A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
标签: cylindrical scattering expansion developed
上传时间: 2017-03-30
上传用户:lhc9102
AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION
标签: PEAK-TO-AVERAGE MULTICARRIER TRANSMISSION TECHNIQUES
上传时间: 2017-03-31
上传用户:gyq
LDATRACE Calculates an LDA transform to maximize trace discriminant
标签: discriminant Calculates transform LDATRACE
上传时间: 2013-12-17
上传用户:tyler
Program Description: The program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exit the program.
标签: Description the Program program
上传时间: 2017-04-08
上传用户:磊子226
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
IT IS AN airline reservation system catering to the needs of officials as well as to the customer
标签: reservation officials the catering
上传时间: 2017-04-10
上传用户:xfbs821
QAM module to use in Java with an easy interface and powerful performance
标签: performance interface powerful module
上传时间: 2013-12-21
上传用户:h886166
it is an inventory system which is used to maintain all the accounts of stores
标签: inventory accounts maintain system
上传时间: 2017-04-11
上传用户:yepeng139
otsu algo this is used to thresholding of an image.................................................................
标签: thresholding image otsu algo
上传时间: 2013-12-24
上传用户:xiaoyunyun
collective processing environment for mobile devices. It is an environment for mobile device to solve their computationally expensively problem which cannot solved by individual mobile device.
标签: environment mobile collective processing
上传时间: 2017-04-11
上传用户:253189838