Results 51 to 60 of about 419,227 (284)

Joint Demosaicing and Denoising Based on Interchannel Nonlocal Mean Weighted Moving Least Squares Method

open access: yesSensors, 2020
Nowadays, the sizes of pixel sensors in digital cameras are decreasing as the resolution of the image sensor increases. Due to the decreased size, the pixel sensors receive less light energy, which makes it more sensitive to thermal noise.
Yeahwon Kim   +3 more
doaj   +1 more source

Nanoindentation Criteria for Combinatorial Thin Film Libraries

open access: yesAdvanced Engineering Materials, EarlyView.
Thin‐film material libraries are compositional spreads used for screening composition‐structure‐property relationships. Nanoindentation is often used to characterize mechanical behavior across these systems, however variations in methodology are widespread.
Andre Bohn, Adie Alwen, Andrea M. Hodge
wiley   +1 more source

Approximation Schemes for Partitioning: Convex Decomposition and Surface Approximation

open access: yes, 2014
We revisit two NP-hard geometric partitioning problems - convex decomposition and surface approximation. Building on recent developments in geometric separators, we present quasi-polynomial time algorithms for these problems with improved approximation ...
Bandyapadhyay, Sayan   +2 more
core   +1 more source

Surface Tension Measurement of Ti‐6Al‐4V by Falling Droplet Method in Oxygen‐Free Atmosphere

open access: yesAdvanced Engineering Materials, EarlyView.
In this article, the temperature‐dependent surface tension of free falling, oscillating Ti‐6Al‐4V droplets is investigated in both argon and monosilane doped, oxygen‐free atmosphere. Droplet temperature and oscillation are captured with one single high‐speed camera, and the surface tension is calculated with Rayleigh's formula.
Johannes May   +9 more
wiley   +1 more source

Polynomial Approximation of a Nonlinear Inverse Cauchy Problem

open access: yesAcademic Science Journal, 2023
In this paper, a class of nonlinear inverse boundary problem in the context of heat transfer is considered. We consider a class of nonlinear inverse boundary problems in the context of heat transfer.
Sudad Rasheed, Abdeljalil Nachaoui
doaj   +1 more source

Algorithms For Positive Polynomial Approximation [PDF]

open access: yesSIAM Journal on Numerical Analysis, 2019
Summary: We propose several algorithms for positive polynomial approximation. The main tool is a novel iterative method to compute nonnegative interpolation polynomials at any order, which is shown to converge under conditions that make it suitable for the numerical approximation of positive functions. Our method is based on the special representations
Charles, Frédérique   +2 more
openaire   +2 more sources

Approximating Geometric Knapsack via L-packings

open access: yes, 2017
We study the two-dimensional geometric knapsack problem (2DK) in which we are given a set of n axis-aligned rectangular items, each one with an associated profit, and an axis-aligned square knapsack.
Grandoni, Fabrizio   +5 more
core   +1 more source

Unleashing the Power of Machine Learning in Nanomedicine Formulation Development

open access: yesAdvanced Functional Materials, EarlyView.
A random forest machine learning model is able to make predictions on nanoparticle attributes of different nanomedicines (i.e. lipid nanoparticles, liposomes, or PLGA nanoparticles) based on microfluidic formulation parameters. Machine learning models are based on a database of nanoparticle formulations, and models are able to generate unique solutions
Thomas L. Moore   +7 more
wiley   +1 more source

Polynomial Approximation over Arbitrary Shape Domains

open access: yesMathematical and Computational Applications
In spectral/finite element methods, a robust and stable high-order polynomial approximation method for the solution can significantly reduce the required number of degrees of freedom (DOFs) to achieve a certain level of accuracy.
Mohammad J. Mahtabi   +3 more
doaj   +1 more source

SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation

open access: yesCryptography, 2023
Security log collection and storage are essential for organizations worldwide. Log analysis can help recognize probable security breaches and is often required by law. However, many organizations commission log management to Cloud Service Providers (CSPs)
Devharsh Trivedi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy