The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this letter, a three-dimensional (3D) image reconstruction approach is proposed for terahertz (THz) holographic by a sharply reduced amount of antennas and frequency samples, without reducing the quality of the image reconstruction results. With the obtained 3D sparse random sampling data, a sparse recovery procedure combined by two-dimensional fast Gaussian gridding based non-uniform Fourier transform...
Traditional distinction and recognition methods of electromagnetic radiation source have some shortcomings with highly error and long time. Therefore, Wilson algorithm, Lee algorithm and near field wave impedance theory have been proposed to analyze radiation source characteristics. And it presented common-mode radiation noise testing method of poor-average algorithm and differential mode noise testing...
This paper reports a new maskless nanoscale patterning method based on microdischarge devices tips array. That is, inverted pyramid microplasma devices are integrated into the scanning probe hollow tips array with nano-apertures. A 2×2 inverted pyramidal thin-wall hollow tips array with each microcavity dimension of 50µm microdischarge devices are sucessfully fabricated by MEMS process. Nano-apertures...
The abundant availability of multi-core computers makes "parallel computers" a common place and teaching Computer Science students to be able to design and develop parallel algorithms an urgent task. Most students recognize the needs of developing skills in parallel programming. However, since their Computer Science related curriculum are mostly taught based on sequential computers, introducing...
Software vulnerabilities become methods by which an attacker can take control of the victim's system, and those critical bugs cluster in dangerous spot codes. However, fuzz testing provides low code coverage and serious security bugs may be missed potentially, while symbolic execution based testing encounters path explosion and bug trigger problem. To deal with the security issue above, we highlight...
Most denoising method can deal with Gaussian noise or some kind of colored noise. This paper presents a new method of higher order spectral denoising on phase matching noise estimation. The method can remove not only the Gaussian noise but also Non-Gaussian noise. The noise is removed by high order spectral and phase matching estimate of current noise. The experimental results clearly show that this...
The suppression of fixed interference for uniform circular array using an improved binary coding method is investigated in this paper, which is based on Genetic Algorithm. The code lengths of the algorithm's least amplitude significant bits and least phase significant bits are analyzed and their impacts on performance are discussed. Finally, a general selection range of parameters is given and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.