-
TAB1
triple active bridge
- 2017-08-11 18:33:10下载
- 积分:1
-
wigb
用于应用二维数组,生成地震记录剖面,对于地震模型的模拟数据快速生成剖面很有帮助。(A two-dimensional array for application and generates seismic records for seismic model section of analog data generated fast profile is very helpful.
)
- 2011-05-30 13:31:56下载
- 积分:1
-
ART_FLA
CT图像重建 ART算法
利用代数重建算法对CT投影图像进行重建(ART algorithm for CT image reconstruction using algebraic reconstruction of CT projection image reconstruction)
- 2011-06-06 10:52:21下载
- 积分:1
-
directselfcontrol
本文重点研究了智能控制策略对异步电动机直接转矩控制系统性能的改善。(This article focuses on the intelligent control strategy for induction motor direct torque control system performance improvements.)
- 2008-05-06 13:46:56下载
- 积分:1
-
Automotive_Science_and_Mathematics
automotive mathematics
- 2011-02-03 16:26:17下载
- 积分:1
-
matlab-toolbox-download
matlab编写的轨道坐标系变换程序 地心直角坐标系与轨道参数互换(Matlab prepare the track coordinates transform procedures geocentric Cartesian coordinate system with the orbital parameters swap)
- 2007-05-08 19:12:43下载
- 积分:1
-
matpower
Matpower的中文手册。MATPOWER 是一个基于matlab m 文件的组建包,用来解决电力潮流和优化潮流的问
题(Matpower Chinese Manual。MATPOWER is a package of Matlab m-files for solving power flow and optimal power flow problems)
- 2010-01-27 01:46:49下载
- 积分:1
-
PhaseUnwrapping2D
2维傅立叶变换方法用于分析干涉条纹,相移计算。(2D FFT for fringe annalisys)
- 2010-08-23 19:55:35下载
- 积分:1
-
demodulation
This is a matlab file for constellation of an 8psk modulation
- 2009-07-16 00:07:39下载
- 积分:1
-
chuong-trinh-ver-2.0
This paper presents a novel algorithm of hiding
secret messages by applying mathematical lemmas and
information theory. The proposed algorithm can hide more
information with acceptable embedded rate and achieves
requirements of information hiding algorithm and simply
information extracting. The main idea is applying modern
algebra to solve the information hiding problem in multimedia.
In order to prevent some attacks on stganography, hidden
initial bits of image data pixels are chosen randomly. The
extracted information are achieved without the reference of the
original image and extracted keys. The experiment results
show that our approach is effective and reliable.
- 2014-02-20 20:49:27下载
- 积分:1