登录
首页 » matlab » SVD_TLS

SVD_TLS

于 2008-11-03 发布 文件大小:1KB
0 214
下载积分: 1 下载次数: 0

代码说明:

说明:  使用自编函数基于奇异值分解总体最小二乘法(svd-tls)实现AR模型谱估计 (The use of self-functions in general based on singular value decomposition least square method (svd-tls) to achieve AR model spectrum estimation)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 20100528KFDA
    完整的核主元分析法程序,包含训练识别功能,希望有所帮助。(Complete nuclear principal component analysis procedures, including training in recognition, hope that helps)
    2010-05-27 14:46:49下载
    积分:1
  • SingleFreqCancel
    噪声对消源程序,大家可以借鉴一下,还是比较容易看懂(noise cancellation source, we can learn from this, is still relatively easy to understand)
    2007-01-22 14:24:43下载
    积分:1
  • matlab_vc
    如何在vc6中调用matlab引擎进行科学计算。 包括,初始化引擎,数据交换等。(How to call matlab engine vc6 for scientific computing. Include engine initialization, data exchange, etc..)
    2007-12-05 20:11:42下载
    积分:1
  • target-tracking-using-kalman
    说明:  此代码包含运动目标检测和卡尔曼滤波,其中有测试序列(This code contains the moving target detection and filtering, which test sequences)
    2011-03-15 20:20:51下载
    积分:1
  • T_S
    TS who to use AR in signal processing
    2013-01-22 04:08:07下载
    积分:1
  • Butterworth-filter-order-and-cutoff-frequency
    jdfhjsdhjf dmfnmdmfdfdfdff
    2011-10-05 14:34:03下载
    积分:1
  • WGUO2zipa
    关于小波去噪的MATLAB源程序序实现图像和信号的去噪可直接使用。 (On Wavelet Denoising MATLAB source sequence image and signal denoising can be used directly.)
    2012-10-07 00:36:27下载
    积分:1
  • ZSI_SBC_Open_Loop_Perfect
    this file is a simulation of simple boost control in z_zource inverter
    2013-12-10 01:56:30下载
    积分:1
  • chuong-trinh-ver-2.0
    This paper presents a novel algorithm of hiding secret messages by applying mathematical lemmas and information theory. The proposed algorithm can hide more information with acceptable embedded rate and achieves requirements of information hiding algorithm and simply information extracting. The main idea is applying modern algebra to solve the information hiding problem in multimedia. In order to prevent some attacks on stganography, hidden initial bits of image data pixels are chosen randomly. The extracted information are achieved without the reference of the original image and extracted keys. The experiment results show that our approach is effective and reliable.
    2014-02-20 20:49:27下载
    积分:1
  • RK2_system4_2a
    rungekutta 2nd order pde
    2015-11-15 07:03:28下载
    积分:1
  • 696518资源总数
  • 106215会员总数
  • 5今日下载