期刊文献+

悬链面与正螺面之间的内在关系 被引量:3

The Inside Relation Between the Catenoid and Helicoid
在线阅读 下载PDF
导出
摘要 研究了两类著名的且极其重要的极小曲面——悬链面与正螺面之间的内在联系.得到了具有不同参数的悬链面和正螺面是成等角对应,即当悬链面中顶点到原点的距离为a,正螺面中的螺距变成b时(其中b是速度与角速度的比值),则悬链面与正螺面是成等角对应的关系. This paper mainly introduces the inside relation between the catenoid and helicoid. They are two types of famous and very important minimal surfaces. It proves there is a conformal mapping between the two surfaces with the apex and origin, and the different parameters, when a on the catenoid means the distance between pitch on the helicoid turns to b (b means the ratio of velocity to angular velocity).
出处 《湖州师范学院学报》 2012年第1期23-26,共4页 Journal of Huzhou University
关键词 悬链面 正螺面 等距等价 保角变换 the catenoid the helicoid sometric correspondence angle - preserving transformation
  • 相关文献

参考文献4

二级参考文献8

  • 1JiaweiHan MiehelineKamber.数据挖掘:概念与技术[M].机械工业出版社,2001.237-251.
  • 2S R M Oliveira, O R ZaYane. Privacy Preserving Clustering by Data Transformation[C]. Manaus: Proc. of the 18th Brazilian Symposium on Databases, 2003. 304-318.
  • 3Richard A, Moore Jr. Controlled Data-swapping Techniques for Masking Public Use Microdata Sets[R]. Statistical Research Division Report Series RR 96-04, U.S. Bureau of the Census, Washington,DC, 1996.
  • 4R Agrawal, R Srikant. Privacy-Preserving Data Mining[C]. Dallas:Proc. of the ACM SIGMOD Conference on Management of Data,2000.439-450.
  • 5J Vaidya, C Clifton. Privacy-Preserving K-means Clustering over Vertically Partitioned Data[C]. Washington DC: Proc. of the 9th ACM SIGKDD intl. Conf. on Knowledge Discovery and Data Mining,USA, 2003. 206-215.
  • 6S Merugu, J Ghosh, Privacy-Preserving Distributed Clustering Using Generative Models[C]. Melbourne: Proc. of the 3rd IEEE International Conference on Data Mining (ICDM'03), 2003.211-218.
  • 7S R M Oliveira, O R ZaYane. Achieving Privacy Preservation When Sharing Data for Clustering[C]. Toronto: Proc. of the International Workshop on Secure Data Management in a Connected World (SDM'04) in Conjunction with VLDB, 2004.67-82.
  • 8K Muralidhar, R Parsa, R Sarathy. A General Additive Data Perturbation Method for Database Security [J]. Management Science,1999,45 (10): 1399-1415.

共引文献3

同被引文献15

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部