Solutions For Radar Pulse Deinterleaving - Curve

1y ago
10 Views
2 Downloads
2.62 MB
92 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Victor Nelms
Transcription

SOLUTIONS FOR RADAR PULSE DEINTERLEAVINGbyDenis Kutman, B.EngSUBMITTED IN PARTIAL FULFILLMENT OF THEREQUIREMENTS FOR THE DEGREE OFMASTER OF APPLIED SCIENCEATCARLETON UNIVERSITYOTTAWA, ONTARIOJANUARY 2011 Copyright by Denis Kutman, 2011

1*1Library and ArchivesCanadaBibliotheque etArchives CanadaPublished HeritageBranchDirection duPatrimoine de I'edition395 Wellington StreetOttawaONK1A0N4Canada395, rue WellingtonOttawa ON K1A 0N4CanadaYour file Votre referenceISBN: 978-0-494-81663-9Our file Notre referenceISBN: 978-0-494-81663-9NOTICE:AVIS:The author has granted a nonexclusive license allowing Library andArchives Canada to reproduce,publish, archive, preserve, conserve,communicate to the public bytelecommunication or on the Internet,loan, distribute and sell thesesworldwide, for commercial or noncommercial purposes, in microform,paper, electronic and/or any otherformats.L'auteur a accorde une licence non exclusivepermettant a la Bibliotheque et ArchivesCanada de reproduire, publier, archiver,sauvegarder, conserver, transmettre au publicpar telecommunication ou parl'lnternet, preter,distribuer et vendre des theses partout dans lemonde, a des fins commerciales ou autres, sursupport microforme, papier, electronique et/ouautres formats.The author retains copyrightownership and moral rights in thisthesis. Neither the thesis norsubstantial extracts from it may beprinted or otherwise reproducedwithout the author's permission.L'auteur conserve la propriete du droit d'auteuret des droits moraux qui protege cette these. Nila these ni des extraits substantiels de celle-cine doivent etre imprimes ou autrementreproduits sans son autorisation.In compliance with the CanadianPrivacy Act some supporting formsmay have been removed from thisthesis.Conformement a la loi canadienne sur laprotection de la vie privee, quelquesformulaires secondaires ont ete enleves decette these.While these forms may be includedin the document page count, theirremoval does not represent any lossof content from the thesis.Bien que ces formulaires aient inclus dansla pagination, il n'y aura aucun contenumanquant.1 1Canada

The undersigned recommend to the Faculty of Graduate Studies andResearch acceptance of the thesis"Solutions for Radar Pulse Deinterleaving"submitted by Denis Kutman, B.Engin partial fulfillment of the requirements for the degree ofMaster of Applied Science.Dr. Jim Wight, Thesis SupervisorDr. Huai-Jing Du, Thesis Co-supervisorDr. Qi-Jun Zhang, Chairman, Department of ElectronicsCarleton UniversityJanuary 2011n

AbstractThe fields of Electronic Warfare (EW) and Signal Intelligence (SIGINT) havediffering objectives but in many ways they complement each other. SIGINT systemsprimarily use a passive receiver for the gathering of long-term Electronic Intelligence(ELINT) and Communications Intelligence (COMINT). Algorithms that are usedwithin the ELINT field must be capable of efficiently handling large amounts ofdata at one time. Since there is no requirement for real-time information, the dataanalysis may be done offline. This thesis proposes an offline solution that is capableof deinterleaving a large number of radar pulses. The offline solution consists of athree stage procedure. First, the pulses are sorted by their interpulse parameters,and then the next two stages use the intrapulse parameters to obtain a more refinedgrouping result. Conversely to ELINT, EW systems have active and passivecomponents, and they can be used in an offensive or defensive manner. Thesesystems must be able to process information in real-time so that decisions can bemade instantaneously. This thesis will outline an online solution that is able to sortpulses in real-time as they are received. The online solution evaluates the similaritybetween pulses using their intrapulse characteristics. Both of the solutions aretested according to a simulated scenario, and they are shown to be successful atdeinterleaving the pulses in all the test cases.iii

