Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0053
Nopphon Keerativoranan;Jun-Ichi Takada
Wireless channel emulator (WCE) allows site-specific evaluation of the wireless system with time- and cost-efficient and reproducible result. In addition to the conventional star topology between devices and a base station (BS), incorporating device-to-device communication (D2D) into WCE is essential. In this paper, the authors envision the concept and address the challenges of the two-layer grid-based channel emulation technique (2L-GBCE) to enable WCE in the D2D. The TV-CIR is synthesized from the pre-computed deterministic path parameters between two-layer grid structures representing both devices through interpolation. Performance is statistically evaluated in terms of average path gain, normalized delay spread, and Doppler spread profiles. The simulation was carried out at 5.25 GHz and the results qualitatively indicated the capability of the proposed emulating technique, as well as highlighting the effect of path clustering and grid size as challenges.
{"title":"Grid-Based Channel Emulation Technique for Enabling Wireless Channel Emulator in Device-to-Device Communication","authors":"Nopphon Keerativoranan;Jun-Ichi Takada","doi":"10.23919/comex.2024XBL0053","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0053","url":null,"abstract":"Wireless channel emulator (WCE) allows site-specific evaluation of the wireless system with time- and cost-efficient and reproducible result. In addition to the conventional star topology between devices and a base station (BS), incorporating device-to-device communication (D2D) into WCE is essential. In this paper, the authors envision the concept and address the challenges of the two-layer grid-based channel emulation technique (2L-GBCE) to enable WCE in the D2D. The TV-CIR is synthesized from the pre-computed deterministic path parameters between two-layer grid structures representing both devices through interpolation. Performance is statistically evaluated in terms of average path gain, normalized delay spread, and Doppler spread profiles. The simulation was carried out at 5.25 GHz and the results qualitatively indicated the capability of the proposed emulating technique, as well as highlighting the effect of path clustering and grid size as challenges.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"272-275"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528226","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study investigates the transmission performance of coded faster-than-Nyquist (FTN) signaling based on single-carrier with frequency-domain equalization in the presence of nonlinear distortion and multipath fading. In our performance evaluation, the effects of nonlinear distortion and channel coding were determined using a power amplifier model based on the Rapp model and turbo coding, respectively, which were incorporated into the frame error rate and throughput performance of FTN signaling. Moreover, we compared the performance of coded FTN and coded orthogonal frequency division multiplexing under the same transmission rate using computer simulations to verify the effectiveness of FTN signaling under nonlinear distortion and frequency selective fading.
{"title":"Effectiveness Evaluation of Coded FTN Signaling in the Presence of Nonlinear Distortion Under Multipath Fading Channels","authors":"Takumi Suzuki;Tomohiro Matsuyama;Shuhei Saito;Hirofumi Suganuma;Fumiaki Maehara","doi":"10.23919/comex.2024XBL0007","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0007","url":null,"abstract":"This study investigates the transmission performance of coded faster-than-Nyquist (FTN) signaling based on single-carrier with frequency-domain equalization in the presence of nonlinear distortion and multipath fading. In our performance evaluation, the effects of nonlinear distortion and channel coding were determined using a power amplifier model based on the Rapp model and turbo coding, respectively, which were incorporated into the frame error rate and throughput performance of FTN signaling. Moreover, we compared the performance of coded FTN and coded orthogonal frequency division multiplexing under the same transmission rate using computer simulations to verify the effectiveness of FTN signaling under nonlinear distortion and frequency selective fading.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"252-255"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528224","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hollow-core photonic bandgap fibers exhibit nonlinear properties. In comparison with conventional silica-core optical fibers, we experimentally evaluate whether the hollow-core photonic bandgap fiber has extremely low nonlinearity compared with silica-core optical fibers in terms of stimulated Brillouin scattering and four-wave mixing. A low nonlinearity is useful for high-power optical transmission applications.
