登录
首页 » matlab » t1

t1

于 2017-08-02 发布 文件大小:1KB
0 101
下载积分: 1 下载次数: 2

代码说明:

说明:  利用压缩感知理论MOMP法计算独立信源DOA估计(Computing DOA estimation of independent source using compressed sensing theory MOMP)

文件列表:

t1.m

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • melcepst
    MELCEPST Calculate the mel cepstrum of a signal
    2009-03-05 16:30:53下载
    积分:1
  • Dtc090319
    电机,矢量模型可用于电机模型的建立,是矢量控制的函数(i am sorry,my englis poor)
    2009-04-11 15:01:24下载
    积分:1
  • Byzantine-failures
    Dolev算法、快速收敛算法、传感器融合算法及混合算法等4种算法,完成对拜占庭将军问题的求解(Dolev algorithm, fast convergence algorithms, sensor fusion algorithm and hybrid algorithm, four kinds of algorithms, the completion of the Byzantine generals problem solving)
    2012-06-08 17:14:20下载
    积分:1
  • bi_DCDC_Boost2_1_3
    DCDC boost 虚拟阻抗仿真的基本教程,简单实用,希望对大家有帮助( Boost DCDC virtual impedance simulation of the basic tutorial, simple and practical, we want to help)
    2016-12-01 10:03:34下载
    积分:1
  • PC1030
    说明:  好东西来了!是一个完整的东西啊,不好用砖头拍我!(Good stuff coming! Is a complete thing, ah, well shoot me with bricks!)
    2010-03-22 17:35:32下载
    积分:1
  • fuzzy
    This program has evolved over time and uses programming
    2010-01-07 20:54:52下载
    积分:1
  • matlab_GUI_4
    matlab教程有点用看看哦 我感觉讲的还可以(good)
    2010-02-24 21:21:56下载
    积分:1
  • CODE
    THIS CODE REPRESENTS THE COMMUNICATION LATENCY OF NETWORKS
    2013-03-17 12:46:01下载
    积分:1
  • Win2012WMIiSCSIVhdxManager
    在Windows Server 2012下利用WMI实现iISCSI管理Vhdx磁盘,主要包括的方法有创建虚拟磁盘、创建iSCSI Target、格式化虚拟磁盘、删除虚拟磁盘、删除iSCSI Target(In Windows Server using WMI 2012 under the iISCSI Vhdx disk management, mainly includes the methods to create a virtual disk, create a iSCSI Target, format the virtual disk, delete the virtual disk, delete the iSCSI Target)
    2014-12-10 16:57:55下载
    积分:1
  • walsh-decoding-with-hamming-distance
    Aim: do walsh coding with hamming distance.To compare WALSH decoding for synchronous CDMA with decoding using hamming distance. a) System should be supplied with correct/ corrupted version (one/ two bit) of transmitted walsh code(s) b) System should also have table for correct codes(walsh codes) c) System should ab able to deocde the same using hamming distance property. d) Copmare resutls for corrupted code(s) to check the efficacy of WALSH decoding technique (as in above experiment) compared to hamming distance decoding.
    2015-03-23 16:46:41下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载