Search
Author
- Osman, Ahmed I. (5)
- Daqing, Ma (3)
- Jorgensen, Ed (3)
- Li, Yan (3)
- next >
Subject
- kinh tế (26)
- Economics (12)
- programming (10)
- XRD (10)
- next >
Date issued
- 2020 - 2025 (2128)
- 2010 - 2019 (129)
- 2000 - 2009 (9)
- 1999 - 1999 (1)
Has File(s)
Search Results
Adversarial attack aims to fail the deep neural network by adding a small amount of perturbation to the input image, in which the attack success rate and resulting image quality are maximized under the lp norm perturbation constraint. However, the lp norm is not accurately correlated to human perception of image quality. Attack methods based on l0 norm constraint usually suffer from the high computational cost due to the iterative search for candidate pixels to modify. |
To your average pianist, G-sharp and A-flat are the same. They are located at the same black key between the white G and A keys, but with different names. For other musicians, however, for example violinists, they are different notes. They would claim that the piano represents a compromise, since it is often tuned to the equal-tempered scale, while other musical scales, based on simple harmonic ratios, often appear more harmonious to the ear. This article explains and illustrates this dilemma geometrically. In these scales, G-sharp and A-flat will no longer be the same. The difference between them is called the Pythagorean comma, and the name hints at the long history of music theory. |
This paper focuses on creative industries and the role played by the existing spatial distribution and agglomeration economies of these activities in relation to their entry decisions. We rely on employment and firm-level data in the creative industries (provided by INSEE) and compare the location of new establishments in the creative and non-creative industries between 2009 and 2013 in French departments (NUTS 3 regions). We use count data models and spatial econometrics to show that location determinants are rather similar in creative and non-creative industries and that specialisation in creative industries positively influences the entry of all other industries. The French case provides new insights to understand the geographical patterns of creative industries. |
Algebraically stabilized finite element discretizations of scalar steady-state convection–diffusion–reaction equations often provide accurate approximate solutions satisfying the discrete maximum principle (DMP). However, it was observed that a deterioration of the accuracy and convergence rates may occur for some problems if meshes without local symmetries are used. The paper investigates these phenomena both numerically and analytically and the findings are used to design a new algebraic stabilization called Symmetrized Monotone Upwind-type Algebraically Stabilized (SMUAS) method. It is proved that the SMUAS method is linearity preserving and satisfies the DMP on arbitrary simplicial meshes. Moreover, numerical results indicate that the SMUAS method leads to optimal convergence ra... |
This paper examines the dynamic effects of Social Influence on asset prices in the presence of heterogeneous expectations among investors. In our model, the choices of investors’ trading strategies are influenced not only by past payoffs but also by their neighbors’ choices in the social network. To obtain tractable results with generic implications for social structure, we use a mean-field approximation approach rather than specifying the exact structure of social network. Analytical conditions for the existence and local stability of equilibria of price dynamics are established and validated through numerical simulations. Our analysis shows that social influence increases the dimension of the dynamical system and that equilibria can only be expressed implicitly as solutions of cer... |
Rapid deployment of wind and solar energy generation is going to result in a series of new problems with regards to the reliability of our electrical grid in terms of outages, cost, and life-time, forcing us to promptly deal with the challenging restructuring of our energy systems. Increased penetration of fluctuating renewable energy resources is a challenge for the electrical grid. Proposing solutions to deal with this problem also impacts the functionality of large generators. The power electronic generator interactions, multi-domain modelling, and reliable monitoring systems are examples of new challenges in this field. This book presents some new modelling methods and technologies for renewable energy generators including wind, ocean, and hydropower systems. |
We prove a version of the Lebesgue differentiation theorem for mappings that are defined on a measure space and take values into a metric space, with respect to the differentiation basis induced by a von Neumann lifting. As a consequence, we obtain a lifting theorem for the space of sections of a measurable Banach bundle and a disintegration theorem for vector measures whose target is a Banach space with the Radon–Nikodým property. |
The study aims to investigate the financial technology (FinTech) factors influencing Chinese banking performance. Financial expectations and global realities may be changed by FinTech’s multidimensional scope, which is lacking in the traditional financial sector. The use of technology to automate financial services is becoming more important for economic organizations and industries because the digital age has seen a period of transition in terms of consumers and personalization. The future of FinTech will be shaped by technologies like the Internet of Things, blockchain, and artificial intelligence. The involvement of these platforms in financial services is a major concern for global business growth. FinTech is becoming more popular with customers because of such benefits. |
Next, the RGB channels of the watermark are encrypted by using Arnold, 3-DES and multi-flipping permutation encoding (MFPE). Furthermore, the principal key used for encryption is embedded in the singular matrix of the blue channel. Moreover, the blue channel is encrypted by using the Okamoto-Uchiyama homomorphic encryption (OUHE) method. Finally, these encrypted watermark channels are diffused and embedded into the host channels. When the need arises, more watermarks can be embedded into the host at the expense of the quality of the embedded watermarks. |
In this paper, we propose a first second-order scheme based on arbitrary non-Euclidean norms, incorporated by Bregman distances. They are introduced directly in the Newton iterate with regularization parameter proportional to the square root of the norm of the current gradient. For the basic scheme, as applied to the composite convex optimization problem, we establish the global convergence rate of the order O(k−2) both in terms of the functional residual and in the norm of subgradients. Our main assumption on the smooth part of the objective is Lipschitz continuity of its Hessian. |