Results 31 to 40 of about 59,306 (232)

Shipborne Multi-Function Radar Working Mode Recognition Based on DP-ATCN

open access: yesRemote Sensing, 2023
There has been increased interest in recognizing the dynamic and flexible changes in shipborne multi-function radar (MFR) working modes. The working modes determine the distribution of pulse descriptor words (PDWs).
Tian Tian   +5 more
doaj   +1 more source

Compact UWB MIMO Vivaldi Antenna With Dual Band-Notched Characteristics

open access: yesIEEE Access, 2019
A novel ultra-wideband (UWB) multiple-input multiple-output (MIMO) Vivaldi antenna with dual band-notched characteristics is presented and fabricated. The antenna is comprised of an improved ground plane and two microstrip feeding lines with a compact ...
Zhenya Li, Chengyou Yin, Xiaosong Zhu
doaj   +1 more source

Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses [PDF]

open access: yes, 2018
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power.
Fujiwara, Mikio   +9 more
core   +3 more sources

A Multidimensional Matrix Completion Method for 2-D DOA Estimation with L-Shaped Array

open access: yesSensors
This paper focuses on two-dimensional (2-D) direction-of-arrival (DOA) estimation for an L-shaped array. While recent studies have explored sparse methods for this problem, most exploit only the cross-correlation matrix, neglecting self-correlation ...
Haoyue Zhang   +3 more
doaj   +1 more source

Return-Map Cryptanalysis Revisited [PDF]

open access: yes, 2006
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes.
GONZALO ÁLVAREZ   +8 more
core   +4 more sources

An n-sided polygonal model to calculate the impact of cyber security events [PDF]

open access: yes, 2016
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens   +6 more
core   +2 more sources

A Power Spectrum Maps Estimation Algorithm Based on Generative Adversarial Networks for Underlay Cognitive Radio Networks

open access: yesSensors, 2020
In the underlay cognitive radio networks, the main challenge in detecting the idle radio resources is to estimate the power spectrum maps (PSMs), where the radio propagation characteristics are hard to obtain.
Xu Han, Lei Xue, Fucai Shao, Ying Xu
doaj   +1 more source

A Robust SMC-PHD Filter for Multi-Target Tracking with Unknown Heavy-Tailed Measurement Noise

open access: yesSensors, 2021
In multi-target tracking, the sequential Monte Carlo probability hypothesis density (SMC-PHD) filter is a practical algorithm. Influenced by outliers under unknown heavy-tailed measurement noise, the SMC-PHD filter suffers severe performance degradation.
Yang Gong, Chen Cui
doaj   +1 more source

Two-dimensional DOA Estimation with High Accuracy for MIMO Radar Using Cross Array

open access: yesLeida xuebao, 2016
In this study, we investigate the estimation of the Two-Dimensional (2D) Direction Of Arrival (DOA) in monostatic multiple-input–multiple-output radar with cross array and propose a novel, highly accurate DOA estimation method based on unitary ...
Liang Hao, Cui Chen, Yu Jian
doaj   +1 more source

On the Role of Primary and Secondary Assets in Adaptive Security: An Application in Smart Grids [PDF]

open access: yes, 2012
peer-reviewedAdaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task.
Ali, Raian   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy