As a burgeoning communication technology with flexible resource allocation, high spectral efficiency, strong anti-dual selective fading ability, filter-bank multi-carrier (FBMC) has a good prospect in the development of radar-communication integration. In this paper, we introduced FBMC technology to this integrated system and found many problems as follows (i) in order to transmit information by radar waveform, the integrated signal is loaded with the communication data. Since the data may be duplicated and similar, their correlation is big enough, which led to the radar resolution efficiency decline; (ii) when the data rate of communication increase, the number of FBMC symbols and subcarriers are increased as a consequence. The research shows it introduce a lower amplitude of the clutters of the distance ambiguity function, but the ambiguity area is widened. In order to improve the performance of distance resolution, this paper proposes a m-Sequence filter-bank multi-carrier (MS-FBMC) integrated radar-communication signal by preencoding of communication information based on m-Sequence to improve the radar-communication integration signal autocorrelation. The simulation results show that MS-FBMC signal's ambiguity function has an ideal thumbtack shape, and the distance distinguish capability of FBMC radar is also enhanced without decrease the transmission rate at the same time.
{"title":"The M-sequence encoding method for radar-communication system based on filter bank multi-carrier","authors":"Weiwei Xu, Cheng Wang, Gaofeng Cui, Weidong Wang, Yinghai Zhang","doi":"10.1109/ICAIT.2017.8388925","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388925","url":null,"abstract":"As a burgeoning communication technology with flexible resource allocation, high spectral efficiency, strong anti-dual selective fading ability, filter-bank multi-carrier (FBMC) has a good prospect in the development of radar-communication integration. In this paper, we introduced FBMC technology to this integrated system and found many problems as follows (i) in order to transmit information by radar waveform, the integrated signal is loaded with the communication data. Since the data may be duplicated and similar, their correlation is big enough, which led to the radar resolution efficiency decline; (ii) when the data rate of communication increase, the number of FBMC symbols and subcarriers are increased as a consequence. The research shows it introduce a lower amplitude of the clutters of the distance ambiguity function, but the ambiguity area is widened. In order to improve the performance of distance resolution, this paper proposes a m-Sequence filter-bank multi-carrier (MS-FBMC) integrated radar-communication signal by preencoding of communication information based on m-Sequence to improve the radar-communication integration signal autocorrelation. The simulation results show that MS-FBMC signal's ambiguity function has an ideal thumbtack shape, and the distance distinguish capability of FBMC radar is also enhanced without decrease the transmission rate at the same time.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133275307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388947
H. Rong, T. Li
The image super-resolution reconstruction algorithm based on wavelet transform is widely used in almost all applications of image restoration such as image coding, image enhancement, image drying, image fusion and so on. But the wavelet transform can only express the location and characteristics of singularity, and is powerless for the feature of the higher dimension. In addition, the wavelet transform kernel lacks the directivity, and can not obtain the geometric smoothness of the contour. In view of this kind of problem, this paper proposes a super-resolution reconstruction algorithm based on Contourlet transform. The algorithm extends the advantages of wavelet to the high-dimensional space, which can better describe the characteristics of the high-dimensional space, and be more suitable for dealing with information with hyperplane singularity. It is concluded that the improved algorithm has a good effect on both the subjective visual effect and the aspect of PSNR, especially in the recovery of the detailed information of the image, by the experimental simulation and compared with other algorithms.
{"title":"Super-resolution restoration algorithm based on contourlet transform","authors":"H. Rong, T. Li","doi":"10.1109/ICAIT.2017.8388947","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388947","url":null,"abstract":"The image super-resolution reconstruction algorithm based on wavelet transform is widely used in almost all applications of image restoration such as image coding, image enhancement, image drying, image fusion and so on. But the wavelet transform can only express the location and characteristics of singularity, and is powerless for the feature of the higher dimension. In addition, the wavelet transform kernel lacks the directivity, and can not obtain the geometric smoothness of the contour. In view of this kind of problem, this paper proposes a super-resolution reconstruction algorithm based on Contourlet transform. The algorithm extends the advantages of wavelet to the high-dimensional space, which can better describe the characteristics of the high-dimensional space, and be more suitable for dealing with information with hyperplane singularity. It is concluded that the improved algorithm has a good effect on both the subjective visual effect and the aspect of PSNR, especially in the recovery of the detailed information of the image, by the experimental simulation and compared with other algorithms.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388923
Juan Li, Xuan Luo, Fengqi Hao
This paper analyzes the key technologies of the distributed data, and proposes the solution of the mass data processing based on the Information platform of Internet of Things. The solution uses Hadoop as the open source framework to realize the distributed computing system, and uses Mahout as the data mining algorithm library to realize the parallelization of k-means clustering algorithm. This will achieve the high efficiency and the large expansibility through the mass data processing. The mass data source used in this project is from the intelligent agricultural Information service platform. The system takes the deployment test on the mass sensing information, and it optimizes and parallelizes the K-means algorithm to realize the mass data processing based on the Information platform of Internet of Things. It can make the statistical analysis, and provide fine management and other services. the algorithm is used to improve the efficiency and the accuracy of the platform with the supercomputing and the reliable storage ability.
