Computer and Modernization ›› 2018, Vol. 0 ›› Issue (01): 69-73.doi: 10.3969/j.issn.1006-2475.2018.01.014
Previous Articles Next Articles
Received:
2017-07-06
Online:
2018-01-23
Published:
2018-01-24
CLC Number:
FU Cheng, NIE Ying. Visualization and Re-extraction Technology of 2D Radar Envelope Data[J]. Computer and Modernization, 2018, 0(01): 69-73.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2018.01.014
[1]杨超,陈鹏,魏迎梅. 雷达最大探测范围三维可视化研究与实现[J]. 计算机工程与应用, 2007,43(11):245-248. [2]贾明捷,王金广,李涛,等. 动态显示雷达网探测范围方法研究[J]. 现代雷达, 2010,32(11):16-20. [3]张尉,程柏林,金素华. 搜索雷达探测范围的可视化技术[J]. 现代雷达, 2000,22(3):44-47. [4]孙国伟,谢军伟,孙博. 组网雷达自适应数据融合跟踪算法[J]. 空军工程大学学报(自然科学版), 2013(6):38-41. [5]〖ZK(#〗蒋保富,王珂,李璋静. 基于折线分解的多雷达探测包络图绘制方法[J]. 指挥信息系统与技术, 2010,1(5):52-54. [6]张玉玉. 二维雷达数据的特征提取及可视化[D]. 北京:北京邮电大学, 2015. [7]郭冠斌,方青. 雷达组网技术的现状与发展[J]. 雷达科学与技术, 2005,3(4):193-197. [8]吴海涛,高园. 雷达网中探测范围及雷达数目的讨论[J]. 火力与指挥控制, 2014(S1):32-35. [9]孟国明. 虚拟战场环境中雷达探测范围表现技术研究[D]. 长沙:国防科学技术大学, 2005. [10]张阳,李晓燕,郭金良. 一种简化的相控阵雷达威力范围可视化方法[J]. 舰船电子工程, 2014,34(4):76-80. [11]郭拉克,张阳,何俊. 雷达网威力范围可视化方法研究[J]. 火力与指挥控制, 2012(7):95-97. [12]田杰,吕建新,周晓娟,等. 位图的图像处理技术[J]. 现代电子技术, 2001(9):28-31. [13]王艳丽. 计算机中的位图和矢量图[J]. 信息与电脑(理论版), 2011(9):191,193. [14]齐立磊,肖飞. 基于位图图像锐化处理算法的设计与实现[J]. 计算机与数字工程, 2013,41(9):1505-1507. [15]赵刘飞,赵敏华. VC中DIB位图程序设计的研究[J]. 工业控制计算机, 2014,27(3):41-42. |
[1] | HE Sida, CHEN Pinghua. Intent-based Lightweight Self-Attention Network for Sequential Recommendation [J]. Computer and Modernization, 2024, 0(12): 1-9. |
[2] | ZHENG Jiuchao, ZHAO Xinyuan. Entity Linking Method Based on Topics and Description Information [J]. Computer and Modernization, 2024, 0(12): 10-14. |
[3] | ZHAO Chenyang, XUE Tao, LIU Junhua. Fashion Clothing Pattern Generation Based on Improved Stable Diffusion [J]. Computer and Modernization, 2024, 0(12): 15-23. |
[4] | HUANG Tingpei1, MA Lubiao1, LI Shibao2, LIU Jianhang1. Gesture Recognition Method Based on WiFi and Prototypical Network [J]. Computer and Modernization, 2024, 0(12): 34-39. |
[5] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[6] | LIU Yunhai1, Feng Guang1, WU Xiaoting2, YANG Qun2 . Safety Helmet Wearing Detection Algorithm for Complex Construction Scenes [J]. Computer and Modernization, 2024, 0(12): 66-71. |
[7] | WANG Yanyuan, MAO Zhengchong. Detection and Recognition Algorithms for Chinese and English Scene Text Images [J]. Computer and Modernization, 2024, 0(12): 84-90. |
[8] | WAN Bing1, 2, 3, ZHAO Wentao4, PAN Duotao1, ZHAO Zhengtao2, 3, SUN Zhaoyang2, 3, YU Jiancheng2, 3 . Design of Semi-physical Simulation Test System for Unmanned Sailboat [J]. Computer and Modernization, 2024, 0(12): 91-99. |
[9] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[10] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[11] | YUAN Qingle, MU Li. Inventory Forecasting Method Based on Improved Elman Neural Network [J]. Computer and Modernization, 2024, 0(11): 28-33. |
[12] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[13] | ZHANG Kun1, ZHANG Yongwei1, WU Yongcheng1, ZHANG Xiaowen2, ZHAI Shichen2. An LLM-based Method for Automatic Construction of Equipment Failure Knowledge Graphs [J]. Computer and Modernization, 2024, 0(11): 46-53. |
[14] | ZHANG Zhixia, QIN Zhiyi. Network Public Opinion Prediction Based on Variational Mode Decomposition and IGJO-SVR [J]. Computer and Modernization, 2024, 0(11): 77-83. |
[15] | WAN Hongwei, CHEN Pinghua. Polyp Segmentation Based on Involution and Coordinate Reverse Attention [J]. Computer and Modernization, 2024, 0(11): 84-90. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||