2021
DOI: 10.1109/lgrs.2020.3009304
|View full text |Cite
|
Sign up to set email alerts
|

Square-Law Detection of Exponential Targets in Weibull-Distributed Ground Clutter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…where P D is the probability of detection obtained via MATH-EMATICA's built-in numerical integration. 7 Observe that for 9 different parameter settings, (43) converges rapidly requiring between 23 and 83 terms to guarantee an accuracy of 10 −10 . Moreover, the computation time dropped dramatically, thereby providing reduction times above 88%.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…where P D is the probability of detection obtained via MATH-EMATICA's built-in numerical integration. 7 Observe that for 9 different parameter settings, (43) converges rapidly requiring between 23 and 83 terms to guarantee an accuracy of 10 −10 . Moreover, the computation time dropped dramatically, thereby providing reduction times above 88%.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…A general implementation for the multivariate Fox's Hfunction is not yet available in mathematical packages such as MATHEMATICA, MATLAB, or MAPLE. Some works have been done to alleviate this problem [41]- [43]. Specifically in [41], the Fox's H-function was implemented from one up to four variables.…”
Section: B Fox's H-function-based Representationmentioning
confidence: 99%
“…The second is to analyze and control the design and implementation process of the web page to determine whether the page is running correctly and complete the corresponding operations before starting to perform the corresponding functions. Finally, there should be a reasonable and effective user management mechanism for the foreground interface, including system login, data backup and other contents Distributed Processing System [11][12]. Figure 1 is the architecture diagram of net remoting.…”
Section: Principlementioning
confidence: 99%
“…It can be used to avoid computer overloading, which is caused by unknown and time-varying clutter background, and obtain high detection performance. Although the CFAR technique has been researched for several decades, the requirement from diverse engineering applications still drives it to continuously develop and progress [1][2][3][4][5]. The simplest one of the CFAR detectors is the cell-averaging (CA) scheme which estimates the noise level in the test cell by averaging the outputs of nearby resolution cells.…”
Section: Introductionmentioning
confidence: 99%