Nuacht

The recent development of various methods of modulation such as PCM and PPM which exchange bandwidth for signal-to-noise ratio has intensified the interest in a general theory of communication. A ...
This paper describes a computer analysis of the propagating modes of a rectangular dielectric waveguide. The analysis is based on an expansion of the electromagnetic field in terms of a series of ...
Time delay and Doppler shift between the echo signal and the reference signal are two most commonly used measurements in target localization for the passive radar. Doppler rate, which can be obtained ...
The use of the fast Fourier transform in power spectrum analysis is described. Principal advantages of this method are a reduction in the number of computations and in required core storage, and ...
Holograms synthesized by computer are used for constructing optical wavefronts from numerically specified objects. Elimination of the need for a physical object has made new applications possible, for ...
The statistical performance of pulsed optical radars that use energy detection is considered. While the signal photoelectron statistics produced by a return from a specular target are Poisson, those ...
Directly learning the swimming behaviors of real fish can significantly enhance the swimming performance of bionic robotic fish. This paper presents a novel transfer learning method based on a dynamic ...
We consider the situation in which digital data is to be reliably transmitted over a discrete, memoryless channel (dmc) that is subjected to a wire-tap at the receiver. We assume that the wire-tapper ...
A major engineering challenge in construction projects lies in the stability as-sessment of rocky slopes with faults. The left bank slope of the Jinchuan Hy-dropower Station in the outlet field is ...
Properties of electrolyte-semiconductor barriers are described, with emphasis on germanium. The use of these barriers in localizing electrolytic etching is discussed. Other localization techniques are ...
Over the past decade, it has been demonstrated that the In-Vehicle Network (IVN) of a modern Intelligent Transportation System (ITS) is vulnerable to several cyberattacks. Given the collaborative ...
A new method of estimating the entropy and redundancy of a language is described. This method exploits the knowledge of the language statistics possessed by those who speak the language, and depends ...