It is hard to obtain the complete image of curved target in the SAR image. So the quality of SAR image is degraded, because only partial features of the curved target can be reflected. In order to solve this problem, ...
详细信息
In this paper, a deep neural network model is proposed to predict industrial air pollution, such as PM2.5 and PM10. The deep neural network model contains 9 hidden layers, each layer contains 45 neurons. The output of...
详细信息
The impacts of ionospheric scintillation on geosynchronous synthetic aperture radar(GEO SAR)focusing is studied based on the multiple phase screen(MPS)*** power spectrum density of electron irregularities is first...
详细信息
The impacts of ionospheric scintillation on geosynchronous synthetic aperture radar(GEO SAR)focusing is studied based on the multiple phase screen(MPS)*** power spectrum density of electron irregularities is first modified according to the ionospheric *** propagation wave equations in random medium are deduced in the case of oblique incidence in GEO *** amplitude and phase errors induced by the random electron fluctuations are generated by the iterated MPS simulations and are superimposed into the GEO SAR *** the following imaging and evaluation,the effects of the anisotropic ionospheric scintallition on GEO SAR are *** last,the optimized integration time under different ionospheric scintillation conditions are recommended through Monte Carlo *** is concluded that,greater ionospheric fluctuations and longer integration time will result in more severe deterioration,even no focus at all in the worst case.
This paper introduces a multi-parameter distributed measurement control system based on CAN bus network and uses C8051F040 MCU as measurement control node, and corresponding hardware and software design to realize sim...
详细信息
Finding a constraint shortest path which passes through a set of specified vertices is very important for many research areas, such as intelligent transportation systems, emergency rescue, and military planning. In th...
详细信息
In this paper we consider an un-cooperative spectrum sharing scenario, wherein a radar system is to be overlaid to a pre-existing wireless communication system. Given the order of magnitude of the transmitted powers i...
详细信息
In this paper, a general Gray code quantized method of binary feature descriptors is proposed for fast and efficient keypoint matching on 3D point clouds. In our method, it includes 2 variable L and N. L is rule varia...
详细信息
In this paper, a general Gray code quantized method of binary feature descriptors is proposed for fast and efficient keypoint matching on 3D point clouds. In our method, it includes 2 variable L and N. L is rule variable which can be used to set the encoding group length according to the feature of the real-valued descriptor, and N is bits variable which can be used to set the number of Gray code bits according to the actual system requirements. Be different from the exist method, such as B-SHOT, our proposed method has the advantages of reasonable and flexible. As an example, our method is applied on the feature descriptor SHOT and tested in a standard benchmark dataset, different variable combinations of L and N are tested in the Gray code quantized processes, the best combination of L and N is dubbed as GRAY-SHOT through performance comparison. At last, GRAY-SHOT is compared with the state-of-the-art binary 3D feature descriptor B-SHOT, experimental evaluation result shows that GRAY-SHOT offers better keypoint matching performances to B-SHOT on a standard benchmark dataset with a slight more memory footprint and time consumption.
A number of solutions have been proposed to tackle the user privacy-preserving issue. Most of existing schemes, however, focus on methodology and techniques from the perspective of data processing. In this paper, we p...
详细信息
A number of solutions have been proposed to tackle the user privacy-preserving issue. Most of existing schemes, however, focus on methodology and techniques from the perspective of data processing. In this paper, we propose a lightweight privacy-preserving scheme for user identity from the perspective of data user and applied cryptography. The basic idea is to break the association relationships between User identity and his behaviors and ensure that User can access data or services as usual while the real identity will not be revealed. To this end, an interactive zero-knowledge proof protocol of identity is executed between CSP and User. Besides, a trusted third-party is introduced to manage user information, help CSP to validate User identity and establish secure channel between CSP and User via random shared key. After passing identity validation, User can log into cloud platform as usual without changing existing business process using random temporary account and password generated by CSP and sent to User by the secure channel which can further obscure the association relationships between identity and behaviors. Formal security analysis and theoretic and experimental evaluations are conducted, showing that the proposal is efficient and practical.
Obtaining Doppler center frequency parameters estimation (DCFPE) with low time consumption is a great challenge in synthetic aperture radar (SAR) imaging system. In order to get DCFPE in realtime, this paper adopts t...
详细信息
With the development of the high-resolution synthetic aperture radar (SAR) technology, the spaceborne SAR has become a hot research topic. However there is a contradiction between hardware resource occupation and imag...
详细信息
暂无评论