This paper explores the connection between systems of linear algebraic equations (SLAE) and machine learning methods, including regularization techniques, to establish a more novel neural network model based on linear...
详细信息
One of the principle conditions of a wave attractor appearance is a periodic external forcing. Real forcing in natural basins caused by tidal interaction is more complex than a monochromatic which is usually used in i...
详细信息
Internal waves in a stratified liquid propagate to fit the dispersion relation, depending only on the frequency and the angle to the gravity. The phenomenon of self-focussing of such waves is known as wave attractor. ...
Internal waves in a stratified liquid propagate to fit the dispersion relation, depending only on the frequency and the angle to the gravity. The phenomenon of self-focussing of such waves is known as wave attractor. To study this phenomenon numerically or in a laboratory, it is common to use a wave-maker providing the forcing through one of the boundaries. In this work, we study the influence of the wave-maker forcing on the wave attractor formation and its characteristics.
In this paper, we focused on the problem of extracting information from web pages containing many records, a task of growing importance in the era of massive web data. Recently, the development of neural network metho...
详细信息
We investigate complexity of the uniform membership problem for hyperedge replacement grammars in comparison with other mildly context-sensitive grammar formalisms. It turns out that the complexity of the problem cons...
详细信息
Communication is one of the bottlenecks of distributed optimisation and learning. To overcome this bottleneck, we propose a novel quantization method that transforms a vector into a sample of components’ indices draw...
详细信息
Real world data is not stationary and thus models must be monitored in production. One way to be sure in a model’s performance is regular testing. If the labels are not available, the task of minimizing the labeling ...
An important limitation of existing adversarial attacks on real-world object detectors lies in their threat model: adversarial patch-based methods often produce suspicious images while image generation approaches do n...
详细信息
PDF documents can contain incorrect textual layers due to low scanning quality, font embedding errors or other reasons. An incorrect text layer can significantly hamper automatic document processing and limit document...
详细信息
Dynamic symbolic execution is a widely used technique for automated software testing, designed for execution paths exploration and program errors detection. A hybrid approach has recently become widespread, when the m...
详细信息
暂无评论