Results 191 to 200 of about 5,495,109 (374)

Solution of boundary value problems for batteries: Operator‐theoretic methods

open access: yesAIChE Journal, EarlyView.
Abstract Batteries with porous electrodes of negligible ionic and electronic conduction resistance are modeled with reaction‐diffusion equations in multilayered media. The classical separation of variables becomes inapplicable to battery problems because of nonlinearities in reaction rates and constraints of imposed current. A linear operator‐theoretic
Doraiswami Ramkrishna   +1 more
wiley   +1 more source

Reinforcement learning for optimal control of stochastic nonlinear systems

open access: yesAIChE Journal, EarlyView.
Abstract A reinforcement learning (RL) approach is developed in this work for nonlinear systems under stochastic uncertainty. A stochastic control Lyapunov function (SCLF) candidate is first constructed using neural networks (NNs) as an approximator to the value function, and then a control policy designed using this SCLF is developed to ensure the ...
Xinji Zhu, Yujia Wang, Zhe Wu
wiley   +1 more source

lrSVD: An efficient imputation algorithm for incomplete high‐throughput compositional data

open access: yesJournal of Chemometrics, Volume 36, Issue 12, December 2022., 2022
Abstract Compositional methods have been successfully integrated into the chemometric toolkit to analyse and model different types of data generated by modern high‐throughput technologies. Within this compositional framework, the focus is put on the relative information conveyed in the data by using log‐ratio coordinate representations.
Javier Palarea‐Albaladejo   +3 more
wiley   +1 more source

AInsectID Version 1.1: An Insect Species Identification Software Based on the Transfer Learning of Deep Convolutional Neural Networks

open access: yesAdvanced Intelligent Discovery, EarlyView.
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, EarlyView.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Harnessing Deep Learning of Point Clouds for Morphology Mimicking of Universal 3D Shape‐Morphing Devices

open access: yesAdvanced Intelligent Systems, EarlyView.
Soft robots capable of morphing into various 3D shapes are crucial for applications like human‐machine interfaces and biological manipulation. However, controlling 3D shape‐morphing robots with soft actuators remains a challenge. This work introduces a machine learning model that maps complex 3D deformations to control inputs, enabling robots to mimic ...
Jue Wang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy