登录
首页 » matlab » moja_PVA_normiran_KNN_koncan

moja_PVA_normiran_KNN_koncan

于 2010-06-17 发布 文件大小:1KB
0 205
下载积分: 1 下载次数: 4

代码说明:

  PCA with K-nn classifier(for pictures)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • vectorielle
    la commande vectorille assossié avec l onduleur
    2010-11-13 18:25:40下载
    积分:1
  • SPIHT_Matlab_Demo
    matlab程序,EZW算法的改进算法SPIHT算法,一种编码算法(matlab program, EZW algorithm algorithm SPIHT algorithm, a coding algorithm)
    2010-06-02 13:52:50下载
    积分:1
  • SPECRND
    生成指定概率分布的随机数,可用于数学与金融的随机分析(Specify the probability distribution of randomly generated number, can be used for the stochastic analysis and financial mathematics)
    2011-10-15 17:14:52下载
    积分:1
  • Project-System-Identification-submit
    Project System Identification submit
    2013-10-10 22:09:10下载
    积分:1
  • MIMO
    在matlab的环境下,实现MIMO检测功能,包括最大似然检测(ML),最小均方误差(MMSE)检测和迫零(ZF)检测(In the matlab environment, to achieve MIMO detection, including maximum likelihood detection (ML), minimum mean square error (MMSE) detection and zero-forcing (ZF) detection)
    2021-04-26 20:28:45下载
    积分:1
  • 15823_chat
    Window下的select方式网络程序的范例(Window select the mode network programming paradigm)
    2005-02-22 13:40:52下载
    积分:1
  • sinx
    Matlab和C++混合编程,做出sin x图形(combination of matlab and C++)
    2010-02-26 23:22:20下载
    积分:1
  • leach
    LEACH protocol, stands for Low Energy Adaptive Clustering Hierarchy Protocol (Low Energy Adaptive Clustering Hierarchy), is a wireless sensor network routing protocols. LEACH protocol based algorithm, called LEACH algorithm.
    2015-04-09 17:23:55下载
    积分:1
  • string-data-encryption
    Data Encryption by Matrix Multiplication We will only use numbers 0 to 26 for the encryptive mathematics operation. Numbers from 1 to 26 are for letters from A to Z and 0 is for all non-letter characters. To minimize usage of numbers, all letters are converted to upper case. The original message is converted to number array according to the ASCII table and minus 64. We partition whole array into blocks of 8 numbers. The last block may be added several zeros. Then multiply each block by the an 8x8 matrix A which is invertible in Z27 to get cipher data. The decryption is the same process except to use its inverse matrix B. For good visual reading, we convert all non-letter characters to under score for the decryption.
    2012-06-24 02:58:53下载
    积分:1
  • Basic-matlab-codes
    Basic codes no matlab for engineer
    2013-05-03 18:30:34下载
    积分:1
  • 696516资源总数
  • 106409会员总数
  • 8今日下载