期刊文献+
共找到32篇文章
< 1 2 >
每页显示 20 50 100
基于复数计算方法的输电线路空间电场计算分析 被引量:2
1
作者 陈志红 梁明亮 《科技通报》 2018年第2期77-82,共6页
经济建设的快速发展,用电负荷的大幅度上升,促使电网建设速度不断加快,输电线电压等级不断提高,输电线下工频电场研究已经成为研究热点。本文根据悬链线方程,建立输电线物理模型。将输电线下方的工频电场近似为准静态场,采用模拟电荷法... 经济建设的快速发展,用电负荷的大幅度上升,促使电网建设速度不断加快,输电线电压等级不断提高,输电线下工频电场研究已经成为研究热点。本文根据悬链线方程,建立输电线物理模型。将输电线下方的工频电场近似为准静态场,采用模拟电荷法,基于复数计算方法,建立考虑弧垂的输电线路下方三维电场的计算模型,计算输电线下方电场强度值并分析其分布特性,计算结果表明,输电线下方的电场强度主要由垂直方向的电场强度决定。 展开更多
关键词 输电线路 三维计算模型 工频电场 模拟电荷法 复数计算方法
在线阅读 下载PDF
阻抗测量中的一种复数计算工具 被引量:1
2
作者 张若林 刘民 《宇航计测技术》 CSCD 2013年第1期49-52,共4页
介绍了一种应用于阻抗测量的复数计算工具——Excel复数计算函数。Excel和其它工具相比,如Matlab,LabVIEW,具有操作方便灵活、函数库丰富、对控制软件接口方便等优点,非常适用于非编程人员进行复数计算。以"对阻抗测量仪器进行开... 介绍了一种应用于阻抗测量的复数计算工具——Excel复数计算函数。Excel和其它工具相比,如Matlab,LabVIEW,具有操作方便灵活、函数库丰富、对控制软件接口方便等优点,非常适用于非编程人员进行复数计算。以"对阻抗测量仪器进行开短路数据补偿"为例,具体介绍了利用Microsoft Excel 2007处理复数计算的方法。该方法操作非常简便,容易掌握,无须进行烦琐的编程,随着电脑和Excel软件的普及,本方法具备了推广和应用的可能。 展开更多
关键词 阻抗测量 复数计算 开短路补偿 EXCEL
在线阅读 下载PDF
采用袖珍计算器进行复数计算的新方法
3
作者 高维 《鞍钢技术》 CAS 2000年第3期33-34,共2页
关键词 复数计算 袖珍计算 正弦交流电 符号法
在线阅读 下载PDF
稳态周期导热数值计算复数法及铠装热电偶的频率响应 被引量:1
4
作者 黄晓齐 《贵州工学院学报》 1992年第2期1-8,共8页
本文提出一种复数方法,进行稳态周期导热的数值计算,并用于铠装热电偶的频率响应的确定。
关键词 稳压周期导热 数值计算复数
在线阅读 下载PDF
自己定制电工专用计算器
5
作者 陈绍溴 《宜春学院学报》 2001年第2期33-35,共3页
本文使用C + +BUILDER创建电工专用计算器 .使用该计算器能够直接完成复数阻抗的串连、并联运算、复功率计算 ;能够完成电工学中各种常见的计算 ,明显提高了交流电路计算的效率 .
