登录
首页 » matlab » MTD-mat

MTD-mat

于 2020-02-16 发布
0 98
下载积分: 1 下载次数: 8

代码说明:

说明:  非常非常非常好的动目标显示和动目标检测的仿真程序,对学习雷达动目标检测相关知识的同学很有用(Very, very good simulation program of moving target display and moving target detection, which is very useful for students who study the knowledge of radar moving target detection)

文件列表:

mtd_mat, 0 , 2008-07-04
mtd_mat\mtd_mat, 0 , 2008-07-04
mtd_mat\mtd_mat\fir_banks16.m, 563 , 2007-04-27
mtd_mat\mtd_mat\fir_banks8.m, 409 , 2007-04-28
mtd_mat\mtd_mat\fir_mtd16.m, 3797 , 2007-04-28
mtd_mat\mtd_mat\fir_mtd8.m, 3049 , 2007-04-28
mtd_mat\mtd_mat\fir_mtd_test16.asv, 3072 , 2007-04-28
mtd_mat\mtd_mat\fir_mtd_test16.m, 3069 , 2007-04-28
mtd_mat\mtd_mat\fir_mtd_test8.m, 2406 , 2007-04-28
mtd_mat\mtd_mat\l1.fda, 3904 , 2007-04-26
mtd_mat\mtd_mat\l2.fda, 3717 , 2007-04-27
mtd_mat\mtd_mat\mti_fft16.m, 2542 , 2007-04-26
mtd_mat\mtd_mat\mti_fft8.m, 2039 , 2007-04-28
mtd_mat\mtd_mat\mti_fft_test16.asv, 2261 , 2007-04-28
mtd_mat\mtd_mat\mti_fft_test16.m, 2261 , 2007-04-28
mtd_mat\mtd_mat\mti_fft_test8.asv, 1664 , 2007-04-28
mtd_mat\mtd_mat\mti_fft_test8.m, 1664 , 2007-04-28

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • FCMClust
    FCM聚类算法 已经通过调试,可以直接使用。(FCM clustering algorithm has been through debugging, can be used directly.)
    2013-07-17 15:54:27下载
    积分:1
  • FEM_mesh
    Generating FEM mesh grids
    2012-06-26 21:16:51下载
    积分:1
  • threephgrid1
    基于单周期控制的逆变器,采用MATLAB进行系统建模仿真。(Based on one cycle control inverter, using MATLAB system modeling and simulation.)
    2012-05-02 22:39:51下载
    积分:1
  • tuxiangfenge
    Matlab的一个自动图像分割文字识别代码(An automatic image segmentation Matlab code text recognition)
    2014-02-07 16:53:04下载
    积分:1
  • cut_sample
    说明:   使用二分法对样本集进行剪辑,剪辑法的思想,就是将样本集分成训练集与考试集, 利用训练集样本对考试集的样本进行分类(使用近邻法),如果考试集中某个样本分类错误的话,将这个样本删除。在该函数中,使用最近邻法,只进行一次剪辑(遍历完考试集中的样本以后退出)。还有一种重复剪辑法(适用于样本比较多的情况),把样本随机分为多个样本集,将相邻的两个样本前一个作为考试集,后一个作为训练集,调用二分剪辑。所有的样本子集剪辑完毕以后,在递归调用,直到没有样本被剪辑掉,没得讲,重复剪辑的效果肯定好一些。 (The sample sets using the dichotomy of the clips, editing law idea is to sample set into training set and test set, using the training set samples to the test set of samples (using the nearest neighbor algorithm), if the examination focused on a sample of classification error then delete this sample. In the function, use the nearest neighbor method, only once clips (focused on a sample of traversal finished after the exit exam). There is also a repeat clip method (samples are more applicable to the case), the samples were randomly divided into multiple sample set, the two adjacent samples of the former one as a test set, the latter one as a training set, call the two sub-clips. All the samples were a subset of the clips after they have finished, in the recursive call, until there are no samples were clip out, did not have to say that the effect of repeated clips definitely better.)
    2010-03-19 11:13:13下载
    积分:1
  • PMSM-good
    各种可直接运行的matlab simulink的电机模型(Variety can be directly run matlab simulink motor model)
    2013-11-21 10:11:40下载
    积分:1
  • ee473project
    Synthesizes musical notes and plays music, matlab code
    2015-03-07 23:02:42下载
    积分:1
  • 3
    基于matlab简单图像处理系统中对图片的加噪功能(Based on a simple matlab image processing system for image plus noise functions)
    2014-01-19 22:19:54下载
    积分:1
  • 03 灰色预测模型
    灰色系统理论是研究解决灰色系统分析、建模、 预测、决策和控制的理论.灰色预测是对灰色系统 所做的预测.目前常用的一些预测方法(如回归分 析等),需要较大的样本.若样本较小,常造成较 大误差,使预测目标失效.灰色预测模型所需建模 信息少,运算方便,建模精度高,在各种预测领 域都有着广泛的应用,是处理小样本预测问题的 有效工具(Grey system theory is the research and solution of grey system analysis, modeling, The theory of prediction, decision - making and control At present, some commonly used prediction methods (such as regression score) If the sample size is small, it often results in a comparison Large error, so that the prediction of the target failure Less information, convenient operation, high modeling accuracy, in a variety of prediction collar Fields are widely used to deal with small sample prediction problems Effective tool)
    2019-01-27 09:26:31下载
    积分:1
  • string-data-encryption
    Data Encryption by Matrix Multiplication We will only use numbers 0 to 26 for the encryptive mathematics operation. Numbers from 1 to 26 are for letters from A to Z and 0 is for all non-letter characters. To minimize usage of numbers, all letters are converted to upper case. The original message is converted to number array according to the ASCII table and minus 64. We partition whole array into blocks of 8 numbers. The last block may be added several zeros. Then multiply each block by the an 8x8 matrix A which is invertible in Z27 to get cipher data. The decryption is the same process except to use its inverse matrix B. For good visual reading, we convert all non-letter characters to under score for the decryption.
    2012-06-24 02:58:53下载
    积分:1
  • 696524资源总数
  • 103872会员总数
  • 62今日下载