-
motaifenxi
模态分析程序,一定要有实验现场的数据,要不运行不了(Modal analysis program, there must be experimental field data, or not running)
- 2013-09-27 14:32:28下载
- 积分:1
-
matpower
最优潮流 基于matlab 经过测试 可以使用(OPF has been tested can be used based on matlab)
- 2020-11-23 20:49:33下载
- 积分:1
-
ABSFragmentTabs-master
Json parsing and fragments. uses for tests and make tutorials
- 2014-12-22 22:20:01下载
- 积分:1
-
keng_ty21
matlab程序运行时导入数据文件作为输入参数,三相光伏逆变并网的仿真,BP神经网络的整个训练过程。( Import data files as input parameters matlab program is running, Three-phase photovoltaic inverter and network simulation, The entire training process BP neural network.)
- 2017-04-11 20:50:06下载
- 积分:1
-
simulink_kalman
运用matlab下的Simulink实现的对Kalman 滤波的仿真,效果很好(The use of MATLAB Simulink to realize the Kalman simulation, the effect is very good)
- 2015-04-19 23:16:37下载
- 积分:1
-
MATLABPR2012bPcrack
matlab 2012b 完美破解的方法,77个工具箱都可以用(matlab 2012b crack perfect way 77 toolbox can be used)
- 2013-09-30 09:42:03下载
- 积分:1
-
Newton
牛顿迭代法来解决线性方程等相关问题,用于数值分析考试的源代码程序。(Newton method to solve linear equations and other related issues, for the numerical analysis of the source code for examination procedures.)
- 2015-03-23 20:16:32下载
- 积分:1
-
Dynamic-Path-loss-exponent
说明: 动态可变环境下基于信标节点间的信号动态计算当前环境下的路径衰落指数,(A method to accucalate the true path loss exponent in dynamic environment!)
- 2011-03-21 09:27:19下载
- 积分:1
-
matlab-C4
该源代码主要实现C4.5决策树算法,C4.5是对ID3算法的一种改进,它完善了ID3算法,补充了其算法的一点不足(The source code is the main achievement of C4.5 decision tree algorithm, C4.5 is an improved ID3 algorithm, which improved the ID3 algorithm, the algorithm added a little less than its)
- 2011-11-18 11:00:13下载
- 积分:1
-
HEU_KMSActtivator
说明: 本文提出了一种基于混沌加密的DCT域二值图像数字水印算法.该算法首先利用混沌序列将含有版权信息的有意义二值图像水印进行加密,然后利用人眼视觉系统(HVS)的特性将原始载体图像进行块分类,最后将不同强度的水印分量嵌入到不同类的图像块DCT中频系数中去.利用混沌序列对水印进行加密,使水印本身具有安全性,对数字作品进行双重保障.通过高斯噪声,椒盐噪声以及JPEG压缩和剪切等攻击试验,表明了该算法具有较好的鲁棒性.(Encryption in DCT domain is proposed. Firstly, the meaningful binary image watermark containing copyright information is encrypted by using chaotic sequence, and then the original image is classified by using the characteristics of human visual system (HVS), Finally, the watermark components with different intensities are embedded into the DCT intermediate frequency coefficients of different types of image blocks. Chaotic sequences are used to encrypt the watermark, so that the watermark itself has security and double protection for digital works. Experiments on Gaussian noise, salt and pepper noise, JPEG compression and clipping show that the algorithm has good robustness)
- 2021-04-15 12:12:28下载
- 积分:1