Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Spectral edge frequency

Known as: SEF 
The spectral edge frequency or SEF is a measure used in signal processing. It is usually expressed as "SEF x", which stands for the frequency below… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
As a commonly encountered problem in the particle filters (PFs), the particle impoverishment is caused partially by the reduction… 
  • table I
  • figure 1
  • figure 2
  • table II
  • table III
Highly Cited
2012
Highly Cited
2012
AbstractThe Weather and Research and Forecasting Model (WRF) is used to simulate secondary eyewall formation (SEF) in a tropical… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
A simple, fast, and versatile approach to the fabrication of outstanding surface enhanced Raman spectroscopy (SERS) substrates by… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2008
Review
2008
Fluorescence is widely used in optical devices, microscopy imaging, biology, medical research and diagnosis. Improving… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2008
Review
2008
Non-spherical gold nanoparticles such as rods (short, long) (1,2), wires, cubes (3), nanocages (4), (multi-)concentric shells (5… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2005
Highly Cited
2005
In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject… 
Highly Cited
2005
Highly Cited
2005
When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the… 
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table I
Highly Cited
2004
Highly Cited
2004
In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject into the… 
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 8
Highly Cited
2001
Highly Cited
2001
Developing a standard schema at the abstract syntax tree (AST) level for C/C++ to be used by reverse engineering and… 
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2000
Highly Cited
2000
This paper describes ongoing work toward the development of a standard software exchange format (SEF), for exchanging information… 
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4