登录
首页 » matlab » hw1-1

hw1-1

于 2014-09-11 发布 文件大小:42KB
0 208
下载积分: 1 下载次数: 1

代码说明:

  Read a file into a matrix and display it on the screen using the MATLAB commands imagesc and axis.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • chemcluster
    使用MATLAB软件实现基于模拟退火算法的实例,对于模拟退火算法的理解,模拟退火工具箱的应用有帮助 (Using the MATLAB software examples based on simulated annealing algorithm, simulated annealing algorithm for the understanding of application of simulated annealing of the toolbox help)
    2009-09-07 22:21:36下载
    积分:1
  • viterbi
    卷积编码程序可以用于不同类型的编码器实现可行的编码 (Convolutional coding procedures can be used for different types of encoders realize feasible coding)
    2008-06-08 17:59:15下载
    积分:1
  • DMC_matlab
    matlab实现的动态矩阵控制算法 可供参考(matlab implementation of dynamic matrix control algorithm for reference)
    2010-02-24 15:38:38下载
    积分:1
  • genm
    说明:  m序列生成程序matlab实现此函数用来生成最大长度线性移位寄存器序列(m sequence generated matlab program to achieve this function used to generate the maximum length linear shift register sequence)
    2008-09-16 16:23:28下载
    积分:1
  • Particle-swarm
    Particle swarm optimization algorithm ( 粒子群优化算法)
    2013-07-16 16:08:13下载
    积分:1
  • dddd
    平台惯导解算仿真程序,包含陀螺及加表输出数据。可以直接运行(Platform INS solver simulation program, including the gyro and table output data. Can be run directly)
    2012-04-01 11:46:05下载
    积分:1
  • KalmanFilterRr1e4FOCNP
    Kalman Filter programmation
    2012-04-23 21:07:23下载
    积分:1
  • pca2
    这是基于PCA的人脸识别代码,识别率达到88.5 ,比较理想,希望对大家有所帮助.(This is a PCA-based face recognition code, the recognition rate of 88.5 , ideal, we want to help.)
    2011-06-23 20:18:43下载
    积分:1
  • graph_wavefront
    关于地震勘探中资料处理的一些基本编程,这里是关于射线追踪的一个小程序(Some basic programming on seismic exploration data processing, the purpose is to provide a good reference for everyone)
    2012-10-24 14:32:27下载
    积分:1
  • BA6
    展示了如何生成一个随机无标度网络图,基本结构分析,包括度分布、聚类系数等。观察两种类型的攻击对网络的影响:随机攻击(所有的几点有相同的概率从网络中删除)、有目标地选择连接度最大的节点(节点度最大的节点从网络中删除)。(Shows how to generate a random scale-free network graph, basic structural analysis, including degree distribution, clustering coefficients, etc. Observe the impact of two types of attacks on the network: Random attacks (all points have the same probability of being removed from the network), and select the node with the highest degree of connectivity (the node with the highest node degree is removed from the network).)
    2018-05-18 10:06:04下载
    积分:1
  • 696516资源总数
  • 106562会员总数
  • 4今日下载