-
Wavelet_Denoise
a MATLAB function for denoising images via wavelet transform
- 2011-12-23 02:40:11下载
- 积分:1
-
whk
平面六节点单元有限元分析,主要应用MATLAB的有限元分析(Planar six-node element finite element analysis, the main finite element analysis using MATLAB)
- 2011-07-25 11:10:42下载
- 积分:1
-
wong_wat
ce tp consiste a tatoué une image avec le principe de wong
- 2015-03-07 01:04:51下载
- 积分:1
-
endpoint
说明: 语音识别端点检测全过程的matlab程序,运行测试能出结果,希望对你们有用,实在没点数才把自己压箱底的东西拿出来,呜呜(Speech Recognition whole process endpoint detection matlab program, run the test to the result, I hope helpful for you, it is only then did their own pressure points things bottom out, whining)
- 2011-03-08 11:28:49下载
- 积分:1
-
ieee33distribute_3
IEEE33节点搭建matlab模型,适用于电力系统配电网电压控制计算仿真(IEEE33 node builds matlab model, which is suitable for power system distribution network voltage control simulation.)
- 2018-04-02 11:35:48下载
- 积分:1
-
refemproblem
finite element analysis code with matlab
- 2009-10-01 17:11:27下载
- 积分:1
-
is95
说明: QPSK仿真OQPSK仿真,通信原理资料上面的 (QPSK)
- 2010-03-26 19:58:31下载
- 积分:1
-
rd
说明: sar 仿真程序 点目标 简单的 RD算法(sar dot target)
- 2010-05-15 20:30:17下载
- 积分:1
-
matlab
基于数字图像跟matlab对车辆空位统计系统的实现,实现灰度图像的二值化,边缘检测等(Based on digital image with matlab of vehicle space statistical system, realize the gray image binarization, edge detection and so on)
- 2014-11-25 23:08:55下载
- 积分:1
-
dispatch
Finally, probability analysis, based on the chosen database, is performed and
judgment whether the person is recognized is pronounced. Two different modeling
techniques can be suggested for purposes of person identification or verification. The
approach based on Hidden Markov Speaker Models (HMMs) with the mixtures of
Gaussian distribution is text-dependent one. For this technology a speaker is
described by a set of HMMs, constructing the set of speech groups spoken by that
person. The speech groups may be phonemes or words [7]. The text-independent
technology is rested upon Gaussian Mixture Speaker Models. For this technology
each speaker is defined by only one model describing all utterances of that person.
Identification in the range of both approaches is executed by evaluation of maximum
a posteriori probability [7].
- 2013-12-14 14:24:24下载
- 积分:1