搜索结果

找到约 300 项符合 fractional-order 的查询结果

文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
https://www.eeworm.com/dl/652/421399.html
下载: 42
查看: 1073

文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ...
https://www.eeworm.com/dl/652/421405.html
下载: 181
查看: 1092

文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transforma ...
https://www.eeworm.com/dl/652/421409.html
下载: 155
查看: 1048

行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o

In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
https://www.eeworm.com/dl/692/422791.html
下载: 65
查看: 1046

加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.

SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Envi ...
https://www.eeworm.com/dl/519/424230.html
下载: 21
查看: 1053

Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click

1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forg ...
https://www.eeworm.com/dl/666/424794.html
下载: 178
查看: 1102

编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin

c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
https://www.eeworm.com/dl/628/425099.html
下载: 77
查看: 1078

软件工程 Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu

Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20 in Volume 1. Within each chapter, the routines appear in the same order as in Volume 1, but not broken out separately by section number wit ...
https://www.eeworm.com/dl/540/426506.html
下载: 90
查看: 1101

通讯编程文档 The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()

The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending on the Blackfin processor used.
https://www.eeworm.com/dl/646/428831.html
下载: 85
查看: 1107

DSP编程 C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam

C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. ...
https://www.eeworm.com/dl/516/431958.html
下载: 60
查看: 1053