登录
首页 » matlab » BLIND

BLIND

于 2011-04-07 发布 文件大小:2KB
0 174
下载积分: 1 下载次数: 0

代码说明:

说明:  IBD算法源代码 能够让初学者很好的了解IBD算法(blind image restoration)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • find_LUT_power_ranges
    基于LUT的数字预失真MATLAB代码 (LUT digital predistortion)
    2009-06-27 16:46:36下载
    积分:1
  • psychoacoustic.m
    基于Matlab的心理声学模型程序,喜欢的可以研究研究 (Psychoacoustic model based on Matlab program, like research can be studied)
    2021-04-22 22:38:48下载
    积分:1
  • S_function
    S_函数使用及应用举例,本书详细的介绍了关于matlab中simulink仿真的基础知识(simulink S-function example)
    2011-12-12 20:58:55下载
    积分:1
  • tamrin-seri-2
    matlab program for adapting filter
    2014-01-29 19:27:24下载
    积分:1
  • ssa
    即奇异谱分析,广泛应用于信号识别与预测。(SSA, that singular spectrum analysis, widely used in signal recognition and prediction.)
    2014-01-26 21:19:40下载
    积分:1
  • matlab
    matlab lagran.m 拉格朗日插值 divDiff 牛顿差商表(matlab lagran.m divDiff.m)
    2009-10-03 09:36:13下载
    积分:1
  • simulation_PD1
    本程序是一般PD雷达的套完整的仿真程序,包括脉压,MTD,CFAR等过程。(This procedure is generally complete set of PD radar simulation program, including pulse pressure, MTD, CFAR and other processes.)
    2011-06-12 11:12:07下载
    积分:1
  • colorization
    给灰度图像任意着色,利用随机游走算法,色彩空间变换,通过YCbCr色彩空间完成图像着色(Any color to grayscale images using random walk algorithm, color space conversion, the YCbCr color space to complete the image coloring)
    2012-12-28 10:24:15下载
    积分:1
  • transmission-network
    matlab下的输电网潮流计算程序,可供参考用,内带说明(transmission network under matlab flow calculation program, available for reference, with a description of the)
    2011-04-20 09:16:58下载
    积分:1
  • leach_for_wireless_network
    无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement energy saving and flexible management.To improve security and lifetime of clustering network,a secure clustering was pro— posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni— cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be prolonged.)
    2010-05-14 15:52:16下载
    积分:1
  • 696518资源总数
  • 106242会员总数
  • 10今日下载