Results 81 to 90 of about 10,065 (207)
Station autonomous computer system is the core of the centralized traffic control (CTC) system. The working mode is dual computer hot standby, and its reliability is very important.
Lu Yan +4 more
doaj +1 more source
We show that solutal Marangoni flows in thin films climbing the outer surfaces of hydrophilic obstacles break circular Belousov‐Zhabotinsky waves into striking flower‐like patterns. Evaporation‐driven surface‐tension gradients, coupled with gravity, trigger the instability; above a threshold, petal number scales linearly with obstacle diameter ...
Sangram Gore +9 more
wiley +1 more source
Existence and Uniqueness Result for Fuzzy Fractional Order Goursat Partial Differential Equations
In this manuscript, we discuss fractional fuzzy Goursat problems with Caputo’s gH-differentiability. The second-order mixed derivative term in Goursat problems and two types of Caputo’s gH-differentiability pose challenges to dealing with Goursat ...
Muhammad Sarwar +4 more
doaj +1 more source
This study demonstrates the significant value of a collaborative framework integrating DBN and DRL for enterprise compliance risk identification and economic management optimization. The proposed approach not only overcomes the limitations of traditional models in dynamic risk modeling but also achieves synergistic optimization of risk control and ...
Zhuhan Sun
wiley +1 more source
This paper aims to explore and examine a fractional differential equation in the fuzzy conformable derivative sense. To achieve this goal, a novel analytical algorithm is formulated based on the Laplace-residual power series method to solve the fuzzy ...
Tareq Eriqat +5 more
doaj +1 more source
A Proposed Analytical Method for Solving Fuzzy Linear Initial Value Problems
In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions.
Amal khalaf Haydar
doaj +1 more source
We present evidence that N=1* SUSY Yang-Mills provides a deconstruction of a six-dimensional gauge theory compactified on a two-sphere. The six-dimensional theory is a twisted compactification of N=(1,1) SUSY Yang-Mills theory of the type considered by ...
Abrikosov +25 more
core +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Deep learning has significantly improved the performance of fingerprint liveness detection, while susceptibility to adversarial attacks remains a critical security challenge. Existing input transformation–based defense methods, including JPEG compression, total variance minimization (TVM), high‐level representation guided denoiser (HGD), and Defed, are
Shuifa Sun +7 more
wiley +1 more source
This study presents a novel exponential proportional‐derivative controller with filter (exp‐PDN) for stabilising the nonlinear and underactuated ball and beam system. Unlike conventional PID‐based approaches, the proposed controller removes the integral term, resulting in faster transient responses and improved robustness.
Davut Izci +6 more
wiley +1 more source

