-
edgdetec
this program to help you in detection the edge of greylevel image
- 2010-09-29 14:47:16下载
- 积分:1
-
IIR
IIR滤波器的经典分析与比较,包括切比雪夫I型,II型、椭圆等!转换方式,冲击法,双线性(带通)(The classic IIR filter analysis and comparison, including chebyshev type I, II, elliptical, etc.! The switch pattern, impact method, double linear
(bandpass filer))
- 2011-05-13 09:42:19下载
- 积分:1
-
PICTURE
用matlab来实现各种滤波,如频域低通滤波,理想低通,巴特沃斯等。(Using matlab to achieve a variety of filters, such as frequency-domain low-pass filter,an ideal low-pass Butterworth and so on.)
- 2014-09-24 15:01:04下载
- 积分:1
-
twocurve3_ww
用于运动仿真 主要用于移动机器人路径规划问题,进行事实仿真,(for major sports simulation for mobile robot path planning, simulation fact,)
- 2007-02-05 10:11:17下载
- 积分:1
-
ltgubofenbuchengxu
LT编码的顾波分布函数及其调用函数程序,好不容易编的,很有用啊(LT codes Gu wave function is called the distribution function and its application, finally compiled, useful ah)
- 2011-11-05 20:38:19下载
- 积分:1
-
fuzzy-contral-matlab
关于倒立摆的模糊控制算法,有matlab程序进行仿真,是作业,有讲解(On the fuzzy control of inverted pendulum algorithm, matlab program simulation,it s homework。)
- 2015-03-23 12:17:37下载
- 积分:1
-
beam_flection
The program uses a simple algorithm to calculate the deflection at each point of a cantilever beam subjected to arbitrary loading distribution, the program also calculates and plots the bending moment and shear force in the beam.
- 2014-02-25 15:11:15下载
- 积分:1
-
司守奎、孙玺菁《数学建模算法与应用》随书光盘
说明: 司守奎、孙玺菁《数学建模算法与应用》随书光盘
所有代码
经典小黄书的代码
数学建模比赛必备(Si shoukui, sun xijing. Mathematical modeling algorithm and application. Cd-rom
All of the code
Classic little Yellow Book code
Mathematical modeling competition required)
- 2020-11-22 18:09:35下载
- 积分:1
-
HEU_KMSActtivator
说明: 本文提出了一种基于混沌加密的DCT域二值图像数字水印算法.该算法首先利用混沌序列将含有版权信息的有意义二值图像水印进行加密,然后利用人眼视觉系统(HVS)的特性将原始载体图像进行块分类,最后将不同强度的水印分量嵌入到不同类的图像块DCT中频系数中去.利用混沌序列对水印进行加密,使水印本身具有安全性,对数字作品进行双重保障.通过高斯噪声,椒盐噪声以及JPEG压缩和剪切等攻击试验,表明了该算法具有较好的鲁棒性.(Encryption in DCT domain is proposed. Firstly, the meaningful binary image watermark containing copyright information is encrypted by using chaotic sequence, and then the original image is classified by using the characteristics of human visual system (HVS), Finally, the watermark components with different intensities are embedded into the DCT intermediate frequency coefficients of different types of image blocks. Chaotic sequences are used to encrypt the watermark, so that the watermark itself has security and double protection for digital works. Experiments on Gaussian noise, salt and pepper noise, JPEG compression and clipping show that the algorithm has good robustness)
- 2021-04-15 12:12:28下载
- 积分:1
-
ImageRecovery.tar
Simple Image Recovery method
- 2009-06-10 21:46:37下载
- 积分:1