{"title":"The mass data mining research based on the information platform of Internet of Things","authors":"Juan Li, Xuan Luo, Fengqi Hao","doi":"10.1109/ICAIT.2017.8388923","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388923","url":null,"abstract":"This paper analyzes the key technologies of the distributed data, and proposes the solution of the mass data processing based on the Information platform of Internet of Things. The solution uses Hadoop as the open source framework to realize the distributed computing system, and uses Mahout as the data mining algorithm library to realize the parallelization of k-means clustering algorithm. This will achieve the high efficiency and the large expansibility through the mass data processing. The mass data source used in this project is from the intelligent agricultural Information service platform. The system takes the deployment test on the mass sensing information, and it optimizes and parallelizes the K-means algorithm to realize the mass data processing based on the Information platform of Internet of Things. It can make the statistical analysis, and provide fine management and other services. the algorithm is used to improve the efficiency and the accuracy of the platform with the supercomputing and the reliable storage ability.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388895
L. Tang, Haixia Wu, Rongkun Jiang, Chang Lu
Compressed sensing (CS) is used to estimate channel information in underwater acoustic OFDM system recently. However, there are no recognition criteria to specify the pilot patterns in channel estimation. In order to improve the accuracy of the estimation, this paper proposes a pilot routing algorithm based on minimizing the adjusted mutual coherence of the measurement matrix in the recovery algorithm of compressed sensing theory. Each pilot symbol location is determined by calculating the adjusted mutual coherence of the corresponding measurement matrix. The matrix is produced by fixing other pilot location indexes and replacing the index of the current pilot location with all optional indexes. The simulation results show that the BER is 2dB and 8dB lower when SNR is 5dB and 30dB respectively, and the MSE is 2dB lower compared with the results of algorithm 1. Comparing with the results of algorithm 2, the BER is 2dB better, and the MSE is 3dB lower when SNR is 30dB. The data confirms the efficiency of this pilot routing algorithm.
{"title":"An improved pilot routing algorithm for compressed sensing-based channel estimation in underwater acoustic OFDM system","authors":"L. Tang, Haixia Wu, Rongkun Jiang, Chang Lu","doi":"10.1109/ICAIT.2017.8388895","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388895","url":null,"abstract":"Compressed sensing (CS) is used to estimate channel information in underwater acoustic OFDM system recently. However, there are no recognition criteria to specify the pilot patterns in channel estimation. In order to improve the accuracy of the estimation, this paper proposes a pilot routing algorithm based on minimizing the adjusted mutual coherence of the measurement matrix in the recovery algorithm of compressed sensing theory. Each pilot symbol location is determined by calculating the adjusted mutual coherence of the corresponding measurement matrix. The matrix is produced by fixing other pilot location indexes and replacing the index of the current pilot location with all optional indexes. The simulation results show that the BER is 2dB and 8dB lower when SNR is 5dB and 30dB respectively, and the MSE is 2dB lower compared with the results of algorithm 1. Comparing with the results of algorithm 2, the BER is 2dB better, and the MSE is 3dB lower when SNR is 30dB. The data confirms the efficiency of this pilot routing algorithm.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388924
Jiawei Yu, Pengxu Li, Gaofeng Cui, Xiuhua Li, Weidong Wang
Satellite-terrestrial communication network has been proposed in recent years, for its great potential in larger coverage and better load balancing ability for wireless communication networks. However, with the number of users and the traffic load in the network rapidly increasing, the resource of the system becomes more intense. Thus, a proper and high-efficient call admission control scheme is needed to balance the traffic load and properly allocate the limited wireless resources. This paper presents a call admission control scheme with additional consideration of users' Quality of Service (QoS) and cache technique. Firstly, a system model of the satellite-terrestrial communication network is introduced. After that, an objective function of the system throughput is derived and laterly optimized with genetic algorithm. Simulation result shows that higher system throughput can be achieved with the proposed scheme, while the QoS of users remains uninfluenced. Besides, the Call Blocking Probability (CBP) of the system is reduced efficiently, and the resource utilization is improved at the same time.
{"title":"A call admission control scheme in cache-enabled satellite-terrestrial communication networks","authors":"Jiawei Yu, Pengxu Li, Gaofeng Cui, Xiuhua Li, Weidong Wang","doi":"10.1109/ICAIT.2017.8388924","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388924","url":null,"abstract":"Satellite-terrestrial communication network has been proposed in recent years, for its great potential in larger coverage and better load balancing ability for wireless communication networks. However, with the number of users and the traffic load in the network rapidly increasing, the resource of the system becomes more intense. Thus, a proper and high-efficient call admission control scheme is needed to balance the traffic load and properly allocate the limited wireless resources. This paper presents a call admission control scheme with additional consideration of users' Quality of Service (QoS) and cache technique. Firstly, a system model of the satellite-terrestrial communication network is introduced. After that, an objective function of the system throughput is derived and laterly optimized with genetic algorithm. Simulation result shows that higher system throughput can be achieved with the proposed scheme, while the QoS of users remains uninfluenced. Besides, the Call Blocking Probability (CBP) of the system is reduced efficiently, and the resource utilization is improved at the same time.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388905
Xin Wang, Jie Duan, Cheng Wang, Gaofeng Cui, Weidong Wang
Network security is a vital and essential problem in wireless communication system. There are two methods to ensure network security, one is based on bit-level credentials, and the other is based on radio frequency fingerprinting (RFF). RFF is getting more and more attention, for it is rather difficult to imitate and replicate RFF features by software. In this paper, the energy entropy and color moments of the bispectrum, as well as the support vector machine, are proposed or identifying different devices. Simulation results demonstrate that the proposed method outperforms the previous ones, especially when signal-to-noise ratio (SNR) is low. The identification accuracy achieves nearly 80% when SNR=0dB. Experiment is also conducted, further proving the effectiveness.
{"title":"A radio frequency fingerprinting identification method based on energy entropy and color moments of the bispectrum","authors":"Xin Wang, Jie Duan, Cheng Wang, Gaofeng Cui, Weidong Wang","doi":"10.1109/ICAIT.2017.8388905","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388905","url":null,"abstract":"Network security is a vital and essential problem in wireless communication system. There are two methods to ensure network security, one is based on bit-level credentials, and the other is based on radio frequency fingerprinting (RFF). RFF is getting more and more attention, for it is rather difficult to imitate and replicate RFF features by software. In this paper, the energy entropy and color moments of the bispectrum, as well as the support vector machine, are proposed or identifying different devices. Simulation results demonstrate that the proposed method outperforms the previous ones, especially when signal-to-noise ratio (SNR) is low. The identification accuracy achieves nearly 80% when SNR=0dB. Experiment is also conducted, further proving the effectiveness.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121915958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388939
Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu
DHIES is a Diffle-Hellman based scheme that combines a symmetric encryption method, a message authentication code, and a hash function, in addition to number theoretic operations, in a way which is intended to provide security against chosen ciphertext attacks. In this paper, we show that DHIES satisfies KEM-CCA security. DHIES is a extension of Elgamal encryption scheme, which is as efficient as ElGamal encryption encryption. However, it has stronger security properties, Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. In this paper, we study the KDM-CCA security of DHIES, we prove that the DHIES can achieves KDM-CCA security if appropriate assumption on the underlying primitive.
{"title":"On the key dependent message security of DHIES","authors":"Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu","doi":"10.1109/ICAIT.2017.8388939","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388939","url":null,"abstract":"DHIES is a Diffle-Hellman based scheme that combines a symmetric encryption method, a message authentication code, and a hash function, in addition to number theoretic operations, in a way which is intended to provide security against chosen ciphertext attacks. In this paper, we show that DHIES satisfies KEM-CCA security. DHIES is a extension of Elgamal encryption scheme, which is as efficient as ElGamal encryption encryption. However, it has stronger security properties, Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. In this paper, we study the KDM-CCA security of DHIES, we prove that the DHIES can achieves KDM-CCA security if appropriate assumption on the underlying primitive.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128486823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a method for identifying the most similar image in the visible image library and the given infrared image. First the method of visible and infrared image edge extraction respectively, and then use the perceptual hash encoding method of edge image, and get the image similarity by comparing the two image hash encoding Hamming distance. As the infrared image noise more perceptual hash algorithm based on pixel values may have errors of judgment, so the use of hash algorithm to get similarity on the 3 visible images using the SURF algorithm to compare the similarity. Based on the slope consistency, two image matching points are obtained. The most visible images of matching points are selected as the most similar images to infrared images. Experimental results show that the method can identify the visible image with the highest similarity between infrared image and visible image library.
{"title":"Paper infrared image retrieval of power equipment based on perceptual hash and SURF","authors":"Guohui Zhou, Lijun Xiao, Xingyu Pei, Chenxi Li, Huiping Qin, Jinpeng Zhang, Z. Fang","doi":"10.1109/ICAIT.2017.8388951","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388951","url":null,"abstract":"This paper presents a method for identifying the most similar image in the visible image library and the given infrared image. First the method of visible and infrared image edge extraction respectively, and then use the perceptual hash encoding method of edge image, and get the image similarity by comparing the two image hash encoding Hamming distance. As the infrared image noise more perceptual hash algorithm based on pixel values may have errors of judgment, so the use of hash algorithm to get similarity on the 3 visible images using the SURF algorithm to compare the similarity. Based on the slope consistency, two image matching points are obtained. The most visible images of matching points are selected as the most similar images to infrared images. Experimental results show that the method can identify the visible image with the highest similarity between infrared image and visible image library.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388938
Zhao Ming, R. Ganiyu
In recent years, social media has been an efficient platform for fast dissemination of information. The advent of microblogs however boost disaster awareness immensely as many researchers dive into actively analyzing short messages from various internet users around the globe. Our algorithm hereby employs a method in which Naïve Bayes algorithm was adopted to analyze microblog messages for fire disaster awareness. We also device a language detection algorithm which could overcome language barriers in processing microblog messages extensively. Weibo data of year 2012 was experimented on and an accuracy between 87% and 99% was obtained.
{"title":"Fire disaster awareness based on microblog messages using Naïve bayes algorithm and key-code language detection technique","authors":"Zhao Ming, R. Ganiyu","doi":"10.1109/ICAIT.2017.8388938","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388938","url":null,"abstract":"In recent years, social media has been an efficient platform for fast dissemination of information. The advent of microblogs however boost disaster awareness immensely as many researchers dive into actively analyzing short messages from various internet users around the globe. Our algorithm hereby employs a method in which Naïve Bayes algorithm was adopted to analyze microblog messages for fire disaster awareness. We also device a language detection algorithm which could overcome language barriers in processing microblog messages extensively. Weibo data of year 2012 was experimented on and an accuracy between 87% and 99% was obtained.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAIT.2017.8388948
Xinyun Wang, B. Deng, Hongqiang Wang, Yuliang Qin
In stationary SAR/CSAR images, ground moving targets are defocused and dislocated due to their unknown motions. This paper presents the moving target imaging algorithm for circular SAR. Considering the characteristic of echo signal of the moving target, additional phase caused by target motion is compensated by estimating motion parameters with along-track interferometry (ATI) technology. After compensation, classic omega-k algorithm is applied to reconstruct the image. Simulation results are given to demonstrate the effectiveness of the proposed method.
{"title":"Ground moving target imaging based on motion compensation for circular SAR","authors":"Xinyun Wang, B. Deng, Hongqiang Wang, Yuliang Qin","doi":"10.1109/ICAIT.2017.8388948","DOIUrl":"https://doi.org/10.1109/ICAIT.2017.8388948","url":null,"abstract":"In stationary SAR/CSAR images, ground moving targets are defocused and dislocated due to their unknown motions. This paper presents the moving target imaging algorithm for circular SAR. Considering the characteristic of echo signal of the moving target, additional phase caused by target motion is compensated by estimating motion parameters with along-track interferometry (ATI) technology. After compensation, classic omega-k algorithm is applied to reconstruct the image. Simulation results are given to demonstrate the effectiveness of the proposed method.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}