登录
首页 » matlab » plot-histgram

plot-histgram

于 2013-09-20 发布 文件大小:3KB
0 237
下载积分: 1 下载次数: 1

代码说明:

  HISTOGRAM_DISPLAY makes a stacked bar plot of a set of histogrammed data.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • heu
    code heuristic cluster
    2010-09-09 15:06:05下载
    积分:1
  • PIDControlDCMotor
    PID Controller Design for a DC Motor
    2013-11-12 14:33:11下载
    积分:1
  • face_recognition
    face recognition through matlab
    2009-03-14 00:21:50下载
    积分:1
  • ycsf
    基于matlab的遗传算法的仿真,能够求出最优解。(matlab inherit)
    2012-06-02 20:56:03下载
    积分:1
  • 5GDL
    5自由度机器人,运用牛顿欧拉定理,最终求得力矩 注解为西班牙语,google翻译一下比较好懂(5 DOF robot, using Newton Euler' s theorem, the final moment annotations obtained Spanish, google translate better understand)
    2014-11-23 23:48:49下载
    积分:1
  • Logistic_tuxiang_jiami_jiemi
    Logistic映射,图像信号加密和解密,异或算法进行(Logistic mapping, image signal encryption and decryption algorithms XOR)
    2014-12-01 20:59:01下载
    积分:1
  • psoToolbox
    Help psoToolbox V1.0 psoToolbox provides an interective GUI based Toolbox to solve optimization problems using particle swarm optimization. Creat a fitness function in M-file. Inputs: Function : Function handle of fitness function. Nvars : Number of variable to be optimized. LB : Lower Bound of Nvars (1 X Nvars) UB : Upper Bound of Nvars (1 X Nvars) Parameters: C1 : Cognative Attraction C2 : Social Attraction W : Inertial Population Size : Number of Swarms Max Iterations : Maximum number of epochs. Click on " RUN PSO " button to start PSO search. You will get the out put at Edit box below the axes.
    2013-11-24 04:13:20下载
    积分:1
  • paddedhilbert
    this is the code to apply hilbert transform on a signal.
    2010-11-30 14:50:37下载
    积分:1
  • string-data-encryption
    Data Encryption by Matrix Multiplication We will only use numbers 0 to 26 for the encryptive mathematics operation. Numbers from 1 to 26 are for letters from A to Z and 0 is for all non-letter characters. To minimize usage of numbers, all letters are converted to upper case. The original message is converted to number array according to the ASCII table and minus 64. We partition whole array into blocks of 8 numbers. The last block may be added several zeros. Then multiply each block by the an 8x8 matrix A which is invertible in Z27 to get cipher data. The decryption is the same process except to use its inverse matrix B. For good visual reading, we convert all non-letter characters to under score for the decryption.
    2012-06-24 02:58:53下载
    积分:1
  • 1b6707e893e9
    In this paper, a new approach based on the R, filtering is presented for speech enhancement. This approach differs from the traditional modified Wiener
    2013-01-29 18:36:33下载
    积分:1
  • 696516资源总数
  • 106432会员总数
  • 11今日下载