关键词 计算 正弦交流电路 相量 复数计算 C++BUILDER
在线阅读 下载PDF
贝尔实验室在计算机发展中的作用初探
6
作者 闫晓星 王洪鹏 刘树勇 《首都师范大学学报(自然科学版)》 2006年第6期23-27,共5页
贝尔实验室在数学、物理学、通信技术等领域做出了卓越贡献,其中有11位科学家因为他们在贝尔实验室的工作而获得了6次诺贝尔物理奖.不仅如此,贝尔实验室也在计算机发展中起着举足轻重的作用,本文从几个方面简要的描述了它对计算机世界... 贝尔实验室在数学、物理学、通信技术等领域做出了卓越贡献,其中有11位科学家因为他们在贝尔实验室的工作而获得了6次诺贝尔物理奖.不仅如此,贝尔实验室也在计算机发展中起着举足轻重的作用,本文从几个方面简要的描述了它对计算机世界的贡献. 展开更多
关键词 复数计算 UNIX系统 C语言 贝尔实验室 计算机发展史
在线阅读 下载PDF
复数教学中应注意的几个负迁移 被引量:1
7
作者 李红 郭远香 《临沂师专学报》 1998年第3期69-70,76,共3页
数的概念由实数集扩展到复数集以后,概念的内涵减少,外延扩大,实数的某些性质在复数范围内不再成立,但它对复数的学习可起到一定的干扰作用,我们称之为负迁移.学生在这种负迁移的作用下,往往仍利用这些实数性质来处理复数问题,... 数的概念由实数集扩展到复数集以后,概念的内涵减少,外延扩大,实数的某些性质在复数范围内不再成立,但它对复数的学习可起到一定的干扰作用,我们称之为负迁移.学生在这种负迁移的作用下,往往仍利用这些实数性质来处理复数问题,从而造成解题错误.1|x|2=x2... 展开更多
关键词 复数教学 负迁移 产生错误 正确解答 韦达定理 复系数一元二次方程 实系数 复数计算 分数指数 复数
在线阅读 下载PDF
复IFS图形在纺织纹样上的应用 被引量:1
8
作者 赵晓岚 杨旭红 《纺织学报》 EI CAS CSCD 北大核心 2010年第11期35-38,共4页
为提高纺织纹样设计速度,提出一种新的IFS码变形方法,即在原码的基础上右乘一新的矩阵,用得到的新的IFS码可生成完全不同于原图形的图形。先利用复数计算公式计算IFS图形的代码,再通过程序编程将其生成IFS图形。采用这种方法可得到大量... 为提高纺织纹样设计速度,提出一种新的IFS码变形方法,即在原码的基础上右乘一新的矩阵,用得到的新的IFS码可生成完全不同于原图形的图形。先利用复数计算公式计算IFS图形的代码,再通过程序编程将其生成IFS图形。采用这种方法可得到大量非人脑所能设计的计算机图形。为使得设计纹样的应用效果得到更为直观的展示,还利用所生成的图形,结合纺织纹样设计基础知识,设计了图案新颖的纺织纹样,并利用喷墨印花得到了数码印花织物。 展开更多
关键词 IFS码 复数计算 IFS图形 纺织纹样
在线阅读 下载PDF
复平面上的直线方程 被引量:1
9
作者 张汉清 范茜 《教学与管理(中学版)》 1996年第6期45-46,共2页
复平面上的直线方程●山西张汉清范茜一、引言用复数法来证明、求解几何问题,称其为复数几何,常庚哲教授在著[1]中系统地总结了复数几何的理论与方法。笔者在解题实践中发现,著[1]的美中不足之处是缺少直线方程的有关理论,如... 复平面上的直线方程●山西张汉清范茜一、引言用复数法来证明、求解几何问题,称其为复数几何,常庚哲教授在著[1]中系统地总结了复数几何的理论与方法。笔者在解题实践中发现,著[1]的美中不足之处是缺少直线方程的有关理论,如:复平面上的直线方程,两线(直线与... 展开更多
关键词 复平面 直线方程 复数表示 单位圆 复数计算 几何证题 九点圆 点到直线的距离 教育出版社 内接多边形
在线阅读 下载PDF
三次原根ω的性质及应用
10
作者 李克靖 《甘肃教育》 1998年第Z1期80-80,共1页
三次原根ω的性质及应用□会宁职专李克靖一、ω的主要性质若虚数-1+3i2定义为ω,则ω有以下重要性质:1ω3=1,ω2+ω+1=0.2ω为1的三次原根,且ω3n=1,ω3n+1=ω,ω2n+2=ω2,(n为整数)... 三次原根ω的性质及应用□会宁职专李克靖一、ω的主要性质若虚数-1+3i2定义为ω,则ω有以下重要性质:1ω3=1,ω2+ω+1=0.2ω为1的三次原根,且ω3n=1,ω3n+1=ω,ω2n+2=ω2,(n为整数).31,ω,ω2在复平面内的对应... 展开更多
关键词 原根 平方根 正三角形 复数计算 应用举例 主要性质 轴对称 对应点 原方程 复平面
在线阅读 下载PDF
一道典型例题的妙用
11
作者 俞富良 《中学数学月刊》 1998年第6期41-42,共2页
苏州大学《中学数学》编辑部编写的《高三数学教学与测试》(上册1996年3月第一版)第115页有这样一道典例:若|z<sub>1</sub>|=3,|z<sub>2</sub>|=5,|z<sub>1</sub>-z<sub>2</sub>|=7... 苏州大学《中学数学》编辑部编写的《高三数学教学与测试》(上册1996年3月第一版)第115页有这样一道典例:若|z<sub>1</sub>|=3,|z<sub>2</sub>|=5,|z<sub>1</sub>-z<sub>2</sub>|=7,求(z<sub>1</sub>)/(z<sub>2</sub>),粗看此题只不过是一道常见的复数计算题,但经仔细分析就会发现这是一道相当典型的综合复习题,可用复数的不同知识点进行求解,通过一题多解,有机地把复数知识网络串联,达到解决一道题,复习一系列知识点的目的。1 用于复习复数的代数形式的知识点 解法1 设z<sub>1</sub>=a+bi,z<sub>2</sub>=c+di(a,b,c,d∈R)∵|z<sub>1</sub>-z<sub>2</sub>|=7,∴(a-c)<sup>2</sup>+( b-d)<sup>2</sup>=49,即a<sup>2</sup>+b<sup>2</sup>+c<sup>2</sup>+d<sup>2</sup>-2(ac+bd)=49,而|z<sub>1</sub>|=3, |z<sub>2</sub>|=5, ∴a<sup>2</sup>+b<sup>2</sup>=9, C<sup>2</sup>+d<sup>2</sup>=25,可求得ac+bd=-15/2(1).又∵|z<sub>1</sub>·z<sub>2</sub>|=15,∴|(a+bi)(c-di)|=15即(ac+bd)<sup>2</sup>+(bc-ad)<sup>2</sup>=15<sup>2</sup>(2). 展开更多
关键词 典型例题 知识点 点解法 几何意义 复数的三角形式 中学数学 复数运算 教学与测试 知识网络 复数计算
在线阅读 下载PDF
An algorithm for moving target detection in IR image based on grayscale distribution and kernel function 被引量:6
12
作者 王鲁平 张路平 +1 位作者 赵明 李飚 《Journal of Central South University》 SCIE EI CAS 2014年第11期4270-4278,共9页
A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to de... A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to deal with issues like the large computational complexity, the fluctuation of grayscale, and the noise in infrared images. Four characteristic points were selected by analyzing the grayscale distribution in infrared image, of which the series was quickly matched with an affine transformation model. The image was then divided into 32×32 squares and the gray-weighted kernel(GWK) for each square was calculated. At last, the MTD was carried out according to the variation of the four GWKs. The results indicate that the MTD can be achieved in real time using the algorithm with the fluctuations of grayscale and noise can be effectively suppressed. The detection probability is greater than 90% with the false alarm rate lower than 5% when the calculation time is less than 40 ms. 展开更多
