-
Matlab
最大信噪比准则方向图和功率谱;
ASC旁瓣相消—MSE准则;
线性约束最小方差(LCMV)准则;
不同方法估计协方差矩阵的Capon波束形成;多点约束的Capon波束形成和方向图(Pattern and the power spectrum of the maximum signal to noise ratio criteria ASC sidelobe cancellation-the MSE criteria Linearly constrained minimum variance (LCMV) criterion Different ways to estimate the covariance matrix of the Capon beamforming Multi-point constraints Capon beamforming and pattern;)
- 2012-02-22 20:09:45下载
- 积分:1
-
leach_wsn
说明: LEACH算法MATLAB源代码,适合研究使用(LEACH algorithm matlab source code, suitable for research and use)
- 2020-05-26 16:26:37下载
- 积分:1
-
Feature_Vector_Analysis
特征向量分析。LDA和PCA的matlab程序,有测试结果,很有用(Eigenvector analysis. LDA and PCA in the matlab program, have test results that are useful)
- 2010-12-03 09:44:59下载
- 积分:1
-
GUI
A model of a grafical user interface using Matlab, with many possible implementations
- 2009-05-26 01:39:13下载
- 积分:1
-
Lozi
说明: 求系统的几种分叉图,很全,而且运算速度很快,希望可以帮助到大家(Some find the system bifurcation diagram, it is full, and the operation very quickly, I hope you can help to)
- 2011-03-30 16:34:45下载
- 积分:1
-
Reconstructing-Digital-off-Axis-Fresnel-Holograms
reconstructing digital off-axis hologram reconstruction
- 2013-01-24 15:51:59下载
- 积分:1
-
TroughputElman
说明: 用于预测航运港口利用率的神经网络模型,基于时间递推。泛化(time chain for port)
- 2011-03-31 08:41:52下载
- 积分:1
-
forward_test
demonstrates the forward difference method
- 2010-02-08 16:54:58下载
- 积分:1
-
solarpower
配电网中可靠性评估中太阳能的评估模型,涉及晴空系数和斜角等等(Distribution of an uation model for reliability assessment of the solar energy power generation, involves the dip Angle, clear air coefficient and so on)
- 2015-03-14 18:48:18下载
- 积分:1
-
BlowfishEncryption
Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16
times. The block size is 64 bits, and the key can be any length up to 448 bits. Although
there is a complex initialization phase required before any encryption can take place, the
actual encryption of data is very efficient on large microprocessors.
Blowfish is a variable-length key block cipher. It is suitable for applications where the
key does not change often, like a communications link or an automatic file encryptor. It is
significantly faster than most encryption algorithms when implemented on 32-bit
microprocessors with large data caches.
- 2011-06-09 18:03:09下载
- 积分:1