Detection of sea-surface small floating targets in maritime high-resolution surveillance radar has been an active area of research in recent years. In this paper, we propose a new detector based on a complex-valued independent component analysis (cICA) algorithm proposed by Geng-Shen Fu et al. called complex entropy rate bound minimization (CERBM), to look for targets in polarimetric radars. It uses received time series at cell under test (CUT) with different polarizations as distinct mixtures. The proposed detector can exploit all information of polarimetric radar for an accurate detection. It does separation on the mixtures using CERBM which results in two output sources, i.e. clutter and target. Finally, the target is detected using estimation of the parameters of K-distribution for outputted sources. Our experiments on the recognized IPIX radar database show that the proposed detector obtains better detection performance in comparison to the newly proposed detectors. The robustness of the detector is also investigated by experiment in either low and high sea state which shows its appropriate results.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7560592PMC
http://dx.doi.org/10.1016/j.heliyon.2020.e05138DOI Listing

Publication Analysis

Top Keywords

based complex-valued
8
entropy rate
8
rate bound
8
bound minimization
8
proposed detector
8
polarimetric detection
4
detection maritime
4
maritime floating
4
floating small
4
small target
4

Similar Publications

Adaptive dynamical networks are ubiquitous in real-world systems. This paper aims to explore the synchronization dynamics in networks of adaptive oscillators based on a paradigmatic system of adaptively coupled phase oscillators. Our numerical observations reveal the emergence of synchronization cluster bursting, characterized by periodic transitions between cluster synchronization and global synchronization.

View Article and Find Full Text PDF

Event-triggered affine formation of second-order multi-agent systems via complex-valued Laplacian.

ISA Trans

December 2024

Key Laboratory of Intelligent Analysis and Decision on Complex Systems, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China. Electronic address:

This paper investigates event-triggered affine formation control of second-order multi-agent systems with directed communication graph. An approach based on complex-valued Laplacian is used as a means of avoiding the use of global information. Two event-triggered strategies are proposed, both of which are capable of achieving global convergence and forming the desired formation without Zeno-behavior, while also optimizing the utilization of resources.

View Article and Find Full Text PDF

The Internet of Vehicles (IoV) is a specialized iteration of the Internet of Things (IoT) tailored to facilitate communication and connectivity among vehicles and their environment. It harnesses the power of advanced technologies such as cloud computing, wireless communication, and data analytics to seamlessly exchange real-time data among vehicles, road-side infrastructure, traffic management systems, and other entities. The primary objectives of this real-time data exchange include enhancing road safety, reducing traffic congestion, boosting traffic flow efficiency, and enriching the driving experience.

View Article and Find Full Text PDF

Quantum-inspired neural network with hierarchical entanglement embedding for matching.

Neural Netw

February 2025

School of Information Technology, Halmstad University, Halmstad, Sweden. Electronic address:

Quantum-inspired neural networks (QNNs) have shown potential in capturing various non-classical phenomena in language understanding, e.g., the emgerent meaning of concept combinations, and represent a leap beyond conventional models in cognitive science.

View Article and Find Full Text PDF

An interesting security method for a multiple-image authentication scheme is proposed based on computer-generated holograms and a logistic map. First, each original image is encoded as the complex-valued hologram under the point light source model. The resulting hologram is then converted to a phase-only hologram using the Floyd-Steinberg dithering algorithm.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!