-
nearestneighboralgorithm
自己写的,模式识别最近邻算法实现,配有IRIS数据集,非常实用(Their own writing, pattern recognition, nearest neighbor algorithm, with IRIS data set, very useful)
- 2009-11-27 21:08:51下载
- 积分:1
-
fff1
counting fingers on webcam
- 2015-01-30 09:36:03下载
- 积分:1
-
2009302590052
matlab编写的前方交会程序,包含题目及代码doc文件(failed to translate)
- 2013-05-07 19:12:32下载
- 积分:1
-
Daud_project
Radar Clutter for RCS
- 2010-01-27 04:49:25下载
- 积分:1
-
Test09_FIR03
FIR滤波器的设计代码,这是其中的第三部分,一共有四部分(FIR filter design code, which is the third part of a total of four parts)
- 2013-04-09 20:45:33下载
- 积分:1
-
NCO_carrier
卫星导航中的载波NCO发生器设计,对同类接收机设计有所帮助(Satellite navigation carrier NCO generator design, similar receiver design help)
- 2014-01-09 14:57:45下载
- 积分:1
-
bieqen_v34
三相光伏逆变并网的仿真,多目标跟踪的粒子滤波器,研究生时的现代信号处理的作业。( Three-phase photovoltaic inverter and network simulation, Multi-target tracking particle filter, Modern signal processing jobs when the graduate.)
- 2016-05-27 09:46:37下载
- 积分:1
-
kmeans
K均值聚类算法,可手动输入或xls读入数据(K-means clustering algorithm, can be manually entered or XLS reading da)
- 2014-11-08 15:13:07下载
- 积分:1
-
main-UI-of-the-signal-and-system
在Matlab中设计GUI,并将源码作为主界面的回调函数,按下相应的按钮实现相应的功能,包含信号的产生,卷积,傅里叶变换等功能,具体每个模块的功能实现请参照我上传的其他几个源码,谢谢。(Design of GUI in Matlab, and source as the callback function of the main interface, press the corresponding button to achieve the corresponding functions, including signal generation, convolution, Fu Liye transform functions, specific to each module function implementation please several other source reference I upload, thank you.)
- 2015-01-10 10:53:43下载
- 积分:1
-
string-data-encryption
Data Encryption by Matrix Multiplication
We will only use numbers 0 to 26 for the encryptive mathematics operation. Numbers from 1 to 26 are for letters from A to Z and 0 is for all non-letter characters. To minimize usage of numbers, all letters are converted to upper case. The original message is converted to number array according to the ASCII table and minus 64. We partition whole array into blocks of 8 numbers. The last block may be added several zeros. Then multiply each block by the an 8x8 matrix A which is invertible in Z27 to get cipher data. The decryption is the same process except to use its inverse matrix B. For good visual reading, we convert all non-letter characters to under score for the decryption.
- 2012-06-24 02:58:53下载
- 积分:1