Regularized 2-D complex-log spectral analysis and subspace reliability analysis of micro-Doppler signature for UAV detection
Unmanned aerial vehicle (UAV) has become an important radar target recently because of
its wide applications and potential security threats. Traditionally, visual features such as …
its wide applications and potential security threats. Traditionally, visual features such as …
Regularized 2-D complex-log spectral analysis and subspace reliability analysis of micro-Doppler signature for UAV detection
J Ren, X Jiang - Pattern Recognition, 2017 - dl.acm.org
The proposed 2-D regularized complex-log-Fourier transform better represents mDS. The
proposed subspace reliability analysis better removes unreliable dimensions. The proposed …
proposed subspace reliability analysis better removes unreliable dimensions. The proposed …
Regularized 2-D complex-log spectral analysis and subspace reliability analysis of micro-Doppler signature for UAV detection
J Ren, X Jiang - Pattern Recognition, 2017 - ui.adsabs.harvard.edu
Unmanned aerial vehicle (UAV) has become an important radar target recently because of
its wide applications and potential security threats. Traditionally, visual features such as …
its wide applications and potential security threats. Traditionally, visual features such as …
Regularized 2-D complex-log spectral analysis and subspace reliability analysis of micro-Doppler signature for UAV detection
J Ren, X Jiang - Pattern Recognition, 2017 - infona.pl
Unmanned aerial vehicle (UAV) has become an important radar target recently because of
its wide applications and potential security threats. Traditionally, visual features such as …
its wide applications and potential security threats. Traditionally, visual features such as …
[PDF][PDF] Regularized 2-D Complex-Log Spectral Analysis and Subspace Reliability Analysis of Micro-Doppler Signature for UAV Detection
J Ren, X Jiang - researchgate.net
Unmanned aerial vehicle (UAV) has become an important radar target recently because of
its wide applications and potential security threats. Traditionally, visual features such as …
its wide applications and potential security threats. Traditionally, visual features such as …