Results 51 to 60 of about 40,631 (154)

Measure‐valued processes for energy markets

open access: yesMathematical Finance, Volume 35, Issue 2, Page 520-566, April 2025.
Abstract We introduce a framework that allows to employ (non‐negative) measure‐valued processes for energy market modeling, in particular for electricity and gas futures. Interpreting the process' spatial structure as time to maturity, we show how the Heath–Jarrow–Morton approach can be translated to this framework, thus guaranteeing arbitrage free ...
Christa Cuchiero   +3 more
wiley   +1 more source

Compactness of commutators of bilinear maximal Calder��n-Zygmund singular integral operators

open access: yes, 2013
Let $T$ be a bilinear Calder n-Zygmund singular integral operator and $T_*$ be its corresponding truncated maximal operator. The commutators in the $i$-$th$ entry and the iterated commutators of $T_*$ are defined by $$ T_{\ast,b,1}(f,g)(x)=\sup_{ >0}\bigg|\iint_{|x-y|+|x-z|> }K(x,y,z)(b(y)-b(x))f(y)g(z)dydz\bigg|, $$ $$T_{\ast,b,2}(f,g)(x ...
Ding, Yong, Mei, Ting, Xue, Qingying
openaire   +2 more sources

Output Feedback Design for Parameter Varying Systems Subject to Persistent Disturbances and Control Rate Constraints

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 36, Issue 7, Page 4219-4233, 10 May 2026.
ABSTRACT This paper develops a framework for designing output feedback controllers for constrained linear parameter‐varying systems that experience persistent disturbances. We specifically propose an incremental parameter‐varying output feedback control law to address control rate constraints, as well as state and control amplitude constraints.
Jackson G. Ernesto   +2 more
wiley   +1 more source

Degree theory for 4‐dimensional asymptotically conical gradient expanding solitons

open access: yesCommunications on Pure and Applied Mathematics, Volume 79, Issue 5, Page 1151-1298, May 2026.
Abstract We develop a new degree theory for 4‐dimensional, asymptotically conical gradient expanding solitons. Our theory implies the existence of gradient expanding solitons that are asymptotic to any given cone over S3$S^3$ with non‐negative scalar curvature. We also obtain a similar existence result for cones whose link is diffeomorphic to S3/Γ$S^3/\
Richard H. Bamler, Eric Chen
wiley   +1 more source

Design for flexibility: An adjustable robust optimization approach with decision‐dependent uncertainty

open access: yesAIChE Journal, Volume 72, Issue 4, April 2026.
ABSTRACT Flexibility is a crucial characteristic of industrial systems that face increasing volatilities and is therefore essential to ensure feasible operation under uncertainty. Flexibility is often closely tied to the design of a system, and careful consideration must be taken to understand the trade‐off between design cost and operational ...
Jnana Sai Jagana   +3 more
wiley   +1 more source

Gluing Riemannian manifolds with curvature operators at least k [PDF]

open access: yes, 2012
We glue two manifolds which have curvature operators at least k (in the sense of eigenvalues) along their common boundary. We show that if the sum of the second fundamental forms of the boundary is positive semidefinite, then the curvature operator of ...
Schlichting, Arthur
core  

Enhancing Air Quality Simulations With Neural Downscaling Architectures

open access: yesAtmospheric Science Letters, Volume 27, Issue 4, April 2026.
We present a machine learning‐based framework for downscaling air pollutant concentrations from 6 km to 1 km resolution over Europe. The model accurately reconstructs fine‐scale PM2.5 and NO2 patterns across scenarios using a single, generalizable architecture.
Maxime Beauchamp   +5 more
wiley   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Integrating Experimental Imaging and (Quantum‐Deformation)‐Curvature Dynamics in Bleb Morphogenesis

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
We propose a (q,τ)$$ \left(q,\tau \right) $$‐fractional geometric flow model for cell blebbing that incorporates hereditary memory and viscoelastic effects in curvature‐driven membrane dynamics. Image‐based measurements of bleb geometry are coupled with fractional evolution equations and validated numerically.
Rabha W. Ibrahim   +2 more
wiley   +1 more source

Enhancing Offshore Wind Utilization by Embedding Neural Surrogates of Total Transfer Capability in Security‐Constrained Dispatch

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Graphical abstract of the proposed decision‐aware Neural TTC framework. AC‐secure TTC labels are first generated from spatio‐temporal operating conditions using CPF/RPF and N‐1 screening with thermal, voltage, and transient security checks. A compact ReLU neural surrogate then maps exogenous conditions and endogenous dispatch decisions to interface TTC,
Jianjun Hong   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy