-
321
-
322
Short-Range Nonstationary Clutter Suppression for Airborne KA-STAP Radar in Complex Terrain Environment
Published 2025-01-01Get full text
Article -
323
Cross Teaching-Enhanced Multispectral Remote Sensing Object Detection With Transformer
Published 2025-01-01Get full text
Article -
324
ViT-ISRGAN: A High-Quality Super-Resolution Reconstruction Method for Multispectral Remote Sensing Images
Published 2025-01-01Get full text
Article -
325
-
326
Large Convolution Kernel Network With Edge Self-Attention for Oriented SAR Ship Detection
Published 2025-01-01Get full text
Article -
327
-
328
-
329
Transformer-Based Person Detection in Paired RGB-T Aerial Images With VTSaR Dataset
Published 2025-01-01Get full text
Article -
330
Single-Frame Infrared Small Target Detection Network Based on Multibranch Feature Aggregation
Published 2025-01-01Get full text
Article -
331
-
332
Analysis of Spatiotemporal Properties and Modeling of the Nonisotropy of GNSS Tropospheric Slant Path Delay
Published 2025-01-01Get full text
Article -
333
Improving UAV Aerial Imagery Detection Method via Superresolution Synergy
Published 2025-01-01Get full text
Article -
334
-
335
-
336
Ternary complementary sets and its application in UWB
Published 2005-01-01“…Ternary complementary set based UWB signaling employing a set of orthogonal chip pulses was proposed for DS-UWB.It had many advantages in indoor high-speed short range communications.First the system model of multiple access communications was founded,then ternary complementary set and its recursive construction method were analyzed,and then the performance evaluation structure of multiple access communications based the ternary complementary sets by use of the Rake receiver was put forward.Ternary complementary sets assigned to two users had good aperiodic autocorrelation functions.Hence,the multipath interference as well as multiple access interference were mitigated.Simulation results show that ternary MO complementary sets have better performances compared with other random sequences in the SV/IEEE 802.15.3a channel model.…”
Get full text
Article -
337
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01Get full text
Article -
338
-
339
-
340
Inversion of Bubble Size Distribution Based on Whale Optimization Algorithm
Published 2024-01-01Get full text
Article