This paper introduces a modified TLS-Prony method which uses data decimation. The use of data decimation results in the reduction in the computational ...
確定! 回上一頁