登录
首页 » matlab » sw

sw

于 2010-08-21 发布 文件大小:1KB
0 104
下载积分: 1 下载次数: 0

代码说明:

说明:  2010军事类院校数模题某题第三问程序,只是我自己的一种算法。(2010, the number of model problems of military colleges ask a question the third procedure, an algorithm is just my own.)

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Bergen_Boin_Sanjani_Blood_Vessel_Segmentation
    it will to improve image quality
    2014-10-09 14:13:55下载
    积分:1
  • shd
    This project is based on group human activity classification using matlab
    2015-04-03 17:10:16下载
    积分:1
  • Full_discretization_single
    单自由度稳定极限切深叶瓣图绘制-全离散法。(SDOF stability limit depth of cut lobe drawing- fully discrete method.)
    2020-11-16 15:39:40下载
    积分:1
  • matlab
    使用matlab实现三维建模源码,效果非常好,可以用于三维点云数据的建模(Using MATLAB to achieve three-dimensional modeling source code, the effect is very good, can be used for modeling 3D point cloud data )
    2016-10-01 16:48:13下载
    积分:1
  • HEU_KMSActtivator
    说明:  本文提出了一种基于混沌加密的DCT域二值图像数字水印算法.该算法首先利用混沌序列将含有版权信息的有意义二值图像水印进行加密,然后利用人眼视觉系统(HVS)的特性将原始载体图像进行块分类,最后将不同强度的水印分量嵌入到不同类的图像块DCT中频系数中去.利用混沌序列对水印进行加密,使水印本身具有安全性,对数字作品进行双重保障.通过高斯噪声,椒盐噪声以及JPEG压缩和剪切等攻击试验,表明了该算法具有较好的鲁棒性.(Encryption in DCT domain is proposed. Firstly, the meaningful binary image watermark containing copyright information is encrypted by using chaotic sequence, and then the original image is classified by using the characteristics of human visual system (HVS), Finally, the watermark components with different intensities are embedded into the DCT intermediate frequency coefficients of different types of image blocks. Chaotic sequences are used to encrypt the watermark, so that the watermark itself has security and double protection for digital works. Experiments on Gaussian noise, salt and pepper noise, JPEG compression and clipping show that the algorithm has good robustness)
    2021-04-15 12:12:28下载
    积分:1
  • spwm1
    spwm technique, which iam trying to solve but didnt get solution
    2010-07-11 13:32:23下载
    积分:1
  • chapert7
    这是通信系统仿真的第七章的例题的仿真程序代码!挺好的,希望对大家有用!(Communication System Simulation This is the seventh chapter of the simulation program code examples! Very good, and I hope useful for everyone!)
    2008-07-08 15:48:39下载
    积分:1
  • EVD1
    eigen value decomposition method for acoustic source localization Matlab source codes
    2012-04-23 13:04:59下载
    积分:1
  • BSP-15g
    those are for MAPCA bsp-15
    2014-10-24 18:25:19下载
    积分:1
  • WLAN-loss-calculation
    WLAN设备的传播损耗计算模型,主要是指以下:Devasirvatham模型,也称为线性路径衰减模型,可用于各种建筑材料2.4G电磁穿透损耗的经验衰减因子模型信号的穿透损耗在这个阶段。(Both WLAN propagation loss calculation model is mainly refer to the following: Devasirvatham model, also known as a linear path attenuation model, the attenuation factor model signal penetration loss at this stage are available for a variety of building materials 2.4G electromagnetic penetration loss experience.)
    2014-11-13 10:42:33下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载