-
gpc
说明: 多模型广义预测控制在循环流化床锅炉床温中的应用(MGPC CFB bed temperature)
- 2020-11-19 21:49:39下载
- 积分:1
-
Iterative-Closest-Point-Method
icp(iterative closest point)的代码,本人已经使用过了,效果还行,总共就一个文件,所有的函数都写在这上面了(icp (iterative closest point) of the code, I have used, and the results were OK, total on a file, all of the functions are written in it.)
- 2013-07-16 19:14:03下载
- 积分:1
-
unit_opt
The architecture of this set of codes and the interaction among them is shown in Figure 1.
The main testing code main code.m calls the code riemann grad unit opt.m that performs
Riemannian optimization under unitary matrix constraint. Steepest Descent/Ascent
(SD/SA) algorithm (see Table 3.2 in [1]), Conjugate Gradient (CG-PR, CG-FR) algo-
rithms (both Fletcher-Reeves and Polak-Ribi`ere formulas, see Table 3.3 in [1]), are im-
plemented. This code further calls the codes implementing line search methods: Armijo
method geod search armijo.m, as well as the polynomial and DFT-based approximation
- 2014-09-18 02:53:06下载
- 积分:1
-
wavelet
说明: 有各种小波包分解的程序和子程序,能够有效快速地对振动信号进行分解。(There are various wavelet packet decomposition programs and subroutines, which can decompose vibration signals effectively and quickly.)
- 2019-03-07 14:55:15下载
- 积分:1
-
Modeler-Lecture
opnet的培训课件,三天的培训内容,包括了概念介绍,建模,调试,以及两个实例。(opnet training courseware, training days, including the introduction, modeling, testing, and two examples.)
- 2011-02-10 22:59:07下载
- 积分:1
-
kjl
说明: k近邻 (k nearest neighbor)
- 2011-03-31 13:54:25下载
- 积分:1
-
examples
network coding matlab example
- 2012-06-10 15:26:24下载
- 积分:1
-
genetic-fuzzy_m_code
genetic fuzzy_m_code
- 2011-11-10 11:33:40下载
- 积分:1
-
chuong-trinh-ver-2.0
This paper presents a novel algorithm of hiding
secret messages by applying mathematical lemmas and
information theory. The proposed algorithm can hide more
information with acceptable embedded rate and achieves
requirements of information hiding algorithm and simply
information extracting. The main idea is applying modern
algebra to solve the information hiding problem in multimedia.
In order to prevent some attacks on stganography, hidden
initial bits of image data pixels are chosen randomly. The
extracted information are achieved without the reference of the
original image and extracted keys. The experiment results
show that our approach is effective and reliable.
- 2014-02-20 20:49:27下载
- 积分:1
-
MMOS
环境数学模型,利用椭圆法以及matlab数学环境制作的数学模型,效果还不是特别的好(прикладная задача математического моделя )
- 2009-02-22 21:49:07下载
- 积分:1