关键词 moving target detection gray-weighted kernel function dynamic background
在线阅读 下载PDF
A Symbol Timing Recovery Algorithm of M-PSK Signals for Burst Modem Applications with Small Packet Size 被引量:1
13
作者 Yu Chi Lan Chen Chao Lv 《China Communications》 SCIE CSCD 2016年第6期138-146,共9页
Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In th... Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In this paper, we proposed an efficient symbol timing recovery algorithm of MPSK signals named OMQ(Ordered Maximum power using Quadratic approximation partially) algorithm which is based on the Quadratic Approximation(QA) algorithm. We used ordered statistic sorting method to reduce the computational complexity further, meanwhile maximum mean power principle was used to decrease frequency offset sensitivity. The proposed algorithm adopts estimation-down sampling structure which is suitable for small packet size transmission. The results show that, while comparing with the QA algorithm, the computational complexity is reduced by 75% at most when 8 samples per symbol are used. The proposed algorithm shows better performance in terms of the jitter variance and sensitivity to frequency offsets. 展开更多
关键词 symbol timing maximum mean power ordered statistic Quadratic Approximation
在线阅读 下载PDF
Joint Timing and Frequency Synchronization for OFDM based on Fractional Fourier Transform 被引量:5
14
作者 Tang Xun Sha Xuejun 《China Communications》 SCIE CSCD 2010年第5期93-102,共10页
In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp... In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp signals with opposite chirp rates are used as the training signal, the received training signal with timing and frequency offset is transformed by FrFT and the two peaks representing two chirps in FrFT domain are detected, then the position coordinates of the two peaks are precisely corrected and substituted into an equation group to calculate timing and frequency offset simultaneously. This method only needs one FrFT calculation to implement synchronization, the computational complexity is equal to that of FFT and less than that of correlation or maximum likelihood calculation of existing methods, and estimation range of frequency offset is Large, greater than half the signal bandwidth, while the simulation results show that even at low SNR it can accurately estimate timing and frequency offset and the estimation error is less than that of existing methods. 展开更多
关键词 SYNCHRONIZATION Fractional Fourier transform chirp signal OFDM
在线阅读 下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
15
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
在线阅读 下载PDF
Comparison of fast discrete wavelet transform algorithms
16
作者 孟书苹 《Journal of Chongqing University》 CAS 2005年第2期84-89,共6页
This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, ... This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing. 展开更多
关键词 discrete wavelet transforms (DWT) fast algorithms computational complexity
在线阅读 下载PDF
Enumeration Order Equivalence in Rational Numbers
17
作者 Saeed Asaeedi Farzad Didehvar Aliakbar Safilian 《Computer Technology and Application》 2013年第11期615-619,共5页
The enumeration of elements of c.e. sets in the theory of computability and computational complexity has already been investigated. However, the order of this enumeration has received less attention. The enumeration o... The enumeration of elements of c.e. sets in the theory of computability and computational complexity has already been investigated. However, the order of this enumeration has received less attention. The enumeration orders of elements of c.e. sets by means of Turing machines on natural numbers are investigated. In this paper, we consider the enumeration orders of elements of c.e. sets on rational numbers. We present enumeration order reducibility and enumeration order equivalence on rational numbers and propose some lemmas and theorems on these concepts. Also, we show that the theories here hold for Rc and we could repeat the same theories in this domain, in a same way. 展开更多
