Search Results - parallel estimation ((((sensor algorithm) OR (window algorithm))) OR (means algorithm))
Search alternatives:
- parallel estimation »
- sensor algorithm »
- window algorithm »
- means algorithm »
-
1
New CFAR algorithm and circuit development for radar receiver
Published 2020“…To detect targets in such environments, it needs a robust CFAR algorithm that excises the target spikes and clutter edges from the CFAR window to give the best possible estimation of the noise background. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Image reconstruction using iterative transpose algorithm for optical tomography
Published 2007“…The measurement system consisted of two orthogonal arrays, each having ten parallel views, resulting in a total of twenty sensors. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems
Published 2016“…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
Get full text
Get full text
Thesis -
5
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth. It is a computational intensive algorithm, but can be implemented with high speed on hardware due to the parallelism property. …”
Get full text
Get full text
Conference or Workshop Item -
6
Investigation of QAM based on mean square error (MSE) channel estimation (CE) for MIMO-OFDM pilot based system / Mohd Ariff Ibrahim
Published 2013“…Channel Estimation (CE) is functioning as a medium to reduce the diversity and error in MIMO-OFDM system which containing few other techniques which are Least Square Error (LSE), Mean Square Error (MSE) and Discrete Fourier Transform (DFT). …”
Get full text
Get full text
Thesis -
7
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
8
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…Stereo vision sensor consists of two stereo cameras, mounted parallel in stationary position. …”
Get full text
Get full text
Thesis -
9
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…In this work, the core size estimation technique of magnetic nanoparticles (MNPs) using the static magnetization curve obtained from a high-Tc SQUID magnetometer and a metaheuristic inversion technique based on the Particle Swarm Optimizer (PSO) algorithm is presented. …”
Get full text
Get full text
Get full text
Article -
10
Active Cell Balancing Control Method for Series-Connected Lithium-Ion Battery
Published 2019“…The capacity of each cell is calculated by dint of SOC function estimated as a result of Backpropagation Neural Network (BPNN) algorithm through four switched DC/DC Buck-Boost converter. …”
Get full text
Get full text
Get full text
Article -
11
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis -
12
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Parallel imaging is a robust method for accelerating the data acquisition in Magnetic Resonance Imaging (MRI). …”
Get full text
Get full text
Get full text
Thesis -
13
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
Get full text
Get full text
Thesis
