نتایج جستجو برای: leaky aquifer

تعداد نتایج: 12709  

2006
Shekhar Srivastava André Girard Brunilde Sansò

In this paper, we study the problem of determining the capacity requirements for applications that require QoS guarantees. We consider three kinds of source models, Poisson based, On-Off based and leaky bucket filter based, and present explicit expressions capturing the required capacity. We compare the required capacity for average delay for these models with the required capacity for absolute...

2008
Somchai Lekcharoen

When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network perfo...

2005
Darwin K. Serkland Kent M. Geib Gregory M. Peake G. Ronald Hadley Terry W. Hargett Andrea T. Ongstad Victoria M. Montano Gordon A. Keeler Ethan L. Blansett Thomas M. Bauer Melissa R. Medrano Charles T. Sullivan

This report describes the research accomplishments achieved under the LDRD Project "Leaky-mode VCSELs for photonic logic circuits." Leaky-mode vertical-cavity surfaceemitting lasers (VCSELs) offer new possibilities for integration of microcavity lasers to create optical microsystems. A leaky-mode VCSEL output-couples light laterally, in the plane of the semiconductor wafer, which allows the lig...

ژورنال: علوم آب و خاک 2018

Depletion and consequently reduction in groundwater storage results in numerous harmful environmental effects such as reduction in yields of wells, land subsidence, lowering of water quality and also reduction in storage of surface water bodies having hydraulic relation with aquifers. In this research, groundwater depletion in the Najafabad subcatchment aquifer located in the GavKhouni basin, I...

2009
Brad Esser Michael Singleton

Effective management of nitrateimpacted aquifers requires identifying the sources of nitrate to the aquifer, and understanding the transport and fate of nitrate within the aquifer. Source identification is crucial to effective source mitigation; conversion of residential septic systems to sewer in a rural community will be ineffective if the primary source of nitrate contamination is agricultur...

2015
David I. Miller Jonathan Wai

For decades, research and public discourse about gender and science have often assumed that women are more likely than men to "leak" from the science pipeline at multiple points after entering college. We used retrospective longitudinal methods to investigate how accurately this "leaky pipeline" metaphor has described the bachelor's to Ph.D. transition in science, technology, engineering, and m...

2007
Zhen LIU

In this paper we study the departure processes of two rate-control throttles: the token bank and the leaky bucket. Using sample path methods and the notion of majorization, we analyze the eeect that parameters such as the token buuer capacity and token generation period have on the vector of interdeparture times. In the transient case, we establish the monotonicity of the burst reduction in the...

2014
Francis H Chapelle Leon J Kauffman Mark A Widdowson

The vulnerability of public supply wells to chlorinated ethene (CE) contamination in part depends on the availability of naturally occurring organic carbon to consume dissolved oxygen (DO) and initiate reductive dechlorination. This was quantified by building a mass balance model of the Kirkwood-Cohansey aquifer, which is widely used for public water supply in New Jersey. This model was built b...

Journal: :Journal of contaminant hydrology 2013
R A Dearden D J Noy M R Lelliott R Wilson G P Wealthall

The invasion of DNAPL into fractured low permeability deposits results in the formation of secondary source zones that represent a long-term source of VOCs to adjacent aquifers. We present data from a site underlain by a fractured mudstone contaminated with TCE DNAPL that was poised for release following remediation of the overlying aquifer. Observations of contaminant distributions and fractur...

Journal: :IEEE Journal on Selected Areas in Communications 1991
Lars Dittmann Søren B. Jacobsen Klaus Moth

This paper characterizes four measurement algorithms for flow enforcement in ATM networks. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletrafflc theory and partly on signal processing theory, is carried out. It is suggested to use the RMS measurement bandwidth t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید