In this paper, an iterative Compressive Sensing (CS) algorithm is proposed for acoustical source characterization problems with block sparsity constraints. Source localization and signal separation are accomplished in a unified CS framework. The inverse problem is formulated with the Equivalent Source Method as a linear underdetermined system of equations. As conventional approaches based on convex optimization can be computationally expensive and fail to deal with continuously distributed sources, the proposed approach that is adapted from the Newton's method and is augmented with a special pruning procedure is capable of solving the inverse problem far more efficiently with comparable accuracy. The pruning procedure employs a binary mask that admits sparsity constraints of two-dimensional block sources. The binary mask is heuristic in that it tends to promote nonzero positive source magnitudes. In each iteration, the source amplitude vector is on one hand updated by the Newton's method and on the other hand pruned with the binary mask. With the pruning procedure, the source magnitudes become increasingly sparse and clustered such that the block characteristics are enhanced. In the post-processing phase, particle velocity is calculated on the basis of the equivalent source amplitudes. Numerical and experimental investigations are conducted to validate the proposed technique. The results have demonstrated the efficacy of the proposed Compressive Newton's method in imaging block sources and extracting signal waveforms with little computational cost, as compared to a convex optimization package.

Noise Source Identification (NSI) techniques seek to pinpoint the locations, waveforms, and the associated acoustic variables of the noise sources in industrial, transportation, and environmental scenarios.1 Many array-based NSI techniques such as the Nearfield Acoustic Holography (NAH), beamforming, deconvolution method, etc., have been suggested in the past.2,3 NAH that requires measurement in the nearfield of sources is a high-resolution reconstruction method.4 NAH methods can be implemented on the basis of spatial Fourier transforms,5,6 plane or spherical wave expansions,7–9 boundary element methods,10,11 etc.

The Equivalent Source Method (ESM),12–14 also known as the method of wave superposition, is a simple method that is not limited to sources of regular geometry. The idea of ESM lies in that an arbitrary sound field can be approximated as the superposition of waves emanated by an array of discrete simple sources. A small standoff distance is generally maintained between the equivalent sources and the real source to prevent singularity problems when reconstructing the sound field on the source surface. A linear inverse problem can be formulated via ESM. However, for the spatially extended, the number of equivalent sources assumed can be far greater than the number of sensors. In this case, the inverse problem becomes an underdetermined one whose solution is not unique. The classical Least-Squares (LS) solution with pseudoinverse gives only minimum-norm solution, which tends to unduly spread errors in the solution space. A newly emerging technique, Compressive Sensing (CS), tackles this nonuniqueness problem by imposing the sparsity constraint. The sparse solution can be obtained by solving a convex optimization problem.15–18 Numerical packages such as CVX19,20 are available for solving the convex optimization problems. However, the CS approaches are useful when the sources are discrete and sparse. For spatially extended “block” sources, the CS approaches could break down because the sparsity condition is not fulfilled. In addition, package CVX is very computationally expansive. As a more efficient alternative, the Wideband Holography (WBH), was suggested by Hald21 to solve the inverse problem by using a modified method of steepest descent with pruning. Although WBH is computationally more efficient than the CVX, it primarily only deals with point sources. To handle block-sparse sources, beamforming using Total Variation (TV) norm was proposed by Xenaki et al.22 Their method mainly deals with one-dimensional and coherent block sources.

In the present paper, an iterative CS algorithm is proposed to solve block-sparse inverse problems and to reconstruct sound field. Source localization and signal extraction are accomplished in a unified CS framework. The iterative CS algorithm, also referred to as Compressive Newton's (CNT) hereafter, is based on a modified Newton's method23–25 to calculate the source amplitudes with the aid of a special pruning procedure. The CNT method converges much faster than the WBH method with a pruning method different from the method by Xenaki et al.,22 which can handle two-dimensional and incoherent block sources. In addition, by using the CNT method, the acoustic variables including sound pressure, particle velocity, sound intensity, and sound power, and the radiation pattern can all be calculated, based on the ESM.

This paper is organized as follows. Section II outlines the basic theory of ESM and underdetermined inverse NSI problem. Section III describes the key concepts of the CNT algorithm. Section IV presents calculations of acoustic variables based on the ESM. Numerical and experimental investigations are presented in Secs. V and VI. Section VII summarizes the strengths as well as limitations of the CNT technique.

In this section, the acoustic source characterization problem is formulated as an inverse problem on the basis of the ESM. The simple sources used as equivalent sources are monopoles.

Figure 1 depicts the idea of the ESM by using which the sound field is represented with a large number of virtual monopole sources. The sound pressure emitted by the actual source is sampled in space and time by an array of microphones. The equivalent sources are assumed to be distributed behind the actual source surface with a standoff distance. The acoustic variables on the reconstruction surface can be calculated by the field propagation of these equivalent sources.

FIG. 1.

(Color online) Important surfaces used in the ESM.

FIG. 1.

(Color online) Important surfaces used in the ESM.

Close modal

Consider M microphones and N equivalent monopole sources that emit spherical waves. The pressure vector p(ω) received at the microphones can be written in the frequency domain as26 

(1)

where pM, the matrix A=[a1a2aN]M×N is the steering matrix and an=[ejkr1n/r1nejkr2n/r2nejkrMn/rMn]T, n=1,,N, denotes the steering vector of the nth source, with the superscript “T” denoting matrix transpose. Here, time dependence ejωt is assumed, with ω and t denoting angular frequency and time, and j=1. The distance, rmn=rnrm, with rn and rm being the position vectors of the nth equivalent source and the mth microphone. The source amplitude vector s(ω) = [s1(ω)… sN(ω)]TN. The vector n(ω) represents the additive noise that is uncorrelated with the source signals.

Given the pressure vector p and the steering matrix A, solving the problem of Eq. (1) for the unknown source amplitude vector s is a linear inverse problem. For spatially extended sources, the number of equivalent sources must be sufficiently large, or equivalently the search grid must be fine enough, to serve as the dictionary and is in general far greater than the number of microphones. Therefore, the problem is typically underdetermined, i.e., NM. In this case, the solution is generally not unique unless imposing additional constraints. Although a traditional LS solution using pseudoinverse gives a unique minimum-norm LS solution for the underdetermined problem, the error tends to spread evenly in the solution space. Unlike the LS solution, the CS approach imposes a sparsity constraint to limit the cardinality (nonzero entries) of the solutions.15–17 The CS problem can be cast into the following constrained optimization problem:

(2)

where s0 denotes the 0-norm, or the cardinality, of the vector s and A is the steering matrix or the sensing matrix in the CS context. However, the CS problem above is not convex. A convex approximation of the problem that also provides robustness to noise is generally used.

(3)

The parameter ε is a threshold that can be selected with reference to the aforementioned LS solution. Numerous methods can be used to solve this convex optimization problem.27,28 This problem can be solved numerically by a convex optimization package (CVX).18–20 It is noteworthy that the preceding CS approach works for only point-sparsity. In order for the nonzero point sources to be resolvable, the number of these sources must be less than the number of microphones (M).22 This requirement is a clear violation for problems of spatially extended sources which should be characterized as problems with block-sparsity.

Although CS problems can be solved by using the package CVX, the computational cost is extremely high to prevent itself from many time-critical applications. The present paper proposes a CNT algorithm to solve CS problems with block-sparsity constraints. The proposed algorithm is based on Newton's (NT) method into which a pruning procedure of sparsity constraints is incorporated.

The NT method, also known as the Newton-Raphson method, is a numerical method that was originally developed to find successively the roots (or zeroes) of a real-valued function.20–22 The NT method can be extended to vector and complex-valued cases. The NSI problem described as a linear system of equations in Eq. (1) can be solved iteratively by using the NT method. Instead of solving the linear system of equations directly, the problem is formulated as an unconstrained optimization problem with the cost function

(4)

to be minimized. In Eq. (4), s is source amplitude vector. The preceding expression is of hermitian form and thus has a unique minimum. The stationary point can be determined by taking the complex gradient of F.29 

(5)

Note that the gradient vector

(6)

with the residual vector r=Asp and G being the Jacobian matrix whose entries are defined as Gkj=rk/xj.

It follows from Eq. (5) that the optimization problem of Eq. (4) becomes a root-finding problem of Eq. (5). Let s0 be a vector in the neighborhood of the root vector. Expand the gradient vector in the neighborhood of the root vector by the vector Taylor series

(7)

This leads to

(8)

where H is the Hessian matrix

(9)

With some manipulations, it can be shown that the ijth-entry of H is Hij=/sj*(k=1mrk/si*(rk))=k=1m((rk/si*)(rk/sj*)+(2rk/sj*si*)rk). In matrix form

(10)

whereDij=k=1m(2rk/si*sj*)rk. As inspired by Eq. (8), the solution can be updated as

(11)

where the superscript “+” denotes the pseudoinverse operation. This is generally referred to as the Newton-Raphson method. By omitting D, which is comprised of the second-order derivatives, the Newton-Raphson method reduces to the Gauss-Newton method

(12)

Another well-known steepest decent method can also be regarded as an approximation of the Newton-Raphson method when the Hessian matrix H is omitted.

The preceding formulation is general in that it is applicable to nonlinear system of equations, f(s)=p. In a linear case as examined in the paper, f(s)=As, it is straightforward to show that

(13)

It follows from Eq. (11) that

By the singular value decomposition (SVD) of A

As a result, both the Newton-Raphson method and the Gauss-Newton method lead to the same update equation in the linear case.

(14)

where i is the iteration index. The step size μ is used to control the convergence rate.

In the proposed CNT method, the key step to impose the sparsity constraint is to incorporate a pruning procedure into the Newton's iteration. In the following, a binary mask is employed to promote the sparsity constraints:

(15)

where i denotes iteration index, n denotes source number, smax(i)=max(|sn(i)|,n=1,,N) with sn(i) being the nth entry of the source amplitude vector s(i) at the ith iteration, sn(i)/|sn(i)| being the phase term of sn(i), and D(i) is the pruning threshold selected to be a fraction of smax(i)

(16)

The choice of the parameter γ enables migration from point sparsity constraint to block sparsity constraint as γ varies from 1 to 0. In light of the pruning action, the magnitude of the equivalent source amplitude will be reset by the binary mask to a maximum level with phase unchanged if its magnitude is greater than the threshold. Otherwise, the source amplitude will be reset to zero. Figure 2 illustrates the pruning procedure. With the pruning procedure, the source magnitudes become increasingly sparse and clustered such that the block characteristics are enhanced. Hence, the source vector is updated by the Newton's method and pruned with the binary mask in each iteration. The stopping criterion is

(17)
FIG. 2.

(Color online) Pruning procedure of the CNT to promote point and/or block sparsity with a binary mask.

FIG. 2.

(Color online) Pruning procedure of the CNT to promote point and/or block sparsity with a binary mask.

Close modal

The iteration stops if the difference between two successive solution norms is less than 0.01. The proposed CNT algorithm is summarized in the following pseudo-codes and the flowchart of Fig. 3.

FIG. 3.

Flowchart of the CNT algorithm.

FIG. 3.

Flowchart of the CNT algorithm.

Close modal

By using the CNT algorithm, the complex amplitudes of the source signals are obtained. The acoustic variables including sound pressure (p), particle velocity (u), sound intensity (I), sound power (W), and radiation pattern can then be calculated on the basis of the ESM.30,31

The sound pressure propagated from equivalent sources can be reconstructed as

(18)

where rmv is the distance of the vth equivalent source and the mth field point on the reconstruction surface, i.e., rmv=|zmzv|, with zm and zv being the position vectors of the vth equivalent source and the mth field point on the reconstruction surface.

The normal component of particle velocity can also be obtained

(19)

where ρ0 is the air density, e=(zmzv)/rmv and n is the unit vector normal to the reconstruction surface.

The microphone array model used in the present work is a random array with sensor locations determined in previous research.31 The array size is 0.48 m × 0.4 m, and has 30 microphones. The sampling frequency is 16 kHz. The Fast Fourier Transform (FFT) block size is 2048, processed with Hanning window, and averaged with 50% overlap.

For the simulation, consider two point sources located at (0 m, 0 m, 1 m) and (0.8 m, 0.3 m, 1 m), emanating independent speech signals. The microphone array is placed on the plane, z = 0 m. On the equivalent source plane that covers a 1.5 m × 1.5 m square area, 100 (10 × 10) virtual monopole sources are distributed at a distance 1.05 m from the array. The reconstruction plane is parallel to the microphone array plane at z = 1 m. The reconstruction plane is of the same size as the microphone array plane. On the reconstruction plane, 31×31 grid points are selected at a distance 0.05 m from the equivalent source plane. The signal-to-noise ratio (SNR) of the test data used in the simulation is 40 dB. It accommodates 100× loss of SNR due to the illposedness in the inversion process. Lower SNR would only result in worse quality of the extracted source signal, which necessitates heavier regularization. Comprehensive investigation on this aspect can be found in the Ref. 25.

The pruning parameter γ = 0.95 is assumed in the CNT algorithm because only point sparsity is involved in this case. In addition, the steepest descent (SD)20 and conjugate gradient (CG)32,33 method with pruning are also used for benchmarking the CNT method. Figure 4 shows the reconstructed pressure magnitude map. For simplicity, all data have been normalized within 0–1 in linear scale. The results have shown that all methods but the CG method located the sources correctly. Furthermore, we not only compare the proposed CNT method with the CVX package, but also compare with the SD, CG, and FOCUSS algorithms.34 The source speech signals have been well separated by using the CNT algorithm, as summarized in Table I. Perceptual Evaluation of Speech Quality (PESQ)35 is employed as an objective test metric to evaluate speech quality. The mean opinion score (MOS) is calculated, ranging from 1 to 5. MOS signifies the difference in speech quality between the clean source signal and the source signal extracted by the separation algorithms.

FIG. 4.

(Color online) The simulation results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

FIG. 4.

(Color online) The simulation results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

Close modal
TABLE I.

Separation performance of two speech sources.

CVXSDCGCNTFOCUSS
PESQ Source 1 3.12 2.39 2.48 2.76 2.85 
Source 2 3.31 2.79 2.83 3.13 2.21 
CPU time (s) 31 065 377 326 296 518 
CVXSDCGCNTFOCUSS
PESQ Source 1 3.12 2.39 2.48 2.76 2.85 
Source 2 3.31 2.79 2.83 3.13 2.21 
CPU time (s) 31 065 377 326 296 518 

Although CVX achieves the highest PESQ, it is extremely time-consuming. Three iterative CS approaches are far more computationally efficient than the CVX method. The processing time required by the proposed CNT method which achieves slightly lower MOS than the CVX is only 1% of that required by the CVX.

The baffled circular rigid piston of radius 0.144 m, which has a farfield closed-form solution, is employed as a spatially extended source model. The rigid piston is driven with unit velocity amplitude at the frequency 3800 Hz, which amounts to ka=10. The piston is assumed to be located at 1 m away from the microphone array. There are 100 × 100 virtual sources, covering 0.6 m × 0.6 m square area, distributed 1.05 m away from the microphone array. The reconstruction surface has 31×31 grid points located at a standoff distance 0.05 m away from the equivalent source surface, covering a 0.3 m × 0.3 m area.

The pruning parameter γ = 0.7 is assumed in the CNT algorithm because of the block sparsity involved in this case. The acoustic variables are reconstructed by using the CNT method on the source surface, as shown in Fig. 5, where the circular piston is indicated by a blue dotted curve. The reconstructed velocity coincides well with the piston area. In particular, particle velocity map has achieved a nearly perfect fit. Figure 5(b) further compares the particle velocity profiles reconstructed using the CNT, CVX, and the desired profile of the piston. We compare the reconstructed particle velocity with ground truth. The error is quantified using the metric x̂x/x(%), where x̂ is the reconstructed velocity and x is ground truth data. The reconstruction error of particle velocity profiles for the CNT and the CVX methods are 11.06% and 80.18%, respectively. The velocity profile reconstructed by the CNT method fits quite well the desired profile, whereas the velocity profile reconstructed by the CVX yields a hill instead of a terrace. This result demonstrates that the CNT is able to handle problems with block sparsity in contrast to the CVX that only deals with problems with point sparsity.

FIG. 5.

(Color online) The simulation results of a coherent baffled circular rigid piston. (a) particle velocity, (b) a slice of the velocity profile along the diagonal of the circular piston, parallel to the x-axis.

FIG. 5.

(Color online) The simulation results of a coherent baffled circular rigid piston. (a) particle velocity, (b) a slice of the velocity profile along the diagonal of the circular piston, parallel to the x-axis.

Close modal

The example above is a case of “coherent” block source. In the following, another example of “incoherent” block source is examined by using the same piston driven by unit-magnitude but random-phase velocity distribution. Figure 6 shows the surface acoustic variables reconstructed using the CNT algorithm for the incoherent piston source. The reconstructed particle velocity remains to cover the piston area with constant velocity magnitude. This result demonstrates the capability of the proposed CNT algorithm in imaging incoherent block sources.

FIG. 6.

(Color online) The simulation results of an incoherent baffled circular rigid piston. (a) particle velocity, and (b) ground-truth.

FIG. 6.

(Color online) The simulation results of an incoherent baffled circular rigid piston. (a) particle velocity, and (b) ground-truth.

Close modal

Figure 7 shows the learning curve of solution norms obtained with three iterative CS methods. Apparently, the CNT method converges at a faster speed than the CG method to the desired reconstruction within pre-specified tolerance of the solution norm increment [Eq. (17)]. Interestingly, the CG settles to a biased solution norm, which explains its inferior performance as compared to the other two methods.

FIG. 7.

(Color online) The learning curves of the solution norms calculated using three iterative CS methods.

FIG. 7.

(Color online) The learning curves of the solution norms calculated using three iterative CS methods.

Close modal

To verify the proposed algorithm, experiments are undertaken in a 5.4 m × 3.5 m × 2 m anechoic room, as shown in Fig. 8. In the experimental arrangement, 30 channels of 1/4 in. PCB® condenser microphones are utilized to capture the noise signals. NI PXI-1042Q® is used as the data acquisition system operated under the sample rate 16 kHz. The origin of the coordinate system is selected to be the bottom-left corner of the rectangular random array holder.

FIG. 8.

(Color online) Experimental arrangement in an anechoic room for two practical sources. (a) A loudspeaker and a hand cutter and (b) a fan and a hand cutter.

FIG. 8.

(Color online) Experimental arrangement in an anechoic room for two practical sources. (a) A loudspeaker and a hand cutter and (b) a fan and a hand cutter.

Close modal

In Fig. 8(a), a midrange loudspeaker broadcasting female speech and a hand cutter are used as two example sources. These sources are located at (0 m, 0 m, 1 m) and (0.7 m, 0.5 m, 1 m), respectively. The hand cutter can be regarded as a point source, while the loudspeaker can be regarded as a coherent block source. In total, 31×31 equivalent sources covering a 1.5 m × 1.5 m square area 1.05 m away from the array are used in the ESM. The reconstruction surface has identical grid points allocated, with a 0.05 m standoff distance from the equivalent source surface.

The pruning parameter γ = 0.7 is assumed in the CNT algorithm because both point sparsity and block sparsity are involved in this case. Figure 9 shows the result of virtual source amplitude obtained using different methods. All methods demonstrate accurate localization capability. In particular, the virtual sources obtained using the CNT method appear to be distributed in a more concentrated way than the other two methods for the hand cutter. However, there is a drastic difference in the processing time (310 s for the CNT method and 30 842 s for the CVX). That is, the CNT method is computationally more efficient than the CVX by approximately a factor of 100. The acoustic variables and radiation pattern calculated based on the ESM are shown in Fig. 10. All imagery, in particular the velocity map, coincides with the actual source locations very clearly. The sound powers produced by the hand cutter and the loudspeaker are estimated to be 1.05 and 0.077 W, respectively.

FIG. 9.

(Color online) Experiment results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

FIG. 9.

(Color online) Experiment results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

Close modal
FIG. 10.

(Color online) Acoustic variables and radiation pattern calculated using the CNT method. (a) sound pressure, (b) particle velocity.

FIG. 10.

(Color online) Acoustic variables and radiation pattern calculated using the CNT method. (a) sound pressure, (b) particle velocity.

Close modal

In Fig. 8(b), all experimental arrangements are similar to those in Sec. VI A. Instead of a loudspeaker which is better characterized as a coherent source, however, an electrical fan is utilized to serve as an incoherent block source. The sources are located at (0 m, 0 m, 1 m) and (0.8 m, 0.5 m, 1 m), respectively. As before, the hand cutter can be regarded as a monopole source.

Figure 11 shows the result of virtual source amplitudes calculated using three CS methods. The CNT method fits the outline of the fan, whereas the CG method yields a slightly larger area. Note that the CVX method gives a concentrated hotspot for the fan because it deals with only point sparsity. The acoustic variables calculated are shown in Fig. 12. All imagery, especially the particle velocity map, shows the source locations clearly. The choice of the pruning parameter (γ) has a profound impact on the reconstructed velocity distribution. Solutions progressively migrating from point sparsity to block sparsity is promoted as γ decreases from 1 to 0. To better manifest this important point, we calculate the velocity maps with three different pruning settings: without pruning (γ = 1.0), with pruning (γ = 0.9), and with pruning (γ = 0.7). Without pruning, only the hand cutter is identified as a point source, while the reconstructed velocity of the fan is blurred. With light pruning (γ = 0.9), both sources are identified as point sources. Last, with heavy pruning (γ = 0.7), only the fan source is identified as a continuous source, while the hand cutter is nearly missed because of the over-dimmed image. With light pruning (γ = 0.75), both sources are identified correctly. Figure 13 shows acoustic variables calculated by the CVX method. The results indicate that the CVX method fails to “outline” the fan which represents an incoherent block source. The processing times are 327 s for the CNT method and 30 147 s for the CVX method. The sound powers produced by the hand cutter and the fan are estimated to be 0.094 and 1.023 W, respectively.

FIG. 11.

(Color online) Experimental results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

FIG. 11.

(Color online) Experimental results of virtual source amplitudes obtained using three CS methods. (a) The CNT method, (b) the iterative CS with CG, and (c) the CVX method.

Close modal
FIG. 12.

(Color online) The particle velocity maps calculated using the CNT algorithm. (a) Without pruning (γ = 1.0), (b) with pruning (γ = 0.9), (c) with pruning (γ = 0.7), and (d) with pruning (γ = 0.75).

FIG. 12.

(Color online) The particle velocity maps calculated using the CNT algorithm. (a) Without pruning (γ = 1.0), (b) with pruning (γ = 0.9), (c) with pruning (γ = 0.7), and (d) with pruning (γ = 0.75).

Close modal
FIG. 13.

(Color online) Particle velocity calculated using the CVX package.

FIG. 13.

(Color online) Particle velocity calculated using the CVX package.

Close modal

A noise source characterization technique based on the iterative CS method has been developed. The proposed CNT method incorporates point and block sparsity constraints into the iteration process by using a binary mask, enabling the identification of not only point sources but also two-dimensional incoherent block sources.

Simulated results have shown that the source signals extracted using the CNT method attain good voice quality assessed by PESQ, with little processing time. For the rigid piston example, the CNT method provides very good reconstruction of the sound field in agreement with the theoretical solution.

The experimental results have demonstrated that the proposed CNT method is capable of reconstructing the sound field produced by an incoherent block source. The CNT method requires little computational cost compared to the numerical package CVX in an order of 100. In the post-processing phase, acoustic variables including particle velocity can be calculated on the basis of ESM. In particular, particle velocity map coincides well with the outline of block sources regardless of the coherence of source surface velocity distribution.

