666 research outputs found

    Detection of Wideband Signal Number Based on Bootstrap Resampling

    Get PDF
    Knowing source number correctly is the precondition for most spatial spectrum estimation methods; however, many snapshots are needed when we determine number of wideband signals. Therefore, a new method based on Bootstrap resampling is proposed in this paper. First, signals are divided into some nonoverlapping subbands; apply coherent signal methods (CSM) to focus them on the single frequency. Then, fuse the eigenvalues with the corresponding eigenvectors of the focused covariance matrix. Subsequently, use Bootstrap to construct the new resampling matrix. Finally, the number of wideband signals can be calculated with obtained vector sequences according to clustering technique. The method has a high probability of success under low signal to noise ratio (SNR) and small number of snapshots

    Performance Analysis of the Decentralized Eigendecomposition and ESPRIT Algorithm

    Full text link
    In this paper, we consider performance analysis of the decentralized power method for the eigendecomposition of the sample covariance matrix based on the averaging consensus protocol. An analytical expression of the second order statistics of the eigenvectors obtained from the decentralized power method which is required for computing the mean square error (MSE) of subspace-based estimators is presented. We show that the decentralized power method is not an asymptotically consistent estimator of the eigenvectors of the true measurement covariance matrix unless the averaging consensus protocol is carried out over an infinitely large number of iterations. Moreover, we introduce the decentralized ESPRIT algorithm which yields fully decentralized direction-of-arrival (DOA) estimates. Based on the performance analysis of the decentralized power method, we derive an analytical expression of the MSE of DOA estimators using the decentralized ESPRIT algorithm. The validity of our asymptotic results is demonstrated by simulations.Comment: 18 pages, 5 figures, submitted for publication in IEEE Transactions on Signal Processin

    Tunnel configurations and seismic isolation optimization in underground gravitational wave detectors

    Full text link
    Gravitational wave detectors like the Einstein Telescope will be built a few hundred meters under Earth's surface to reduce both direct seismic and Newtonian noise. Underground facilities must be designed to take full advantage of the shielding properties of the rock mass to maximize the detector's performance. A major issue with the Einstein Telescope design are the corner points, where caverns need to be excavated in stable, low permeability rock to host the sensitive measurement infrastructure. This paper proposes a new topology that moves the top stages of the seismic attenuation chains and Michelson beam re-combination in separate excavations far from the beam-line and equipment induced noise while the test mass mirrors remain in the main tunnels. Distributing the seismic attenuation chain components over multiple tunnel levels allows the use of arbitrarily long seismic attenuation chains that relegate the seismic noise at frequencies completely outside the low-frequency noise budget, thus keeping the door open for future Newtonian noise suppression methods. Separating the input-output and recombination optics of different detectors into separate caverns drastically improves the observatory detection efficiency and allows staged commissioning. The proposed scheme eliminates structural and instrumentation crowding while the reduced sizes of excavations require fewer support measures

    Spectrum Sensing in the Presence of Multiple Primary Users

    Full text link
    We consider multi-antenna cooperative spectrum sensing in cognitive radio networks, when there may be multiple primary users. A detector based on the spherical test is analyzed in such a scenario. Based on the moments of the distributions involved, simple and accurate analytical formulae for the key performance metrics of the detector are derived. The false alarm and the detection probabilities, as well as the detection threshold and Receiver Operation Characteristics are available in closed form. Simulations are provided to verify the accuracy of the derived results, and to compare with other detectors in realistic sensing scenarios.Comment: Accepted in IEEE Transactions on Communication

    EM Algorithm for Multiple Wideband Source Localization

    Get PDF
    A computationally efficient algorithm using the expectation-maximization (EM) algorithm for multiple wideband source localization in the near field of a sensor array/area is addressed in this thesis. Our idea is to decompose the observed sensor data, which is a superimposition of multiple sources, into the individual components in the frequency domain and then estimate the corresponding location parameters associated with each component separately. Instead of the conventional alternating projection (AP) method, we propose to adopt the EM algorithm in this work; our new method involves two steps, namely Expectation (E-step) and Maximization (M-step). In the E-step, the individual incident source waveforms are estimated. Then, in the M-step, the maximum likelihood estimates of the source location parameters are obtained. These two steps are executed iteratively and alternatively until the pre-defined convergence is reached. The computational complexity comparison between our proposed EM algorithm and the existing AP scheme is investigated. It is shown through Monte Carlo simulations that the computational complexity of the proposed EM algorithm is significantly lower than that of the existing AP algorithm

    Printable microscale interfaces for long-term peripheral nerve mapping and precision control

    Get PDF
    The nascent field of bioelectronic medicine seeks to decode and modulate peripheral nervous system signals to obtain therapeutic control of targeted end organs and effectors. Current approaches rely heavily on electrode-based devices, but size scalability, material and microfabrication challenges, limited surgical accessibility, and the biomechanically dynamic implantation environment are significant impediments to developing and deploying advanced peripheral interfacing technologies. Here, we present a microscale implantable device – the nanoclip – for chronic interfacing with fine peripheral nerves in small animal models that begins to meet these constraints. We demonstrate the capability to make stable, high-resolution recordings of behaviorally-linked nerve activity over multi-week timescales. In addition, we show that multi-channel, current-steering-based stimulation can achieve a high degree of functionally-relevant modulatory specificity within the small scale of the device. These results highlight the potential of new microscale design and fabrication techniques for the realization of viable implantable devices for long-term peripheral interfacing.https://www.biorxiv.org/node/801468.fullFirst author draf

    How Do Tiger Moths Jam Bat Sonar?

    Get PDF
    The tiger moth Bertholdia trigona is the only animal in nature known to defend itself by jamming the sonar of its predators – bats. In this study we analyzed the three-dimensional flight paths and echolocation behavior of big brown bats (Eptesicus fuscus) attacking B. trigona in a flight room over seven consecutive nights to determine the acoustic mechanism of the sonar-jamming defense. Three mechanisms have been proposed: (1) the phantom echo hypothesis, which states that bats misinterpret moth clicks as echoes; (2) the ranging interference hypothesis, which states that moth clicks degrade the bats\u27 precision in determining target distance; and (3) the masking hypothesis, which states that moth clicks mask the moth echoes entirely, making the moth temporarily invisible. On nights one and two of the experiment, the bats appeared startled by the clicks; however, on nights three through seven, the bats frequently missed their prey by a distance predicted by the ranging interference hypothesis (∼15–20 cm). Three-dimensional simulations show that bats did not avoid phantom targets, and the bats\u27 ability to track clicking prey contradicts the predictions of the masking hypothesis. The moth clicks also forced the bats to reverse their stereotyped pattern of echolocation emissions during attack, even while bats continued pursuit of the moths. This likely further hinders the bats\u27 ability to track prey. These results have implications for the evolution of sonar jamming in tiger moths, and we suggest evolutionary pathways by which sonar jamming may have evolved from other tiger moth defense mechanisms

    Sensor array signal processing : two decades later

    Get PDF
    Caption title.Includes bibliographical references (p. 55-65).Supported by Army Research Office. DAAL03-92-G-115 Supported by the Air Force Office of Scientific Research. F49620-92-J-2002 Supported by the National Science Foundation. MIP-9015281 Supported by the ONR. N00014-91-J-1967 Supported by the AFOSR. F49620-93-1-0102Hamid Krim, Mats Viberg
    • …
    corecore