Now showing items 1-10 of 197
Application of a Frequency Domain Prony Method to Wide Bandwidth Radar Signature Classification
A frequency domain Prony approach is presented for extracting features of return signals from targets illuminated by wide bandwidth (short pulse) radar. Theoretical details pertaining to this approach are described in a separate paper. The features mentioned above consist of the relative delays and reflection coefficients pertaining to scattering ...
An Algorithm for Extraction of More than One Optimal Linear Feature from Several Gaussian Pattern Classes
Two algorithms have been developed at Rice University for optimal linear feature extraction based on the minimization risk (probability) of misclassification under the assumption that the class conditional probability density functions are Gaussian. One of these algorithms, which applieds to the case in which the dimensionality of the feature space ...
Design of Optimal Feature Extractors by Mathematical Programming Techniques
In an automatic pattern recognition system, the processor that selects and measures features fo the data, on the basis of which classification is made, is called a "feature selector" or "feature extractor". This paper presents a mathematical programming approach for the design of a feature extractor.
Feature Extraction Techniques for Classification and Identification of Spectral Signatures
Some of the results obtained at Rice University on the extraction of features from spectral signatures for the purpose of classifying and identifying these signatures are described.
Optimization Techniques for Feature Extraction in Automatic Pattern Recognition
This report summarizes the work performed under the AFOSR grant 75-2777 over the almost five year period during which the grant was in effect.
As an extension of the notion of an L-g spline, three mathematical structures called LM-g splines of types, I, II and II are introduced. (partial abstract)...
Tagged Architecture and the Semantics Programming Languages: Extensible Types
This research note suggests that before we design hardware or software for the task of problem solving, we re-evaluate the task of problem solving in terms of the linguistic constituents which will be required and the manner in which these linguistic constituents will be combined. Utilizing the principles of composition and abstraction-to-specifics, ...
Tagged Architectures and Protection: Message Systems
Recent work in extensible programming languages and operating systems by Redell, Lampson, Hewitt, and others coupled with developments in distributed computer systems motivates a study in models of the implementation of protection on tagged architectures. an extension of the notions of message and actor as discussed in previous work provides and ...
An Identification Scheme for the Determination of Systemic Arterial Load Parameters
An identification scheme is developed for the determination of several parameters of a modified "Windkessel" model of the systemic arterial system for an individual patient undergoing cardiac catheterization. The scheme utilizes a modification of the well-known Prony method [10,11] as a "starter method" to determine good nominal values for the model ...
Computer Controlled Intracavity Frequency Doubling of a CW Dye Ring Laser
The development of a computer controlled tunable ultraviolet spectrometer utilizing intracavity second harmonic generation in a single frequency CW dye ring laser is reported. With 5 W of argon ion laser pump power at 514.5 nm, the spectrometer can generate typical single mode and multimode UV output powers of 20mW (linewidth Â± 40 MHz) and 40 mW ...