登录
首页 » PDF » 00662645

00662645

于 2013-10-04 发布 文件大小:255KB
0 173
下载积分: 1 下载次数: 2

代码说明:

  internation transaction paper for implementation in matlab

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • dct
    这是用matlab写的dct代码用于图像的信息的隐藏和提取。。部分老师写的哦。(This is used to write the DCT matlab code for the image and extract the hidden information. . Oh part of the Writing Teacher.)
    2009-03-19 22:06:29下载
    积分:1
  • Imageencryptionbasedonthemultiple-parameterdiscret
    基于傅里叶变换的混沌图像置乱加密方法及其代码实现(Fourier transform based on chaotic image encryption and scrambling code implementation)
    2010-05-19 21:48:47下载
    积分:1
  • ARMA
    ARMA模态参数识别,振动信号处理应用与研究,应用MATLAB编程实现模态参数提取研究(ARMA modal parameter identification and vibration signal processing applications and research, using MATLAB programming to achieve the modal parameter extraction of)
    2012-06-25 16:18:00下载
    积分:1
  • camera
    一个调整用电脑摄像头,当捕捉到画面有运动时,进行拍照并发送到邮箱的程序。(An adjustment computer camera, to capture the screen when there is movement, take photos and send mail program.)
    2013-10-15 18:17:44下载
    积分:1
  • caiyang
    数字信号处理中采样定理和卷积定理的验证,简单易懂的matlab源码,(Validation sampling theorem and convolution theorem of the digital signal processing in the matlab source code, easy to understand)
    2013-05-09 21:44:36下载
    积分:1
  • 网络抗毁性,MATLAB仿真
    说明:  Matlab中对建立好的网络进行节点/连边随机、蓄意攻击,用最大连通子图、网络效率来衡量网络的抗毁性,并找出最关键的节点的仿真程序。(In MATLAB, the nodes / edges of the established network are attacked randomly and intentionally. The invulnerability of the network is measured by the maximum connectivity sub graph and network efficiency, and the simulation program of the most critical node is found.)
    2021-05-13 05:30:03下载
    积分:1
  • DaoLiBaiGuanCeQiDesign
    说明:  倒立摆全状态观测器设计,在Matlab/Simulink仿真环境中实现仿真!(State observation design)
    2009-08-04 19:29:19下载
    积分:1
  • Handwritten-numeral-recognition
    matlab环境下实现对手写体数字的分类识别(Handwritten Arabia digital numeral recognition)
    2013-12-20 16:17:57下载
    积分:1
  • PipedWriter
    Places information on a communications pipe. When two threads want to pass data back and forth, one creates a piped writer and the other creates a piped reader.
    2014-02-18 14:05:14下载
    积分:1
  • yichuansuanfa
    遗传算法,基因突变函数,交叉函数,二进制转十进制,十进制转二进制(Genetic algorithms, function mutation, crossover function, binary to decimal, decimal to binary)
    2013-12-05 15:52:17下载
    积分:1
  • 696518资源总数
  • 106148会员总数
  • 10今日下载