Выделить слова: 


Патент США №

8232908

Автор(ы)

Sathyendra

Дата выдачи

31 июля 2012 г.


Inverse synthetic aperture radar image processing



РЕФЕРАТ

According to one embodiment, inverse synthetic aperture radar (ISAR) image processing includes receiving an ISAR image from an inverse synthetic aperture radar. A standard deviation profile is generated from the ISAR image, where the standard deviation profile represents a standard deviation of the ISAR image. The standard deviation profile is normalized to form a normalized standard deviation profile. A mean value profile is generated from the ISAR image, where the mean value profile represents a mean value deviation of the ISAR image. The mean value profile is normalized to form a normalized mean value profile. The normalized standard deviation profile and the normalized mean value profile are combined to form a sum normalized range profile. The sum normalized range profile may be processed to classify a target in the ISAR image.


Авторы:

Harsha M. Sathyendra (McKinney, TX)

Заявитель:

Raytheon Company (Waltham, MA)

ID семейства патентов

41724552

Номер заявки:

12/489,909

Дата регистрации:

23 июня 2009 г.

Отсылочные патентные документы США


Application NumberFiling DatePatent NumberIssue Date
61133362Jun., 2008

Класс патентной классификации США:

342/25F

Класс международной патентной классификации (МПК):

G01S 13/90

Класс совместной патентной классификации:

G01S 7/295 (20130101); G01S 7/411 (20130101); G01S 13/9035 (20130101); G06K 9/6298 (20130101); G01S 2013/9064 (20130101)

Область поиска:

342/25F,25R,90

Использованные источники

[Referenced By]

Патентные документы США

6337654January 2002Richardson et al.
6437728August 2002Richardson et al.
6987560January 2006Morgan et al.
7289060October 2007Abatzoglou et al.

Другие источники


PCT, Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration, International Application No. PCT/US2009/048391, 11 pages, Jun. 7, 2010. cited by other .
Frank E. McFadden and Scott A. Musman, "Optimizing Ship Length Estimates from ISAR Images", Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN '00), 6 pages, Jul. 2000. cited by other .
European Patent Office; Communication pursuant to Article 94(3) EPC; Application No. 09 801 327.9-1248; 5 pages, Jul. 5, 2011. cited by other.

Главный эксперт: Lobo; Ian
Уполномоченный, доверенный или фирма: Christie, Parker & Hale, LLP

Текст решения-прецедента





РОДСТВЕННАЯ ЗАЯВКА



This application claims benefit under 35 U.S.C. .sctn.119(e) of U.S. Provisional Application Ser. No. 61/133,362, entitled "INVERSE SYNTHETIC APERTURE RADAR IMAGE PROCESSING SYSTEM,", filed Jun. 26, 2008.

ФОРМУЛА ИЗОБРЕТЕНИЯ



What is claimed:

1. A method comprising: operating an interface to receive an inverse synthetic aperture radar image from an inverse synthetic aperture radar; operating one or more components to: generate a standard deviation profile from the image, the standard deviation profile representing a standard deviation of the image; normalize the standard deviation profile to form a normalized standard deviation profile; generate a mean value profile from the image, the mean value profile representing a mean value deviation of the image; normalize the mean value profile to form a normalized mean value profile; and combine the normalized standard deviation profile and the normalized mean value profile to form a sum normalized range profile.

2. The method of claim 1, further comprising operating the one or more components to: determine an aspect angle of a target of the image; determine an apparent length of the target from the sum normalized range profile; and determine an actual length of the target from the apparent length and the aspect angle.

3. The method of claim 1, further comprising operating the one or more components to determine an apparent length of a target of the image from the sum normalized range profile by: isolating one or more noise regions from the sum normalized range profile according to an initial threshold.

4. The method of claim 1, further comprising operating the one or more components to determine an apparent length of a target of the image from the sum normalized range profile by: determining a plurality of intensity values of a plurality of points of the sum normalized range profile; and selecting a subset of the plurality of points according to the intensity values.

5. The method of claim 1, further comprising operating the one or more components to determine an apparent length of a target of the image from the sum normalized range profile by: identifying a plurality of refined range bins according to a plurality of intensity values of a plurality of points of the sum normalized range profile; identifying a plurality of peak range bins of a plurality of peak values of the sum normalized range profile; and determining one or more candidate range bin intervals according to the refined range bins and peak range bins.

6. The method of claim 1, further comprising operating the one or more components to determine an apparent length of a target of the image from the sum normalized range profile by: identifying a candidate range bin interval with the largest number of detections as the bin of the target.

7. The method of claim 1, further comprising operating the one or more components to determine an apparent length of a target of the image from the sum normalized range profile by: determining a first apparent length using a conservative iterated threshold; determining a second apparent length using a non-conservative iterated threshold; and determining the apparent length according to the first apparent length and the second apparent length.

8. The method of claim 1, further comprising operating the one or more components to: determine a length of a target of the image from the sum normalized range profile; and classify the target according to the determined length.

9. A system comprising: an interface operable to: receive an inverse synthetic aperture radar image from an inverse synthetic aperture radar; and one or more components operable to: generate a standard deviation profile from the image, the standard deviation profile representing a standard deviation of the image; normalize the standard deviation profile to form a normalized standard deviation profile; generate a mean value profile from the image, the mean value profile representing a mean value deviation of the image; normalize the mean value profile to form a normalized mean value profile; and combine the normalized standard deviation profile and the normalized mean value profile to form a sum normalized range profile.

10. The system of claim 9, the one or more components further operable to: determine an aspect angle of a target of the image; determine an apparent length of the target from the sum normalized range profile; and determine an actual length of the target from the apparent length and the aspect angle.

11. The system of claim 9, the one or more components further operable to determine an apparent length of a target of the image from the sum normalized range profile by: isolating one or more noise regions from the sum normalized range profile according to an initial threshold.

12. The system of claim 9, the one or more components further operable to determine an apparent length of a target of the image from the sum normalized range profile by: determining a plurality of intensity values of a plurality of points of the sum normalized range profile; and selecting a subset of the plurality of points according to the intensity values.

13. The system of claim 9, the one or more components further operable to determine an apparent length of a target of the image from the sum normalized range profile by: identifying a plurality of refined range bins according to a plurality of intensity values of a plurality of points of the sum normalized range profile; identifying a plurality of peak range bins of a plurality of peak values of the sum normalized range profile; and determining one or more candidate range bin intervals according to the refined range bins and peak range bins.

14. The system of claim 9, the one or more components further operable to determine an apparent length of a target of the image from the sum normalized range profile by: identifying a candidate range bin interval with the largest number of detections as the range bin interval of the target.

15. The system of claim 9, the one or more components further operable to determine an apparent length of a target of the image from the sum normalized range profile by: determining a first apparent length using a conservative iterated threshold; determining a second apparent length using a non-conservative iterated threshold; and determining the apparent length according to the first apparent length and the second apparent length.

16. The system of claim 9, the one or more components further operable to: determine a length of a target of the image from the sum normalized range profile; and classify the target according to the determined length.

17. A method comprising: operating an interface to receive an inverse synthetic aperture radar image from an inverse synthetic aperture radar; operating one or more components to: generate a standard deviation profile from the image, the standard deviation profile representing a standard deviation of the image; generate a mean value profile from the image, the mean value profile representing a mean value deviation of the image; determine a sum normalized range profile using the standard deviation profile and the mean value profile; determine an aspect angle of a target of the image; determine an apparent length of the target from the sum normalized range profile; and determine an actual length of the target from the apparent length and the aspect angle.

18. The method of claim 17, wherein the operating the one or more components to determine the apparent length of the target from the sum normalized range profile further comprising operating the one or more components to: determine a plurality of intensity values of a plurality of points of the sum normalized range profile; and select a subset of the plurality of points according to the intensity values.

19. The method of claim 17, wherein the operating the one or more components to determine the apparent length of the target from the sum normalized range profile further comprising operating the one or more components to: identify a plurality of refined range bins according to a plurality of intensity values of a plurality of points of the sum normalized range profile; identify a plurality of peak range bins of a plurality of peak values of the sum normalized range profile; and determine one or more candidate range bin intervals according to the refined range bins and peak range bins.

20. The method of claim 17, wherein the operating the one or more components to determine the apparent length of the target from the sum normalized range profile further comprising operating the one or more components to: identify a candidate range bin interval with the largest number of detections as the range bin interval of the target.


ОПИСАНИЕ



TECHNICAL FIELD OF THE DISCLOSURE

This disclosure generally relates radar systems, and more particular to inverse synthetic aperture radar image processing.

BACKGROUND OF THE DISCLOSURE

An inverse synthetic aperture radar (ISAR) generates images of moving targets by rotating the targets and processing the Doppler histories of the scattering centers. Inverse synthetic aperture radars may be utilized in maritime surveillance for the classification of ships and other objects. The images may be processed to enhance the quality of the images.

SUMMARY OF THE DISCLOSURE

According to one embodiment, inverse synthetic aperture radar (ISAR) image processing includes receiving an ISAR image from an inverse synthetic aperture radar. A standard deviation profile is generated from the ISAR image, where the standard deviation profile represents a standard deviation of the ISAR image. The standard deviation profile is normalized to form a normalized standard deviation profile. A mean value profile is generated from the ISAR image, where the mean value profile represents a mean value deviation of the ISAR image. The mean value profile is normalized to form a normalized mean value profile. The normalized standard deviation profile and the normalized mean value profile are combined to form a sum normalized range profile.

