4,943 research outputs found

    Radar return from a continuous vegetation canopy

    Get PDF
    The radar backscatter coefficient, sigma deg, of alfalfa was investigated as a function of both radar parameters and the physical characteristics of the alfalfa canopy. Measurements were acquired with an 8-18 GHz FM-CW mobile radar over an angular range of 0 - 70 deg as measured from nadir. The experimental data indicates that the excursions of sigma deg at nadir cover a range of nearly 18 dB during one complete growing cycle. An empirical model for sigma deg was developed which accounts for its variability in terms of soil moisture, plant moisture and plant height

    Fading characteristics of panchromatic radar backscatter from selected agricultural targets

    Get PDF
    An experiment was performed to empirically determine the fading characteristics of backscattered radar signals from four agricultural targets at 9 GHz. After a short review of the statistics of Rayleigh fading backscatter, the data processing method and results of the data are analyzed. Comparison with theory shows adequate agreement with the experimental results, provided of course, the targets are modeled in a correct manner

    Remotely sensing wheat maturation with radar

    Get PDF
    The scattering properties of wheat were studied in the 8-18 GHz band as a function of frequency, polarization, incidence angle, and crop maturity. Supporting ground truth was collected at the time of measurement. The data indicate that the radar backscattering coefficient is sensitive to both radar system parameters and crop characteristics particularly at incidence angles near nadir. Linear regression analyses of the radar backscattering coefficient on both time and plant moisture content result in rather good correlation. Furthermore, by calculating the average time rate of change of the radar backscattering coefficient it is found that it undergoes rapid variations shortly before and after the wheat is harvested. Both of these analyses suggest methods for estimating wheat maturity and for monitoring the progress of harvest

    Radar backscatter properties of milo and soybeans

    Get PDF
    The radar backscatter from fields of milo and soybeans was measured with a ground based radar as a function of frequency (8-18 GHz), polarization (HH and VV) and angle of incidence (0 deg-70 deg) during the summer of 1974. Supporting ground truth was gathered contemporaneously with the backscatter data. At nadir sigma deg of milo correlated highly, r = 0.96, with soil moisture in the milo field at 8.6 GHz but decreased to a value of r = 0.78 at a frequency of 17.0 GHz. Correlation studies of the variations of sigma deg with soil moisture in the soybean fields were not possible due to a lack of a meaningful soil moisture dynamic range. At the larger angles of incidence, however, sigma deg of soybeans did appear to be dependent on precipitation. It is suggested this phenomenon was caused by the rain altering plant geometry. In general sigma deg of both milo and soybeans had a relatively small dynamic range at the higher angles of incidence and showed no significant dependence on the measured crop parameters

    Seasonal variations of the microwave scattering properties of deciduous trees as measured in the 1-18 GHz spectral range

    Get PDF
    The author has identified the following significant results. Employing two FM-CW radar spectrometers, scattering data were acquired from stands of deciduous trees during the spring and autumn. The data suggest that the trees act as a volume scatter target particularly in the 7-18 GHz region. A comparison of data collected in spring and autumn indicates that the radar scattering coefficient, sigma deg, as measured in spring can be substantially larger (as much as 10 dB) than sigma deg as measured in the autumn

    The effects of soil moisture and plant morphology on the radar backscatter from vegetation

    Get PDF
    The results of experimental studies on the backscattering properties of corn, milo, soybeans and alfalfa are presented. The measurements were made during the summer of 1973 over the 8 to 18 GHz frequency band. The data indicate that soil moisture estimation is best accomplished at incidence angles near nadir with lower frequencies, while crop discrimination is best accomplished using two frequencies at incidence angles ranging from 30 deg to 65 deg. It is also shown that temporal plant morphology variations can cause extreme variations in the values of the scattering coefficients. These morphological changes can be caused by growth, heavy rain and in the case of alfalfa, harvesting

    The 8-18 GHz radar spectrometer

    Get PDF
    The design, construction, testing, and accuracy of an 8-18 GHz radar spectrometer, an FM-CW system which employs a dual antenna system, is described. The antennas, transmitter, and a portion of the receiver are mounted at the top of a 26 meter hydraulic boom which is in turn mounted on a truck for system mobility. HH and VV polarized measurements are possible at incidence angles ranging from 0 deg. to 80 deg. Calibration is accomplished by referencing the measurements against a Luneberg lens of known radar cross section

    The Ohio Motto Survives the Establishment Clause

    Get PDF

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users

    {SoK}: {An} Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    No full text
    Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in a protocol specification. The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. Indeed, Internet protocols have been commonly designed without security in mind which leads to a multitude of misconfiguration traps. While this is slowly changing, to strict security considerations can have a similarly bad effect. Due to complex implementations and insufficient documentation, security features may remain unused, leaving deployments vulnerable. In this paper we provide a systematization of the security traps found in common Internet protocols. By separating protocols in four classes we identify major factors that lead to common security traps. These insights together with observations about end-user centric usability and security by default are then used to derive recommendations for improving existing and designing new protocols---without such security sensitive traps for operators, implementors and users
    corecore