RA-2 S-BAND ANOMALY: DETECTION AND WAVEFORMS RECONSTRUCTION A. MARTINI (1), P. FEMENIAS RA-2 S-BAND ANOMALY: DETECTION AND WAVEFORMS RECONSTRUCTION A.

Slides:



Advertisements
Similar presentations
Questions From Yesterday
Advertisements

Chapter 5: Control Structures II (Repetition)
Applications of one-class classification
Status of Channel Models IEEE WG Session #7 March 15-19, 2004 Qiang Guo Editor, Channel Modeling Correspondence Group C /30.
Simulation and Evaluation of Various Block Assignments Evaluation of multiple carriers deployed in a channel block evaluation criteria section.
Submission Page 1 January 2002 doc.: IEEE 802.RR-02/018A-d1 Andrew Myles, Cisco Systems Report of ad hoc group relating to DFS and JPT5G proposal Andrew.
Configuration management
Discussion Topics Overview of Water Rates in California Legal Framework of Water Rates Water Consumption Patterns Empirical Data – City of Fresno The.
Testing Workflow Purpose
The ISA for Physics What you need to revise.
1 Exploration of Health Care Providers Behavior to Keep Their Revenues after Reduction of Payment Generosity --- A Case of Drug Payment in Taiwan Likwang.
Richard M. Jacobs, OSA, Ph.D.
CRYOSAT WORKSHOP ESRIN – 8 to 10 March 2005 Cryosat Data Processing in Near Real Time for Oceanographic Applications J. BENVENISTE - ESA/ESRIN, Italy OZ.
RA-2 & MWR QWG meeting – ESA/ESRIN – 24 March, 2003 Envisat RA-2 and MWR Events since October 2002 Pierre Féménias ESA/ESRIN.
RA-2 & MWR CCVT – ESA/ESRIN – 25 to 27 March, 2003 MWR Calibration & Validation status MWR Cal/Val team: Ngan Tran, Estelle Obligis, Laurence Eymard, Michel.
3rd Plenary MeetingRA-2/MWR Cross-Cal & Val Team, ESRIN 12/09/01 Third Plenary ENVISAT RADAR ALTIMETRY CROSS-CALIBRATION and VALIDATION TEAM Meeting Jérôme.
6th Plenary Meeting (#17)RA-2/MWR Cross-Cal & Val Team, ESRIN 25-27/03/03 Sixth Plenary ENVISAT RADAR ALTIMETRY CROSS-CALIBRATION and VALIDATION TEAM Meeting.
Waveform Analysis of Envisat RA-2 data We have pre-processed 9 days’ of data from Envisat and piped them through the expert system. Summary: –Data over.
Page - 1 RA2 CCVT meeting March 2003 F-PAC validation context CMA chain has to be inline with the algorithms approved by ESA and used for the prototype.
8th EnviSat Calibration and Validation Progress Meeting ESRIN, 05/12/01 1 RA-2/MWR Level 2 algorithms verification and products validation group status.
SMOS L2 Ocean Salinity Level 2 Ocean Salinity L20S Tool Box Architecture & Release 27 June 2014 ARGANS & SMOS L2OS ESL.
Spelling Correction for Search Engine Queries Bruno Martins, Mario J. Silva In Proceedings of EsTAL-04, España for Natural Language Processing Presenter:
Testing Hypotheses About Proportions
Presenter MaxAcademy Lecture Series – V1.0, September 2011 Stream Scheduling.
Editing and Imputing VAT Data for the Purpose of Producing Mixed- Source Turnover Estimates Hannah Finselbach and Daniel Lewis Office for National Statistics,
LEON COURVILLE Regulation and Efficiency in the Electric Utility Industry.
Lecture 8 Strategy and Analysis in using NPV The NPV analysis then gives a precise formula for deciding whether or not to proceed with the investment.
CHE 185 – PROCESS CONTROL AND DYNAMICS
Noam Segev, Israel Chernyak, Evgeny Reznikov Supervisor: Gabi Nakibly, Ph. D.
Ch. 7 - QuickSort Quick but not Guaranteed. Ch.7 - QuickSort Another Divide-and-Conquer sorting algorithm… As it turns out, MERGESORT and HEAPSORT, although.
CS 8751 ML & KDDEvaluating Hypotheses1 Sample error, true error Confidence intervals for observed hypothesis error Estimators Binomial distribution, Normal.
Fast Port Scan Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan.
Enhancing Paper Mill Performance through Advanced Diagnostics Services Dr. BS Babji Process Automation Division ABB India Ltd, Bangalore IPPTA Zonal Seminar.
The Oscilloscope: Basic Features & Functions  Source –Determines which signal is compared to the trigger settings.  Level –Determines where on the edge.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Control Charts for Attributes
1 Time Scales Virtual Clocks and Algorithms Ricardo José de Carvalho National Observatory Time Service Division February 06, 2008.
Fundamentals of Python: From First Programs Through Data Structures
Tal Mor  Create an automatic system that given an image of a room and a color, will color the room walls  Maintaining the original texture.
Fundamentals of Python: First Programs
Predicting performance of applications and infrastructures Tania Lorido 27th May 2011.
ENVISAT Validation Workshop - Frascati - 9–13 December 2002 Opening Session:  Welcome [G. Kohlhammer]  Workshop Objectives and Organisation [H. Laur]
Number of Blocks per Pole Diego Arbelaez. Option – Number of Blocks per Pole Required magnetic field tolerance of ~10 -4 For a single gap this can be.
Education Research 250:205 Writing Chapter 3. Objectives Subjects Instrumentation Procedures Experimental Design Statistical Analysis  Displaying data.
Success depends upon the ability to measure performance. Rule #1:A process is only as good as the ability to reliably measure.
LIGO- G Z August 19, 2004Penn State University 1 Extracting Signals via Blind Deconvolution Tiffany Summerscales Penn State University.
® Kick off meeting. February 17th, 2011 QUAlity aware VIsualisation for the Global Earth Observation system of systems GEOVIQUA workshop February, the.
Control Chart Methodology for Evaluating CEMS Data
Introduction to Algorithms. What is Computer Science? Computer Science is the study of computers (??) This leaves aside the theoretical work in CS, which.
Brian Macpherson Ph.D, Professor of Statistics, University of Manitoba Tom Bingham Statistician, The Boeing Company.
Calibration Involves fixing known points and constructing a scale between these fixed points. Causal Link A change in one variable that results from, or.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
Competence Centre on Information Extraction and Image Understanding for Earth Observation 1 High Resolution Complex SAR Image Analysis Using Azimuth Sub-Band.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Tracking, PID and primary vertex reconstruction in the ITS Elisabetta Crescio-INFN Torino.
INSTRUMENT STATUS AND PERFORMANCE Guido Levrini. Page 2 ENVISAT Validation Workshop - ESRIN - 9–13 December 2002 ASAR F Instrument operability issues.
Page 1 Validation Workshop, 9-13 th December 2002, ESRIN ENVISAT Validation Workshop AATSR Report Marianne Edwards Space Research Centre Department of.
ALGORITHMS.
Sensor testing and validation plans for Phase-1 and Ultimate IPHC_HFT 06/15/ LG1.
Smart Inventory System. Step 1: Manage inventory Step 2: Record New Purchase Step 3: Generate New Purchase Plan (smartly)
Basic Business Statistics, 10e © 2006 Prentice-Hall, Inc. Chap 15-1 Chapter 15 Multiple Regression Model Building Basic Business Statistics 10 th Edition.
Statistics for Managers Using Microsoft Excel, 4e © 2004 Prentice-Hall, Inc. Chap 14-1 Chapter 14 Multiple Regression Model Building Statistics for Managers.
STAT03 - Descriptive statistics (cont.) - variability 1 Descriptive statistics (cont.) - variability Lecturer: Smilen Dimitrov Applied statistics for testing.
THEME 6: Frequency dividers. Digital counters with reduced counting modulus. Programmable digital counters. If the input pulses are more than K, the counter.
ESA Climate Change Initiative Sea-level-CCI project A.Cazenave (Science Leader), G.Larnicol /Y.Faugere(Project Leader), M.Ablain (EO) MARCDAT-III meeting.
Chapter 4 Dynamical Behavior of Processes Homework 6 Construct an s-Function model of the interacting tank-in-series system and compare its simulation.
A 2 veto for Continuous Wave Searches
Control Chart Methodology for Evaluating CEMS Data
Feedback Controllers Chapter 8
Studies of the Time over Threshold
Presentation transcript:

RA-2 S-BAND ANOMALY: DETECTION AND WAVEFORMS RECONSTRUCTION A. MARTINI (1), P. FEMENIAS RA-2 S-BAND ANOMALY: DETECTION AND WAVEFORMS RECONSTRUCTION A. MARTINI (1), P. FEMENIAS (2), G. ALBERTI (3), M.P. MILAGRO-PEREZ (1) (1)SERCo S.p.a., Via Sciadonna, 24, Frascati, Rome, Italy (2) ESA/ESRIN, via G. Galilei, 1, Frascati, Rome, Italy (3) CO.RI.S.T.A., Viale Kennedy, 5, Naples, ItalyABSTRACT As widely known the RA-2 data are affected by the so-called "S-Band anomaly" discovered in the early days of the Commissioning Phase. As described in [R - 1] it consists in the accumulation of the S-Band echo waveforms that starts, apparently randomly, after an instrument Acquisition phase. Investigation is on going to try and find the instrumental cause of this behavior but in the meantime the data affected by this anomaly are completely unusable. For this reason the need has arisen for the users to be able to detect the anomalous data and eventually reconstruct a usable signal from them. This paper describes the algorithm developed for the L1b processor that allows to set a flag identifying the data affected by the "S- Band anomaly“ and reconstruct normal echo waveforms to be then ingested in the nominal re-tracking procedure at L2.It presents also the results obtained after the implementation in the L1b reference processor.REFERENCES [R – 1] ENVISAT RA-2: S-BAND PERFORMANCE, S. Laxon and M. Roca, Proceedings of the ENVISAT Calibration Workshop, Noordwijk, September 2002 [R – 2] Algorithm for Flag identification and waveforms reconstruction of RA- 2 data affected by “S-Band anomaly”, A. Martini, ENVI-GSEG-TN , Issue 1.4, September 2004 ALGORITHM DESCRIPTION Consider each Data Block acquired in Tracking or IF Cal. or Preset Loop Output or Preset Tracking Mode. For each couple of consecutive Data Blocks, subtract, bin per bin, the S-Band waveforms. For anomaly detection: –Consider a buffer with n_buffer Data Blocks of subtracted waveforms. –If the number of bins assuming a negative value is higher than n_count, then the S-Band anomaly exists for the first Data Block in the buffer. –Shift of one Data Block and repeat the pervious two steps. For waveforms reconstruction: –Consider one Data Block of subtracted waveforms –If some bin exists having a value lower than diff_threshold, then substitute it with the average of the two corresponding bins in the previous and following waveforms. –If for current Data Block, the S-Band anomaly had been detected, then substitute the S-Band waveform with the just evaluated one. –Shift of one Data Block and repeat the pervious steps. For details see [R – 2] RESULTS The results hereafter presented have been obtained by setting the n_buffer, n_count and diff_threshold respectively to 20 and 25 and 4*10 8 Power Units.DETECTION S-Band anomaly flag for cycle 27 This cycle presents the highest percentage of affected data during the whole ENVISAT mission. The choice of the three algorithm variables is the outcome of a big tuning exercise which has examined the performances of the algorithm with different combinations of the three parameters over four different surfaces (e.g. Ocean, Ice Sheet, Land and Sea Ice). The combination has been chosen which gave the lowest percentage of data characterized by wrongly detected flag; among cases with equivalent performances, the one has been selected producing the lowest percentage of false negatives (data affected by S-Band anomaly flagged as not affected). In this example the data wrongly flagged data represent about the 0.49% of the total and they are mostly located over Land and Sea Ice surfaces. In any case this amount can be considered a fair price to pay to detect and cure an anomaly, which affects, in average, between 2% and 6% of data per cycle. WAVEFORMS RECONSTRUCTION Examples of original and reconstructed waveforms over different surfaces: Ocean, Ice Sheet, Sea Ice and Land.CONCLUSIONS The poster presents an algorithm targeted to the detection of the so-called RA-2 “S-Band anomaly” from the L0 data products as well as an algorithm to reconstruct the affected waveforms in such a way that they can be directly ingested in the L2 re-tracking processing. The current algorithm with the chosen parameters allows the correct detection of the S-Band anomaly in 99.51% of the cases where the failing ones are mostly false negatives and localized over Land and Sea Ice. The operational implementation of the detection algorithm is almost completed while the waveforms reconstruction one will be completed by the end of the year. For j=0, 63 WF(i, j)-WF(i-1, j) For k=i, i-n_buffer-1 WF_S(k,j) If N < n_count Count number of elements for which WF_S(k,j) < 0 N WF(i) WF(i-1) WF_S(i, j) For j=0, 63 If WF_S(i, j) < diff_threshold YES WF_S(i, j)= (WF_S(i+1,j)+WF_S(i-1,j))/2 S Band anomaly flag (i) = 1 If S Band anomaly flag (i) = 1 NO For j=0, 63 WF(i,j) = WF_S(i,j) YES S-Band waveforms over OceanS-Band waveforms over Ice Sheet S-Band waveforms over Sea Ice S-Band waveforms over Land