-
ssom
利用som算法进行数据的聚类,实现无监督聚类(clustering the data with the som algorithm, that can relizing unsupervised cluster)
- 2019-04-29 17:00:47下载
- 积分:1
-
mimosimulation
mobile channel in matlab 包含PSK RICE DOUPLER
- 2009-11-24 16:18:07下载
- 积分:1
-
BranchBound
说明: 最优化问题中分枝定界法求解整数线性规划问题(Optimization of branch and bound method for solving integer linear programming problem)
- 2010-04-29 20:55:36下载
- 积分:1
-
Cours_Matlab-P17
Cours de Matlab tres bon ource
- 2014-10-17 02:31:39下载
- 积分:1
-
A-GMDH-TOOLBOX-FOR-NEURAL-NETWORK-MODELING
A GMDH TOOLBOX FOR NEURAL NETWORK BASED MODELING
- 2014-10-17 04:34:03下载
- 积分:1
-
snake
蛇贪蛋,一个好玩的游戏,matlab编码(The snake corruption eggs, a fun game, matlab code)
- 2014-11-25 09:52:15下载
- 积分:1
-
ARfit
说明: Matlab工具箱实现多变量回归模型的参数估计与特征值(Matlab Toolbox multivariable regression model parameter estimation and eigenvalue)
- 2005-11-24 01:46:10下载
- 积分:1
-
yuceqi
分别采用维纳滤波和l-d算法设计一个6阶前向线性预测器,给出设计过程,matlab程序。
要求:1、得到预测器的权向量和预测误差功率
2、画出预测阶数和预测误差功率的曲线
3、在使用l-d算法时,假设 , ,…… 未知
(Wiener filter and were used to design a 6-ld algorithm prior to the linear predictor order, given the design process, matlab program. Requirements: 1, are predictors of weight vectors and the prediction error power of 2, draw the prediction order and the prediction error power, Curve 3, in the use ld algorithms, assumptions, ... ... unknown)
- 2010-07-22 20:29:14下载
- 积分:1
-
poly
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution ciphers are useful because the are less easily broken by frequency analysis, however if an attacker knows for instance that the message has a period n, then he simply can individually frequency analyze each cipher alphabet.
The number of letters encrypted before a polyalphabetic substitution cipher returns to its first cipher alphabet is called its period. The larger the period, the stronger the cipher. Of course, this method of encryption is certainly not secure by any definition and should not be applied to any real-life scenarios.
- 2015-02-27 14:52:28下载
- 积分:1
-
ssi-subspace-identification
stochastic subspace identification code
- 2021-04-12 20:08:57下载
- 积分:1