A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
標簽: cylindrical scattering expansion developed
上傳時間: 2017-03-30
上傳用戶:lhc9102
AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION
標簽: PEAK-TO-AVERAGE MULTICARRIER TRANSMISSION TECHNIQUES
上傳時間: 2017-03-31
上傳用戶:gyq
LDATRACE Calculates an LDA transform to maximize trace discriminant
標簽: discriminant Calculates transform LDATRACE
上傳時間: 2013-12-17
上傳用戶:tyler
Program Description: The program asks the user to choice from the menu an option A. Check to see if a number is prime. B. Count the number of vowels in a line. X. Exit the program.
標簽: Description the Program program
上傳時間: 2017-04-08
上傳用戶:磊子226
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
標簽: fault-tolerant algorithms redundant underlyin
上傳時間: 2013-12-18
上傳用戶:jkhjkh1982
IT IS AN airline reservation system catering to the needs of officials as well as to the customer
標簽: reservation officials the catering
上傳時間: 2017-04-10
上傳用戶:xfbs821
QAM module to use in Java with an easy interface and powerful performance
標簽: performance interface powerful module
上傳時間: 2013-12-21
上傳用戶:h886166
it is an inventory system which is used to maintain all the accounts of stores
標簽: inventory accounts maintain system
上傳時間: 2017-04-11
上傳用戶:yepeng139
otsu algo this is used to thresholding of an image.................................................................
標簽: thresholding image otsu algo
上傳時間: 2013-12-24
上傳用戶:xiaoyunyun
collective processing environment for mobile devices. It is an environment for mobile device to solve their computationally expensively problem which cannot solved by individual mobile device.
標簽: environment mobile collective processing
上傳時間: 2017-04-11
上傳用戶:253189838