320 research outputs found
compressive synthetic aperture sonar imaging with distributed optimization
Synthetic aperture sonar (SAS) provides high-resolution acoustic imaging by processing coherently the backscattered acoustic signal recorded over consecutive pings. Traditionally, object detection and classification tasks rely on high-resolution seafloor mapping achieved with widebeam, broadband SAS systems. However, aspect- or frequency-specific information is crucial for improving the performance of automatic target recognition algorithms. For example, low frequencies can be partly transmitted through objects or penetrate the seafloor providing information about internal structure and buried objects, while multiple views provide information about the object's shape and dimensions. Sub-band and limited-view processing, though, degrades the SAS resolution. In this paper, SAS imaging is formulated as an l1-norm regularized least-squares optimization problem which improves the resolution by promoting a parsimonious representation of the data. The optimization problem is solved in a distributed and computationally efficient way with an algorithm based on the alternating direction method of multipliers. The resulting SAS image is the consensus outcome of collaborative filtering of the data from each ping. The potential of the proposed method for high-resolution, narrowband, and limited-aspect SAS imaging is demonstrated with simulated and experimental data.Synthetic aperture sonar (SAS) provides high-resolution acoustic imaging by processing coherently the backscattered acoustic signal recorded over consecutive pings. Traditionally, object detection and classification tasks rely on high-resolution seafloor mapping achieved with widebeam, broadband SAS systems. However, aspect- or frequency-specific information is crucial for improving the performance of automatic target recognition algorithms. For example, low frequencies can be partly transmitted through objects or penetrate the seafloor providing information about internal structure and buried objects, while multiple views provide information about the object's shape and dimensions. Sub-band and limited-view processing, though, degrades the SAS resolution. In this paper, SAS imaging is formulated as an l1-norm regularized least-squares optimization problem which improves the resolution by promoting a parsimonious representation of the data. The optimization problem is solved in a distributed and computati..
New Methods for the Detection and Interception of Unknown, Frequency-Hopped Waveforms
Three new methods for the detection and interception of frequency-hopped waveforms are presented. The first method extends the optimal, fixed-block detection method based on the likelihood ratio to a sequential one based on the Sequential Probability Ratio Test (SPRT). The second method is structured around a compressive receiver and is highly efficient yet easily implemented. The third method is based on the new concept of Amplitude Distribution Function (ADF) and results in a detector that is an extension of the radiometer.
The first method presents a detector structured to make a decision sequentially, that is, as each data element is collected. Initially, a purely sequential test is derived and shown to require fewer data for a decision. A truncated sequential method is also derived and shown to reduce the data needed for a decision while operating under poor signal-to-noise ratios (SNRs). A detailed performance analysis is presented along with numerical and Monte Carlo analyses of the detectors.
The second method assumes stationary, colored Gaussian interference and presents a detailed model of the compressive receiver. A locally optimal detector is developed via the likelihood ratio theory and yields a reference to which previous ad hoc schemes are compared. A simplified, suboptimal scheme is developed that trades off duty cycle for performance, and a technique for estimating hop frequency is developed. The performance of the optimal and suboptimal detectors is quantified. For the suboptimal scheme, the trade-off with duty cycle is studied. The reliability of the hop frequency estimator is bounded and traded off against duty cycle.
