The passive synthetic aperture antenna array (P-SAAA) technology is inspired by the idea of synthetic aperture sonar and synthetic aperture radar, which is a new method used to the passive radar source localization us...
详细信息
ISBN:
(纸本)9781509028610
The passive synthetic aperture antenna array (P-SAAA) technology is inspired by the idea of synthetic aperture sonar and synthetic aperture radar, which is a new method used to the passive radar source localization using only one small aircraft. Virtual time difference of arrival (VTDOA) estimation is critical for the PSAAA technology, it is defined as the time difference of the radar pulse transmission from the radar source position to different virtual receivers, where the virtual receivers are the flight track position of the small aircraft at different flight time. In this paper, we present three different algorithms of curve fitting to approximate the main-beam pattern of the radar antenna, then the VTDOA can be estimated using the corresponding time of the peak of the curve. The simulation results show that the second-order polynomial of the least squares (LS) curve fitting algorithm is the optimal method to approximate the main beam pattern of the radar antenna at the receiver, which also is the optimal method to be used in the VTDOA estimation.
High visibility temporal ghost imaging with classical light is possible when superbunching pseudothermal light is employed. In the numerical simulation, the visibility of temporal ghost imaging with pseudothermal ligh...
详细信息
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can...
详细信息
In this paper, a modified CORIDC algorithm for computation of arctangent is presented. Unlike the conventional CORDIC algorithm which has constant number of iterations, the proposed algorithm calculates the nearest pr...
详细信息
In this paper, a modified CORIDC algorithm for computation of arctangent is presented. Unlike the conventional CORDIC algorithm which has constant number of iterations, the proposed algorithm calculates the nearest predefined angle to the input phase at the beginning of every iteration and then rotates by an optimal angle. As it has variable iterations, the novel rotation strategy provides faster convergence speed that reduces the number of iterations with respect to the previous approaches. Further, the performance of the proposed algorithm is improved when compared with that of the conventional one at cost of the same maximum shift number. With a number of simulation experiments, the performance of the proposed algorithm is validated by the numerical results.
The performance of digital communication systems, depending on the signal modulation and demodulation. In this paper, loading several different jamming pattern to different digital communication modulation system mode...
详细信息
ISBN:
(纸本)9781509035595
The performance of digital communication systems, depending on the signal modulation and demodulation. In this paper, loading several different jamming pattern to different digital communication modulation system models, the bit error rate(BER) under different conditions of jamming signal ratio(JSR) was in statistics through a large number of statistical simulation, the graph is giving to illustrate the comparative relationship of JSR and BER, the comparative Analysis under different channel jamming pattern is giving to illustrate the influence for different digital communication systems.
Collision attack is often employed against some cryptographic algorithms such as AES and *** a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et *** a collision-correlation...
详细信息
Collision attack is often employed against some cryptographic algorithms such as AES and *** a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et *** a collision-correlation attack based on Pearson correlation coefficient against masking. In this paper, a collision distinguisher based on least absolute deviation against masking is proposed. Subsequently, we suggest three other distinguishers based on least square method, least exponent method, and central moment product,respectively. Our experiments and simulations show that in practice, our distinguishers based on least absolute deviation and least square method perform much better than collision-correlation attack and other proposed distinguishers in this paper. We also give four application examples, which show that even if the masks are not reused, new distinguishers are competent to collision attacks.
This study focuses on observer-based controller synthesis for T-S fuzzy systems under imperfect premise *** fuzzy observer and fuzzy controller do not share the same membership functions and rules number with the T-S ...
详细信息
ISBN:
(纸本)9781467397155
This study focuses on observer-based controller synthesis for T-S fuzzy systems under imperfect premise *** fuzzy observer and fuzzy controller do not share the same membership functions and rules number with the T-S fuzzy *** is to say,the membership functions and rules number of the fuzzy observer and fuzzy controller can be chosen freely,which can enhance robustness and *** Lyapunov stability theory and some inequality techniques,the existence conditions of the fuzzy observer and fuzzy controller are formulated in the form of linear matrix inequalities(LMIs).A numerical example is provided to demonstrate the effectiveness of the proposed approach.
Intelligent information Network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo...
详细信息
Intelligent information Network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of modern society,intelligent information network with the computer as the core technology is widely used in every aspect of social ***
Binary embedding is an effective way for nearest neighbor (NN) search as binary code is storage efficient and fast to compute. It tries to convert real-value signatures into binary codes while preserving similarity of...
详细信息
Co-saliency detection aims at extracting the common salient regions from an image group containing two or more relevant images. It is a newly emerging topic in computer vision community. Different from the most existi...
详细信息
暂无评论