-
finish
实现快速傅里叶变换,自编函数FFT.而不需使用matlab自带的FFT函数(it can realize the fast fuleir tansform)
- 2009-09-11 16:25:25下载
- 积分:1
-
jibenwanglu
用MATLAB实现BA无标度网络、小世界网络,规则网络等复杂网络中常用的基本模型的计算机仿真程序(Using MATLAB BA scale-free networks, small-world networks, rules, networks and other complex networks commonly used in the basic model of a computer simulation program)
- 2013-08-04 11:35:17下载
- 积分:1
-
raw_bmp
raw图像格式与bmp图像格式的转换,matlab实现,具体参数详见m文件(raw image format and bmp image format conversion, implementate by matlab, the specific parameters detailed in m file)
- 2009-03-24 19:50:57下载
- 积分:1
-
untitled
this file is dtc for pmsm machine with simulink matlab, 12 sector
- 2011-09-25 15:05:14下载
- 积分:1
-
chapter22
蚁群算法解决TSP问题,成功验证了。希望对大家有帮助。(Ant colony algorithm to solve TSP, successfully verified. Hope everyone has to help.)
- 2014-10-23 09:55:25下载
- 积分:1
-
ch(2)-page(67)-ex(9)-descriptive-solution
dudu and hart chapter 2 excersise
- 2014-02-24 15:55:12下载
- 积分:1
-
camera_1
本代码是通过matlab程序实现摄像头的调用功能,可自行控制连拍操作。(This code is realized by matlab camera call function, can control the operation.)
- 2013-05-27 09:09:28下载
- 积分:1
-
LDPC_Decoder_TDMP
LDPC Coding with PSK modulation in an AWGN channel
Description
LDPC Coding with PSK modulation in an AWGN channel
Most of the functions are built in matlab functions found in the comm. toolbox. These can also be easily configurable in the code to meet your requirements.
In the given code, set the SNR, codeRate, modulation order (psk) and Number of frames to be simulated.
Please feel free to contact me and let me know your comments.
- 2020-11-29 21:59:29下载
- 积分:1
-
figueroaj_g3_realidadnacional
Resolucion guia 3 de Realidad Nacional Ecuatoriana
- 2010-08-19 04:22:10下载
- 积分:1
-
dwt-matLab-marking
提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人
部分# 首先对宿主图像进行小波分解
、
嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印
信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余
弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。(Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .)
- 2011-05-15 23:25:27下载
- 积分:1