In the third method, a precise definition of the ADF is given, from which follows a convolutional relationship between the ADFs of signal and additive noise. A technique is given for deconvolving the ADF, with which signal and noise components can be separated. A detection statistic characterized, yielding a framework on which to synthesize a detector. The detector's performance is analyzed and compared with the radiometer
On the antiāintercept features of noise radars
Robustness against Electronic Warfare/Electronic Defence attacks represents an
important advantage of Noise Radar Technology (NRT). An evaluation of the related
Low Probability of Detection (LPD) and of Intercept (LPI) is presented for Continuous
Emission Noise Radar (CEāNR) waveforms with different operational parameters, that is,
ātailoredā, and with various ādegrees of randomnessā. In this frame, three different noise
radar waveforms, a phase Noise (APCN) and two ātailoredā noise waveforms (FMeth
and COSPAR), are compared by timeāfrequency analysis. Using a correlator (i.e. a two
antennas) receiver, assuming a complete knowledge of the band (B) and duration (T) of
the coherent emission of these waveforms, it will be shown that the LPD features of a
CEāNR do not significantly differ from those of any CE radar transmitting deterministic
waveforms. However, in real operations, B and T are unknown; hence, assuming an
instantaneous bandwidth estimation will show that the duration T can be estimated only
for some specific ātailoredā waveforms (of course, not to be operationally used). The
effect of ātailoringā is analysed with prospects for future work. Finally, some limitations
in the classification of these radar signals are analysed
Recommended from our members
Signal Processing in Wireless Communications: Device Fingerprinting and Wide-Band Interference Rejection
The rapid progress of wireless communication technologies that has taken place in recent years has significantly improved the quality of everyday life. However with this expansion of wireless communication systems come significant security threats and significant technological challenges, both of which are due to the fact that the communication medium is shared. The ubiquity of open wireless Internet access networks creates a new avenue for cyber-criminals to impersonate and act in an unauthorized way. The increasing number of deployed wide-band wireless communication systems entails technological challenges for effective utilization of the shared medium, which implies the need for advanced interference rejection methods. Wireless security and interference rejection in wide-band wireless communications are therefore often considered as the two main challenges in wireless network\u27s design and research. Important aspects of these challenges are illuminated and addressed in this dissertation.
This dissertation considers signal processing approaches for exploiting or mitigating the effects of non-ideal components in wireless communication systems. In the first part of the dissertation, we introduce and study a novel, model-based approach to wireless device identification that exploits imperfections in the transmitter caused by manufacturing process nonidealities. Previous approaches to device identification based on hardware imperfections vary from transient analysis to machine learning but have not provided verifiable accuracy. Here, we detail a model-based approach, that uses statistical models of RF transmitter components: digital-to-analog converter, power amplifier and RF oscillator, which are amenable for analysis. Our proposed approach examines the key device characteristics that cause anonymity loss, countermeasures that can be applied by the nodes to regain the anonymity, and ways of thwarting such countermeasures. We develop identification algorithms based on statistical signal processing methods and address the challenging scenario when the units that need to be distinguished from one another are of the same model and from the same manufacturer. Using simulations and measurements of components that are commonly used in commercial communications systems, we show that our anonymity breaking techniques are effective.
In the second part of the dissertation, we consider innovative approaches for the acquisition of frequency-sparse signals with wide-band receivers when a weak signal of interest is received in the presence of a very strong interference, and the effects of the nonlinearities in the low-noise amplifier at the receiver must be mitigated. All samples with amplitude above a given threshold, dictated by the linear input range of the receiver, are discarded to avoid the distortion caused by saturation of the low noise amplifier. Such a sampling scheme, while avoiding nonlinear distortion that cannot be corrected in the digital domain, poses challenges for signal reconstruction techniques, as the samples are taken non-uniformly, but also non-randomly. The considered approaches fall into the field of compressive sensing (CS); however, what differentiates them from conventional CS is that a structure is forced upon the measurement scheme. Such a structure causes a violation of the core CS assumption of the measurements\u27 randomness. We consider two different types of structured acquisition: signal independent and signal dependent structured acquisition. For the first case, we derive bounds on the number of samples needed for successful CS recovery when samples are drawn at random in predefined groups. For the second case, we consider enhancements of CS recovery methods when only small-amplitude samples of the signal that needs to be recovered are available for the recovery. Finally, we address a problem of spectral leakage due to the limited processing block size of block processing, wide-band receivers and propose an adaptive block size adjustment method, which leads to significant dynamic range improvements
