-
DataRecog
用神经网络,实现手写数字0-9的识别,对于相似度小的拒绝识别(Using neural networks, implementation figure 0-9 handwriting recognition, the similarity of small refuse recognition)
- 2009-03-23 16:01:38下载
- 积分:1
-
3robot
This code implements the direct kinematics of a 3 revolute robot. It also includes a simple graphic model of this operation.
- 2010-09-02 01:43:28下载
- 积分:1
-
spwmanalyse
matlab用fft分析两种SPWM算法的优劣。实现时域数据的生成,频谱的比较。(matlab fft analysis of the pros and cons of the two SPWM algorithm. To achieve the generation of the time domain data, the comparison spectrum.)
- 2013-03-25 01:20:50下载
- 积分:1
-
tsmQPhild
算法是原始对偶算法,该方法充分的剖析了优化问题的结构,是求解二次规划问题的一个较好的算法。求解比采用matlab 的Quardprog求解速度快许多!(Algorithm is the original dual algorithm, this method is fully analyzed the optimization of structure, is to solve the quadratic programming problem of a good algorithm. To solve the fast Quardprog than using matlab to solve many!)
- 2014-01-09 14:42:59下载
- 积分:1
-
Digit_Recognition
数字识别的matlab仿真,通过图像裁剪,再有神经网络训练,可以达到很好的效果 (Digital Identification of matlab simulation, cutting through the images, there was a further neural network training, can achieve good results)
- 2008-06-27 10:57:44下载
- 积分:1
-
cppfrance_COMPRESSION-HUFFMAN___Page
code describing huffman methode with matlab
- 2011-01-29 09:45:41下载
- 积分:1
-
zuixiaoerchengfaqushixiangchuliMATLAB
最小二乘法 趋势项去除 程序 原理 matlab(matlab)
- 2010-05-22 12:43:07下载
- 积分:1
-
moxingbianshi
参数辨识问题,本程序是基于RLS法的参数辨识最新解法(Based on the RLS parameter identification)
- 2013-05-05 09:27:52下载
- 积分:1
-
Bayesian-estimation-program
贝叶斯估计 和极大似然估计的matlab程序(matlab program of Bayesian estimation and maximum likelihood estimation )
- 2014-05-30 00:21:32下载
- 积分:1
-
leach_for_wireless_network
无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement
energy saving and flexible management.To improve security and lifetime of clustering network,a secure
clustering was pro—
posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical
network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni—
cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be
prolonged.)
- 2010-05-14 15:52:16下载
- 积分:1