-
chap5
《visual c++matlab图像处理与识别实用案例精选》源码(" Visual c++ matlab image processing and recognition of practical cases selected" source)
- 2009-05-09 22:53:42下载
- 积分:1
-
work
说明: matlab 计算pid 控制器,可以做任何计算很好用(apply matlab to compute PID controller)
- 2009-07-30 11:32:49下载
- 积分:1
-
newton-rapuson-powe-flow
基于Newton-Rapuson方法的配电网潮流计算的matlab源程序(power flow calculate matlab program)
- 2013-09-01 17:15:33下载
- 积分:1
-
IG-based-wind-turbine-model
A complete model of a wind energy conversion system is developed based on induction generator
- 2015-02-17 02:07:21下载
- 积分:1
-
GA
说明: 利用matlab编写的遗传算法实现控制系统的计算机程序的优化设计(using Matlab prepared by the Genetic Algorithm computer control system design optimization process)
- 2007-07-04 09:42:15下载
- 积分:1
-
immune
人工免疫算法的模式识别,用于故障诊断
(Pattern Recognition Artificial immune algorithm for fault diagnosis)
- 2010-06-04 23:19:50下载
- 积分:1
-
shulitongjiyuMATLABgongchengfengxi_example
<数理统计与MATLAB工程数据分析> 清华大学出版社
随书代码(<Mathematical statistics and MATLAB data analysis projects> Tsinghua University Press with the code book)
- 2008-06-19 00:40:02下载
- 积分:1
-
DIPUM-Toolbax-V1.1.3
对于数字图像等一系列处理进行系统的实验,有效提高自学者对于数字图像的能力(For digital image processing system, a series of experiments, effectively improve the scholars of digital image ability
)
- 2012-04-04 15:55:29下载
- 积分:1
-
AsyLnCPSO
粒子群算法在matlab中应用,很实用,很好用(Particle swarm optimization applications, very useful in matlab)
- 2013-04-06 20:23:53下载
- 积分:1
-
A-Novel-Strategy
Image steganography technique is widely used to realize the secrecy transmission.
Although its strategies on classical computers have been extensively researched, there
are few studies on such strategies on quantum computers. Therefore, in this paper, a novel,
secure and keyless steganography approach for images on quantum computers is proposed
based on Moir´ e pattern. Algorithms based on the Moir´ e pattern are proposed for binary
image embedding and extraction. Based on the novel enhanced quantum representation of
digital images (NEQR), recursive and progressively layered quantum circuits for embedding
and extraction operations are designed. In the end, experiments are done to verify the
validity and robustness of proposed methods, which confirms that the approach in this paper
is effective in quantum image steganography strategy.
- 2015-01-22 12:22:31下载
- 积分:1