首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
轴对称荷电圆盘的静电势   总被引:5,自引:4,他引:1  
讨论了电荷分布呈轴对称时圆盘的静电势问题。用方程法和延拓法求解了电荷分布为幂函数时的静电势,在原有的延拓法则之外,总结出新的补充法则。  相似文献   

2.
郭成豹  肖昌汉  刘大明 《物理学报》2008,57(7):4182-4188
对磁性目标磁场延拓技术进行了研究,提出了一种基于积分方程法和奇异值分解的新方法.应用该方法只需要采用积分方程法对磁性目标的结构进行较为粗略的单元划分,利用目标下方大平面上的磁场测量值,得到相应的线性方程组.采用基于奇异值分解的截断奇异值方法和修正奇异值方法对该线性方程组进行正则化求解,可实现磁性目标磁场的三维磁场重建、向上或向下延拓.该方法较以前的方法,提高了磁性目标磁场延拓的精度和可靠性,并且解决了磁性目标磁场在一定范围内向上延拓的技术难题. 关键词: 磁性目标磁场 延拓 积分方程法 奇异值分解  相似文献   

3.
提出了一种利用线性载波对不连续相位图进行延拓后相位展开的方法。首先,通过傅里叶变换法确定载波频率;然后,用最小二乘法确定与相位图相匹配的线性载波对背景、遮拦区域进行延拓;最后,采用经典的相位展开算法对延拓后的相位图进行展开。实验结果表明,对于包含较大线性载波的不连续干涉图,延拓后相位展开结果避免了各区域间的全局误差;计算机模拟结果表明,对于包含较小线性载波或不含载波的不连续干涉图,经过线性载波调制后,使用该方法得到相位展开结果与真实波面均方根差仅为0.0021 rad,不存在全局误差。  相似文献   

4.
贾蒙  樊养余  李慧敏 《物理学报》2010,59(11):7686-7692
提出自适应因子和轨道延拓相结合的二维流形计算方法,利用以平衡点为中心的椭圆对局域流形的近似,通过轨道的等距延拓和椭圆初始点的自适应调节,在精度要求下自适应的添加轨道,完成二维双曲不变流形的计算.此方法比"轨道弧长法"精度高,包含更多细节信息;同时要比"盒子细分法"更能反映流形的延拓趋势.  相似文献   

5.
张力  周善贵  孟杰  赵恩广 《物理学报》2007,56(7):3839-3844
基于实稳定方法的基本思想,在坐标空间求解了一维势阱和三维球对称势阱中的单粒子共振态,得到的共振能量、宽度和波函数等与散射相移法以及耦合常数的解析延拓方法的结果一致. 关键词: 共振态 实稳定方法 相移 共振宽度  相似文献   

6.
臧涛成  潘涛 《大学物理》2006,25(10):47-49,52
基于达朗贝尔公式,讨论了半无界弦自由振动时的非齐次边界条件的延拓问题.结果表明:对半无界弦自由振动时的非齐次边界条件的延拓,理论上可有多种方法,尽管延拓表达式不同,但不会影响最终结果.文中最后还给出了两种相对简单的延拓方法.  相似文献   

7.
吴崇试 《大学物理》2003,22(1):3-6,14
讨论了圆形面偶极层静电势问题的正确解法,阐明了对于延拓法的正确理解,给出了有限间距时圆形平行板(分别带有异性面电荷)的静电势问题。  相似文献   

8.
波前编码成像系统将模拟编码方法与数字解码技术相结合解决景深延拓问题,可以用信息光学的方法进行分析,得到波前编码系统的景深延拓扩展率。但是这种方法使用的景深概念和几何光学的景深概念有所不同。从几何光学角度研究了信息光学导出的波前编码系统的景深延拓扩展率与几何光学景深延拓的关系。最后得出结论,在F数一定的情况下,随着探测器分辨率的提高,几何光学景深延拓扩展率与信息光学给出的波前编码光学系统的景深延拓扩展率趋于一致。  相似文献   

9.
通过延拓为奇函数和恰当的函数两种方式对弦的两端点进行延拓,运用达朗贝尔公式解决了一端固定,另一端作受迫振动Asin ωt的有界弦振动的定解问题,通过计算结果表达式直接得出了描述有界弦振动运动的物理量,直观分析出弦振动的运动过程.同时对该问题进行了拓展,运用行波法解决了一端为齐次的第一类或第二类边界条件另一端为非齐次边界条件的定解问题.  相似文献   

10.
根据波前编码理论,通过计算机仿真分析的形式,对负折射平板透镜景深延拓特性进行了探讨在折射率为-1时,实现了8.5333倍的景深延拓;在折射率有微小偏移的情况下,以-0.99为例,引入校正透镜后,实现了6.5862倍的景深延拓.  相似文献   

11.
Spectral optical techniques are combined to characterise the distribution of large-molecule soot precursors, nanoparticles of organic carbon, and soot in two turbulent non-premixed ethylene flames with differing residence times. Laser-induced fluorescence, laser-induced incandescence and light scattering are used to define distributions across the particle size distribution. From the scattering and laser-induced emission measurements it appears that two classes of particles are formed. The first ones are preferentially formed in the fuel-rich region of the flame closer to the nozzle, have sizes of the order of few nanometers but are not fully solid particles, because the constituent molecules still maintain their individual identity exhibiting strong broadband fluorescence in the UV. The second class of particles constituted by solid particles, with sizes of the order of tens of nanometers are able to absorb a sufficient number of photons to be heated to incandescent temperatures. These larger particles are formed at larger residence times in the flame since they are the result of slow growth processes such as coagulation or carbonization. The flames are also modeled in order to produce mixture fraction maps. A new discovery is that nanoparticles of organic carbon concentration, unlike soot, does correlate well with mixture fraction, independent of position in the flame. This is likely to be a significant benefit to future modelling of soot inception processes in turbulent non-premixed flames.  相似文献   

