The problem of target classification with high-resolution fully polarimetric, synthetic aperture radar (SAR) imagery is considered. The paper summarizes our recent work in SAR target recognition using a feature-based ...
详细信息
ISBN:
(纸本)0818671262
The problem of target classification with high-resolution fully polarimetric, synthetic aperture radar (SAR) imagery is considered. The paper summarizes our recent work in SAR target recognition using a feature-based Bayesian inference approach. The approach works on the selected features. Features are chosen such that the separabilities of the original data are well maintained for later classification. Once the original data is mapped into feature space, the conditional probability distributions of features given the target are estimated statistically, which are then used to calculate the probabilities that a target belongs to one of the given classes based on the observed features. The target is assigned to the class with the highest probability. A comparison between the above technique and the traditional statistical approaches such as nearest mean and Fisher pairwise is illustrated based upon performance on a fully polarimetric ISAR (inverse SAR) image data set.
作者:
TSUNOO, YOKAMOTO, EUEMATSU, TMemberNEC Software Hokuriku
Ltd. Ishikawa Japan 920-21 School of Information Science
Japan Advanced Institute of Science and Technology Ishikawa Japan 923-12 MembersTomohiko Uyematsu graduated in Electrical Engineering from Tokyo Institute of Technology in 1982 and received a Master's degree from the same university in 1984
after whichhe became an assistant in the Electrical and Electronics Engineering Department there. In1990 he became a Lecturer and in 1991 an Assistant Professor. In 1992 he became Assistant Professor at the School of Information Science Japan Advanced Institute of Science and Technology. He holds a doctorate in engineering. Among his research interests are signal theory optical communications theory coding theory and data compression algorithms. In 1988 he received a Shinohara Commemorative Science Encouragement Prize and in 1992 a Best Paper Award. He is the author of the bookIntroduction to Record Data Compression Algorithms. He is a member of the Measurement Control Society and the Society for Information Theory and Its Applications.
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by...
详细信息
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by the U.S. National Bureau of Standards of the DES cryptosystem and the proposal by NTT of the FEAL cryptosystem, secret-key cryptographic algorithms have been published, involution-type block cryptosystems which use secret key to encipher 64 bits of plain text as 64 bits of cipher text [2, 3, 9, 10, 12]. NTT has proposed the one-way function MAP, which is also an involution-type transform. In this paper, we study a new cryptanalytic method for involution-type cryptosystems and show by example that it can be applied practically in a ciphertext-only attack on the one-way function MAP. For an involution-type cryptosystem, by increasing the amount of construction in the data-randomization phase and by increasing the size of the secret key, we can guarantee the computational security by preventing the estimation of the secret key. However, if we study the properties of the function used in the design of the data-randomization phase, by specifying input/output values of the function which are independent of the secret key, it may be possible to use the inverse function [11] to calculate the secret key. This method is called the intermediate cipher method. The intermediate cipher method differs from previous methods in the small quantity of data required for breaking.
作者:
SHAH, SIAASHTON, PWERNIK, MBNR
P.O. Box 3511 Station C Ottawa Ontario Canada K1Y 4H7 Peter Ashton received the Bachelor of Science degree in electrical engineering from the University of Manitoba in 1987. He received a Master of Science degree from the same institution in 1989. Upon graduation
he joined Bell-Northern Research where he studied the performance aspects of broadband networks including SONET frame relay and ATM systems. In 1994 he formed a new group to spearhead the investigation of performance requirements for BISDN services. Marek Wernik is Senior Manager
Broadband Systems and Services in BNR Ottawa Canada. He received his M.Sc. and Ph.D. degrees in Electrical Engineering from Warsaw Technical University Poland in 1973 and 1978 respectively. Dr. Wernik worked as assistant professor at Warsaw Technical University and at Oran University of Technology Algeria conducting research in the fields of digital signal processing and radio communications measurement systems. In 1984 he joined BNR Advanced Technology group where he took part in the exploratory work on photonic and broadband switching and fibre network planning. Since then he has been working on various aspects of broadband networks and ATM systems. Between 1988 and 1990 he was a manager responsible for analysis and evaluation of traffic management and performance of ATM networks. As Senior Manager Dr. Wernik is currently responsible for broadband network design and planning in BNR's Systems Engineering Division. His responsibilities include in particular definition of management and control for ATM networks work with telecommunications carriers to identify requirements and plan deployment of broadband services and networks broadband product planning support and ATM Forum technical representation. Dr. Wernik is a Member of the IEEE Communications Society and has been actively involved in co-operation with Canadian universities supporting research in the field of broadband communications.
Broadband integrated networks based on asynchronous transfer mode (ATM) technology are being proposed to provide a single integrated access to a variety of services and applications. Constant bit rate services will fo...
详细信息
Broadband integrated networks based on asynchronous transfer mode (ATM) technology are being proposed to provide a single integrated access to a variety of services and applications. Constant bit rate services will form an important part of this unified networking solution. In this paper, we identify and describe the relevant aspects related to the implementation of CBR services on ATM. First, we identify two broad categories of potential CBR services for broadband ATM networks. The ATM infrastructure for the identified services is then developed along with the required functionalities of different network elements. Finally, end-to-end performance objectives for the ATM network are determined and verified empirically based on results of laboratory experiments. These performance objectives help us determine the minimum QOS required by the highest class of service category offered by an ATM network.
The Australian Defence Science and technology Organisation is developing a single-platform sensor fusion test-bed based around an experimental X-band generic pulse Doppler radar. Initial research will examine real-tim...
详细信息
The Australian Defence Science and technology Organisation is developing a single-platform sensor fusion test-bed based around an experimental X-band generic pulse Doppler radar. Initial research will examine real-time fusion of amplitude monopulse radar azimuth and elevation and video position estimates and the tracking ability of the combined sensor system. The addition of further signal processing and sensors will allow experimental verification of a variety of sensor fusion and management algorithms. Examples of preliminary data are shown and the continuing development of the test-bed and its applications are discussed.< >
Frequency domain descriptions of dynamic system performance-are widely utilized in signal processing systems analysis and design. The ubiquitous presence of system frequency response and signal spectra, plots in inrod...
详细信息
This paper outlines the use of space-filling curves in transform image compression. Specifically, a space-filling Hilbert curve is used for mapping the two-dimensional image into a suitable one-dimensional representat...
详细信息
The George Mason University technology Development Center was established in July 1989 for the purpose of conducting a broad-spectrum research and development program in command, control, communications, and intellige...
详细信息
The George Mason University technology Development Center was established in July 1989 for the purpose of conducting a broad-spectrum research and development program in command, control, communications, and intelligence (C/sup 3/I). The program is being accomplished through the bringing together of a multidisciplinary group that concludes academic faculty, research staff, and industrial/government fellows in residence. The research program is designed to investigate all aspects of C/sup 3/I: sensing and fusion; command systems; communications; modeling, simulation, and gaming; and C/sup 3/ architectures. Equivalent programs are relevant to air traffic control, large business enterprises, and other nonmilitary activities.< >
The problem of grasping with multifingered robot hands is discussed. Relationships between grasp configurations and task objectives are discussed. A number of grasp quality measures are explored to gain insight into t...
The problem of grasping with multifingered robot hands is discussed. Relationships between grasp configurations and task objectives are discussed. A number of grasp quality measures are explored to gain insight into the relationships between grasp posture, relative hand-object contact, and task requirements. The method in which these measures are calculated is analyzed. A procedure based on this analysis for planning an optimum grasp configuration for a specified type of contact and a desired task objective is proposed
作者:
K.J. HintzJ.J. SpoffordCenter of Excellence in Command
Control Communications and Intelligence Department of Electrical and Computer Engineering School of Information Technology George Mason University Fairfax VA USA
Although artificial neural networks have been shown to be effective in the computation of solutions to difficult problems a general theory has not yet been developed to provide guidance in their design and implementat...
详细信息
Although artificial neural networks have been shown to be effective in the computation of solutions to difficult problems a general theory has not yet been developed to provide guidance in their design and implementation. Genetic algorithms have also been shown to be effective in evolving solutions to optimization problems which involve objective functions that are not 'nice'. The approach presented here is the utilization of genetic algorithms to evolve the number of neurons in an artificial neural network, the weights of their interconnects, and the interconnect structure itself. With this approach, no a priori assumptions about interconnect structure, weights, number of layers. or to which neurons the inputs or outputs are connected need to be made. A combined neural network evaluation and genetic algorithm evaluation program has been written in C on a Sun workstation. The method has been successfully applied to the 9*9 bit character recognition problem.< >
暂无评论