Electromagnetic scattering solutions for digital signal processing
Publisher
University of JyväskyläISBN
978-951-39-3944-1ISSN Search the Publication Forum
1456-5390Keywords
Metadata
Show full item recordCollections
- Väitöskirjat [3598]
License
Related items
Showing items with similar title or keywords.
-
Time-harmonic electromagnetics with exact controllability and discrete exterior calculus
Mönkölä, Sanna; Räbinä, Jukka; Rossi, Tuomo (Academie des Sciences, 2023)In this paper, we apply the exact controllability concept for time-harmonic electromagnetic scattering. The problem is presented in terms of the differential forms, and the discrete exterior calculus is utilized for spatial ... -
Electromagnetic wave propagation in non-homogeneous waveguides
Poretskii, Aleksandr (University of Jyväskylä, 2015)We investigate an electromagnetic waveguide, having several cylindrical ends. The waveguide is assumed to be empty and to have a perfectly conductive boundary. We study the electromagnetic field, excited in the waveguide ... -
Refined instability estimates for some inverse problems
Kow, Pu-Zhao; Wang, Jenn-Nan (American Institute of Mathematical Sciences (AIMS), 2022)Many inverse problems are known to be ill-posed. The ill-posedness can be manifested by an instability estimate of exponential type, first derived by Mandache [29]. In this work, based on Mandache's idea, we refine the ... -
Determining a Random Schrödinger Operator : Both Potential and Source are Random
Li, Jingzhi; Liu, Hongyu; Ma, Shiqi (Springer, 2021)We study an inverse scattering problem associated with a Schrödinger system where both the potential and source terms are random and unknown. The well-posedness of the forward scattering problem is first established in a ... -
Where Cyber Meets the Electromagnetic Spectrum
Henselmann, Gerhard; Lehto, Martti (Academic Conferences International, 2019)Cyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to ...