-
Sheath_twoIons1D
流体力学方法模拟双离子一维鞘层的matlab代码,可作为交流学习使用(Fluid dynamics simulation of one-dimensional dual ion sheath matlab code, can be used as learning to use exchange)
- 2015-03-13 10:28:59下载
- 积分:1
-
2mimo
在MIMO系统中的二乘二系统的模型代码,以及性能分析。(In the MIMO system model二乘II system code, as well as performance analysis.)
- 2008-03-17 10:57:04下载
- 积分:1
-
finger
Wavelet Compression and Matched Filters, reads in and compresses the fingerprint images with a biorthogonal discrete wavelet transform
- 2010-07-08 01:41:14下载
- 积分:1
-
aloha_s
用matlab编程实现纯aloha算法和时隙aloha算法吞吐量的对比(Matlab programming with pure aloha aloha algorithm algorithm and the throughput comparison of slot)
- 2021-03-01 21:49:34下载
- 积分:1
-
codingjimi1
Edge detection that detect the side of object
- 2015-04-13 13:39:37下载
- 积分:1
-
HHT-matlab-example
HHT的MATLAB程序实现,对每个语句都有注释和说明。(HHT of the MATLAB program for each statement has notes and instructions.)
- 2013-05-31 14:44:20下载
- 积分:1
-
谐波分析
利用simulink 仿真分析变压器谐波(Using simulink Simulation to Analyze Transformer Harmonic)
- 2018-03-12 09:41:15下载
- 积分:1
-
Bilevel-approach-for-optimal
在最佳位置和合同双层办法
分布式发电的径向分布定价
使用混合整数线性规划系统(Bilevel approach for optimal location and contract
pricing of distributed generation in radial distribution
systems using mixed-integer linear programming)
- 2014-10-21 18:23:42下载
- 积分:1
-
FLC_M
非线性系统模糊逻辑控制(FLC)的matlab仿真程序(Nonlinear systems fuzzy logic control (FLC) matlab simulation program)
- 2014-11-05 21:00:31下载
- 积分:1
-
DCT-Based--Watermarking-Scheme
a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image.
- 2014-02-15 21:17:17下载
- 积分:1