The work was supported by the Ministry of Science and Technology (MOST) in Taiwan, Republic of China, under the project number 105-2221-E-007-030-MY3. Thanks also go to Mr. E. Chin-Pu Tsai for his enthusiastic support of the Telecom Electroacoustics Audio laboratory (TEA lab).

1.
K.
Begin
and
K.
Haddad
, “
Noise source identification techniques: Simple to advanced applications
,”
Proc. Acoust.
2012
,
1781
1786
.
2.
M.
Marroquin
, “
Noise source identification: A comparison of seven different techniques
,”
J. Acoust. Soc. Am.
112
(
5
),
2372
(
2002
).
3.
T. H.
Hodgson
, “
Noise source identification by coherence and acoustical methods using FFT analyzers
,”
J. Acoust. Soc. Am.
74
,
S3
(
1983
).
4.
J. D.
Maynard
,
E. G.
Williams
, and
Y.
Lee
, “
Nearfield acoustic holography: I. Theory of generalized holography and the development of NAH
,”
J. Acoust. Soc. Am.
78
(
4
),
1395
1413
(
1985
).
5.
E. G.
Williams
and
J. D.
Maynard
, “
Holographic imaging without the wavelength resolution limit
,”
Phys. Rev. Lett.
45
,
554
557
(
1980
).
6.
E. G.
Williams
, “
Continuation of acoustic near-fields
,”
J. Acoust. Soc. Am.
113
,
1273
1281
(
2003
).
7.
J.
Hald
, “
Basic theory and properties of statistically optimized near-field acoustical holography
,”
J. Acoust. Soc. Am.
125
,
2105
2120
(
2009
).
8.
S. F.
Wu
and
J.
Yu
, “
Reconstructing interior acoustic pressure fields via Helmholtz equation least-squares method
,”
J. Acoust. Soc. Am.
104
,
2054
2060
(
1998
).
9.
A.
Sarkissian
, “
Method of superposition applied to patch near-field acoustic holography
,”
J. Acoust. Soc. Am.
118
,
671
678
(
2005
).
10.
M. R.
Bai
, “
Application of BEM (boundary element method)-based acoustic holography to radiation analysis of sound sources with arbitrarily shaped geometries
,”
J. Acoust. Soc. Am.
92
,
533
549
(
1992
).
11.
K.
Kim
and
J. G.
Ih
, “
On the reconstruction of the vibro-acoustic field over the surface enclosing an interior space using the boundary element method
,”
J. Acoust. Soc. Am.
100
,
3003
3016
(
1996
).
12.
N. P.
Valdivia
and
E. G.
Williams
, “
Study of the comparison of the methods of equivalent sources and boundary element methods for near-field acoustic holography
,”
J. Acoust. Soc. Am.
120
,
3694
3705
(
2006
).
13.
J.
Hald
, “
Scaling of plane-wave functions in statistically optimized nearfield acoustic holography
,”
J. Acoust. Soc. Am.
136
,
2687
2696
(
2014
).
14.
E.
Fernandez-Grande
,
A.
Xenaki
, and
P.
Gerstoft
, “
A sparse equivalent source method for near-field acoustic holography
,”
J. Acoust. Soc. Am.
141
,
532
542
(
2017
).
15.
G.
Chardon
,
L.
Daudet
,
A.
Peillot
,
F.
Ollivier
,
N.
Bertin
, and
R.
Gribonval
, “
Near-field acoustic holography using sparse regularization and compressive sampling principles
,”
J. Acoust. Soc. Am.
132
,
1521
1534
(
2012
).
16.
E. J.
Candes
and
M. B.
Wakin
, “
An introduction to compressive sampling
,”
IEEE Signal Proc. Mag.
25
,
21
30
(
2008
).
17.
E.
Candes
,
J.
Romberg
, and
T.
Tao
, “
Stable signal recovery from incomplete and inaccurate measurements
