Learn More
Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on(More)
Coherent decoys can guide the passive radar seeker (PRS) of anti-radiation missile (ARM) to a point completely outside the extremities of target. The difficulty of the final practicality of coherent jamming is the accurate phase difference control of two coherent decoys at PRS. Model of two coherent decoys jamming ARM is built in this paper, which includes(More)
Aim at improving the performance and efficiency of AODV protocol in Tactical MANETs which has large scale and fast changing topology, a novel AODV algorithm - LRM-AODV based on local route maintenance is proposed. According to the feature that there always exist many idle nodes, LRM-AODV adopts reverse route search procedure for idle nodes to produce many(More)
—Coherent decoys can induce anti-radiation missile (ARM) to the area outside radiant sources compared with the noncoherent decoys technology widely used now, the choke point of final utility of coherent decoy is the accurate control of radiant sources' phase difference. Model of two radiant sources decoying ARM is built in this paper, relationships between(More)
Specific Emitter Identification (SEI) is to identify the emitters with various RF fingerprints, originated from the nonlinearity of the emitter power amplifiers. This paper firstly develops an improved Approximate Entropy (imApEn) algorithm, by modifying the tolerance interval of Approximate Entropy (ApEn), to extract the nonlinear complexity of the signals(More)
The symmetric alpha stable distribution is a good model for impulsive interference and has gained much attention. However, most of the traditional detectors are based on the assumption that the transmission signal is known to the receivers. In non-cooperative applications such as battlefield communications, the knowledge of the intercepted signal is hardly(More)
The concept of finding the significant communication relation in the wireless network only with the behavioral data is of great importance for non-authorized monitor. A valuable technology to solve the problem is the weighted association rules mining algorithm. However, classical models ignore the difference between items, and many weighted association rule(More)
This paper proposes a recursive optimum-term selecting (ROS) approach to pruning the general Volterra series, by which we can achieve a custom-tailored model to characterize nonlinearity of wideband power amplifiers (PAs) with memory effects. The achieved model is more suitable for the individual PA than those static models , such as the MP and GMP models,(More)