
Proceedings Paper
Modified TLS-Prony method using data decimationFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
This paper introduces a modified TLS-Prony method which uses data decimation. The use of data decimation results in the reduction in the computational complexity in a variety of applications by allowing several low order estimations to be performed rather than one high order estimation. We also present an analysis of pole variance statistics for the modified TLS- Prony method which is used to explain and quantify the characteristics of decimation. We show that using decimation we can obtain comparable performance results at a fraction of the computational cost.
Paper Details
Date Published: 16 September 1992
PDF: 13 pages
Proc. SPIE 1700, Automatic Object Recognition II, (16 September 1992); doi: 10.1117/12.138266
Published in SPIE Proceedings Vol. 1700:
Automatic Object Recognition II
Firooz A. Sadjadi, Editor(s)
PDF: 13 pages
Proc. SPIE 1700, Automatic Object Recognition II, (16 September 1992); doi: 10.1117/12.138266
Show Author Affiliations
William M. Steedly, Ohio State Univ. (United States)
Chinghui J. Ying, Ohio State Univ. (United States)
Chinghui J. Ying, Ohio State Univ. (United States)
Randolph L. Moses, Ohio State Univ. (United States)
Published in SPIE Proceedings Vol. 1700:
Automatic Object Recognition II
Firooz A. Sadjadi, Editor(s)
© SPIE. Terms of Use
