-
PV_MPPT
pv mppt modeling, perturb and observation
- 2020-10-04 16:47:39下载
- 积分:1
-
lqxpid_gaf
ga算法
优化PID参数
功能简单实用
很好很强大(let us go)
- 2010-05-28 15:04:37下载
- 积分:1
-
MieCoated
用Mie理论计算双层粒子的散射角——散射光强曲线
1.RB1.m 计算第一类Ricatti-Bessel函数的函数
2.RB2.m 计算第二类Ricatti-Bessel函数的函数
3. Alegendr.m 计算角函数 和 的函数
4. MieCoeff.m 计算包覆粒子米尔系数的函数
5. Amp.m 计算散射光复振幅的函数
6. MieIntensity.m 画包覆粒子散射角-光强图
(Mie theory calculations using double-particle scattering angle- scattering intensity curve 1. RB1.m calculate the first class Ricatti-Bessel function of the function 2. RB2.m calculate the second category Ricatti-Bessel function of the function 3. Alegendr.m computing angle functions and function 4. MieCoeff.m coated particles Mill coefficient calculation function 5. Amp.m calculate the scattering amplitude recovery function 6. MieIntensity.m painting coated particle scattering angle- light intensity diagram)
- 2013-10-05 14:40:22下载
- 积分:1
-
82774918-System-Identification-Toolbox
This is System identification toolbox user guide.
enjoy it )
- 2013-11-09 01:08:40下载
- 积分:1
-
Miller
密勒码仿真,应用在通信原理课程实验中。其中包涵双相码编码过程。(Miller s code simulation, application in the communication principle course experiments.Includes two phase code encoding process.)
- 2014-04-10 11:38:41下载
- 积分:1
-
zishiyingzuoye
自适应算法的仿真,能实现很好的适应过程,解决干扰的影响(Adaptive algorithm simulation, can achieve a good adaptation process to resolve interference)
- 2013-07-12 16:34:23下载
- 积分:1
-
RSSI_simulation
此程序是描述的RSSI曲线的代码 重点与A值和n值的关系!(the relationship between the parameters of the n and A in RSSI)
- 2011-12-26 18:47:44下载
- 积分:1
-
噪后经常用的评价指标,峰值信噪比,信噪比,相似度、等效视数,边缘保持指数 ENL SSIM PSNR SNR EPI
包含去噪后经常用的评价指标,峰值信噪比,信噪比,相似度、等效视数,边缘保持指数(After uation often contain de-noising, the peak signal to noise ratio, SNR, similarity, ENL, edge retention index)
- 2021-04-26 19:38:44下载
- 积分:1
-
MUSICDemo
is esprit for signal processing
- 2010-12-15 03:38:46下载
- 积分:1
-
RS
说明: RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.A user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message
- 2015-02-27 14:59:22下载
- 积分:1