• Aucun résultat trouvé

sediment source fingerprinting

The challenges and opportunities of addressing particle size effects in sediment source fingerprinting: A review

The challenges and opportunities of addressing particle size effects in sediment source fingerprinting: A review

... for sediment property analyses 336 should directly relate to the research ...the source of material degrading the Great Barrier Reef near Australia, the <16 338 µm particle size fraction should likely be ...

50

Sediment source fingerprinting: benchmarking recent outputs, remaining challenges and emerging themes

Sediment source fingerprinting: benchmarking recent outputs, remaining challenges and emerging themes

... the fingerprinting ap- proach in the longer ...using sediment source fingerprinting or re- viewers of such ...benchmarked sediment source fingerprinting papers arising ...

35

Strengths and limitations of sediment source fingerprinting in high mountain environments and relevance for soil restoration

Strengths and limitations of sediment source fingerprinting in high mountain environments and relevance for soil restoration

... of sediment source fingerprinting in high mountain environments and relevance for soil restoration Amaury Frankl 1,2 , Olivier Evrard 3 , Erik Cammeraat 4 , and Alexia Stokes 1 1 INRAE, AMAP, IRD, ...

2

A global review of sediment source fingerprinting research incorporating fallout radiocesium ($^{137}$Cs)

A global review of sediment source fingerprinting research incorporating fallout radiocesium ($^{137}$Cs)

... use-based source contributions to sediment, or based on tributary based approaches or investigating the contributions of particular source types ...

85

Bayesian inverse regression for vascular magnetic resonance fingerprinting

Bayesian inverse regression for vascular magnetic resonance fingerprinting

... resonance fingerprinting Fabien Boux, Florence Forbes, Julyan Arbel, Benjamin Lemasson and Emmanuel ...resonance fingerprinting (MRF) data is based on matching the MRF signals to their best counterparts in ...

12

XSS-FP: Browser Fingerprinting using HTML Parser Quirks

XSS-FP: Browser Fingerprinting using HTML Parser Quirks

... the fingerprinting prediction, even if the client browser is of an unknown ...browser fingerprinting, this is again very valuable, because it enables us to also discriminate between two close browser ...

14

Elemental fingerprinting of fish otoliths using ID-ICPMS

Elemental fingerprinting of fish otoliths using ID-ICPMS

... https://doi.org/10.3354/meps122115 Access and use of this website and the material on it are subject to the Terms and Conditions set forth at Elemental fingerprinting of fish otoliths using ID-ICPMS Campana, ...

7

Impact of the 2019 typhoons on sediment source contributions and radiocesium concentrations in rivers draining the Fukushima radioactive plume, Japan

Impact of the 2019 typhoons on sediment source contributions and radiocesium concentrations in rivers draining the Fukushima radioactive plume, Japan

... 201 sediment tracing methods ...of sediment and particle-bound 137 Cs in the rivers draining the main radioactive plume [Kurikami et ...of sediment dis- aster occurrences ...

15

Using spectrocolourimetry to trace sediment source dynamics in coastal catchments draining the main Fukushima radioactive pollution plume (2011-2017)

Using spectrocolourimetry to trace sediment source dynamics in coastal catchments draining the main Fukushima radioactive pollution plume (2011-2017)

... Using spectrocolourimetry to trace sediment source dynamics in coastal catchments draining the main Fukushima radioactive pollution plume (2011-2017) O. Evrard, Roxanne Durand, Anthony Foucher, Tales ...

32

IPv6 Neighbor Discovery Protocol based OS fingerprinting

IPv6 Neighbor Discovery Protocol based OS fingerprinting

... p0f 3 is the most well known tool for Passive Fingerprinting. It uses TCP connections it can see to determine the OS of the nodes it can see. It also detects the presence of firewalls, the usage of NAT, the ...

28

Optimal fingerprinting under multiple sources of uncertainty

Optimal fingerprinting under multiple sources of uncertainty

... We have proposed here an inference method which is suitable for the optimal fingerprinting case in which multiple sources of error having each their particular dependence structure are as[r] ...

9

Using JavaScript Monitoring to Prevent Device Fingerprinting

Using JavaScript Monitoring to Prevent Device Fingerprinting

... formally guarantees that the scripts run in a browser are not fingerprinting the user. This can be done either by detecting and blocking tracking scripts, or by modifying their tracking behaviour. To do so, we ...

3

Indoor Localization Using Multi-Color Fingerprinting

Indoor Localization Using Multi-Color Fingerprinting

... A. System Design We use a prototype embedded sensing device which is equipped with a multi-color sensor capable of measuring the intensities of red, green and blue (RBG) components of a light source ...

7

Thermophysical Fingerprinting of Probiotic-Based Products

Thermophysical Fingerprinting of Probiotic-Based Products

... Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give ...

8

Cooperative Localization in Mines Using Fingerprinting and Neural Networks

Cooperative Localization in Mines Using Fingerprinting and Neural Networks

... The third plot represents the position errors when using the super neural network, and the last plot shows the results of using the localization technique based on [r] ...

95

Fine sediment on leaves : shredder removal of sediment does not enhance fungal colonisation

Fine sediment on leaves : shredder removal of sediment does not enhance fungal colonisation

... of sediment (2 levels), shredder treatment (3 levels) and its interaction, with trials as a block factor (3 ...the sediment factor using pre-planned ...with sediment or with shredders were analysed, ...

13

Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting

Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting

... (Blind Source Separation) problem. Source separation techniques as ICA (Independent Component Analysis [14]) are powerful to perform BSS problem when original sources are indepen- dently drawn (the ...

7

Did I delete my cookies? Cookies respawning with browser fingerprinting

Did I delete my cookies? Cookies respawning with browser fingerprinting

... This instability is caused either by automatic triggers such as software updates or by changes in the user’s context such as travelling to a different timezone. In summary, stateful tracking is a stable way to track a ...

17

en
                                                                    fr

en fr C source-to-source compiler enhancement from within Amélioration source-à-source de compilateurs C

... Amélioration source-à-source de compilateurs C Résumé : Nous montrons comment un remplacement local source-à-source de fragments de code C peut être utilisé pour une spécification et un ...

23

Multi-modal brain fingerprinting: a manifold approximation based framework

Multi-modal brain fingerprinting: a manifold approximation based framework

... This work presents an efficient framework, based on manifold approxima- tion, for generating brain fingerprints from multi-modal data. The proposed framework represents images as bags of local features, which are used to ...

53

Show all 2080 documents...

Sujets connexes