-
S-function-manual
S函数说明书,说明了S函数的模板样式,以及一些编写的注意事项(S-function manual, the S-function template styles, as well as a number of precautions written)
- 2013-03-11 10:33:59下载
- 积分:1
-
problem1
MATLAB codes for Finite Element Analysis
problem1.m
antonio ferreira 2008
- 2013-10-01 18:58:53下载
- 积分:1
-
Centrality-measures
文件包括:1.计算平均最短路径;2.计算每个顶点相邻节点的平均度;3.计算每个节点的邻近中心度;4.计算节点的介数(slow);5.计算节点的介数(faster);6.计算每条边的介数值;7.快速迪杰斯特拉算法;8.经典迪杰斯特拉算法。(1.the average shortest path in the graph 2.the average degree of neighboring nodes for every vertex 3.computes the closeness centrality for all vertices 4.node betweenness, (number of shortest paths definition) 5.a faster node betweenness algorithm 6.edge betweenness, (number of shortest paths definition) 7.simple Dijkstra, does not remember the path 8.Dijkstra which also returns the shortest paths.)
- 2021-04-23 19:38:47下载
- 积分:1
-
BPSK_ISI_Coding_DFE_No_ssrcf_AllinOne
BPSK Viterbi Soft/Hard Decoding
- 2020-12-01 14:19:27下载
- 积分:1
-
EKF
应用于三自由度车辆模型的扩展卡尔曼滤波程序(Extended Kalman Filter controllrt for Three degree of freedom vehicle model)
- 2017-06-06 14:09:31下载
- 积分:1
-
work
说明: 经典《信号与系统》教程的matlab例程,对深入理解信号与系统相关概念有很大帮助,几乎每章都matlab的例程。(Classic )
- 2008-09-22 19:31:11下载
- 积分:1
-
yiakuo
对图象进行压扩变化
内含一个Word 文档 将其输入MATLAB 可直接运行(Change of image compression and expansion of a Word document containing its input can be directly run MATLAB)
- 2010-06-12 16:39:51下载
- 积分:1
-
watermarking
语音水印算法的matlab 编程实现,毕业设计,基于小波,到谱分析(Audio Watermarking Techniques implemented by the MATLAB PROGRAMMING)
- 2010-07-30 16:32:56下载
- 积分:1
-
Pufeng_method_to_calculate_pi
说明: 本文件包括葡丰概率实验测定pi的方法介绍和matlab实现方法,简单易用。(This document includes the experimental determination of the probability of Portugal Fung pi method matlab introduction and realization of methods, easy to use.)
- 2008-09-12 10:29:57下载
- 积分:1
-
d-(1)
网对此说道稳定调查单位为氮测定法v稳定成为当刺猬刺猬刺猬侧完成单位从汶川(In cognitive radio networks, power control is considered as an important issue to improve the performance of dynamic spectrum sharing. In this paper, in order to maximize the efficiency of the system, the secondary users and primary user behaviors will be considered. )
- 2011-11-28 23:12:57下载
- 积分:1