False detections are the consequence of unwanted signals in the radar return. These unwanted signals can be the result of external interference or radar generated clutter. External interference is independent of radar operation and includes noises with different origins and characteristics such as co-channel interference, man-made noises, and impulsive noises, for example. In one phased array radar example, a High Frequency Surface Wave Radar (HFSWR), the radar operates in a frequency band that is shared with many other users so that the phased array radar receives co-channel interference from nearby and far ranges. The external interference has directionality since it originates from spatially correlated sources. However, due to multiple reflections in the non-uniform layers of the Ionosphere, the direction of arrival of the interference can appear to be coming from distributed sources. Radar operation at times of high levels of interference can result in an excessive number of detections that can lead to the generation of false tracks, missed tracks and track seduction.
In one aspect, a method to identify and remove a false detection includes receiving a detection from a constant false alarm rate (CFAR) processor, performing a first similarity measure on adjacent coherent integration time values (CITs) corresponding to the detection, performing a second similarity measure on neighbor CITs corresponding to the detection, determining if at least one of the first or second similarity measure is below a threshold and discarding the detection if at least one of the first or second similarity measures is below the threshold.
In another aspect, an apparatus includes electronic hardware circuitry to identify and remove a false detection. The circuitry is configured to receive a detection from a constant false alarm rate processor (CFAR), perform a first similarity measure on adjacent coherent integration time values (CITs) corresponding to the detection, perform a second similarity measure on neighbor (CITs corresponding to the detection, determine if at least one of the first or second similarity measures is below a threshold and discard the detection if at least one of the first or second similarity measure is below the threshold.
In a further aspect, an article includes a non-transitory medium that stores executable instructions to identify and remove a false detection. The instructions cause a machine to receive a detection from a constant false alarm rate processor (CFAR), perform a first similarity measure on adjacent coherent integration time values (CITs) corresponding to the detection, perform a second similarity measure on neighbor CITs corresponding to the detection, determine if at least one of the first or second similarity measures is below a threshold and discard the detection if at least one of the first or second similarity measure is below the threshold.
Described herein are techniques that identify and remove false detections in a radar system. In particular, the techniques described herein remove false detections prior to being sent to a tracker by removing false detections originating from an output of a constant false alarm rate (CFAR) processor prior to a tracker. The techniques are based on a premise that changes in the beam patterns of real targets as function of time and range are slower than changes in the beam patterns of interference and clutter. Therefore, a high degree of correlation indicates that the radar return is from a point target such as a ship, aircraft or natural hazard (e.g., iceberg) for example, and these detections are forwarded to the tracker. A poor degree of correlation indicates that the detection originates from more distributed targets such as noise, clutter and interference and these detections are rejected. The techniques described herein may be used in any radar system.
A radar localizes a target in both range and azimuth (beam). In a High Frequency Surface Wave Radar (HFSWR) returns are received in the form of consecutive updates or coherent integration time values (CITs). Each CIT is the result of accumulation of thousands of radar pulse returns. For example, a typical ship mode CIT is the result of accumulation of 45,000 pulses with a span time of 3 minutes and a pulse repetition frequency (PRF) of 250 Hz. When the beam patterns of a target are observed at two consecutive CITs, the patterns are likely less than a perfect match depending upon the speed of the target. However, if the time difference between two consecutive CITs is reduced to 30 to 50 seconds and assuming a maximum vessel speed in the range of 50 km/h (˜834 m/minute or 14 m per second), then the ship target's movement is much less than 1.5 km range resolution/accuracy of the radar. This will make the target look stationary within two consecutive close CITs. For example, when plotting the normalized beam patterns of the target in consecutive close CITs, the beam patterns of the consecutive close CITs appear to match very well. As will be described further herein, a consecutive close CITs differ by a small time difference.
The range accuracy is higher than the range resolution in HFSWR. Therefore, a target appears in more than one range cells. For give a CIT, it can be observed that the normalized beam patterns of a target are very similar at ranges immediately above or below a range of a target.
Referring to
Referring to
The detection validator 16′ processes the first set of data as follows. Pulsed data is received through the connection 24 and processed by the Doppler processor 32 and by the beam generator 36 to form the beams. From the beam generator 36, the beam data is provided to the EIC processor 36 which removes known external interference.
