Picture for Jielin Yang

Jielin Yang

Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks

Add code
Jan 24, 2022
Figure 1 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 2 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 3 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 4 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Viaarxiv icon

On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements

Add code
Oct 27, 2021
Figure 1 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 2 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 3 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 4 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Viaarxiv icon

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation

Add code
Jan 04, 2021
Figure 1 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 2 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 3 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 4 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Viaarxiv icon