Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 8281 - 8310 of 8621

Full-Text Articles in Physical Sciences and Mathematics

Summary Tables: Fairfax County And The City Of Alexandria, Virginia Shoreline Inventory Report, Marcia Berman, Harry Berquist, Sharon Killeen, Carl H. Herschner, Karinna Nunez, Karen Reay, Tamia Rudnicky Jan 2010

Summary Tables: Fairfax County And The City Of Alexandria, Virginia Shoreline Inventory Report, Marcia Berman, Harry Berquist, Sharon Killeen, Carl H. Herschner, Karinna Nunez, Karen Reay, Tamia Rudnicky

Reports

The Shoreline Inventory Summary Tables quantify observed conditions based on river systems, such as the combined length of linear features (e.g. shoreline miles surveyed, miles of bulkhead and revetment), the total number of point features (e.g. docks, boathouses, boat ramps) & total acres of polygon features (tidal marshes).


Crctol: A Semantic Based Domain Ontology Learning System, Xing Jiang, Ah-Hwee Tan Jan 2010

Crctol: A Semantic Based Domain Ontology Learning System, Xing Jiang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Domain ontologies play an important role in supporting knowledge‐based applications in the Semantic Web. To facilitate the building of ontologies, text mining techniques have been used to perform ontology learning from texts. However, traditional systems employ shallow natural language processing techniques and focus only on concept and taxonomic relation extraction. In this paper we present a system, known as Concept‐Relation‐Concept Tuple‐based Ontology Learning (CRCTOL), for mining ontologies automatically from domain‐specific documents. Specifically, CRCTOL adopts a full text parsing technique and employs a combination of statistical and lexico‐syntactic methods, including a statistical algorithm that extracts key concepts from a document collection, …


Using Covariates For Improving The Minimum Redundancy Maximum Relevance Feature Selection Method, Olcay Kurşun, Cemal Okan Şakar, Oleg Favorov, Ni̇zametti̇n Aydin, Sadik Fi̇kret Gürgen Jan 2010

Using Covariates For Improving The Minimum Redundancy Maximum Relevance Feature Selection Method, Olcay Kurşun, Cemal Okan Şakar, Oleg Favorov, Ni̇zametti̇n Aydin, Sadik Fi̇kret Gürgen

Turkish Journal of Electrical Engineering and Computer Sciences

Maximizing the joint dependency with a minimum size of variables is generally the main task of feature selection. For obtaining a minimal subset, while trying to maximize the joint dependency with the target variable, the redundancy among selected variables must be reduced to a minimum. In this paper, we propose a method based on recently popular minimum Redundancy-Maximum Relevance} (mRMR) criterion. The experimental results show that instead of feeding the features themselves into mRMR, feeding the covariates improves the feature selection capability and provides more expressive variable subsets.


Usage Of Spline Interpolation In Catheter-Based Cardiac Mapping, Bülent Yilmaz, Uğur Cunedi̇oğlu, Engi̇n Baysoy Jan 2010

Usage Of Spline Interpolation In Catheter-Based Cardiac Mapping, Bülent Yilmaz, Uğur Cunedi̇oğlu, Engi̇n Baysoy

Turkish Journal of Electrical Engineering and Computer Sciences

Due to their minimal invasiveness catheters are highly preferred in cardiac mapping techniques used in the source localization of rhythm disturbances in the heart. In cardiac mapping, standard steerable catheters and multielectrode basket catheters are the two alternatives for the characterization of the underlying tissue on the inner (endocardium) and outer (epicardium) surfaces of the heart. As with any discrete sampling technique, an important question for catheter-based cardiac mapping is how to determine values at locations from which direct measurements are not available. Interpolation is the most common approach for providing values at unmeasured sites using the available measurements. In …


Design Of Optimal Sampling Times For Pharmacokinetic Trials Via Spline Approximation, Musa Hakan Asyali Jan 2010

Design Of Optimal Sampling Times For Pharmacokinetic Trials Via Spline Approximation, Musa Hakan Asyali

Turkish Journal of Electrical Engineering and Computer Sciences

Understanding and comparison of different drug delivery formulations are based on pharmacokinetic parameters (PKP) such as area under curve, maximum concentration, and time to reach maximum concentration. Accurate estimation of PKP is of critical importance in capturing drug absorption and elimination characteristics and in reaching bioequivalence decisions. Since PKP are estimated from a limited number of samples, the timing of the samples directly influences the accuracy of estimation. Optimization of the sampling times may not only increase the accuracy of PKP estimation, but also reduce the number of samples to be drawn, which in turn lessens the inconvenience to the …


Behaviors Of Real-Time Schedulers Under Resource Modification And A Steady Scheme With Bounded Utilization, Refi̇k Samet, Orhan Fi̇kret Duman Jan 2010

Behaviors Of Real-Time Schedulers Under Resource Modification And A Steady Scheme With Bounded Utilization, Refi̇k Samet, Orhan Fi̇kret Duman

Turkish Journal of Electrical Engineering and Computer Sciences

In this article we present an analysis for task models having random resource needs and different arrival patterns. In hard real-time environments like avionic systems or nuclear reactors, the inputs to the system are obtained from real world by using sensors. And it is highly possible for a task to have different resource needs for each period according to these changing conditions of real world. We made an analysis of schedulers for task models having random resources in each period. Since feasibility tests for usual task models are just limited to some specific schedulers and arrival patterns, we made our …


An Approach Based On Particle Swarm Computation To Study The Nanoscale Dg Mosfet-Based Circuits, Fayacl Djeffal, Toufik Bendib, Redha Benzid, Abdelhamid Benhaya Jan 2010

An Approach Based On Particle Swarm Computation To Study The Nanoscale Dg Mosfet-Based Circuits, Fayacl Djeffal, Toufik Bendib, Redha Benzid, Abdelhamid Benhaya

Turkish Journal of Electrical Engineering and Computer Sciences

The analytical modeling of nanoscale Double-Gate MOSFETs (DG) requires generally several necessary simplifying assumptions to lead to compact expressions of current-voltage characteristics for nanoscale CMOS circuits design. Further, progress in the development, design and optimization of nanoscale devices necessarily require new theory and modeling tools in order to improve the accuracy and the computational time of circuits' simulators. In this paper, we propose a new particle swarm strategy to study the nanoscale CMOS circuits. The latter is based on the 2-D numerical Non-Equilibrium Green's Function (NEGF) simulation and a new extended long channel DG MOSFET compact model. Good agreement between …


Universal Authentication Protocols For Anonymous Wireless Communications, Guomin Yang, Qiong Huang, Duncan S. Wong, Xiaotie Deng Jan 2010

Universal Authentication Protocols For Anonymous Wireless Communications, Guomin Yang, Qiong Huang, Duncan S. Wong, Xiaotie Deng

Research Collection School Of Computing and Information Systems

A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach requires the involvement of all the three parties. In this paper, we propose a new approach which requires only two parties, U and V, to get involved. We propose two protocols: one provides better efficiency and supports user anonymity to an extent comparable to that …


Representations Of Keypoint-Based Semantic Concept Detection: A Comprehensive Study, Yu-Gang Jiang, Jun Yang, Chong-Wah Ngo Jan 2010

Representations Of Keypoint-Based Semantic Concept Detection: A Comprehensive Study, Yu-Gang Jiang, Jun Yang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Based on the local keypoints extracted as salient image patches, an image can be described as a "bag-of-visual-words (BoW)" and this representation has appeared promising for object and scene classification. The performance of BoW features in semantic concept detection for large-scale multimedia databases is subject to various representation choices. In this paper, we conduct a comprehensive study on the representation choices of BoW, including vocabulary size, weighting scheme, stop word removal, feature selection, spatial information, and visual bi-gram. We offer practical insights in how to optimize the performance of BoW by choosing appropriate representation choices. For the weighting scheme, we …


An Empirical Analysis Of Mobile Voice Service And Sms: A Structural Model, Youngsoo Kim, Rahul Telang, William B. Vogt, Ramayya Krishnan Jan 2010

An Empirical Analysis Of Mobile Voice Service And Sms: A Structural Model, Youngsoo Kim, Rahul Telang, William B. Vogt, Ramayya Krishnan

Research Collection School Of Computing and Information Systems

In addition to the wireless telephony boom, a similar exponentially increasing trend in wireless data service—for example, short message service (SMS)—is visible as technology advances. We develop a structural model to examine user demand for voice service and SMS. Specifically, we measure the own- and cross-price elasticities of these services. The cross-price elasticity is of significant importance because marketing activities are critically influenced by whether the goods are substitutes or complements. The research context poses significant econometric challenges due to three-part tariffs and sequential discrete plan choice and continuous quantity choice decisions. Using detailed individual consumption data of more than …


Keep It Simple With Time: A Reexamination Of Probabilistic Topic Detection Models, Qi He, Kuiyu Chang, Ee Peng Lim, Arindam Banerjee Jan 2010

Keep It Simple With Time: A Reexamination Of Probabilistic Topic Detection Models, Qi He, Kuiyu Chang, Ee Peng Lim, Arindam Banerjee

Research Collection School Of Computing and Information Systems

Topic detection (TD) is a fundamental research issue in the Topic Detection and Tracking (TDT) community with practical implications; TD helps analysts to separate the wheat from the chaff among the thousands of incoming news streams. In this paper, we propose a simple and effective topic detection model called the temporal Discriminative Probabilistic Model (DPM), which is shown to be theoretically equivalent to the classic vector space model with feature selection and temporally discriminative weights. We compare DPM to its various probabilistic cousins, ranging from mixture models like von-Mises Fisher (vMF) to mixed membership models like Latent Dirichlet Allocation (LDA). …


Vulnerability Analysis Of Rfid Protocols For Tag Ownership Transfer, Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Tieyan Li, Yingjiu Li Jan 2010

Vulnerability Analysis Of Rfid Protocols For Tag Ownership Transfer, Pedro Peris-Lopez, Julio Hernandez-Castro, Juan Tapiador, Tieyan Li, Yingjiu Li

Research Collection School Of Computing and Information Systems

In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deursen and Radomirovic (2008), the first weaknesses to be identified (tag and server impersonation) were addressed and this paper completes the consideration of them all. We find that the mutual authentication protocol, and therefore the ownership transfer protocol, possesses certain weaknesses related to most of the security properties initially required in protocol design: tag information leakage, …


Information Integration For Graph Databases, Ee Peng Lim, Aixin Sun, Anwitaman Datta, Chang Kuiyu Jan 2010

Information Integration For Graph Databases, Ee Peng Lim, Aixin Sun, Anwitaman Datta, Chang Kuiyu

Research Collection School Of Computing and Information Systems

With increasing interest in querying and analyzing graph data from multiple sources, algorithms and tools to integrate different graphs become very important. Integration of graphs can take place at the schema and instance levels. While links among graph nodes pose additional challenges to graph information integration, they can also serve as useful features for matching nodes representing real-world entities. This chapter introduces a general framework to perform graph information integration. It then gives an overview of the state-of-the-art research and tools in graph information integration.


Dual Phase Learning For Large Scale Video Gait Recognition, Jialie Shen, Hwee Hwa Pang, Dacheng Tao, Xuelong Li Jan 2010

Dual Phase Learning For Large Scale Video Gait Recognition, Jialie Shen, Hwee Hwa Pang, Dacheng Tao, Xuelong Li

Research Collection School Of Computing and Information Systems

Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficient gait recognition and classification. Adopting a ”refinement-and-classification” principle, the framework comprises two components: 1) a classifier to generate advanced probabilistic features from low level gait parameters; and 2) a hidden classifier layer (based on multilayer perceptron neural network) to model the statistical properties of different subject classes. To validate our framework, we have conducted comprehensive experiments with a large test collection, and observed significant improvements in identification accuracy relative to …


The Monetary Value Of Virtual Goods: An Exploratory Study In Mmorpgs, Qiu-Hong Wang, Viktor Mayer-Schonberger Jan 2010

The Monetary Value Of Virtual Goods: An Exploratory Study In Mmorpgs, Qiu-Hong Wang, Viktor Mayer-Schonberger

Research Collection School Of Computing and Information Systems

This study investigates the monetary value of time spent in virtual worlds in the context of 24 most popular MMORPGs Building on classic economic theory, we approach this issue through a combination of theoretical modeling, experiment, and cross-sectional time series data analysis. Our findings suggest that intensive social networking and flatter social hierarchy structures are associated with lower monetary value of time spent in-game. Further, two opposite network effects on the monetary value of in-game time spent were observed. One is the positive network effect from the active user base, the other is the negative network effect from the intensity …


A New Multi-Tier Adaptive Military Manet Security Protocol Using Hybrid Cryptography And Signcryption, Atti̇la A. Yavuz, Fati̇h Alagöz, Emi̇n Anarim Jan 2010

A New Multi-Tier Adaptive Military Manet Security Protocol Using Hybrid Cryptography And Signcryption, Atti̇la A. Yavuz, Fati̇h Alagöz, Emi̇n Anarim

Turkish Journal of Electrical Engineering and Computer Sciences

Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. In our protocol, we bring novelties to secure military MANET communication for three main points: Cryptographic methods used in MANETs, hybrid key management protocols and structural organization of the military MANETs. As a new approach, we use hybrid cryptography mechanisms and Elliptic Curve Pintsov-Vanstone Signature …


Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre Jan 2010

Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre

Turkish Journal of Electrical Engineering and Computer Sciences

Voltage sags in the electric power system are mostly due to faults in the power system. Voltage sag is characterized by its magnitude (the retained voltage), phase-angle jump, unbalance in the sag in the three phases, and duration. Type of transformers in the electrical system is the important parameter influencing the characteristic of sag at the node where sensitive loads are connected. For sensitive loads it is necessary to estimate how many times in a year the voltage at their terminal will experience sag to avoid tripping of operation. In this paper the effect of transformer on stochastic estimation of …


Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe Jan 2010

Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe

Turkish Journal of Electrical Engineering and Computer Sciences

The basic problem of simulation and modeling of Image Intensified Charge Coupled Device (ICCD) is the difference between the analytical Modulation Transfer Function (MTF) formulation used in the model and the experimentally obtained MTF. An investigation into the MTF of ICCD sub-components reveal that the MTF of the Image Intensifier Tube (IIT) is the main factor in this deviation. In this study, a regulation factor for the MTF of 3^{rd} generation IITs has been developed. A commonly used MTF formulation for IITs has been modified to include a regulation factor which has helped produce more precise MTF values for the …


Building Linear Parameter Varying Models Using Adaptation, For The Control Of A Class Of Nonlinear Systems, Coşku Kasnakoğlu Jan 2010

Building Linear Parameter Varying Models Using Adaptation, For The Control Of A Class Of Nonlinear Systems, Coşku Kasnakoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper a novel method is proposed for constructing linear parameter varying (LPV) system models through adaptation. For a class of nonlinear systems, an LPV model is built using its linear part, and its coefficients are considered as time-varying parameters. The variation in time is controlled by an adaptation scheme with the goal of keeping the trajectories of the LPV system close to those of the original nonlinear system. Using the LPV model as a surrogate, a dynamical controller is built by utilizing self-scheduling methods for LPV systems, and it is shown that this controller will indeed stabilize the …


Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem, Kekli̇k Alpteki̇n Bayam, Berna Örs Jan 2010

Differential Power Analysis Resistant Hardware Implementation Of The Rsa Cryptosystem, Kekli̇k Alpteki̇n Bayam, Berna Örs

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FPGA realization of an algorithmic countermeasure which makes RSA resistant to power analysis attacks. Modular exponentiation is realized with Montgomery Modular Multiplication. The Montgomery modular multiplier has been realized with Carry-Save Adders. Carry-Save representation has been used throughout the RSA encryption algorithm. The primarily implemented RSA architecture prevents the extraction of the secret key using Simple Power Analysis attacks. When comparing the protected implementation with the unprotected, it can be …


A Novel Square-Root Domain Realization Of First Order All-Pass Filter, Si̇nem Ölmez, Uğur Çam Jan 2010

A Novel Square-Root Domain Realization Of First Order All-Pass Filter, Si̇nem Ölmez, Uğur Çam

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new square-root domain, first order, all-pass filter based on the MOSFET square law is presented. The proposed filter is designed by using nonlinear mapping on the state variables of a state space description of the transfer function. To the best knowledge of the authors, the filter is the first square-root domain first order all-pass structure designed by using state space synthesis method in the literature. The center frequency of the all-pass filter is not only attainable at megahertz frequencies but also tunable by an external bias current. The proposed filter operated 2.5 V supply voltage is …


A New Chaotic Attractor From General Lorenz System Family And Its Electronic Experimental Implementation, İhsan Pehli̇van, Yilmaz Uyaroğlu Jan 2010

A New Chaotic Attractor From General Lorenz System Family And Its Electronic Experimental Implementation, İhsan Pehli̇van, Yilmaz Uyaroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This article introduces a novel three-dimensional continuous autonomous chaotic system with six terms and two quadratic nonlinearities. The new system contains two variational parameters and exhibits Lorenz-like attractors in numerical simulations and experimental measurements. The basic dynamical properties of the new system are analyzed by means of equilibrium points, eigenvalue structures, and Lyapunov exponents. The new system examined in Matlab-Simulink^{\textregistered} and Orcad-PSpice^{\textregistered}. An electronic circuit realization of the proposed system is presented using analog electronic elements such as capacitors, resistors, operational amplifiers and multipliers. The behaviour of the realized system is evaluated with computer simulations.


