Dr. Ranjit D. Pradhan
at Physical Optics Corp
SPIE Involvement:
Author
Publications (20)

PROCEEDINGS ARTICLE | May 12, 2016
Proc. SPIE. 9825, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement Applications XV
KEYWORDS: Target detection, Radar, Infrared cameras, Infrared sensors, Homeland security, Medicine, LIDAR, Sensors, CCD cameras, Intelligence systems, CCD image sensors, C3I, Binary data, Bayesian inference

PROCEEDINGS ARTICLE | May 29, 2014
Proc. SPIE. 9074, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XIII
KEYWORDS: Signal to noise ratio, Homeland security, Sensors, X-rays, Inspection, Mammography, Explosives, Target recognition, Intelligence systems, Binary data

PROCEEDINGS ARTICLE | September 30, 2013
Proc. SPIE. 8833, Tribute to H. John Caulfield
KEYWORDS: Mirrors, Eye, Electronics, Holography, Oscillators, Sensors, Clouds, System integration, Binary data, Bayesian inference

PROCEEDINGS ARTICLE | June 6, 2013
Proc. SPIE. 8711, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XII
KEYWORDS: Signal to noise ratio, Unmanned aerial vehicles, Data modeling, Sensors, Magnetism, Interference (communication), Navigation systems, Magnetic sensors, Signal detection, Environmental sensing

PROCEEDINGS ARTICLE | June 18, 2012
Proc. SPIE. 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI
KEYWORDS: Homeland security, Solar energy, Energy harvesting, Telecommunications, Wind energy, Associative arrays, Acoustics, Cesium, Renewable energy, Information operations

PROCEEDINGS ARTICLE | June 18, 2012
Proc. SPIE. 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI
KEYWORDS: Defense and security, Homeland security, Integration, Reconnaissance, Computer intrusion detection, Reconnaissance systems, Network architectures, Information security, Computer security, Network security

Showing 5 of 20 publications
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Back to Top