News
Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter bottlenecks to ...
My intentions I have been interested in the derivation of new and better Runge-Kutta algorithms for some time. In particular, I showed that the design of Runge-Kutta pairs by E. Fehlberg could be ...
We provide examples of such methods up to PEP order six, and test them on Hamiltonian ODE and PDE systems. We find that these methods behave similarly to exactly energy-conservative methods over ...
Contribute to LucidPanic/Unsual-Notebook-Examples development by creating an account on GitHub.
This paper proposes applying the two-stage diagonally implicit Runge-Kutta (2S-DIRK) method of numerical integration to the calculation of electromagnetic transients (EMTs) in a power system. The ...
In this paper, variational iteration (VIM) and parametrized perturbation (PPM) methods have been used to investigate non-linear vibration of Euler-Bernoulli beams subjected to the axial loads. The ...
We consider the construction of an interpolant for use with Lobatto-Runge-Kutta collocation methods. The main aim is to derive single symmetric continuous solution (interpolant) for uniform accuracy ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results