Statistical analysis of TLS-based prony techniques

نویسندگان

  • William M. Steedly
  • Ching-Hui J. Ying
  • Randolph L. Moses
چکیده

Suggested running title|Statistical Analysis of TLS-Based Prony. Subtitle|We present an analysis of the statistics for the TLS-Prony method by deriving the covariance matrix of the estimated parameters. We verify the theoretical results using Monte-Carlo simulations and compare them to their Cram er-Rao bounds. Abstact We present an analysis of parameter variance statistics for the TLS-Prony method applied to damped exponential signals. We derive the covariance matrix of the estimated parameters for this method. The parameters include the magnitudes and angles of the poles, and the magnitudes and angles of the amplitude coeecients. We verify the theoretical results using Monte-Carlo simulations studies. We also compare the variance results to the corresponding Cram er-Rao bounds for several cases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accuracy and computational comparisons of TLS - Prony , Burg , and FFT - basedscattering center extraction

Scattering centers extracted from radar returns are features that can be used for automatic target recognition (ATR). Many diierent algorithms exist which can extract scattering centers from a radar return. They all, however, fall into one of two large classes: model and FFT-based techniques. In this paper, we consider one FFT and two model based techniques: 1) FFT with peak extraction, 2) the ...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Spice Compatible Model for Multiple Coupled Nonuniform Transmission Lines Application in Transient Analysis of VLSI Circuits

An SPICE compatible model for multiple coupled nonuniform lossless transmission lines (TL's) is presented. The method of the modeling is based on the steplines approximation of the nonuniform TLs and quasi-TEM assumptions. Using steplines approximation the system of coupled nonuniform TLs is subdivided into arbitrary large number of coupled uniform lines (steplines) with different characteristi...

متن کامل

Parameter Estimation of Viscoelastic Materials: A Test Case with Different Optimization Strategies

In this work, and based on numerical optimization techniques, constitutive parameters for viscoelastic materials are determined using a inverse problem formulation. The optimization methodology is based on experimental results obtained in the frequency domain, for a CFRP-Carbon Fibre Reinforced Polymer, through DMA-Dynamic Mechanical Analysis. The relaxation modulus of viscoelastic materials is...

متن کامل

Harmonic Decomposition of Transient Disturbances Using the Ls Prony and Esprit-based Methods

The modeling and analysis of electric power disturbances affecting power quality has emerged as an important field in the changing electric power industry. These disturbances differ in characteristics, and their occurrence can be attributed to various reasons. Tools capable of classifying these disturbances have been investigated and many are under development. This paper illustrates the harmon...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Automatica

دوره 30  شماره 

صفحات  -

تاریخ انتشار 1994