亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

infinite

  • h2 and h-infinite control code

    h2 and h-infinite control code

    標簽: h-infinite control code and

    上傳時間: 2015-11-04

    上傳用戶:sammi

  • 北京大學ACM比賽題目 Consider an infinite full binary search tree (see the figure below), the numbers in the

    北京大學ACM比賽題目 Consider an infinite full binary search tree (see the figure below), the numbers in the nodes are 1, 2, 3, .... In a subtree whose root node is X, we can get the minimum number in this subtree by repeating going down the left node until the last level, and we can also find the maximum number by going down the right node. Now you are given some queries as "What are the minimum and maximum numbers in the subtree whose root node is X?" Please try to find answers for there queries.

    標簽: the Consider infinite numbers

    上傳時間: 2013-12-16

    上傳用戶:日光微瀾

  • In this program we calculate the scattering field of a infinite dielectric cylinder by two methods.

    In this program we calculate the scattering field of a infinite dielectric cylinder by two methods. 1)Moment 2)Analytic

    標簽: dielectric scattering calculate cylinder

    上傳時間: 2017-03-30

    上傳用戶:BIBI

  • In this program we calculate the scattering field of a infinite rectangular surface. I use Physical

    In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.

    標簽: rectangular scattering calculate Physical

    上傳時間: 2014-01-19

    上傳用戶:362279997

  • We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder f

    We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.

    標簽: effectiveness analytically numerically cloaking

    上傳時間: 2017-03-30

    上傳用戶:zxc23456789

  • Dimensionality Reduction for Distributed Estimation in the infinite Dimensional Regime

    Dimensionality Reduction for Distributed Estimation in the infinite Dimensional Regime

    標簽: Dimensionality Dimensional Distributed Estimation

    上傳時間: 2017-06-07

    上傳用戶:familiarsmile

  • this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using th

    this introduce infinite impulse response (IIR) filters. The filters are designed in MATLAB using the fdatool. They are then implemented in VisualDSP++.

    標簽: filters introduce infinite designed

    上傳時間: 2017-07-23

    上傳用戶:BIBI

  • 解決時鐘問題

    解決時鐘問題,acm競賽題 A weird clock marked from 0 to 59 has only a minute hand. It won t move until a special coin is thrown into its box. There are different kinds of coins as your options. However once you make your choice, you cannot use any other kind. There are infinite number of coins of each kind, each marked with a number d ( 0 <= 1000 ), meaning that this coin will make the minute hand move d times clockwise the current time. For example, if the current time is 45, and d = 2. Then the minute hand will move clockwise 90 minutes and will be pointing to 15. Now you are given the initial time s ( 0 <= s <= 59 ) and the coin s type d. Write a program to find the minimum number of d-coins needed to turn the minute hand back to 0.

    標簽: 時鐘

    上傳時間: 2015-05-21

    上傳用戶:rishian

  • 本書包含了許多Ajax技術的設計模式。例如:你應該如何分割數據以便于分配呢?答案是

    本書包含了許多Ajax技術的設計模式。例如:你應該如何分割數據以便于分配呢?答案是,采用內容分塊模式(Content Chunking Pattern);如何有效地維護狀態或至少是維護痕跡呢?答案是,采用持久通信模式(Persistent Communications Pattern);如何讓用戶對所有潛在的數據了如指掌呢?答案是,采用無限數據模式(infinite Data Pattern)。通過書中呈現的九種模式,作者幾乎發掘了所有的Ajax理論,這些知識對你將來編寫應用程序時制定策略有重大的幫助。每種模式都有相應的章節對其進行論述,每章均以模式的設計意圖為開頭,然后介紹使用該模式的動機,并列舉一系列使用該模式開發的應用程序和與該模式相關聯的設計模式。接著,以解決實際問題的方式詮釋該設計模式的架構。最后,執行程序通過代碼及用戶與各種網頁的互動形式展現。在章末,還有對該章精華內容的總結回顧。

    標簽: Ajax 設計模式 分割 數據

    上傳時間: 2015-09-30

    上傳用戶:saharawalker

  • GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to so

    GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to solve, or at least approximate, the Generalized Problem of Moments (GPM), an infinite-dimensional optimization problem which can be viewed as an extension of the classical problem of moments [8]. From a theoretical viewpoint, the GPM has developments and impact in various areas of mathematics such as algebra, Fourier analysis, functional analysis, operator theory, probability and statistics, to cite a few. In addition, and despite a rather simple and short formulation, the GPM has a large number of important applications in various fields such as optimization, probability, finance, control, signal processing, chemistry, cristallography, tomography, etc. For an account of various methodologies as well as some of potential applications, the interested reader is referred to [1, 2] and the nice collection of papers [5].

    標簽: optimization semidefinite programming GloptiPoly

    上傳時間: 2016-06-05

    上傳用戶:lgnf

主站蜘蛛池模板: 英山县| 息烽县| 习水县| 虞城县| 青铜峡市| 平山县| 马关县| 伊宁市| 门头沟区| 宝清县| 阳山县| 九寨沟县| 阳山县| 郴州市| 高淳县| 于田县| 安阳市| 藁城市| 三江| 洛隆县| 夏邑县| 谢通门县| 麦盖提县| 长垣县| 博白县| 纳雍县| 香格里拉县| 交口县| 安宁市| 石棉县| 罗平县| 濮阳市| 新巴尔虎右旗| 商洛市| 衢州市| 连平县| 苏尼特左旗| 岳普湖县| 黄梅县| 宜州市| 连州市|