An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin Jan 2010

An Rfid Based Indoor Tracking Method For Navigating Visually Impaired People, Ruşen Öktem, Eli̇f Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

This paper tackles the RFID based tracking problem in an obscured indoor environment. The proposed solution is an integral part of a navigation aid for guiding visually impaired people in a store. It uses RF signal strengths and is based on the Bayes Decision Theory. An observation vector is formed by received radio signal strength indication values, transmitted from three transmitters at distinct frequencies in the UHF band. The indoor area is divided into square grids, where each grid is considered as a class. The problem of tracking is expressed as classifying the observed radio signal strengths to the most …


Stator Resistance Estimation Using Ann In Dtc Im Drives, Mustafa Aktaş, H. İbrahi̇m Okumuş Jan 2010

Stator Resistance Estimation Using Ann In Dtc Im Drives, Mustafa Aktaş, H. İbrahi̇m Okumuş

Turkish Journal of Electrical Engineering and Computer Sciences

Torque control of induction motors (IM) requires accurate estimation of the flux in the motor. But the flux estimate, when estimated from the stator circuit variables, is highly dependent on the stator resistance of the IM. As a result, the flux estimate is prone to errors due to variation in the stator resistance, especially at low stator frequencies. In this paper, an Artificial Neural Network (ANN) is used to adjust the stator resistance of an IM. A back propagation training algorithm was used in training the neural network for the simulation. The proposed ANN resistance estimator has shown good performance …


Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe Jan 2010

Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, stability of the projection-based constrained discrete-time extended Kalman filter (EKF) as applied to nonlinear systems in a stochastic framework has been studied. It has been shown that like the unconstrained EKF, the estimation error of the EKF with known constraints on the states remains bounded when the initial error and noise terms are small, and the solution of the Riccati difference equation remains positive definite and bounded. Stability results are verified and performance of the constrained EKF is demonstrated through simulations on a nonlinear engineering example.


K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇ Jan 2010

K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared with semi-trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there …


The Effect Of The Channel Reliability Factor In The Map Algorithm On Turbo Code Performance In Bluetooth Systems, Sali̇m Kahveci̇, İsmai̇l Kaya Jan 2010

The Effect Of The Channel Reliability Factor In The Map Algorithm On Turbo Code Performance In Bluetooth Systems, Sali̇m Kahveci̇, İsmai̇l Kaya

Turkish Journal of Electrical Engineering and Computer Sciences

The effects of the channel reliability factor on the performance of turbo decoders that use a maximum a posteriori probability algorithm are investigated for wireless communication fading channels, such as Bluetooth systems. The channel reliability factor is related to the channel signal-to-noise ratio. For various values of the channel reliability factor, the obtained performance curves of the maximum a posteriori probability algorithm are given for the case of DMx Bluetooth data packets. When the channel reliability factor increases, the bit-error-rate performance of the DMx Bluetooth data packets also increases over fading channels.


Relativistic Electromagnetism In Rotating Media, Pierre Hillion Jan 2010

Relativistic Electromagnetism In Rotating Media, Pierre Hillion

Turkish Journal of Electrical Engineering and Computer Sciences

This work concerns relativistic electromagnetism in a cylindrical Frenet-Serret frame. The tensor formalism of Maxwell's equations and electromagnetic fields in a vacuum is first developed in terms of cylindrical coordinates and afterwards applied to a rotating frame using the relativistic Trocheris-Takeno description of rotations. The metric ds^2 = g_{\mu \nu} dx^{\mu} dx^{\nu} of this frame is then obtained to find the determinant g of the g_{\mu \nu} matrix intervening in the relativistic Maxwell's equations, where the Greek indices take on the values 1,2,3,4. The propagation of harmonic cylindrical waves in rotating media is analyzed and it is shown that these …


Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson Jan 2010

Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson

Turkish Journal of Electrical Engineering and Computer Sciences

Australia has conducted research into over-the-horizon radar (OTHR) for almost sixty years. Early programs focused exclusively on military capabilities, such as the detection of aircraft, missiles and ships, but in 1974 a team was formed to design a new OTHR for which a remote sensing mission was proposed. Oceanic wind mapping experiments in 1977-78 yielded promising results so remote sensing became a recognised mission assigned to the new radar, known as Jindalee Stage B. This capability was progressively expanded over the period 1982-87 to include mapping of wave height and other oceanographic variables. A real-time data link to the Australian …


Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn Jan 2010

Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn

Turkish Journal of Electrical Engineering and Computer Sciences

This paper describes the development of the SeaSonde High Frequency Radar system into a dual-use application for the mapping of ocean surface currents and detection of ships at sea. This development entailed the creation of a new radar waveform that would permit this dual-use as well as a detection algorithm to identify the ships in the radar spectra. The detection algorithm utilizes two methods for calculating a background signal level: an infinite impulse response (IIR) filter and a two-dimensional median filter. These two methods are employed simultaneously with multiple length averaging times to maximize the number of detections. The initial …