{"title":"Comparison of Nonlinear Properties in Silica-Core and Hollow-Core Fibers","authors":"Souya Sugiura;Kai Murakami;Takeshi Takagi;Kazunori Mukasa;Motoharu Matsuura","doi":"10.23919/comex.2024XBL0059","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0059","url":null,"abstract":"Hollow-core photonic bandgap fibers exhibit nonlinear properties. In comparison with conventional silica-core optical fibers, we experimentally evaluate whether the hollow-core photonic bandgap fiber has extremely low nonlinearity compared with silica-core optical fibers in terms of stimulated Brillouin scattering and four-wave mixing. A low nonlinearity is useful for high-power optical transmission applications.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"264-267"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528221","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0044
Ao Hu;Keisuke Konno;Qiang Chen
A novel 1-bit mechanically controlled reflectarray element features in high efficiency is proposed. The element is actuated by an electromagnet under ground plane thus opening via hole or slot is unnecessary. A locking system is designed to lock the steel patch in two different height, which can avoid high power consumption of electromagnet in either of the states. The mechanical performance is discussed in detail and the scattering characteristics of the element are experimentally and numerically validated. A 10x 10 reflectarray antenna is modeled and its beam scanning ability is demonstrated through a MoM fullwave simulation.
{"title":"A Novel Electromagnet-Controlled Reflectarray Element Employing 1-Bit Height Locking System with Low Power Consumption","authors":"Ao Hu;Keisuke Konno;Qiang Chen","doi":"10.23919/comex.2024XBL0044","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0044","url":null,"abstract":"A novel 1-bit mechanically controlled reflectarray element features in high efficiency is proposed. The element is actuated by an electromagnet under ground plane thus opening via hole or slot is unnecessary. A locking system is designed to lock the steel patch in two different height, which can avoid high power consumption of electromagnet in either of the states. The mechanical performance is discussed in detail and the scattering characteristics of the element are experimentally and numerically validated. A 10x 10 reflectarray antenna is modeled and its beam scanning ability is demonstrated through a MoM fullwave simulation.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"285-288"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528230","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0065
Yuhei Kawakami;Hideo Kawata;Akifumi Tanase;Hironao Abe;Shinichi Yoshihara;Tomoaki Yoshida
IEEE802.1Qbv (Time-aware Shaper: TAS) has recently been applied within user networks (NWs) for realizing factory automation and remote control. As mass customization matures, TAS is expected to extend its application coverage to not only user NWs but also wide-area NWs to enable real-time communication for remote control and cloud-based application use. However, designing a TAS schedule is an NP-hard problem, which becomes more difficult as the gate control list (GCL) hypercycle increases. In this paper, we propose a method to convert the transmission cycle of Talker to a different cycle time for TAS scheduling in a carrier NW. This results in a smaller GCL hypercycle in the carrier NW. Our evaluation experiments show that the GCL computation time of the proposed method is shorter. This paper contributes to the realization of TAS in the wide-area NW, which has not been discussed so far.
最近,IEEE802.1Qbv(时间感知整形器:TAS)被应用于用户网络(NW),以实现工厂自动化和远程控制。随着大规模定制的成熟,预计 TAS 的应用范围不仅会扩展到用户网络,还会扩展到广域网络,以实现远程控制和基于云的应用的实时通信。然而,设计 TAS 计划是一个 NP 难问题,随着门控制列表(GCL)超循环的增加,难度也会增加。本文提出了一种方法,将 Talker 的传输周期转换为载波 NW 中 TAS 调度的不同周期时间。这样,载波 NW 中的 GCL 超周期就会变小。我们的评估实验表明,所提方法的 GCL 计算时间更短。本文为在广域 NW 中实现 TAS 做出了贡献,而这一问题迄今为止尚未得到讨论。
{"title":"Proposal of TAS Hypercycle Expansion Suppression Method by Transmission Cycle Period Conversion","authors":"Yuhei Kawakami;Hideo Kawata;Akifumi Tanase;Hironao Abe;Shinichi Yoshihara;Tomoaki Yoshida","doi":"10.23919/comex.2024XBL0065","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0065","url":null,"abstract":"IEEE802.1Qbv (Time-aware Shaper: TAS) has recently been applied within user networks (NWs) for realizing factory automation and remote control. As mass customization matures, TAS is expected to extend its application coverage to not only user NWs but also wide-area NWs to enable real-time communication for remote control and cloud-based application use. However, designing a TAS schedule is an NP-hard problem, which becomes more difficult as the gate control list (GCL) hypercycle increases. In this paper, we propose a method to convert the transmission cycle of Talker to a different cycle time for TAS scheduling in a carrier NW. This results in a smaller GCL hypercycle in the carrier NW. Our evaluation experiments show that the GCL computation time of the proposed method is shorter. This paper contributes to the realization of TAS in the wide-area NW, which has not been discussed so far.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"280-284"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528234","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0060
Haruta Yamada;Ryoichi Kawahara
With the advent of the Internet and its close connection to people's lives, web applications have become increasingly important. To ensure that the web application is secure, a web application firewall (WAF) detects and stops attacks that exploit application vulnerabilities in communication with server applications. However, these firewalls require continuous tuning by experts with in-depth knowledge of the technologies and services provided, which may become a major obstacle to the introduction of WAF. To resolve this problem, we developed two autoencoder-based models based on an unsupervised learning model that uses only normal requests, considering the implementation and operation costs. We then evaluated the performance of the two autoencoder-based models. The first model converts a hypertext transfer protocol (HTTP) request into ASCII codes and learns their relationship in a normal request using an autoencoder. The second model generates an array of word vectors using fastText and learns using a convolutional autoencoder, which solves the problem identified in the performance evaluation of the first model where the problem was that the simple conversion to ASCII codes was not enough to distinguish between normal and anomalous requests. The two models were evaluated using the HTTP DATASET CSIC2010 dataset. The AUC for the second model was approximately 0.94 while that for the first model was approximately 0.71. This means that the second model has higher accuracy despite being an unsupervised approach, one that does not require labeled anomalous requests, and can be applied with low costs.
{"title":"Evaluation of HTTP Request Anomaly Detection Model Using fastText and Convolutional Autoencoder","authors":"Haruta Yamada;Ryoichi Kawahara","doi":"10.23919/comex.2024XBL0060","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0060","url":null,"abstract":"With the advent of the Internet and its close connection to people's lives, web applications have become increasingly important. To ensure that the web application is secure, a web application firewall (WAF) detects and stops attacks that exploit application vulnerabilities in communication with server applications. However, these firewalls require continuous tuning by experts with in-depth knowledge of the technologies and services provided, which may become a major obstacle to the introduction of WAF. To resolve this problem, we developed two autoencoder-based models based on an unsupervised learning model that uses only normal requests, considering the implementation and operation costs. We then evaluated the performance of the two autoencoder-based models. The first model converts a hypertext transfer protocol (HTTP) request into ASCII codes and learns their relationship in a normal request using an autoencoder. The second model generates an array of word vectors using fastText and learns using a convolutional autoencoder, which solves the problem identified in the performance evaluation of the first model where the problem was that the simple conversion to ASCII codes was not enough to distinguish between normal and anomalous requests. The two models were evaluated using the HTTP DATASET CSIC2010 dataset. The AUC for the second model was approximately 0.94 while that for the first model was approximately 0.71. This means that the second model has higher accuracy despite being an unsupervised approach, one that does not require labeled anomalous requests, and can be applied with low costs.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"240-243"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528235","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A challenging issue in continuous-variable quantum key distribution (CV-QKD) is the improvement in error correction efficiency because random number bits are encoded in a quadrature of faint optical pulses. Herein, we propose an error-control information reconciliation method for CV-QKD based on our recently proposed fixed-bit polar code. In the present scheme, unreliable bits are embedded in the prepared “fixed bits,” enabling the detection and reproduction of errors in these bits without error correction, effectively improving the error-correction efficiency. Numerical simulations demonstrate that the efficiency of the proposed scheme is 10% higher than that of polar code-based reconciliation without fixed bits.
{"title":"Error-Control Information Reconciliation Scheme for Continuous-Variable Quantum Key Distribution Using Fixed-Bit Polar Codes","authors":"Kensuke Yamaura;Hiroyuki Endo;Eiji Okamoto;Masahide Sasaki;Mikio Fujiwara;Morio Toyoshima","doi":"10.23919/comex.2024XBL0050","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0050","url":null,"abstract":"A challenging issue in continuous-variable quantum key distribution (CV-QKD) is the improvement in error correction efficiency because random number bits are encoded in a quadrature of faint optical pulses. Herein, we propose an error-control information reconciliation method for CV-QKD based on our recently proposed fixed-bit polar code. In the present scheme, unreliable bits are embedded in the prepared “fixed bits,” enabling the detection and reproduction of errors in these bits without error correction, effectively improving the error-correction efficiency. Numerical simulations demonstrate that the efficiency of the proposed scheme is 10% higher than that of polar code-based reconciliation without fixed bits.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"268-271"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528222","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0055
Yuka Okamoto;Hirotaka Ujikawa;Kota Asaka;Tatsuya Shimada;Tomoaki Yoshida
The development and introduction of real-time remote control of robots using mobile NWs is expected. To realize this control, a network configuration in which the User Plane Function (UPF) and Mobile Edge Computing (MEC) are located near the Central Unit (CU) is considered. If traffic exceeds the processing capability of the UPF, there is the concern of congestion. In this paper, we propose and demonstrate a method for obtaining the uplink traffic volume from the CU and predicting the future traffic to switch the optical path and UPF before congestion occurs within the Mobile Backhaul (MBH) delay of 1ms.
{"title":"Proactive Congestion Control by Fast Optical Switching Within 1-ms Delay at Mobile Backhaul Utilizing Traffic Data Volume","authors":"Yuka Okamoto;Hirotaka Ujikawa;Kota Asaka;Tatsuya Shimada;Tomoaki Yoshida","doi":"10.23919/comex.2024XBL0055","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0055","url":null,"abstract":"The development and introduction of real-time remote control of robots using mobile NWs is expected. To realize this control, a network configuration in which the User Plane Function (UPF) and Mobile Edge Computing (MEC) are located near the Central Unit (CU) is considered. If traffic exceeds the processing capability of the UPF, there is the concern of congestion. In this paper, we propose and demonstrate a method for obtaining the uplink traffic volume from the CU and predicting the future traffic to switch the optical path and UPF before congestion occurs within the Mobile Backhaul (MBH) delay of 1ms.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"256-259"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the demand for satellite communication has increased, and the realization of a higher capacity has become a challenge. However, the service area of each low-Earth orbital satellite changes constantly, requiring many satellites for continuous communication, which increases space debris and the risk of collision accidents. This paper proposes a multiple-input multiple-output transmission system using low-Earth orbit and quasi-zenith satellites that can expand the channel capacity while reducing the number of required satellites. Numerical simulations demonstrate a 50% increase in throughput or a quarter reduction in the number of satellites required to achieve the same performance.
{"title":"Capacity Enhancement Using LEO-QZS MIMO Transmission in Non-Terrestrial Network Systems","authors":"Takeshi Shimizu;Eiji Okamoto;Amane Miura;Hiroyuki Tsuji","doi":"10.23919/comex.2024XBL0063","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0063","url":null,"abstract":"In recent years, the demand for satellite communication has increased, and the realization of a higher capacity has become a challenge. However, the service area of each low-Earth orbital satellite changes constantly, requiring many satellites for continuous communication, which increases space debris and the risk of collision accidents. This paper proposes a multiple-input multiple-output transmission system using low-Earth orbit and quasi-zenith satellites that can expand the channel capacity while reducing the number of required satellites. Numerical simulations demonstrate a 50% increase in throughput or a quarter reduction in the number of satellites required to achieve the same performance.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"260-263"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528236","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.23919/comex.2024XBL0054
Kenshi Ogawa;Dovchin Tsagaanbayar;Ryohei Nakamura
In this paper, we propose an inverse synthetic aperture radar (ISAR) imaging method using a millimeter wave (mmW) fast chirp modulation (FCM) multi-input and multi-output (MIMO) radar for drone detection. To obtain high-resolution ISAR images, the backprojection algorithm is adopted for the ISAR processing. This algorithm is suitable for ISAR imaging of a moving drone with an irregular motion. The measurement experiments were conducted using flying drones (DJI Phantom 3, DJI Mavic Pro and DJI Mavic Mini) in indoor situations to examine the effectiveness of our proposal. The measurement results demonstrated that the proposed method could generate the high-resolution ISAR images enough to recognize the approximate size and shape of each drone.
{"title":"ISAR Imaging for Drone Detection Based on Backprojection Algorithm Using Millimeter-Wave Fast Chirp Modulation MIMO Radar","authors":"Kenshi Ogawa;Dovchin Tsagaanbayar;Ryohei Nakamura","doi":"10.23919/comex.2024XBL0054","DOIUrl":"https://doi.org/10.23919/comex.2024XBL0054","url":null,"abstract":"In this paper, we propose an inverse synthetic aperture radar (ISAR) imaging method using a millimeter wave (mmW) fast chirp modulation (FCM) multi-input and multi-output (MIMO) radar for drone detection. To obtain high-resolution ISAR images, the backprojection algorithm is adopted for the ISAR processing. This algorithm is suitable for ISAR imaging of a moving drone with an irregular motion. The measurement experiments were conducted using flying drones (DJI Phantom 3, DJI Mavic Pro and DJI Mavic Mini) in indoor situations to examine the effectiveness of our proposal. The measurement results demonstrated that the proposed method could generate the high-resolution ISAR images enough to recognize the approximate size and shape of each drone.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 7","pages":"276-279"},"PeriodicalIF":0.3,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10528227","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141583477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}