We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789
Creating barcodes in Microsoft庐 Office has never been easier. With BarCodeWiz Toolbar you can add barcodes to Microsoft庐 Office applications with a click of a button. In Microsoft庐 Word, create single barcodes, pages of labels, or mail merge documents. In Microsoft庐 Excel庐, select a range of cells and automatically convert each cell to a barcode. In Microsoft庐 Access庐, create reports with barcodes based on your data tables.
标签: BarCodeWiz Microsoft Creating barcodes
上传时间: 2013-12-18
上传用户:asddsd
This application note describes the three methods that can be used to program the Flash code memory of the 89C51Rx+/Rx2/66x families of microcontrollers. It discusses in detail the operation of the In-System Programming (ISP) capability which allows these microcontrollers to be programmed while mounted in the end product. These microcontrollers also have an In-Application Programming (IAP) capability which allows them to be programmed under firmware control of the embedded application. This capability is also described
标签: application describes the methods
上传时间: 2014-01-16
上传用户:woshiayin
Using an easy-to-follow format, this book explains the basics of MATLAB up front. You ll find out how to plot functions, solve algebraic equations, and compute integrals. You ll also learn how to solve differential equations, generate numerical solutions of ODEs, and work with special functions. Packed with hundreds of sample equations and explained solutions, and featuring end-of-chapter quizzes and a final exam, this book will teach you MATLAB essentials in no time at all.
标签: easy-to-follow explains MATLAB basics
上传时间: 2017-04-10
上传用户:时代电子小智
Permits to negotiate of simple form (without code) some of the most utilized combinations of keys in the forms. It suffices with freeing the component on the form and to activate the properties desired segun the behavior that want. * ENTER to change of field. * ESC to close the form * to Advance al following control * to Delay al previous control * function Keys *.. .
标签: combinations negotiate of utilized
上传时间: 2014-01-15
上传用户:linlin
A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is convex if and only if, for any two points A and B inside the polygon, the line segment AB is inside P. One way to visualize a convex hull is to put a "rubber band" around all the points, and let it wrap as tight as it can. The resultant polygon is a convex hull.
上传时间: 2013-12-23
上传用户:it男一枚
The GIFT (the GNU Image-Finding Tool) is a Content Based Image Retrieval System (CBIRS: http://en.wikipedia.org/wiki/CBIR). It enables you to do Query By Example (QBE: http://en.wikipedia.org/wiki/QBE) on images, giving you the opportunity to improve query results by relevance feedback. For processing your queries the program relies entirely on the content of the images, freeing you from the need to annotate all images before querying the collection.
标签: Image-Finding Retrieval Content System
上传时间: 2014-01-11
上传用户:咔乐坞
C++ source code interpreter for Win 32 platforms, for developers and end-users. The goal of our project is to interpret C++ source code and execute it. The interpreter will run on Win32 platforms. We will create and develop it in C++ language. The latest file releases
标签: interpreter developers for end-users
上传时间: 2014-08-15
上传用户:2525775
生成Trick文件工具 1.Open command line 2.input tricktest Usage: TrickTest -f -o -i -f source mpeg2 file to trick -o trick output directory -i output file id -m max coding error, default 0 -b max bitrate for trick generate, default 0 mean no limit -s trick buffer block size, must be n*188 -l log file, default c:\tricktest.log example: tricktest -f 黑鹰行动.mpg -o c:\temp -i A -m 1000 -b 3750000 soure file: 黑鹰行动.mpg output directory: c:\temp filename: 000000A,000000A.ff,000000A.fr,000000A.vvx max coding error: 1000 trick generation speed: 3750000 bps a
标签: TrickTest tricktest command source
上传时间: 2014-01-23
上传用户:水口鸿胜电器
The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.
标签: application real-time Synopsys emphasis
上传时间: 2017-07-05
上传用户:waitingfy