Results 151 to 160 of about 891 (196)
A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks. [PDF]
Al-Matari NY +2 more
europepmc +1 more source
Constrained Pulse Radar Waveform Design Based on Optimization Theory. [PDF]
Wu J, Zhang J, Chen Y.
europepmc +1 more source
EU space security-An 8-Step online discourse analysis to decode hybrid threats. [PDF]
Reis J.
europepmc +1 more source
Investigation of Security Threat Datasets for Intra- and Inter-Vehicular Environments. [PDF]
Haddaji A +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Deceptive jamming suppression with frequency diverse MIMO radar
Signal Processing, 2015Simulated false targets cannot be easily discriminated and suppressed with traditional radar systems, especially for the mainbeam deceptive jamming. In this work, we explore the multiple-input multiple-output (MIMO) radar with frequency diverse array (FDA) as the transmit array and study its ability to suppress the deceptive jamming in joint transmit ...
Jingwei Xu, Guisheng Liao, Shengqi Zhu
exaly +2 more sources
High-Fidelity SAR Intermittent Sampling Deceptive Jamming Suppression Using Azimuth Phase Coding
IEEE Geoscience and Remote Sensing Letters, 2021The high-fidelity deceptive jamming contaminated synthetic aperture radar (SAR) images are very confusing when they are interpreted for target recognition. In this letter, a novel azimuth phase coding (APC)-based method is proposed for deceptive jamming suppression, especially with characteristics of high fidelity and intermittent sampling.
Zhouyang Tang +2 more
exaly +2 more sources
Comments on “Deceptive jamming suppression with frequency diverse MIMO radar”
Signal Processing, 2019Abstract In the 2015 paper entitled “Deceptive jamming suppression with frequency diverse MIMO radar”, a procedure to discriminate the true and false targets in the joint transmit-receive domain of the frequency diverse MIMO radar has been proposed based on the derived signals of the true and the false targets.
Jiantao Shi +4 more
exaly +2 more sources

