-
SimTIFFToImage.m
Converts a monochrome mosaiced TIFF file to simulator format. 在matlab上运行,去除模糊图像,重影。(Converts a monochrome TIFF file mosaiced t o simulator format. In Matlab run, remove fuzzy images ghost.)
- 2007-04-30 13:22:41下载
- 积分:1
-
scopus_list
uck-Boost buck- boost chopper circuit simulation model
- 2013-11-11 20:46:38下载
- 积分:1
-
unbalancedswell
THREE PHASE MODEL OF DYNAMIC VOLTAGE RESTORER FOR INVERTER CONTROL SCHEME
- 2015-02-14 17:12:51下载
- 积分:1
-
l2
说明: 已知三个信号 ,经调制产生信号 ,其中 为常数, 为具有窄带特性的Hanning信号。将此已调信号通过信道传输,描述该信道的差分方程为
得到接收信号
1)分析Hanning信号 的时域与频域特性
2)分析已调信号 的时域与频域特性
3)分析系统的单位脉冲响应
4)分析接收信号 的频谱
(Three known signal, the modulated signal is generated, which is a constant for the Hanning signal having a narrowband characteristics. This modulated signal channels transmitted through the differential equation of the channel 2) units of analysis of the modulated signal and frequency domain characteristics 3) analysis system is described for obtaining a reception signal 1) Analysis of time domain and frequency domain characteristics Hanning signal 4 impulse response) spectral analysis of the received signal)
- 2016-11-27 17:49:31下载
- 积分:1
-
DAFC
对二阶被控对象实现直接自适应模糊控制器设计与仿真(Implementation of the Second accused of objects Direct Adaptive Fuzzy Controller Design and Simulation)
- 2010-06-19 09:46:00下载
- 积分:1
-
wangge
matlab编写的计算二维导热问题的数值传热程序,对初学者有用。(Matlab prepared by the numerical calculation of two-dimensional heat conduction problems heat transfer program, useful for beginners.)
- 2013-04-30 10:34:55下载
- 积分:1
-
7895
simulation of neural network for adaptive control
- 2014-02-10 23:23:17下载
- 积分:1
-
Desktop
mfcc, it helps you recognize the speech
- 2011-05-04 03:55:02下载
- 积分:1
-
image_compression
image processing: image_compression
- 2011-05-26 17:13:53下载
- 积分:1
-
Cooperative-Security-for-Network-
本文提出了网络编码,减少了验证对飞块成本,有效地防止恶意块的传播实用的安全解决方案。在我们的方案中,用户不仅合作发布内容,但用户也合作来保护自己免受恶意用户通知受影响的节点时,一个恶意的块被发现。(This paper presents a practical security scheme for network coding that reduces the cost of verifying blocks on-the-fly while efficiently preventing the propagation of malicious blocks. In our scheme, users not only cooperate to distribute the content,but (well-behaved) users also cooperate to protect themselves against malicious users by informing affected nodes when a malicious block is found.)
- 2014-10-14 09:02:49下载
- 积分:1