-
newtonp
根据牛顿插值原理进行数据的拟合,附有牛顿插值原理和它的matlab的实现方法,有点简单了,但是过程中的好些地方还是值得学习的。(Newton interpolation carried out in accordance with the principle of data fitting, with Newton interpolation matlab principle and its realization method, a bit simple, but in the process of a number of places it is still worth learning.)
- 2007-09-04 21:33:16下载
- 积分:1
-
circonv
实现了用matlab在频域上求离散序列的循环卷积(Achieved in the frequency domain using matlab seeking discrete sequence of circular convolution)
- 2010-05-16 17:11:08下载
- 积分:1
-
ixneighbors
ixneighbors returns the indices of neighbor cells in a n*m matrix A. ic
and icd are column vectors of same length where ic are the indices of
cells in A and icd are the indices of the neighbor cells.
- 2014-09-23 20:27:17下载
- 积分:1
-
ssc_lead_acid_battery
Lead-Acid Battery
This demo implements a model of a lead-acid battery cell using the Simscape™ language to implement the nonlinear equations of the equivalent circuit components. In this way, as opposed to modeling entirely in Simulink® , the connection between model components and the defining physical equations is more easily understood.
- 2014-10-26 00:03:20下载
- 积分:1
-
DLTcode
针对图片或视频数据的眼睛区域的检测,以及眨眼的检测确定人脸区域的程序。 份关于智能图像增强的美国专利,对图像处理感兴趣的朋友可以看一下。(Tracking learning)
- 2013-11-26 14:17:49下载
- 积分:1
-
K2算法
K2算法的代码,matlab编程,包含例子(Code for the K2 algorithm, matlab programming, including examples)
- 2020-08-17 16:58:23下载
- 积分:1
-
Bark-wavelet-on-matlab
bark子波的基本原理以及在MATLAB中的算法过程,不是源代码~~(bark, and the basic principles of wavelet algorithms in MATLAB in the process, not the source code ~ ~)
- 2010-05-11 16:17:26下载
- 积分:1
-
slides
this is the slides for WSN nodes
- 2011-05-12 13:04:03下载
- 积分:1
-
DDC
通信原理仿真
码型反变换的仿真实现
Ⅰ、基本任务:由抽样判决后的AMI码型和CMI码型数字序列恢复出原始的PCM脉冲编码信号。
主要步骤和要求:
(1)由抽样判决后的AMI码型数字序列恢复出原始的PCM脉冲编码信号(0、1信号)。要求抽样判决后的AMI码型数字序列可以是数字型也可以是字符型;要求画出码型反变换前后的波形图。
(2)由抽样判决后的CMI码型数字序列恢复出原始的PCM脉冲编码信号。要求抽样判决后的CMI码型数字序列可以是数字型也可以是字符型;要求画出码型反变换前后的波形图。
Ⅱ、选做任务:由抽样判决后的HDB3码型数字序列恢复出原始的PCM脉冲编码信号。
主要步骤和要求:
由抽样判决后的HDB3码型数字序列恢复出原始的PCM脉冲编码信号(0、1信号)。要求抽样判决后的HDB3码型数字序列可以是数字型也可以是字符型;要求画出码型反变换前后的波形图。
(Communication theory simulation
Fifth problem, Pattern Simulation of inverse transform
Ⅰ, basic tasks: decision by the sampling pattern after AMI and CMI pattern sequence to recover the original digital PCM pulse code signal.
Main steps and requirements:
(1) post-judgment by the AMI code sample digital sequence to restore the original PCM pulse code signal (signal 0,1). AMI requires post-judgment sampling digital code sequence can also be a numeric character asked to draw a pattern waveform before and after the inverse transform.
(2) post-judgment by the CMI sampling digital code sequence to restore the original PCM pulse code signal. Requirements of post-judgment CMI sampling digital code sequence can also be a numeric character asked to draw a pattern waveform before and after the inverse transform.
Ⅱ, choose to do the task: the post-judgment by the sample type HDB3 code sequence to recover the original digital PCM pulse code signal.
Main steps and requirements:
Pos)
- 2011-11-03 00:08:23下载
- 积分:1
-
192010k-average
kmeans均值聚类算法:一种改进的基于半监督聚类的入侵检测算法ASCID(Active-learning Semi-supervised Clustering Intrusion Detection),(kmeans clustering algorithm
Algorithm was simulated by KDD 99 datasets, which the experimental results demonstrate that ASCID algorithm can improve the detection rates and low the false positive rates of the algorithm, and confirm the feasibility and validity of the algorithm.)
- 2009-10-15 20:02:25下载
- 积分:1