Electromagnetic scattering solutions for digital signal processing
Julkaisija
University of JyväskyläISBN
978-951-39-3944-1ISSN Hae Julkaisufoorumista
1456-5390Asiasanat
Metadata
Näytä kaikki kuvailutiedotKokoelmat
- Väitöskirjat [3598]
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Time-harmonic electromagnetics with exact controllability and discrete exterior calculus
Mönkölä, Sanna; Räbinä, Jukka; Rossi, Tuomo (Academie des Sciences, 2023)In this paper, we apply the exact controllability concept for time-harmonic electromagnetic scattering. The problem is presented in terms of the differential forms, and the discrete exterior calculus is utilized for spatial ... -
Electromagnetic wave propagation in non-homogeneous waveguides
Poretskii, Aleksandr (University of Jyväskylä, 2015)We investigate an electromagnetic waveguide, having several cylindrical ends. The waveguide is assumed to be empty and to have a perfectly conductive boundary. We study the electromagnetic field, excited in the waveguide ... -
Refined instability estimates for some inverse problems
Kow, Pu-Zhao; Wang, Jenn-Nan (American Institute of Mathematical Sciences (AIMS), 2022)Many inverse problems are known to be ill-posed. The ill-posedness can be manifested by an instability estimate of exponential type, first derived by Mandache [29]. In this work, based on Mandache's idea, we refine the ... -
Determining a Random Schrödinger Operator : Both Potential and Source are Random
Li, Jingzhi; Liu, Hongyu; Ma, Shiqi (Springer, 2021)We study an inverse scattering problem associated with a Schrödinger system where both the potential and source terms are random and unknown. The well-posedness of the forward scattering problem is first established in a ... -
Where Cyber Meets the Electromagnetic Spectrum
Henselmann, Gerhard; Lehto, Martti (Academic Conferences International, 2019)Cyber linked with Information Technology, computers and the internet are the most commonly understood potential threats that everybody is aware of nowadays. In the case of National Cyber Strategy most efforts are given to ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.