Keystroke dynamics is the process to identify or authenticate individuals based on the typing rhythm behaviors. There are many classifications proposed to check the user's legitimacy, and therefore we should make ...
详细信息
The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAR and In ISAR signal formation and imaging are analyzed by the perspective of analyzing th...
详细信息
The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAR and In ISAR signal formation and imaging are analyzed by the perspective of analyzing the target linear frequency modulation echo signal and combining with ISAR imaging *** proposed a method of In ISAR scattering point extraction technology based on CLEAN algorithm and threshold *** compare it to the method of image matching *** simulation results show that the In ISAR reconstruction technique based on scattering point extraction method is a more effective one,with higher detection probability and has an ability to suppress the influence of noise and sidelobe effect,under the condition of noise.
The millimeter wave communication is important for future wireless systems. In this paper, the channel characteristics at 28 GHz in an indoor scenario are researched based on ray tracing (RT) simulation and measuremen...
The millimeter wave communication is important for future wireless systems. In this paper, the channel characteristics at 28 GHz in an indoor scenario are researched based on ray tracing (RT) simulation and measurement. In the RT simulation, various configurations, such as different number of reflections, diffractions and penetrations are used. As for the measurement, two setups are implemented in order to analyze more parameters. Setup one is that biconical antennas are used at both the transmitter (TX) and receiver (RX). The other setup is that horn antenna at RX is rotated 360° in azimuth with a step of 5° when an omni-directional antenna located at TX. Meanwhile, antenna is rotated one circle with an elevation angle of 10°, 0° and -10°, respectively. Path loss and K-factor are analyzed firstly, and analysis results indicate the RT result with 1 or 2 reflections, 1 diffractions and 5 penetrations in this conference room is closest to the measurement result and channel models in 3GPP TR 38.901. Then, the root mean square (RMS) delay spread and RMS angular spread are investigated, which shows the value of measurement is a bit larger than RT because of the limitation of azimuth and elevation step. According to all the results, 1-2 reflections, 1 diffraction and 5 penetrations can be used in RT for future analysis of indoor scenario at 28 GHz.
The effects and phenomena arising from the interaction of both coherent structured and scattered electromagnetic radiation with complex fractal objects are considered. Attention is paid to such fractal objects as comp...
The effects and phenomena arising from the interaction of both coherent structured and scattered electromagnetic radiation with complex fractal objects are considered. Attention is paid to such fractal objects as complex diffraction gratings. The questions of their practical application and further researches are discussed.
Specific Emitter Identification(SEI) is the method to identify the individual radio emitter using the transmitted signals’ characteristic called Radio Frequency Fingerprint(RFF), which are originated from transmi...
详细信息
Specific Emitter Identification(SEI) is the method to identify the individual radio emitter using the transmitted signals’ characteristic called Radio Frequency Fingerprint(RFF), which are originated from transmitter imperfectionsA novel SEI approach to extract transient fingerprint features of energy envelope of transient signals is proposed in this paperThe origin of energy envelop is explored, and a nonlinear system model is utilized to explain how the features of energy envelope produceAn iterative least squares identification algorithm is proposed to extract the parameters of model, which can be constructed the fingerprint featuresExperimental results demonstrate that the method is effective, and the method can be applicable any signal of TDMA system.
To realize unbiased bearing estimates of multiple acoustic sources in a range-independent shallow water, Normal-Mode based MUSIC(NM-MUSIC) method using acoustic vector sensor(AVS) array is proposed in this paper. Comp...
详细信息
ISBN:
(纸本)9781510829039
To realize unbiased bearing estimates of multiple acoustic sources in a range-independent shallow water, Normal-Mode based MUSIC(NM-MUSIC) method using acoustic vector sensor(AVS) array is proposed in this paper. Comparing to NM-MUSIC method based on scalar array, the method based on AVS array solves the problem of port and starboard ambiguity, and also breaks through the limitation of half wavelength. Meanwhile, the method realizes unbiased bearing estimates, while most of the conventional Direction of Arrival(DOA) methods result in biased bearing estimates in shallow water. Simulation results show that the performance of the new method proposed is better than that of the original method.
Network traffic encryption brings security to network communication, however it also brings challenges to network monitoring. As more and more major websites use encryption protocol to protect imformation of visitors,...
详细信息
ISBN:
(纸本)9781510830981
Network traffic encryption brings security to network communication, however it also brings challenges to network monitoring. As more and more major websites use encryption protocol to protect imformation of visitors, it is a burning issue to identify client when session is encrypted. In this paper, we present browser identification of HTTPS client based on packet length. The sequence of request packet length is different among browsers and our experiment shows that it is possible to recognize what kind of browser the traffic comes from according to length sequence. We theoretically analyze the possibility of using the request packet length to identify browsers and show the method of using length sequence to establish dictionary. The dictionaries are used to distinguish unknown traffic flow. Our experiment results show that we can get accurate results of browser identification in HTTPS communication through packet length analysis.
Specific Emitter Identification (SEI) is the technique that identifies the individual radio emitter using the Radio Frequency Fingerprint (RFF), which are originated from the imperfections and differences of transmitt...
详细信息
ISBN:
(纸本)9781509019984
Specific Emitter Identification (SEI) is the technique that identifies the individual radio emitter using the Radio Frequency Fingerprint (RFF), which are originated from the imperfections and differences of transmitters. Previous SEI techniques are sensitive to noise and need enough sampled points. In this paper, a novel SEI approach to extracting fingerprint features of energy envelope of transient signals is proposed. A linear system model is utilized to fit the energy envelope, and the fingerprinting features are constructed by the polynomial coefficients estimated with least-squares algorithm. The results of experiments on actual burst signals demonstrate that the method is effective.
This paper presents a new method for automatic wireless spectrum segmentation. Spectrum segmentation is regarded as the first step to extract signals of interest in wideband spectrum, and it aims to identify the bound...
详细信息
This paper presents a new method for automatic wireless spectrum segmentation. Spectrum segmentation is regarded as the first step to extract signals of interest in wideband spectrum, and it aims to identify the boundaries between sub-band signals. The proposed Freshet Method, based on the Power Spectral Density(PSD) quantization and Connected Components(CC) detection, is designed for a better spectrum segmentation performance. This method is validated on satellite signals, and the testing result shows a better accuracy of the sub-band boundary estimation than the other published methods.
A new collaborative detection method of TDOA (Time Difference of Arrival) and DOA ( Direction of arrival) has been proposed for weak signals. The fuzzy evidence theory is used to fuse the peaks of TDOA correlation and...
详细信息
ISBN:
(纸本)9781509037117
A new collaborative detection method of TDOA (Time Difference of Arrival) and DOA ( Direction of arrival) has been proposed for weak signals. The fuzzy evidence theory is used to fuse the peaks of TDOA correlation and the spatial spectrum of MUSIC (Multiple Signal Classification). In the paper, the TODA/DOA collaborative detector is designed, the basic probability assignment fuction (mass fuction or BPA fuction) and the membership fuction are used to express the uncertainty of the TDOA and DOA information. Then the information is fused by the D-S combination formula and the rule of game probability distribution is used to get the detection result. At last, the simulation results show that the performance of the detector is better than the traditional TDOA correlation detector.
暂无评论