登录
首页 » matlab » knn

knn

于 2014-12-23 发布 文件大小:1KB
0 123
下载积分: 1 下载次数: 17

代码说明:

  一个小小的knn-demo,先用knn 做分类器进行分类,再去验证正确率(A small knn-demo, first with knn Do classifier, go to verify that the correct rate)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • gamut_mapping
    using gamut mapping to analysis colour
    2012-07-18 16:19:46下载
    积分:1
  • pnn1
    PNN神经网络聚类法的MATLAB的源代码,自己编写的,很实用,希望对大家有所帮助。(PNN neural network clustering method for MATLAB source code, I have written, very practical, we want to help.)
    2010-06-05 16:57:01下载
    积分:1
  • chang-video-into-image
    通过对视频的适当修改,运用matlab软件实现视频图片提取。(chang video into image with matlab)
    2011-05-01 23:35:10下载
    积分:1
  • 6940937DS-CDMA
    Direct Sequence cdma
    2011-10-01 18:32:45下载
    积分:1
  • boost-converter
    boost converter how it will works.
    2014-10-16 17:44:07下载
    积分:1
  • MATLABtuxiangchulichengxu
    matlab数字图像处理的程序码源,包括很多常用的图像处理程序(matlab digital image processing program code source, including many commonly used image processing program)
    2013-04-01 00:40:18下载
    积分:1
  • matlab
    说明:  使用MATLAB语言求出两电荷间电势与电场的情况(Calculated using the MATLAB language between the two electric potential and electric charge of the situation)
    2011-03-24 09:22:40下载
    积分:1
  • overlap_add
    利用重叠相加法实现线性卷积,其中应用了fft和ifft原理(Use of overlap-add method to achieve linear convolution)
    2012-05-26 23:24:47下载
    积分:1
  • finger-recong
    指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。 三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
    2007-05-02 23:49:15下载
    积分:1
  • Bluepilling-the-Xen.pdf
    Bluepilling the Xen Hypervisor Joanna Rutkowska & Alexander Tereshkin Invisible Things Lab
    2014-10-24 05:30:35下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 42今日下载