منابع مشابه
Aging induced changes on NEXAFS fingerprints in individual combustion particles
Soot particles can significantly influence the Earth’s climate by absorbing and scattering solar radiation as well as by acting as cloud condensation nuclei. However, despite their environmental (as well as economic and political) importance, the way these properties are affected by atmospheric processing of the combustion exhaust gases is still a subject of discussion. In this work, individual...
متن کاملFingerprints Theorems
We prove that the scale map of the .zero-crossings of almost all signals filtered by a gaussian of variable size determines the signal uniquely, up to a constant scaling. Exceptions are signals that are antisymmetric about all their zeros (for instance infinitely periodic gratings). Our proof provides a method for reconstructing almost all signals from knowledge of how the zero-crossing contour...
متن کاملDiffusion Fingerprints
We introduce a new method for classifying and clustering data exhibiting associative properties. By means of graph theoretical tools, we show how to generate diffusion fingerprints for each subset of the data collection. We then propose a simple and computationally efficient technique for dimensionality reduction. Throughout this paper, we apply our method to the problem of classifying a corpus...
متن کاملQuantum Fingerprints
The one thing everyone knows about quantum mechanics is its legendary weirdness, in which the basic tenets of the world it describes seem alien to the world we live in. Superposition, where things can be in two states simultaneously, a switch both on and off, a cat both dead and alive. Or entanglement, what Einstein called "spooky action-at-distance" in which objects are invisibly linked, even ...
متن کاملCognitive Fingerprints
Ever since “True Names” by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. The rash of recent cyber-attacks targeting consumers, coupled with the massive amount of available digital data, has forced us to rethink our very notion of authentication as a one-shot ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Gems & Gemology
سال: 1983
ISSN: 0016-626X
DOI: 10.5741/gems.19.4.220