SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.51-63
51
MATLAB Implementation of Scan-to-Scan Discriminator for the
Detection of Marine Targets
1
Anala M, 2
Fathima Jabeen, 3
Vikram Thakur
1
Assistant Professor, Department of ECE, KSSEM, Bangalore, India.
2
Professor and HOD, Department of ECE, KSSEM, Bangalore, India.
3
Scientist, LRDE, DRDO, Bangalore, India.
Abstract:- For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The proposed architectures have been designed using MATLAB R2007b.
Keywords:- Radar, scan-to-scan discriminator, sea clutter, fixed threshold, clutter map, CA-CFAR.
I. INTRODUCTION
Radar detection performance is often deteriorated due to the presence of sea clutter. Clutter is the term
used to denote unwanted echoes from the natural environment [14]. It implies that these unwanted echoes
“clutter” the radar and make difficult the detection of wanted targets. Clutter includes echoes from land, sea,
weather (particularly rain), birds and insects. Large clutter echoes can mask echoes form desired targets and
limit radar capability [1]. In addition to any possible clutter there will also be always noise. The total signal
competing with the target return is the clutter plus noise. In practice there is often either no clutter or clutter
dominates or the noise can be ignored. In the first case the radar is said to be Noise limited, in the second it is
Clutter Limited.
Sea clutter limits the performance of radar. For sea clutter, the k-distribution is said to be made of two
components. There is a fast varying component, with a correlation time of the order of 5 to 10ms. The fast
component can be decorrelated pulse to pulse. It is sometimes called the “speckle component” and its statistics
can be represented by Rayleigh distribution [7]. The other component has a longer decorrelation time, of the
order of seconds. The slowly varying component can be represented by a gamma distribution. It has been known
for long that a point exits beyond which a price is to be paid in the form of increased “spikiness” of the observed
clutter statistics.
II. METHODS OF THRESHOLD DETECTION
Detection of radar signal is based on establishing a threshold at the output of the receiver. If the
receiver output is large enough to exceed the threshold, a target is said to be present. If the receiver output is not
of sufficient amplitude to cross the threshold, only unwanted signal is said to be present. This is called threshold
detection. Three approaches can be adopted in order to determine the threshold levels. They are:
1. Fixed Threshold.
2. CA-CFAR.
3. Clutter Map.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
52
A. Fixed Threshold
In this case, the signal is compared with a fixed threshold and targets are detected whenever the signal
exceeds this threshold. If the threshold level is set properly, the receiver output should not normally exceed the
threshold if noise plus clutter alone were present, but the output would exceed the threshold if a strong target
echo signal were present. If the threshold level were set too low, the unwanted signal might exceed it and be
mistaken for a target [14]. This is called false alarm. If the threshold were set too high, unwanted signal might
not be large enough to cause false alarms, but weak target echoes might not exceed the threshold and would not
be detected. When this occurs, it is called a missed detection.
Fig.1 Detection of target using fixed threshold.
B. CA-CFAR
The CFAR processor provides considerable better performance than the fixed processor when it comes
to following the varying mean level of the clutter. However, in some cases, such as the very spiky or weak
clutter, it may be impossible to follow the clutter mean variations. Under these conditions, Ideal fixed processor
is more optimal.
A false alarm is “an erroneous radar target detection decision caused by noise or other interfering
signals exceeding the detection threshold”. In general, it is an indication of the presence of a radar target when
there is no valid target [3]. The False Alarm Rate (FAR) is calculated using the following formula:
FAR =false targets per PRT/Number of range cells
False alarms are generated when thermal noise exceeds a pre-set threshold level, by the presence of
spurious signals, or by equipment malfunction. A false alarm may be manifested as a momentary blip on a
cathode ray tube (CRT) display, a digital signal processor output, an audio signal, or by all of these means[3]. If
the detection threshold is set too high, there will be very few false alarms, but the signal-to-noise ratio required
will inhibit detection of valid targets. If the threshold is set too low, the large number of false alarms will mask
detection of valid targets.
1. Threshold is set too high: Probability of Detection = 20%
2. Threshold is set optimal: Probability of Detection = 80%
But one false alarm arises!
False alarm rate = 1 / 666 = 1,5 •10-3
3. Threshold is set too low: a large number of false alarms arise!
4. Threshold is set variable: constant false-alarm rate.
The false alarm rate depends on the level of all interferences, like noise, clutter or jamming. Near the
radar site the influence of the fixed clutter is higher than the noise level. At large distances the influence of the
noise level is higher. To achieve a higher probability of detection in large distances by using a lower threshold
level, the false alarm rate rises at close range.
Constant false alarm rate (CFAR) detection refers to a common form of adaptive algorithm used in
radar systems to detect target returns against a background of noise, clutter and interference [2]. In the radar
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
53
receiver, the returning echoes are typically received by the antenna, amplified, down-converted and then passed
through detector circuitry that extracts the envelope of the signal. This signal is proportional to the power of the
received echo and comprises the wanted echo signal and the unwanted power from external clutter and
interference and internal receiver noise. The role of the constant false alarm rate circuitry is to determine the
power threshold above which any return can be considered to probably originate from a target. If this threshold
is too low, then more targets will be detected at the expense of increased numbers of false alarms [14].
Conversely, if the threshold is too high, then fewer targets will be detected, but the number of false alarms will
also be low[14]. In most radar detectors, the threshold is set in order to achieve a required probability of false
alarm.
If the background against which targets are to be detected is constant with time and space, then a fixed
threshold level can be chosen that provides a specified probability of false alarm, governed by the probability
density function of the noise, which is usually assumed to be Gaussian [2]. The probability of detection is then a
function of the signal-to-noise ratio of the target return. However, in most fielded systems, unwanted clutter and
interference sources mean that the noise level changes both spatially and temporally. In this case, a changing
threshold can be used, where the threshold level is raised and lowered to maintain a constant probability of false
alarm. This is known as constant false alarm rate (CFAR) detection.
In most simple CFAR detection schemes, the threshold level is calculated by estimating the level of the
noise floor around the cell under test (CUT). This can be found by taking a block of cells around the CUT and
calculating the average power level. To avoid corrupting this estimate with power from the CUT itself, cells
immediately adjacent to the CUT are normally ignored (and referred to as "guard cells"). A target is declared
present in the CUT if it is both greater than all its adjacent cells and greater than the local average power level.
The estimate of the local power level may sometimes be increased slightly to allow for the limited sample size.
This simple approach is called a cell-averaging CFAR (CA-CFAR).
Fig.2 Cell Averaging CFAR (CA-CFAR).
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
54
C. Clutter Map
Clutter map stores the magnitude of clutter echoes in a digital memory. The clutter echo stored in each
cell of the map can be used to establish a threshold. It is therefore, a form of CFAR [5]. The clutter map
establishes the thresholds used for detecting the targets. On each scan, one eighth of the present output is added
to the seven eighths of the value stored in the clutter map. Since clutter can change with time, the value of the
clutter in each cell is uploaded periodically by averaging over a large number of scans [6]. The larger the
number of scans the more accurate will be the estimate of the clutter and the less the effect of a target that
moves through the cell. The map is built up in a recursive manner. About 3 to 10 scans are required to establish
a steady state values. The values in the clutter map are multiplied by an appropriate constant to establish the
threshold which allows the detection of targets.
A clutter map has an advantage over the CA-CFAR in that it is not affected by edge effects. The
response of the clutter map will be reduced when a target of slow speed remains within the cell long enough to
affect the threshold. This effect can be reduced by making the map cell greater than the radar resolution cell.
Increasing the size of the clutter map cell should not be carried too far, however, since it reduces the interclutter
visibility.
III. BLOCK DIAGRAM
A functional block diagram that incorporates the scan-to-scan discriminator is shown in the figure.
Fig.3 Functional block diagram.
1. Analog-to-digital converter (ADC): The ADC is an electronic integrated circuit which transforms a signal
from analog (continuous) to digital (discrete) form. It is not possible to continuously convert the incoming
analog signal to a digital output code. Therefore the function of ADC is to quantize the analog signal and then
output the corresponding digital code value.
2. Digital Pulse Compression (DPC): A common technique used in Radar Systems to accommodate the
seemingly incompatible requirements of transmitting long pulse(in order to allow high mean transmitted
power),while achieving fine range resolution is Pulse Compression where the “Range Resolution” is the ability
of Radar to clearly distinguish the closely spaced targets. In the simplest form pulse compression amounts to
generating the pulse as a frequency -modulated ramp or “chirp” on the transmitter side and on the receiver side,
matched filter is used to compress the echo signal.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
55
3. Magnitude Estimator: This performs the amplitude estimation of the complex numbers i.e.it determines the
absolute value.
𝑀𝑎𝑔𝑛𝑖𝑡𝑢𝑑𝑒 = 𝐼2 + 𝑄2
Where I=in phase component,
Q=out of phase component
4. Fixed Threshold, Clutter Map and CA-CFAR: These are the three approaches used by the scan-to-scan
discriminator in order to distinguish between the marine targets and the unwanted signals.
5. Scan-to-Scan Discriminator: In the marine environment, sea clutter might occur at a random position in one
scan but not in the next or subsequent scans. In contrast, targets will appear from scan to scan with essentially
the same amplitude. The scan-to-scan discriminator eliminates “spiky” clutter by averaging or weighting the
amplitudes from several scans. Thus, false alarms are reduced and marine targets can be detected.
6. Report Format: This provides the details about the target detection and strength of the target. This
information is displayed on the personal computer (PC).
IV. METHODOLOGY
The scan-to-scan discriminator uses one of the three approaches mentioned below in order to
distinguish between the marine the targets and the unwanted signals.
A. Scan-to-scan discriminator using fixed threshold.
Fig.4 Flow chart for scan-to-scan discriminator using fixed threshold.
TRUE FALSE
Target absent
Stop
Target present
Stop
Scan1*Scan2*
Scan3= =1?
Scan3=1(sample>
threshold value)
Scan3=0(sample<
threshold value)
Scan2=1(sample>
threshold value)
Scan2=0(sample<
threshold value)
Scan1=1(sample>
threshold value)
Scan1=0(sample<
threshold value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Fix the threshold value. Fix the threshold value.Fix the threshold value.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the third set of
uniformly distributed
random numbers.
Generate the second set of
uniformly distributed
random numbers.
Generate the first set of
uniformly distributed
random numbers.
Initialize the no. of
samples & PRT
No of samples and prt
Initialize the no. of
samples & PRT
No of samples and prt
Start scan3Start scan2Start scan1
Initialize the no. of
samples & PRT
No of samples and prt
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
56
B. Scan-to-scan discriminator using CA-CFAR.
Fig. 5 Flow chart for scan-to-scan discriminator using CA-CFAR.
Scan1*Scan2*Sc
an3= =1?
Target present Target absent
Stop Stop
Generate Threshold values
using Sliding window concept
Scan1=1(sample> threshold
value)
Scan1=0(sample< threshold
value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Scan2=1(sample> threshold
value)
Scan2=0(sample< threshold
value)
Scan3=1(sample> threshold
value)
Scan3=0(sample< threshold
value)
Generate the first set of
uniformly distributed
random numbers.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the second set
of uniformly distributed
random numbers.
Generate the third set of
uniformly distributed
random numbers.
Initialize the no. of
samples & PRT
Initialize the no. of
samples & PRT
Initialize the no. of
samples & PRT
Start scan1 Start scan2 Start scan3
Generate Threshold values
using Sliding window concept
Generate Threshold values
using Sliding window concept
TRUE False
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
57
C. Scan-to-scan discriminator using clutter map.
Fig. 6 Flow chart for scan-to-scan discriminator using Clutter Map.
Scan1*Scan2
*Scan3= =1?
Target present Target absent
Stop Stop
Find the maximum
Threshold value using
formula
Scan1=1(sample>
threshold value)
Scan1=0(sample<
threshold value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Scan2=1(sample>
threshold value)
Scan2=0(sample<
threshold value)
Scan3=1(sample>
threshold value)
Scan3=0(sample<
threshold value)
Generate the first set of
uniformly distributed
random numbers.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the second set
of uniformly distributed
random numbers.
Generate the third set of
uniformly distributed
random numbers.
Initialize the no.
of samples &
PRT
Initialize the no.
of samples & PRT
Initialize the no.
of samples &
PRT
Start scan1 Start scan2 Start scan3
Find the maximum
Threshold value using
formula
Find the maximum
Threshold value using
formula
TRUE FALSE
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
58
V. APPLICATION
A. Tagging the Speed of Small Marine Targets
A target is said to be a small marine target if it occupies a single range cell. The output of each scan is
used to tag the speed of small marine targets. The output can be obtained using anyone of the three approaches
mentioned above.
The target is declared as a ―slow moving target if the target occupies the same range cell in all the 3
scans. The target is declared as a ―medium speed target if the target occupies the same range cell in either the
first and second scan or the second and third scan. The target is declared as a ―fast speed target or ―false
alarm if the target detection is made in either one of the scans or both the first and third scan.
Fig.7 MATLAB simulation result of tagging the speed of small marine targets using fixed threshold.
Fig.8 MATLAB simulation result of tagging the speed of small marine targets using CA-CFAR.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
59
Fig.9 MATLAB simulation result of tagging the speed of small marine targets using clutter map.
B. Tagging the Speed of Large Marine Targets
A target is said to be a large marine target if it occupies two or more range cells. The output of each
scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three
approaches mentioned above.
Fig.10 MATLAB simulation result of tagging the speed of large marine targets using fixed threshold.
Fig.11 MATLAB simulation result of tagging the speed of large marine targets using CA-CFAR.
Fig.12 MATLAB simulation result of tagging the speed of large marine targets using clutter map.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
60
C. Tagging the Speed of Large Marine Targets using Gating Approach
A target is said to be a large marine target if it occupies two or more range cells. The output of each
scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three
approaches mentioned above.
Fig.13 Stationary target since the target remains at the same range cell in all three scans.
Fig.14 Slow speed target since the target moves from range cell 1 to 3 in three scans.
Fig.15 Medium speed target since the target moves from range cell 1 to 3 in two scans.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
61
VI. RESULTS AND DISCUSSIONS
The scan-to-scan discriminator using fixed threshold detects the targets by using one of the three threshold
values. When the threshold value is low, a large number of false alarms arise and the target detection becomes
weak. When the threshold value is optimal, a better target detection is obtained against the clutter. When the
threshold value is high, both the weak and strong targets cannot be detected as shown in fig.16
Fig.16 MATLAB simulation result of scan-to-scan discriminator using fixed threshold.
The scan-to-scan discriminator using CA-CFAR detects the targets by using the sliding window
concept. The target is assigned at the location (1, 1) and (3, 30).A target is declared present in the CUT if it is
both greater than all its adjacent cells and greater than the local average power level as shown in the fig.17
Fig.17 MATLAB simulation result of scan-to-scan discriminator using CA-CFAR.
Fig.18 MATLAB simulation result of scan-to-scan discriminator using clutter map.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
62
The scan-to-scan discriminator using clutter map detects the targets by using the magnitude of the
clutter echoes stored in the memory. The threshold value is obtained by multiplying the output of the present
scan with a suitable multiplying factor. The multiplying factor depends on the false alarm probability. The target
detection obtained using three different threshold values are shown in the fig.18.
VII. CONCLUSION AND FUTURE SCOPE
This paper has introduced the scan-to-scan discriminator, a simple technique that significantly
improves the detection performance. Fine resolution and the ability to detect marine targets makes scan-to-scan
discriminator well suited for radar surveillance in waterside security applications. The advantages and drawback
of the ideal threshold approach were concisely mentioned. The role of CA-CFAR is to adaptively set a detection
threshold so that a constant probability of false alarm is not exceeded and a designed probability of detection is
achieved. The intended target echo signal is always immersed in a background which may contain clutter
together with an additional superimposed thermal noise. The third approach called the clutter map stores the
amplitude of the clutter in the memory. The scan-to-scan discriminator using fixed threshold, CA-CFAR and
clutter map are designed using MATLAB R2007b. Experimental results have shown that the proposed scan-to-
scan discriminator can remove considerable clutter plus noise while preserving the target. Fine resolution and
the ability to detect and tag the speed of marine targets makes the scan-to-scan discriminator well suited for
radar surveillance in waterside security applications.
The discussion in this paper has concentrated on the three threshold detection techniques and the scan-
to-scan discriminator which in turn uses these three approaches to detect the marine targets. An important aspect
of the future radars is likely to be their ability to use the scan-to-scan discriminator in order to tag the speed of
marine targets i.e. tag the speed of both small marine targets and large marine targets once the target detection is
achieved. The output of the scan-to-scan discriminator can then be used to classify the marine targets as
stationary, slow speed, medium speed and fast speed targets. The scan-to-scan discriminator can be enhanced
further in order to implement the following features. They are: to design the architecture and implement the CA-
CFAR; to distinguish between the fast moving marine targets and false alarms; to determine the range and the
angular direction of marine targets.
REFERENCES
[1]. Ward K D, Baker C J, Watts S, “Maritime surveillance radar, Part I: Radar scattering from the ocean
surface”, IEE Proceedings on Radar and Signal Processing, Volume 137-Issue: 2, April 1990.
[2]. Watts S, Baker C J, Ward K D, "Maritime surveillance radar, Part II: Detection performance
prediction in sea clutter", Radar and Signal Processing, IEE Proceedings F, Volume 137 -Issue: 2,
April 1990.
[3]. Merrill I. Skolnik, “Introduction to Radar Systems”, McGraw-Hill Publications, 3 edition, August
2000.
[4]. Valentina Ravenni, “Performance Evaluations of Frequency Diversity Radar System”, 37th European
Microwave Conference, October 2007.
[5]. Jens Christian Pedersen, “SCANTER 5000 and 6000 Solid State Radar: Utilisation of the SCANTER
5000 and 6000 series next generation solid state, coherent, frequency diversity and time diversity radar
with software defined functionality for security applications”, Waterside Security Conference (WSS),
2010.
[6]. Perez F, Asensio A, Gismero J, Alonso J I, Monje J M, Casanova F, Cortijo R, Perez-Ojeda J
F,"ARIES: A High Resolution Shipboard Radar", Radar Conference, IEEE, 2002.
[7]. Musicki D, Suvorova S, Morelande M, Moran B, “Clutter map and target tracking”, Information
Fusion, 2005 8th International Conference, Volume 1, July 2005.
[8]. Denny.M, “Simulating sea clutter via the compound-k distribution”, Radar System Modelling, IEE
Colloquium, October 1998.
[9]. C. Bouvier, L. Martinet, G. Favier, M. Artaud, “Simulation of radar sea clutter using autoregressive
modelling and K-distribution”, Radar Conference, 1995.
[10]. Abdel-Nabi M.A, Seddik K.G, El-Badaway, “Spiky sea and constant false alarm rate processing in
high-resolution maritime radar systems”, International Conference on Computer and Communication
Engineering (ICCCE), 2012.
[11]. Roberto Perez-Andrade, Rene Cumplido, Claudia Feregrino-Uribe, Fernando Martin Del Campo, “A
Versatile Hardware Architecture for a Constant False Alarm Rate Processor Based on a Linear
Insertion Sorter”.
[12]. Gandhi P.P., Kassam S.A., “Analysis of CFAR Processors in Nonhomogeneous Background”, IEEE
Transactions on Aerospace and Electronic Systems, vol. 24, 1988.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
63
[13]. Lei Zhao, Weixian Liu, Xin Wu, Fu. J. S. “A Novel Approach for CFAR Design”, Proceedings of the
IEEE, Radar Conference, 2001.
[14]. Mark A. Richards, James A. Scheer, William A. Holm, “Principles of Modern Radar: Basic
Principles”, SciTech publishing, 10 edition, 2010.
[15]. Lehtomaki J.J, Vartiainen J, Juntti M, Saarnisaari H, “CFAR Outlier Detection With Forward
Methods”, IEEE Transactions on Signal Processing, 2007.
[16]. N. Moazen, M. R. Akhavan-Sarraf, “A Robust CFAR Algorithm In Non- Homogenous Environments”,
IET International Conference on Radar Systems, 2007.
[17]. Meng Xiangwei, Qu Fuyong, “Adaptive clutter map detector in nonhomogeneous environment”, IEEE
10th International Conference on Signal Processing (ICSP), 2010.
[18]. Darko Musicki, Sofia Suvorova, Mark Morelande and Bill Moran, “Clutter Map and Target
Tracking”, 7th International Conference on Information Fusion (FUSION), 2005.

More Related Content

What's hot

Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Synack
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communicationsFarzad Nuseeb
 
From vessel traffic management to port security: the evolution of sonar appli...
From vessel traffic management to port security: the evolution of sonar appli...From vessel traffic management to port security: the evolution of sonar appli...
From vessel traffic management to port security: the evolution of sonar appli...gamlehaugen
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignJim Jenkins
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniquesmohammedalimahdi
 
The active remote sensing equation
The active remote sensing equationThe active remote sensing equation
The active remote sensing equationtobiasotto
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum techniqueTauseef khan
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrumKashif Amjad
 

What's hot (20)

R adar
R adarR adar
R adar
 
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
 
Chirps
ChirpsChirps
Chirps
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
Digital processing of today’s radar signals
Digital processing of today’s radar signalsDigital processing of today’s radar signals
Digital processing of today’s radar signals
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
From vessel traffic management to port security: the evolution of sonar appli...
From vessel traffic management to port security: the evolution of sonar appli...From vessel traffic management to port security: the evolution of sonar appli...
From vessel traffic management to port security: the evolution of sonar appli...
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
Hm3114401445
Hm3114401445Hm3114401445
Hm3114401445
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
The active remote sensing equation
The active remote sensing equationThe active remote sensing equation
The active remote sensing equation
 
introduction to radar
 introduction to radar  introduction to radar
introduction to radar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
Report 1
Report 1Report 1
Report 1
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 

Similar to MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets

Presentation signals and systems
Presentation signals and systemsPresentation signals and systems
Presentation signals and systemsheshan pandikorala
 
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...ijcisjournal
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...IRJET Journal
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...IRJET Journal
 
UNIT - 1principlea of radar information.pptx
UNIT - 1principlea of radar information.pptxUNIT - 1principlea of radar information.pptx
UNIT - 1principlea of radar information.pptxgurramkondasadaf
 
Application Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsApplication Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsRichard Hogue
 
Real time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaReal time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaeSAT Journals
 
Real time implemantion of stc and ftc radar system
Real time implemantion of stc and ftc radar systemReal time implemantion of stc and ftc radar system
Real time implemantion of stc and ftc radar systemeSAT Publishing House
 
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...sipij
 
Review Paper on Target Detection using Ordered Statistical Method
Review Paper on Target Detection using Ordered Statistical MethodReview Paper on Target Detection using Ordered Statistical Method
Review Paper on Target Detection using Ordered Statistical MethodIRJET Journal
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...ABHISHEK MALAV
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission ijwmn
 
14. doppler radar and mti 2014
14. doppler radar and mti 201414. doppler radar and mti 2014
14. doppler radar and mti 2014Lohith Kumar
 
Determining Data Quality for NOvA experiment
Determining Data Quality for NOvA experimentDetermining Data Quality for NOvA experiment
Determining Data Quality for NOvA experimentChatura Kuruppu
 
Clutter reduction technique based on clutter model for automatic target class...
Clutter reduction technique based on clutter model for automatic target class...Clutter reduction technique based on clutter model for automatic target class...
Clutter reduction technique based on clutter model for automatic target class...TELKOMNIKA JOURNAL
 

Similar to MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets (20)

Presentation signals and systems
Presentation signals and systemsPresentation signals and systems
Presentation signals and systems
 
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
 
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
Reactive Power Compensation in Single Phase Distribution System using SVC, ST...
 
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
Transmitter Detection Methods of Spectrum Sensing For Cognitive Radio Network...
 
UNIT - 1principlea of radar information.pptx
UNIT - 1principlea of radar information.pptxUNIT - 1principlea of radar information.pptx
UNIT - 1principlea of radar information.pptx
 
Application Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar SignalsApplication Of Digital Signal Processing In Radar Signals
Application Of Digital Signal Processing In Radar Signals
 
Real time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpgaReal time implemantion of stc and ftc radar system based on fpga
Real time implemantion of stc and ftc radar system based on fpga
 
Real time implemantion of stc and ftc radar system
Real time implemantion of stc and ftc radar systemReal time implemantion of stc and ftc radar system
Real time implemantion of stc and ftc radar system
 
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...
 
Review Paper on Target Detection using Ordered Statistical Method
Review Paper on Target Detection using Ordered Statistical MethodReview Paper on Target Detection using Ordered Statistical Method
Review Paper on Target Detection using Ordered Statistical Method
 
Elios 2 rad
Elios 2 rad Elios 2 rad
Elios 2 rad
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...
Off-line Fault Localization Technique on HVDC Submarine Cable via Time-Freque...
 
Radar
RadarRadar
Radar
 
WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission WSN, FND, LEACH, modified algorithm, data transmission
WSN, FND, LEACH, modified algorithm, data transmission
 
14. doppler radar and mti 2014
14. doppler radar and mti 201414. doppler radar and mti 2014
14. doppler radar and mti 2014
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Determining Data Quality for NOvA experiment
Determining Data Quality for NOvA experimentDetermining Data Quality for NOvA experiment
Determining Data Quality for NOvA experiment
 
Clutter reduction technique based on clutter model for automatic target class...
Clutter reduction technique based on clutter model for automatic target class...Clutter reduction technique based on clutter model for automatic target class...
Clutter reduction technique based on clutter model for automatic target class...
 
F41014349
F41014349F41014349
F41014349
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.51-63 51 MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 1 Anala M, 2 Fathima Jabeen, 3 Vikram Thakur 1 Assistant Professor, Department of ECE, KSSEM, Bangalore, India. 2 Professor and HOD, Department of ECE, KSSEM, Bangalore, India. 3 Scientist, LRDE, DRDO, Bangalore, India. Abstract:- For an operational radar, backscatter of the transmitted signal by the elements of the sea surface often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their performance by unwanted sea clutter. In the marine environment, sea clutter might occur at a random position in one scan but not in the next or subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are: 1. Fixed Threshold. 2. Cell Averaging Constant False Alarm Rate (CA- CFAR). 3. Clutter Map. The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating approach is used to tag the speed of large marine targets. The proposed architectures have been designed using MATLAB R2007b. Keywords:- Radar, scan-to-scan discriminator, sea clutter, fixed threshold, clutter map, CA-CFAR. I. INTRODUCTION Radar detection performance is often deteriorated due to the presence of sea clutter. Clutter is the term used to denote unwanted echoes from the natural environment [14]. It implies that these unwanted echoes “clutter” the radar and make difficult the detection of wanted targets. Clutter includes echoes from land, sea, weather (particularly rain), birds and insects. Large clutter echoes can mask echoes form desired targets and limit radar capability [1]. In addition to any possible clutter there will also be always noise. The total signal competing with the target return is the clutter plus noise. In practice there is often either no clutter or clutter dominates or the noise can be ignored. In the first case the radar is said to be Noise limited, in the second it is Clutter Limited. Sea clutter limits the performance of radar. For sea clutter, the k-distribution is said to be made of two components. There is a fast varying component, with a correlation time of the order of 5 to 10ms. The fast component can be decorrelated pulse to pulse. It is sometimes called the “speckle component” and its statistics can be represented by Rayleigh distribution [7]. The other component has a longer decorrelation time, of the order of seconds. The slowly varying component can be represented by a gamma distribution. It has been known for long that a point exits beyond which a price is to be paid in the form of increased “spikiness” of the observed clutter statistics. II. METHODS OF THRESHOLD DETECTION Detection of radar signal is based on establishing a threshold at the output of the receiver. If the receiver output is large enough to exceed the threshold, a target is said to be present. If the receiver output is not of sufficient amplitude to cross the threshold, only unwanted signal is said to be present. This is called threshold detection. Three approaches can be adopted in order to determine the threshold levels. They are: 1. Fixed Threshold. 2. CA-CFAR. 3. Clutter Map.
  • 2. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 52 A. Fixed Threshold In this case, the signal is compared with a fixed threshold and targets are detected whenever the signal exceeds this threshold. If the threshold level is set properly, the receiver output should not normally exceed the threshold if noise plus clutter alone were present, but the output would exceed the threshold if a strong target echo signal were present. If the threshold level were set too low, the unwanted signal might exceed it and be mistaken for a target [14]. This is called false alarm. If the threshold were set too high, unwanted signal might not be large enough to cause false alarms, but weak target echoes might not exceed the threshold and would not be detected. When this occurs, it is called a missed detection. Fig.1 Detection of target using fixed threshold. B. CA-CFAR The CFAR processor provides considerable better performance than the fixed processor when it comes to following the varying mean level of the clutter. However, in some cases, such as the very spiky or weak clutter, it may be impossible to follow the clutter mean variations. Under these conditions, Ideal fixed processor is more optimal. A false alarm is “an erroneous radar target detection decision caused by noise or other interfering signals exceeding the detection threshold”. In general, it is an indication of the presence of a radar target when there is no valid target [3]. The False Alarm Rate (FAR) is calculated using the following formula: FAR =false targets per PRT/Number of range cells False alarms are generated when thermal noise exceeds a pre-set threshold level, by the presence of spurious signals, or by equipment malfunction. A false alarm may be manifested as a momentary blip on a cathode ray tube (CRT) display, a digital signal processor output, an audio signal, or by all of these means[3]. If the detection threshold is set too high, there will be very few false alarms, but the signal-to-noise ratio required will inhibit detection of valid targets. If the threshold is set too low, the large number of false alarms will mask detection of valid targets. 1. Threshold is set too high: Probability of Detection = 20% 2. Threshold is set optimal: Probability of Detection = 80% But one false alarm arises! False alarm rate = 1 / 666 = 1,5 •10-3 3. Threshold is set too low: a large number of false alarms arise! 4. Threshold is set variable: constant false-alarm rate. The false alarm rate depends on the level of all interferences, like noise, clutter or jamming. Near the radar site the influence of the fixed clutter is higher than the noise level. At large distances the influence of the noise level is higher. To achieve a higher probability of detection in large distances by using a lower threshold level, the false alarm rate rises at close range. Constant false alarm rate (CFAR) detection refers to a common form of adaptive algorithm used in radar systems to detect target returns against a background of noise, clutter and interference [2]. In the radar
  • 3. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 53 receiver, the returning echoes are typically received by the antenna, amplified, down-converted and then passed through detector circuitry that extracts the envelope of the signal. This signal is proportional to the power of the received echo and comprises the wanted echo signal and the unwanted power from external clutter and interference and internal receiver noise. The role of the constant false alarm rate circuitry is to determine the power threshold above which any return can be considered to probably originate from a target. If this threshold is too low, then more targets will be detected at the expense of increased numbers of false alarms [14]. Conversely, if the threshold is too high, then fewer targets will be detected, but the number of false alarms will also be low[14]. In most radar detectors, the threshold is set in order to achieve a required probability of false alarm. If the background against which targets are to be detected is constant with time and space, then a fixed threshold level can be chosen that provides a specified probability of false alarm, governed by the probability density function of the noise, which is usually assumed to be Gaussian [2]. The probability of detection is then a function of the signal-to-noise ratio of the target return. However, in most fielded systems, unwanted clutter and interference sources mean that the noise level changes both spatially and temporally. In this case, a changing threshold can be used, where the threshold level is raised and lowered to maintain a constant probability of false alarm. This is known as constant false alarm rate (CFAR) detection. In most simple CFAR detection schemes, the threshold level is calculated by estimating the level of the noise floor around the cell under test (CUT). This can be found by taking a block of cells around the CUT and calculating the average power level. To avoid corrupting this estimate with power from the CUT itself, cells immediately adjacent to the CUT are normally ignored (and referred to as "guard cells"). A target is declared present in the CUT if it is both greater than all its adjacent cells and greater than the local average power level. The estimate of the local power level may sometimes be increased slightly to allow for the limited sample size. This simple approach is called a cell-averaging CFAR (CA-CFAR). Fig.2 Cell Averaging CFAR (CA-CFAR).
  • 4. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 54 C. Clutter Map Clutter map stores the magnitude of clutter echoes in a digital memory. The clutter echo stored in each cell of the map can be used to establish a threshold. It is therefore, a form of CFAR [5]. The clutter map establishes the thresholds used for detecting the targets. On each scan, one eighth of the present output is added to the seven eighths of the value stored in the clutter map. Since clutter can change with time, the value of the clutter in each cell is uploaded periodically by averaging over a large number of scans [6]. The larger the number of scans the more accurate will be the estimate of the clutter and the less the effect of a target that moves through the cell. The map is built up in a recursive manner. About 3 to 10 scans are required to establish a steady state values. The values in the clutter map are multiplied by an appropriate constant to establish the threshold which allows the detection of targets. A clutter map has an advantage over the CA-CFAR in that it is not affected by edge effects. The response of the clutter map will be reduced when a target of slow speed remains within the cell long enough to affect the threshold. This effect can be reduced by making the map cell greater than the radar resolution cell. Increasing the size of the clutter map cell should not be carried too far, however, since it reduces the interclutter visibility. III. BLOCK DIAGRAM A functional block diagram that incorporates the scan-to-scan discriminator is shown in the figure. Fig.3 Functional block diagram. 1. Analog-to-digital converter (ADC): The ADC is an electronic integrated circuit which transforms a signal from analog (continuous) to digital (discrete) form. It is not possible to continuously convert the incoming analog signal to a digital output code. Therefore the function of ADC is to quantize the analog signal and then output the corresponding digital code value. 2. Digital Pulse Compression (DPC): A common technique used in Radar Systems to accommodate the seemingly incompatible requirements of transmitting long pulse(in order to allow high mean transmitted power),while achieving fine range resolution is Pulse Compression where the “Range Resolution” is the ability of Radar to clearly distinguish the closely spaced targets. In the simplest form pulse compression amounts to generating the pulse as a frequency -modulated ramp or “chirp” on the transmitter side and on the receiver side, matched filter is used to compress the echo signal.
  • 5. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 55 3. Magnitude Estimator: This performs the amplitude estimation of the complex numbers i.e.it determines the absolute value. 𝑀𝑎𝑔𝑛𝑖𝑡𝑢𝑑𝑒 = 𝐼2 + 𝑄2 Where I=in phase component, Q=out of phase component 4. Fixed Threshold, Clutter Map and CA-CFAR: These are the three approaches used by the scan-to-scan discriminator in order to distinguish between the marine targets and the unwanted signals. 5. Scan-to-Scan Discriminator: In the marine environment, sea clutter might occur at a random position in one scan but not in the next or subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The scan-to-scan discriminator eliminates “spiky” clutter by averaging or weighting the amplitudes from several scans. Thus, false alarms are reduced and marine targets can be detected. 6. Report Format: This provides the details about the target detection and strength of the target. This information is displayed on the personal computer (PC). IV. METHODOLOGY The scan-to-scan discriminator uses one of the three approaches mentioned below in order to distinguish between the marine the targets and the unwanted signals. A. Scan-to-scan discriminator using fixed threshold. Fig.4 Flow chart for scan-to-scan discriminator using fixed threshold. TRUE FALSE Target absent Stop Target present Stop Scan1*Scan2* Scan3= =1? Scan3=1(sample> threshold value) Scan3=0(sample< threshold value) Scan2=1(sample> threshold value) Scan2=0(sample< threshold value) Scan1=1(sample> threshold value) Scan1=0(sample< threshold value) Compare the samples & threshold value Compare the samples & threshold value Compare the samples & threshold value Fix the threshold value. Fix the threshold value.Fix the threshold value. Perform the target assignment Perform the target assignment Perform the target assignment Generate the third set of uniformly distributed random numbers. Generate the second set of uniformly distributed random numbers. Generate the first set of uniformly distributed random numbers. Initialize the no. of samples & PRT No of samples and prt Initialize the no. of samples & PRT No of samples and prt Start scan3Start scan2Start scan1 Initialize the no. of samples & PRT No of samples and prt
  • 6. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 56 B. Scan-to-scan discriminator using CA-CFAR. Fig. 5 Flow chart for scan-to-scan discriminator using CA-CFAR. Scan1*Scan2*Sc an3= =1? Target present Target absent Stop Stop Generate Threshold values using Sliding window concept Scan1=1(sample> threshold value) Scan1=0(sample< threshold value) Compare the samples & threshold value Compare the samples & threshold value Compare the samples & threshold value Scan2=1(sample> threshold value) Scan2=0(sample< threshold value) Scan3=1(sample> threshold value) Scan3=0(sample< threshold value) Generate the first set of uniformly distributed random numbers. Perform the target assignment Perform the target assignment Perform the target assignment Generate the second set of uniformly distributed random numbers. Generate the third set of uniformly distributed random numbers. Initialize the no. of samples & PRT Initialize the no. of samples & PRT Initialize the no. of samples & PRT Start scan1 Start scan2 Start scan3 Generate Threshold values using Sliding window concept Generate Threshold values using Sliding window concept TRUE False
  • 7. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 57 C. Scan-to-scan discriminator using clutter map. Fig. 6 Flow chart for scan-to-scan discriminator using Clutter Map. Scan1*Scan2 *Scan3= =1? Target present Target absent Stop Stop Find the maximum Threshold value using formula Scan1=1(sample> threshold value) Scan1=0(sample< threshold value) Compare the samples & threshold value Compare the samples & threshold value Compare the samples & threshold value Scan2=1(sample> threshold value) Scan2=0(sample< threshold value) Scan3=1(sample> threshold value) Scan3=0(sample< threshold value) Generate the first set of uniformly distributed random numbers. Perform the target assignment Perform the target assignment Perform the target assignment Generate the second set of uniformly distributed random numbers. Generate the third set of uniformly distributed random numbers. Initialize the no. of samples & PRT Initialize the no. of samples & PRT Initialize the no. of samples & PRT Start scan1 Start scan2 Start scan3 Find the maximum Threshold value using formula Find the maximum Threshold value using formula TRUE FALSE
  • 8. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 58 V. APPLICATION A. Tagging the Speed of Small Marine Targets A target is said to be a small marine target if it occupies a single range cell. The output of each scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three approaches mentioned above. The target is declared as a ―slow moving target if the target occupies the same range cell in all the 3 scans. The target is declared as a ―medium speed target if the target occupies the same range cell in either the first and second scan or the second and third scan. The target is declared as a ―fast speed target or ―false alarm if the target detection is made in either one of the scans or both the first and third scan. Fig.7 MATLAB simulation result of tagging the speed of small marine targets using fixed threshold. Fig.8 MATLAB simulation result of tagging the speed of small marine targets using CA-CFAR.
  • 9. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 59 Fig.9 MATLAB simulation result of tagging the speed of small marine targets using clutter map. B. Tagging the Speed of Large Marine Targets A target is said to be a large marine target if it occupies two or more range cells. The output of each scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three approaches mentioned above. Fig.10 MATLAB simulation result of tagging the speed of large marine targets using fixed threshold. Fig.11 MATLAB simulation result of tagging the speed of large marine targets using CA-CFAR. Fig.12 MATLAB simulation result of tagging the speed of large marine targets using clutter map.
  • 10. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 60 C. Tagging the Speed of Large Marine Targets using Gating Approach A target is said to be a large marine target if it occupies two or more range cells. The output of each scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three approaches mentioned above. Fig.13 Stationary target since the target remains at the same range cell in all three scans. Fig.14 Slow speed target since the target moves from range cell 1 to 3 in three scans. Fig.15 Medium speed target since the target moves from range cell 1 to 3 in two scans.
  • 11. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 61 VI. RESULTS AND DISCUSSIONS The scan-to-scan discriminator using fixed threshold detects the targets by using one of the three threshold values. When the threshold value is low, a large number of false alarms arise and the target detection becomes weak. When the threshold value is optimal, a better target detection is obtained against the clutter. When the threshold value is high, both the weak and strong targets cannot be detected as shown in fig.16 Fig.16 MATLAB simulation result of scan-to-scan discriminator using fixed threshold. The scan-to-scan discriminator using CA-CFAR detects the targets by using the sliding window concept. The target is assigned at the location (1, 1) and (3, 30).A target is declared present in the CUT if it is both greater than all its adjacent cells and greater than the local average power level as shown in the fig.17 Fig.17 MATLAB simulation result of scan-to-scan discriminator using CA-CFAR. Fig.18 MATLAB simulation result of scan-to-scan discriminator using clutter map.
  • 12. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 62 The scan-to-scan discriminator using clutter map detects the targets by using the magnitude of the clutter echoes stored in the memory. The threshold value is obtained by multiplying the output of the present scan with a suitable multiplying factor. The multiplying factor depends on the false alarm probability. The target detection obtained using three different threshold values are shown in the fig.18. VII. CONCLUSION AND FUTURE SCOPE This paper has introduced the scan-to-scan discriminator, a simple technique that significantly improves the detection performance. Fine resolution and the ability to detect marine targets makes scan-to-scan discriminator well suited for radar surveillance in waterside security applications. The advantages and drawback of the ideal threshold approach were concisely mentioned. The role of CA-CFAR is to adaptively set a detection threshold so that a constant probability of false alarm is not exceeded and a designed probability of detection is achieved. The intended target echo signal is always immersed in a background which may contain clutter together with an additional superimposed thermal noise. The third approach called the clutter map stores the amplitude of the clutter in the memory. The scan-to-scan discriminator using fixed threshold, CA-CFAR and clutter map are designed using MATLAB R2007b. Experimental results have shown that the proposed scan-to- scan discriminator can remove considerable clutter plus noise while preserving the target. Fine resolution and the ability to detect and tag the speed of marine targets makes the scan-to-scan discriminator well suited for radar surveillance in waterside security applications. The discussion in this paper has concentrated on the three threshold detection techniques and the scan- to-scan discriminator which in turn uses these three approaches to detect the marine targets. An important aspect of the future radars is likely to be their ability to use the scan-to-scan discriminator in order to tag the speed of marine targets i.e. tag the speed of both small marine targets and large marine targets once the target detection is achieved. The output of the scan-to-scan discriminator can then be used to classify the marine targets as stationary, slow speed, medium speed and fast speed targets. The scan-to-scan discriminator can be enhanced further in order to implement the following features. They are: to design the architecture and implement the CA- CFAR; to distinguish between the fast moving marine targets and false alarms; to determine the range and the angular direction of marine targets. REFERENCES [1]. Ward K D, Baker C J, Watts S, “Maritime surveillance radar, Part I: Radar scattering from the ocean surface”, IEE Proceedings on Radar and Signal Processing, Volume 137-Issue: 2, April 1990. [2]. Watts S, Baker C J, Ward K D, "Maritime surveillance radar, Part II: Detection performance prediction in sea clutter", Radar and Signal Processing, IEE Proceedings F, Volume 137 -Issue: 2, April 1990. [3]. Merrill I. Skolnik, “Introduction to Radar Systems”, McGraw-Hill Publications, 3 edition, August 2000. [4]. Valentina Ravenni, “Performance Evaluations of Frequency Diversity Radar System”, 37th European Microwave Conference, October 2007. [5]. Jens Christian Pedersen, “SCANTER 5000 and 6000 Solid State Radar: Utilisation of the SCANTER 5000 and 6000 series next generation solid state, coherent, frequency diversity and time diversity radar with software defined functionality for security applications”, Waterside Security Conference (WSS), 2010. [6]. Perez F, Asensio A, Gismero J, Alonso J I, Monje J M, Casanova F, Cortijo R, Perez-Ojeda J F,"ARIES: A High Resolution Shipboard Radar", Radar Conference, IEEE, 2002. [7]. Musicki D, Suvorova S, Morelande M, Moran B, “Clutter map and target tracking”, Information Fusion, 2005 8th International Conference, Volume 1, July 2005. [8]. Denny.M, “Simulating sea clutter via the compound-k distribution”, Radar System Modelling, IEE Colloquium, October 1998. [9]. C. Bouvier, L. Martinet, G. Favier, M. Artaud, “Simulation of radar sea clutter using autoregressive modelling and K-distribution”, Radar Conference, 1995. [10]. Abdel-Nabi M.A, Seddik K.G, El-Badaway, “Spiky sea and constant false alarm rate processing in high-resolution maritime radar systems”, International Conference on Computer and Communication Engineering (ICCCE), 2012. [11]. Roberto Perez-Andrade, Rene Cumplido, Claudia Feregrino-Uribe, Fernando Martin Del Campo, “A Versatile Hardware Architecture for a Constant False Alarm Rate Processor Based on a Linear Insertion Sorter”. [12]. Gandhi P.P., Kassam S.A., “Analysis of CFAR Processors in Nonhomogeneous Background”, IEEE Transactions on Aerospace and Electronic Systems, vol. 24, 1988.
  • 13. MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets 63 [13]. Lei Zhao, Weixian Liu, Xin Wu, Fu. J. S. “A Novel Approach for CFAR Design”, Proceedings of the IEEE, Radar Conference, 2001. [14]. Mark A. Richards, James A. Scheer, William A. Holm, “Principles of Modern Radar: Basic Principles”, SciTech publishing, 10 edition, 2010. [15]. Lehtomaki J.J, Vartiainen J, Juntti M, Saarnisaari H, “CFAR Outlier Detection With Forward Methods”, IEEE Transactions on Signal Processing, 2007. [16]. N. Moazen, M. R. Akhavan-Sarraf, “A Robust CFAR Algorithm In Non- Homogenous Environments”, IET International Conference on Radar Systems, 2007. [17]. Meng Xiangwei, Qu Fuyong, “Adaptive clutter map detector in nonhomogeneous environment”, IEEE 10th International Conference on Signal Processing (ICSP), 2010. [18]. Darko Musicki, Sofia Suvorova, Mark Morelande and Bill Moran, “Clutter Map and Target Tracking”, 7th International Conference on Information Fusion (FUSION), 2005.