|
|
To evaluate changes in the Soil Organic Carbon (SOC) index, one of the key indicators of land degradation neutrality, soil carbon modeling is of primary importance. In litera-ture, the analysis has been focused on the stability characterization of soil carbon steady states and in the calculation of… |
|
|
Lattice Boltzmann models (LBM) and phase field models (PFM) are two of the most widespread approaches for the numerical study of multicomponent fluid systems. Both methods have been successfully employed by several authors but, despite their popularity, still remains unclear how to properly compare… |
|
|
The Stokes drag force and the gravity force are usually sufficient to describe the behavior of sub-Kolmogorovsize (or pointlike) heavy particles in turbulence, in particular when the particle-to-fluid density ratio rho(p)/rho(integral) greater than or similar to 10(3) (with rho(p) and rho(f) the… |
|
|
|
|
|
Abstract. Electroencephalography (EEG) source imaging aims to reconstruct brain
activity maps from the neuroelectric potential difference measured on the skull. To
obtain the brain activity map, we need to solve an ill-posed and ill-conditioned
inverse problem that requires regularization… |
|
|
In this paper we deal with a semilinear hyperbolic chemotaxis model in one space dimension
evolving on a network, with suitable transmission conditions at nodes. This framework is motivated
by tissue-engineering scaffolds used for improving wound healing. We introduce a numerical scheme,
which… |
|
|
The energy content of (exact) electromagnetic and gravitational plane waves is studied in terms of super-energy tensors (the Bel, Bel-Robinson and the-less familiar-Chevreton tensors) and natural observers. Starting from the case of single waves, the more interesting situation of colliding waves is… |
|
|
|
|
|
|
|
|
Despite the development of new technologies in order to prevent the stealing of cars, the number of car thefts is sharply increasing. With the advent of electronics, new ways to steal cars were found. In order to avoid auto-theft attacks, in this paper we propose a machine learning based method to… |