登录
首页 » Java » CAM-Java_v06192013

CAM-Java_v06192013

于 2015-06-03 发布 文件大小:5049KB
0 204
下载积分: 1 下载次数: 1

代码说明:

  Blind Source Separation

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • VRP
    这是一个用C++编写的vrp问题的源码,很适合初学者。(This is a C++ Prepared vrp source issues, it is suitable for beginners.)
    2008-12-14 00:01:32下载
    积分:1
  • multimoto_ica_pca_process_program
    四种想像动作的EEG信号处理 —— (基于ICA分析)(Four to imagine the action of the EEG signal processing- (analysis based on ICA))
    2012-07-04 16:28:30下载
    积分:1
  • QAM
    Implementation of Quadrature Amplitude Modulation-Demodulation
    2013-12-04 20:09:31下载
    积分:1
  • WuSPT
    This is WuSPT Matlab code This is WuSPT Matlab code
    2014-03-09 21:10:02下载
    积分:1
  • matlab_plot_gps_satellites
    卫星星下点matlab程序:卫星星下点的运行轨迹代码(Matlab program for satellite subsatellite point)
    2019-05-09 14:41:50下载
    积分:1
  • 300-examples-of-matlab-utility
    matlab 实用程序300例 短小精悍 在编程时查询可用( 300 examples of matlab utility)
    2010-02-27 21:23:41下载
    积分:1
  • eee
    杨氏双缝干涉 两相干光源到接收屏上P点距离r1=(D2+(y-a/2)2)1/2, r2=(D2+(y+a/2)2)1/2, 满足相干条件的光波叠加后,对于观察屏上某一确定点,即r1、r2确定后,叠加后的光强为 式中λ为光波的波长, 、 ,令相位差φ=2π(r2-r1)/λ, 最后可得公式如下: , 最后光强I=4I0cos2(Φ/2)。 观察相干光叠加后光强的分布. (Young' s double slit interference two coherent light source to the point P on the receiving screen distance r1 = (D2+ (YA/2) 2) 1/2, r2 = (D2+ (y+a/2) 2) 1/2, meet coherent conditions lightwave after superposition, for a determined point on the viewing screen, i.e. R1, R2 is determined, the superimposed light intensity where λ is the wavelength of light, make the phase difference φ = 2π (R2-R1)/λ, final can be obtained using the following formula: Finally, the light intensity I = 4I0cos2 (φ/2). Observed coherent superposition of light intensity distribution.)
    2013-01-03 21:04:13下载
    积分:1
  • emd
    经验模态分解,依据数据自身的时间尺度特征来进行信号分解,给出本征函数。(Empirical mode decomposition, based on the data itself characteristic time scale for signal decomposition, given the intrinsic function.)
    2013-12-19 13:24:45下载
    积分:1
  • p53-perrig
    They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
    2010-06-23 14:54:15下载
    积分:1
  • matlab-function
    关于matlab中的一些函数,以及对于函数的使用与说明(A document which is about the function in matlab)
    2012-04-16 09:23:08下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载