-
ocd_prog
很优良的PID控制器设计仿真程序与模型,经过严格检验(Very good simulation of PID controller design procedures and models, to undergo a rigorous inspection)
- 2008-05-21 16:26:43下载
- 积分:1
-
OFDMbeamforming
OFDM系统波束成形研究 ofdm beamforming(ofdm beamforming)
- 2011-01-07 18:17:39下载
- 积分:1
-
eye_detect
用matlab语言来实现一幅图像中对人脸中左右眼睛的定位。(detect eye in a image which include a face)
- 2014-11-14 10:09:04下载
- 积分:1
-
positive-portrait-identification-
一种正面人像识别的方法,论文.格式caj。利用活动轮廓模型进行人像处理,自动提取人脸轮廓。(A positive portrait identification method)
- 2013-09-23 10:38:59下载
- 积分:1
-
add-water-mark
添加YUV数字水印,用 matlab读写YUV视频并保存(add YUV watermark,read and write YUV video)
- 2013-04-19 16:47:40下载
- 积分:1
-
Vicsek模型
多个体系统的集体行为是复杂系统研究的重要切入点, 而Vicsek 模型是
研究多个体系统的一个基本模型, 它具备了复杂系统的一些关键特征, 如动态行
为、局部相互作用和变化的邻居关系等.(Collective behavior of multi agent system is an important entry point for complex system research, and Vicsek model is a basic model of multi agent system, which has some key features of complex system, such as dynamic behavior, local interaction and changing neighbor relations)
- 2017-11-27 17:28:22下载
- 积分:1
-
nlms_limatlab
Matlab for nlms matlab source code
- 2009-05-16 12:48:28下载
- 积分:1
-
BSJUMP
Black-Scholes 模型的跳跃过程需要matlab有统计工具包(Black-Scholes model with merton jumps, the code need to be ran based on Statistic toolbox)
- 2012-08-23 02:23:22下载
- 积分:1
-
tu
说明: 认知无线电系统误码率仿真分析 通过MATLAB编程实现
(The Ber simulation analysis of Cognitive radio system)
- 2013-10-30 22:16:32下载
- 积分:1
-
DCT-Based--Watermarking-Scheme
a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image.
- 2014-02-15 21:17:17下载
- 积分:1