登录
首页 » matlab » ddd

ddd

于 2007-12-24 发布 文件大小:13KB
0 110
下载积分: 1 下载次数: 42

代码说明:

  在matlab环境下,变程实现了用全局直方图均衡化对图像做反差改善(In matlab environment, the change process to achieve the overall situation with the image histogram equalization contrast to do to improve)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • sub_slice
    这个子程序主要写的是由判决变量量化判决出QAM复振幅,(This subroutine is written by the decision variable to quantify the judgment QAM complex amplitude,)
    2011-06-28 17:03:44下载
    积分:1
  • eg19-PNN-guzhangzhengduan
    《MATLAB神经网络30个案例分析》中的第19个例子,案例19 概率神经网络的分类预测-基于PNN变压器故障诊断。希望对大家有一定的帮助!(The MATLAB neural network analysis of 30 cases of 19 example, 19 cases of probabilistic neural network classification prediction based on PNN transformer fault diagnosis. Hope to have certain help to everybody! )
    2013-09-20 16:34:49下载
    积分:1
  • parallel_parking
    平行泊车两段弧式仿真,效果较好,能够实现在不同起始点下的平行泊车(parallel parking simulation,has good effect)
    2021-03-25 15:49:14下载
    积分:1
  • svpwm_3level
    说明:  space vector modulation of three-level inverter
    2020-03-29 00:32:03下载
    积分:1
  • demos
    进行时频分析需要的东东,现在把它分享出来,希望大家喜欢(Need for time-frequency analysis of the East, and now to share it out, hope you like)
    2010-10-26 15:39:59下载
    积分:1
  • MATLAB
    MATLAB辅助小波分析与应用,讲的还是非常好的。(MATLAB Wavelet Analysis and Application of Auxiliary)
    2011-10-21 09:43:28下载
    积分:1
  • check_ola_window.m
    Checks a window that would be used for a STFT overlap and add decomposition.
    2011-11-22 14:31:22下载
    积分:1
  • Code-Final
    QPSK Modulation Demodulation, BER vs SNR plot
    2014-02-17 21:24:59下载
    积分:1
  • pro2
    创建和修改对象等,很不错的例子,希望对大家有用。(creat and modify the object. it is a good sample for labview.)
    2010-05-06 10:56:57下载
    积分:1
  • finger-recong
    指纹识别源代码。思路完全是按照文件夹中网页里介绍的方法,即提取指纹中的分叉点和端点的位置作为指纹的特征值。由于今天太忙,对图像的预处理作的很失败,程序会提取出很多伪点,而指纹轮廓也没有想出办法过滤。汗,你看看能不能参考把。 三个m文件,fd.m提取指纹中的分叉点,fd2.m提取指纹中的端点,Cpoint.m则是前两个文件运行中需要调用的掩模函数。(fingerprint identification code. Thinking is entirely in accordance with the folder on the website Lane, that the fingerprints of the bifurcation point and endpoint position as a fingerprint eigenvalues. As today are too busy, the image preprocessing for the failure, the program will extract a lot of pseudo-point, and the fingerprint profile nor find a way to filter. Khan, you can look at the information put. 3 m documents, fingerprints fd.m the bifurcation point, fd2.m fingerprints of endpoint, Cpoint.m are two documents before the operation need to call the mask function.)
    2007-05-02 23:49:15下载
    积分:1
  • 696518资源总数
  • 104384会员总数
  • 26今日下载