It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom...
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom...
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di...
This the Firmware code for the ADE7758 for the PIC Micro controller for the computation of three pha...
A fourier filter for time-series signals. Does not require the Signal Processing Toolbox. There is...
Interactive smoothing for time-series signals, with sliders that allow you to adjust the smoothing...
MULTIPLE ACCESS TECHNIQUES - THE MAIN ACCESSING TECHNIQUES USED IN MOBILE COMMUNICATIONS: PERFORMA...
This document explains how to read the RADARSAT data CD provided with the book "Digital Processing ...
This functions computes SARMA or multiplicative (p,q) x (P,Q) models for (p,q,P,Q) in (pvec x qv...
软件功能:32位图形界面程序,可提供PG8139.EXE(DOS版)所具有的一切功能。 软件亮点:对“8139网卡改制硬盘还原卡”的所有硬件参数改写,通过点击鼠标数次即可完成!-software fu...
The program uses fminsearch to obtain the transfer function of a tank’s height. This tank is then co...