搜索结果
找到约 300 项符合
fractional-order 的查询结果
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
文章/文档 A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ...
文章/文档 In an electromagnetic cloak based on a transformation approach, reduced sets of material properties
In an electromagnetic cloak based on a transformation approach, reduced sets of
material properties are generally favored due to their easier implementation in reality,
although a seemingly inevitable drawback of undesired reflection exists in such cloaks.
Here we suggest using high-order transforma ...
行业发展研究 In computer vision, sets of data acquired by sampling the same scene or object at different times, o
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessa ...
加密解密 SA Encryption and Decryption using Matlab The program set contains thirteen files listed below.
SA Encryption and Decryption using Matlab
The program set contains thirteen files listed below.
errormeg.fig
errormsg.m
helpmsg.fig
helpmsg.m
inputmsg.fig
inputmsg.m
mesgcut.m
pro2.fig
pro2.m
rsacore.m
readme.txt
screenshot.gif
In order to run the program please call pro2.m under Matlab 6.0 Envi ...
Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forg ...
编译器/解释器 c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths ...
软件工程 Fortran 90 versions of all the Numerical Recipes routines appear in the following Chapters B1 throu
Fortran 90 versions of all the Numerical Recipes routines appear in the following
Chapters B1 through B20, numbered in correspondence with Chapters 1 through 20
in Volume 1. Within each chapter, the routines appear in the same order as in Volume
1, but not broken out separately by section number wit ...
通讯编程文档 The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions adi_ssl_Init()
The files adi_ssl_init.h and adi_ssl_init.c are used to define the functions
adi_ssl_Init() and 慳di_ssl_Terminate()?which initialize and terminate all the
Blackfin System Services in the appropriate order, for a particular EZ-Kit, depending
on the Blackfin processor used.
DSP编程 C280x C/C++ Header Files and Peripheral Examples The DSP28xx C/C++ peripheral header files and exam
C280x C/C++ Header Files and Peripheral Examples
The DSP28xx C/C++ peripheral header files and example projects files facilitate writing C/C++ Code for the TI鈥檚 28xx MCUs. The code can be used as a learning tool or as the basis for a development platform depending on the current needs of the user. ...