亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Book-of-SAX-The-<b>SimPLe</b>-API-for-XM

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    標簽: effectiveness analytically numerically cloaking

    上傳時間: 2017-03-30

    上傳用戶:zxc23456789

  • With this example-driven book, you get a quick, practical, and thorough introduction to Java s API f

    With this example-driven book, you get a quick, practical, and thorough introduction to Java s API for XML Web Services (JAX-WS) and the Java API for RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, no-nonsense approach to these technologies by providing you with a mix of architectural overview, complete working code examples, and short yet precise instructions for compiling, deploying, and executing a sample application. You ll not only learn how to write web services from scratch, but also how to integrate existing services into your Java applications. All the source code for the examples is available from the book s companion website.

    標簽: example-driven introduction practical thorough

    上傳時間: 2013-12-18

    上傳用戶:lnnn30

  • Wi-Fi pollution, or an excessive number of access points in the area, especially on the same or neig

    Wi-Fi pollution, or an excessive number of access points in the area, especially on the same or neighboring channel, can prevent access and interfere with the use of other access points by others, caused by overlapping channels in the 802.11g/b spectrum

    標簽: especially pollution excessive the

    上傳時間: 2017-07-29

    上傳用戶:我們的船長

  • Most e-book publishers do not warn their customers about the possible implications of the digital ri

    Most e-book publishers do not warn their customers about the possible implications of the digital rights management tied to their products. Generally they claim that digital rights management is meant to prevent copying of the e-book. However in many cases it is also possible that digital rights management will result in the complete denial of access by the purchaser to the e-book.[citation needed] With some formats of DRM, the e-book is tied to a specific computer or device

    標簽: implications publishers customers the

    上傳時間: 2013-12-11

    上傳用戶:xg262122

  • While every precaution has been taken in the preparation of this book, the publisher assumes no re

    While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

    標簽: preparation precaution publisher the

    上傳時間: 2013-12-09

    上傳用戶:xc216

  • In case you haven t realized it, building computer systems is hard. As the complexity of the system

    In case you haven t realized it, building computer systems is hard. As the complexity of the system gets greater, the task of building the software gets exponentially harder. As in any profession, we can progress only by learning, both from our mistakes and from our successes. This book represents some of this learning written in a form that I hope will help you to learn these lessons quicker than I did, or to communicate to others more effectively than I did before I boiled these patterns down.

    標簽: complexity the building computer

    上傳時間: 2015-04-25

    上傳用戶:tyler

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    標簽: ptfsf following the contains

    上傳時間: 2013-11-28

    上傳用戶:風之驕子

  • These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition

    These files contain all of the code listings in Java: The Complete Reference, J2SE 5 Edition The source code is organized into files by chapter. For example, the file Chap7.code contains the programs shown in Chapter 7. Within each chapter file, the listings are stored in the same order as they appear in the book. Simply edit the appropriate file to extract the listing in which you are interested.

    標簽: Reference Complete listings Edition

    上傳時間: 2013-12-18

    上傳用戶:diets

  • Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search ma

    Implemented BFS, DFS and A* To compile this project, use the following command: g++ -o search main.cpp Then you can run it: ./search The input is loaded from a input file in.txt Here is the format of the input file: The first line of the input file shoud contain two chars indicate the source and destination city for breadth first and depth first algorithm. The second line of input file shoud be an integer m indicate the number of connections for the map. Following m lines describe the map, each line represents to one connection in this form: dist city1 city2, which means there is a connection between city1 and city2 with the distance dist. The following input are for A* The following line contains two chars indicate the source and destination city for A* algorithm. Then there is an integer h indicate the number of heuristic. The following h lines is in the form: city dist which means the straight-line distance from the city to B is dist.

    標簽: Implemented following compile command

    上傳時間: 2014-01-01

    上傳用戶:lhc9102

  • The ability to write efficient, high-speed arithmetic routines ultimately depends upon your knowled

    The ability to write efficient, high-speed arithmetic routines ultimately depends upon your knowledge of the elements of arithmetic as they exist on a computer. That conclusion and this book are the result of a long and frustrating search for information on writing arithmetic routines for real-time embedded systems. With instruction cycle times coming down and clock rates going up, it would seem that speed is not a problem in writing fast routines. In addition, math coprocessors are becoming more popular and less expensive than ever before and are readily available. These factors make arithmetic easier and faster to use and implement. However, for many of you the systems that you are working on do not include the latest chips or the faster processors. Some of the most widely used microcontrollers used today are not Digital Signal Processors (DSP), but simple eight-bit controllers such as the Intel 8051 or 8048 microprocessors.

    標簽: arithmetic high-speed ultimately efficient

    上傳時間: 2014-11-30

    上傳用戶:lizhen9880

主站蜘蛛池模板: 洛川县| 大石桥市| 项城市| 濉溪县| 铁力市| 霍林郭勒市| 墨玉县| 西充县| 泸定县| 长沙市| 泰宁县| 当雄县| 碌曲县| 富源县| 兴山县| 苗栗市| 怀宁县| 驻马店市| 宜川县| 陇南市| 波密县| 龙里县| 丰都县| 屏东县| 天峨县| 榆社县| 城口县| 桂东县| 祥云县| 应城市| 长武县| 威信县| 建平县| 滕州市| 合水县| 肇东市| 尼木县| 霍州市| 蒲城县| 常宁市| 四川省|