关键词 Turing machine LISTINGS enumeration order reducibility enumeration order equivalence
在线阅读 下载PDF
Research on the New Algorithm of Image Super Resolution Reconstruction
18
作者 Yun Feng Youping Yan Nan Zuo Chengliang Guo 《International Journal of Technology Management》 2015年第5期41-43,共3页
This paper put forward the super-resolution image algorithm based on Gauss process regression sparse solution. We establish local Gauss process regression model, to solve the feasibility problem of regression super-re... This paper put forward the super-resolution image algorithm based on Gauss process regression sparse solution. We establish local Gauss process regression model, to solve the feasibility problem of regression super-resolution problem in solving Gauss process; further use sparse algorithm, not only it can optimize the super parameter of Gauss kernel function, but also to optimize the initial entry training, so as to obtain more accurate regression Gauss process. Experimental results show that: the paper proposed algorithm can does not reduce the image reconstruction results, and it can reduce the computational complexity. 展开更多
关键词 Super-resolution reconstruction sparse representation Gaussian Processes
在线阅读 下载PDF
Modified Formula for Cotes Rule with Fifths Derivatives of Endpoint
19
作者 SUN Fan HAN Ke-zhong 《Chinese Quarterly Journal of Mathematics》 CSCD 2009年第4期585-589,共5页
This paper presents a Modified Formula for Cotes rule with fifths derivatives of endpoint and its truncation error. It also displays an analysis on convergence order of compound formula. Though compound modified formu... This paper presents a Modified Formula for Cotes rule with fifths derivatives of endpoint and its truncation error. It also displays an analysis on convergence order of compound formula. Though compound modified formula for Cotes rule with endpoint derivatives just calculates a newly-added fifths derivative of the two endpoints for each time compared with compound Cotes formula calculation, there are 2 more ranks of the convergence order in this modified formula. Examples of numerical calculation have validated theoretical analysis. 展开更多
关键词 numerical integration algebraic precision truncation error order of convergence
在线阅读 下载PDF
A novel maneuvering multi-target tracking algorithm based on multiple model particle filter in clutters 被引量:2
20
作者 胡振涛 Pan Quan Yang Feng 《High Technology Letters》 EI CAS 2011年第1期19-24,共6页
To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle fi... To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle filter is presented in this paper. The algorithm realizes dynamic combination of multiple model particle filter and joint probabilistic data association algorithm. The rapid expan- sion of computational complexity, caused by the simple combination of the interacting multiple model algorithm and particle filter is solved by introducing model information into the sampling process of particle state, and the effective validation and utilization of echo is accomplished by the joint proba- bilistic data association algorithm. The concrete steps of the algorithm are given, and the theory analysis and simulation results show the validity of the method. 展开更多
关键词 maneuvering multi-target tracking multiple model particle filter interacting multiple model IMM) joint probabilistic data association
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部