666 research outputs found
Detection of Wideband Signal Number Based on Bootstrap Resampling
Knowing source number correctly is the precondition for most spatial spectrum estimation methods; however, many snapshots are needed when we determine number of wideband signals. Therefore, a new method based on Bootstrap resampling is proposed in this paper. First, signals are divided into some nonoverlapping subbands; apply coherent signal methods (CSM) to focus them on the single frequency. Then, fuse the eigenvalues with the corresponding eigenvectors of the focused covariance matrix. Subsequently, use Bootstrap to construct the new resampling matrix. Finally, the number of wideband signals can be calculated with obtained vector sequences according to clustering technique. The method has a high probability of success under low signal to noise ratio (SNR) and small number of snapshots
Performance Analysis of the Decentralized Eigendecomposition and ESPRIT Algorithm
In this paper, we consider performance analysis of the decentralized power
method for the eigendecomposition of the sample covariance matrix based on the
averaging consensus protocol. An analytical expression of the second order
statistics of the eigenvectors obtained from the decentralized power method
which is required for computing the mean square error (MSE) of subspace-based
estimators is presented. We show that the decentralized power method is not an
asymptotically consistent estimator of the eigenvectors of the true measurement
covariance matrix unless the averaging consensus protocol is carried out over
an infinitely large number of iterations. Moreover, we introduce the
decentralized ESPRIT algorithm which yields fully decentralized
direction-of-arrival (DOA) estimates. Based on the performance analysis of the
decentralized power method, we derive an analytical expression of the MSE of
DOA estimators using the decentralized ESPRIT algorithm. The validity of our
asymptotic results is demonstrated by simulations.Comment: 18 pages, 5 figures, submitted for publication in IEEE Transactions
on Signal Processin
Tunnel configurations and seismic isolation optimization in underground gravitational wave detectors
Gravitational wave detectors like the Einstein Telescope will be built a few
hundred meters under Earth's surface to reduce both direct seismic and
Newtonian noise. Underground facilities must be designed to take full advantage
of the shielding properties of the rock mass to maximize the detector's
performance. A major issue with the Einstein Telescope design are the corner
points, where caverns need to be excavated in stable, low permeability rock to
host the sensitive measurement infrastructure. This paper proposes a new
topology that moves the top stages of the seismic attenuation chains and
Michelson beam re-combination in separate excavations far from the beam-line
and equipment induced noise while the test mass mirrors remain in the main
tunnels. Distributing the seismic attenuation chain components over multiple
tunnel levels allows the use of arbitrarily long seismic attenuation chains
that relegate the seismic noise at frequencies completely outside the
low-frequency noise budget, thus keeping the door open for future Newtonian
noise suppression methods. Separating the input-output and recombination optics
of different detectors into separate caverns drastically improves the
observatory detection efficiency and allows staged commissioning. The proposed
scheme eliminates structural and instrumentation crowding while the reduced
sizes of excavations require fewer support measures
Spectrum Sensing in the Presence of Multiple Primary Users
We consider multi-antenna cooperative spectrum sensing in cognitive radio
networks, when there may be multiple primary users. A detector based on the
spherical test is analyzed in such a scenario. Based on the moments of the
distributions involved, simple and accurate analytical formulae for the key
performance metrics of the detector are derived. The false alarm and the
detection probabilities, as well as the detection threshold and Receiver
Operation Characteristics are available in closed form. Simulations are
provided to verify the accuracy of the derived results, and to compare with
other detectors in realistic sensing scenarios.Comment: Accepted in IEEE Transactions on Communication
EM Algorithm for Multiple Wideband Source Localization
A computationally efficient algorithm using the expectation-maximization (EM) algorithm for multiple wideband source localization in the near field of a sensor array/area is addressed in this thesis. Our idea is to decompose the observed sensor data, which is a superimposition of multiple sources, into the individual components in the frequency domain and then estimate the corresponding location parameters associated with each component separately. Instead of the conventional alternating projection (AP) method, we propose to adopt the EM algorithm in this work; our new method involves two steps, namely Expectation (E-step) and Maximization (M-step). In the E-step, the individual incident source waveforms are estimated. Then, in the M-step, the maximum likelihood estimates of the source location parameters are obtained. These two steps are executed iteratively and alternatively until the pre-defined convergence is reached. The computational complexity comparison between our proposed EM algorithm and the existing AP scheme is investigated. It is shown through Monte Carlo simulations that the computational complexity of the proposed EM algorithm is significantly lower than that of the existing AP algorithm
Printable microscale interfaces for long-term peripheral nerve mapping and precision control
The nascent field of bioelectronic medicine seeks to decode and modulate peripheral nervous system signals to obtain therapeutic control of targeted end organs and effectors. Current approaches rely heavily on electrode-based devices, but size scalability, material and microfabrication challenges, limited surgical accessibility, and the biomechanically dynamic implantation environment are significant impediments to developing and deploying advanced peripheral interfacing technologies. Here, we present a microscale implantable device – the nanoclip – for chronic interfacing with fine peripheral nerves in small animal models that begins to meet these constraints. We demonstrate the capability to make stable, high-resolution recordings of behaviorally-linked nerve activity over multi-week timescales. In addition, we show that multi-channel, current-steering-based stimulation can achieve a high degree of functionally-relevant modulatory specificity within the small scale of the device. These results highlight the potential of new microscale design and fabrication techniques for the realization of viable implantable devices for long-term peripheral interfacing.https://www.biorxiv.org/node/801468.fullFirst author draf
How Do Tiger Moths Jam Bat Sonar?
The tiger moth Bertholdia trigona is the only animal in nature known to defend itself by jamming the sonar of its predators – bats. In this study we analyzed the three-dimensional flight paths and echolocation behavior of big brown bats (Eptesicus fuscus) attacking B. trigona in a flight room over seven consecutive nights to determine the acoustic mechanism of the sonar-jamming defense. Three mechanisms have been proposed: (1) the phantom echo hypothesis, which states that bats misinterpret moth clicks as echoes; (2) the ranging interference hypothesis, which states that moth clicks degrade the bats\u27 precision in determining target distance; and (3) the masking hypothesis, which states that moth clicks mask the moth echoes entirely, making the moth temporarily invisible. On nights one and two of the experiment, the bats appeared startled by the clicks; however, on nights three through seven, the bats frequently missed their prey by a distance predicted by the ranging interference hypothesis (∼15–20 cm). Three-dimensional simulations show that bats did not avoid phantom targets, and the bats\u27 ability to track clicking prey contradicts the predictions of the masking hypothesis. The moth clicks also forced the bats to reverse their stereotyped pattern of echolocation emissions during attack, even while bats continued pursuit of the moths. This likely further hinders the bats\u27 ability to track prey. These results have implications for the evolution of sonar jamming in tiger moths, and we suggest evolutionary pathways by which sonar jamming may have evolved from other tiger moth defense mechanisms
Sensor array signal processing : two decades later
Caption title.Includes bibliographical references (p. 55-65).Supported by Army Research Office. DAAL03-92-G-115 Supported by the Air Force Office of Scientific Research. F49620-92-J-2002 Supported by the National Science Foundation. MIP-9015281 Supported by the ONR. N00014-91-J-1967 Supported by the AFOSR. F49620-93-1-0102Hamid Krim, Mats Viberg
- …