登录
首页 » matlab » 3d

3d

于 2012-09-21 发布 文件大小:1KB
0 122
下载积分: 1 下载次数: 0

代码说明:

说明:  Theoretical analysis and experimental results show that the algorithm has large key space, high sensitivity, and high speed.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • uwbdete6
    该方法将宽带信号的检测转化为稀疏信号的表示问题。利用分数阶傅里叶变化实现宽带LFM信号的稀疏表示,然后利用OMP算法实现LFM信号的检测。(The method to the detection of broadband signals into sparse signal representation problem. Wideband LFM signal changes in the fractional Fourier sparse representation, and then take advantage of the the OMP algorithm LFM signal detection.)
    2012-09-29 23:15:19下载
    积分:1
  • voicebox
    语音开发工具箱voicebox,对于语音信号处理非常有用(voicebox for voice prosessing)
    2012-04-11 19:49:46下载
    积分:1
  • Chapter_2
    data converters by maloberti
    2013-04-19 15:08:31下载
    积分:1
  • text_seg
    this is a code to segment the color texture using Gabor filter. It uses the initial segmentation using kmeans clustering.
    2009-10-04 15:07:15下载
    积分:1
  • ToolBox
    matlab图像处理工具相,使用了主成分分析,ANN,SVM等方法。(This toolBox used in the image processing(feature extraction and classification) PCA,LDA,ICA,DCT,RBF,RBE,GRNN,KNN,minimum distance,SVM, and others)
    2009-05-01 10:27:28下载
    积分:1
  • wwCA_TrafficFlowModel
    这个可以用来在元胞自己增加车流使用是好用的额(This can be used to increase traffic in cellular own use is the amount of usefuladd car)
    2014-02-09 21:26:41下载
    积分:1
  • guize
    这是规则化滤波复原的matlab代码,需要的可以作为参考(This is the matlab code regularization filter recovery, need can be used as a reference)
    2015-01-06 13:20:05下载
    积分:1
  • poly
    A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution ciphers are useful because the are less easily broken by frequency analysis, however if an attacker knows for instance that the message has a period n, then he simply can individually frequency analyze each cipher alphabet. The number of letters encrypted before a polyalphabetic substitution cipher returns to its first cipher alphabet is called its period. The larger the period, the stronger the cipher. Of course, this method of encryption is certainly not secure by any definition and should not be applied to any real-life scenarios.
    2015-02-27 14:52:28下载
    积分:1
  • Connect
    STK编程手册之Connect编程,利用MATLAB、VC或者Perl等实现对STK的控制。(STK Connect programming manual programming, use of MATLAB, VC, or Perl, etc. to achieve the control of STK.)
    2011-04-24 13:58:28下载
    积分:1
  • BatchSimulation
    As we know, the energy needed for sensors should be electrical. So the rst step before start to work is to convert environmental energy to electrical one. Inside the node there are dierent components for sensing the area, collecting data and processing the data. So the main dierent part of this kind of nodes, in compare of WSN nodes, is the power part. Once the stored energy reach to a certain amount, the power supply for micro controller and transceiver will start to work. They will continue to work until they have energy, as soon as the energy nish, they stops and energy storage device start to work to save energy again. The other fact should be consider about EH-WSN node is that the available energy can change in dierent nodes. So every node has its own harvesting rate.
    2013-07-20 14:34:56下载
    积分:1
  • 696518资源总数
  • 105531会员总数
  • 4今日下载