Please wait a minute...
Computer & Telecommunication  2024, Vol. 1 Issue (5): 6-    DOI: 10.15966/j.cnki.dnydx.2024.05.005
Current Issue | Archive | Adv Search |
An Algorithm for Identifying X-ray Pulsar Signals
1. Key Laboratory of Special Automotive Electronics Technology of Education Department of Guizhou Province 2. Guizhou Normal University
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  The use of pulsar X-ray signals for spacecraft navigation is a hot research field in deep space exploration. In X-ray Pulsarbased Navigation (XNAV), identifying X-ray pulsar signals is extremely important. This article proposes the Time Cycle Kurtosis (TCK) as an identification algorithm for extracting pulsar signal features, and combines it with ResNet34 for training and verifica‐ tion. The criterion for successful identification is based on an accuracy of over 90%, with the shortest observation times for B0531+ 21, B0540-69, and B1509-58 pulsars to complete the identification task being 0.5 s, 2.5 s, and 15 s, respectively. This article demon‐ strates through experiments that TCK can quickly and accurately complete the identification task of X-ray pulsar signals.
Key wordsXNAV      identification      TCK      feature extraction      ResNet34     
Published: 28 August 2024

Cite this article:

ZENG Hao,  YANG Cheng, . An Algorithm for Identifying X-ray Pulsar Signals. Computer & Telecommunication, 2024, 1(5): 6-.

URL:

https://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2024.05.005     OR     https://www.computertelecom.com.cn/EN/Y2024/V1/I5/6

[1] CHAI Yuan-yuan SUN Na-xin MENG Chen-ran CHENG Hui ZHENG Jing-jing.
Exploration on Computer Practice Teaching Mode Based on Curriculum Ideology and Politics
[J]. 电脑与电信, 2023, 1(1-2): 5-7.
[2] ZHANG Li.
Research on Macro Virus Processing Model Based on SVM Algorithm
[J]. 电脑与电信, 2022, 1(1-2): 41-45.
[3] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[4] SHEN Ya-ting SHAO Ying BIAN Kai.
Summary of Research on Book Classification Model Technology in Smart Library
[J]. 电脑与电信, 2021, 1(12): 9-13.
[5] ZHENG Rui LI Cheng CHEN Can-wei YANG Peng.
A Method for Early Identification of Urban Extreme Heavy Rainfall Risk
[J]. 电脑与电信, 2021, 0(10): 70-87.
[6] WANG Zhuang-zhuang LI Zhu. Improved Sobel Edge Detection Operator Based on Butterworth Filter[J]. 电脑与电信, 2020, 1(8): 19-22.
[7] ZHENG Dan ZHOU Xiao-long. Research and Exploration on Smart FinancialAid in Colleges and Universities in the Background of Big Data[J]. 电脑与电信, 2020, 1(7): 25-27.
[8] SUN Guo-xian ZHAO Yong-chang. An Optimization Method forArming Power Signal Identification in ESAD[J]. 电脑与电信, 2020, 1(7): 58-61.
[9] HUANG Jing YANG Shu-guo LIU Zi-zheng. AMethod for Image Retrieval with Capsule Network[J]. 电脑与电信, 2020, 1(6): 52-56.
[10] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[11] ZHUO Ma-ji. Research on Algorithms of Automatic Recognition and Disambiguation of Tibetan Free Functional Words in Tibetan Historical Documents Recognition[J]. 电脑与电信, 2018, 1(12): 20-22.
[12] Yao Bing-ying Li Chao Zou Gui-hong. Application Research on Identification of Cervical Lesions Based on Random Forest[J]. 电脑与电信, 2018, 1(11): 15-17.
[13] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[14] Yao Bingying, Li Chuanqing, Li Chao. Design of the Cloud Storage Authentication System Based on Fingerprint Identification[J]. 电脑与电信, 2016, 1(7): 15-17.
[15] Wei Tengbiao, Zhu Haixia. The Application of QR Code Recognition Technology and IOS System in the Process of Professional Title Evaluation[J]. 电脑与电信, 2016, 1(7): 101-102.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd