نتایج جستجو برای: stochastic methods

تعداد نتایج: 1982288  

2011
Lingjie Weng Yutian Chen

Stochastic subgradient methods play an important role in machine learning. We introduced the concepts of subgradient methods and stochastic subgradient methods in this project, discussed their convergence conditions as well as the strong and weak points against their competitors. We demonstrated the application of (stochastic) subgradient methods to machine learning with a running example of tr...

Journal: :iranian journal of science and technology (sciences) 2012
a.r. soheili

in the present article, we focus on the numerical approximation of stochastic partial differential equations of itˆo type with space-time white noise process, in particular, parabolic equations. for each case of additive andmultiplicative noise, the numerical solution of stochastic diffusion equations is approximated using two stochastic finite difference schemes and the stability and consisten...

2001
Prasanth B. Nair Andrew J. Keane

Journal: :CoRR 2015
Wenbo Hu Jun Zhu Bo Zhang

Many Bayesian models involve continuous but non-differentiable log-posteriors, including the sparse Bayesian methods with a Laplace prior and the regularized Bayesian methods with maxmargin posterior regularization that acts like a likelihood term. In analogy to the popular stochastic subgradient methods for deterministic optimization, we present the stochastic subgradient MCMC for efficient po...

Journal: :Fractal and fractional 2023

In this paper, we develop a new class of conservative continuous-stage stochastic Runge–Kutta methods for solving differential equations with conserved quantity. The order conditions the are given based on theory B-series and multicolored rooted tree. Sufficient preserving quantity derived in terms coefficients. Conservative mean square convergence 1 general equations, as well high single integ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید