23 research outputs found

    Nonlinear Transformations and Radar Detector Design

    Get PDF
    A nonlinear transformation is introduced, which can be used to compress a series of random variables. For a certain class of random variables, the compression results in the removal of unknown distributional parameters from the resultant series. Hence, the application of this transformation is investigated from a radar target detection perspective. It will be shown that it is possible to achieve the constant false alarm rate property through a simple manipulation of this transformation. Due to the effect the transformation has on the cell under test, it is necessary to couple the approach with binary integration to achieve reasonable results. This is demonstrated in an X-band maritime surveillance radar detection context

    Signal Processing for Non-Gaussian Statistics: Clutter Distribution Identification and Adaptive Threshold Estimation

    Get PDF
    We examine the problem of determining a decision threshold for the binary hypothesis test that naturally arises when a radar system must decide if there is a target present in a range cell under test. Modern radar systems require predictable, low, constant rates of false alarm (i.e. when unwanted noise and clutter returns are mistaken for a target). Measured clutter returns have often been fitted to heavy tailed, non-Gaussian distributions. The heavy tails on these distributions cause an unacceptable rise in the number of false alarms. We use the class of spherically invariant random vectors (SIRVs) to model clutter returns. SIRVs arise from a phenomenological consideration of the radar sensing problem, and include both the Gaussian distribution and most commonly reported non-Gaussian clutter distributions (e.g. K distribution, Weibull distribution). We propose an extension of a prior technique called the Ozturk algorithm. The Ozturk algorithm generates a graphical library of points corresponding to known SIRV distributions. These points are generated from linked vectors whose magnitude is derived from the order statistics of the SIRV distributions. Measured data is then compared to the library and a distribution is chosen that best approximates the measured data. Our extension introduces a framework of weighting functions and examines both a distribution classification technique as well as a method of determining an adaptive threshold in data that may or may not belong to a known distribution. The extensions are then compared to neural networking techniques. Special attention is paid to producing a robust, adaptive estimation of the detection threshold. Finally, divergence measures of SIRVs are examined

    Modeling and Mitigation of Wireless Communications Interference for Spectrum Sharing with Radar

    Get PDF
    Due to both economic incentives and policy mandates, researchers increasingly face the challenge of enabling spectrum sharing between radar and wireless communications systems. In the past eight years, researchers have begun to suggest a wide variety of approaches to radar-communications spectrum sharing, ranging from transmitter design to receiver design, from spatial to temporal to other-dimensional multiplexing, and from cooperative to non-cooperative sharing. Within this diverse field of innovation, this dissertation makes two primary contributions. First, a model for wireless communications interference and its effects on adaptive-threshold radar detection is proposed. Based on both theoretical and empirical study, we find evidence for both Gaussian and non-Gaussian communications interference models, depending on the modeling situation. Further, such interference can impact radar receivers via two mechanisms—model mismatch and boost to the underlying noise floor—and both mechanisms deserve attention. Second, an innovative signal processing algorithm is proposed for radar detection in the presence of cyclostationary, linearly-modulated, digital communications (LMDC) interference (such as OFDM or CDMA) and a stationary background component. The proposed detector consists of a novel whitening filter followed by the traditional matched filter. Performance results indicate that the proposed cyclostationary-based detector outperforms a standard equivalent detector based on a stationary interference model, particularly when the number of cyclostationary LMDC transmitters is small and their interference-to-noise ratio (INR) is large relative to the stationary background

    Towards a Common Software/Hardware Methodology for Future Advanced Driver Assistance Systems

    Get PDF
    The European research project DESERVE (DEvelopment platform for Safe and Efficient dRiVE, 2012-2015) had the aim of designing and developing a platform tool to cope with the continuously increasing complexity and the simultaneous need to reduce cost for future embedded Advanced Driver Assistance Systems (ADAS). For this purpose, the DESERVE platform profits from cross-domain software reuse, standardization of automotive software component interfaces, and easy but safety-compliant integration of heterogeneous modules. This enables the development of a new generation of ADAS applications, which challengingly combine different functions, sensors, actuators, hardware platforms, and Human Machine Interfaces (HMI). This book presents the different results of the DESERVE project concerning the ADAS development platform, test case functions, and validation and evaluation of different approaches. The reader is invited to substantiate the content of this book with the deliverables published during the DESERVE project. Technical topics discussed in this book include:Modern ADAS development platforms;Design space exploration;Driving modelling;Video-based and Radar-based ADAS functions;HMI for ADAS;Vehicle-hardware-in-the-loop validation system

    Towards a Common Software/Hardware Methodology for Future Advanced Driver Assistance Systems

    Get PDF
    The European research project DESERVE (DEvelopment platform for Safe and Efficient dRiVE, 2012-2015) had the aim of designing and developing a platform tool to cope with the continuously increasing complexity and the simultaneous need to reduce cost for future embedded Advanced Driver Assistance Systems (ADAS). For this purpose, the DESERVE platform profits from cross-domain software reuse, standardization of automotive software component interfaces, and easy but safety-compliant integration of heterogeneous modules. This enables the development of a new generation of ADAS applications, which challengingly combine different functions, sensors, actuators, hardware platforms, and Human Machine Interfaces (HMI). This book presents the different results of the DESERVE project concerning the ADAS development platform, test case functions, and validation and evaluation of different approaches. The reader is invited to substantiate the content of this book with the deliverables published during the DESERVE project. Technical topics discussed in this book include:Modern ADAS development platforms;Design space exploration;Driving modelling;Video-based and Radar-based ADAS functions;HMI for ADAS;Vehicle-hardware-in-the-loop validation system

    Security techniques for sensor systems and the Internet of Things

    Get PDF
    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in IoT networks, taking into account fixed and variable costs, criticality of different portions of the network, and risk metrics related to a specified security goal. Monitoring IoT devices and sensors during operation is necessary to detect incidents. We design Kalis, a knowledge-driven intrusion detection technique for IoT that does not target a single protocol or application, and adapts the detection strategy to the network features. As the scale of IoT makes the devices good targets for botnets, we design Heimdall, a whitelist-based anomaly detection technique for detecting and protecting against IoT-based denial of service attacks. Once our monitoring tools detect an attack, determining its actual cause is crucial to an effective reaction. We design a fine-grained analysis tool for sensor networks that leverages resident packet parameters to determine whether a packet loss attack is node- or link-related and, in the second case, locate the attack source. Moreover, we design a statistical model for determining optimal system thresholds by exploiting packet parameters variances. With our techniques\u27 diagnosis information, we develop Kinesis, a security incident response system for sensor networks designed to recover from attacks without significant interruption, dynamically selecting response actions while being lightweight in communication and energy overhead

    Spectrum prediction in dynamic spectrum access systems

    Get PDF
    Despite the remarkable foreseen advancements in maximizing network capacities, the in-expansible nature of radio spectrum exposed outdated spectrum management techniques as a core limitation. Fixed spectrum allocation inefficiency has generated a proliferation of dynamic spectrum access solutions to accommodate the growing demand for wireless, and mobile applications. This research primarily focuses on spectrum occupancy prediction which equip dynamic users with the cognitive ability to identify and exploit instantaneous availability of spectrum opportunities. The first part of this research is devoted to identifying candidate occupancy prediction techniques suitable for SOP scenarios are extensively analysed, and a theoretical based model selection framework is consolidated. The performance of single user Bayesian/Markov based techniques both analytically and numerically. Understanding performance bounds of Bayesian/Markov prediction allows the development of efficient occupancy prediction models. The third and fourth parts of this research investigates cooperative decision and data-based occupancy prediction. The expected cooperative prediction accuracy gain is addressed based on the single user prediction model. Specifically, the third contributions provide analytical approximations of single user, as well as cooperative hard fusion based spectrum prediction. Finally, the forth contribution shows soft fusion is superior and more robust compared to hard fusion cooperative prediction in terms of prediction accuracy. Throughout this research, case study analysis is provided to evaluate the performance of the proposed approaches. Analytical approaches and Monte-Carlo simulation are compared for the performance metric of interest. Remarkably, the case study analysis confirmed that the statistical approximation can predict the performance of local and hard fusion cooperative prediction accurately, capturing all the essential aspects of signal detection performance, temporal dependency of spectrum occupancy as well as the finite nature of the network
    corecore