搜索资源列表
3Drecognition
- 这篇是关于在论乱场景中三维模型识别和分割的一种有效的方法。相信对分割的研究人员会有帮助。-This is the theory of chaos on the scene three-dimensional model identification and segmentation of an effective method. Believe that the division of the research will be helpful.
hundunfenxing
- 混沌与分形理论是最新兴起的金融市场理论,这是混沌与分形分析的例程,需要的请自行下载-chaos and fractal theory is the latest emerging financial market theory, which is chaotic and fractal analysis routines. Requests need to download
02LC
- 这是一篇关于混沌吸引子的经典文献,对于想要研究该领域的初学者具有重要意义。-thsi a classical literature related to the theory of chaos.
Quadrature_Chaos-Shift_Keying_Theory_and_Performa
- Quadrature Chaos-Shift Keying Theory and Performance Analysis
findlyap
- The alogrithm employed in this toolbox for determining Lyapunov exponents is according to the algorithms proposed in [1] A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano "Determining Lyapunov Exponents from a Time Series," Physica D, Vol. 1
Immune_Chaotic_Network_Algorithm_for_Multimodal_Fu
- 针对多峰函数优化问题,借鉴混沌遍历特性和免疫网络理论,提出一种免疫混沌网络算法。算法利用混沌运动的自身规律在不同的峰值区域内搜索最佳抗体,增强了算法的局部搜索能力;采用网络抑制策略,保持了种群的多样性;通过网络补充机制自适应地调节抗体群的规模,提高了算法对不同类型多峰函数的适应能力。仿真结果表明该算法能有效地改善种群的多样性,较好地保持全局搜索和局部搜索的动态平衡,具有更强的多峰函数优化能力-Referred to the ergodicity of chaos and immune netwo
ck
- 混沌与分型理论中较为经典的冲口模型,当时是作为课程作业交上去的,哈哈,希望有参考意义-The chaos and genotyping theory more classic blurted model, as coursework to pay up, I want to have the reference value
SandPile
- 模拟混沌与分岔理论,根据沙粒间的相互关系,模拟沙堆崩塌的过程-Analog chaos and bifurcation theory, based on the relationship between sand to simulate the process of sand collapse
juhcmrfa
- 使用混沌与分形分析的例程,可以得到很精确的幅值、频率、相位估计,实现了对10个数字音的识别程序FMCW调频连续波雷达的测距测角,D-S证据理论数据融合,添加噪声处理。-Use Chaos and fractal analysis routines, You can get a very accurate amplitude, frequency, phase estimation, Realization of 10 digital audio recognition program FMCW
ttuqymed
- D-S证据理论数据融合,基于matlab GUI界面设计,使用混沌与分形分析的例程,相关分析过程的matlab方法,部分实现了追踪测速迭代松弛算法,数据包传送源码程序。- D-S evidence theory data fusion, Based on matlab GUI interface design, Use Chaos and fractal analysis routines, Correlation analysis process matlab method, Partiall
gxbdenia
- 验证可用,D-S证据理论数据融合,三相光伏逆变并网的仿真,保证准确无误,是学习通信的好帮手,可以得到很精确的幅值、频率、相位估计,使用混沌与分形分析的例程。- Verification is available, D-S evidence theory data fusion, Three-phase photovoltaic inverter and network simulation, Ensure accurate communication is learning a good hel
ifwhvqnt
- 使用混沌与分形分析的例程,有均匀线阵的CRB曲线,调试通过可以使用,D-S证据理论数据融合,双向PCS控制仿真,相关分析过程的matlab方法。- Use Chaos and fractal analysis routines, There ULA CRB curve, Debugging can be used, D-S evidence theory data fusion, Two-way PCS control simulation, Correlation analysis proce
haikei_v58
- 混沌的判断指标Lyapunov指数计算,D-S证据理论数据融合,线性调频脉冲压缩的Matlab程序。- Chaos indicator for Lyapunov index calculation, D-S evidence theory data fusion, LFM pulse compression of the Matlab program.
munjeng_v35
- 对于初学者具有参考意义,基于混沌的模拟退火算法,D-S证据理论数据融合。- For beginners with a reference value, Chaos-based simulated annealing algorithm, D-S evidence theory data fusion.
gui-gv06
- 包括最小二乘法、SVM、神经网络、1_k近邻法,D-S证据理论数据融合,使用混沌与分形分析的例程。- Including the least squares method, the SVM, neural networks, 1 _k neighbor method, D-S evidence theory data fusion, Use Chaos and fractal analysis routines.
code
- 一种图像加密算法,主要利用混沌原理来进行图像的加密(An image encryption algorithm, which mainly uses chaos theory to encrypt images)
0001
- 开心农场的源码,有兴趣的朋友可以拿去研究哈。 (Happy farm source, interested friends can Naqu of Kazakhstan.)(The fractal and chaos theory is used to produce very exquisite 2 dimensional graphics. There are a variety of parameters that can be used to control the graphics.
rossler_ly
- rossler lyapunov exponent :chaos theory(rossler lyapunov exponent chaos theory)
小波变换和混沌理论在股市预测中的应用
- 应用小波变换和混沌理论相结合的方法对股票市场进行预测 ,即先对股指时序进行小波分解 ,然后对分解得到的高、低频部分分别进行混沌预测 ,再将预测的结果进行小波重构 ,得到原时序的预测结果。 在此基础上应用小波和混沌理论提出进一步提高预测精度的方法 ,即通过对高频部分再进行小分解、混沌预测和小波重构而使高频部分的预测精度得以提高 ,进而提高原始时序的预测精度。(The method of combining wavelet transform and chaos theory is used to
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also