Accelerated deconvolution of radio interferometric images using orthogonal matching pursuit and graphics hardware
Deconvolution of native radio interferometric images constitutes a major computational component of the radio astronomy imaging process. An efficient and robust deconvolution operation is essential for reconstruction of the true sky signal from measured correlator data. Traditionally, radio astronomers have mostly used the CLEAN algorithm, and variants thereof. However, the techniques of compressed sensing provide a mathematically rigorous framework within which deconvolution of radio interferometric images can be implemented. We present an accelerated implementation of the orthogonal matching pursuit (OMP) algorithm (a compressed sensing method) that makes use of graphics processing unit (GPU) hardware, and show significant accuracy improvements over the standard CLEAN. In particular, we show that OMP correctly identifies more sources than CLEAN, identifying up to 82% of the sources in 100 test images, while CLEAN only identifies up to 61% of the sources. In addition, the residual after source extraction is 2.7 times lower for OMP than for CLEAN. Furthermore, the GPU implementation of OMP performs around 23 times faster than a 4-core CPU
Multi-stage Wireless Signal Identification for Blind Interception Receiver Design
Protection of critical wireless infrastructure from malicious attacks has become increasingly important in recent years, with the widespread deployment of various wireless technologies and dramatic growth in user populations. This brings substantial technical challenges to the interception receiver design to sense and identify various wireless signals using different transmission technologies. The key requirements for the receiver design include estimation of the signal parameters/features and classification of the modulation scheme. With the proper identification results, corresponding signal interception techniques can be developed, which can be further employed to enhance the network behaviour analysis and intrusion detection.
In detail, the initial stage of the blind interception receiver design is to identify the signal parameters. In the thesis, two low-complexity approaches are provided to realize the parameter estimation, which are based on iterative cyclostationary analysis and envelope spectrum estimation, respectively. With the estimated signal parameters, automatic modulation classification (AMC) is performed to automatically identify the modulation schemes of the transmitted signals. A novel approach is presented based on Gaussian Mixture Models (GMM) in Chapter 4. The approach is capable of mitigating the negative effect from multipath fading channel. To validate the proposed design, the performance is evaluated under an experimental propagation environment. The results show that the proposed design is capable of adapting blind parameter estimation, realize timing and frequency synchronization and classifying the modulation schemes with improved performances
Secure Wireless Communications Based on Compressive Sensing: A Survey
IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given
On the Processing of Highly Nonlinear Solitarywaves and Guided Ultrasonic Waves for Structural Health Monitoring and Nondestructive Evaluation
The in-situ measurement of thermal stress in civil and mechanical structures may prevent
structural anomalies such as unexpected buckling. In the first half of the dissertation, we present
a study where highly nonlinear solitary waves (HNSWs) were utilized to measure axial stress in
slender beams. HNSWs are compact non-dispersive waves that can form and travel in nonlinear
systems such as one-dimensional chains of particles. The effect of the axial stress acting in a
beam on the propagation of HNSWs was studied. We found that certain features of the solitary
waves enable the measurement of the stress.
In general, most guided ultrasonic waves (GUWs)-based health monitoring approaches
for structural waveguides are based on the comparison of testing data to baseline data. In the
second half of the dissertation, we present a study where some baseline-free signal processing
algorithms were presented and applied to numerical and experimental data for the structural
health monitoring (SHM) of underwater or dry structures. The algorithms are based on one or
more of the following: continuous wavelet transform, empirical mode decomposition, Hilbert
transform, competitive optimization algorithm, probabilistic methods. Moreover, experimental
data were also processed to extract some features from the time, frequency, and joint timefrequency
domains. These features were then fed to a supervised learning algorithm based on
artificial neural networks to classify the types of defect. The methods were validated using the
numerical model of a plate and a pipe, and the experimental study of a plate in water. In
experiment, the propagation of ultrasonic waves was induced by means of laser pulses or
transducer and detected with an array of immersion transducers. The results demonstrated that
the algorithms are effective, robust against noise, and able to localize and classify the damage
- ā¦