Alert button
Picture for Jielin Yang

Jielin Yang

Alert button

Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks

Jan 24, 2022
Suchuan Dong, Jielin Yang

Figure 1 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 2 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 3 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Figure 4 for Numerical Approximation of Partial Differential Equations by a Variable Projection Method with Artificial Neural Networks
Viaarxiv icon

On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements

Oct 27, 2021
Suchuan Dong, Jielin Yang

Figure 1 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 2 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 3 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Figure 4 for On Computing the Hyperparameter of Extreme Learning Machines: Algorithm and Application to Computational PDEs, and Comparison with Classical and High-Order Finite Elements
Viaarxiv icon

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation

Jan 04, 2021
Jenn-Bing Ong, Wee-Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C. -C. Jay Kuo

Figure 1 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 2 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 3 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Figure 4 for Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
Viaarxiv icon