+
|
Plus; addition operator. |
-
|
Minus; subtraction operator. |
*
|
Scalar and matrix multiplication operator. |
.*
|
Array multiplication operator. |
^
|
Scalar and matrix exponentiation operator. |
.^
|
Array exponentiation operator. |
\
|
Left-division operator. |
/
|
Right-division operator. |
.\
|
Array left-division operator. |
./
|
Array right-division operator. |
:
|
Colon; generates regularly spaced elements and represents an entire row or column. |
( )
|
Parentheses; encloses function arguments and array indices; overrides precedence. |
[ ]
|
Brackets; enclosures array elements. |
.
|
Decimal point. |
…
|
Ellipsis; line-continuation operator. |
,
|
Comma; separates statements and elements in a row. |
;
|
Semicolon; separates columns and suppresses display. |
%
|
Percent sign; designates a comment and specifies formatting. |
_
|
Quote sign and transpose operator. |
._
|
Nonconjugated transpose operator. |
=
|
Assignment (replacement) operator. |
Saturday, 26 January 2013
Matlab Commands: Operators and Special Characters
Popular Posts
-
Symmetric key cryptography systems use the same key for both to encrypt the plaintext and to decrypt the ciphertext. Symmetric key systems...
-
Cryptography is defined as the art and science of secret writing. The word itself comes from Greek where the words kruptos (κρυπτοσ) and ...
-
Policy is basically a written document that lays out the exact requirements or rules that must be met by the employees. It generally...
-
What are Blind, Semi-blind and Non-blind Watermarking Systems? Digital watermarking systems can be grouped in three schemes - they are Bli...
-
Checking Image Quality Using MATLAB PSNR program PSNR or peak-to-noise ratio is used to evaluate the quality of the watermarked image aft...
-
TVA: Threat-Vulnerability-Asset TVA worksheet lists the asset in priority order along one axis and the threats it is exposed to by prio...
-
The Security System Development Life Cycle (SecSDLC) is a variant of SDLC which can be used in developing an Information Security Policy. ...
-
Find below the Matlab codes to embed a watermark image into a cover(host) image: clear all; close all; clc; [filename1,pathname]=uigetfi...
-
The Interesting Story of Lena.jpg The image above is one that has been widely used in the image compression studies, even today. ...
-
A ciphertext has the possibility of being broken by using statistical analysis that could provide some information on the frequency of char...