登录
首页 » matlab » motionEst4SS

motionEst4SS

于 2008-04-14 发布 文件大小:2KB
0 211
下载积分: 1 下载次数: 43

代码说明:

  四步搜索算法对三步算法进行了适当的改进,在一定程度上弥补了TSS算法在估计细小运动时的不足,并加入了半途中止的策略,进一步提高了搜索精度 (Four-step search algorithm for three-step algorithm to improve the appropriate, to a certain extent make up for the TSS algorithm in estimating the inadequacy of a small movement, and joined the mid-suspension strategy to further improve the search accuracy)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • interleaver_3GPP
    3GPP标准交织器,南京邮电大学,通信工程系(3GPP standard interleaver)
    2010-08-05 21:50:31下载
    积分:1
  • transformed-kernel
    用变形核密度模型对数据的统计分布进行估计,常用于金融信用分析、财产保险精算等领域,是一个很有效、常用的非参数模型(Deformation of the nuclear density model of the statistical distribution of the data to estimate the financial credit analysis, property insurance and actuarial fields, is a very effective and commonly used non-parametric model)
    2012-04-11 16:38:14下载
    积分:1
  • metalcontrast
    计算金属介电常数,用matlab模拟金属介电常数(The calculated metal dielectric constant, using matlab simulation of metal permittivity)
    2013-03-07 09:59:32下载
    积分:1
  • LAB-8
    Communication Systems Lab 8
    2014-12-21 23:01:27下载
    积分:1
  • Onduleur-Simulink
    2 level Voltage inverter in simulink
    2013-05-03 05:42:57下载
    积分:1
  • xubiniq
    图像处理实验,大学生创新实验的测试程序,希望对广大同学有所帮助(Image processing experiments, students test innovative experimental procedures in the hope of the majority of students to help)
    2010-08-15 17:21:53下载
    积分:1
  • MATLAB-Tutorial-whole-plot
    MATLAB作图教程、详细的一维、二维、三维作图的教程。(MATLAB drawing tutorials, detailed one-dimensional, two-dimensional, three-dimensional mapping tutorial.)
    2013-09-02 08:57:38下载
    积分:1
  • Nouveau-dossier-(2)
    there is any methods of classification
    2011-10-25 19:07:07下载
    积分:1
  • Iris_32
    Reliable authorization and authentication are becoming necessary for many everyday applications such as boarding an aircraft, performing financial transaction, logging to a secure system etc. Identity verification becomes a challenging task when it has to be automated with high accuracy and with low probability of break-ins and low rates of false match. Moreover, person verification is not a new problem and society had created three traditional modes of designation: 1. Possessions: Physical possessions such as keys, passports and smart cards. 2. Knowledge: Pieces of information those are secret and known only to the right person such as PIN, passwords, user names etc. 3. Biometrics: Physiological and behavioral characteristics of individuals that distinguish one person from the others. These characteristics are different in each person.
    2013-04-27 08:51:33下载
    积分:1
  • dec
    hey there!this is the matlab code for DEC protocol for wireless sensor networks.hope you will find it helpful...
    2015-03-02 22:14:52下载
    积分:1
  • 696516资源总数
  • 106409会员总数
  • 8今日下载