MULTITARGET CONSTANT FALSE ALARM RATE DETECTION METHOD BASED ON SIGNAL PROXY

20220308163 · 2022-09-29

    Inventors

    Cpc classification

    International classification

    Abstract

    Disclosed is a multitarget constant false alarm rate detection method based on the signal proxy, which belongs to the technical field of radar constant false alarm rate detection. The method realizes target detection by utilizing the correlation between linear measurements of the radar intermediate frequency signal and the sensing matrix. To achieve a desired false alarm rate, the method determines the threshold by estimating the distributed parameters of the reduced sample set obtained by removing the detected targets from the original sample set. The method provided by the present disclosure can adapt to the sparsity of the signals, realize target detection without relying on the pre-estimated environmental background level, and effectively mitigate the multitarget shadowing effect.

    Claims

    1. A multitarget constant false alarm rate detection method based on the signal proxy, comprising the following steps: S1: inputting an intermediate frequency signal s to be detected, obtaining the linear measurements y of the intermediate frequency signal by using a sensing matrix A, y=As, and solving the signal proxy r, r=A*y; S2: finding an index λ corresponding to a target with the least correlation and outputting a target set Λ, which is specifically carried out in the following way: S2.1: sorting the signal proxies in a descending order to obtain r.sup.d=Sort(r)=custom-charactera.sub.j.sup.d,ycustom-character, j=1,2, . . . , N, where d is a descending order mark, and N is the signal size; S2.2: determining the index of the target with the least correlation λ = arg min j ( .Math. ( n 1 j , n 2 .Math. a j d , y .Math. ) .Math. 2 2 + n 1 .Math. x .Math. 0 ) ,  where n.sub.1=1/N, n.sub.2=1custom-charactera.sub.j.sup.d,ycustom-character, ∥⋅∥.sub.p denotes a norm custom-character.sub.p, namely ∥x∥.sub.p=(Σx.sub.i.sup.p).sup.1/p; S2.3: selecting the index of the top λ largest elements in the signal proxy r to obtain the target set Λ as an output of the signal proxy detector; S3: obtaining the reduced sample {tilde over (x)} by truncating an original background sample x using the target set Λ, modeling the reduced sample {tilde over (x)} in a statistically rigorous way, and determining a value of a scale parameter σ by maximum likelihood estimation; setting an desired false alarm rate P.sub.FA, and calculating a false alarm regulation threshold T.sub.fa; eliminating targets in the target set Λ below T.sub.fa according to the calculated false alarm regulation threshold, and outputting a detection result; where the scale parameter σ and the false alarm regulation threshold T.sub.fa are specifically determined as follows: S3.1: obtaining the reduced sample {tilde over (x)} by eliminating the target set Λ output in step S2 from the original background sample x; S3.2: modeling the reduced sample with truncated Rayleigh distribution f.sub.{tilde over (X)}(x), which satisfies f.sub.{tilde over (X)}(x)=f.sub.X(x≤α), where α denotes a truncation depth; S3.3: determining a likelihood function custom-character(σ|{tilde over (x)}) according to a probability density function of the truncated distribution of the reduced sample: ( σ | x ~ ) = .Math. i = 1 N f X ~ ( x ~ i | σ ) = exp ( - 1 2 σ 2 .Math. i = 1 N x ~ i 2 ) σ 2 N ( 1 - e - α 2 / 2 σ 2 ) N .Math. i = 1 N x ~ i , ( 1 ) calculating an estimated value of the scale parameter {circumflex over (σ)}.sup.2 by a maximum likelihood estimation, ∂ log custom-character(σ|{tilde over (x)})/∂σ.sup.2=0: σ ^ 2 1 2 N .Math. i = 1 N x ~ i 2 + α 2 2 ( e α 2 / 2 σ ^ 2 - 1 ) , ( 2 ) S3.4: according to the relationship between the desired false alarm probability P.sub.FA and a cumulative distribution function F.sub.X(⋅) of X, obtaining the following equation:
    P.sub.FA=1−F.sub.X(T.sub.fa)=e.sup.−T.sup.fa.sup.2.sup./2∂.sup.2.sup.)  (3); S3.5: calculating the false alarm regulation threshold T.sub.fa according to equations (2) and (3):
    T.sub.fa=√{square root over (−2{circumflex over (σ)}.sup.2 log P.sub.FA)}  (4).

