We consider the construction of semi-implicit linear multistep methods that can be applied to time-dependent PDEs where the separation of scales in additive form,typically used in implicit-explicit(IMEX)methods,is not...
详细信息
We consider the construction of semi-implicit linear multistep methods that can be applied to time-dependent PDEs where the separation of scales in additive form,typically used in implicit-explicit(IMEX)methods,is not *** shown in Boscarino et al.(***.68:975-1001,2016)for Runge-Kutta methods,these semi-implicit techniques give a great flexibility,and allow,in many cases,the construction of simple linearly implicit schemes with no need of iterative *** this work,we develop a general setting for the construction of high order semi-implicit linear multistep methods and analyze their stability properties for a prototype lineal'advection-diffusion equation and in the setting of strong stability preserving(SSP)*** findings are demonstrated on several examples,including nonlinear reaction-diffusion and convection-diffusion problems.
The Routing Over Low power and Lossy network (ROLL) working group of IETF proposed the IPv6 Routing Protocol over Low Power and Lossy network (RPL) to fulfill multiple traffic requirements of the Internet of Things (I...
详细信息
We study the problem of partitioning the unit cube [0, 1]n into c parts so that each d-dimensional axis-parallel projection has small volume. This natural combinatorial/geometric question was first studied by Kopparty...
详细信息
Geometric representation of query embeddings (using points, particles, rectangles and cones) can effectively achieve the task of answering complex logical queries expressed in first-order logic (FOL) form over knowled...
详细信息
Text classification is a popular and well-studied problem in Natural Language Processing. Most previous work on text classification has focused on deep neural networks such as LSTMs and CNNs. However, text classificat...
详细信息
Hairpin completion is an operation on formal languages that has been inspired by hairpin formation in DNA biochemistry and has many applications especially in DNA computing. Consider s to be a string over the alphabet...
详细信息
A correct CVD diagnosis and outcome, on the other hand, result in expedited patient care and highly accurate treatment, as well as good results. Medicine has turned to machine learning since it is capable of discernin...
详细信息
Due to the excellent performance of Generative Adversarial Networks(GAN) for age regression on face images, it is particularly important to explore the effect of different parameters on model training. In this study, ...
详细信息
Due to the excellent performance of Generative Adversarial Networks(GAN) for age regression on face images, it is particularly important to explore the effect of different parameters on model training. In this study, the origin and development of Artificial Intelligence(AI) is first discussed, from which the concept and principles of GAN are *** is followed by a brief introduction of the UTKface dataset used in this research, and the Conditional Adversarial Autoencoder(CAAE) framework based on the GAN technique. The division of labor and roles of the encoder, generator, and the two discriminators in the model are described. The various learning rates as well as batch size combinations attempted in this study are then illustrated, and the training results of the model are shown in the form of graphs and plots of the loss value function. A situation where the model stops learning is highlighted in the results, which is similar to pattern descent in GAN, and is shown to be characterized by the inability of the discriminator to successfully recognize it. Ultimately, drawing from the acquired outcomes, it can be deduced that employing a larger batch size serves to enhance the pace of model training. It is advisable to concurrently elevate the learning rate by an equivalent factor when augmenting the batch size, thereby ensuring a consistent trajectory for model convergence.
Artificial intelligence has become like-humans in thinking and interpretations. But its uses are still limited and are viewed as black boxes, and this is the most important factor underlying the limited applications, ...
详细信息
作者:
Thiruvenkadam, T.Muthusamy, A.Vijayakumar, M.
Karnataka Bengaluru India Assistant Professor and Head
Department of Computer Science Faculty of Science & Humanities SRM Institute of Science and Technology Tamil Nadu Tiruchirappalli India Professor
School of Computer Science VET Institute of Arts and Science College Tamil Nadu Erode Tindal India
In a cloud computing environment, effective resource request handling and their dynamic management can optimize the VM placement process. An efficient resource request handling can resolve the problem of increased wai...
详细信息
暂无评论