565 research outputs found

    Efficient Raw Signal Generation Based on Equivalent Scatterer and Subaperture Processing for SAR with Arbitrary Motion

    Get PDF
    An efficient SAR raw signal generation method based on equivalent scatterer and subaperture processing is proposed in this paper. It considers the radar’s motion track, which can obtain the precise raw signal for the real SAR. First, the imaging geometry with arbitrary motion is established, and then the scene is divided into several equidistant rings. Based on the equivalent scatterer model, the approximate expression of the SAR system transfer function is derived, thus each pulse’s raw signal can be generated by the convolution of the transmitted signal and system transfer function, performed by the fast Fourier transform (FFT). To further improve the simulation efficiency, the subaperture and polar subscene processing is used. The system transfer function of pluses for the same subaperture is calculated simultaneously by the weighted sum of all subscenes’ equivalent backscattering coefficient in the same equidistant ring, performed by the nonuniform FFT (NUFFT). The method only involves the FFT, NUFFT and complex multiplication operations, which means the easier implementation and higher efficiency. Simulation results are given to prove the validity of this method

    A review of synthetic-aperture radar image formation algorithms and implementations: a computational perspective

    Get PDF
    Designing synthetic-aperture radar image formation systems can be challenging due to the numerous options of algorithms and devices that can be used. There are many SAR image formation algorithms, such as backprojection, matched-filter, polar format, Range–Doppler and chirp scaling algorithms. Each algorithm presents its own advantages and disadvantages considering efficiency and image quality; thus, we aim to introduce some of the most common SAR image formation algorithms and compare them based on these two aspects. Depending on the requisites of each individual system and implementation, there are many device options to choose from, for in stance, FPGAs, GPUs, CPUs, many-core CPUs, and microcontrollers. We present a review of the state of the art of SAR imaging systems implementations. We also compare such implementations in terms of power consumption, execution time, and image quality for the different algorithms used.info:eu-repo/semantics/publishedVersio

    Synthetic Aperture Radar (SAR) data processing

    Get PDF
    The available and optimal methods for generating SAR imagery for NASA applications were identified. The SAR image quality and data processing requirements associated with these applications were studied. Mathematical operations and algorithms required to process sensor data into SAR imagery were defined. The architecture of SAR image formation processors was discussed, and technology necessary to implement the SAR data processors used in both general purpose and dedicated imaging systems was addressed

    A NEW CONICAL-TRAJECTORY POLAR FORMAT ALGORITHM FOR SPOTLIGHT BISTATIC SAR

    Get PDF
    Abstract-The Polar Format Algorithm (PFA) is suitable for spotlight synthetic aperture radar (SAR) image focusing either in monostatic or bistatic cases. The classic linear-trajectory PFA complete data correction in wavenumber domain, converting data from the polar format to the rectangular format. However, the twodimension processing (either using interpolation or chirp-z transform) introduces heavy computational load, which limits its real-time applications. This study presents a conical-trajectory PFA for bistatic SAR, in which the transmitter and receiver are designed to fly on conical surfaces, to simplify image formation procedures via eliminating the necessity of range processing. Moreover, the conicaltrajectory PFA provides a space-invariant range resolution to simplify the SAR image comprehension. A spotlight forward-looking bistatic missile guidance application was simulated for the algorithm validation and performance analysis

    Synthetic Aperture Techniques for Sonar Systems

    Get PDF
    Today a good percentage of our planet is known and well mapped. Synthetic aperture techniques used in space and airborne systems has greatly aided to obtain this information. Nevertheless our planet is mostly covered by water and the level of detail of knowledge about this segment is still very far away from that of the land segment

    Fast computation of the ambiguity function and the Wigner distribution on arbitrary line segments

    Get PDF
    By using the fractional Fourier transformation of the time-domain signals, closed-form expressions for the projections of their auto or cross ambiguity functions are derived. Based on a similar formulation for the projections of the auto and cross Wigner distributions and the well known two-dimensional (2-D) Fourier transformation relationship between the ambiguity and Wigner domains, closed-form expressions are obtained for the slices of both the Wigner distribution and the ambiguity function. By using discretization of the obtained analytical expressions, efficient algorithms are proposed to compute uniformly spaced samples of the Wigner distribution and the ambiguity function located on arbitrary line segments. With repeated use of the proposed algorithms, samples in the Wigner or ambiguity domains can be computed on non-Cartesian sampling grids, such as polar grids

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones Científicas y Técnica

    Investigation of Non-coherent Discrete Target Range Estimation Techniques for High-precision Location

    Get PDF
    Ranging is an essential and crucial task for radar systems. How to solve the range-detection problem effectively and precisely is massively important. Meanwhile, unambiguity and high resolution are the points of interest as well. Coherent and non-coherent techniques can be applied to achieve range estimation, and both of them have advantages and disadvantages. Coherent estimates offer higher precision but are more vulnerable to noise and clutter and phase wrap errors, particularly in a complex or harsh environment, while the non-coherent approaches are simpler but provide lower precision. With the purpose of mitigating inaccuracy and perturbation in range estimation, miscellaneous techniques are employed to achieve optimally precise detection. Numerous elegant processing solutions stemming from non-coherent estimate are now introduced into the coherent realm, and vice versa. This thesis describes two non-coherent ranging estimate techniques with novel algorithms to mitigate the instinct deficit of non-coherent ranging approaches. One technique is based on peak detection and realised by Kth-order Polynomial Interpolation, while another is based on Z-transform and realised by Most-likelihood Chirp Z-transform. A two-stage approach for the fine ranging estimate is applied to the Discrete Fourier transform domain of both algorithms. An N-point Discrete Fourier transform is implemented to attain a coarse estimation; an accurate process around the point of interest determined in the first stage is conducted. For KPI technique, it interpolates around the peak of Discrete Fourier transform profiles of the chirp signal to achieve accurate interpolation and optimum precision. For Most-likelihood Chirp Z-transform technique, the Chirp Z-transform accurately implements the periodogram where only a narrow band spectrum is processed. Furthermore, the concept of most-likelihood estimator is introduced to combine with Chirp Z-transform to acquire better ranging performance. Cramer-Rao lower bound is presented to evaluate the performance of these two techniques from the perspective of statistical signal processing. Mathematical derivation, simulation modelling, theoretical analysis and experimental validation are conducted to assess technique performance. Further research will be pushed forward to algorithm optimisation and system development of a location system using non-coherent techniques and make a comparison to a coherent approach
    • …
    corecore