亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Near-Optimal

  • We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1И

    We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1􀀀    􀀀 xng 􀀀 IR3 on or near an unknown manifold M, and produces as output a simplicial surface that approximates M. Neither the topology, the presence of boundaries, nor the geometry of M are assumed to be known in advance — all are inferred automatically from the data. This problem naturally arises in a variety of practical situations such as range scanning an object from multiple view points, recovery of biological shapes from two-dimensional slices, and interactive surface sketching.

    標簽: demonstrate unorganized algorithm describe

    上傳時間: 2013-12-18

    上傳用戶:xc216

  • A passive optical network (PON) is a point-to-multipoint, fiber to the premises network architecture

    A passive optical network (PON) is a point-to-multipoint, fiber to the premises network architecture in which unpowered optical splitters are used to enable a single optical fiber to serve multiple premises, typically 32-128. A PON consists of an Optical Line Termination (OLT) at the service provider s central office and a number of Optical Network Units (ONUs) near end users. A PON configuration reduces the amount of fiber and central office equipment required compared with point to point architectures

    標簽: network point-to-multipoint architecture premises

    上傳時間: 2016-12-10

    上傳用戶:王慶才

  • The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no

    The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results

    標簽: combinatorial assignment problem arises

    上傳時間: 2014-01-19

    上傳用戶:BIBI

  • The basic principle using the branchand- bound strategy to solve the traveling salesperson optimiz

    The basic principle using the branchand- bound strategy to solve the traveling salesperson optimization problem (TSP) consists of two parts. 􀂄 There is a way to split the solution space. 􀂄 There is a way to predict a lower bound for a class of solutions. 􀂄 There is also a way to find an upper bound of an optimal solution. 􀂄 If the lower bound of a solution exceeds this upper bound, this solution cannot be optimal. Thus, we should terminate the branching associated with this solution.

    標簽: salesperson principle branchand the

    上傳時間: 2017-02-19

    上傳用戶:comua

  • In this project we analyze and design the minimum mean-square error (MMSE) multiuser receiver for un

    In this project we analyze and design the minimum mean-square error (MMSE) multiuser receiver for uniformly quantized synchronous code division multiple access (CDMA) signals in additive white Gaussian noise (AWGN) channels.This project is mainly based on the representation of uniform quantizer by gain plus additive noise model. Based on this model, we derive the weight vector and the output signal-to-interference ratio (SIR) of the MMSE receiver. The effects of quantization on the MMSE receiver performance is characterized in a single parameter named 鈥漞quivalent noise variance鈥? The optimal quantizer stepsize which maximizes the MMSE receiver output SNR is also determined.

    標簽: mean-square multiuser receiver project

    上傳時間: 2014-11-21

    上傳用戶:ywqaxiwang

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    標簽: cylindrical scattering expansion developed

    上傳時間: 2017-03-30

    上傳用戶:lhc9102

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    標簽: effectiveness analytically numerically cloaking

    上傳時間: 2017-03-30

    上傳用戶:zxc23456789

  • In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

    In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. We apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.

    標簽: electromagnetic transformation properties approach

    上傳時間: 2017-03-30

    上傳用戶:pkkkkp

  • We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicit

    We obtained the energy transport velocity distribution for a three dimensional ideal cloak explicitly. Near the operation frequency, the energy transport velocity has rather peculiar distribution. The velocity along a line joining the origin of the cloak is a constant, while the velocity approaches zero at the inner boundary of the cloak. A ray pointing right into the origin of the cloak will experience abrupt changes of velocities when it impinges on the inner surface of the cloak. This peculiar distribution causes long time delays for beams passing through the ideal cloak within a geometric optics description.

    標簽: distribution dimensional transport obtained

    上傳時間: 2013-12-19

    上傳用戶:zhliu007

  • OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented i

    OTSU Gray-level image segmentation using Otsu s method. Iseg = OTSU(I,n) computes a segmented image (Iseg) containing n classes by means of Otsu s n-thresholding method (Otsu N, A Threshold Selection Method from Gray-Level Histograms, IEEE Trans. Syst. Man Cybern. 9:62-66 1979). Thresholds are computed to maximize a separability criterion of the resultant classes in gray levels. OTSU(I) is equivalent to OTSU(I,2). By default, n=2 and the corresponding Iseg is therefore a binary image. The pixel values for Iseg are [0 1] if n=2, [0 0.5 1] if n=3, [0 0.333 0.666 1] if n=4, ... [Iseg,sep] = OTSU(I,n) returns the value (sep) of the separability criterion within the range [0 1]. Zero is obtained only with images having less than n gray level, whereas one (optimal value) is obtained only with n-valued images.

    標簽: OTSU segmentation Gray-level segmented

    上傳時間: 2017-04-24

    上傳用戶:yuzsu

主站蜘蛛池模板: 建德市| 永仁县| 磐安县| 湖州市| 甘谷县| 吴江市| 灵台县| 怀仁县| 石门县| 珲春市| 乳山市| 双鸭山市| 沙湾县| 新余市| 湾仔区| 德化县| 大关县| 玉树县| 固镇县| 正宁县| 淮阳县| 冷水江市| 阿尔山市| 石门县| 南平市| 鄂伦春自治旗| 比如县| 沽源县| 射阳县| 镇江市| 武威市| 博罗县| 通化县| 厦门市| 乌兰察布市| 浮山县| 乐清市| 兰坪| 乃东县| 华容县| 德江县|