-
We describe and demonstrate an algorithm that takes as input an
unorganized set of points fx1 xng IR3 on or near an unknown
manifold M, and produces as output a simplicial surface that
approximates M. Neither the topology, the presence of boundaries,
nor the geometry of M are assumed to be known in advance — all
are inferred automatically from the data. This problem naturally
arises in a variety of practical situations such as range scanning
an object from multiple view points, recovery of biological shapes
from two-dimensional slices, and interactive surface sketching.
標簽:
demonstrate
unorganized
algorithm
describe
上傳時間:
2013-12-18
上傳用戶:xc216
-
A passive optical network (PON) is a point-to-multipoint, fiber to the premises network architecture in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises, typically 32-128. A PON consists of an Optical Line Termination (OLT) at the service provider s central office and a number of Optical Network Units (ONUs) near end users. A PON configuration reduces the amount of fiber and central office equipment required compared with point to point architectures
標簽:
network
point-to-multipoint
architecture
premises
上傳時間:
2016-12-10
上傳用戶:王慶才
-
The combinatorial core of the OVSF code assignment problem
that arises in UMTS is to assign some nodes of a complete binary
tree of height h (the code tree) to n simultaneous connections, such that
no two assigned nodes (codes) are on the same root-to-leaf path. Each
connection requires a code on a specified level. The code can change over
time as long as it is still on the same level. We consider the one-step code
assignment problem: Given an assignment, move the minimum number of
codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm
to solve the problem optimally. We show that DCA does not
always return an optimal solution, and that the problem is NP-hard.
We give an exact nO(h)-time algorithm, and a polynomial time greedy
algorithm that achieves approximation ratio Θ(h). Finally, we consider
the online code assignment problem for which we derive several results
標簽:
combinatorial
assignment
problem
arises
上傳時間:
2014-01-19
上傳用戶:BIBI
-
The basic principle using the branchand-
bound strategy to solve the traveling
salesperson optimization problem (TSP)
consists of two parts.
There is a way to split the solution space.
There is a way to predict a lower bound for a
class of solutions.
There is also a way to find an upper bound of
an optimal solution.
If the lower bound of a solution exceeds this
upper bound, this solution cannot be optimal.
Thus, we should terminate the branching
associated with this solution.
標簽:
salesperson
principle
branchand
the
上傳時間:
2017-02-19
上傳用戶:comua
-
In this project we analyze and design the minimum mean-square error (MMSE) multiuser receiver for uniformly quantized synchronous code division multiple access (CDMA) signals in additive white Gaussian noise (AWGN) channels.This project is mainly based on the representation of uniform quantizer by gain plus additive noise model. Based on this model, we derive the weight vector and the output signal-to-interference ratio (SIR) of the MMSE receiver. The effects of quantization on the MMSE receiver performance is characterized in a single parameter named 鈥漞quivalent noise variance鈥? The optimal quantizer stepsize which maximizes the MMSE receiver output SNR is also determined.
標簽:
mean-square
multiuser
receiver
project
上傳時間:
2014-11-21
上傳用戶:ywqaxiwang
-
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal
two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up
to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak
with the ideal material parameters is a perfect invisibility cloak by systematically studying the
change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the
slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would
induce a noticeable field scattering and penetration.
標簽:
cylindrical
scattering
expansion
developed
上傳時間:
2017-03-30
上傳用戶:lhc9102
-
We analyze, both analytically and numerically, the effectiveness
of cloaking an infinite cylinder from observations by electromagnetic
waves in three dimensions. We show that, as truncated approximations
of the ideal permittivity and permeability tensors tend towards
the singular ideal cloaking fields, so that the anisotropy ratio tends to
infinity, the D and B fields blow up near the cloaking surface. Since
the metamaterials used to implement cloaking are based on effective
medium theory, the resulting large variation in D and B will pose a
challenge to the suitability of the field averaged characterization of "
and 碌. We also consider cloaking with and without the SHS (softand-
hard surface) lining, shown in [6] to be theoretically necessary
for cloaking in the cylindrical geometry. We demonstrate numerically
that cloaking is significantly improved by the SHS lining, with both
the far field of the scattered wave significantly reduced and the blow
up of D and B prevented.
標簽:
effectiveness
analytically
numerically
cloaking
上傳時間:
2017-03-30
上傳用戶:zxc23456789
-
In an electromagnetic cloak based on a transformation approach, reduced sets of
material properties are generally favored due to their easier implementation in reality,
although a seemingly inevitable drawback of undesired reflection exists in such cloaks.
Here we suggest using high-order transformations to create smooth moduli at the outer
boundary of the cloak, therefore completely eliminating the detrimental scattering
within the limit of geometric optics. We apply this scheme to a non-magnetic
cylindrical cloak and demonstrate that the scattered field is reduced substantially in a
cloak with optimal quadratic transformation as compared to its linear counterpart.
標簽:
electromagnetic
transformation
properties
approach
上傳時間:
2017-03-30
上傳用戶:pkkkkp
-
We obtained the energy transport velocity distribution for a three dimensional ideal cloak
explicitly. Near the operation frequency, the energy transport velocity has rather peculiar
distribution. The velocity along a line joining the origin of the cloak is a constant, while
the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into
the origin of the cloak will experience abrupt changes of velocities when it impinges on the
inner surface of the cloak. This peculiar distribution causes long time delays for beams
passing through the ideal cloak within a geometric optics description.
標簽:
distribution
dimensional
transport
obtained
上傳時間:
2013-12-19
上傳用戶:zhliu007
-
OTSU Gray-level image segmentation using Otsu s method.
Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes
by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection
Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern.
9:62-66 1979). Thresholds are computed to maximize a separability
criterion of the resultant classes in gray levels.
OTSU(I) is equivalent to OTSU(I,2). By default, n=2 and the
corresponding Iseg is therefore a binary image. The pixel values for
Iseg are [0 1] if n=2, [0 0.5 1] if n=3, [0 0.333 0.666 1] if n=4, ...
[Iseg,sep] = OTSU(I,n) returns the value (sep) of the separability
criterion within the range [0 1]. Zero is obtained only with images
having less than n gray level, whereas one (optimal value) is obtained
only with n-valued images.
標簽:
OTSU
segmentation
Gray-level
segmented
上傳時間:
2017-04-24
上傳用戶:yuzsu