-
cc
说明: 基于lms的自适应均衡器 作用很大效果很好(lms)
- 2009-11-19 20:42:24下载
- 积分:1
-
Karlman
matlab实现卡尔曼滤波算法,图形显示滤波轨迹和速度,以及滤波的标准差(Kalman filter algorithm to achieve matlab, graphical display trajectory and speed filtering, as well as the standard deviation of filtering)
- 2009-05-14 20:00:11下载
- 积分:1
-
MKT
这是Mann-kendall趋势检验和sen斜率估计的matlab实现的源代码,与大家共享!(This is the Mann-kendall trend test and the estimated slope sen achieved Matlab source code and share!)
- 2021-03-17 10:29:21下载
- 积分:1
-
59305
Code for threshold in CR.
- 2015-01-31 18:01:52下载
- 积分:1
-
cp0101_bandwidth
第一步是计算输人信号单边功率谱密度(ESD)。使用快
%速傅里叶(FFr)算法将信号从时域转换到频域。因为FFr算法的输出是离散谱,而这
%里我们需要的是连续谱,因此需要引人不同的比例因子来实现从离散谱到连续谱的转换。
%在第二步中,我们利用迭代算法计算出相对于特定阂值的ESD的最高和最低频率,从而
%估算出被检测信号所占用的带宽。这种算法同时适用于基带信号和已调制信号。最后,
%在第三步中,我们给出了输出图形的原代码。(The first step is calculating the input signal unilateral power spectral density (ESD). The use of fast Fourier speed (FFr) algorithm for the signal conversion from time domain to frequency domain. FFR algorithm because the output is a discrete spectrum, which we need is a continuous spectrum, so the need for food of different scale factor to achieve from the discrete spectrum to continuous spectrum conversion. In the second step, we use iterative algorithm to calculate a specific threshold in relation to the ESD of the highest and lowest frequency, thus estimated to be occupied by the signal detection bandwidth. This algorithm applies to both baseband signal and modulation signals. Finally, in the third step, we give the graphical output of the original code.)
- 2008-05-02 17:22:10下载
- 积分:1
-
DS_theory
DS证据理论用于信息融合。很多学科都可能用到。(construction of the Membership function. Many disciplines may be used, in particular information class students)
- 2012-03-27 19:14:25下载
- 积分:1
-
QPSK
QPSK modulation with awgn channel
- 2013-12-08 22:27:12下载
- 积分:1
-
mdcm
经典的直流电机双闭环调速系统模型,可用于仿真(The classic double-loop DC motor speed control system models can be used for simulation)
- 2020-11-30 22:09:28下载
- 积分:1
-
gist
It s the Gabor filter using in Gist impelementation.
- 2011-09-09 15:53:10下载
- 积分:1
-
Iris_32
Reliable authorization and authentication are becoming necessary for many
everyday applications such as boarding an aircraft, performing financial transaction,
logging to a secure system etc. Identity verification becomes a challenging task when
it has to be automated with high accuracy and with low probability of break-ins and
low rates of false match. Moreover, person verification is not a new problem and
society had created three traditional modes of designation:
1. Possessions: Physical possessions such as keys, passports and smart cards.
2. Knowledge: Pieces of information those are secret and known only to the right
person such as PIN, passwords, user names etc.
3. Biometrics: Physiological and behavioral characteristics of individuals that
distinguish one person from the others. These characteristics are different in
each person.
- 2013-04-27 08:51:33下载
- 积分:1