Results 121 to 130 of about 32,087 (238)

Optimal Gain Selection for the Arbitrary‐Order Homogeneous Differentiator

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT Differentiation of noisy signals is a relevant and challenging task. Widespread approaches are the linear high‐gain observer acting as a differentiator and Levant's robust exact differentiator with a discontinuous right‐hand side. We consider the family of arbitrary‐order homogeneous differentiators, which includes these special cases.
Benjamin Calmbach   +2 more
wiley   +1 more source

Redefining Optimal Coverage Path Planning for FLS‐Equipped AUVs With Deep Reinforcement Learning

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Autonomous Underwater Vehicles (AUVs) have emerged as indispensable tools for a variety of subsea tasks, from habitat monitoring and seabed mapping to infrastructure inspection and mine countermeasures. A fundamental challenge in this field is Coverage Path Planning (CPP), the problem of ensuring complete and efficient area coverage.
Lorenzo Cecchi   +3 more
wiley   +1 more source

Embodied, Enacted, and Multimodal: Exploring Science Teachers’ Metaphors in Authentic Classroom Contexts

open access: yesScience Education, EarlyView.
ABSTRACT Over the past decades, science education research has extensively examined the role of metaphors in teaching and learning science. However, much of the existing research has focused on verbal manifestations of metaphors, thereby overlooking aspects of metaphors that may occur in non‐verbal form. This study reconceptualises metaphors as dynamic
Magdalena Kersting   +2 more
wiley   +1 more source

Key Technical Fields and Future Outlooks of Space Manipulators: A Survey

open access: yesSmartBot, EarlyView.
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen   +12 more
wiley   +1 more source

Development and Validation of a Next‐Generation Mechanistic Model of the Electric Arc Furnace

open access: yessteel research international, EarlyView.
This study presents a next‐generation mechanistic model of the electric arc furnace (EAF). It describes equations for all crucial processes appearing during the steel‐recycling process in an EAF, i.e., thermal, mass, and chemical. The model was parameterized and validated using industrial EAF data.
Vito Logar, Igor Škrjanc
wiley   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

Computer Modeling of the Ferrite‐To‐Austenite Transformation in a Super‐Duplex Stainless Steel and the Important Role of Trans‐Interface Diffusion

open access: yessteel research international, EarlyView.
An accurate moving boundary model for volume diffusion containing boundary conditions from trans‐interface diffusion (TID) simulates the austenite growth during cooling. TID of Cr, Mo, N and Ni enhance growth kinetics. Without TID, compositions of the interface region change, decreasing the driving force for growth and finally causing numerical ...
A. Salwén   +3 more
wiley   +1 more source

Vector analog computing via on-demand metasurface dispersive polarization transformation. [PDF]

open access: yesSci Adv
Yang H   +10 more
europepmc   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy