Results 111 to 120 of about 45,618 (222)
Personalized Differential Privacy for Ridge Regression Under Output Perturbation
ABSTRACT The increased application of machine learning (ML) in sensitive domains requires protecting the training data through privacy frameworks, such as differential privacy (DP). Traditional DP enforces a uniform privacy level ε$$ \varepsilon $$, which bounds the maximum privacy loss that each data point in the dataset is allowed to incur.
Krishna Acharya +3 more
wiley +1 more source
Processing‐Dependent Performance of the LiNiO2 Cathode in Lithium‐Ion Batteries
Processing‐dependent effects on the LiNiO2 cathode are investigated, demonstrating how the size of the pCAM particles, the method of mixing the hydroxide precursors, and the exposure to various atmospheres during the sieving process alter the microstructure, defect chemistry, and surface composition, and ultimately affect the cycling performance and ...
Barbara Nascimento Nunes +3 more
wiley +1 more source
Accurate wind power forecasting is crucial for the safe operation of power systems and the efficient utilization of energy. This paper proposes a hybrid model for wind power forecasting based on Multi-Scale Temporal Channel Mixing, PatchTST, and ...
Sheng Xu, Ming Gao
doaj +1 more source
Multistage Spectral Relaxation Method for Solving the Hyperchaotic Complex Systems
We present a pseudospectral method application for solving the hyperchaotic complex systems. The proposed method, called the multistage spectral relaxation method (MSRM) is based on a technique of extending Gauss-Seidel type relaxation ideas to systems ...
Hassan Saberi Nik, Paulo Rebelo
doaj +1 more source
ABSTRACT Purpose To achieve high resolution (≤ 1 mm isotropic) whole‐brain perfusion imaging at 7 T with next generation ASL pulse sequence, reconstruction algorithm, and MRI hardware. Methods We capitalized on three major innovations: (1) FLASH‐based pseudo‐Continuous ASL (pCASL) sequence with rotated golden‐angle stack‐of‐spirals (rGA‐SoS) sampling; (
Chenyang Zhao +8 more
wiley +1 more source
ABSTRACT Binary search trees (BSTs) are fundamental data structures whose performance is largely governed by tree height. We introduce a block model for constructing BSTs by embedding internal BSTs into the nodes of an external BST—a structure motivated by parallel data architectures—corresponding to composite permutations formed via Kronecker or ...
John Peca‐Medlin, Chenyang Zhong
wiley +1 more source
FAST CALCULATION OF ALL STABILIZING GAINS FOR DISCRETE-TIME SYSTEMS
In this paper, two methods for calculating all stabilizing gains for discrete-time systems are given. The first method focuses on converting the problem using a bilinear transformation and then applying a previously developed theorem for continuous time ...
Nevra BAYHAN, Mehmet Turan SÖYLEMEZ
doaj +2 more sources
This work demonstrates that replacing Ti with Nb in maraging steel forms nanoscale Nb–Mo particles along boundaries, strengthening the alloy without relying on Ti phases. Heat‐treatment tuning promotes uniform crystal orientation and balanced grain boundaries, enabling strong yet ductile behavior.
Mohamad Masoumi +14 more
wiley +1 more source
ABSTRACT Natural capital accounting provides a framework for integrating ecological processes with economic valuation, but the mechanics of shadow price formation often remain opaque to resource managers and policymakers. Using the Clarks Fork elk herd in northwestern Wyoming as a case study, we decompose the shadow price of natural capital into its ...
Ranjit Bawa +5 more
wiley +1 more source
We present a Chebyshev collocation method for linear ODE and DDE problems. We first give a posteriori estimates for the accuracy of the approximate solution of a scalar ODE initial value problem. Examples of the success of the estimate are given.
Bueler, Ed
core

