Loading...
Search for: estimation-techniques
0.005 seconds

    Performance calculations within the conceptual design process of hand-launched aircraft

    , Article Applied Mechanics and Materials ; Vol. 629, issue , October , 2014 , p. 145-151 Nadji, M ; Banazadeh, A ; Sharif University of Technology
    Abstract
    Matching diagram is a key part of the conceptual design process to determine the wing area and the required power. However, it requires drag polar estimation and the assumption of maximum lift coefficient. In case of conventional manned aircraft, early estimation techniques are based on statistical data that are not suitable for hand-launched aircraft. In this study, it has been attempted to present the performance calculations and a proper conceptual design model by acquiring sound values for the aerodynamic coefficients in low Reynolds number, using statistical wetted area as well as a raw design of fuselage, wing and tails. The process is applied to a sample scenario and the results are... 

    Using input-to-output masking for system-level vulnerability estimation in high-performance processors

    , Article Proceedings - 15th CSI International Symposium on Computer Architecture and Digital Systems, CADS 2010, 23 September 2010 through 24 September 2010 ; September , 2010 , Pages 91-98 ; 9781424462698 (ISBN) Haghdoost, A ; Asadi, H ; Baniasadi, A ; Sharif University of Technology
    2010
    Abstract
    In this paper, we enhance previously suggested vulnerability estimation techniques by presenting a detailed modeling technique based on Input-to-Output Masking (IOM). Moreover we use our model to compute the System-level Vulnerability Factor (SVF) for data-path components in a highperformance processor. As we show, recent suggested estimation techniques overlook the issue of error masking, mainly focusing on time periods in which an error could potentially propagate in the system. In this work we show that this is incomplete as it ignores the masking impact. Our results show that including the IOM factor can significantly affect the system-level vulnerability for data-path components. As a... 

    A priori error estimation of upscaled coarse grids for water-flooding process

    , Article Canadian Journal of Chemical Engineering ; Volume 94, Issue 8 , 2016 , Pages 1612-1626 ; 00084034 (ISSN) Khoozan, D ; Firoozabadi, B ; Sharif University of Technology
    Wiley-Liss Inc 
    Abstract
    Advanced reservoir characterization methods can yield geological models at a very fine resolution, containing 1011–1018 cells, while the common reservoir simulators can only handle much lower numbers of cells due to computer hardware limitations. The process of coarsening a fine-scale model to a simulation model is known as upscaling. Predicting the accuracy of simulation results over an upscaled grid with respect to the fine grid is highly important, as it can yield the optimum upscaling process. In this paper, permeability-based and velocity-based a priori error estimation techniques are proposed by introducing image processing-based comparison methods in the context of upscaling. The... 

    Identifiability of location and magnitude of flow barriers in slightly compressible flow

    , Article SPE Journal ; Volume 21, Issue 3 , 2016 , Pages 899-908 ; 1086055X (ISSN) Kahrobaei, S ; Mansoori Habibabadi, M ; Joosten, G. J. P ; Van Den Hof, P. M. J ; Jansen, J. D ; Sharif University of Technology
    Society of Petroleum Engineers 
    Abstract
    Classic identifiability analysis of flow barriers in incompressible single-phase flow reveals that it is not possible to identify the location and permeability of low-permeability barriers from production data (wellbore pressures and rates), and that only averaged reservoir properties in between wells can be identified. We extend the classic analysis by including compressibility effects. We use two approaches: a twin experiment with synthetic production data for use with a time-domain parameter-estimation technique, and a transfer-function formalism in the form of bilaterally coupled four-ports allowing for an analysis in the frequency domain. We investigate the identifiability, from noisy... 

    Separation of speech sources in under-determined case using SCA and time-frequency methods

    , Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; 2008 , Pages 533-538 ; 9781424427512 (ISBN) Mahdian, R ; Babaiezadeh, M ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    This paper presents a new algorithm for Blind Source Separation (BSS) of Instantaneous speech mixtures in under-determined case. A demixing algorithm which exploits the sparsity of speech signals in the short time Fourier transform (STFT) domain is proposed. This algorithm combines the modified k-means clustering procedure involved in the Line Orientation Separation Technique (LOST) with Smoothed l0-norm minimization (SL0) method. First procedure along with a transformation into a sparse domain tries to estimate the mixing matrix, and the second method tries to extract the sources from the mixtures. Simulation results are presented and compared to the Degenerate Unmixing Estimation Technique... 

    Robust fault location of transmission lines by synchronised and unsynchronised wide-area current measurements

    , Article IET Generation, Transmission and Distribution ; Volume 8, Issue 9 , 1 September , 2014 , Pages 1561-1571 ; ISSN: 17518687 Salehi-Dobakhshari, A ; Ranjbar, A. M ; Sharif University of Technology
    Abstract
    This study presents a novel method for fault location of transmission lines by multiple fault current measurements. In contrast to conventional methods, it is proposed to utilise several current measurements, which may be far from the faulted line. The circuit equations of the network are used to express each fault current as a function of fault location. Fault location is then estimated using a least-squares estimation technique. To achieve a robust estimation of fault location, statistical hypotheses-testing is employed for identifying erroneous measurements. The method is applicable to both synchronised and unsynchronised measurements. Moreover, fault location can be estimated regardless... 

    Surface Electromyogram signal estimation based on wavelet thresholding technique

    , Article 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'08, Vancouver, BC, 20 August 2008 through 25 August 2008 ; 2008 , Pages 4752-4755 ; 9781424418152 (ISBN) Khezri, M ; Jahed, M ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    Surface Electromyogram signal collected from the surface of skin is a biopotential signal that may be influenced by different types of noise. This is a considerable drawback in the processing of the sEMG signals. To acquire the clean sEMG that contains useful information, we need to detect and eliminate these unwanted parts of signal. In this work, a new method based on wavelet thresholding technique is presented which provides an acceptable purified sEMG signal. sEMG signals for this study are extracted for various hand movements. We use three hand movements to calculate the near optimal estimation parameters. In this work two types of thresholding techniques, namely Stein unbiased risk...