-
wjtzlxptztq
硕士学位论文基于无线传感器网络目标识别,调制连续谱特征提取(Master' s degree thesis on wireless sensor networks target recognition, feature extraction continuous spectrum modulation)
- 2011-09-13 21:39:26下载
- 积分:1
-
eemd
Ensemble Empirical Mode Decomposition的完整源码(Ensemble Empirical Mode Decomposition of the complete source code)
- 2009-10-05 11:52:35下载
- 积分:1
-
SegmentbyGA
基于遗传算法的道路图象分割,分割结果非常理想,可适用于各种环境.(The road based on genetic algorithms image segmentation, segmentation results are highly satisfactory and applicable to various environments.)
- 2008-03-18 15:59:05下载
- 积分:1
-
article--Analysis-and-Simulation-of-Five-Phase
In this paper, a dq model based on transformation
theory for five-phase induction machines is presented. A detailed
implementation of an indirect-type five-phase field-orientation
control including the hysteresis-type pulsewidth modulation
(PWM) current regulator is described. A method for continuous
and disturbance-free operation of a five-phase field-orientedcontrolled
induction motor drive with complete loss of one, two,
or even three legs of the inverter or motor phases is described.
A complete analysis and computer simulation of this control
technique is included.
- 2014-10-20 14:05:13下载
- 积分:1
-
70471737APF
filtre active parallèle pour la qualité d énergie
- 2013-12-08 00:23:53下载
- 积分:1
-
Matlab
100个matlab小程序,主要是一些基本的matlab程序(100 matlab small procedures, mainly some basic matlab program)
- 2013-12-10 19:56:45下载
- 积分:1
-
neural_network_bp
说明: BP神经网络的一种回归算法研究,MATLAB实现并已通过系统仿真测试(A return of BP neural network algorithm, MATLAB simulation to achieve and have passed the test)
- 2010-04-26 23:14:57下载
- 积分:1
-
978-1-4471-4681-0
Robust Control Design with MATLAB® 2nd 源码(Robust Control Design with MATLAB 2nd matlab Source)
- 2014-09-29 01:36:16下载
- 积分:1
-
hash
散列算法,用于生成原始消息的数字指纹,本算发基于MATLAB编写,本算法包含多种流行的散列算法,包括SHA1和SHA-256等广泛应用的散列算法,通过本程序,可以对几种广泛应用的散列算法进行调用(Hash algorithm used to generate the digital fingerprint of the original message, this is based on MATLAB, this algorithm contains a variety of popular hash algorithm, including SHA1 and SHA- 256 hash algorithm is widely used, through this program, several widely used hash algorithms can be invoked)
- 2013-11-25 16:49:22下载
- 积分:1
-
MaM
经典频偏估计算法分析研究中M&M算法的仿真实例(Classic analysis of the frequency offset estimation algorithm M & M algorithm simulation)
- 2014-05-07 14:35:31下载
- 积分:1