2010
DOI: 10.1016/j.jiec.2010.01.010
|View full text |Cite
|
Sign up to set email alerts
|

Groundwater contaminant boundary input flux estimation in a two-dimensional aquifer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…This behavior again supports the explanation given for dual-region behavior as when the tip is very close to the substrate, there will not be enough flight time for the spray stream to orient in the two regions and hence the concentration difference between the two regions is very small. Inverse estimation techniques can be used to estimate the concentration distribution and is an interesting area of research when deployed for electrospray applications [30]. At a certain threshold distance, the concentrated area diameter gets constant and the mild area goes on increasing.…”
Section: Effect Of Standoff Distancementioning
confidence: 99%
“…This behavior again supports the explanation given for dual-region behavior as when the tip is very close to the substrate, there will not be enough flight time for the spray stream to orient in the two regions and hence the concentration difference between the two regions is very small. Inverse estimation techniques can be used to estimate the concentration distribution and is an interesting area of research when deployed for electrospray applications [30]. At a certain threshold distance, the concentrated area diameter gets constant and the mild area goes on increasing.…”
Section: Effect Of Standoff Distancementioning
confidence: 99%
“…The problems of identifying groundwater contaminant source can generally be classified as (1) identifying source location problems (e.g., [8][9][10][11][12][13][14][15][16][17]), (2) recovering the release history problems (e.g., [5,[18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34]), and (3) identifying source location and recovering the release history problems simultaneously (e.g., [2,7,[35][36][37][38][39][40][41][42]).…”
Section: Introductionmentioning
confidence: 99%