Results 111 to 120 of about 672,117 (260)

On an eigenvalue problem associated with the (p, q) − Laplacian

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica
Let Ω ⊂ ℝN, N ≥ 2, be a bounded domain with smooth boundary ∂Ω. Consider the following generalized Robin-Steklov eigenvalue problem associated with the operator 𝒜u = − Δpu − Δqu {𝒜u+ρ1(x)|u|p-2u+ρ2(x)|u|q-2u=λα(x)|u|r-2u,   x∈Ω,∂u∂vA+γ1(x)|u|p-2u+γ2(x)|u|
Barbu Luminiţa   +2 more
doaj   +1 more source

Real‐time fault detection in multicomponent nuclear‐waste slurries through data fusion of spectroscopic sensors

open access: yesAIChE Journal, EarlyView.
Abstract Three instruments–Raman spectroscopy, attenuated total reflectance–Fourier transform infrared spectroscopy, and focused beam reflectance measurement–were used to detect sensor faults, mixing faults, and unanticipated chemistry in a system of multicomponent slurries.
Steven H. Crouse   +2 more
wiley   +1 more source

Eigenvalues and Holonomy

open access: yes, 2002
We estimate the eigenvalues of connection Laplacians in terms of the non-triviality of the holonomy.Comment: 9 ...
Ballmann, Werner   +2 more
core  

Trust‐region filter algorithms utilizing Hessian information for gray‐box optimization

open access: yesAIChE Journal, EarlyView.
Abstract Optimizing industrial processes often involves gray‐box models that couple algebraic glass‐box equations with black‐box components lacking analytic derivatives. Such systems challenge derivative‐based solvers. The classical trust‐region filter (TRF) algorithm provides a robust framework but requires extensive parameter tuning and numerous ...
Gul Hameed   +4 more
wiley   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Advanced Experiment Design Strategies for Drug Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
Wang et al. analyze 592 drug development studies published between 2020 and 2024 that applied design of experiments methodologies. The review surveys both classical and emerging approaches—including Bayesian optimization and active learning—and identifies a critical gap between advanced experimental strategies and their practical adoption in ...
Fanjin Wang   +3 more
wiley   +1 more source

Machine Learning‐Enhanced Random Matrix Theory Design for Human Immunodeficiency Virus Vaccine Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study integrates random matrix theory (RMT) and principal component analysis (PCA) to improve the identification of correlated regions in HIV protein sequences for vaccine design. PCA validation enhances the reliability of RMT‐derived correlations, particularly in small‐sample, high‐dimensional datasets, enabling more accurate detection of ...
Mariyam Siddiqah   +3 more
wiley   +1 more source

Interpretability and Representability of Commutative Algebra, Algebraic Topology, and Topological Spectral Theory for Real‐World Data

open access: yesAdvanced Intelligent Discovery, EarlyView.
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley   +1 more source

Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley   +1 more source

Robust Reinforcement Learning Control Framework for a Quadrotor Unmanned Aerial Vehicle Using Critic Neural Network

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
Quadrotor unmanned aerial vehicle control is critical to maintain flight safety and efficiency, especially when facing external disturbances and model uncertainties. This article presents a robust reinforcement learning control scheme to deal with these challenges.
Yu Cai   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy