-
make_truss
手工指定节点的编号以及位置之后,可以自动生成节点的坐标,以及杆的左右节点,不需要手动输入。(make the topology of truss)
- 2011-04-28 18:54:50下载
- 积分:1
-
SOA
用MATLAB编程实现半导体光放大器(SOA)的模拟(MATLAB programming realize semiconductor optical amplifiers (SOA) simulation
)
- 2012-05-13 09:59:07下载
- 积分:1
-
a
说明: 缴费点选址问题,是数模中的热点,可以通过对最短路程、居民满意度、排队等待时间综合考虑,得到较为全面合理的结果(Payment point location problem is one of several modes in the hot, can by the shortest distance, residents satisfaction, waiting time into account, to be more comprehensive and rational results)
- 2011-06-26 15:30:59下载
- 积分:1
-
Differential-Equation
求解二元二次微分方程及其边值问题,含有实例及代码(To solve the binary quadratic differential equation and its boundary value problem,including examples and codes)
- 2020-07-04 19:20:02下载
- 积分:1
-
MATLAB_algorithm
matlab常用算法集,包括了信号处理的大多领域(matlab common set of algorithms, including most areas of signal processing)
- 2010-09-27 19:28:58下载
- 积分:1
-
COST231Models
说明: 根据传输频率、天线高度、距离等因素,仿真在多种场景下的大尺度衰落模型(According to transmission frequency, antenna height, distance and other factors, the simulation in a variety of scenarios of large-scale fading model)
- 2010-03-18 11:14:24下载
- 积分:1
-
BlowfishEncryption
Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16
times. The block size is 64 bits, and the key can be any length up to 448 bits. Although
there is a complex initialization phase required before any encryption can take place, the
actual encryption of data is very efficient on large microprocessors.
Blowfish is a variable-length key block cipher. It is suitable for applications where the
key does not change often, like a communications link or an automatic file encryptor. It is
significantly faster than most encryption algorithms when implemented on 32-bit
microprocessors with large data caches.
- 2011-06-09 18:03:09下载
- 积分:1
-
finger-recong
指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。
三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
- 2007-05-02 23:49:15下载
- 积分:1
-
matm
writing function files with Matlab
- 2012-09-14 15:58:24下载
- 积分:1
-
YUV2RGBfinal.m
图像处理,图像小波变换,svd变换, svd trasnform(Image processing, image wavelet transform, svd transform)
- 2013-04-06 16:22:23下载
- 积分:1