The EIC processor 36 provides data to the CFAR processor 46 which based on a threshold determines which returns are detections. The output from the EIC processor 36 and the CFAR processor 46 is provided to the beam pattern matching tester 56.
The detection validator 16′ process the second set of data as follows. After the close CIT generator 52 generates the close CIT data, the close CIT data is provided to the Doppler processor 32 and to the beam generator 36. After the beam generator 36, the data derived from the close CIT data is provided to the beam pattern matching tester 56.
Using the detections provided by the CFAR processor 46, the CIT data from the EIC processor 42 derived from the first set of data and the close CIT data provided by the beam generator 36 derived from the second set of data, the beam pattern matching tester 56 is able to determine which detections are false and discards them and which detections are valid and sends them on to the plot extraction 18 through the connection 26.
Referring to
Process 300 cancels outs any external interference from the beam data (312). For example, the EIC processor 42 cancels out narrow band co-channel interference such as that generated by other users of the spectrum (e.g., communication users).
process 300 performs CFAR processing on the beam data to provide detections (318). For example, the CFAR processor 46 determines, based on a threshold, which of the returns are detections.
Process 300 generates close CITs from the pulse data (322), performs Doppler processing on the close CITs (326) and generates beams from the close CITs (332). For example, pulse data is need by the close CIT generator to generate close CITs. The Doppler processor 32 performs the Doppler processing on the close CITs and the beam generator 36 forms the beams.
Process 300 performs a beam matching test (340) to identify false detections and remove them thereby providing detections that are validated. In one example, the beam matching tester 52 determines if at least one of a first or a second similarity result is below a threshold value and discards the detection. In another example, each similarity measure result is compared to a respective threshold value. If any of the similarity measure results are below their respective threshold the detection is discarded.
The technique described herein allow for the detections of small targets or those targets not previously picked up by CFAR processor 46 due to being close to clutter regions. For example, the techniques described herein significantly reduce the number of false detections which in turn reduce the probability of a false alarm. This allows the detection threshold of the CFAR processor 46 to be set lower to maximize the detection range of small targets without swamping the tracker 22 with a high level of false alarms.
Referring to
Process 400 obtains beam patterns for neighbor CITs (422) and performs similarity measures (432). For example, beam patterns for neighboring cells at time T are obtained and a similarity measure is performed amongst the neighbor beam patterns at time T, beam patterns for neighboring cells at time T−dt are obtained and a similarity measure is performed amongst the neighbor beam patterns at time T−dt, and beam patterns for neighboring cells at time T+dt are obtained and a similarity measure is performed amongst the neighbor beam patterns at T+dt.
Process 400 determines if the detection is valid (436). For example, if any one of the similarity measures is below a predetermined threshold value, the detection is rejected.
If the detection is valid, process 400 provides the detection to the plot extractor 18 (440). If the detection is not valid, process 400 discards the detection (442).
Referring to
The processes described herein (e.g., processes 300 and 400) are not limited to use with the hardware and software of
The system may be implemented, at least in part, via a computer program product, (e.g., in a non-transitory machine-readable storage medium), for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers)). Each such program may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system. However, the programs may be implemented in assembly or machine language. The language may be a compiled or an interpreted language and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program may be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network. A computer program may be stored on a non-transitory machine-readable medium that is readable by a general or special purpose programmable computer for configuring and operating the computer when the non-transitory machine-readable medium is read by the computer to perform the processes described herein. For example, the processes described herein may also be implemented as a non-transitory machine-readable storage medium, configured with a computer program, where upon execution, instructions in the computer program cause the computer to operate in accordance with the processes. A non-transitory machine-readable medium may include but is not limited to a hard drive, compact disc, flash memory, non-volatile memory, volatile memory, magnetic diskette and so forth but does not include a transitory signal per se.
The processes described herein are not limited to the specific examples described. For example, the processes 300 and 400 are not limited to the specific processing order of
The processing blocks (for example, in the processes 300 and 400) associated with implementing the system may be performed by one or more programmable processors executing one or more computer programs to perform the functions of the system. All or part of the system may be implemented as, special purpose logic circuitry (e.g., and FPGA (field-programmable gate array) and/or an ASIC (application-specific integrated circuit)). All or part of the system may be implemented using electronic hardware circuitry that include electronic devices such as, for example, at least one of a processor, a memory, programmable logic devices or logic gates.
