A sparse variant of the Levenberg-Marquardt algorithm implemented by levmar has been applied to bundle adjustment, a computer vision/photogrammetry problem that Typically involves several thousand variables
标签: Levenberg-Marquardt implemented algorithm applied
上传时间: 2013-12-23
上传用户:wqxstar
matlab有限元网格划分程序 DistMesh is a simple MATLAB code for generation of unstructured triangular and tetrahedral meshes. It was developed by Per-Olof Persson (now at UC Berkeley) and Gilbert Strang in the Department of Mathematics at MIT. A detailed description of the program is provided in our SIAM Review paper, see documentation below. One reason that the code is short and simple is that the geometries are specified by Signed Distance Functions. These give the shortest distance from any point in space to the boundary of the domain. The sign is negative inside the region and positive outside. A simple example is the unit circle in 2-D, which has the distance function d=r-1, where r is the distance from the origin. For more complicated geometries the distance function can be computed by interpolation between values on a grid, a common representation for level set methods. For the actual mesh generation, DistMesh uses the Delaunay triangulation routine in MATLAB and tries to optimize the node locations by a force-based smoothing procedure. The topology is regularly updated by Delaunay. The boundary points are only allowed to move tangentially to the boundary by projections using the distance function. This iterative procedure Typically results in very well-shaped meshes. Our aim with this code is simplicity, so that everyone can understand the code and modify it according to their needs. The code is not entirely robust (that is, it might not terminate and return a well-shaped mesh), and it is relatively slow. However, our current research shows that these issues can be resolved in an optimized C++ code, and we believe our simple MATLAB code is important for demonstration of the underlying principles. To use the code, simply download it from below and run it from MATLAB. For a quick demonstration, type "meshdemo2d" or "meshdemond". For more details see the documentation.
标签: matlab有限元网格划分程序
上传时间: 2015-08-12
上传用户:凛风拂衣袖
Computational models are commonly used in engineering design and scientific discovery activities for simulating complex physical systems in disciplines such as fluid mechanics, structural dynamics, heat transfer, nonlinear structural mechanics, shock physics, and many others. These simulators can be an enormous aid to engineers who want to develop an understanding and/or predictive capability for complex behaviors Typically observed in the corresponding physical systems. Simulators often serve as virtual prototypes, where a set of predefined system parameters, such as size or location dimensions and material properties, are adjusted to improve the performance of a system, as defined by one or more system performance objectives. Such optimization or tuning of the virtual prototype requires executing the simulator, evaluating performance objective(s), and adjusting the system parameters in an iterative, automated, and directed way. System performance objectives can be formulated, for example, to minimize weight, cost, or defects; to limit a critical temperature, stress, or vibration response; or to maximize performance, reliability, throughput, agility, or design robustness. In addition, one would often like to design computer experiments, run parameter studies, or perform uncertainty quantification (UQ). These approaches reveal how system performance changes as a design or uncertain input variable changes. Sampling methods are often used in uncertainty quantification to calculate a distribution on system performance measures, and to understand which uncertain inputs contribute most to the variance of the outputs. A primary goal for Dakota development is to provide engineers and other disciplinary scientists with a systematic and rapid means to obtain improved or optimal designs or understand sensitivity or uncertainty using simulationbased models. These capabilities generally lead to improved designs and system performance in earlier design stages, alleviating dependence on physical prototypes and testing, shortening design cycles, and reducing product development costs. In addition to providing this practical environment for answering system performance questions, the Dakota toolkit provides an extensible platform for the research and rapid prototyping of customized methods and meta-algorithms
标签: Optimization and Uncertainty Quantification
上传时间: 2016-04-08
上传用户:huhu123456
The core thrust of architecture has been to define core business requirements, and then construct the IT solution to meet those requirements, Typically as instances of software. While this seems like a simple concept, many in enter- prise IT went way off course in the last 10 to 15 years.
标签: Architecture Revolution Agile
上传时间: 2020-05-26
上传用户:shancjb
The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But Typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.
标签: Communications Physical Security Wireless Layer in
上传时间: 2020-05-31
上传用户:shancjb
Wireless communications has become a field of enormous scientific and economic interest. Recent success stories include 2G and 3G cellular voice and data services (e.g., GSM and UMTS), wireless local area networks (WiFi/IEEE 802.11x), wireless broadband access (WiMAX/IEEE 802.16x), and digital broadcast systems (DVB, DAB, DRM). On the physical layer side, traditional designs Typically assume that the radio channel remains constant for the duration of a data block. However, researchers and system designers are increasingly shifting their attention to channels that may vary within a block. In addition to time dispersion caused by multipath propagation, these rapidly time-varying channels feature frequency dispersion resulting from the Doppler effect. They are, thus, often referred to as being “doubly dispersive.”
标签: Time-Varying Channels
上传时间: 2020-06-01
上传用户:shancjb
Once upon a time, cellular wireless networks provided two basic services: voice telephony and low-rate text messaging. Users in the network were separated by orthogonal multiple access schemes, and cells by generous frequency reuse patterns [1]. Since then, the proliferation of wireless services, fierce competition, andthe emergenceof new service classes such as wireless data and multimediahave resulted in an ever increasing pressure on network operators to use resources in a moreefficient manner.In the contextof wireless networks,two of the most common resources are power and spectrum—and, due to regulations, these resources are Typically scarce. Hence, in contrast to wired networks, overprovisioning is not feasible in wireless networks.
标签: Maximization Nonconvex Wireless Utility Systems in
上传时间: 2020-06-01
上传用户:shancjb
Wavelength division multiplexing (WDM) refers to a multiplexing and transmission scheme in optical telecommunications fibers where different wavelengths, Typically emitted by several lasers, are modulated independently (i.e., they carry independent information from the transmitters to the receivers). These wavelengths are then multiplexed in the transmitter by means of passive WDM filters, and likewise they are separated or demultiplexed in the receiver by means of the same filters or coherent detection that usually involves a tunable local oscillator (laser).
标签: Multiplexing Wavelength Division
上传时间: 2020-06-01
上传用户:shancjb
For more than a century, overhead lines have been the most commonly used technology for transmitting electrical energy at all voltage levels, especially on the highest levels. However, in recent years, an increase in both the number and length of HVAC cables in the transmission networks of different countries like Denmark, Japan or United Kingdom has been observed. At the same time, the construction of offshore wind farms, which are Typically connected to the shore through HVAC cables, increased exponentially.
标签: Electromagnetic Transients Cables Power in
上传时间: 2020-06-07
上传用户:shancjb
The PW4554 is a cost-effective, fully integrated high input voltage single-cell Li-ion battery charger.The charger uses a CC/CV charge profile required by Li-ion battery. The charger accepts an inputvoltage up to 24V but is disabled when the input voltage exceeds the OVP threshold, Typically 6.8V,to prevent excessive power dissipation. The 24V rating eliminates the over-voltage protection circuitrequired in a low input voltage charger
标签: pw4554
上传时间: 2022-02-11
上传用户: