-
FuzzyMath.m
自己编写的,利用模糊数学方法计算船舶碰撞危险度得matlab程序(Self-compiled matlab program for calculating ship collision risk using fuzzy mathematics method)
- 2021-02-27 14:19:36下载
- 积分:1
-
Matlab_ISR Model
说明: Incoherent Scatter Radar model in Matlab. To calculate the theoretical spectra of radars.
- 2020-06-17 05:00:02下载
- 积分:1
-
Mg-cutting
说明: abaqus纯镁切削算例文件,可直接计算(ABAQUS pure magnesium cutting example file can be directly calculated)
- 2017-08-05 21:04:48下载
- 积分:1
-
ABAQUS技巧积累
abaqus 使用技巧-Inp文件中单元类型改变时,一定要注意,划分网格的时候是否,选用了一种望各类型,比如4变形和3变形的区别,如果用注意将所有的单元类型都做相应的修改。这说明单元类型由2个因素决定,1网格形状,2计算任务.(Abaqus tips-When changing the unit type in the Inp file, be sure to pay attention to whether or not to select a type, such as 4 deformation and 3 deformation, if you use the attention, all the unit types should be modified accordingly. This shows that the unit type is determined by two factors, 1 grid shape, 2 calculation tasks.)
- 2018-07-09 10:28:03下载
- 积分:1
-
two fredom degree
可用于车辆操控稳定性分析,预测车辆行驶状态进行预测控制。(Can be used for vehicle control stability analysis, forecast vehicle driving state for predictive control.)
- 2017-08-25 15:40:16下载
- 积分:1
-
_基于射线跟踪模型的3.5 GHz无线传播特性研究
说明: 3.5 GHz 是 5G 网络部署的重要频段,本文结合射线跟踪模型,对 3.5 GHz 的无线传播特性进行了研究,并于 1.8 GHz 进行了对比,提出 5G 网络初期部署的建议(3.5GHz is an important frequency band for 5g network deployment. In this paper, the radio propagation characteristics of 3.5GHz are studied in combination with ray tracing model, and compared with 1.8GHz. Suggestions for initial deployment of 5g network are proposed)
- 2019-12-11 10:08:09下载
- 积分:1
-
妥协解
多目标优化的最大妥协解,转换成单目标优化
三人博弈的部分(The maximum compromise solution of multiobjective optimization)
- 2018-10-09 10:33:41下载
- 积分:1
-
离散二层邻居一致性算法
说明: 二阶离散多智能体系统的二层邻居一致性算法研究成果(Discrete_system_for_second_order_neighbor_consensus_algorithm)
- 2019-05-09 20:49:11下载
- 积分:1
-
IEEE39_BPA_PSSE
基于bpa的IEEE39节点算例,包含暂态数据和稳态数据(Example of IEEE39 node based on BPA)
- 2021-06-21 19:30:01下载
- 积分:1
-
诱骗态程序
根据给定的实验系统的参数,对采用诱骗态方案的BB84系统进行仿真,得到在不同光纤传输距离下,系统安全密钥生成率R(According to the parameters of the experimental system, the BB84 system with decoy scheme is simulated, and the system security key generation rate R is obtained under different fiber transmission distance)
- 2017-07-08 10:49:45下载
- 积分:1