登录
首页 » matlab » MATLAB-code-extension-method

MATLAB-code-extension-method

于 2011-05-12 发布 文件大小:5KB
0 122
下载积分: 1 下载次数: 80

代码说明:

  可拓学是我国学者蔡文研究员提出的原创性学科,本代码为一个简单的可拓学MATLAB代码。可拓方法的MATLAB代码(Extension Tsai Wen in China is the original researcher' s discipline, the code for a simple Extension MATLAB code. MATLAB code extension method)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • encrypt
    encrypting data in an image function
    2010-09-20 10:54:19下载
    积分:1
  • pso toolbox
    基于MATLAB的微粒群工具箱,算法模型中引入收缩因子,收敛速度有所提高,但对高维函数的优化效果仍然不理想。(based on MATLAB Toolbox PSO algorithm model introduced shrinkage factor, convergence rate increase, but for high-dimensional optimization function effects are still not ideal.)
    2005-04-16 15:53:10下载
    积分:1
  • hmm_model
    inicializacion, entrenamiento y validacion de modelos hmm para reconocimiento de digitos
    2009-05-14 01:16:43下载
    积分:1
  • floatga
    用matlab编写的十进制的遗传算法程序,用来实现实数编码遗传算法。()
    2008-07-05 10:08:12下载
    积分:1
  • theta_geshi
    抛物型方程的加权隐式差分格式程序,通过该程序读者可以不同选择 加权因子 THETE 可以得到四种不同的差分格式。(Parabolic equations weighted implicit difference scheme program, through the program readers the different options the weighting factor THETE can get four different differential format.)
    2013-01-15 19:58:20下载
    积分:1
  • yiqunsuanfa
    蚁群算法是目前应用最广的智能算法之一,该程序应用蚁群算法求解最优路径(Ant colony algorithm is one of the most widely used intelligent algorithm, the program ant colony algorithm for optimal path)
    2014-01-16 11:07:52下载
    积分:1
  • divdiff
    numerical solutions by devided difference methods
    2012-11-27 20:09:42下载
    积分:1
  • finger-recong
    指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。 三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
    2007-05-02 23:49:15下载
    积分:1
  • travel
    Travelling salesman problem
    2011-10-08 16:22:22下载
    积分:1
  • irep_2010_hopf_dg
    Article published in IREP about Hopf bifurcation
    2012-01-31 21:01:04下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 42今日下载