,”
Comm. Pure Appl. Math.
59
(
8
),
1207
1223
(
2006
).
18.
S.
Boyd
and
L.
Vandenberghe
,
Convex Optimization
(
Cambridge University Press
,
New York
,
2004
), Chaps.
1
7
.
19.
M. R.
Bai
and
C. C.
Chen
, “
Application of convex optimization to acoustical array signal processing
,”
J. Sound Vib.
332
(
5
),
6596
6616
(
2013
).
20.
M.
Grant
and
S.
Boyd
, “
cvx, (Version 1.21) MATLAB software for disciplined convex programming [computer program]
,” http://cvxr.com/cvx (Last viewed August 20,
2016
).
21.
J.
Hald
, “
Fast wideband acoustical holography
,”
J. Acoust. Soc. Am.
139
(
4
),
1508
1517
(
2016
).
22.
A.
Xenaki
,
E.
Fernandez-Grande
, and
P.
Gerstoft
, “
Block-sparse beamforming for spatially extended sources in a Bayesian formulation
,”
J. Acoust. Soc. Am.
140
,
1828
1838
(
2016
).
23.
R.
Wait
,
The Numerical Solution of Algebraic Equations
(
John Wiley & Sons
,
New York
,
1979
), Chaps.
2
5
.
24.
I. D. L.
Bogle
and
J. D.
Perkins
, “
A new sparsity preserving quasi-Newton update for solving nonlinear equations
,”
SIAM J. Sci. Stat. Comput.
11
,
621
630
(
1990
).
25.
M. R.
Bai
,
C.
Chung
,
P. C.
Wu
,
Y. H.
Chiang
, and
C. M.
Yang
, “
Solution strategies for linear inverse problems in spatial audio signal processing
,”
Appl. Sci.
7
,
582
(
2017
).
26.
M. R.
Bai
,
J. G.
Ih
, and
J.
Benesty
,
Acoustic Array Systems
(
Wiley-IEEE Press
,
Singapore
,
2013
), Chaps.
3
4
.
27.
J. A.
Tropp
and
S. J.
Wright
, “
Computational methods for sparse solution of linear inverse problems
,”
Proc. IEEE
98
(
6
),
948
958
(
2010
).
28.
D.
Ingrid
,
M.
Defrise
, and
C.
De Mol
., “
An iterative thresholding algorithm for linear inverse problems with a sparsity constraint
,”
Commun. Pure Appl. Math.
57
(
11
),
1413
1457
(
2004
).
29.
D. H.
Brandwood
, “
A complex gradient operator and its application in adaptive array theory
,”
IEEE Proc.
130
(
1
),
11
16
(
1983
).
30.
L.
Song
,
G. H.
Koopmann
, and
J. B.
Fahnline
, “
Active control of the acoustic radiation of a vibrating structure using a superposition formulation
,”
J. Acoust. Soc. Am.
89
(
6
),
2786
2792
(
1991
).
31.
M. R.
Bai
,
Y. S.
Chen
, and
Y. Y.
Lo
, “
A two-stage noise source identification technique based on a farfield random parametric array
,”
J. Acoust. Soc. Am.
141
(
5
),
2978
2988
(
2017
).
32.
Y. H.
Kim
and
J. W.
Choi
,
Sound Visualization and Manipulation
(
Wiley
,
Singapore
,
2013
).
33.
M. R.
Hestenes
and
E.
Stiefel
, “
Methods of conjugate gradients for solving linear systems
,”
J. Res. Natl. Bur. Stand. (U. S.)
49
,
409
436
(
1952
).
34.
M. R.
Bai
,
Y.
Li
, and
Y.-H.
Chiang
, “
Modeling of reverberant room responses for two-dimensional spatial sound field analysis and synthesis
,”
J. Acoust. Soc. Am.
142
(
4
),
1953
1963
(
2017
).
35.
ITU-T Recommendation
P. 862:
Perceptual Evaluation of Speech Quality (PESQ): An Objective Method for End-to-End Speech Quality Assessment of Narrow-Band Telephone Networks and Speech Codecs
(
International Telecommunication Union
,
Geneva, Switzerland
,
2001
).