虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

an-<b>Introduction</b>-to-rfid-technolog

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    标签: effectiveness analytically numerically cloaking

    上传时间: 2017-03-30

    上传用户:zxc23456789

  • C++ by Dissection presents a thorough introduction to the programming process by carefully developi

    C++ by Dissection presents a thorough introduction to the programming process by carefully developing working programs to illuminate key features of the C++ programming language. Program code is explained in an easy-to-follow, careful manner throughout. The code has been tested on several platforms and is found on the bundled CDrom accompanying this text. The code in C++ By Dissection can be used with most C++ systems, including those found in operating systems such as MacOS, MS-DOS, OS/2, UNIX, and Windows.

    标签: introduction programming Dissection carefully

    上传时间: 2014-01-27

    上传用户:thesk123

  • Introduction to I/O Kit Device Driver Design Guidelines Chapter 1 The libkern C++ Runtime Chapter

    Introduction to I/O Kit Device Driver Design Guidelines Chapter 1 The libkern C++ Runtime Chapter 2 libkern Collection and Container Classes Chapter 3 The IOService API Chapter 4 Making Hardware Accessible to Applications Chapter 5 Kernel-User Notification Chapter 6 Displaying Localized Information About Drivers Chapter 7 Debugging Drivers Chapter 8 Testing and Deploying Drivers Chapter 9 Developing a Device Driver to Run on an Intel-Based Macintosh

    标签: Chapter Introduction Guidelines Runtime

    上传时间: 2017-07-04

    上传用户:冇尾飞铊

  • P3.20. Consider an analog signal xa (t) = sin (2πt), 0 ≤t≤ 1. It is sampled at Ts = 0.01, 0.05, and

    P3.20. Consider an analog signal xa (t) = sin (2πt), 0 ≤t≤ 1. It is sampled at Ts = 0.01, 0.05, and 0.1 sec intervals to obtain x(n). b) Reconstruct the analog signal ya (t) from the samples x(n) using the sinc interpolation (use ∆ t = 0.001) and determine the frequency in ya (t) from your plot. (Ignore the end effects.) C) Reconstruct the analog signal ya (t) from the samples x (n) using the cubic spline interpolation and determine the frequency in ya (t) from your plot. (Ignore the end effects.)

    标签: Consider sampled analog signal

    上传时间: 2017-07-12

    上传用户:咔乐坞

  • metricmatlab ch­ ¬ ng 4 Ma trË n - c¸ c phÐ p to¸ n vÒ ma trË n

    metricmatlab ch­ ¬ ng 4 Ma trË n - c¸ c phÐ p to¸ n vÒ ma trË n. 4.1 Kh¸ i niÖ m: - Trong MATLAB d÷ liÖ u ® Ó ® ­ a vµ o xö lý d­ íi d¹ ng ma trË n. - Ma trË n A cã n hµ ng, m cét ® ­ î c gä i lµ ma trË n cì n  m. §­ î c ký hiÖ u An  m - PhÇ n tö aij cñ a ma trË n An  m lµ phÇ n tö n» m ë hµ ng thø i, cét j . - Ma trË n ® ¬ n ( sè ® ¬ n lÎ ) lµ ma trË n 1 hµ ng 1 cét. - Ma trË n hµ ng ( 1  m ) sè liÖ u ® ­ î c bè trÝ trª n mét hµ ng. a11 a12 a13 ... a1m - Ma trË n cét ( n  1) sè liÖ u ® ­ î c bè trÝ trª n 1 cét.

    标签: metricmatlab 203 184 tr

    上传时间: 2017-07-29

    上传用户:来茴

  • this is a document about radio frequency identification RFID, this was a project ,i have done last y

    this is a document about radio frequency identification RFID, this was a project ,i have done last year ,actually this technology is a very inpotrtant one due to its relation with newest technologies , like GPS , or the miniturization of integrated circuits ,and that is described in chapter 3 . chapter 1 gives an introduction of the technology RFID , chapter 2 gives a discussion of a library using RFID , and chapter 3 is about the future of RFID , and finally the conclusion .

    标签: this identification frequency document

    上传时间: 2014-01-10

    上传用户:gtzj

  • Mobile+Communications+An+Introduction+to+New+Media

    Do you have a mobile phone? We think you probably do, one way or another. We would also guess that you might use it for many diff erent things in the course of your everyday life—as a telephone certainly, but also as an address book, as a clock or watch, as a camera, or now as a connection to your computer, email and the internet. Th ere will be a range of people you use it to contact (or not), and various strategies you use to take calls—or send texts, or take photos, or receive emails, or search online (or not, in diff erent situations). Th ere are also likely to be a range of social relation- ships in your life that your mobile phone helps to maintain—or disrupts, or inter- venes in, or makes possible, or complicates, or just plain helps to handle.

    标签: Communications Introduction Mobile Media New An to

    上传时间: 2020-05-30

    上传用户:shancjb

  • RFID+as+an+Infrastructure

    RFID (radio-frequency identification) is the use of a wireless non-contact system that uses radio-frequencyelectromagnetic fields to transfer datafrom a tag attached to an object, for the purposes of automatic identification and tracking [38]. The basic technologies for RFID have been around for a long time. Its root can be traced back to an espionage device designed in 1945 by Leon Theremin of the Soviet Union,whichretransmittedincidentradiowaves modulatedwith audioinformation. After decades of development, RFID systems have gain more and more attention from both the research community and the industry.

    标签: Infrastructure RFID as an

    上传时间: 2020-06-08

    上传用户:shancjb

  • Introduction to the Mathematical Theory 1

    The purpose of this preface is twofold. Firstly, to give an informal historical introduction to the subject area of this book, Systems and Control, and secondly, to explain the philosophy of the approach to this subject taken in this book and to outline the topics that will be covered.

    标签: Introduction Mathematical Theory the to

    上传时间: 2020-06-10

    上传用户:shancjb

  • B型剩余电流保护器设计

    随着光伏发电系统快速发展,以及电动汽车充电桩的普及,传统的剩余电流保护器无法满足实际需求。介绍了一款B型剩余电流保护器,采用磁调制剩余电流互感器和零序电流互感器采集剩余电流。根据GB/T 22794—2017标准要求,可识别1 kHz及以下的正弦交流、带和不带直流分量的脉动直流、平滑直流等剩余电流信号。经信号调理电路将电压信号送到单片机进行采集和判断。通过试验测试,该样机在测试精度和速度上均符合国家标准的相关要求。The rapid development of photovoltaic power generation systems and the popularity of electric vehicle charging piles make the traditional residual current protective devices unable to meet the actual demand.This paper proposed a type B residual current protective device,which uses the magnetically modulated residual current transformer and the zero sequence current transformer to acquire the residual current.According to the requirements of GB/T 22794—2017,the type B residual current protective device can detect sinusoidal AC residual current of 1kHz and below 1kHz,pulsating DC residual current with and without DC component,smooth DC residual current and so on.The signal processing circuit sends the voltage signal to the MCU for acquisition and judgment.Through experimental tests,the device meets the relevant requirements of national standards in terms of test accuracy and speed.

    标签: 电流保护器

    上传时间: 2022-03-27

    上传用户: