-
MidpointLine2
计算机图形学中点画线算法matlab实现(Computer Graphics in the realization of stipple line algorithm matlab)
- 2009-04-19 22:14:38下载
- 积分:1
-
Bayes-
说明: 贝叶斯最小错误和最小风险算法,具有界面,分6种情况讨论(Bayes algorithm: Map and min risk)
- 2011-03-18 23:34:38下载
- 积分:1
-
spectrum
说明: 给出正弦加噪函数,通过FFT,DTFT,做频谱变化,幅度谱和相位谱。(Sine plus noise function is given by FFT, DTFT, make changes in the spectrum, amplitude spectrum and phase spectrum.)
- 2010-04-12 11:40:27下载
- 积分:1
-
chengxu.m
二元精馏塔开工物料衡算模拟,板式精馏塔,开工过程阶段不利于生产,即找到稳定时间点(Binary distillation column start material balance simulation)
- 2012-05-19 11:34:55下载
- 积分:1
-
communication
在无线信道的理论基础上,分析了Suzuki信道模型的结构原理,介绍了利用正弦波叠加法构成高斯序列,从而建立Suzuki信道数学模型的方法,并通过Matlab软件对其进行了仿真。(In the theory of radio channel based on the analysis of Suzuki channel model structure principle, describes the use of sine wave superposition method constitutes a Gaussian sequence, thereby establishing a channel model Suzuki method, and through its simulation Matlab software.)
- 2013-10-31 23:39:00下载
- 积分:1
-
matlab-application-inheritance
主要介绍了matlab桌面应用程序开发,如何编写图形界面,调用API接口。如Matlab的COM应用方法……(Introduces matlab application development, the preparation of a graphical interface, call the API interface)
- 2013-08-16 20:04:11下载
- 积分:1
-
Newmark
newmark方法求解非线性振动duffing方程(newmark method for solving nonlinear vibration duffing equations)
- 2013-11-09 18:41:35下载
- 积分:1
-
target-ISAR-imaging
ISAR目标仿真回波在加入不同噪声下利用不同时频分析工具进行分析的MATLAB例子(MATLAB examples of ISAR target echo signals simulation and the time-frequency analysis with different time-frequency tools when adding different noise to the echos)
- 2015-09-17 15:26:25下载
- 积分:1
-
LoopFilterMatrix
phase lock loop pll toolbox tool
- 2010-09-25 03:59:36下载
- 积分:1
-
leach_for_wireless_network
无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement
energy saving and flexible management.To improve security and lifetime of clustering network,a secure
clustering was pro—
posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical
network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni—
cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be
prolonged.)
- 2010-05-14 15:52:16下载
- 积分:1