Results 51 to 60 of about 4,195,304 (299)

Capabilities of inverse scheme for acoustic source localization at low frequencies

open access: yesActa Acustica, 2021
We present the capabilities of a recently developed inverse scheme for source localization at low frequencies within an arbitrary acoustic environment. The inverse scheme is based on minimizing a Tikhonov functional matching measured microphone signals ...
Gombots Stefan   +2 more
doaj   +1 more source

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Reconstruction of the equilibrium of the plasma in a Tokamak and identification of the current density profile in real time [PDF]

open access: yes, 2011
The reconstruction of the equilibrium of a plasma in a Tokamak is a free boundary problem described by the Grad-Shafranov equation in axisymmetric configuration.
Blum, Jacques   +2 more
core   +4 more sources

Parent‐to‐Child Information Disclosure in Pediatric Oncology

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor   +12 more
wiley   +1 more source

Identification of the sources of old kiln water and the causes of water pollution in the historical manganese mine

open access: yes地质科技通报
The prevention and control of old kiln water in historical mines is a challenging problem in mine water management. In this paper, the typical manganese mining area in the manganese triangle area of China is selected as a case study.
Zhengqing WU   +6 more
doaj   +1 more source

Point source identification in non-linear advection-diffusion-reaction systems

open access: yes, 2013
We consider a problem of identification of point sources in time dependent advection-diffusion systems with a non-linear reaction term. The linear counterpart of the problem in question can be reduced to solving a system of non-linear algebraic equations
Mamonov, Alexander V.   +1 more
core   +1 more source

Predicting Chronicity in Children and Adolescents With Newly Diagnosed Immune Thrombocytopenia at the Timepoint of Diagnosis Using Machine Learning‐Based Approaches

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objectives To identify predictors of chronic ITP (cITP) and to develop a model based on several machine learning (ML) methods to estimate the individual risk of chronicity at the timepoint of diagnosis. Methods We analyzed a longitudinal cohort of 944 children enrolled in the Intercontinental Cooperative immune thrombocytopenia (ITP) Study ...
Severin Kasser   +6 more
wiley   +1 more source

Lead Isotope Ratio Measurements for Source Identification Using Samples from the UK Heavy Metals Air Quality Monitoring Network

open access: yesAtmosphere
Lead isotope ratios vary depending on the origin of the lead, meaning that characteristic isotopic signatures can be used for source identification in environmental samples.
Emma C. Braysher   +4 more
doaj   +1 more source

Estimation of contamination release histories using meshless radial point collocation method and multiverse optimization

open access: yesJournal of Hydroinformatics, 2023
Contaminants in groundwater may enter through various sources which are required to be identified for informed decision-making regarding remediation. In early stages of contamination of an aquifer, the sources of contamination are generally unknown.
Aatish Anshuman, T. I. Eldho
doaj   +1 more source

Infection Spreading and Source Identification: A Hide and Seek Game

open access: yes, 2015
The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator.
Leng, Mei, Luo, Wuqiong, Tay, Wee Peng
core   +1 more source

Home - About - Disclaimer - Privacy