Subject
Applied Mathematics,Modeling and Simulation,Numerical Analysis
Reference49 articles.
1. Applying the ”cloak of invisibility” technology to security and privacy in the hotel industry;Goh;International Journal of Contemporary Hospitality Management,2007
2. Controlling electromagnetic fields;Pendry;Science,2006
3. Finite-difference time-domain analyses of active electromagnetic cloaking for electrically-large objects;Stefanski;Opt Express,2021
4. On perfect cloaking;Miller;Opt Express,2006
5. Cloaking and invisibility: a review (invited review);Fleury;Progress In Electromagnetics Research,2014
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献