Search Results - (( basic estimation search algorithm ) OR ( using codification based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Full search (FS), three step search (TSS), new three step search (NTSS), diamond search (DS) and hexagon based search (HS) are the most well known block-matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud by Mahmud, Abd Razak

    Published 2008
    “…This algorithm basically employs two crossshaped search patterns consecutively in the very beginning steps and switch using diamond-shaped patterns. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs by Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Pebrianti, Dwi, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz

    Published 2015
    “…In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…Then, the process of searching the best fuzzy preferences that articulates the opponent’s intention is conducted by genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani by Mirhassani, Seyedmostafa

    Published 2015
    “…Three speech databases were used for the experiments including prolonged Malay vowels and Malay continuous speech database based on children’s speech and TIMIT database based on adult speeches. …”
    Get full text
    Get full text
    Thesis