登录
首页 » matlab » Kalman-Filtering-Theory-and-Practice-Using-MATLAB

Kalman-Filtering-Theory-and-Practice-Using-MATLAB

于 2012-11-16 发布 文件大小:3102KB
0 95
下载积分: 1 下载次数: 7

代码说明:

  Kalman Filtering Theory and Practice Using MATLAB - Grewal and Andrews

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 1122
    均匀光纤光栅的谱和时延曲线 Uniform Fiber Bragg Grating Spectra and time delay curve
    2010-07-11 13:35:44下载
    积分:1
  • Monte-Carlo-method-
    蒙特卡罗方法在由已知分布的随机抽样中的应用(Monte Carlo method of random sampling from the known distribution of the application)
    2011-11-09 08:17:27下载
    积分:1
  • 0563602811
    介绍扩展卡尔曼滤波在轨道估计中的应用和方法(Introduced EKF estimation of the track and Methods)
    2011-05-22 22:37:27下载
    积分:1
  • MATLAB7.0-2006
    【书名】 MATLAB 7.0从入门到精通 【作者】 求是科技编著 【版次】 【出版社】 人民邮电出版社 【出版日期】 2006 ([title] MATLAB 7.0 proficient from the portal to the author [of technology] for [produced] [edition of the publication groups-- People's Posts & Telecommunications Publishing House published date [2006])
    2007-06-06 12:11:44下载
    积分:1
  • MOM
    Method of moment help to design antenna
    2014-12-01 00:04:27下载
    积分:1
  • bifurcation
    说明:  对受迫振动的非线性系统碰撞仿真,适合相关人员交流学习。可以针对不同刚度,频率,间隙进行调整。(Collision simulation of forced vibration of non-linear system is suitable for related personnel to communicate and learn.)
    2019-07-09 18:05:26下载
    积分:1
  • DISCRIMINANTSPARSENONNEGATIVEMATRIXFACTORIZATION
    判别稀疏非负矩阵分解,提出这个新算法,来进行人脸识别,比传统的NMF和一些其他的扩展算法效果好(Sparse non-negative matrix factorization judge proposed the new algorithm for face recognition, than the traditional extension of NMF algorithm and some other good results)
    2010-12-04 17:47:48下载
    积分:1
  • IEEEphot_1
    LMS ALGORITHM CODE TO SUPPRESSION ECHO
    2011-10-03 17:22:42下载
    积分:1
  • dwt-matLab-marking
    提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人 部分# 首先对宿主图像进行小波分解 、 嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印 信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余 弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。(Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .)
    2011-05-15 23:25:27下载
    积分:1
  • C_CPP-Programmers-Reference--Third-Edition-By-Her
    C/C++ Programmer s Reference, Third Edition by Herbert Schildt ISBN:0072227222 McGraw-Hill/Osborne © 2003 (358 pages) This guide reviews the rules and syntax of the principle commands that comprise C and its object-oriented cousin, C++. The reference consists of 19 chapters that define operators and the standard input/output, string, character, and more.
    2015-03-20 08:48:03下载
    积分:1
  • 696518资源总数
  • 104384会员总数
  • 26今日下载