Share Email Print
cover

Proceedings Paper

Modified TLS-Prony method using data decimation
Author(s): William M. Steedly; Chinghui J. Ying; Randolph L. Moses
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

This paper introduces a modified TLS-Prony method which uses data decimation. The use of data decimation results in the reduction in the computational complexity in a variety of applications by allowing several low order estimations to be performed rather than one high order estimation. We also present an analysis of pole variance statistics for the modified TLS- Prony method which is used to explain and quantify the characteristics of decimation. We show that using decimation we can obtain comparable performance results at a fraction of the computational cost.

Paper Details

Date Published: 16 September 1992
PDF: 13 pages
Proc. SPIE 1700, Automatic Object Recognition II, (16 September 1992); doi: 10.1117/12.138266
Show Author Affiliations
William M. Steedly, Ohio State Univ. (United States)
Chinghui J. Ying, Ohio State Univ. (United States)
Randolph L. Moses, Ohio State Univ. (United States)


Published in SPIE Proceedings Vol. 1700:
Automatic Object Recognition II
Firooz A. Sadjadi, Editor(s)

© SPIE. Terms of Use
Back to Top