|
|
|
Mohamed Shenify, Fokrul Alom Mazarbhuiya and A. S. Wungreiphi
There are many applications of anomaly detection in the Internet of Things domain. IoT technology consists of a large number of interconnecting digital devices not only generating huge data continuously but also making real-time computations. Since IoT d...
ver más
|
|
|
|
|
|
|
Andrea D?Ambrosio and Roberto Furfaro
This paper demonstrates the utilization of Pontryagin Neural Networks (PoNNs) to acquire control strategies for achieving fuel-optimal trajectories. PoNNs, a subtype of Physics-Informed Neural Networks (PINNs), are tailored for solving optimal control pr...
ver más
|
|
|
|
|
|
|
Alexander Robitzsch
Item response theory (IRT) models are frequently used to analyze multivariate categorical data from questionnaires or cognitive test data. In order to reduce the model complexity in item response models, regularized estimation is now widely applied, addi...
ver más
|
|
|
|
|
|
|
Sergei Abramovich
The paper deals with the exploration of subsequences of polygonal numbers of different sides derived through step-by-step elimination of terms of the original sequences. Eliminations are based on special rules similarly to how the classic sieve of Eratos...
ver más
|
|
|
|
|
|
|
Andreas P. Mayer, Elena A. Mayer, Markus Mayer, Werner Ruile, Vikrant Chauhan, Thomas Forster and Karl C. Wagner
In the framework of electro-elasticity theory and the finite element method (FEM), a model is set up for the computation of quantities in surface acoustic wave (SAW) devices accounting for nonlinear effects. These include second-order and third-order int...
ver más
|
|
|
|
|
|
|
Violeta Migallón and José Penadés
Graph theory is a common topic that is introduced as part of the curricula of computing courses such as Computer Science, Computer Engineering, Data Science, Information Technology and Software Engineering. Understanding graphs is fundamental for solving...
ver más
|
|
|
|
|
|
|
Qi Deng and Feng Zeng
In big cities, there are more and more parking lots and charging piles for electric vehicles, and the resources of parking and charging vehicles can be aggregated to provide strong computing power for vehicular edge computing (VEC). In this paper, we pro...
ver más
|
|
|
|
|
|
|
Marjan Dodic, Branimir Krstic, Bosko Rasuo, Mirko Dinulovic and Aleksandar Bengin
This article addresses the numerical computation problem of induced inflow ratio based on the helicopter momentum theory in forward flight. The Glauert inflow formula (equation) is a nonlinear equation usually solved by the Newton?Raphson method in a rel...
ver más
|
|
|
|
|
|
|
Wei Gao, Yishu Liu, Qifu Li and Bei Lu
Using the unsteady vortex lattice method based on the potential flow theory, a rapid modeling approach is developed for the aerodynamic computation of multi-lifting surfaces. Multiple lifting surfaces with different geometric parameters and grid division...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|