-
Newton
Newton Interpolation Method
Values yi of the interpolating polynomial at the points xi.
Coordinates of the points of interpolation are stored in
vectors x and y. Horner s method is used to evaluate
a polynomial. Second output parameter a holds coeeficients
of the interpolating polynomial in Newton s form.
- 2010-11-13 09:57:08下载
- 积分:1
-
matlab_style_guidelines
《matlab编程风格指导》,教你如何编写高质量的matlab程序。(《matlab style guidelines》)
- 2012-05-10 09:30:31下载
- 积分:1
-
BAnet-and-MATLAB
无标度网络简介 生成原则 matlab程序代码以及最终成图plot(Introduction to generate scale-free network matlab code principles and ultimately into the chart plot)
- 2013-11-24 15:56:39下载
- 积分:1
-
jialumianjilideweijinglixuesimulink
加入路面激励模型的磁流变减震器伪静力学模型的simulink程序(the simulink proceducer of MR damper s non-force mode of inputting road mode )
- 2015-06-18 09:43:01下载
- 积分:1
-
matlab
说明: 卡尔曼滤波实验和卡尔曼时间预测 包括从gps数据中读取经纬度(Time Kalman filter and Kalman prediction experiments, including data read from the gps latitude and longitude)
- 2011-04-02 18:14:24下载
- 积分:1
-
37823970Ultimate_Face_Recognition
GUI设计的matlab人脸识别,内容简洁明了全面,含有GUI设计的全部matlab代码,重复性极强(Matlab face recognition, GUI design concise, comprehensive and contain all matlab code GUI design, highly repetitive)
- 2013-04-15 19:22:39下载
- 积分:1
-
OPF
基于matlab,电力系统最优潮流问题,注释详尽(Based on matlab, optimal power flow problem, detailed comments)
- 2011-12-12 21:54:58下载
- 积分:1
-
zhongxinchazhao
此源码是基于matlab编写的关于查找图像中图形的个数,及查找每个图形的重心并显示。(This source code is written in matlab based on the number of graphic image search, and find the center of each graph and display.)
- 2010-07-08 09:39:17下载
- 积分:1
-
pnocairsecton
绘制庞加莱截面图的小程序,可以随便修改。
(Poincare mapping sections of small procedures, can be arbitrarily amended.)
- 2007-11-08 19:57:16下载
- 积分:1
-
Iris_32
Reliable authorization and authentication are becoming necessary for many
everyday applications such as boarding an aircraft, performing financial transaction,
logging to a secure system etc. Identity verification becomes a challenging task when
it has to be automated with high accuracy and with low probability of break-ins and
low rates of false match. Moreover, person verification is not a new problem and
society had created three traditional modes of designation:
1. Possessions: Physical possessions such as keys, passports and smart cards.
2. Knowledge: Pieces of information those are secret and known only to the right
person such as PIN, passwords, user names etc.
3. Biometrics: Physiological and behavioral characteristics of individuals that
distinguish one person from the others. These characteristics are different in
each person.
- 2013-04-27 08:51:33下载
- 积分:1