Show matrix multiplication problem, Computer Engineering

Assignment Help:

Q. Show Matrix Multiplication Problem?

Let there be 2 matrices M1 and M2 of sizes a x b and b x c correspondingly. If we multiply M1 and M2 product matrix O will be of size a x c. 

The values of elements which are stored in the matrix O are in proportion to the subsequent formula:

       Oij = Summation x of (M1ix * M2xj) x=1 to b, where 1

Remember for multiplying a matrix M1 with other matrix M2 number of columns in M1 should be equal to number of rows in M2. The renowned matrix multiplication algorithm on sequential computers occupies O(n3) running time. For multiplication of two 2x2 matrices the algorithm needs 8 multiplication and 4 addition operations. One other algorithm known as Strassen algorithm has been worked out that requires 7 multiplication and 14 addition or subtraction operations. Time complexity of Strassen's algorithm is O(n2.81). The fundamental sequential algorithm is explained below:

Algorithm: Matrix Multiplication

Input// Two Matrices M1 and M2

 For I=1 to n

      For j=1 to n

        {

               Oij = 0;

               For k=1 to n

                    Oij= Oij + M1ik * M2kj

               End For

       } 

      End For 

End For


Related Discussions:- Show matrix multiplication problem

Lfu, advantages of lfu

advantages of lfu

Difference in natural frequency and resonant frequency, (a)  Explain in a f...

(a)  Explain in a few sentences the difference between a natural frequency and a resonant frequency.  Also clarify why for a specific system or component these frequencies may diff

What is interpreter, What is interpreter? An  interpreter is a program ...

What is interpreter? An  interpreter is a program that appears to execute a source program as if it were machine language.

What is the functionality of remote login, What is the functionality of Rem...

What is the functionality of Remote Login? Remote Login gives similar functionality of telnet, along with the added functionality of not involving a password from trusted cli

Pd controller, PD controller Student should aim for Kp and Kd value that...

PD controller Student should aim for Kp and Kd value that will minimize the steady error with improved rise time and settling time. The amount of over shoot should not be more t

Search mechanisms in prolog - artificial intelligence, Search mechanisms in...

Search mechanisms in Prolog We can utilize this simple Prolog program to describe how Prolog searches: president(X) :- first_name(X, georgedubya), second_name(X, bush). p

Hazard in pipeline - computer architecture, Hazard in pipeline - computer a...

Hazard in pipeline - computer architecture: A hazard in pipeline .-removing a hazard frequently need that some instructions in the pipeline to be permitted to proceed as othe

How to use http and world wide web, Q. How to use Http and World Wide Web? ...

Q. How to use Http and World Wide Web? Http and World Wide Web One of the most frequently used services on the Internet is the World Wide Web (WWW). The application proto

Why eprom chips are mounted in packages, Why EPROM chips are mounted in pac...

Why EPROM chips are mounted in packages that have transparent window? Since the erasure needs dissipating the charges trapped in the transistors of memory cells. This can be co

Explain disk cartridges, Q. Explain Disk Cartridges ? Disk Cartridges:...

Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd