News

Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter bottlenecks to ...
The rest of this paper is organized as follows: In Section 2, the differential equation of GLONASS satellite motion is given, and we present in this section the principle of the Runge-Kutta ...
This repository contains a Python implementation for solving ordinary differential equations (ODEs) using various numerical methods, including the Euler method, Heun's method, the Midpoint method, and ...
J.H. Verner, The derivation of high order explicit Runge--Kutta methods, Department of Mathematics Report No. 93, University of Auckland, New Zealand, 1976, 27 pages.
We provide examples of such methods up to PEP order six, and test them on Hamiltonian ODE and PDE systems. We find that these methods behave similarly to exactly energy-conservative methods over ...
With the help of the homotopy perturbation method (HPM), we determine an approximate series solution with few perturbation terms, which is one of the essential power of the HPM method. We compare our ...
3 Uniformly accurate order six Lobatto-Runge-Kutta Collocation methods By careful selection of interpolation and collocation points inside the interval [x 0, b], leads to a single continuous finite ...