    2. The multitarget constant false alarm rate detection method based on the signal proxy according to claim 1, where the signal proxy r in S1 is specifically determined in the following way: S1.1: performing matrix multiplication on the input intermediate frequency signal s and the sensing matrix A, s∈custom-character.sup.N×1, A∈custom-character.sup.n+N to obtain the linear measurements of the intermediate frequency signal, y=As, where the sensing matrix A is a random Gaussian measurement matrix, A=(a.sub.1, a.sub.2, . . . , a.sub.N); S1.2: obtaining the signal proxy r of the linear measurements y for the sensing matrix A, r=A*y, where the signal proxy reflects the energy intensity of the target and the clutter.

    Description

    BRIEF DESCRIPTION OF DRAWINGS

    [0027] In order to more clearly explain the examples of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the examples or the prior art will be briefly introduced below.

    [0028] FIG. 1 is a schematic diagram of a multitarget scene of a preferred embodiment of the present disclosure.

    [0029] FIG. 2 is a flow diagram of a multitarget constant false alarm rate detection method based on the signal proxy.

    [0030] FIG. 3 is the comparison results between the performance of the method of the present disclosure and the upper bound and the performance of the existing CFAR detection method.

    DESCRIPTION OF EMBODIMENTS

    [0031] The purpose and effect of the present disclosure will become more explicit from the following detailed description of the present disclosure according to the drawings and preferred embodiments. It should be appreciated that the specific embodiments described here are only used to explain, rather than to limit the present disclosure.

    [0032] The multitarget constant false alarm rate detection method based on the signal proxy provided by the present disclosure can effectively reduce the degradation of the radar detection performance caused by the multitarget shadowing effect in the multitarget scene, and achieve a constant false alarm rate through adaptively determined false alarm regulation threshold.

    [0033] As shown in FIG. 1, in a multitarget scene, a millimeter-wave radar operating in the range of 76-81 GHz is used as a target detection sensor and ten radar reflectors with the same size are used as targets. The multitarget constant false alarm rate detection method based on the signal proxy is deployed in the radar system.

    [0034] As shown in FIG. 2, the linear measurements of the radar intermediate frequency signal y is obtained and the signal proxy r is calculated in step S1, and they are both complex vectors with the size of 1024. In step S2, the index λ of the target with the least correlation is determined to be 17, and the target index set is output as [42;43;48;49;50;51;76;77;78;80;81;82;94;97;114;119;129]. In step S3, the reduced sample {tilde over (x)} is obtained, and the false alarm regulation threshold T.sub.fa is determined to be 2.2653×10.sup.4. Then, the targets below the regulation threshold are eliminated, and finally the detection results are output as [42,50,73,76,81,94,97,114,119,129].

    [0035] FIG. 3 is a comparison of Receiver Operating Characteristic (ROC) curves of various detection methods in the test scene. The results show that the detection performance of the method of the present disclosure is superior to the existing CFAR detection method and is close to the upper bound performance, indicating that the CFAR detection method proposed in this application can effectively mitigate the multitarget shadowing effect and achieves robust detection performance in multitarget scenes.

    [0036] It can be appreciated by those skilled in the art that the above description is only the preferred examples of the present disclosure, and is not used to limit the present disclosure. Although the present disclosure has been described in detail with reference to the foregoing examples, those skilled in the art can still modify the technical solutions described in the foregoing examples or replace some of their technical features equivalently. Within the spirit and principle of the present disclosure, the modifications, equivalent replacements and the like shall fall within the scope of protection of the present disclosure.