Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (157)
- Singapore Management University (63)
- Air Force Institute of Technology (40)
- Selected Works (36)
- Loyola University Chicago (18)
-
- University of Nevada, Las Vegas (14)
- Florida International University (13)
- University of Nebraska - Lincoln (13)
- SelectedWorks (12)
- University of Arkansas, Fayetteville (10)
- Embry-Riddle Aeronautical University (9)
- Portland State University (9)
- California Polytechnic State University, San Luis Obispo (8)
- University of Tennessee, Knoxville (8)
- Western University (8)
- California State University, San Bernardino (5)
- Purdue University (5)
- Technological University Dublin (5)
- Southern Methodist University (4)
- University of Dayton (4)
- University of Kentucky (4)
- University of New Mexico (4)
- City University of New York (CUNY) (3)
- Dakota State University (3)
- Dartmouth College (3)
- Edith Cowan University (3)
- Georgia Southern University (3)
- Michigan Technological University (3)
- Minnesota State University, Mankato (3)
- The University of Southern Mississippi (3)
- Keyword
-
- Algorithms (38)
- Image processing (23)
- Machine learning (15)
- Algorithm (12)
- Computer algorithms (12)
-
- Machine Learning (10)
- Optimization (10)
- Classification (9)
- Small Spacecraft (9)
- Channel routing (8)
- Genetic algorithms (8)
- Wireless communication systems (8)
- Automatic speech recognition (7)
- Computer science (7)
- Computer vision (7)
- Deep learning (7)
- Neural networks (7)
- Security (7)
- Sensor networks (7)
- Cryptography (6)
- CubeSat (6)
- Digital techniques (6)
- Encryption (6)
- Genetic algorithm (6)
- Localization (6)
- Open Orbiter Project (6)
- Parallel computation (6)
- Robotics (6)
- Transportation (6)
- Vehicle routing problem (6)
- Publication Year
- Publication
-
- Electrical & Computer Engineering Theses & Dissertations (76)
- Research Collection School Of Computing and Information Systems (61)
- Theses and Dissertations (42)
- Electrical & Computer Engineering Faculty Publications (34)
- Computer Science: Faculty Publications and Other Works (18)
-
- Ronald Greenberg (17)
- FIU Electronic Theses and Dissertations (13)
- Jeremy Straub (12)
- Electronic Theses and Dissertations (8)
- Electronic Thesis and Dissertation Repository (8)
- Computer Science Faculty Publications (7)
- Computer Science Theses & Dissertations (7)
- Electrical & Computer Engineering Faculty Research (7)
- Engineering Management & Systems Engineering Faculty Publications (7)
- Publications (7)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (6)
- Dissertations and Theses (5)
- Doctoral Dissertations (5)
- Civil & Environmental Engineering Faculty Publications (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (4)
- Conference papers (4)
- Dissertations (4)
- Faculty Publications (4)
- Graduate Theses and Dissertations (4)
- Mark L. Chang (4)
- Master's Theses (4)
- Modeling, Simulation and Visualization Student Capstone Conference (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- College of Engineering: Graduate Celebration Programs (3)
- Computer Science Faculty Publications and Presentations (3)
- Publication Type
- File Type
Articles 361 - 390 of 526
Full-Text Articles in Engineering
Enhancement Technique For Aerial Images, Sertan Erkanli, Ahmet Gungor Pakfiliz, Jiang Li
Enhancement Technique For Aerial Images, Sertan Erkanli, Ahmet Gungor Pakfiliz, Jiang Li
Electrical & Computer Engineering Faculty Publications
Recently, we proposed an enhancement technique for uniformly and non-uniformly illuminated dark images that provides high color accuracy and better balance between the luminance and the contrast in images to improve the visual representations of digital images. In this paper we define an improved version of the proposed algorithm to enhance aerial images in order to reduce the gap between direct observation of a scene and its recorded image.
Automatic Detection Of Aircraft Emergency Landing Sites, Yu-Fei Shen, Zia-Ur Rahman, Dean Krusienski, Jiang Li, Zia-Ur Rahman (Ed.), Stephen E. Reichenbach (Ed.), Mark Allen Neifeld (Ed.)
Automatic Detection Of Aircraft Emergency Landing Sites, Yu-Fei Shen, Zia-Ur Rahman, Dean Krusienski, Jiang Li, Zia-Ur Rahman (Ed.), Stephen E. Reichenbach (Ed.), Mark Allen Neifeld (Ed.)
Electrical & Computer Engineering Faculty Publications
An automatic landing site detection algorithm is proposed for aircraft emergency landing. Emergency landing is an unplanned event in response to emergency situations. If, as is unfortunately usually the case, there is no airstrip or airfield that can be reached by the un-powered aircraft, a crash landing or ditching has to be carried out. Identifying a safe landing site is critical to the survival of passengers and crew. Conventionally, the pilot chooses the landing site visually by looking at the terrain through the cockpit. The success of this vital decision greatly depends on the external environmental factors that can impair …
Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.)
Prediction Of Brain Tumor Progression Using Multiple Histogram Matched Mri Scans, Debrup Banerjee, Loc Tran, Jiang Li, Yuzhong Shen, Frederic Mckenzie, Jihong Wang, Ronald M. Summers (Ed.), Bram Van Ginneken (Ed.)
Electrical & Computer Engineering Faculty Publications
In a recent study [1], we investigated the feasibility of predicting brain tumor progression based on multiple MRI series and we tested our methods on seven patients' MRI images scanned at three consecutive visits A, B and C. Experimental results showed that it is feasible to predict tumor progression from visit A to visit C using a model trained by the information from visit A to visit B. However, the trained model failed when we tried to predict tumor progression from visit B to visit C, though it is clinically more important. Upon a closer look at the MRI scans …
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘placed’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of iterated function systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
Bcc Skin Cancer Diagnosis Based On Texture Analysis Techniques, Shao-Hui Chuang, Xiaoyan Sun, Wen-Yu Chang, Gwo-Shing Chen, Adam Huang, Jiang Li, Frederic D. Mckenzie
Bcc Skin Cancer Diagnosis Based On Texture Analysis Techniques, Shao-Hui Chuang, Xiaoyan Sun, Wen-Yu Chang, Gwo-Shing Chen, Adam Huang, Jiang Li, Frederic D. Mckenzie
Electrical & Computer Engineering Faculty Publications
In this paper, we present a texture analysis based method for diagnosing the Basal Cell Carcinoma (BCC) skin cancer using optical images taken from the suspicious skin regions. We first extracted the Run Length Matrix and Haralick texture features from the images and used a feature selection algorithm to identify the most effective feature set for the diagnosis. We then utilized a Multi-Layer Perceptron (MLP) classifier to classify the images to BCC or normal cases. Experiments showed that detecting BCC cancer based on optical images is feasible. The best sensitivity and specificity we achieved on our data set were 94% …
3d Face Reconstruction From Limited Images Based On Differential Evolution, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Andrew G. Tescher (Ed.)
3d Face Reconstruction From Limited Images Based On Differential Evolution, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Andrew G. Tescher (Ed.)
Electrical & Computer Engineering Faculty Publications
3D face modeling has been one of the greatest challenges for researchers in computer graphics for many years. Various methods have been used to model the shape and texture of faces under varying illumination and pose conditions from a single given image. In this paper, we propose a novel method for the 3D face synthesis and reconstruction by using a simple and efficient global optimizer. A 3D-2D matching algorithm which employs the integration of the 3D morphable model (3DMM) and the differential evolution (DE) algorithm is addressed. In 3DMM, the estimation process of fitting shape and texture information into 2D …
Checking The Feasibility Of Dial-A-Ride Instances Using Constraint Programming, Gerardo Berbeglia, Gilles Pesant, Louis-Martin Rousseau
Checking The Feasibility Of Dial-A-Ride Instances Using Constraint Programming, Gerardo Berbeglia, Gilles Pesant, Louis-Martin Rousseau
Gerardo Berbeglia
No abstract provided.
Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo
Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Search engines are used to return a long list of hundreds or even thousands of videos in response to a query topic. Efficient navigation of videos becomes difficult and users often need to painstakingly explore the search list for a gist of the search result. This paper addresses the challenge of topical summarization by providing a timeline-based visualization of videos through matching of heterogeneous sources. To overcome the so called sparse-text problem of web videos, auxiliary information from Google context is exploited. Google Trends is used to predict the milestone events of a topic. Meanwhile, the typical scenes of web …
Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam
Economic Optimization Of Offshore Wind Farms Using The Geometric Algorithm, Mahidhar Nandigam
Electrical & Computer Engineering Theses & Dissertations
The research project related to this thesis focuses on the optimization of electrical systems for offshore wind farms for a given capacity. The optimal design and planning is a critical issue for developing cost effectively Offshore Wind Farms in energy systems. The Geometric Optimization Algorithms approach has been adopted to develop an optimization program, where the main components of the electrical system of an offshore wind farm and key technical specifications are used as parameters to be optimized for a minimum cost with necessary constraints. The effectiveness of the optimization program can be evaluated with real-time comparison between offshore wind …
Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen
Electroencephalogram Artifact Removal Using A Wavelet Neural Network, Hoang-Anh T. Nguyen
Electrical & Computer Engineering Theses & Dissertations
A wavelet neural network (WNN) technique rs developed for electroencephalogram (EEG) artifact removal without electrooculographic (EOG) recordings. The algorithm combines the universal approximation characteristics of neural networks and the time/frequency property of wavelet, where the neural network was trained on a simulated dataset with known ground truths. The contribution of this thesis is two-fold. First, many EEG artifact removal algorithms, including regression based methods, require reference EOG signals, which are not always available. To remove EEG ai1ifacts, a WNN tries to learn the characteristics of the artifacts first and does not need reference EOG signals once trained. Second, WNNs are …
Action Recognition Based On Multi-Level Representation Of 3d Shape, Binu M. Nair
Action Recognition Based On Multi-Level Representation Of 3d Shape, Binu M. Nair
Electrical & Computer Engineering Theses & Dissertations
A novel algorithm is proposed in this thesis for recognizing human actions using a combination of two shape descriptors, one of which is a 3D Euclidean distance transform and the other based on the Radon transform. This combination captures the necessary variations from the space time shape for recognizing actions. The space time shapes are created by the concatenation of human body silhouettes across time. The comparisons are done against some common shape descriptors such as the zernike moments and Radon transform. This is also compared with an algorithm which uses the same concept of a space time shape and …
A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah
A Differential Absorption Model For Remote Sensing Of Atmospheric Pressure, Shivam J. Shah
Electrical & Computer Engineering Theses & Dissertations
The goal of the project is to develop and test a "model based" radar processing strategy that is compatible with the concept of a "cognitive radar". The basic approach will be to develop a cognitive radar algorithm (genetic algorithm) based on the capabilities of an existing commercially available Software Radio. While the focus of this effort is the development of a candidate approach for genetic algorithm, the longer term goal would be to implement the approach using this software radio technology to provide a low cost radar processor. The proposed technology would use differential absorption radar working at the 50-56 …
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Information Hiding Using Stochastic Diffusion For The Covert Transmission Of Encrypted Images, Jonathan Blackledge
Conference papers
A principal weakness of all encryption systems is that the output data can be `seen' to be encrypted. In other words, encrypted data provides a 'flag' on the potential value of the information that has been encrypted. In this paper, we provide a novel approach to `hiding' encrypted data in a digital image. We consider an approach in which a plaintext image is encrypted with a cipher using the processes of `stochastic diffusion' and the output quantized into a 1-bit array generating a binary image cipher-text. This output is then `embedded' in a host image which is undertaken either in …
Open Innovation In Platform Competition, Mei Lin
Open Innovation In Platform Competition, Mei Lin
Research Collection School Of Computing and Information Systems
We examine the competition between a proprietary platform and an open platform,where each platform holds a two-sided market consisted of app developers and users.The open platform cultivates an innovative environment by inviting public efforts todevelop the platform itself and permitting distribution of apps outside of its own appmarket; the proprietary platform restricts apps sales solely within its app market. Weuse a game theoretic model to capture this competitive phenomenon and analyze theimpact of growth of the open source community on the platform competition. We foundthat growth of the open community mitigates the platform rivalry, and balances the developernetwork sizes on …
A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur
A Genetic Algorithm Approach For Optimized Routing, Pavithra Gudur
Electrical & Computer Engineering Theses & Dissertations
Genetic Algorithms find several applications in a variety of fields, such as engineering, management, finance, chemistry, scheduling, data mining and so on, where optimization plays a key role. This technique represents a numerical optimization technique that is modeled after the natural process of selection based on the Darwinian principle of evolution. The Genetic Algorithm (GA) is one among several optimization techniques and attempts to obtain the desired solution by generating a set of possible candidate solutions or populations. These populations are then compared and the best solutions from the set are retained. Subsequently, new candidate solutions are produced, and the …
Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed
Expression Invariant Face Recognition Using Shifted Phase-Encoded Joint Transform Correlation Technique, Trisha Ahmed
Electrical & Computer Engineering Theses & Dissertations
A new face recognition algorithm using a synthetic discriminant function based shifted phase-encoded fringe-adjusted joint transform correlation (SDF-SPFJTC) technique is proposed. The dark region in an input image is enhanced by using a nonlinear technique named ratio enhancement in gaussian neighborhood (REIGN). Histogram equalization and Gaussian smoothing are then performed to the enhanced face images and the synthetic discriminant function (SDF) image before they are subjected to the joint transform correlation process. The two distinct correlation peaks produced on extreme ends of the SPFJTC plane signifies the recognition of a potential target. A post processing step utilizes the peak-to-clutter ratio …
Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen
Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen
Theses and Dissertations
Tuner gain measurements of a multichannel receiver are reported. A linear regression model is used to characterize the gain, as a function of channel number, tuner set-on frequency, and intermediate frequency. Residual errors of this model are characterized by a t distribution. Very strong autocorrelation of tuner gain at various frequencies is noted. Tuner performance from one channel to the next is diverse; several defects at specific frequencies are noted. The Wilcoxon signed rank test is used to test normality of tuner gain among devices; normality is rejected. Antenna directivity and phase pattern measurements are also reported. An antenna element …
Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross
Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross
Theses and Dissertations
Blind frequency rendezvous is an important process for bootstrapping communications between radios without the use of pre-existing infrastructure or common control channel in a Dynamic Spectrum Access (DSA) environment. In this process, radios attempt to arrive in the same frequency channel and recognize each other’s presence in changing, under-utilized spectrum. This paper refines existing blind rendezvous techniques by introducing a handshaking algorithm for setting up communications once two radios have arrived in the same frequency channel. It then investigates the effect of different jamming techniques on blind rendezvous algorithms that utilize this handshake. The handshake performance is measured by determining …
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Theses and Dissertations
Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Conference papers
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …
Dynamic Pickup And Delivery Problems, Gerardo Berbeglia
Dynamic Pickup And Delivery Problems, Gerardo Berbeglia
Gerardo Berbeglia
No abstract provided.
Rigid And Non-Rigid Point-Based Medical Image Registration, Nestor Andres Parra
Rigid And Non-Rigid Point-Based Medical Image Registration, Nestor Andres Parra
FIU Electronic Theses and Dissertations
The primary goal of this dissertation is to develop point-based rigid and non-rigid image registration methods that have better accuracy than existing methods. We first present point-based PoIRe, which provides the framework for point-based global rigid registrations. It allows a choice of different search strategies including (a) branch-and-bound, (b) probabilistic hill-climbing, and (c) a novel hybrid method that takes advantage of the best characteristics of the other two methods. We use a robust similarity measure that is insensitive to noise, which is often introduced during feature extraction. We show the robustness of PoIRe using it to register images obtained with …
Image Registration Using Conformal Log Polar Mapping, Bala Krishna Vadapally
Image Registration Using Conformal Log Polar Mapping, Bala Krishna Vadapally
Electrical & Computer Engineering Theses & Dissertations
Image Registration is the process of aligning, or overlaying two images of the same scene that were taken at different times and/or from different viewing angles and/or by sensors with different modalities or resolutions. The variations in the imaging environment induce the difference between the images of the same scene. In our situation, we have two images of the same scene taken with two sensors, one in the visible and the other in the infrared (IR) domain. The cameras are placed adjacent to each other on a stable platform, and the images are captured almost simultaneously. This means that the …
Fault-Tolerance And Recovery In Wireless Sensor Networks, Kevin M. Somervill
Fault-Tolerance And Recovery In Wireless Sensor Networks, Kevin M. Somervill
Electrical & Computer Engineering Theses & Dissertations
The topic of Wireless Sensor Networks (WSNs) has gained considerable attention in the research community due to the variety of applications and interesting challenges in developing and deploying such networks. The typical WSN is significantly energy constrained and often deployed in harsh or even hostile environments, resulting in sensor nodes that are prone to failure. Failing nodes alter the topology of the network resulting in segmented routing paths and lost messages, ultimately reducing network efficiency. These issues spur the desire to develop energy-efficient, Fault-Tolerant (FT) algorithms that enable the network to persist in spite of the failed nodes. This work …
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain
International Conference on Information and Communication Technologies
An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …
A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan
A Simulation Study Of Convergence Speed For Distributed Codeword Adaptation Algorithms In Cdma Wireless Systems, Sahana Maharjan
Electrical & Computer Engineering Theses & Dissertations
In this thesis we present a side-by-side comparison of interference avoidance (IA) algorithms for distributed codeword adaptation in Code Division Multiple Access (CDMA) systems. In CDMA systems, the interference is determined by the values of the cross-correlation of codewords assigned to users, and various algorithms can be used for codeword optimization. The IA algorithms for codeword adaptation considered are the eigen-algorithm, the Minimum Mean Square Error (MMSE) update, and the adaptive IA algorithm, for which we investigate convergence speed using the extensive simulations of several uplink CDMA system scenarios. The results of this thesis were presented at the Fourth IEEE …
Analysis Of Partial Discharge Pulse Height Distribution Parameters, Vinay N. Nimbole
Analysis Of Partial Discharge Pulse Height Distribution Parameters, Vinay N. Nimbole
Electrical & Computer Engineering Theses & Dissertations
Partial Discharges (PD) have been traditionally used to assess the state of any insulation system and its remnant life. In earlier work, Perspex (PMMA) samples with a needle plane gap have been aged with AC voltage. Their tree growth was monitored simultaneously by collecting PD at regular intervals of time and taking microphotographs in real time without interrupting the aging voltage. The obtained partial discharge pulse amplitude records were clustered together into groups of class intervals. The sequence of PD pulse height records was quantified as a time series of shape (η), and scale (σ) parameters of a Weibull distribution. …
Turn Constrained Path Planning Problems, Victor M. Roman
Turn Constrained Path Planning Problems, Victor M. Roman
UNLV Theses, Dissertations, Professional Papers, and Capstones
We consider the problem of constructing multiple disjoint paths connecting a source point s to a target point t in a geometric graph. We require that the paths do not have any sharp turn angles. We present a review of turn constrained path planning algorithms and also algorithms for constructing disjoint paths. We then combine these techniques and present an O(nlogn) time algorithm for constructing a pair of edge disjoint turn constrained paths connecting two nodes in a planar geometric graph. We also consider the development of a turn constrained shortest path map in the presence of …
A Hurricane Evacuation Route System Real-Time Monitoring And Distribution Of Load, Anup Khanal
A Hurricane Evacuation Route System Real-Time Monitoring And Distribution Of Load, Anup Khanal
Electrical & Computer Engineering Theses & Dissertations
Hurricane evacuation is one of the major steps in diminishing the devastating effects of hurricanes on lives and properties. The challenge in evacuating a large number of people in a short time is the severe congestion faced in the transportation network, leading to long delays and shortages. Standard hurricane evacuation plans focus on how to best utilize the main arteries. The research challenge is to not overload the fastest routes and to utilize all the routes efficiently. The evacuation routing system proposed in this thesis focuses on distributing the traffic load throughout the network, utilizing alternative routes not considered in …
Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq
Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq
Theses and Dissertations
In this work, a novel theoretical framework is presented for using recent advances in frequency diversity arrays (FDAs). Unlike a conventional array, the FDA simultaneously transmits a unique frequency from each element in the array. As a result, special time and space properties of the radiation pattern are exploited to improve cross-range resolution. The idealized FDA radiation pattern is compared with and validated against a full-wave electromagnetic solver, and it is shown that the conventional array is a special case of the FDA. A new signal model, based on the FDA, is used to simulate SAR imagery of ideal point …