Abstract: Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter ...
The problem of the region of stability of the fourth order-Runge-Kutta method for the solution of systems of differential equations is studied. This region can be characterized by means of linear ...
YASK--Yet Another Stencil Kit: a domain-specific language and framework to create high-performance stencil code for implementing finite-difference methods and similar applications.
"- I want to implement and illustrate the [Runge-Kutta method](https://en.wikipedia.org/wiki/Runge%E2%80%93Kutta_methods) (actually, different variants), in the ...
Ask the publishers to restore access to 500,000+ books. A line drawing of the Internet Archive headquarters building façade. An illustration of a heart shape "Donate to the archive" An illustration of ...
Abstract: In the Runge-Kutta method, the action of the system at the change time is not strictly taken into consideration. We propose a simulation method in which discontinuous change is considered ...
1 Department of Mathematics, Lagos State University, Lagos, Nigeria. 2 Department of Mathematics, Federal College of Education (Technical), Lagos, Nigeria. During the last few decades, there has been ...
ABSTRACT: We construct optimal k-step, 5- to 10-stage, explicit, strong-stability-preserving Hermite-Birkhoff (SSP HB) methods of order 12 with nonnegative coefficients by combining linear k-step ...
Explicit Runge-Kutta methods (RKMs) are among the most popular classes of formulas for the approximate numerical integration of nonstiff, initial value problems. However, high-order Runge-Kutta ...
It’s generous to say that it took until just after the eight-minute mark in the second quarter of Oregon’s visit to New Jersey to prove what... Nine days after beginning its evaluation of the Oregon ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果