Results 101 to 110 of about 55,162 (247)

Novel Techniques for Void Filling in Glacier Elevation Change Data Sets

open access: yesRemote Sensing, 2020
The increasing availability of digital elevation models (DEMs) facilitates the monitoring of glacier mass balances on local and regional scales. Geodetic glacier mass balances are obtained by differentiating DEMs.
Thorsten Seehaus   +4 more
doaj   +1 more source

When tiny convective spread affects a midlatitude jet: Spread sequence

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
We investigate spread evolution by mesoscale convection from tiny initial condition uncertainty during a real event. There is significant variation among the systems in their propensity to interact with the jet stream, whereby variability in one system (due to convective and long‐wave radiative heating tendencies) tightly relates to Rossby‐like ...
Edward Groot, Michael Riemer
wiley   +1 more source

Robust Photonic Quantum Gates With A Large Number of Waveguide Segments

open access: yesAdvanced Quantum Technologies, EarlyView.
This study investigates segmented waveguide designs for photonic quantum gates, extending existing composite approaches to a large number of segments. Through numerical simulations, the work analyzes fidelity, power loss, and the effect of noise correlations.
Khen Cohen, Haim Suchowski, Yaron Oz
wiley   +1 more source

A direct procedure for interpolation on a structured curvilinear two-dimensional grid [PDF]

open access: yes
A direct procedure is presented for locally bicubic interpolation on a structured, curvilinear, two-dimensional grid. The physical (Cartesian) space is transformed to a computational space in which the grid is uniform and rectangular by a generalized ...
Yarrow, Maurice, Zingg, David W.
core   +1 more source

System Integration and Field Testing of Low‐Cost Autonomous Platooning Platforms: Collision Avoidance Scenario

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT This paper presents the development and validation of a scalable platooning system based on the predecessor‐following (PF) topology, designed for low‐cost follower platforms. It integrates key technologies such as localization, path planning, profile generation, and low‐level control to create a practical solution.
Dongwoo Seo, Jinhee Lee, Jaeyoung Kang
wiley   +1 more source

Self‐Assembly of Bent‐Core Nematics in Nanopores

open access: yesSmall, EarlyView.
Bent‐core nematic liquid crystals like CB7CB exhibit tunable molecular organization and optical responses when confined in cylindrical nanochannels of anodic aluminum oxide and silica. The study investigates how confinement–from weak to strong–modulates phase behavior, revealing heliconical structures, paranematic states, and birefringence patterns ...
Andriy Z. Maksym   +8 more
wiley   +1 more source

Morphogenetic Metals through Topology‐Driven Stiffness Changes and Electrochemical Activation

open access: yesSmall, EarlyView.
Morphogenesis in metals is achieved through reversible, electrochemically driven topological changes, which switch stainless‐steel lattices between compliant and stiff states (1.1 MPa–2.6 GPa) at room temperature and with minimal energy input. These topological transitions also allow programmable vibration control and auxetic behavior, establishing a ...
Jungtaek Kim   +4 more
wiley   +1 more source

FSBNet: A Classifying Framework of Disaster Scene for Volcanic Lithology Through Deep-Learning Models

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Volcanic lithology classification is one of the fundamental tasks in remote sensing investigation of disaster scenes, and deep learning can improve the accuracy and efficiency of classification.
Lan Liu   +6 more
doaj   +1 more source

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Secret sharing is an important aspect of key management in wireless ad hoc and sensor networks. In this paper, we define a new secure model of secret sharing, use the Lagrange interpolation and the bilinear cyclic groups to construct an efficient ...
Yuanju Gan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy