+ A

L

)

−1

(left as an exercise.)

These notes have been funded by...

Was this manual useful for you?
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

advertisement