A detection of static or slowly moving targets in the inhomogeneous clutter of polarimetric radar is researched and a new detector without exploiting the training set is developed, which has a good performance against...
详细信息
How to effectively control the cost of software development and improve the cost efficiency has always been the focus of party A. Software cost estimation process is discussed in this paper, we studied the purchasing ...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software.
This paper considers the joint design of the antenna position and power allocation in a shared aperture sparse phased array. We introduce a new optimization model relying on the minimization of the Peak Sidelobe Level...
详细信息
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this p...
详细信息
ISBN:
(纸本)9781538629185
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this paper establishes an equivalent chaotic control *** we analyze this model by using Melnikov method and find out the condition under which the chaotic phenomenon will be *** order to get a sufficient proof for identifying the conclusion,simulation experiments are used to verify the validity of the control method.
In this paper, we propose a fast algorithm based on iterative adaptive approach to address the DOA estimation for the distributed mmWave radar system under the challenging conditions of a single snapshot and coherent ...
详细信息
The adaptive digital beamforming technique in the space-polarization domain suppresses the interference with forming the coupling nulls of space and polarization *** there is the interference in mainlobe,it will cause...
详细信息
The adaptive digital beamforming technique in the space-polarization domain suppresses the interference with forming the coupling nulls of space and polarization *** there is the interference in mainlobe,it will cause serious mainlobe distortion,that the target detection suffers *** overcome this problem and make radar cope with the complex multiple interferences scenarios,we propose a multiple mainlobe and/or sidelobe interferences suppression method for dual polarization array ***,the proposed method consists of a signal preprocessing based on the proposed angle estimation with degree of polarization(DoP),and a filtering criterion based on the proposed linear *** signal preprocessing provides the accurate estimated parameters of the interference,which contributes to the criterion for null-decoupling in the space-polarization domain of *** proposed method can reduce the mainlobe distortion in the space-polarization domain while suppressing the multiple mainlobe and/or sidelobe *** effectiveness of the proposed method is verified by simulations.
The misunderstanding of situation system developers and users leads to the low efficiency of the technology to apply. With three perspectives of cognition as systematicness, subjectivity and interactivity, the functio...
详细信息
In this research, the problem of distributed opportunistic channel access is investigated under single-bit channel state information (CSI) feedback in ad hoc networks. In finding an optimal strategy achieving the maxi...
详细信息
With the development and growing applications of information technology, the coupling and dependency of space information network are becoming more and more intense. In this paper, the vulnerability of space informati...
详细信息
暂无评论