Abstract: This letter proposes a novel hybrid method combining asymptotic waveform estimation (AWE), adaptive cross approximation (ACA), and efficient iterative method of moments–physical optics ...
Abstract: At present, the security of neural networks has attracted more and more attention, and the emergence of adversarial examples is one of the problems. The gradient-based attack algorithm is a ...
In response to the complexity of the Jacobian matrix inversion process in the power flow algorithm for AC/DC microgrids, leading to large memory requirements and susceptibility to convergence issues, ...
Iterative preference optimization methods have shown efficacy in general instruction tuning tasks but yield limited improvements in reasoning tasks. These methods, utilizing preference optimization, ...
A collection of software development examples using C#, CRUD operational models including a "Supermarket Rewards" console application running on Windows. Note: basic projects used to complete the ...
The boundary value problems (BVPs) have attracted the attention of many scientists from both practical and theoretical points of view, for these problems have remarkable applications in different ...
ABSTRACT: This article presents the Parametric Iteration Method (PIM) for finding optimal control and its corresponding trajectory of linear systems. Without any discretization or transformation, PIM ...