Results 51 to 60 of about 4,195,484 (202)

Point source identification in non-linear advection-diffusion-reaction systems

open access: yes, 2013
We consider a problem of identification of point sources in time dependent advection-diffusion systems with a non-linear reaction term. The linear counterpart of the problem in question can be reduced to solving a system of non-linear algebraic equations
Mamonov, Alexander V.   +1 more
core   +1 more source

Lead Isotope Ratio Measurements for Source Identification Using Samples from the UK Heavy Metals Air Quality Monitoring Network

open access: yesAtmosphere
Lead isotope ratios vary depending on the origin of the lead, meaning that characteristic isotopic signatures can be used for source identification in environmental samples.
Emma C. Braysher   +4 more
doaj   +1 more source

Estimation of contamination release histories using meshless radial point collocation method and multiverse optimization

open access: yesJournal of Hydroinformatics, 2023
Contaminants in groundwater may enter through various sources which are required to be identified for informed decision-making regarding remediation. In early stages of contamination of an aquifer, the sources of contamination are generally unknown.
Aatish Anshuman, T. I. Eldho
doaj   +1 more source

The XMM-Newton survey of the Small Magellanic Cloud: XMMUJ005011.2-730026 = SXP214, a Be/X-ray binary pulsar [PDF]

open access: yes, 2011
In the course of the XMM-Newton survey of the Small Magellanic Cloud (SMC), a region to the east of the emission nebula N19 was observed in November 2009.
A. Tiengo   +46 more
core   +2 more sources

An Innovative Model-Based Methodology for Rapid Response to Drinking Water Contamination Events

open access: yesEngineering Proceedings
In a desktop exercise, a water utility’s emergency response to suspected wastewater contamination in a drinking water network was compared with a model-based approach using PathoINVEST.
Sotirios Paraskevopoulos   +7 more
doaj   +1 more source

Infection Spreading and Source Identification: A Hide and Seek Game

open access: yes, 2015
The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator.
Leng, Mei, Luo, Wuqiong, Tay, Wee Peng
core   +1 more source

Auditory time-interval perception as causal inference on sound sources

open access: yesFrontiers in Psychology, 2012
Perception of a temporal pattern in a sub-second time scale is fundamental to conversation, music perception, and other kinds of sound communication. However, its mechanism is not fully understood. A simple example is hearing three successive sounds with
Ken-ichi eSawai   +2 more
doaj   +1 more source

Reconstruction of the equilibrium of the plasma in a Tokamak and identification of the current density profile in real time [PDF]

open access: yes, 2011
The reconstruction of the equilibrium of a plasma in a Tokamak is a free boundary problem described by the Grad-Shafranov equation in axisymmetric configuration.
Blum, Jacques   +2 more
core   +4 more sources

On Reduced Input-Output Dynamic Mode Decomposition

open access: yes, 2017
The identification of reduced-order models from high-dimensional data is a challenging task, and even more so if the identified system should not only be suitable for a certain data set, but generally approximate the input-output behavior of the data ...
Benner, Peter   +2 more
core   +1 more source

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections [PDF]

open access: yes, 2013
One of the most relevant applications of digital image forensics is to accurately identify the device used for taking a given set of images, a problem called source identification.
A. L. Sandoval Orozco   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy