登录
首页 » matlab » basedHSV

basedHSV

于 2011-04-22 发布 文件大小:2177KB
0 246
下载积分: 1 下载次数: 8

代码说明:

  介绍MATLAB中,rgb转换到HSV,来解决一些问题达到目的。(Introduced in MATLAB, rgb conversion to HSV, to solve some problems achieve their goals.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • pso_finnal
    说明:  利用粒子群算法优化函数,对Rosenbrock最大值进行优化(Functions using particle swarm optimization, optimization of Rosenbrock maximum)
    2011-04-07 20:41:45下载
    积分:1
  • erjiguanyingyong
    文章介绍了二极管多种应用电路很实用的模电资料 (failed to translate)
    2011-05-25 15:11:05下载
    积分:1
  • matlab
    数字基带系统的传输.比较了PSK,ASK,FSK系统的误码率(Digital baseband transmission. Compared PSK, ASK, FSK system bit error rate)
    2013-05-18 18:18:31下载
    积分:1
  • matlab
    说明:  本文档是用MATLAB仿真各种信号的波变换(This document is a variety of signals using MATLAB simulation of wave transformation)
    2010-04-30 20:05:48下载
    积分:1
  • Mini-Sumo-3.2-Line-Sensor-Read
    This code for Embedded for Sumo Bot (sensor)
    2015-03-22 13:23:16下载
    积分:1
  • Whl
    改进的背景差分法,结合了背景差分法和帧间差分法的优点,能更好的进行视频处理。(Improved background subtraction method, combining the advantages of the background difference and frame difference method, and better video processing.)
    2021-01-01 17:58:57下载
    积分:1
  • 混沌时间序列分析中的G-P算法求关联
    混沌时间序列分析中的G-P算法求关联,可用,已经用过(Associate chaotic time series analysis algorithms for GP, available, has been used)
    2015-12-02 23:34:33下载
    积分:1
  • HBTFfangzhen
    说明:  dfig 基于DQ轴同步旋转坐标轴系数学模型下的双馈发电机simulink (H Fuzzy fangzhen)
    2010-04-01 19:59:51下载
    积分:1
  • 数据集
    本文件为常见聚类算法测试数据集 ,UCI上常用的聚类算法数据集(This document is a common clustering algorithm test data set.)
    2021-04-25 21:38:46下载
    积分:1
  • leach_for_wireless_network
    无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement energy saving and flexible management.To improve security and lifetime of clustering network,a secure clustering was pro— posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni— cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be prolonged.)
    2010-05-14 15:52:16下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载