-
123
expirimental analysis of adaptive MIMO
- 2009-05-07 10:24:17下载
- 积分:1
-
GLCM_Features1
matlab code for glcm features
- 2010-12-30 01:51:34下载
- 积分:1
-
MatlabModel-4.0
Matlab策略主模板框架—日内交易策略,股指期货的均线突破策略(Matlab strategy master template frame - intraday trading strategy, stock index futures average breakthrough strategy)
- 2013-08-05 09:30:14下载
- 积分:1
-
ttp2013040996
TPAMI:Visual Saliency Based on Scale-Space Analysis in the Frequency Domain,论文源代码(TPAMI: Visual Saliency Based on Scale-Space Analysis in the Frequency Domain, the dissertation the source code)
- 2013-04-03 14:39:30下载
- 积分:1
-
LTE-packet
In Modulation schemes such as OFDM transmitter time domain signal will have higher PAPR, which leads to various distortions in the transmitter chain and degradation of system performance i.e. BER/PER. Also requires highly linear power amplifier which increases cost of the system. PAPR is ratio of peak power to average power of time domain complex baseband signal which is to be transmitted. We will discuss PAPR reduction techniques below.
- 2014-12-19 13:13:55下载
- 积分:1
-
pCA
JITL PCA 应用于间歇过程故障诊断(JITL PCA)
- 2015-03-06 16:01:33下载
- 积分:1
-
10040129
文件包含两个m文件,一个是QPSK的主函数文件和单径的瑞利衰落信道fade.m文件,实现的对qpsk的过程进行了仿真(在瑞利和高斯信道的作用下)。绘制出了在各个阶段的波形图(M file contains two files, one file is the main function of QPSK and single path Rayleigh fading channel fade.m file qpsk the process of implementation of a simulation (in the Rayleigh and Gaussian channel under the action.) Drawn out at each stage of the waveform)
- 2010-11-09 23:00:36下载
- 积分:1
-
7
说明: MidPoint 中点公式求取导数
ThreePoint 三点法求函数的导数
FivePoint 五点法求函数的导数
DiffBSample 三次样条法求函数的导数
SmartDF 自适应法求函数的导数
CISimpson 辛普森数值微分法法求函数的导数
Richason 理查森外推算法求函数的导数
ThreePoint2 三点法求函数的二阶导数
FourPoint2 四点法求函数的二阶导数
FivePoint2 五点法求函数的二阶导数
Diff2BSample 三次样条法求函数的二阶导数
(Interpolation function)
- 2011-08-15 09:46:55下载
- 积分:1
-
Test
text recoginition system
- 2014-10-27 20:04:28下载
- 积分:1
-
DCT-Based--Watermarking-Scheme
a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image.
- 2014-02-15 21:17:17下载
- 积分:1