Results 181 to 190 of about 96,341 (238)
AgNSs are uniformly coated on ZnMP through a controlled galvanic replacement reaction (GRR), significantly improving energy density, reducing hydrogen evolution, and enhancing cycling stability. This Ag@ZnMP anode design, validated by long‐term stability in symmetric cells and improved performance in full cells, demonstrates the potential of GRR ...
Hee Bin Jeong+5 more
wiley +1 more source
Abstract This paper presents a reliability‐based assessment of the multilinear regression (MR) model to predict the ultimate load of slender circular concrete‐filled double‐skin tubular (CFDST) columns under eccentric loading. To assess the MR model's performance, reliability analyses of 10 experimental CFDST columns are conducted and then compared to ...
A. Usongo Amika, T. N. Haas, L. Simwanda
wiley +1 more source
Euler's polyhedron formula — a starting point of today's polytope theory
Günter M. Ziegler, Christian Blatter
openalex +2 more sources
94.32 The recursive nature of Euler's formula for harmonic series [PDF]
Rasul A. Khan
openalex +1 more source
Multiparametric modeling of infill shear walls with additionally made openings
Abstract The paper deals with the implementation of additional openings in reinforced concrete infill shear walls from the point of view of structural analysis. In the introductory part, the current state of knowledge in the methods of analysis of this issue is discussed, and their advantages or shortcomings are pointed out.
Ondřej Šimek, Miloš Zich
wiley +1 more source
Computational formulas and identities for new classes of Hermite‐based Milne–Thomson type polynomials: Analysis of generating functions with Euler's formula [PDF]
Neslıhan Kilar, Yılmaz Şimşek
openalex
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis+7 more
wiley +1 more source
A demonstration trajectory segmentation approach for wheelchair‐mounted assistive robots
Abstract Segmentation of demonstration trajectories and learning the contained motion primitives can effectively enhance the assistive robot's intelligence to flexibly reproduce learnt tasks in an unstructured environment. With the aim to conveniently and accurately segment demonstration trajectories, a novel demonstration trajectory segmentation ...
Mingshan Chi+3 more
wiley +1 more source
Abstract A mixed adaptive dynamic programming (ADP) scheme based on zero‐sum game theory is developed to address optimal control problems of autonomous underwater vehicle (AUV) systems subject to disturbances and safe constraints. By combining prior dynamic knowledge and actual sampled data, the proposed approach effectively mitigates the defect caused
Jun Ye+6 more
wiley +1 more source
Reflections on Euler's reflection formula and an additive analogue of Legendre's duplication formula
Ritesh Goenka, Gopala Krishna Srinivasan
openalex +2 more sources