虫虫首页|资源下载|资源专辑|精品软件
登录|注册

infinite

  • h2 and h-infinite control code

    h2 and h-infinite control code

    标签: h-infinite control code and

    上传时间: 2015-11-03

    上传用户:sammi

  • 北京大学ACM比赛题目 Consider an infinite full binary search tree (see the figure below), the numbers in the

    北京大学ACM比赛题目 Consider an infinite full binary search tree (see the figure below), the numbers in the nodes are 1, 2, 3, .... In a subtree whose root node is X, we can get the minimum number in this subtree by repeating going down the left node until the last level, and we can also find the maximum number by going down the right node. Now you are given some queries as "What are the minimum and maximum numbers in the subtree whose root node is X?" Please try to find answers for there queries.

    标签: the Consider infinite numbers

    上传时间: 2013-12-15

    上传用户:日光微澜

  • In this program we calculate the scattering field of a infinite dielectric cylinder by two methods.

    In this program we calculate the scattering field of a infinite dielectric cylinder by two methods. 1)Moment 2)Analytic

    标签: dielectric scattering calculate cylinder

    上传时间: 2017-03-30

    上传用户:BIBI

  • In this program we calculate the scattering field of a infinite rectangular surface. I use Physical

    In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.

    标签: rectangular scattering calculate Physical

    上传时间: 2014-01-19

    上传用户:362279997

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • Dimensionality Reduction for Distributed Estimation in the infinite Dimensional Regime

    Dimensionality Reduction for Distributed Estimation in the infinite Dimensional Regime

    标签: Dimensionality Dimensional Distributed Estimation

    上传时间: 2017-06-07

    上传用户:familiarsmile

  • this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using th

    this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using the fdatool. They are then implemented in VisualDSP++.

    标签: filters introduce infinite designed

    上传时间: 2017-07-23

    上传用户:BIBI

  • 解决时钟问题

    解决时钟问题,acm竞赛题 A weird clock marked from 0 to 59 has only a minute hand. It won t move until a special coin is thrown into its box. There are different kinds of coins as your options. However once you make your choice, you cannot use any other kind. There are infinite number of coins of each kind, each marked with a number d ( 0 <= 1000 ), meaning that this coin will make the minute hand move d times clockwise the current time. For example, if the current time is 45, and d = 2. Then the minute hand will move clockwise 90 minutes and will be pointing to 15. Now you are given the initial time s ( 0 <= s <= 59 ) and the coin s type d. Write a program to find the minimum number of d-coins needed to turn the minute hand back to 0.

    标签: 时钟

    上传时间: 2015-05-21

    上传用户:rishian

  • 本书包含了许多Ajax技术的设计模式。例如:你应该如何分割数据以便于分配呢?答案是

    本书包含了许多Ajax技术的设计模式。例如:你应该如何分割数据以便于分配呢?答案是,采用内容分块模式(Content Chunking Pattern);如何有效地维护状态或至少是维护痕迹呢?答案是,采用持久通信模式(Persistent Communications Pattern);如何让用户对所有潜在的数据了如指掌呢?答案是,采用无限数据模式(infinite Data Pattern)。通过书中呈现的九种模式,作者几乎发掘了所有的Ajax理论,这些知识对你将来编写应用程序时制定策略有重大的帮助。每种模式都有相应的章节对其进行论述,每章均以模式的设计意图为开头,然后介绍使用该模式的动机,并列举一系列使用该模式开发的应用程序和与该模式相关联的设计模式。接着,以解决实际问题的方式诠释该设计模式的架构。最后,执行程序通过代码及用户与各种网页的互动形式展现。在章末,还有对该章精华内容的总结回顾。

    标签: Ajax 设计模式 分割 数据

    上传时间: 2015-09-30

    上传用户:saharawalker

  • GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to so

    GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to solve, or at least approximate, the Generalized Problem of Moments (GPM), an infinite-dimensional optimization problem which can be viewed as an extension of the classical problem of moments [8]. From a theoretical viewpoint, the GPM has developments and impact in various areas of mathematics such as algebra, Fourier analysis, functional analysis, operator theory, probability and statistics, to cite a few. In addition, and despite a rather simple and short formulation, the GPM has a large number of important applications in various fields such as optimization, probability, finance, control, signal processing, chemistry, cristallography, tomography, etc. For an account of various methodologies as well as some of potential applications, the interested reader is referred to [1, 2] and the nice collection of papers [5].

    标签: optimization semidefinite programming GloptiPoly

    上传时间: 2016-06-04

    上传用户:lgnf