Search Results - (( using practical problems algorithm ) OR ( basic estimation using algorithm ))
Search alternatives:
- practical problems »
- basic estimation »
- using practical »
- using algorithm »
-
1
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Particle-based perception of garment folding for robotic manipulation purposes
Published 2023Article -
3
Implementation of Symmetric Rank-One Methods for Unconstrained Optimization
Published 2010“…The rate of convergence of such algorithms are also discussed. Due to the presence of SR1 deciencies, we introduce a restarting procedure using eigenvalue of the SR1 update. …”
Get full text
Get full text
Thesis -
4
Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation
Published 2004“…In this estimation technique two different equations are used to estimate the rotor flux in the stator reference frame. …”
Get full text
Get full text
Thesis -
5
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
Get full text
Get full text
Get full text
Book Chapter -
6
System identification using Extended Kalman Filter
Published 2017“…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
Get full text
Get full text
Student Project -
7
A cost and delay estimation of a suite of low-cost adaptive routers for hierarchical torus network
Published 2012“…In this paper, We present a conservative estimation of hardware cost and router delay for the proposed routing algorithms and compare it with the dimension order routing. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
9
Performance Analysis of Motion Estimation Algorithms on Digital Video Images
Published 2011“…Block Matching Motion Estimation (BMME) techniques have been particularly used in various coding standards. …”
Get full text
Get full text
Article -
10
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…Step search (4SS), Diamond search (DS), Adaptive Rood Pattern Search (ARPS) and Cross-Diamond-Hexagonal search (CDHS). This algorithm basically employs two crossshaped search patterns consecutively in the very beginning steps and switch using diamond-shaped patterns. …”
Get full text
Get full text
Thesis -
11
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
14
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
Get full text
Get full text
Get full text
Article -
15
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. …”
Get full text
Get full text
Get full text
Teaching Resource -
16
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
17
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…In this work, we contribute towards bridging the gap between theory and practice by considering a set of algorithms for online conversion problems and discuss the disparity between the assumed worst case competitive rations and experimentally achieved competitive ratios using real world data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Hybridizing Invasive Weed Optimization with Firefly Algorithm for Unconstrained and Constrained Optimization Problems
Published 2017“…This study presents a hybrid invasive weed firefly optimization (HIWFO) algorithm for global optimization problems. Unconstrained and constrained optimization problems with continuous design variables are used to illustrate the effectiveness and robustness of the proposed algorithm. …”
Get full text
Get full text
Get full text
Article
