-
IMM
根据《多源信息融合》一书中的IMM多模型跟踪算法所写的仿真程序(According to )
- 2007-10-26 21:36:14下载
- 积分:1
-
Fibonacci_series
1.讨论数列的变化规律。
2.讨论调和级数的变化规律。(1. Discuss the changes of the number of columns.
2. To discuss the changes of harmonic progression.)
- 2009-12-22 16:27:25下载
- 积分:1
-
FilterASFMuxer
windows media format 9 samples for filter(nine samples for filter)
- 2006-06-02 16:17:08下载
- 积分:1
-
MATLAB-gui-biancheng
matlAB 关于GUI编程的很好的学习资料。包括各种控件、菜单的设计(MATLAB GUI programming is a good learning materials. Including a variety of controls, menu design)
- 2012-05-19 09:58:19下载
- 积分:1
-
pinlvhanshu
此实验是用于设计频率响应函数,有实验步骤和MATLAB代码。(It is very useful.)
- 2012-11-02 23:10:46下载
- 积分:1
-
BluetoothFrequencyHopping
this is about BluetoothFrequencyHopping
- 2010-08-12 02:06:19下载
- 积分:1
-
hough
这是一段关于hough变换的代码,用matlab编写。(This is a paragraph on the hough transform code written with matlab.)
- 2010-09-23 17:46:55下载
- 积分:1
-
metalog-0.6.tar
Metalog is a modern replacement for syslogd and klogd. The logged messages
can be dispatched according to their facility, urgency, program name and/or
Perl-compatible regular expressions. Log files can be automatically rotated
when they exceed a certain size or age. External shell scripts (e.g., mail)
can be launched when specific patterns are found.
Metalog is easier to configure than syslogd and syslog-ng, accepts unlimited
number of rules and has (switchable) memory bufferization for maximal
performance.(Metalog is a modern replacement for syslog d and klogd. The messages can be logged dispatch ed according to their facility, urgency, program name and/or Perl-compatible regular e xpressions. Log files can be automatically rot ated when they exceed a certain size or age. Exte rnal shell scripts (e.g., mail) can be launched when specific patterns ar e found. Metalog is easier to configure than sys logd and syslog-ng. accepts unlimited number of rules and has (swit chable) memory bufferization for maximal perf ormance.)
- 2006-12-11 23:40:58下载
- 积分:1
-
finger-recong
指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。
三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
- 2007-05-02 23:49:15下载
- 积分:1
-
Del1
it is .rar file.it contains some source codes..
- 2011-08-23 13:27:27下载
- 积分:1