登录
首页 » matlab » process

process

于 2009-05-10 发布 文件大小:1KB
0 78
下载积分: 1 下载次数: 100

代码说明:

  用matlab编写图像纹理特征提取的一个程序,可以用在图像处理中(Matlab image with the preparation of a texture feature extraction procedure can be used in image processing)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • NSCTdenoising
    说明:  两种基于非下采样变换图像去噪方法,效果比contourlet变换要好(Two transform based image denoising nonsubsampled method, the effect is better than contourlet transform)
    2011-04-09 11:24:57下载
    积分:1
  • Wavelet-based-audio-watermark--code
    基于小波的音频水印嵌入代码。采用DB1小波(Wavelet-based audio watermark embedding code. Using wavelet DB1)
    2011-11-07 14:42:13下载
    积分:1
  • 原始教程
    说明:  SLAM 原始教程。SLAM原始教程;SLAM原始教程S;LAM原始教程;SLAM原始教程(Original SLAM tutorial. SLAM original tutorial)
    2020-06-06 09:37:54下载
    积分:1
  • Computational
    分析一维波动方程的各种格式精度等特性,附按钮界面,一共七种格式,可在代码中修改步长,时间等等,展现动画(analysize seven schemes for one-dimensional wave equation with animation.)
    2013-05-04 14:09:37下载
    积分:1
  • 音乐合成
    提取一首歌曲内音符的音阶和节拍,并由此获得频率和时长。结合采样率制作成电子音乐                                                                                            
    2022-04-17 11:07:05下载
    积分:1
  • wavelet-analysis
    该程序用来对连续时间序列资料进行小波分析,后面附带成图代码(wavelet analysis)
    2015-04-17 11:11:44下载
    积分:1
  • 灰太狼优化(GWO)
    灰太狼优化(GWO)算法模仿领导层次结构和性质灰狼狩猎机制。四种类型的灰狼,如α,β,δ,和欧米茄都采用模拟的领导层次结构。此外,三个主要步骤狩猎,寻找猎物,猎物包围和攻击猎物,实现执行优化。
    2022-03-07 06:29:49下载
    积分:1
  • 在Matlab插值例程
    Interpolation routines in matlab
    2023-07-25 09:20:03下载
    积分:1
  • LKTK
    Recovering 3-D structure from motion in noisy 2-D images is a problem addressed by many vision system researchers. By consistently tracking feature points of interest across multiple images using a methodology first described by Lucas-Kanade, a 3-D shape of the scene can be reconstructed using these features points using the factorization method developed by Tomasi-Kanade.
    2009-03-13 13:18:40下载
    积分:1
  • DWT
    代码利用DWT算法实现了电子水印技术。 其中包括了水印的插入,提取,以及4种不同的攻击。最后,测量了psnr(This algorithm describe digital watermark algorithm by using DWT. It implements embedding, extraction, and 4 different attacks. in the end, it measures psnr)
    2009-03-22 23:04:52下载
    积分:1
  • 696518资源总数
  • 105714会员总数
  • 27今日下载