ISAR False Target Array Generated by Sub-Nyquist Sampling Jamming in Fast and Slow Time

Author(s):  
Jiyuan Chen ◽  
Xiaoyi Pan ◽  
Zhaoyu Gu ◽  
Shunping Xiao ◽  
Guangjun Liu
Keyword(s):  
2011 ◽  
Vol 30 (6) ◽  
pp. 1350-1353 ◽  
Author(s):  
Jian-cheng Liu ◽  
Xue-song Wang ◽  
Zhong Liu ◽  
Jian-hua Yang ◽  
Guo-yu Wang

Genetics ◽  
2000 ◽  
Vol 154 (3) ◽  
pp. 1403-1417 ◽  
Author(s):  
David J Cutler

Abstract Rates of molecular evolution at some protein-encoding loci are more irregular than expected under a simple neutral model of molecular evolution. This pattern of excessive irregularity in protein substitutions is often called the “overdispersed molecular clock” and is characterized by an index of dispersion, R(T) > 1. Assuming infinite sites, no recombination model of the gene R(T) is given for a general stationary model of molecular evolution. R(T) is shown to be affected by only three things: fluctuations that occur on a very slow time scale, advantageous or deleterious mutations, and interactions between mutations. In the absence of interactions, advantageous mutations are shown to lower R(T); deleterious mutations are shown to raise it. Previously described models for the overdispersed molecular clock are analyzed in terms of this work as are a few very simple new models. A model of deleterious mutations is shown to be sufficient to explain the observed values of R(T). Our current best estimates of R(T) suggest that either most mutations are deleterious or some key population parameter changes on a very slow time scale. No other interpretations seem plausible. Finally, a comment is made on how R(T) might be used to distinguish selective sweeps from background selection.


2013 ◽  
Vol 734-737 ◽  
pp. 3071-3074
Author(s):  
Guo Dong Zhang ◽  
Zhong Liu

Aiming at the phenomenon that the chaff and corner reflector released by surface ship can influence the selection of missile seeker, this paper proposed a multi-target selection method based on the prior information of false targets distribution and Support Vector Machine (SVM). By analyzing the false targets distribution law we obtain two classification principles, which are used to train the SVM studies the true and false target characteristics. The trained SVM is applied to the seeker in the target selection. This method has advantages of simple programming and high classification accuracy, and the simulation experiment in this paper confirms the correctness and effectiveness of this method.


1985 ◽  
Vol 84 (3) ◽  
pp. 663-673 ◽  
Author(s):  
Hiroyuki Akagi ◽  
Shiro Konishi ◽  
Masanori Otsuka ◽  
Mitsuhiko Yanagisawa

Sign in / Sign up

Export Citation Format

Share Document