Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, and voltages are not well defined in electromagnetic wave formulations. There are several tricks to model voltage generators in such situations, and one is the magnetic frill. This model shows the basic steps of defining a magnetic frill voltage generator for a dipole antenna, and it also compares the resulting antenna impedance with known results.
标签: difficult described antennas Feeding
上传时间: 2013-12-25
上传用户:yulg
Feeding antennas with proper signals can be difficult. The signal is often described as a voltage, and voltages are not well defined in electromagnetic wave formulations. There are several tricks to model voltage generators in such situations, and one is the magnetic frill. This model shows the basic steps of defining a magnetic frill voltage generator for a dipole antenna, and it also compares the resulting antenna impedance with known results.
标签: difficult described antennas Feeding
上传时间: 2013-12-21
上传用户:GavinNeko
SVM 软件包,可以解决分类问题(包括C- SVC、n - SVC )、回归问题(包括e - SVR、n - SVR )以及分布估计(one-class-SVM )等问题
上传时间: 2014-01-05
上传用户:shizhanincc
Implementation of Edmonds Karp algorithm that calculates maxFlow of graph. Input: For each test case, the first line contains the number of vertices (n) and the number of arcs (m). Then, there exist m lines, one for each arc (source vertex, ending vertex and arc weight, separated by a space). The nodes are numbered from 1 to n. The node 1 and node n should be in different sets. There are no more than 30 arcs and 15 nodes. The arc weights vary between 1 and 1 000 000. Output: The output is a single line for each case, with the corresponding minimum size cut. Example: Input: 7 11 1 2 3 1 4 3 2 3 4 3 1 3 3 4 1 3 5 2 4 6 6 4 5 2 5 2 1 5 7 1 6 7 9 Output: 5
标签: Implementation calculates algorithm Edmonds
上传时间: 2014-01-04
上传用户:kiklkook
卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.
上传时间: 2017-08-29
上传用户:thinode
Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.
标签: investigated Abstract-In autonomous resistors
上传时间: 2014-06-09
上传用户:h886166
Parallel robotic manipulators can be considered a well-established option for many different applications of manipulation, machining, guiding, testing, control, tracking, haptic force feed-back, etc. A typical parallel robotic manipulator (PM) consists of a mobile platform connected to the base (fixed platform) by at least two kinematic chains called limbs. The mobile platform can achieve between one and three independent translations (T) and one to three independent rotations (R).
标签: well-established manipulators considered different
上传时间: 2017-09-03
上传用户:moerwang
The many variants of the Unix operating system require use of a mode of thought that s significantly different from the one that s required by simpler operating systems. Think Unix introduces readers to important fundamental and intermediate Unix commands and, in the process, inculcates them in the Unix way of thinking. It s a worthy goal in a world with more Linux users than ever, and author Jon Lasser accomplishes it. He s both a capable writer and a knowledgeable user of Unix shell commands. Lasser uses bash under Red Hat Linux in most examples--which usually apply equally well to other Unix variants--and makes asides about other shells and environments, as needed.
标签: significantly operating variants of
上传时间: 2017-09-04
上传用户:qq521
Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold s Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. When I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming Windows. After searching in vain for such a book and spending a year learning MFC the old-fashioned way, I decided to write one myself. It s the book you hold in your hands. And it s the book I would like to have had when I was learning to program Windows the MFC way.
标签: programming colleagues industry Charles
上传时间: 2014-01-10
上传用户:曹云鹏
PenguinCards is a java-based card game. You can either play against computer or another player. On the board, there are card pairs and your aim is to find out these card pairs. The one who finds out more card pairs is the winner. Have fun!
标签: PenguinCards java-based computer against
上传时间: 2013-12-17
上传用户:xfbs821