Elements of different embodiments described herein may be combined to form other embodiments not specifically set forth above. Other embodiments not specifically described herein are also within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
3603998 | Kassel | Sep 1971 | A |
3618087 | Smith et al. | Nov 1971 | A |
3701989 | Calhoon, Sr. et al. | Oct 1972 | A |
4170774 | Schaefer | Oct 1979 | A |
4404561 | Mulder et al. | Sep 1983 | A |
4649388 | Atlas | Mar 1987 | A |
4649390 | Andrews et al. | Mar 1987 | A |
RE33152 | Atlas | Jan 1990 | E |
4897664 | Killackey et al. | Jan 1990 | A |
4961075 | Ward | Oct 1990 | A |
5093662 | Weber | Mar 1992 | A |
5202691 | Hicks | Apr 1993 | A |
5374932 | Wyschogrod et al. | Dec 1994 | A |
5414643 | Blackman et al. | May 1995 | A |
5457462 | Mitsumoto et al. | Oct 1995 | A |
5568151 | Merritt | Oct 1996 | A |
5648782 | Albo et al. | Jul 1997 | A |
5729465 | Barbaresco | Mar 1998 | A |
5784403 | Scott | Jul 1998 | A |
5786788 | Schober et al. | Jul 1998 | A |
5901059 | Tao et al. | May 1999 | A |
5909189 | Blackman et al. | Jun 1999 | A |
5982320 | Simpson et al. | Nov 1999 | A |
6130638 | Winter et al. | Oct 2000 | A |
6243037 | Pulford et al. | Jun 2001 | B1 |
6260759 | Nguyen et al. | Jul 2001 | B1 |
6278401 | Wigren | Aug 2001 | B1 |
6292136 | Egnell | Sep 2001 | B1 |
6363107 | Scott | Mar 2002 | B1 |
6377204 | Wurman et al. | Apr 2002 | B1 |
6420997 | Cong | Jul 2002 | B1 |
6567037 | Fung et al. | May 2003 | B1 |
6618324 | Lane | Sep 2003 | B1 |
6704692 | Banerjee et al. | Mar 2004 | B1 |
6717545 | Dizaji et al. | Apr 2004 | B2 |
6771209 | Long | Aug 2004 | B1 |
6819285 | Stockman et al. | Nov 2004 | B1 |
6867731 | Dizaji et al. | Mar 2005 | B2 |
6888493 | Driessen et al. | May 2005 | B2 |
6993460 | Beadle et al. | Jan 2006 | B2 |
7026979 | Khosla | Apr 2006 | B2 |
7030809 | McCabe et al. | Apr 2006 | B2 |
7095358 | Krikorian et al. | Aug 2006 | B2 |
7193557 | Kovacich et al. | Mar 2007 | B1 |
7218270 | Tamburino | May 2007 | B1 |
7333052 | Maskell | Feb 2008 | B2 |
7499571 | Han et al. | Mar 2009 | B1 |
7626535 | Ding et al. | Dec 2009 | B2 |
20030174088 | Dizaji et al. | Sep 2003 | A1 |
20030210179 | Dizaji et al. | Nov 2003 | A1 |
20080111730 | Ding et al. | May 2008 | A1 |
20080129582 | Hsieh et al. | Jun 2008 | A1 |
20090201195 | Gazelle et al. | Aug 2009 | A1 |
20130088380 | Isoda | Apr 2013 | A1 |
20130127655 | Kishigami et al. | May 2013 | A1 |
20130201054 | Wang et al. | Aug 2013 | A1 |
20140035776 | Sochen et al. | Feb 2014 | A1 |
20140176361 | Dizaji et al. | Jun 2014 | A1 |
Number | Date | Country |
---|---|---|
0 132 232 | Jan 1985 | EP |
2009250616 | Oct 2009 | JP |
WO 9821603 | May 1998 | WO |
WO 0030264 | May 2000 | WO |
WO 2006035041 | Apr 2006 | WO |
Entry |
---|
Li, Y.-C.; Zhang, L.; Liu, B.-C.; Quan, Y.-H.; Xing, M.-D.; Bao, Z., “Stepped-frequency inverse synthetic aperture radar imaging based on adjacent pulse correlation integration and coherent processing,” Signal Processing, IET , vol. 5, No. 7, pp. 632,642, Oct. 2011. |
U.S. Appl. No. 10/384,203, filed Mar. 7, 2003, Dizaji, et al. |
U.S. Appl. No. 11/756,913, filed Jun. 1, 2007, Ding et al. |
U.S. Appl. No. 11/760,188, filed Jun. 8, 2007, Hubbard et al. |
U.S. Appl. No. 13/543,989, filed Jul. 9, 2012, Anderson et al. |
U.S. Appl. No. 60/363,570, filed Mar. 13, 2002, Dizaji et al. |
U.S. Appl. No. 60/365,152, filed Mar. 19, 2002, Dizaji et al. |
U.S. Appl. No. 60/857,771, filed Nov. 9, 2006, Ding et al. |
“Alaska Wind Turbine Study—Phase 2”, Raytheon document, Mar. 2006, 29 pages. |
“Feasibility of Mitigating the Effects of Windfarms on Primary Radar”, ETSU W/14/00623/REP, DTI PBU URN No. 03/976; Contractor, Alenia Marconi Systems Limited, Prepared by MM. Butler, D.A. Johnson, First Published in Jun. 2003, 208 pages. |
“Feasibility of Mitigating the Effects of Windfarms on Primary Radar”, Project Summary W/14/00623, Jun. 2003, 4 pages. |
“The Effects of Wind Turbine Farms on ATC Radar”, Open Report, AWC/WAD/72/665/TRIALS, May 10, 2005, 44 pages. |
“Wind Turbines and Radar: Operational Experience and Mitigation Measures”, Report to a consortium of wind energy companies, Dec. 2001, Spaven Consulting 2001, 39 pages. |
Bar-Shalom et al., Multitarget-Multisensor Tracking: Principles and Techniques, YBS Publishing, © 1995, 623 pages. |
Bar-Shalom et al.; “Automatic Track Formation in Clutter With a Recursive Algorithm”, Decision and Control, 1989, Proceedings of the 28th IEEE Conference on Dec. 13-15, 1989, pp. 1402-1408, vol. 2. |
Bertsekas, The Auction Algorithm 2-D Assignment, Linear Network Optimization, Algorithms and Codes, MIT Press, Cambridge, Massachusetts, USA, © 1991. |
Cai et al.; “EM-ML Algorithm for Track Initialization using Possibly Noninformative Data;” IEEE Transactions on Aerospace and Electronic Systems; vol. 41, No. 3, Jul. 2005; pp. 1030-1048. |
Ding et al.: “Track Quality Based Multitarget Tracking Algorithm;” slides presented at SPIE Conference on Signal Small Targets, Orlando, FL; Apr. 19, 2006; 17 pages. |
Li et al.; “Target Perceivability and Its Applications”, Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], vol. 49, Issue 11, Nov. 2001, pp. 2588-2604. |
PCT International Search Report, PCT/US03/06959, date of mailing Sep. 12, 2003, 3 pages. |
Report to the Congressional Defense Committees, “The effect on Windmill Farms on Military Readiness”, Office of the Director of Defense Research and Engineering, Jan. 2006, 62 pages. |
Ristic; “A Comparison of MHT and 2D Assignment Algorithm for Tracking with an Airborne Pulse Doppler Radar;” 5th Int'l Symposium on Signal Processing and its Applications; ISSPA '99, Brisbane, Australia; Aug. 22-25, 1999, 4 pages. |
Sinha et al.; “Track Quality Based Multitarget Tracking Algorithm;” SPIE Conference on Signal and Data Processing of Small Targets (#6236-08), Orlando, FL; Apr. 2006; 12 pages. |
Yeom et al., Track Segment Association, Fine-Step IMM and Initialization with Doppler for Improved Track Performance, IEEE Trans. on Aerospace and Electronic Systems, vol. 40, No. 1, pp. 293-309, Jan. 2004. |
Number | Date | Country | |
---|---|---|---|
20140176361 A1 | Jun 2014 | US |