12.
Quasi-optical systems comprised of diffractive phase elements (DPEs) are designed as beam splitters. The design tasks are reformulated as optimization problems in which target functionals are defined. Analytical gradients are derived to those functionals, which can be passed to gradient methods to efficiently determine the DPEs. Rayleigh-Sommerfeld diffraction integrals are applied to compute the wave propagation in free-space between parallel planes in the quasi-optical systems. Numerical results for several beam splitters are depicted. Furthermore a procedure is proposed, how the phase functions of the DPEs could be smoothed out.  相似文献   

13.
杨静  王川  张茹 《中国物理 B》2010,19(11):110311-110311
An improved quantum secure direct communication (QSDC) protocol is proposed in this paper.Blocks of entangled photon pairs are transmitted in two steps in which secret messages are transmitted directly.The single logical qubits and unitary operations under decoherence free subspaces are presented and the generalized Bell states are constructed which are immune to the collective noise.Two steps of qubit transmission are used in this protocol to guarantee the security of communication.The security of the protocol against various attacks are discussed.  相似文献   

14.
Target tracking technology that is based on aerial videos is widely used in many fields; however, this technology has challenges, such as image jitter, target blur, high data dimensionality, and large changes in the target scale. In this paper, the research status of aerial video tracking and the characteristics, background complexity and tracking diversity of aerial video targets are summarized. Based on the findings, the key technologies that are related to tracking are elaborated according to the target type, number of targets and applicable scene system. The tracking algorithms are classified according to the type of target, and the target tracking algorithms that are based on deep learning are classified according to the network structure. Commonly used aerial photography datasets are described, and the accuracies of commonly used target tracking methods are evaluated in an aerial photography dataset, namely, UAV123, and a long-video dataset, namely, UAV20L. Potential problems are discussed, and possible future research directions and corresponding development trends in this field are analyzed and summarized.  相似文献   

15.
16.
S Sindhu  C S Menon 《Pramana》1996,47(6):435-445
Expressions for the higher order elastic constants are derived using the sublattice displacements to the second degree in strains. These expressions are used to obtain the higher order elastic constants and their pressure derivatives in gadolinium. The higher order elastic constants are used to find out the generalized Gruneisen parameters of the elastic waves propagating in different directions in gadolinium. The Brugger gammas are evaluated and the low temperature limit of the Gruneisen gamma is obtained. The results are compared with the available reported values.  相似文献   

17.
N.G. Nagaveni 《Phase Transitions》2013,86(12):1227-1240
The first examples of V-shaped liquid crystalline materials made of non-symmetrical molecules are reported. They belong to a homologous series of azo substituted compounds, wherein the two arms attached to the 1,2-positions of the benzene ring are different. The new compounds are characterised by the spectroscopic methods. The liquid crystalline properties are investigated using polarising optical microscopy, differential scanning calorimetry and X-ray diffraction studies. All the compounds synthesised here are found to be liquid crystalline. They exhibit nematic and smectic A mesophases, which are uniaxial in nature. The preliminary qualitative experiments showed that the compounds are photosensitive. Based on the X-ray results, the molecular arrangement of these compounds in their mesophases is illustrated. A relationship between molecular structures to mesomorphic properties in such systems has also been predicted.  相似文献   

18.
Numerical integration of complex linear systems of ODEs depending analytically on an eigenvalue parameter are considered. Complex orthogonalization, which is required to stabilize the numerical integration, results in non-analytic systems. It is shown that properties of eigenvalues are still efficiently recoverable by extracting information from a non-analytic characteristic function. The orthonormal systems are constructed using the geometry of Stiefel bundles. Different forms of continuous orthogonalization in the literature are shown to correspond to different choices of connection one-form on the Stiefel bundle. For the numerical integration, Gauss-Legendre Runge-Kutta algorithms are the principal choice for preserving orthogonality, and performance results are shown for a range of GLRK methods. The theory and methods are tested by application to example boundary value problems including the Orr-Sommerfeld equation in hydrodynamic stability.  相似文献   

19.
As borders between different entities, lines are an important element of natural images. Indeed, the neurons of the mammalian visual cortex are tuned to respond best to lines of a given orientation. This preferred orientation varies continuously across most of the cortex, but also has vortex-like singularities known as pinwheels. In attempting to describe such patterns of orientation preference, we are led to consider underlying rotation symmetries: Oriented segments in natural images tend to be collinear; neurons are more likely to be connected if their preferred orientations are aligned to their topographic separation. These are indications of a reduced symmetry requiring joint rotations of both orientation preference and the underlying topography. This is verified by direct statistical tests in both natural images and in cortical maps. Using the statistics of natural scenes we construct filters that are best suited to extracting information from such images, and find qualitative similarities to mammalian vision. PACS84.35+i 89.70.+c 87.57.Nk  相似文献   

20.
An encoding method is used to encrypt the Fourier-transformed information of a hidden (covert) digital image in an overt image, while the Fourier-transformed information must be encoded with binary codes. All of the pixels in an overt image are classified into five groups that are called identification, type, tracing, dimension, and information codes. Identification codes are used to judge if the overt image contains codes that belong to the proposed encoding method or not; type codes are used to judge the encoding type; tracing codes are used to judge the encoding trace; dimension codes are used to judge the size of the hidden information; and information codes are used to decode the hidden information. Applying the proposed encoding method is rather easy, and host images corresponding to overt images are not needed for decoding work. The experiment has demonstrated four types of encoding for the proposed encoding method to reconstruct covert images without any distortion or only with a little distortion.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号