AcknowledgementsFirst and foremost, I would like to thank my supervisors, Dr. Jim Wight and Dr.Huai-Jing Du, for their guidance and support throughout the preparation of thisthesis. It was an honour and a privilege to have the chance to work with both of you.I would also like to show my gratitude to Dr. Yifeng Zhou, Dr. SreeramanRajan and Dr. Fred Dilkes for the invaluable conversations and technical assistance.The information that you provided was crucial to the successful completion of thisthesis.Finally, I would like to thank my family and my girlfriend for their love andencouragement throughout my years of study. You helped me to maintain the focusand motivation to persevere through the difficult times.IV

Table of ContentsAcceptance of ThesisiiAbstractiiiAcknowledgementsivTable of ContentsvList of TablesviiList of FiguresviiiList of Abbreviationsix1 Introduction1.1 Motivation1.2 Objectives1.3 Organization of Thesis14562 Theory and Literature Review2.1 Radar Theory2.2 Types of Radars2.3 General Pulse Signal Model2.4 Radar Pulse Processing2.5 Pulse Deinterleaving and Clustering2.6 Scenario Definition2.7 Literature Review77911131517183 Algorithms3.1 Emitter Number Estimation Algorithm3.2 Pulse Comparator Algorithm212230v

4P r o p o s e d Solutions365 Results47667ConclusionBibliography70Appendices74A The Radar Equation75B Signal-to-Noise Variations in L F M Pulse78VI

List of Tables5.1Interpulse Parameters for Radar Systems in the Simulated Scenario .495.2Modulated Waveforms Used For Testing575.3Test Case Combinations585.4Emitter Number Estimation Test Case A595.5Emitter Number Estimation Test Case B605.6Emitter Number Estimation Test Case C615.7Pulse Comparator Test Case A635.8Pulse Comparator Test Case B645.9Pulse Comparator Test Case C65vn

List of Figures1.1Overview of Electronic Warfare and Signal Intelligence22.1Radar Transmission Diagram82.2Physical Scenario112.3Deinterleaving Diagram142.4Electronic Warfare Signal Processing Steps152.5K-Means Algorithm164.1Offline Solution374.2Stage 1 Of The Offline Solution394.3Stage 2 Of The Offline Solution414.4Stage 3 Of The Offline Solution434.5Online Solution455.1Simulated Scenario485.2Deinterleaving Using The Interpulse Parameters515.3No Modulation on the Pulse (SNR 21 dB)535.4Linear Frequency Modulation (LFM) (SNR 21 dB)545.5Frequency-Shift Keying (FSK) (SNR 21 dB)555.6Phase-Shift Keying (PSK) (SNR 21 dB)56B.l Linear Frequency Modulation (LFM) (SNR 13 dB)79B.2 Linear Frequency Modulation (LFM) (SNR 7 dB)80B.3 Linear Frequency Modulation (LFM) (SNR 1 dB)81vm

List of AbbreviationsAICAkaike Information CriteriaARAcquisition RadarCLNNCompetitive Learning Neural NetworkCOMINTCommunications IntelligenceDOADirection Of ArrivalEAElectronic AttackELINTElectronics IntelligenceEMElectromagneticEPElectronic ProtectionESElectronic SupportEWElectronic WarfareEWREarly Warning RadarFSKFrequency-Shift KeyingIFFIdentification Friend or FoeIIDIndependent and Identically DistributedIMOPIntentional Modulation On PulseLFMLinear Frequency ModulationLPILow Probability of InterceptMATLABMatrix LaboratoryMDLMinimum Description LengthMTIMoving Target IndicatorNOMODNo ModulationPDWPulse Descriptor WordsIX

PRIPulse Repetition IntervalPSKPhase-Shift KeyingPWPulse WidthRADARRadio Detection and RangingRFRadio FrequencyRWRRadar Warning ReceiverSARSynthetic Aperture RadarSEISpecific Emitter IdentificationSIGINTSignal IntelligenceSNRSignal-To-Noise RatioSOMNNSelf-Organizing Feature Map Neural NetworkSVCSupport Vector ClusteringTOATime Of ArrivalTRTracking RadarUMOPUnintentional Modulation On PulseX

Chapter 1IntroductionElectronic Warfare (EW) refers to any action taken to gain control of theElectromagnetic (EM) spectrum. The purpose of EW is to allow the user toperform active and passive EM sensing while denying the same functionality to theenemy [1]. Electronic Warfare has been a very popular field of research since theinvention of Radio Detection and Ranging (Radar) in the 1930's, prior to WorldWar II. Radar systems have been continuously evolving, increasing in complexitythroughout the decades. In order to maintain its effectiveness, EW equipment mustfollow a similar path of progression.The area of Electronic Warfare can be split into three sub-disciplines calledElectronic Support (ES), Electronic Attack (EA) and Electronic Protection(EP) [1]. EA and EP systems include any sort of electronic devices designed totrick, deceive or counter radar, sonar, or other detection platforms. The goal ofdeception can be achieved by either the use of jamming or decoys. EA and EP areactive systems and may be used to deny targeting information to an enemy in an1

2Figure 1.1: Overview of Electronic Warfare and Signal Intelligenceoffensive or defensive manner. Conversely, ES systems are typically passive, andthey are mainly used for gathering data which is subsequently used by a platformfor situational awareness [1]. For example, Radar Warning Receivers (RWRs)installed on fighter jets are designed to give immediate warning to the pilot if thereis a threat in the vicinity. The warning receiver performs all the processing anddecision-making in real-time.The Signal Intelligence (SIGINT) field is typically used in conjunction withEW equipment to obtain a more accurate picture of the type of emitters and wherethey are located in the surrounding environment. ES and SIGINT systems have alot of similarity but differ in the way that their output data is utilized. The outputof ES systems is used to take immediate action, while the output from a SIGINTreceiver is gathered over a lengthy period of time and analyzed offline. SIGINT canbe divided into Communications Intelligence (COMINT) and Electronic Intelligence

3(ELINT). COMINT is used to examine the message that is contained within asignal while ELINT is not interested in the message that is contained within theincoming signal [1]. With respect to the SIGINT field, this thesis will focusprimarily on the part that is related to ELINT.ELINT refers to the information that is gained from signals of interest asthey are intercepted [2]. ELINT data can be extremely valuable in the event of aconflict. Once the signal is identified, the ELINT receiver will then analyze it anddecide whether the source could be a potential threat [3]. Knowledge regarding thetype of source emitter and its location can provide a clearer picture of the situationin a hostile environment. The data obtained from the ELINT receiver could enableintelligent jamming of an enemy's defense network. ELINT can also be utilized instealth operations, providing the stealth aircraft with information on which areas toavoid. In addition to radar, it is possible to gather ELINT data from other sourcessuch as beacons, transponders, jammers, missile guidance, altimeters, navigationemissions, and Identification Friend or Foe (IFF) [2]. Although ELINT from othertypes of signals may be valuable, this thesis will focus on gathering informationfrom signals originating from radar systems. Unless otherwise specified, anyreferences to EW in this thesis will include the field of ELINT because of thesimilarity between the two subjects.

41.1MotivationRadar system designs are continuously being modified to reflect the newesttechnological innovations of the day. Present systems are more compact and offer awider variety of capabilities when compared with older designs. Some of the newfeatures available in the current systems include frequency agility, pulse compressionas well as other complex modulation techniques. New developments such as the LowProbability of Intercept (LPI) radars are providing significant challenges for some ofthe existing EW receivers. LPI radar has a number of features which make it veryhard to identify including low sidelobe levels, infrequent scanning, very high dutycycles and frequency hopping. This increasingly complex emitter environmentmakes it difficult for the current radar pulse sorting techniques to maintain theireffectiveness. Since the emitter threat constantly varies, the EW receiver must beable to adapt to this continuously changing environment [2].The conventional methods for sorting used the interpulse parameters toallocate pulses to certain emitters, but these methods have a number of limitations.The Radio Frequency (RF) feature would not be efficient at identifying pulses thatcome from emitters with frequency agility. The Direction of Arrival (DOA) featuremay classify pulses incorrectly if there are reflected signals arriving at the receiver.The Pulse Width (PW) may not be reliable because of multipath effects andthresholding problems relating to varying pulse amplitudes. The Pulse RepetitionInterval (PRI) feature will have trouble identifying emitters that have PRIstaggering. Apart from all these potential issues, another large problem occurs whenplatforms in the vicinity have the same radar systems with the same interpulse

5characteristics. In this scenario, the pulse sorting mechanism would be unable todifferentiate between the emitters [2].In battlefield situations, it is becoming more common to see sides usingidentical platforms or unusual, exotic emitters. The classical signal identificationtechniques which used interpulse parameters for interception and deinterleavingneed to be extended to handle the increasing complexity of some of the current andfuture radar waveforms. This extension may be completed by using the informationextracted from the intrapulse characteristics of the signal [4]. The EW receiver mustbe capable of exploring characteristics inside each pulse, such as the shape of theenvelope as well as the frequency and phase variations. All individual emitters havetheir own distinct electrical signal structure inside each of their transmitted pulses.This can be due to both intentional and unintentional modulations. Since notransmitting device is perfect, there is usually inherent ringing or other instabilitiesthat lead to unintentional modulations [5].1.2ObjectivesThe goal of this thesis is to outline possible solutions that can be used, within thefields of Electronic Warfare and Signal Intelligence, to deinterleave a set of receivedpulses. Prior to the discussion of any solutions, the general problem will beexplained, and the formal scenarios will be introduced. Then, the steps for eachsolution will be described and validated through testing and simulation to show howthey can be used to solve the problem.

61.3Organization of ThesisThe rest of this thesis is organized as follows. In Chapter 2, background informationwill be provided so that the topics discussed in this thesis are easier to comprehendfor the reader. Chapter 3 contains a detailed derivation of the two algorithms thatare essential to the proposed solutions. Chapter 4 outlines the overall offline andonline solutions in detail. In Chapter 5, the solutions are tested to show that theyare effective at performing the tasks that they are assigned. Then, Chapter 6 willsummarize the findings in this thesis and outline possible topics for future researchthat may be carried on following this thesis.

Chapter 2Theory and Literature Review2.1Radar TheoryA radar functions by radiating Electromagnetic (EM) energy and detecting the echothat is returned from reflected objects or targets. Using the fact that radar signalstravel at the speed of light, the distance of a target from the radar is found bymeasuring the time it takes for the radiated energy to travel to the target and back.The angular location or azimuth of the target can also be found using the directiveradar antenna, which typically has a narrow beamwidth. The radar system is ableto track moving targets by taking advantage of the Doppler Effect. The receivedecho signal from a moving target such as an aircraft will have a shift in thefrequency. The radar uses this shift in frequency to differentiate between theaircraft and the other stationary clutter [6].7

8Radar system designs vary depending on the objective of the user. The radarmanufacturer has control over parameters such as the power, gain, pulse width,frequency, pulse repetition interval and the pulse waveform. A derivation of theradar equation is provided in Appendix A that outlines some of the importantparameters to consider when designing a radar. Appendix A also shows how theradar equation can be applied to the EW scenario. In this case, the one-way radarequation is used for analysis [6].Figure 2.1 outlines the radar transmission cycle. The cycle starts with theradar transmitting a pulse. It then listens for echoes for a set amount of time untilit is ready to transmit the next pulse. The dead time is the amount of time it takesthe radar to transmit the pulse, and the pulse repetition interval is the amount oftime between pulse transmissions [6].TransmittedPoisePulse WidthEchoFalsemmmm*Listeni »g TimePulse R e petition I nervalFigure 2.1: Radar Transmission DiagramMpMDeadTimemmmmrnmm**

92.2Types of RadarsThere are many different types of radar systems in use today. Each has its ownpurpose, and every system has advantages and disadvantages. Militaryorganizations use radar technology in many applications including surveillance,navigation, tracking, terrain mapping, fire control and weather observation. Threecategories of radar systems will be discussed that are relevant to the simulatedscenario that is presented later in this thesis.Search R a d a r sAir search radars are sometimes called early warning radars because they areused to provide an early notification to the user that a target is approaching. Searchradars are ground-based systems, and they are used to monitor all of the 360 degreeazimuth sectors within the airspace. These radars typically have maximum rangesof between 200km and 500km. They have relatively low frequencies, long pulsedurations, and they transmit with a large amount of power. In order to improve therange resolution, most search radars use a technique called pulse compression, whichuses a chirped (linear frequency modulated) signal. This type of radar is notconsidered to be a direct threat because it is only used for the location of targets.Once the search radar acquires a target, it usually passes the information on to aweapons system for further investigation. Its high power emissions make it easy tolocate and characterize using an EW receiver [7].

10Battlefield Surveillance RadarsThere are many types of radars that may potentially be used in a battlefieldto perform the surveillance function. Some of these include Acquisition radars,Doppler radars, Synthetic Aperture Radars (SAR), and Low Probability of Intercept(LPI) radars. Acquisition radars have many similarities with the air search radarsexcept that they typically have smaller ranges to cover. A common maximum rangefor an acquisition radar is around 100km to 150km. Doppler radars can detect andlocate vehicles and personnel moving over the ground using a Moving TargetIndicator (MTI) system. Synthetic Aperture Radars can be used to map highresolution terrain using data that is combined over a period of time. LPI Radars aredesigned in a way which makes them very hard to detect by an enemy EW suite [7].Tracking RadarsTracking radars provide frequent target location updates and high accuracyposition estimates to allow the weapons system to engage the target. In order toachieve this high positioning accuracy and fast update rate, they have short pulsewidths, small pulse repetition intervals, and they use narrow pencil beams to scan aspecific part of the airspace. In many situations, an air search radar or acquisitionradar is used to initially detect the target and forwards the information to thetracking radar to monitor the target more closely [7].

112.3General Pulse Signal ModelSimilarly to [5] and [8], a general pulse signal model outlining a possible emitterdeinterleaving scenario is illustrated in Figure 2.2 below. The diagram contains Kindependent emitters surrounding the passive EW receiver. This intercept receivercollects the pulses as they arrive, interleaved in time.K Distinct EmittersEmitter 1WvtEW Receiver (passive)Emitter 2VSAA/sAA/Emitter KJ"L v-Y Yv\ r Pulses received at EW receiverFigure 2.2: Physical ScenarioTo formulate the general pulse signal model, it is assumed that the receiverreceives a total of M pulses. The mth received pulse can then be designated byxm(t;qm),where m 1, 2,., M and qm is the association parameter that associatesthe mth pulse with the kth emitter (i.e. qm k).

12The mth received pulse can be expressed as follows:xm(t; qm) Amaqm(t -rm) [ (t-rm) (t-rm)] rj(23 -Qwhere: Am initial amplitude of the mth received pulse aqm original envelope of the mth received pulse rm time delay of the mth received pulse with respect to the reference VVn initial phase of the mth received pulse uim carrier frequency of the mth received pulse J1moriginal phase of the mth received pulse vm gaussian noise with the mth received pulseThe equation above has a number of nuisance parameters including Am, r m ,tpm, and ujm. Some reports related to radar emitter classification [5] [8] [9] [10] [11]require that all of these nuisance parameters be removed through pre-processingprior to performing the classification. In [10], the amplitude variations are removedusing normalization techniques, while the phase variations are removed usingpolynomial fitting. The solutions proposed in this thesis require time alignment andcarrier frequency removal, but they do not require any pre-processing in the phaseor amplitude prior to the deinterleaving. In order to compare two pulses, they mustfirst be aligned in time (i.e. the time delay, r m , must be removed). The time delayis caused by the triggering mechanism of the receiver. Since incoming signals are

13normally corrupted by noise and may have significantly varying signal-to-noiseratios, there may be different time delays associated with the pulses. Some commonmethods of removing this time delay include aligning pulses to the point at a powerlevel 6 dB below the peak [12], using a pre-set magnitude threshold value [10] andperforming a cross-correlation between the pulses [13]. The input noise term, vm,includes the medium ambient noise, antenna thermal noise and the circuitry noisebut is typically dominated by the circuitry noise.2.4Radar Pulse ProcessingRadar pulse processing within the EW field consists of a number of intermediatesteps. The first step involves the interception and detection of pulse trains fromradar systems in the surrounding environment. Following the detection stage, thepulse parameters must be estimated. This estimation is completed by extracting theinterpulse and intrapulse parameters from each individual pulse and storing them ina vector format. The interpulse parameters can also be referred to as PulseDescriptor Words (PDWs). The classical PDWs typically include the RadioFrequency (RF), Pulse Width (PW), Time Of Arrival (TOA), Direction Of Arrival(DOA) and Pulse Repetition Interval (PRI). The intrapulse information can beextracted as a set of complex samples that represent the pulse. Since the varioussignals are interleaved when they arrive at the EW receiver, there may be pulsesfrom many different emitters, and successive pulses may not have originated fromthe same source. Therefore, after the pulse parameters are estimated, the receivercompletes a process called deinterleaving which attempts to separate the pulses into

14groups from the same emitter [14]. An example of deinterleaving is shown below inFigure 2.3.Interleaved Pulse TrainsRadar 1 Radar 2Figure 2.3: Deinterleaving DiagramFollowing this sorting, there is an attempt to identify or correlate the pulsewith a database of known emitters. This could provide an indication of whether thepulse came from a platform that could be a threat. The final step requires someaction to be performed. The action may be passive such as displaying or recordingthe result, or it may be a direct countermeasure procedure such as jamming or chaff.ES and ELINT systems rarely initiate a countermeasure action since they are usedmore for gathering data passively, while EA and EP systems are capable ofinitiating an action in an offensive or defensive manner [14]. Figure 2.4 belowillustrates the steps involved in the radar pulse processing.

15TTfTPulse e)DisplayPulse ParameterEstimationSort/Deinterleave Pulses* EAorEP Emitter IdentificationActionRecord ResultsFigure 2.4: Electronic Warfare Signal Processing Steps2.5Pulse Deinterleaving and ClusteringSimilar to the receiver block of a radar system, the EW receiver is largelystatistics-based. Once the vectors are obtained from the pulse deinterleaver, theyare used to create a statistical model of the emitters in the surrounding area. Thismodel is created using a technique called cluster analysis or clustering. Clusteranalysis is an unsupervised learning technique which attempts to find structure orcommonality within a collection of unlabeled data. Clustering involves the processof organizing objects into groups whose members are similar in some way. There area wide variety of methods that can be used for clustering a data set. Each algorithmhas its own advantages and disadvantages depending on the application where it isused [15].

16There are many clustering techniques that may be used to sort an unlabeleddata set. Some of the more common methods include K-Means and HierarchicalClustering. These algorithms are used in many real-world applications because oftheir simplicity and effectiveness. Part of the offline solution defined in this thesisuses K-Means Clustering to initially partition the data set. The K-Means algorithmis outlined below in Figure 2.5. The iterative procedure is used to find the optimalmeans by minimizing a squared-error criterion function. The resulting optimalmeans that are obtained may be accepted as the final answer, or they can be usedas starting points for more exact computations [15].Inputs:M {mx,m k } (Data set t o be clustered)n Number of clustersOutputs:C {c1,.,c„\ (Cluster centroids)d Cluster memberships (d(m ; ) m, - {l,.,n})K-means Procedure:Select random points f r o m M as the initial values for CFor each m,- G Md(rrii) a r g min distance (m;,Cj} where j l,.,nEndWhile d has changedFor each i G {l,.,n}Recompute q as the centroid of all m with d(m) iEndFor each m ; E Md(rri ) arg min distance (m,,Cj) where j l,.,nEndEndEndFigure 2.5: K-Means Algorithm

172.6Scenario DefinitionThere are a number of different scenarios that could occur in the field when an EWreceiver is deployed and operational. This thesis formally proposes two realisticscenarios that could potentially arise. These scenarios are listed below:Scenario 1: Emitters have varying interpulse parametersThis is the classical EW problem where emitter identification andclassification needs to be completed. In this case, using the various interpulseparameters such as the Radio Frequency (RF), Pulse Width (PW), Time Of Arrival(TOA), Direction Of Arrival (DOA) and Pulse Repetition Interval (PRI) should besufficient to complete this detection and sorting.Scenario 2: Emitters have common interpulse parameters andvarying intrapulse parametersThis scenario is becoming more common in the present EW environment. Itis possible to have multiple emitters from the same manufacturer or emitters withvery unusual pulse characteristics. It's clear that the conventional solution thatcould be utilized for scenario 1 would not be adequate in this situation.

182.7Literature Review-There are a number of different solutions that have been proposed for the twoscenarios described above. For the first scenario, each pulse can be described with avector of PDW attributes. Clustering algorithms would then use these vectors tosort the pulses into individual clusters. In [16], clustering is performed using acombination of Support Vector Clustering (SVC) and the K-Means algorithm. Afterthe PDW parameters are extracted from each radar pulse, the SVC method uses asmall sample of the PDW feature vectors to obtain the initial centroids that arethen used by the K-Means algorithm to classify the full data set. In [17], the pulsesare first sorted using PDWs such as the RF, DOA, and PW. Then, the second stageof sorting is done by using a difference histogram to extract the PRI from the TOAmeasurements.For the second scenario that was described in the previous section, each pulseis typically described as a vector of complex samples. In this case, the pulsedeinterleaving is completed using the intrapulse data. In [18], three unsupervisedclassifiers including Competitive Learning Neural Networks (CLNN),Self-Organizing Feature Map Neural Networks (SOMNN) and Support VectorClustering (SVC) are used to sort radar pulses based on their intrapulsecharacteristics. In [19], four different self-organizing neural networks were used forautomatic clustering of radar pulses. In [9], [10], [8], the pulse classification task wasformulated as a multivariate clustering problem, and the Minimum DescriptionLength (MDL) criteria was used to perform the cluster validation.

19Techniques have also been proposed in [11] and [13] which are able toestimate the modulations for a group of received radar pulses. In [11], acomputationally efficient algorithm is proposed that makes use of a maximumlikelihood estimator. In [13], the M-estimation technique is proposed, and it isshown to be especially effective in situations where there are difficulties encounteredin the pulse pre-processing stage.Specific Emitter Identification (SEI) is one of the newer concepts that hasbeen introduced within the field of Electronic Warfare. SEI refers to having thecapability to associate a received pulse waveform with a unique emitter. Eachemitter

The area of Electronic Warfare can be split into three sub-disciplines called Electronic Support (ES), Electronic Attack (EA) and Electronic Protection (EP) [1]. EA and EP systems include any sort of electronic devices designed to trick, deceive or counter radar, sonar, or other detection platforms. The goal of

Related Documents:

Bruksanvisning för bilstereo . Bruksanvisning for bilstereo . Instrukcja obsługi samochodowego odtwarzacza stereo . Operating Instructions for Car Stereo . 610-104 . SV . Bruksanvisning i original

SYNTHETIC APERTURE RADAR (SAR) IMAGING BASICS 1.1 Basic Principles of Radar Imaging / 2 1.2 Radar Resolution / 6 1.3 Radar Equation /10 1.4 Real Aperture Radar /11 1.5 Synthetic Aperture Radar /13 1.6 Radar Image Artifacts and Noise / 16 1.6.1 Range and Azimuth Ambi

bistatic radar geometry.27 Radar-absorbent material augments fuselage shaping by absorbing radar energy and reducing the strength of the radar echo.28 Future innova-tions may allow stealth aircraft to actively cancel radar echo by retransmitting radar energy and/or by ionizing boundary layer air around the fuselage.29 Counters to Stealth

Radar Systems Course 21 MTI 1/1/2010. IEEE New Hampshire Section IEEE AES Society. Waveforms for MTI and Pulse Doppler Processing. T. CPI NT. PRI. T. PRI. T. Time. Radar Signal For Airport Surveillance Radar. T Pulse Length 1 . μ. sec. B / 1 T Bandwidth 1 MHz. T. PRI Pulse Repetition Interval (PRI) 1 msec. f. P 1/T PRI .

10 tips och tricks för att lyckas med ert sap-projekt 20 SAPSANYTT 2/2015 De flesta projektledare känner säkert till Cobb’s paradox. Martin Cobb verkade som CIO för sekretariatet för Treasury Board of Canada 1995 då han ställde frågan

service i Norge och Finland drivs inom ramen för ett enskilt företag (NRK. 1 och Yleisradio), fin ns det i Sverige tre: Ett för tv (Sveriges Television , SVT ), ett för radio (Sveriges Radio , SR ) och ett för utbildnings program (Sveriges Utbildningsradio, UR, vilket till följd av sin begränsade storlek inte återfinns bland de 25 största

Hotell För hotell anges de tre klasserna A/B, C och D. Det betyder att den "normala" standarden C är acceptabel men att motiven för en högre standard är starka. Ljudklass C motsvarar de tidigare normkraven för hotell, ljudklass A/B motsvarar kraven för moderna hotell med hög standard och ljudklass D kan användas vid

influence of ideological values on the policies and practices of America’s criminal justice systems. Recently, however, a trend toward critical analysis of the behavior of police, courts, and corrections has emerged that focuses exclusively on ideology as the analytical tool of choice. For example, Barlow (2000), and Bohm and Haley (2001) include extensive discussion of the influence of .