登录
首页 » matlab » MATLAB5343

MATLAB5343

于 2015-01-14 发布 文件大小:101KB
0 87
下载积分: 1 下载次数: 2

代码说明:

  【matlab编程代做】使用两个图像输入模糊C+-均值图像分割 可以做为参考使用学习([Do] matlab program generation using two image input fuzzy C+- mean value can be used as a reference image segmentation using learning)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Untitled3
    有记忆预失真处理程序,可以实现对PA转换下饱和失真的处理(Predistortion with memory processes can be achieved under the PA saturation distortion conversion process)
    2013-09-21 09:53:16下载
    积分:1
  • fast_deblur_v0_1_1
    2009 ACM Fast Motion Deblurring(Sunghyun Cho)
    2021-04-19 23:28:50下载
    积分:1
  • DMCgenzong
    此程序为带有误差跟踪功能的DMC控制,能有效的控制跟踪误差输入(This procedure with the DMC error tracking control, which can effectively control the tracking error input)
    2010-09-15 10:16:27下载
    积分:1
  • EZWsuanfa-Matlab
    说明:  EZW算法的过程详解和Matlab代码,关于小波树的变换,在图像处理中的应用(Detailed process of EZW algorithm and Matlab code, the tree on the wavelet transform, applications in image processing)
    2011-04-08 09:37:45下载
    积分:1
  • SR--matlab
    随机共振 随机共振系统的Matlab代码 双稳态系统参数(Stochastic resonance)
    2021-04-20 10:08:50下载
    积分:1
  • Crypt64-v1.0
    Simple program that encrypts and Decrypts text with options to generate/Open and Save key.
    2014-08-27 06:30:49下载
    积分:1
  • imgretrieval
    Brodatz Album 库中任取10幅图像,每幅图分成四小块,得到40幅小图像,取其中一幅小图像,对大图中其余三幅小图进行检索(image retrieval)
    2013-11-05 16:10:12下载
    积分:1
  • GRU
    通过Python基于keras平台实现了时间序列模型gru(Realization of time series model Gru based on keras platform by Python)
    2020-08-16 15:28:36下载
    积分:1
  • leach_for_wireless_network
    无线传感器网络中应用leach算法来识别恶意节点和剔除恶意节点。从而保证网络系统的寿命最长。(In wireless sensor network,cluster algorithm of nodes is all effective approach and key technology to implement energy saving and flexible management.To improve security and lifetime of clustering network,a secure clustering was pro— posed based on the random and parallel cluster header election algorithm and pre—distributed key scheme.In hypothetical network model,it can elect the cluster header nodes and identify and get rid of malicious nodes,and in data telecommuni— cations,the communication security Can be achieved by using encryption algorithm and thus the network lifetime Call be prolonged.)
    2010-05-14 15:52:16下载
    积分:1
  • Chapter-2
    very useful book for IGBT designers
    2012-01-22 13:04:07下载
    积分:1
  • 696518资源总数
  • 104269会员总数
  • 42今日下载