Detecting Weak Spectral Lines in Interferometric Data through Matched Filtering
نویسندگان
چکیده
منابع مشابه
Interferometric SAR data filtering based on amplitude optimization
In this paper, a methodology of noise reduction for interferometric SAR data is proposed based on amplitude optimization model. From the relationship between the amplitude and phase of complex signal, the optimal parameter vector of the filter is constructed pixel by pixel to maximize the minor amplitude of two coherent interferometric signals. The filter is implemented on the complex signal do...
متن کاملInterferometric data analysis based on Markov nonlinear filtering methodology.
For data processing in conventional phase shifting interferometry, Fourier transform, and least-squares-fitting techniques, a whole interferometric data series is required. We propose a new interferometric data processing methodology based on a recurrent nonlinear procedure. The signal value is predicted from the previous step to the next step, and the prediction error is used for nonlinear cor...
متن کاملInterferometric SAR Space-Varying Filtering of X-Band SRTM Data
Interferometric SAR data should be filtered in order to remove the geometrical decorrelation caused by the presence in the signal pair of “incoherent” components not illuminated in both the passes. This operation is generally carried out, via common band filters, by assuming a planar topography whereas in the real, non-planar topography case, the problem becomes space variant. We discuss the ap...
متن کاملDouble-rotated Matched Filtering
Using the concept of steerable filters, it is possible to represent the rotation of a known template – and thus arbitrary orientations of lines or edges – as a linear combination of a fixed number of base filters, thus allowing a computationally efficient detection of 1D structures. In spite of their usefulness in many image processing areas, such structures exhibit one important drawback: Due ...
متن کاملDetecting Periodicity in Serial Data through Visualization
Detecting suspicious or malicious user behavior in large networks is an essential task for administrators which requires significant effort due to the huge amount of log data to be processed. However, several of these activities can be rapidly identified since they usually demonstrate periodic behavior. For instance, periodic activities by specific users accessing the billing system of a financ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Astronomical Journal
سال: 2018
ISSN: 1538-3881
DOI: 10.3847/1538-3881/aab604