Skip to main content

previous disabled Page of 20
and
  1. No Access

    Chapter and Conference Paper

    House Price Prediction Using XG-Boost Grid Search and Cross-Validation Methods

    The primary factors influencing the variation in housing prices in different locations are the characteristics of the housing and the conditions of the area. This study will utilize the popular machine learnin...

    Tianlei Zhu, Yingke Yang, Shu Bao in Mathematical Modeling in Physical Sciences (2024)

  2. No Access

    Chapter

    High-Jet Relations of the Heat Kernel: Embedding Map and Applications

    For any compact Riemannian manifold (M, g) and its heat kernel embedding map \(\psi_t :M \to l^2\) ...

    Ke Zhu in 2021-2022 MATRIX Annals (2024)

  3. No Access

    Chapter

    Conclusion

    As we are approaching the end of the description of this stage of our interdisciplinary collaboration, a look back may help the reader to obtain a more global view of the material provided in this monograph an...

    Stanislaus Maier-Paape, Pedro Júdice in Scalar and Vector Risk in the General Fram… (2023)

  4. No Access

    Chapter and Conference Paper

    A Subcell Limiting Based on High-Order Compact Nonuniform Nonlinear Weighted Schemes for High-Order CPR Method

    This paper further investigates the subcell limiting approach based on compact nonuniform nonlinear weighted (CNNW) schemes for high-order correction procedure via reconstruction (CPR) method. A special subcel...

    Huajun Zhu, Zhen-Guo Yan, Feiran Jia in Spectral and High Order Methods for Partia… (2023)

  5. No Access

    Chapter and Conference Paper

    Logarithmic Adic Spaces: Some Foundational Results

    We develop a theory of log adic spaces by combining the theories of adic spaces and log schemes, and study the Kummer étale and pro-Kummer étale topology for such spaces. We also establish the primitive compar...

    Hansheng Diao, Kai-Wen Lan, Ruochuan Liu in p-adic Hodge Theory, Singular Varieties, a… (2023)

  6. No Access

    Chapter and Conference Paper

    Algorithms and Hardness for the Longest Common Subsequence of Three Strings and Related Problems

    A string is called a square (resp. cube) if it is in the form of \(XX=X^2\) (resp. ...

    Lusheng Wang, Binhai Zhu in String Processing and Information Retrieval (2023)

  7. No Access

    Chapter

    Introduction

    This monograph gives a concise exposition of our recent industry-academic collaboration on a general framework of portfolio theory. In particular, it contains our new results on portfolio problems involving mu...

    Stanislaus Maier-Paape, Pedro Júdice in Scalar and Vector Risk in the General Fram… (2023)

  8. No Access

    Chapter

    Efficient Portfolios for Vector Risk Functions

    In the last chapter, we presented a thorough outline of the general framework of portfolio theory for abstract, scalar-valued risk and utility functions.

    Stanislaus Maier-Paape, Pedro Júdice in Scalar and Vector Risk in the General Fram… (2023)

  9. No Access

    Chapter and Conference Paper

    Applications of Fokker Planck Equations in Machine Learning Algorithms

    As the continuous limit of the gradient-based optimization algorithms, Fokker Planck (FP) equation can provide a qualitative description of the algorithm’s behavior and give principled theoretical insight into...

    Yuhua Zhu in Advances in Numerical Methods for Hyperbolic Balance Laws and Related Problems (2023)

  10. No Access

    Chapter

    Addressing Dataset Shift for Trustworthy Deep Learning Diagnostic Ultrasound Decision Support

    Ultrasound (US) is the most widely used medical imaging modality due to its low cost, portability, real time imaging ability and use of non-ionizing radiation. However, unlike other imaging modalities such as ...

    Calvin Zhu, Michael D. Noseworthy in Transactions on Computational Science XL (2023)

  11. No Access

    Chapter

    System Reliability Models with Random Shocks and Uncertainty: A State-of-the-Art Review

    Reliability evaluation is an important task in safety–critical applications. The failure of a system is generally caused by random shocks resulting from adverse events or internal degradations. This chapter th...

    Yuhan Hu, Mengmeng Zhu in Predictive Analytics in System Reliability (2023)

  12. No Access

    Chapter

    Sarason’s Ha-plitz Product Problem

    Kehe Zhu in Function Spaces, Theory and Applications (2023)

  13. No Access

    Chapter

    Fundamental Graph Neural Networks

    As the most representative GNNs, convolutional graph neural networks generalize the operation of convolution from grid data to graph data, falling into two categories, spectral based (from the perspective of g...

    Mengmei Zhang, Meiqi Zhu in Advances in Graph Neural Networks (2023)

  14. No Access

    Chapter

    Computational Thermal Multi-phase Flow for Metal Additive Manufacturing

    Thermal multi-phase flow simulations are indispensable to understanding the multi-scale and multi-physics phenomena in metal additive manufacturing (AM) processes, yet accurate and robust predictions remain ch...

    **hui Yan, Qiming Zhu, Ze Zhao in Frontiers in Computational Fluid-Structure… (2023)

  15. No Access

    Chapter and Conference Paper

    Hierarchical Machine Unlearning

    In recent years, deep neural networks have enjoyed tremendous success in industry and academia, especially for their applications in visual recognition and natural language processing. While large-scale deep m...

    HongBin Zhu, Yu**ao **a, YunZhao Li, Wei Li in Learning and Intelligent Optimization (2023)

  16. No Access

    Chapter

    On Asymptotic Stability of Boussinesq Equations Without Heat Conduction

    This is a survey paper on our recent results concerning the asymptotic stability of certain stationary solution to Boussinesq equations without heat conduction. It is shown that the solution starting from init...

    Lihua Dong, Yongzhong Sun, Fangming Zhu in Fluids Under Control (2023)

  17. No Access

    Chapter

    Efficient Portfolios for Scalar Risk Functions

    In this chapter, we carefully develop a general framework of portfolio theory involving a scalar risk. This will establish a foundation for our central result on a portfolio theory involving multiple risks (or...

    Stanislaus Maier-Paape, Pedro Júdice in Scalar and Vector Risk in the General Fram… (2023)

  18. No Access

    Chapter

    Application Examples

    The theory that we have developed in the previous chapters can be applied to several management problems, coming from corporations, individuals, or governments. The manager has to balance profit with more than...

    Stanislaus Maier-Paape, Pedro Júdice in Scalar and Vector Risk in the General Fram… (2023)

  19. No Access

    Chapter

    Machine Learning-Based Rumor Controlling

    In the management of business or political battle, the rumor or disinformation is an important issue to be dealt with. Especially, with the rise of Web 2.0, online social networks (OSN) have been an important ...

    Ke Su, Priyanshi Garg, Weili Wu, Ding-Zhu Du in Handbook for Management of Threats (2023)

  20. No Access

    Chapter

    Evaluating the Risk of Reopening the Border: A Case Study of Ontario (Canada) to New York (USA) Using Mathematical Modeling

    Many countries have adopted border closures and other jurisdictions (provinces, states, cities, etc.) to control the spread of SARS-CoV-2. Such measures have significantly restricted population movement and ha...

    Pei Yuan, Elena Aruffo, Qi Li, Juan Li, Yi Tan in Mathematics of Public Health (2022)

previous disabled Page of 20