登录
首页 » matlab » Tidal_Analysis

Tidal_Analysis

于 2010-07-12 发布 文件大小:61KB
0 70
下载积分: 1 下载次数: 6

代码说明:

  harmonic-analysis Tidal Analysis

文件列表:

Tidal Analysis
..............\tidal_ellipse.ps,165995,2010-07-12
..............\ttide_adcp_comb.m,9017,2010-07-12
..............\ttide_adcp_indiv.m,6365,2010-07-12
..............\ttide_aqdp_comb.m,7853,2010-07-12
..............\ttide_aqdp_indiv.m,5851,2010-07-12
..............\ttide_argn_comb.m,8290,2010-07-12
..............\ttide_argn_indiv.m,5894,2010-07-12

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Integrodifferentialoperator
    lEVEL sET SEGMENTATION
    2009-09-04 19:56:43下载
    积分:1
  • figure_rotate
    说明:  MATLAB环境下任意角度的图像旋转算法,并未做成函数,是以一个例图进行的。(MATLAB environment at any angle of image rotation algorithm, is no function, is an example graph of.)
    2008-09-02 18:21:42下载
    积分:1
  • PIDconteol
    说明:  PID控制仿真 现代先进技术PID控制仿真(PID control simulation of modern advanced technology PID Control Simulation)
    2006-03-19 19:47:44下载
    积分:1
  • Pf9800
    说明:  PF9810功率仪 电压测量、电流测量、频率测试(PF9810 power meter voltage measurement, current measurement, frequency measurement)
    2011-03-29 18:19:57下载
    积分:1
  • System
    System,烈焰行动源代码文件,SystemSystem(System, flames action source code files)
    2014-11-16 08:31:56下载
    积分:1
  • two-step-iterative-shinkage
    图像复原中的two-step iterative shinkage方法(two-step iterative shinkage)
    2012-06-23 10:12:48下载
    积分:1
  • DM6_decision_tree
    实现ID3决策树算法,可以实现基本眜分类,最终的决策树是以结构体存放的(ID3 decision tree)
    2014-08-29 10:06:01下载
    积分:1
  • RDGT
    实值离散gabor matlab 代码。来源于实值离散gabor经典书籍。(Real-valued discrete gabor matlab code)
    2011-11-09 21:15:02下载
    积分:1
  • poly
    A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution ciphers are useful because the are less easily broken by frequency analysis, however if an attacker knows for instance that the message has a period n, then he simply can individually frequency analyze each cipher alphabet. The number of letters encrypted before a polyalphabetic substitution cipher returns to its first cipher alphabet is called its period. The larger the period, the stronger the cipher. Of course, this method of encryption is certainly not secure by any definition and should not be applied to any real-life scenarios.
    2015-02-27 14:52:28下载
    积分:1
  • EMD序使用
    说明:  经验模态分解的使用方法,详细易懂,含代码示例。(Empirical mode decomposition method of use, detailed and easy to understand, including code examples.)
    2020-09-26 10:07:46下载
    积分:1
  • 696524资源总数
  • 103938会员总数
  • 55今日下载