SlideShare a Scribd company logo
1 of 3
Download to read offline
M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125
www.ijera.com 123 | P a g e
Neural Network Algorithm for Radar Signal Recognition
Mussab Elamien Abd Elmaggeed1
, Abdelrasoul Jabar Alzubaidi2
,
1
Academy of Sciences (SAS)- Khartoum - Sudan
2
Sudan University of science and technology- Engineering Collage-School of electronics- Khartoum- Sudan.
Abstract
Nowadays, the traditional recognition method could not match the development of radar signals. In this paper,
based on fractal theory and Neural Network, a new radar signal recognition algorithm is presented. The relevant
point is extracted as the input of neutral network, and then it will recognize and classify the signals. Simulation
results show that, this algorithm has a distinguish effect on classification under the condition of low SNR.
Keywords: Signal Recognition; Fractal Theory; Neural Network
I. INTRODUCTION
Radar signal recognition based on traditional feature
parameters would not afford the request, and a much
more careful and effective feature is needed for
recognition.
Fractal theory has been widely used in the fields of
seismic wave detection and image processing, which
can describe the complex and irregular degree of
signals. Hausdorff Dimension is a basic fractal
dimension in the theory, however, it brings out
difficulties in the calculation. Relevant dimension can
calculate the relevant of different sample points of
signals’ internal . It is able to extract the character of
radar signals much more accurately. Therefore, in
this paper, the relevant dimension feature of radar
signals has been extracted and Neutral Network is
used to classify the modulation type of radar signals.
[2 ,3 ,4]
II. NEURAL NETWORKS
Neural networks are composed of simple elements
operating in parallel. These elements are inspired by
biological nervous systems. As in nature, the network
function is determined largely by the connections
between elements. We can train a neural network to
perform a particular function by adjusting the values
of the connections (weights) between elements.
Commonly neural networks are adjusted, or trained,
so that a particular input leads to a specific target
output. The network is adjusted, based on a
comparison of the output and the target, until the
network output matches the target. Typically many
such input/target pairs are used to train a network.. A
Matlab package is used for accomplishing the neural
network algorithm.
Neural networks have been trained to perform
complex functions in various fields of application
including pattern recognition, identification,
classification, speech, vision and control systems.
Today neural networks can be trained to solve
problems that are difficult for conventional
computers or human beings. Throughout the toolbox
emphasis is placed on neural network paradigms that
build up to or are themselves used in engineering,
financial and other practical applications. The
supervised training methods are commonly used, but
other networks can be obtained from unsupervised
training techniques or from direct design methods.
Unsupervised networks can be used, for instance, to
identify groups of data. We do not view the Neural
Network Toolbox is simply a summary of established
procedures that are known to work well.
The computer Matlab program gets the radar signals
as input data. The data get processed in order to
obtain the recognition .
III. III . METHODOLOGY
The poor self-adaption of traditional classifier could
hardly satisfy the request of recognition effect even
in the complex circumstance. The Neutral Network
gives us a method of classifier design.
The process of Neutral Network can be summarized
as below:
Suppose the input pattern vector as:
………(1)
Where ; m = learning model component; n = input
layer unit number.
The expected output in response to the input pattern
is:
……………..(2)
q = output layer unit number.
We calculate the input of middle layer units:
REVIEW ARTICLE OPEN ACCESS
M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125
www.ijera.com 124 | P a g e
…………..(3)
Where ; ωij = connection weight between input
layer and middle layer;
θj = threshold of middle layer unit;
p = number of middle layer units.
Taking Sj as function (Sigmoid function), we
calculate the output of every unit in middle layer.
…...….(4)
Where ; bj = motivate value of the unit in the
middle layer.
In the same way, we could get the input and output of
every unit in the output layer
……..……….(5)
………...(6)
Where ; vjt = connection weight between middle
and output layer .
Yt = unit threshold of output layer.
Neutral Network does excellent in pattern
recognition and self-adapt to the environmental
change, and what is more, it can handle complex non-
linear recognition problem well. It is always used in
the design of signal classifier which benefit from the
stability.
IV. RESULTS
The neutral net is trained for recognition. The
recognition rate is as shown in figure (1). Here we
take four kinds of radar signals which are FSK, PSK,
LFM and CSF, extract their relevant dimension
characters.
For the four kinds of radar signals, a 10 samples
were extracted and 5 samples were taken as training
samples and the else as testing samples. Then we got
20 training and 20 testing samples as input of neutral
network. The input layer of neutral network has 4
units which are accidently to be the number of output
layers, and units of hiding layer are set to be 3. The
result in figure (1) suggests that we have got a better
recognition rate when SNR is larger than (-5db), and
even a perfect 100% recognition rate. So, it has been
testified that this radar signal recognition algorithm
has got a good effect on classification based on
relevance curve feature and NNs.
Figure (1). The recognition rate of radar signals in different SNR
M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125
www.ijera.com 125 | P a g e
The radar signals are used as an input . The
output from the neural network is the radar signal
recognition., Training the neural network is
performed by the Matlab package.
The number of epochs assumed is equal 40 as shown
in equation (7).
Net.trainParam.epochs = 40 …………….(7)
Training is performed by equation (8).
[net.tr] = train [net , p , t ] …………………(8)
Where ; p = input , t = target
V. CONCLSION
This paper has been exhibiting a radar
recognition algorithm based on relevance feature and
neutral network. It adopts a concept to design a
system that acts as a platform to feed radar signals to
the neural network and use its output for signal
recognition . Since the relevant feature extracted has
a poor linear character, the paper gave out a new
method to regard the points of relevance curves as
feature vectors which are the input of neutral
network. Simulation analysis shows that the method
has got a high recognition effect, and a high
recognition rate when SNR is larger than (-5db).
There are a variety of kinds of design and
learning techniques that enrich the choices that a user
can make.. The system design is dynamic and further
development and modification can be done .
REFERANCES
[1.] Yu Shi, Xian-Da Zhang. “A Gabor atom
network for signal classification with
application in radar target recognition”,
Signal Processing, vol. 49, no. 12, pp.2994-
3004(2001)
[2.] Xiong Ying, Liu Min, Tang Bin, etal.
Feature-Extracting Method for Radar
Compound Jamming Signal Based on Box
Dimension and L-Z Complexity [J]. vol.
23(6), pp:663-667.Journal of Data
Acquisition and Processing(2008)
[3.] Guo Tie-jun, Guo Shuang-bing, Xiao Xian-
ci. Fractal characteristics of modulation
signals[J]. Science in China(Series E), vol.
31(6), pp:508-513 (2001)
[4.] Ghate, V.N., Dudul, S.V.. “Cascade Neural-
Network-Based Fault Classifier for Three-
Phase Induction Motor” Industrial
Electronics, vol. 58, no. 5, pp. 1555-
1563(2011).
[5.] MICHAEL I. JORDAN,Massachusetts
Institute of Technology ,CHRISTOPHER
M. BISHOP,"Neural Networks" , Aston
Universit ,1996, CRC Press

More Related Content

What's hot

Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 
IRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET Journal
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Publishing House
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing anita maharjan
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET Journal
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesIRJET Journal
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 

What's hot (20)

Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
IRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A Survey
 
E44082429
E44082429E44082429
E44082429
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
IRJET - Study on the Effects of Increase in the Depth of the Feature Extracto...
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
F04503057062
F04503057062F04503057062
F04503057062
 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of Trusses
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 

Viewers also liked

Real estate policy
Real estate policyReal estate policy
Real estate policyYichuang Lin
 
published article on parkinsonism
published article on parkinsonismpublished article on parkinsonism
published article on parkinsonismDr jithesh madhavan
 
美善的靈魂
美善的靈魂美善的靈魂
美善的靈魂Jaing Lai
 
Iblc Congres 2009 Presentatie Paul Bessems
Iblc Congres 2009 Presentatie  Paul  BessemsIblc Congres 2009 Presentatie  Paul  Bessems
Iblc Congres 2009 Presentatie Paul BessemsIBLC
 
Taller procesar la informacion 1
Taller procesar la informacion 1Taller procesar la informacion 1
Taller procesar la informacion 1LILIANAVILLAMIL
 
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...Jim Casale
 
Ficha 10 - Formación Humana 2016
Ficha 10 - Formación Humana 2016Ficha 10 - Formación Humana 2016
Ficha 10 - Formación Humana 2016Logos Academy
 
Cuadrilaterals
CuadrilateralsCuadrilaterals
Cuadrilateralsrosasadiez
 
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 20175. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017Roland Schegg
 
Урок 1
Урок 1Урок 1
Урок 1shumak
 
Venture technologies (тизер, 2011)
Venture technologies (тизер, 2011)Venture technologies (тизер, 2011)
Venture technologies (тизер, 2011)Maria Anikina
 

Viewers also liked (17)

Talent Shortage Survey 2015 - ManpowerGroup
Talent Shortage Survey 2015 - ManpowerGroupTalent Shortage Survey 2015 - ManpowerGroup
Talent Shortage Survey 2015 - ManpowerGroup
 
Real estate policy
Real estate policyReal estate policy
Real estate policy
 
Kerlap Kerlip 104
Kerlap Kerlip 104Kerlap Kerlip 104
Kerlap Kerlip 104
 
published article on parkinsonism
published article on parkinsonismpublished article on parkinsonism
published article on parkinsonism
 
美善的靈魂
美善的靈魂美善的靈魂
美善的靈魂
 
Kore Presentation
Kore PresentationKore Presentation
Kore Presentation
 
Iblc Congres 2009 Presentatie Paul Bessems
Iblc Congres 2009 Presentatie  Paul  BessemsIblc Congres 2009 Presentatie  Paul  Bessems
Iblc Congres 2009 Presentatie Paul Bessems
 
Taller procesar la informacion 1
Taller procesar la informacion 1Taller procesar la informacion 1
Taller procesar la informacion 1
 
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...
2013 Hall of Fame Inductee: Product Strategy – Jim Casale, ACI Worldwide (For...
 
Ficha 10 - Formación Humana 2016
Ficha 10 - Formación Humana 2016Ficha 10 - Formación Humana 2016
Ficha 10 - Formación Humana 2016
 
Cuadrilaterals
CuadrilateralsCuadrilaterals
Cuadrilaterals
 
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 20175. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017
5. Public-Forum / Fokusthema 2017: Mobilität - 2. Mai 2017
 
Урок 1
Урок 1Урок 1
Урок 1
 
Code C.R.A.P.
Code C.R.A.P.Code C.R.A.P.
Code C.R.A.P.
 
El avion
El avionEl avion
El avion
 
Fff
FffFff
Fff
 
Venture technologies (тизер, 2011)
Venture technologies (тизер, 2011)Venture technologies (тизер, 2011)
Venture technologies (тизер, 2011)
 

Similar to Neural Network Algorithm for Radar Signal Recognition

Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkIRJET Journal
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...IJECEIAES
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMcscpconf
 
H030102052055
H030102052055H030102052055
H030102052055theijes
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptxNambiraju
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkAnbarasu S
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...IJCNCJournal
 

Similar to Neural Network Algorithm for Radar Signal Recognition (20)

I045075155
I045075155I045075155
I045075155
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Al...
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
 
H030102052055
H030102052055H030102052055
H030102052055
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
1st review android malware.pptx
1st review  android malware.pptx1st review  android malware.pptx
1st review android malware.pptx
 
Black hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh networkBlack hole and greyhole attack in wireless mesh network
Black hole and greyhole attack in wireless mesh network
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Neural Network Algorithm for Radar Signal Recognition

  • 1. M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125 www.ijera.com 123 | P a g e Neural Network Algorithm for Radar Signal Recognition Mussab Elamien Abd Elmaggeed1 , Abdelrasoul Jabar Alzubaidi2 , 1 Academy of Sciences (SAS)- Khartoum - Sudan 2 Sudan University of science and technology- Engineering Collage-School of electronics- Khartoum- Sudan. Abstract Nowadays, the traditional recognition method could not match the development of radar signals. In this paper, based on fractal theory and Neural Network, a new radar signal recognition algorithm is presented. The relevant point is extracted as the input of neutral network, and then it will recognize and classify the signals. Simulation results show that, this algorithm has a distinguish effect on classification under the condition of low SNR. Keywords: Signal Recognition; Fractal Theory; Neural Network I. INTRODUCTION Radar signal recognition based on traditional feature parameters would not afford the request, and a much more careful and effective feature is needed for recognition. Fractal theory has been widely used in the fields of seismic wave detection and image processing, which can describe the complex and irregular degree of signals. Hausdorff Dimension is a basic fractal dimension in the theory, however, it brings out difficulties in the calculation. Relevant dimension can calculate the relevant of different sample points of signals’ internal . It is able to extract the character of radar signals much more accurately. Therefore, in this paper, the relevant dimension feature of radar signals has been extracted and Neutral Network is used to classify the modulation type of radar signals. [2 ,3 ,4] II. NEURAL NETWORKS Neural networks are composed of simple elements operating in parallel. These elements are inspired by biological nervous systems. As in nature, the network function is determined largely by the connections between elements. We can train a neural network to perform a particular function by adjusting the values of the connections (weights) between elements. Commonly neural networks are adjusted, or trained, so that a particular input leads to a specific target output. The network is adjusted, based on a comparison of the output and the target, until the network output matches the target. Typically many such input/target pairs are used to train a network.. A Matlab package is used for accomplishing the neural network algorithm. Neural networks have been trained to perform complex functions in various fields of application including pattern recognition, identification, classification, speech, vision and control systems. Today neural networks can be trained to solve problems that are difficult for conventional computers or human beings. Throughout the toolbox emphasis is placed on neural network paradigms that build up to or are themselves used in engineering, financial and other practical applications. The supervised training methods are commonly used, but other networks can be obtained from unsupervised training techniques or from direct design methods. Unsupervised networks can be used, for instance, to identify groups of data. We do not view the Neural Network Toolbox is simply a summary of established procedures that are known to work well. The computer Matlab program gets the radar signals as input data. The data get processed in order to obtain the recognition . III. III . METHODOLOGY The poor self-adaption of traditional classifier could hardly satisfy the request of recognition effect even in the complex circumstance. The Neutral Network gives us a method of classifier design. The process of Neutral Network can be summarized as below: Suppose the input pattern vector as: ………(1) Where ; m = learning model component; n = input layer unit number. The expected output in response to the input pattern is: ……………..(2) q = output layer unit number. We calculate the input of middle layer units: REVIEW ARTICLE OPEN ACCESS
  • 2. M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125 www.ijera.com 124 | P a g e …………..(3) Where ; ωij = connection weight between input layer and middle layer; θj = threshold of middle layer unit; p = number of middle layer units. Taking Sj as function (Sigmoid function), we calculate the output of every unit in middle layer. …...….(4) Where ; bj = motivate value of the unit in the middle layer. In the same way, we could get the input and output of every unit in the output layer ……..……….(5) ………...(6) Where ; vjt = connection weight between middle and output layer . Yt = unit threshold of output layer. Neutral Network does excellent in pattern recognition and self-adapt to the environmental change, and what is more, it can handle complex non- linear recognition problem well. It is always used in the design of signal classifier which benefit from the stability. IV. RESULTS The neutral net is trained for recognition. The recognition rate is as shown in figure (1). Here we take four kinds of radar signals which are FSK, PSK, LFM and CSF, extract their relevant dimension characters. For the four kinds of radar signals, a 10 samples were extracted and 5 samples were taken as training samples and the else as testing samples. Then we got 20 training and 20 testing samples as input of neutral network. The input layer of neutral network has 4 units which are accidently to be the number of output layers, and units of hiding layer are set to be 3. The result in figure (1) suggests that we have got a better recognition rate when SNR is larger than (-5db), and even a perfect 100% recognition rate. So, it has been testified that this radar signal recognition algorithm has got a good effect on classification based on relevance curve feature and NNs. Figure (1). The recognition rate of radar signals in different SNR
  • 3. M Elamien Abd Elmaggeed Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 2, ( Part -2) February 2015, pp.123-125 www.ijera.com 125 | P a g e The radar signals are used as an input . The output from the neural network is the radar signal recognition., Training the neural network is performed by the Matlab package. The number of epochs assumed is equal 40 as shown in equation (7). Net.trainParam.epochs = 40 …………….(7) Training is performed by equation (8). [net.tr] = train [net , p , t ] …………………(8) Where ; p = input , t = target V. CONCLSION This paper has been exhibiting a radar recognition algorithm based on relevance feature and neutral network. It adopts a concept to design a system that acts as a platform to feed radar signals to the neural network and use its output for signal recognition . Since the relevant feature extracted has a poor linear character, the paper gave out a new method to regard the points of relevance curves as feature vectors which are the input of neutral network. Simulation analysis shows that the method has got a high recognition effect, and a high recognition rate when SNR is larger than (-5db). There are a variety of kinds of design and learning techniques that enrich the choices that a user can make.. The system design is dynamic and further development and modification can be done . REFERANCES [1.] Yu Shi, Xian-Da Zhang. “A Gabor atom network for signal classification with application in radar target recognition”, Signal Processing, vol. 49, no. 12, pp.2994- 3004(2001) [2.] Xiong Ying, Liu Min, Tang Bin, etal. Feature-Extracting Method for Radar Compound Jamming Signal Based on Box Dimension and L-Z Complexity [J]. vol. 23(6), pp:663-667.Journal of Data Acquisition and Processing(2008) [3.] Guo Tie-jun, Guo Shuang-bing, Xiao Xian- ci. Fractal characteristics of modulation signals[J]. Science in China(Series E), vol. 31(6), pp:508-513 (2001) [4.] Ghate, V.N., Dudul, S.V.. “Cascade Neural- Network-Based Fault Classifier for Three- Phase Induction Motor” Industrial Electronics, vol. 58, no. 5, pp. 1555- 1563(2011). [5.] MICHAEL I. JORDAN,Massachusetts Institute of Technology ,CHRISTOPHER M. BISHOP,"Neural Networks" , Aston Universit ,1996, CRC Press