-
567
LTE-A系统的最新进展,对超前研究LTE-A系统的非常有帮助(LTE-A system of the latest, on the advance of LTE-A system very helpful)
- 2010-05-09 12:39:45下载
- 积分:1
-
RANKING
我自己应用的MATLAB程序,已经使用,效果不错,大家可以下载试试。(MATLAB program my own applications, has been used, good results, you can download to try.
)
- 2012-04-21 06:56:01下载
- 积分:1
-
bin
8queen, rolet algorithm any program is in matlam platform format
- 2013-01-13 23:26:24下载
- 积分:1
-
leap_frog
leap frog algorithm for solving metaheuristic problems and shortening the path to find the most optimized path.
- 2013-12-16 16:18:07下载
- 积分:1
-
Induction_motor_Control
Matlab implementation of Induction motor control and converter implementation
- 2015-04-06 19:40:07下载
- 积分:1
-
jpeg-code-matlab
JPEG matlab code each and every function commented
- 2011-04-27 12:30:46下载
- 积分:1
-
dc_indxvb
Commercial power systems are usually too large to allow for hand solution of the power flow.
- 2011-07-13 23:38:36下载
- 积分:1
-
ofdmce
程序是OFDM系统整个发送接收过程,其中包含QPSK调制解调,快速傅里叶正逆变换,还有信道估计等过程。(The procedure is the OFDM transmitting and receiving process of the system, which includes QPSK modulation and demodulation, and inverse fast Fourier transform, and the channel estimation process.)
- 2013-11-23 21:00:03下载
- 积分:1
-
SimulationofFuzzylogiccontrolbsaedDCmotor
Ind Simulation of Fuzzy logic controller bsaed DC motor .uainf mTL chck it
- 2013-11-28 22:08:16下载
- 积分:1
-
A-Novel-Strategy
Image steganography technique is widely used to realize the secrecy transmission.
Although its strategies on classical computers have been extensively researched, there
are few studies on such strategies on quantum computers. Therefore, in this paper, a novel,
secure and keyless steganography approach for images on quantum computers is proposed
based on Moir´ e pattern. Algorithms based on the Moir´ e pattern are proposed for binary
image embedding and extraction. Based on the novel enhanced quantum representation of
digital images (NEQR), recursive and progressively layered quantum circuits for embedding
and extraction operations are designed. In the end, experiments are done to verify the
validity and robustness of proposed methods, which confirms that the approach in this paper
is effective in quantum image steganography strategy.
- 2015-01-22 12:22:31下载
- 积分:1