Uncertainty Function Design for Adaptive Beamsteering Cognitive Radar

Author(s):  
Zachary W. Johnson ◽  
Ric A. Romero
Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3669 ◽  
Author(s):  
Lei Zhong ◽  
Yong Li ◽  
Wei Cheng ◽  
Yi Zheng

A novel robust particle filtering algorithm is proposed for updating both the waveform and noise parameter for tracking accuracy simultaneously and adaptively. The approach is a significant step for cognitive radar towards more robust tracking in random dynamic systems with unknown statistics. Meanwhile, as an intelligent sensor, it would be most desirable for cognitive radar to develop the application of a traditional filter to be adaptive and to expand the adaptation to a wider scope. In this paper, after analysis of the Bayesian bounds and the corresponding cost function design, we propose the cognitive radar tracking method based on a particle filter by completely reconstructing the propagation and the update process with a cognitive structure. Moreover, we develop the cost-reference particle filter based on optimizing the cost function design according to the complicated system or environment with unknown statistics. With this method, the update of the estimation cost and variance arrives at the approximate optimization, and the estimation error can be more adjacent to corresponding low bounds. Simulations about the tracking implementation in unknown noise are utilized to demonstrate the superiority of the proposed algorithm to the existing methods in traditional radar.


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 4 (2) ◽  
pp. 31
Author(s):  
Haoxuan Yu ◽  
Shuai Li

With the continuous development of the mining industry, the world’s major mines have gradually entered the intelligent stage. In intelligent underground mines, the operation roads of the underground transportation equipment are very complicated, and the monitoring and control of the underground traffic have become the problems to be solved in the intelligent underground mines. Therefore, on the basis of solving the practical problems of underground mines, the concept paper discusses the possibility of the communication-based train control (CBTC) system being applied to underground mines through the summary and induction of the related literature. As mining engineers, we have proposed the function design for the CBTC system to solve the problems in underground mine rail transportation, but we still need to continue to work hard for the future development of the underground mines. The concept paper serves as a guide to the Tossing out a brick to get a jade gem, and it has implications for the development and the future of underground mine transportation.


Author(s):  
S. Gogineni ◽  
J. R. Guerci ◽  
H. K. Nguyen ◽  
J. S. Bergin ◽  
B. C. Watson ◽  
...  

Designs ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 31
Author(s):  
Daniel Moran ◽  
Atila Ertas ◽  
Utku Gulbulak

The continued displacement of refugees from their homes and homelands (now greater than 50 million people worldwide) places increased focus and attention on evolving the designs of temporary housing that is available to be provided to the refugee population, especially in rural areas where housing does not already exist and must be constructed in very little time. Complex engineering problems involving social issues, such as this case study, benefit from the use of Integrated Transdisciplinary (TD) Tools (ITDT) to effectively and efficiently address the design questions related to them. The integrated use of TD Tools such as Kano Analysis, KJ Diagrams, Critical to Quality (CTQ), House of Quality (HOQ)/Quality Function Design (QFD), Theory of Inventive Problem Solving (TRIZ), Axiomatic Design (AD), Interpretive Structural Modeling (ISM), and Design Structure Matrix (DSM) through an end-to-end unique design process leads to innovation and elimination of design conflicts for especially complicated design problems. The objective of this study is to examine the design of temporary refugee housing using integrated TD tools mentioned above. This research concludes that the use of the ITDT approach provides an innovative, decoupled design.


Author(s):  
Xiaobo Liu-Henke ◽  
Marian Gollner ◽  
Sven Jacobitz ◽  
Soeren Scherler ◽  
Jie Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document