We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
標簽: effectiveness analytically numerically cloaking
上傳時間: 2017-03-30
上傳用戶:zxc23456789
Here are the functions for Hamming code 7.4 and Extended Hamming code 8.4 encoding and decoding. For 7.4 code, one error per 7-bit codeword can be corrected. For 8.4 code, one error per 8-bit codeword can be corrected and not less than 2 errors can be detected.
標簽: Hamming code and functions
上傳時間: 2014-01-05
上傳用戶:Amygdala
Study Guide to Accompany Shari Lawrence Pfleeger s Software Engineering: Theory and Practice By Forrest Shull and Roseanne Tesoriero (very usefull book form student who study Software Engeneering)
標簽: Engineering Accompany Lawrence Pfleeger
上傳時間: 2017-04-10
上傳用戶:koulian
為 了提高用戶身份認證和授權管理的靈活性,從We b 應用系統的安全性角度出發,討論了 一 種在. N E T F r a me w o r k下保證應用程序安全性的身份驗證和授權模型,并給出了模型的具體實現方法。 該模型利用 F o r ms身份驗證方法對用戶的身份進行鑒別。在授權處理上,模型結合統一資源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授權模式和用戶所具有的系統角色,分別從頁面級和頁面操作級對用戶的訪問進行 控制。該模型在企業局域網環境內能夠提供比較靈活的身份認證和基于角色的授權服務。實際應用表明, 基于該模型的We b應用系統能夠對用戶的訪問進行有效的控制,從而保證了系統的安全性
上傳時間: 2013-12-31
上傳用戶:VRMMO
首先,計算出碼元符號集中各個碼元的累積概率,并存放在F數組里面。 然后,開始循環編碼,直至輸入序列循環完畢。 最后,將所得的累計概率由小數形式轉化成二進制形式。 對解碼。首先,計算碼元符號集中各個碼元的累積概率,并存放在F數組里面。 然后,開始循環解碼,此次循環是在碼元符號集中,由高概率碼元向低概率碼元循環,這是由于編碼的輸出肯定是不大于高概率碼元的累積概率的。那么如果我們從高到底循環,所找到的第一個小于編碼結果fs的碼元即為所譯碼的碼元。 最后,我們可以利用此碼元在碼元符號集中的位置和其概率分布數組中的位置是一一對應的性質,找到碼元并復制到輸出數組中去即可。
標簽:
上傳時間: 2017-04-11
上傳用戶:cooran
-- 本模塊的功能是驗證實現和PC機進行基本的串口通信的功能。需要在 --PC機上安裝一個串口調試工具來驗證程序的功能。 -- 程序實現了一個收發一幀10個bit(即無奇偶校驗位)的串口控 --制器,10個bit是1位起始位,8個數據位,1個結束 --位。串口的波特律由程序中定義的div_par參數決定,更改該參數可以實 --現相應的波特率。程序當前設定的div_par 的值是0x104,對應的波特率是 --9600。用一個8倍波特率的時鐘將發送或接受每一位bit的周期時間 --劃分為8個時隙以使通信同步. --程序的工作過程是:串口處于全雙工工作狀態,按動SW0,CPLD向PC發送“welcome" --字符串(串口調試工具設成按ASCII碼接受方式);PC可隨時向CPLD發送0-F的十六進制 --數據,CPLD接受后顯示在7段數碼管上。
上傳時間: 2017-04-12
上傳用戶:lgnf
This code helps to fuse pet and ct scan images.The file untitled.m opens the interface to load and fuse.Demo images are provided in the folder for reference.This code achieved a performance of .7/1
標簽: and interface untitled images
上傳時間: 2014-01-26
上傳用戶:jhksyghr
LPC vocoder LPC vocoder with several option Graphical user interface Also included several .wav file as example
標簽: vocoder several LPC Graphical
上傳時間: 2013-12-18
上傳用戶:lifangyuan12
MATLAB implementation of time series prediction Based on the VQTAM method described in the following papers: G. A. Barreto & A. F. R. Araujo (2004) "Identification and Control of Dynamical Systems Using the Self-Organizing Map" IEEE Transactions on Neural Networks, vol. 15, no. 5.
標簽: implementation prediction described following
上傳時間: 2013-12-22
上傳用戶:windwolf2000
This project shows the temperature on a three digit 7-segment display, it measures the temperature from -9.5 to 99 degrees Celcius in 0.5 C steps, or from 0 to 210 degrees Fahrenheit in 1.0 degrees steps. Because of the LED display the temperature is also readable in the dark.
標簽: temperature the measures project
上傳時間: 2017-04-16
上傳用戶:xuanjie