登录
首页 » matlab » ACT_EXP

ACT_EXP

于 2013-12-10 发布 文件大小:1KB
0 214
下载积分: 1 下载次数: 6

代码说明:

  线性控制系统时域和频域性能指标计算,并绘制波特图与单位阶跃响应曲线(Linear control systems time and frequency domain performance computing, and draw Bode plots and unit step response curve)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • ocd_prog
    很优良的PID控制器设计仿真程序与模型,经过严格检验(Very good simulation of PID controller design procedures and models, to undergo a rigorous inspection)
    2008-05-21 16:26:43下载
    积分:1
  • OFDMbeamforming
    OFDM系统波束成形研究 ofdm beamforming(ofdm beamforming)
    2011-01-07 18:17:39下载
    积分:1
  • eye_detect
    用matlab语言来实现一幅图像中对人脸中左右眼睛的定位。(detect eye in a image which include a face)
    2014-11-14 10:09:04下载
    积分:1
  • positive-portrait-identification-
    一种正面人像识别的方法,论文.格式caj。利用活动轮廓模型进行人像处理,自动提取人脸轮廓。(A positive portrait identification method)
    2013-09-23 10:38:59下载
    积分:1
  • add-water-mark
    添加YUV数字水印,用 matlab读写YUV视频并保存(add YUV watermark,read and write YUV video)
    2013-04-19 16:47:40下载
    积分:1
  • Vicsek模型
    多个体系统的集体行为是复杂系统研究的重要切入点, 而Vicsek 模型是 研究多个体系统的一个基本模型, 它具备了复杂系统的一些关键特征, 如动态行 为、局部相互作用和变化的邻居关系等.(Collective behavior of multi agent system is an important entry point for complex system research, and Vicsek model is a basic model of multi agent system, which has some key features of complex system, such as dynamic behavior, local interaction and changing neighbor relations)
    2017-11-27 17:28:22下载
    积分:1
  • nlms_limatlab
    Matlab for nlms matlab source code
    2009-05-16 12:48:28下载
    积分:1
  • BSJUMP
    Black-Scholes 模型的跳跃过程需要matlab有统计工具包(Black-Scholes model with merton jumps, the code need to be ran based on Statistic toolbox)
    2012-08-23 02:23:22下载
    积分:1
  • tu
    说明:  认知无线电系统误码率仿真分析 通过MATLAB编程实现 (The Ber simulation analysis of Cognitive radio system)
    2013-10-30 22:16:32下载
    积分:1
  • DCT-Based--Watermarking-Scheme
    a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery data and two bit Authentication data of the image block into the least significant bits (LSB) of its corresponding mapping block.The integrity of a test block is decided by comparing 2×2 non overlapping block of the test block with its corresponding mapping block. Experimental results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well as in tamper recovery of the image.
    2014-02-15 21:17:17下载
    积分:1
  • 696518资源总数
  • 106215会员总数
  • 5今日下载