-
svm
一种用于小数据条件下进行分类的算法,分类器支持向量机svm(A condition for small data classification algorithms, support vector machine classifier svm)
- 2014-11-19 07:59:02下载
- 积分:1
-
matlab_opencl
A matlab example of interfacing with opencl
- 2015-04-17 23:20:10下载
- 积分:1
-
meshless1D
自己整理出来的几个常用的一维无网格方法的matlab程序。(Organize their own out of several commonly used one-dimensional meshless method matlab program.)
- 2009-04-21 20:27:34下载
- 积分:1
-
IS95
is-95前向链路通信系统仿真一个数据无线电的多接入方案,其用来发送声音,数据和在无线电话和蜂窝站点间发信号数据(如被拨的电话号码)。
(is-95 prior to link a data radio communication system simulation of multi-access program, which used to send voice, data and wireless phones and cellular sites in the signal between the data (such as by dial telephone number).)
- 2010-05-06 14:30:14下载
- 积分:1
-
BLIND-SOURCE-SEPARATION
BLIND SOURCE SEPARATION
- 2013-10-31 08:15:30下载
- 积分:1
-
jisuanqi4
计算器的功能实现程序,该程序一多次仿真通过,健壮好用(There was a new quiz show on television last night, but we were just outside and sitting down to dinner when it came on.)
- 2013-11-20 21:19:37下载
- 积分:1
-
kalman_predict_correct
本例是使用kalman filter作为状态观测器,对直流无刷电机的状态进行观测。从结果可以看出,对状态估计的效果非常的好(This example is the use of kalman filter as an observer state, the state of brushless DC motors were observed. As can be seen the results of state estimation of the effect is very good)
- 2015-04-09 14:23:16下载
- 积分:1
-
ECG
心电图信号(ECG)压缩技术,内含两种算法的原理及matlab源码,经测试可用。
1 转折点算法
2 AZTEC算法(Electrocardiogram signal (ECG) compression technology, includes two algorithms principles and matlab source code, have been tested. A turning point in the algorithm 2 AZTEC algorithm)
- 2020-12-09 07:09:19下载
- 积分:1
-
Image forgery
this code is for image forgery detection
used to detect the changes made in the image
- 2010-09-14 18:52:38下载
- 积分:1
-
matlab_watermark
本文算法是将24 位真彩图的亮度分量分块
DCT ,然后利用DCT 量化系数的奇偶特性嵌入8
位灰度水印图,并通过PN 序列加密来保证水印的
安全性。算法中,将灰度图像转换为二进制数据
流,置乱后扩频调制,隐藏在宿主DCT 系数量化值
中,提取时不需要宿主信号,实现水印信号的盲提
取。(This algorithm is 24-bit true color pictures of the luminance component of block DCT, quantization DCT coefficients and then use the parity properties of 8-bit grayscale watermark embedding map, and through the PN sequence of encryption to ensure the security of the watermark. Algorithm, the gray image into binary data stream, scrambling after the spread spectrum modulation, hidden in the host DCT coefficient quantization values, the extraction does not require the host signal, the blind watermark extraction.)
- 2010-12-24 11:11:10下载
- 积分:1