登录
首页 » matlab » chap6_5

chap6_5

于 2009-06-17 发布 文件大小:1KB
0 223
下载积分: 1 下载次数: 3

代码说明:

  基于DRNN神经网络整定的PID控制第六章(DRNN-based neural network tuning of PID control(advanced PID control simulation matlab) Chapter VI)

文件列表:

chap6_5.m

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • FnnSimu
    source code of simlate function of fuzzy bp neural network
    2009-06-07 15:00:08下载
    积分:1
  • BP-network
    matlab 基于PID控制器的BP神经网络系统的仿真(matlab PID controller based on BP neural network system simulation)
    2011-01-07 17:24:20下载
    积分:1
  • picture
    说明:  利用FFT快速运算技术来实现在二维图像领域上的稀疏分解过程。(The use of FFT techniques to achieve fast computing in the field of two-dimensional image of the sparse decomposition process.)
    2009-08-11 11:21:32下载
    积分:1
  • CompareTo
    Compare To Source Code for Andriod.
    2014-01-01 11:14:59下载
    积分:1
  • 数据集
    本文件为常见聚类算法测试数据集 ,UCI上常用的聚类算法数据集(This document is a common clustering algorithm test data set.)
    2021-04-25 21:38:46下载
    积分:1
  • PSOwithfunction
    PSO : Particle swarm Optimization with Sphere function
    2010-01-15 14:45:35下载
    积分:1
  • my_a_nf
    说明:  直接型自适应滤波器的源码,并能实时跟踪测量信号频率,滤除白噪声和谐波(Direct source-type adaptive filter, and real-time tracking and measuring the signal frequency, filtered white noise and harmonic)
    2008-09-10 11:02:32下载
    积分:1
  • arnold
    利用arnold置换简单加密图片,并将其保存起来(Replacement using a simple encryption arnold pictures and save them)
    2010-06-02 21:47:48下载
    积分:1
  • 比较三种信道估计算法的MSE曲线,通过MSE来比较他们的性能
    说明:  比较三种信道估计算法的MSE曲线,通过MSE来比较他们的性能(Compare MSE curves of three channel estimation algorithms)
    2021-04-07 09:19:01下载
    积分:1
  • BlowfishEncryption
    Blowfish Algorithm is a Feistel Network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors. Blowfish is a variable-length key block cipher. It is suitable for applications where the key does not change often, like a communications link or an automatic file encryptor. It is significantly faster than most encryption algorithms when implemented on 32-bit microprocessors with large data caches.
    2011-06-09 18:03:09下载
    积分:1
  • 696516资源总数
  • 106914会员总数
  • 0今日下载