-
GEAR-CUTTING-OPERATION-IN-LATHE
gear cutting attachment ib lathe...milling and grinding
- 2014-10-07 14:09:13下载
- 积分:1
-
datatreating
matlab数据的预处理代码,小波分析等等等(Pretreatment code matlab wavelet analysis data, etc., etc.)
- 2015-10-29 20:29:22下载
- 积分:1
-
rmsplanar
adaptive beam forming in smart antennas using rls algorithm in planar antennas
- 2010-09-16 12:53:20下载
- 积分:1
-
箔条运动与时间的关系图
箔条运动的速度与时间的 关系,长箔条与短箔条之间的比较,以及箔条发射距离与时间关系的曲线图
- 2022-02-13 13:36:14下载
- 积分:1
-
pca
pca program dimansion
- 2020-09-19 12:07:56下载
- 积分:1
-
good_MATLAB
说明: 有关学习MATLAB的WORD文档,很全,在我刚学习MATLAB的时候给了我很大帮助,希望也能帮助大家(MATLAB-WORD documents about learning, it is all in my time just to learn MATLAB gave me great help, hope that we can help you)
- 2009-08-31 15:41:48下载
- 积分:1
-
fuzzy_pid
This control system has been successfully applied in some 750mm hot strip mill. The actual record curves indicate that the dynamic feedforward strategy can do well in controlling the tail temperature. And the FuzzyPI-Smith system can get better dynamic characteristic and effectively overcome the problems by pure lag with the traditional
- 2013-05-20 11:23:12下载
- 积分:1
-
NRZ-DPSK
光通信中非归零型差分相位调制信号建模与仿真分析(Optical Communication Central African zero differential phase modulated signal-based modeling and simulation analysis)
- 2008-12-24 10:09:58下载
- 积分:1
-
quzgao
说明: 此程序用于去除信号中的噪声,并且它是基于小波变换的代码,很实用的(This program is used to remove signal noise, and it is based on the wavelet transform code, very useful)
- 2010-04-03 16:19:35下载
- 积分:1
-
DCT_SVD
说明: 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。(This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack.)
- 2010-04-18 18:42:59下载
- 积分:1