Share Email Print

Proceedings Paper

Modified TLS-Prony method using data decimation
Author(s): William M. Steedly; Chinghui J. Ying; Randolph L. Moses
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This paper introduces a modified TLS-Prony method which uses data decimation. The use of data decimation results in the reduction in the computational complexity in a variety of applications by allowing several low order estimations to be performed rather than one high order estimation. We also present an analysis of pole variance statistics for the modified TLS- Prony method which is used to explain and quantify the characteristics of decimation. We show that using decimation we can obtain comparable performance results at a fraction of the computational cost.

Paper Details

Date Published: 16 September 1992
PDF: 13 pages
Proc. SPIE 1700, Automatic Object Recognition II, (16 September 1992); doi: 10.1117/12.138266
Show Author Affiliations
William M. Steedly, Ohio State Univ. (United States)
Chinghui J. Ying, Ohio State Univ. (United States)
Randolph L. Moses, Ohio State Univ. (United States)

Published in SPIE Proceedings Vol. 1700:
Automatic Object Recognition II
Firooz A. Sadjadi, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?