A New Approach for Coverage Area Computing of Radar Network

2011 ◽  
Vol 328-330 ◽  
pp. 1990-1994
Author(s):  
Shen Shen Wang ◽  
Wan Fang Che ◽  
Jin Fu Feng ◽  
Ming Zhong Li

Traditional methods regard coverage area of radar network as the union of every radar’s coverage area. Aiming at this issue, the relationship among radar detection range, radar cross section, signal-to-noise ratio, detection probability and false alarm probability is analyzed. Detection probability model for single radar is established. Calculation method of detection probability for radar network is also researched. Coverage area of radar network can be obtained according to the detection probability. Simulation results show coverage area of radar network is not simply the union of every radar’s coverage area and it is decided by the detection probability. Research of this paper provides a theoretical base of detecting, tracking and placement for radar network.

2013 ◽  
Vol 380-384 ◽  
pp. 854-859
Author(s):  
Wei Zhao ◽  
Bao An Hao

t is a valid anti-interference method that blindly separates the contaminated radiant acoustic source object from interferences, but the separated radiant acoustic source object with arrange and scale ambiguity makes the likelihood ratio detection impossible. This paper solves the ambiguity problems by utilizing the correlation and energy consistency of the same source in the same overlapped frame data; Known delay distance, data sum length and signal to noise ratio (SNR), the paper analyzes algorithms performance and draws the receiver operating characteristic (ROC) curve in different distance, which offers an accord to design detector parameters in different false alarm probability and detection probability.


2013 ◽  
Vol 798-799 ◽  
pp. 708-711
Author(s):  
Xiu Hu Tan

The popularity of 3D content is on the rise since it provides an immersive experience to viewers. In this paper, we present a new approach to watermarking 3D models based on optimization statistics. Through choosing the vertexes, we are able to obtain to the embedded watermark that has the least modified to topology transform of the 3D geometry model, and then project the watermark to the space that has the least mean square error value. So, we obtain that the robustness of the approach lies in hiding a watermark in the space that is least susceptible to the 3D model potential modification. Through analysis and constraint the conditions, we can obtain a high detection probability, a low false alarm probability. The robustness of our method is demonstrated by various attacks through computer simulation.


2008 ◽  
Vol 4 (4) ◽  
pp. 347-368 ◽  
Author(s):  
Kainan Cha ◽  
Anil Ramachandran ◽  
Sarangapani Jagannathan

In radio frequency identification (RFID) systems, the detection range and read rates will suffer from interference among high power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium access protocols (MAC) protocols are needed for such networks to assess and provide access to the channel so that tags can be read accurately. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjusts the RFID reader power output in response to the interference level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. A suitable back off scheme is also added with DAPC to improve coverage. Both the methodology and implementation of the schemes are presented, simulated, compared, and discussed for further work.


2013 ◽  
Vol 401-403 ◽  
pp. 1204-1207 ◽  
Author(s):  
She Xiang Ma ◽  
Jin Sun ◽  
Yong Qiang Guan

Aiming at the small coverage of shore-based AIS and complicated structure of space-based AIS, airborne AIS is chosen to increase the coverage effectively. This paper gives the calculation method of the maximum transmission distance, and then establishes the detection probability model of the airborne AIS. The relationship between reporting interval, ship densities and detection probabilities is established. At the end of the paper, simulation results of the model are given.


2017 ◽  
Vol 2 (1) ◽  
pp. 12-20
Author(s):  
Naceur AOUNALLAH ◽  
Ali KHALFA

The radar analyst can develop and use mathematical and statistical techniques that lead to accurate prediction or adapting models for estimating the target detection performance. In radar detection theory, detection probability, false alarm probability, number of samples non-coherently integrated for a detection test, and signal-to-noise ratio (SNR) are closely interrelated. The present paper is intended to provide an overview of the calculations of radar probability of detection and its related parameters. The main methods and procedures for predicting the detection performance of either non-fluctuating or fluctuating targets are described. Performance’s analysis of the studied models is included, along with some graphical simulation examples.


2017 ◽  
Vol 8 (1) ◽  
pp. 22-48 ◽  
Author(s):  
Iain Mackinnon

This article employs a new approach to studying internal colonialism in northern Scotland during the 18th and 19th centuries. A common approach to examining internal colonial situations within modern state territories is to compare characteristics of the internal colonial situation with attested attributes of external colonial relations. Although this article does not reject the comparative approach, it seeks to avoid criticisms that this approach can be misleading by demonstrating that promoters and managers of projects involving land use change, territorial dispossession and industrial development in the late modern Gàidhealtachd consistently conceived of their work as projects of colonization. It further argues that the new social, cultural and political structures these projects imposed on the area's indigenous population correspond to those found in other colonial situations, and that racist and racialist attitudes towards Gaels of the time are typical of those in colonial situations during the period. The article concludes that the late modern Gàidhealtachd has been a site of internal colonization where the relationship of domination between colonizer and colonized is complex, longstanding and occurring within the imperial state. In doing so it demonstrates that the history and present of the Gaels of Scotland belongs within the ambit of an emerging indigenous research paradigm.


2021 ◽  
Vol 3 (6) ◽  
Author(s):  
Ankita RayChowdhury ◽  
Ankita Pramanik ◽  
Gopal Chandra Roy

AbstractThis paper presents an approach to access real time data from underground mine. Two advance technologies are presented that can improve the adverse environmental effect of underground mine. Visible light communication (VLC) technology is incorporated to estimate the location of miners inside the mine. The distribution of signal to noise ratio (SNR) for VLC system is also studied. In the second part of the paper, long range (LoRa) technology is introduced for transmitting underground information to above the surface control room. This paper also includes details of the LoRa technology, and presents comparison of ranges with existing above the surface technologies.


Atmosphere ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 12
Author(s):  
Yulia Ivanova ◽  
Anton Kovalev ◽  
Vlad Soukhovolsky

The paper considers a new approach to modeling the relationship between the increase in woody phytomass in the pine forest and satellite-derived Normalized Difference Vegetation Index (NDVI) and Land Surface Temperature (LST) (MODIS/AQUA) data. The developed model combines the phenological and forest growth processes. For the analysis, NDVI and LST (MODIS) satellite data were used together with the measurements of tree-ring widths (TRW). NDVI data contain features of each growing season. The models include parameters of parabolic approximation of NDVI and LST time series transformed using principal component analysis. The study shows that the current rate of TRW is determined by the total values of principal components of the satellite indices over the season and the rate of tree increment in the preceding year.


Author(s):  
Ajay Andrew Gupta

AbstractThe widespread proliferation of and interest in bracket pools that accompany the National Collegiate Athletic Association Division I Men’s Basketball Tournament have created a need to produce a set of predicted winners for each tournament game by people without expert knowledge of college basketball. Previous research has addressed bracket prediction to some degree, but not nearly on the level of the popular interest in the topic. This paper reviews relevant previous research, and then introduces a rating system for teams using game data from that season prior to the tournament. The ratings from this system are used within a novel, four-predictor probability model to produce sets of bracket predictions for each tournament from 2009 to 2014. This dual-proportion probability model is built around the constraint of two teams with a combined 100% probability of winning a given game. This paper also performs Monte Carlo simulation to investigate whether modifications are necessary from an expected value-based prediction system such as the one introduced in the paper, in order to have the maximum bracket score within a defined group. The findings are that selecting one high-probability “upset” team for one to three late rounds games is likely to outperform other strategies, including one with no modifications to the expected value, as long as the upset choice overlaps a large minority of competing brackets while leaving the bracket some distinguishing characteristics in late rounds.


Sign in / Sign up

Export Citation Format

Share Document