-
entropy
使用mantlab,计算图像的一阶熵和二阶熵(computer the first-order entropy and the second-order entropy)
- 2010-11-30 09:32:16下载
- 积分:1
-
mtoken
说明: MATLAB的仿真程序,关于TOKEN的,仿真了TOKEN这个MAC方式的运行.这里是.M文件(MATLAB simulation program on TOKEN. TOKEN simulation of the way the MAC operation. here yes. M paper)
- 2006-02-06 08:49:58下载
- 积分:1
-
ship2
船舶电力推进 直接转矩控制 船桨数学模型
仿真结果(ship dtc)
- 2020-11-08 15:50:12下载
- 积分:1
-
exa070302
说明如何设计椭圆滤波器及计算和显示功率互补IIR滤波器的频率响应(Explains how to design elliptic filter and the calculation and display of power complementary IIR filter frequency response)
- 2011-12-06 10:47:48下载
- 积分:1
-
RS
说明: RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.A user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message
- 2015-02-27 14:59:22下载
- 积分:1
-
DE(rand1)
差分进化算法DE/rand1版本,用几组标准测试函数(Differential evolution algorithm)
- 2020-07-04 12:00:01下载
- 积分:1
-
fenlei
能够分辨出一幅图像中的矩形和圆形,并做以标记。(Able to distinguish an image of the rectangular and circular, and do the marking.)
- 2010-12-28 19:30:57下载
- 积分:1
-
LTE_RACH
说明: simulink 搭建的rach信道及其接收端模块,用于rach信道和接收机仿真。(imulink erected rach channel and the receiver module, channel and receiver for rach Simulation.)
- 2010-04-28 14:30:37下载
- 积分:1
-
2010-mathematical-modeling
2010年全国大学生数学建模赛题程序,储油罐的变位识别与罐容表标定的等效模型。(2010 program of the National Mathematical Modeling Contest, storage tanks deformation equivalent model identification and calibration of the tank capacity table.)
- 2012-05-24 01:27:37下载
- 积分:1
-
k-th
说明: 在Bialas與Karwan的第 解演算法 [13] 則是搜尋限制式解域中的端點,並且歸類為已搜尋端點集合、未搜尋端點集合、可行解端點集合、非可行解端點集合,再從可行解端點集合中找出使高階目標值最佳的端點。(Bialas and Karwan in the first solution algorithm [13] is the search for solutions in the domain of endpoint constraints, and the endpoints are classified as a collection of search, not search a collection of endpoints, the endpoint set of feasible solutions, non-feasible solution side point set, then the endpoint from the set of feasible solutions in order to identify the best target endpoint.)
- 2011-02-18 15:08:33下载
- 积分:1