-
FANSHUSHANG
求解加噪信号的范数熵,本程序是选取单载频信号求解其范数熵(Solving the norm of the signal plus noise entropy, the procedure is to select a single carrier frequency signal solving its norm entropy)
- 2013-07-29 21:03:35下载
- 积分:1
-
c
说明: it is matlab source code implemeted in Matlab 7.6.
this is utilized in matlab.
- 2011-05-21 16:47:28下载
- 积分:1
-
LMI_Control_Toolbox
详细介绍MATLAB线性矩阵不等式(LMI)的应用过程,实例丰富,上手较快!(Details MATLAB linear matrix inequality (LMI), the application process, examples of rich, to get started faster!)
- 2012-06-27 22:19:17下载
- 积分:1
-
dissertationlsthesudyofgaborwavel
本文 主 要 研究的是Gab。:小波神经网络算法及其在灰度图像目标识别
中的应用。研究涉及神经网络理论、小波分析理论和小波神经网络理论及其
它们在目标识别中的应用技术。(The main research of this paper is Gab. : wavelet neural network algorithm and its application in gray image target recognition
In the application of. Research involving neural network theory, the theory of wavelet analysis and wavelet neural network theory and its
Their application in target recognition.)
- 2014-08-18 10:13:29下载
- 积分:1
-
datatrafficmodel
data traffic model matlab code
- 2011-01-08 18:29:55下载
- 积分:1
-
dqo_3phase
dqo axis to a-b-c axis
- 2012-05-02 15:35:59下载
- 积分:1
-
paddedsize
PADDEDSIZE Computes padded sizes useful for FFT-based filtering
- 2010-06-26 19:12:48下载
- 积分:1
-
EEG-analysis-and-application
《脑电信号分析方法及其应用》书中示例程序,书的附录中有该程序列表(EEG analysis method and its application(the book program))
- 2013-07-31 16:43:14下载
- 积分:1
-
tform_Lidar
用matlab仿真实现的雷达图像的几何畸变校正过程(using Matlab Simulation of radar images of the geometric distortion correction process)
- 2007-01-27 12:11:39下载
- 积分:1
-
finger-recong
指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。
三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
- 2007-05-02 23:49:15下载
- 积分:1