-
Cluster
使用分解聚类算法在IRIS数据上进行聚类分析,IRIS数据是由鸢尾属植物的三种单独的花的测量结果所组成,模式类别数为3,特征维数是4,每类各有50个模式样本,总共有150个样本。(The use of decomposition in the IRIS data clustering algorithm on the cluster analysis, IRIS data are from the iris flower three separate components of the measurement results, models for category 3, 4 are characteristic dimension, of each type of each 50 model samples, a total of 150 samples.)
- 2009-03-07 20:09:21下载
- 积分:1
-
MSK_GMSK_grt_rtw
gmsk modulation. some code
- 2009-05-06 17:09:19下载
- 积分:1
-
anglefinder.m
Simple ULA simulator for Capon
- 2015-01-21 00:45:28下载
- 积分:1
-
practica_cmoderno
codigos para control moderno
- 2009-11-01 09:17:03下载
- 积分:1
-
suanfen
模拟杨氏双缝干涉实验的M程序,用MATLAB进行仿真,可以很好的达到效果(simulation Young's double slit interference experiment M procedures, using MATLAB simulation, can achieve good results)
- 2007-04-11 00:10:20下载
- 积分:1
-
omap_hwmod_33xx_data
Hardware modules present on the AM33XX chips.
- 2014-08-09 11:46:09下载
- 积分:1
-
Pajek-on-complex-network
pajek针对复杂网络的仿真 按步骤操作和实践,肯定有很大帮助(pajek simulation for complex network)
- 2014-09-30 19:59:22下载
- 积分:1
-
training_data
source code for OCR in matlab using NN
- 2009-09-22 13:31:13下载
- 积分:1
-
Cooperative-Security-for-Network-
本文提出了网络编码,减少了验证对飞块成本,有效地防止恶意块的传播实用的安全解决方案。在我们的方案中,用户不仅合作发布内容,但用户也合作来保护自己免受恶意用户通知受影响的节点时,一个恶意的块被发现。(This paper presents a practical security scheme for network coding that reduces the cost of verifying blocks on-the-fly while efficiently preventing the propagation of malicious blocks. In our scheme, users not only cooperate to distribute the content,but (well-behaved) users also cooperate to protect themselves against malicious users by informing affected nodes when a malicious block is found.)
- 2014-10-14 09:02:49下载
- 积分:1
-
item
相对复杂环境下网球的识别,完全个人想出的处理方式(Tennis identify relatively complex environment, come up with entirely personal approach)
- 2012-10-14 18:59:04下载
- 积分:1