登录
首页 » matlab » AFSA寻优

AFSA寻优

于 2019-11-13 发布
0 207
下载积分: 1 下载次数: 5

代码说明:

说明:  对人工鱼群算法的matlab编程,二元函数优化,。。。。(Function optimization)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • MSK
    the file is matlab about MSK
    2009-10-24 21:49:04下载
    积分:1
  • b_discrete1_cvx
    用cvx求解宽带最小二乘的波束形成,最新的程序,注释的地方很多,很有借鉴 (Many use cvx to solve broadband beamforming least squares, the latest program, notes the place, a very useful reference)
    2013-12-23 10:55:06下载
    积分:1
  • MATLAB_BASIC
    Matlab basics are explained to brief the concepts in details
    2014-02-20 20:14:39下载
    积分:1
  • exo_decouplage_courants
    Chapitre estimation de la vitesse de rotation Section Estimation de la vitesse de rotation par modèle adaptatif
    2010-12-18 21:35:01下载
    积分:1
  • wigb
    用于应用二维数组,生成地震记录剖面,对于地震模型的模拟数据快速生成剖面很有帮助。(A two-dimensional array for application and generates seismic records for seismic model section of analog data generated fast profile is very helpful. )
    2011-05-30 13:31:56下载
    积分:1
  • MCC_test
    Test MCC very powerfull!
    2012-09-15 23:00:14下载
    积分:1
  • Sparse_Representations_classifier
    一个常用的稀疏表示分类器,SRC分类器,用于信号或图像分类,需共同配合CVX运行,可见示例example.m。(Applying for Sparse Representaion Classification with the method SRC, cooperating with the CVX file. See example.m for a trying run.)
    2014-06-01 16:14:39下载
    积分:1
  • 维纳滤波LMS matlab
    维纳滤波,可以有效地滤除信号中的噪声,适应于某些工程(Wiener filtering.It can effectively filter the noise in the signal.Suitable for some projects)
    2019-06-21 15:21:18下载
    积分:1
  • WavletDecomposeTheFaultSignalPower
    选用DB小波对故障电力信号进行分解,从图中可轻易判断出故障点。(DB wavelet used to decompose the fault signal power, from the figure can easily determine the point of failure. )
    2010-12-25 11:38:08下载
    积分:1
  • dwt-matLab-marking
    提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人 部分# 首先对宿主图像进行小波分解 、 嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印 信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余 弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。(Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .)
    2011-05-15 23:25:27下载
    积分:1
  • 696516资源总数
  • 106605会员总数
  • 12今日下载