no code implementations • 7 Nov 2019 • Craig Gin, Bethany Lusch, Steven L. Brunton, J. Nathan Kutz
By leveraging a residual network architecture, a near-identity transformation can be exploited to encode intrinsic coordinates in which the dynamics are linear.