TITLE

A Comparison of Variational and Ensemble-Based Data Assimilation Systems for Reanalysis of Sparse Observations

AUTHOR(S)
Whitaker, Jeffrey S.; Compo, Gilbert P.; Thépaut, Jean-Noël
PUB. DATE
June 2009
SOURCE
Monthly Weather Review;Jun2009, Vol. 137 Issue 6, p1991
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
An observing system experiment, simulating a surface-only observing network representative of the 1930s, is carried out with three- and four-dimensional variational data assimilation systems (3D-VAR and 4D-VAR) and an ensemble-based data assimilation system (EnsDA). It is found that 4D-VAR and EnsDA systems produce analyses of comparable quality and that both are much more accurate than the analyses produced by the 3D-VAR system. The EnsDA system also produces useful estimates of analysis error, which are not directly available from the variational systems.
ACCESSION #
43158535

 

Related Articles

  • THE CARE AND REPAIR OF PUBLIC MYTH. McNeill, William H. // Foreign Affairs;Fall1982, Vol. 61 Issue 1, p1 

    The article discusses the liberal approach for the care and repair of public myth to public fact through reliance on a free market of ideas. Myth lies at the basis of human society. That is because myths are general statements about the world and its parts, and in particular about nations and...

  • RELATIONS AND INTERACTIONS BETWEEN LANGUAGES IN BILINGUALISM: REASONS AND RESULTS.  // Journal of Theory & Practice in Education (JTPE);2010, Vol. 6 Issue 2, p170 

    No abstract available.

  • Do Dogs (Canis lupus familiaris) Make Counterproductive Choices Because They Are Sensitive to Human Ostensive Cues? Marshall-Pescini, Sarah; Passalacqua, Chiara; Petrazzini, Maria Elena Miletto; Valsecchi, Paola; Prato-Previde, Emanuela // PLoS ONE;Apr2012, Vol. 7 Issue 4, p1 

    Dogs appear to be sensitive to human ostensive communicative cues in a variety of situations, however there is still a measure of controversy as to the way in which these cues influence human-dog interactions. There is evidence for instance that dogs can be led into making evaluation errors in a...

  • Assimilating Coherent Doppler Lidar Measurements into a Model of the Atmospheric Boundary Layer. Part I: Algorithm Development and Sensitivity to Measurement Error. Newsom, Rob K.; Banta, Robert M. // Journal of Atmospheric & Oceanic Technology;Sep2004, Vol. 21 Issue 9, p1328 

    A four-dimensional variational data assimilation (4DVAR) algorithm for retrieval of spatially and temporally resolved velocity and thermodynamic fields within the atmospheric boundary layer (ABL) is described and applied to a coherent Doppler lidar dataset. The adjoint method is used to find the...

  • When Reasoning Modifies Memory: Schematic Assimilation Triggered by Analogical Mapping. Vendetti, Michael S.; Wu, Aaron; Rowshanshad, Ebi; Knowlton, Barbara J.; Holyoak, Keith J. // Journal of Experimental Psychology. Learning, Memory & Cognition;Jul2014, Vol. 40 Issue 4, p1172 

    Analogical mapping highlights shared relations that link 2 situations, potentially at the expense of information that does not fit the dominant pattern of correspondences. To investigate whether analogical mapping can alter subsequent recognition memory for features of a source analog, we...

  • Internet browser.  // Traffic World;08/04/97, Vol. 251 Issue 5, p41 

    Presents several high technology-related Web sites. Buyers Guide to Electronic Commerce; WhatSpace; Softshare Information Services.

  • Peer-to-peer pressure. Trott, Bob; Jones, Jennifer; Sanborn, Stephanie; Haney, Clare // InfoWorld;09/04/2000, Vol. 22 Issue 36, preceding p5 

    Deals with the impact of peer-to-peer (P-to-P) networking on high technology industries. Information technology (IT) companies that are offering services to safeguard the data transmitted in P-to-P networking; Factors that will affect the free music services.

  • Security efforts still falling short. McCarthy, Brian // eWeek;11/20/2006, Vol. 23 Issue 46, pE4 

    The article presents the findings of the 2006 Computing Technology Industry Association survey of 574 computing technology organizations on information security. According to the survey, human error accounted for almost 60% of breaches in information security experienced by respondents. Despite...

  • Detecting Differential Item Functioning With Confirmatory Factor Analysis and Item Response Theory: Toward a Unified Strategy. Stark, Stephen; Chernyshenko, Oleksandr S.; Drasgow, Fritz // Journal of Applied Psychology;Nov2006, Vol. 91 Issue 6, p1292 

    In this article, the authors developed a common strategy for identifying differential item functioning (DIF) items that can be implemented in both the mean and covariance structures method (MACS) and item response theory (IRT). They proposed examining the loadings (discrimination) and the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics