5 Matching Annotations
  1. Jul 2021
    1. Legendre Polynomials The Legendre polynomials form an -orthogonal set of polynomials. You will see below why orthogonal polynomials make particularly good choices for approximation. In this section, we are going to write m-files to generate the Legendre polynomials and we are going to confirm that they form an orthogonal set in . Throughout this section, we will be representing polynomials as vectors of coefficients, in the usual way in Matlab. The Legendre polyonomials are a basis for the set of all polynomials, just as the usual monomial powers of are. They are appropriate for use on the interval [-1,1] because they are orthogonal when considered as members of . Polynomials that are orthogonal are discussed by Quarteroni, Sacco, and Saleri in Chapter 10, with Legendre polynomials discussed in Section 10.1.2. The first few Legendre polynomials are:

      Legendre Polynomials matlab:

  2. May 2020
    1. You can create estimation plots here at estimationstats.com, or with the DABEST packages which are available in R, Python, and Matlab.

      You can create estimation plots with:

  3. Jan 2019
    1. MIT “MATLAB is the language used by virtually every team in the world that designs gravitational wave detectors… I look forward to exploring the data from each new detection in MATLAB.” Matthew Evans, Assistant Professor of Physics
  4. Aug 2018
    1. Integrity Data Attacks in Power Market Operations

      Hello I am a electrical engineering student from Iran. I am interested in data integrity attacks on power grid state estimation. I can realize the basic concepts by reading the papers, but when I try to re-simulate them, I run into trouble. I have searched the net to find some example matlab codes of the attack structure, but I could not find anything. During my search, I noticed your page and saw that you graciously shared the MATLAB code of some of your papers with the public. So, I decided to leave you a message and ask you if you could provide me with a basic code of false data injection attack (like the one used in this paper) written in MATLAB. I would appereciate it. Thanks in advance.

  5. Mar 2018