Li Yu-qing, Shui Peng-lang, Lin Ying. A New Method to Suppress Cross-Terms of WVD via Thresholding Superimposition of Multiple Spectrograms[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1435-1438.
Citation:
Cui Kai, Xu Xiao-jian, Mao Shi-yi . EM Backscattering of Simplified Ship Model over Sea Surface Based on a High Frequency Hybrid Method[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1500-1503. doi: 10.3724/SP.J.1146.2006.01866
Li Yu-qing, Shui Peng-lang, Lin Ying. A New Method to Suppress Cross-Terms of WVD via Thresholding Superimposition of Multiple Spectrograms[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1435-1438.
Citation:
Cui Kai, Xu Xiao-jian, Mao Shi-yi . EM Backscattering of Simplified Ship Model over Sea Surface Based on a High Frequency Hybrid Method[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1500-1503. doi: 10.3724/SP.J.1146.2006.01866
This paper focuses on a special kind of three-plate cavity reflectors which is useful in EM backscattering model of large complex targets over land or sea surface. After employing Computer Graphics (CG) method to eliminate shadowing effect, Physical Optics (PO) and Area Projection (AP) method are combined to analyze specular reflection and multiple scattering mechanism to calculate the Radar Cross Section (RCS) of different reflectors. Finally, by combining with sea reflection coefficient under different sea states, a procdure is proposed to compute the RCS of simplified ship targets over sea surface. The results show that multiple scattering can form obvious RCS characterization under certain conditions.
Li Yu-qing, Shui Peng-lang, Lin Ying. A New Method to Suppress Cross-Terms of WVD via Thresholding Superimposition of Multiple Spectrograms[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1435-1438.
Li Yu-qing, Shui Peng-lang, Lin Ying. A New Method to Suppress Cross-Terms of WVD via Thresholding
Superimposition of Multiple Spectrograms[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1435-1438.