When we think about radar, we picture rotating dishes scanning the skies from atop air-traffic control buildings, radomes peering across the sea from coastal hilltops, and roadside police checking the ...
Since the early 2000s, ultra-wideband (UWB) technology has gradually found its way into a variety of commercial applications that require secure and fine-ranging capabilities. Well-known examples are ...
Artificial intelligence and machine learning (AI/ML) are driving the development of next-generation radar perception. However, these AI/ML-based perception models require enough data to learn patterns ...
Members can download this article in PDF format. Single-chip radars have been available for several years now and their use in automotive applications continues to grow. One recent improvement is ...
The company is tapping the terahertz band of the electromagnetic spectrum to bring out the best qualities of more common ...
Automotive radar has become an indispensable technology in advanced driver assistance systems (ADAS) and the evolution towards fully autonomous vehicles. By utilising millimetre wave signals, these ...
Communications and sensing technologies have transformed the automotive industry. More and more, cars include features and systems to interact with their environment, gaining awareness of the ...
The R&S RTS radar target simulator from Rohde & Schwarz can electronically simulate very close-range objects, and has been used to verify the performance of NXP Semiconductors’ next-generation radar ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More When self-driving cars hit the market, they will need to monitor the well ...
When demanding sensing applications occur in challenging environments such as in the agriculture, construction, and mobile machinery industries, it is important to install robust and reliable sensors ...
The goal of perimeter intrusion detection systems (PIDS) is simple: alert security personnel of potential perimeter breaches, in order to keep unauthorized individuals out. Implementing that goal, ...