-
chengxu
基于MATLAB的遗传算法实现,或许对你有所帮助,(Genetic Algorithm Based on MATLAB implementation, may be helpful to you,)
- 2009-03-18 14:18:50下载
- 积分:1
-
06782312
一篇非常经典的LEACH协议改进文献,值得大家学习,在此与大家共享。(It is a very useful book that about LEACH protocol! You can study it and get you want.thank you!)
- 2014-10-02 22:28:53下载
- 积分:1
-
tianchongtuxiao
用于填冲图片中的空白域,设定一个种子点,然后从种子点开始填冲(Used to fill in the blank fields punch picture, set a seed point, and then rushed from the seeds begin to fill)
- 2013-10-20 19:29:41下载
- 积分:1
-
Space-Reconstruction
非线性时间序列分析,相空间重构的参数选择,包括时间序列延迟计算和嵌入维数计算
(Nonlinear time series analysis, parameter selection phase space reconstruction, including time-series delay calculation and embedding dimension calculation)
- 2014-12-15 20:46:31下载
- 积分:1
-
LocalService
internally keep track of Call states to maintain information for Call Waiting and 3Way for CDMA instance of Phone App.
- 2013-12-02 15:04:25下载
- 积分:1
-
shengtai5
模拟退火算法 用matlab实现
有注释(Simulated annealing algorithm to achieve annotated with matlab)
- 2009-05-30 14:56:32下载
- 积分:1
-
BUAD-GUI-MATLAB
tutorial matlab berbahasa indonesia gratis
- 2013-09-07 05:31:29下载
- 积分:1
-
exp1
matlab程序实现下面的功能:过程的输入驱动采用M序列,即u(k)是一个M序列。过程传递函数G(s)中K=120,T1=8.3Sec,T2=6.2Sec。过程的脉冲响应理论值g(k)满足。根据过程的输入输出数据u(k)和z(k),利用相关分析算法估计出过程的脉冲响应值g2(k),并且有。(Process input is driven by the M sequence, i.e., u (k) is an M sequence. Process transfer function G (s) K = 120, T1 = 8.3Sec T2 = 6.2Sec. The impulse response of the process of the theoretical value of g (k) meet. According to the process input and output data u (k) and z (k), the estimated impulse response of a process value g2 (k), and the correlation analysis algorithm.)
- 2013-04-30 11:56:19下载
- 积分:1
-
OFDMwithwindowing
说明: OFDM加窗的matlab源码,主要用于降低峰均功率比(OFDM with windows matlab source, mainly used to reduce the PAPR)
- 2010-04-11 14:52:26下载
- 积分:1
-
TAODV-LATEST-CODE
The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks.
- 2021-02-14 22:49:48下载
- 积分:1