-
binfo
binary information regarding matlab code for cognitive radio. primary user and secondary users sense the spectrum using co operative sensing scheme
- 2010-10-10 12:50:59下载
- 积分:1
-
AM_DSB_Modulation
AM_DSB_Modulation Techniques
- 2012-05-27 18:40:59下载
- 积分:1
-
Integraly
solution of the integrals
matlab
- 2012-05-15 00:14:39下载
- 积分:1
-
GifViewer
Before run, install Emgu CV 2.9 and Visual 2012
- 2014-11-25 22:32:44下载
- 积分:1
-
optimal_PSO
包含分布式电源的配电网无功优化,EI论文程序,摘要:将能够提供无功功率的分布式电源与传统的电压调节手段相结合,研究了包含分布式
电源的配电网无功优化问题。(Reactive Power Optimization for Distribution System
With Distributed Generators)
- 2021-04-07 09:59:03下载
- 积分:1
-
QGA_crect
用量子进化算法求解函数最优值,速度快。但是还有点小问题,就是在灾变的时候最优染色体的保存有点问题。(Using quantum-inspired evolutionary algorithm for solving the optimal value function, and speed. But there is such a small issue, that is when the disaster is something wrong with the preservation of the best chromosome.)
- 2010-03-02 21:20:44下载
- 积分:1
-
prbs-matlab
基于Matlab 平台根据反馈数字逻辑给出了m 序列的计算机生成源程序和m 序列的基本性质的考察代码。可根据输入的八进制
本原多项式系数生成相应的m 序列。上机结果验证了程序的正确性和有效性(Matlab-based platform based on feedback digital logic m-sequence are given computer-generated source code and the basic properties of m-sequence code visits. According to the octal input primitive polynomial coefficients generate the m-sequence. The machine results validate the correctness and effectiveness of the program)
- 2011-09-26 16:56:41下载
- 积分:1
-
48567941lms_algo
信道预测方法中的LMS方法,用来进行信道预测(LMS method in channel prediction method for channel prediction)
- 2019-02-18 13:53:01下载
- 积分:1
-
222238ais
人工免疫算法 故障诊断方面的模式识别源代码(Artificial immune algorithm Diagnosis)
- 2010-06-04 22:59:40下载
- 积分:1
-
bw_fragile_robust
matlab编写的对二值图像的数字水印添加与提取程序。压缩包中有示例图片。可以添加水印,结果肉眼不易分辨出变化,不影响使用。可加入信息长度达100个字节。提取时可验证是否被修改过,如修改不严重,可提取隐藏信息,如果修改过多,则只能确定是否有修改,而不知道隐藏的信息是什么(matlab prepared binary image of the digital watermark added and extraction procedures. Compression package has sample images. Can add watermarks, the results of the changes are not easily distinguishable from the naked eye, does not affect use. Can be added to the information length of 100 bytes. Verifiable extraction has been modified, such as modification is not serious, can extract hidden information, if too many modifications, you can only determine whether changes were needed, they do not know what information is hidden)
- 2008-02-20 13:29:42下载
- 积分:1