Results 131 to 140 of about 49,660 (224)
Duality for Evolutionary Equations With Applications to Null Controllability
ABSTRACT We study evolutionary equations in exponentially weighted L2$$ {\mathrm{L}}^2 $$‐spaces as introduced by Picard in 2009. First, for a given evolutionary equation, we explicitly describe the ν$$ \nu $$‐adjoint system, which turns out to describe a system backwards in time. We prove well‐posedness for the ν$$ \nu $$‐adjoint system. We then apply
Andreas Buchinger, Christian Seifert
wiley +1 more source
Spatial Image Gradient Estimation From the Diffusion MRI Profile
ABSTRACT Purpose In the course of diffusion, water molecules encounter varying values for the relaxation‐time properties of the underlying tissue. This factor, which has rarely been accounted for in diffusion MRI (dMRI), is modeled in this work, allowing for the estimation of the gradient of relaxation‐time properties from the dMRI signal. Methods With
Iman Aganj +4 more
wiley +1 more source
Majorization Inequalities via Peano's Representation of Hermite's Polynomial
The Peano's representation of Hermite polynomial and new Green functions are used to construct the identities related to the generalization of majorization type inequalities in discrete as well as continuous case.
N. Latif, N. Siddique, J. Pecaric
doaj +2 more sources
ABSTRACT Modern engineering systems require advanced uncertainty‐aware model updating methods that address parameter correlations beyond conventional interval analysis. This paper proposes a novel framework integrating Riemannian manifold theory with Gaussian Process Regression (GPR) for systems governed by Symmetric Positive‐Definite (SPD) matrix ...
Yanhe Tao +3 more
wiley +1 more source
ABSTRACT Security agencies around the world use bodyguards to protect government officials and public figures. In this paper, we consider a two‐person zero‐sum game between a defender who allocates such bodyguards to protect several targets and an attacker who chooses one target to attack.
Loe Schlicher, Kyle Y. Lin, Moshe Kress
wiley +1 more source
Personalized Differential Privacy for Ridge Regression Under Output Perturbation
ABSTRACT The increased application of machine learning (ML) in sensitive domains requires protecting the training data through privacy frameworks, such as differential privacy (DP). Traditional DP enforces a uniform privacy level ε$$ \varepsilon $$, which bounds the maximum privacy loss that each data point in the dataset is allowed to incur.
Krishna Acharya +3 more
wiley +1 more source
Schematic representation of the beneficial effect of ply pre‐curing on temperature overshoot, internal strain and warpage during cure of thin and thick thermosetting composites. ABSTRACT Detection of manufacturing‐induced defects in thermosetting composites is crucial to guarantee part quality, safety, and improve manufacturing efficiency.
Francesco Taddei +3 more
wiley +1 more source
Risk Times in Mission‐Oriented Systems
ABSTRACT This article assesses risk times in mission‐oriented systems with high safety standards. We examine critical times under two safety policies. The first requires that the system's reliability function, known the first failure of the components, must exceed a reliability level throughout the mission.
Antonio Arriaza +2 more
wiley +1 more source
High‐precision time‐delay measurements are demonstrated using frequency‐resolved Hong‐Ou Mandel (HOM) interference with weak coherent states. The method, by exploiting the quantum eraser phenomenon, achieves low uncertainty even for delays exceeding the photon coherence time, where traditional HOM interferometry fails, thus confirming theoretical ...
Francesco Di Lena +9 more
wiley +1 more source

