001 | 907853 | ||
005 | 20220601185743.0 | ||
024 | 7 | _ | |a 2128/31240 |2 Handle |
037 | _ | _ | |a FZJ-2022-02251 |
041 | _ | _ | |a English |
100 | 1 | _ | |a Kleefeld, Andreas |0 P:(DE-Juel1)169421 |b 0 |e Corresponding author |u fzj |
111 | 2 | _ | |a 10th International Conference Inverse Problems: Modelling & Simulation |g IPMS 2022 |c Paradise Bay Resort Hotel |d 2022-05-23 - 2022-05-27 |w Malta |
245 | _ | _ | |a Interior transmission eigenvalues for fractal domains |
260 | _ | _ | |c 2022 |
336 | 7 | _ | |a Conference Paper |0 33 |2 EndNote |
336 | 7 | _ | |a Other |2 DataCite |
336 | 7 | _ | |a INPROCEEDINGS |2 BibTeX |
336 | 7 | _ | |a conferenceObject |2 DRIVER |
336 | 7 | _ | |a LECTURE_SPEECH |2 ORCID |
336 | 7 | _ | |a Conference Presentation |b conf |m conf |0 PUB:(DE-HGF)6 |s 1654065409_21752 |2 PUB:(DE-HGF) |x After Call |
520 | _ | _ | |a Interior transmission eigenvalues arise in the study of reconstruction algorithm for inverse scattering problems. The numerical calculation of those is a challenging task due to the fact that the problem is non-linear, non-elliptic, and non-self-adjoint. It gets even more complicated when the two-dimensional domain under consideration has a fractal boundary. It is shown that we are able to successfully compute interior transmission eigenvalues for such domains. Interesting observations and conjectures are made which hopefully stimulate the community to pursue further research in this direction. |
536 | _ | _ | |a 5112 - Cross-Domain Algorithms, Tools, Methods Labs (ATMLs) and Research Groups (POF4-511) |0 G:(DE-HGF)POF4-5112 |c POF4-511 |f POF IV |x 0 |
856 | 4 | _ | |u https://juser.fz-juelich.de/record/907853/files/slides.pdf |y OpenAccess |
909 | C | O | |o oai:juser.fz-juelich.de:907853 |p openaire |p open_access |p VDB |p driver |
910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 0 |6 P:(DE-Juel1)169421 |
913 | 1 | _ | |a DE-HGF |b Key Technologies |l Engineering Digital Futures – Supercomputing, Data Management and Information Security for Knowledge and Action |1 G:(DE-HGF)POF4-510 |0 G:(DE-HGF)POF4-511 |3 G:(DE-HGF)POF4 |2 G:(DE-HGF)POF4-500 |4 G:(DE-HGF)POF |v Enabling Computational- & Data-Intensive Science and Engineering |9 G:(DE-HGF)POF4-5112 |x 0 |
914 | 1 | _ | |y 2022 |
915 | _ | _ | |a OpenAccess |0 StatID:(DE-HGF)0510 |2 StatID |
920 | _ | _ | |l no |
920 | 1 | _ | |0 I:(DE-Juel1)JSC-20090406 |k JSC |l Jülich Supercomputing Center |x 0 |
980 | 1 | _ | |a FullTexts |
980 | _ | _ | |a conf |
980 | _ | _ | |a VDB |
980 | _ | _ | |a UNRESTRICTED |
980 | _ | _ | |a I:(DE-Juel1)JSC-20090406 |
Library | Collection | CLSMajor | CLSMinor | Language | Author |
---|