16 September 1992 Modified TLS-Prony method using data decimation
Author Affiliations +
Abstract
This paper introduces a modified TLS-Prony method which uses data decimation. The use of data decimation results in the reduction in the computational complexity in a variety of applications by allowing several low order estimations to be performed rather than one high order estimation. We also present an analysis of pole variance statistics for the modified TLS- Prony method which is used to explain and quantify the characteristics of decimation. We show that using decimation we can obtain comparable performance results at a fraction of the computational cost.
© (1992) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
William M. Steedly, William M. Steedly, Chinghui J. Ying, Chinghui J. Ying, Randolph L. Moses, Randolph L. Moses, } "Modified TLS-Prony method using data decimation", Proc. SPIE 1700, Automatic Object Recognition II, (16 September 1992); doi: 10.1117/12.138266; https://doi.org/10.1117/12.138266
PROCEEDINGS
13 PAGES


SHARE
Back to Top