Certain embodiments of the disclosure may provide numerous technical advantages. In certain embodiments, a sum normalized range profile of an ISAR image takes into account the high mean values and high variance of peak scatterers of a target. The sum normalized range profile may be processed to classify a target in the ISAR image. The classification may provide more accurate target edge detection and length calculation, and may isolate more pertinent features.

Certain embodiments may benefit from some, none, or all of these advantages. Other technical advantages may be readily ascertained by one of ordinary skill in the art.


КРАТКОЕ ОПИСАНИЕ РИСУНКОВ



A more complete understanding of embodiments of the disclosure will be apparent from the detailed description taken in conjunction with the accompanying drawings in which:

FIG. 1 illustrates one embodiment of an ISAR processing system that may classify a target using a sum normalized range profile (SNRP) derived from an ISAR image;

FIG. 2 illustrates one embodiment of an image converter system that may be used to generate the sum normalized range profile;

FIG. 3 illustrates one embodiment of a threshold calculator that may be used with the apparent length calculator of FIG. 1;

FIG. 4 illustrates one embodiment of a feature extractor system that may be used with the apparent length calculator of FIG. 1;

FIGS. 5A through 5F illustrate embodiments of components that may be used by the apparent length calculator of FIG. 1;

FIG. 6 is a graph illustrating an approximate probability of detection for apparent length estimation as a function of signal-to-noise ratio (SNR) and probability of false alarms;

FIG. 7 is a graph illustrating a percent deviation from true length as a function of target endpoints for examples using sum normalized range profiles and examples using A-scan profiles; and

FIG. 8 illustrates example comparisons of length calculation using a sum normalized range profile versus using a normalized A-scan profile.


ПОДРОБНОЕ ОПИСАНИЕ ПРИМЕРА ВАРИАНТА ОСУЩЕСТВЛЕНИЯ



FIG. 1 illustrates one embodiment of an ISAR processing system 28 that may classify a target using a sum normalized range profile (SNRP) derived from an ISAR image obtained by an inverse synthetic aperture radar 24. The sum normalized range profile takes into account the high mean values and high variance of peak scatterers of a target. The sum normalized range profile may be processed to determine target characteristics.

In certain embodiments, ISAR processing system 28 receives an ISAR image from an inverse synthetic aperture radar 24. Radar 24 generates images of moving targets by transmitting radar signals toward a target, which reflects the signals. The target may be any suitable object that can reflect signals, such as a water, terrestrial, or airborne vehicle (for example, a ship, automobile, or airplane). Radar 24 then detects the reflected signals and generates an ISAR image from the detected signals.

In certain embodiments, radar 24 may use video phase history (VPH) and auxiliary (AUX) data to generate an ISAR image. The video phase history data represents complex in-phase and quadrature-phase (I/Q) data with axes of range bins versus rasters (or pulses). A two-dimensional raw ISAR image can be obtained by taking a two-dimensional range-Doppler Fast Fourier Transform (FFT) on the video phase history data. Auxiliary data tracks radar motion.

In certain embodiments, an ISAR image may be plotted on Doppler versus range axes. The range axis may better represent apparent lengths seen by radar 24. Different points of a rotating target have different line of sight (LOS) velocities towards radar 24, and thus yield different Doppler shifts. Accordingly, the Doppler axis might not provide height measurements as accurate as the length measurements provided by the range axis.

In certain embodiments, ISAR processing system 28 includes components such as a target tracker 29, an aspect angle calculator 30, an image converter 32, an apparent length calculator 34, an actual length calculator 36, and a target classifier 38. In operation, target tracker 29 tracks the position of the target. Aspect angle calculator 30 determines the aspect angle of the target. Image converter 32 adjusts the image from an ISAR format to a format compatible with apparent length calculator 34. Apparent length calculator 34 determines the apparent length of the target. Actual length calculator 36 determines an actual length (or true length) of the target from the aspect angle and the apparent length.

Aspect angle calculator 30 determines the aspect angle of the target in any suitable manner. In certain embodiments, the aspect angle of a target may be defined as the angle between the longitudinal axis of the target and the radar line of sight (LOS) towards the target. The radar line of sight may be determined from an azimuth tracker.

Aspect angle calculator 30 may determine the aspect angle from consecutive target point locations. Any suitable number of target point locations (such as three, four, or five locations) in any suitable coordinate system (such as in a North-East Down (NED) coordinate system) may be used. The target point locations may be taken at a rate that is longer than (for example, four, five, or six times longer than) the update image refresh rate to minimize fleeting fluctuations of the azimuth tracker. Aspect angle calculator 30 may utilize a Least-Squares (LS) fit to find a two-dimensional linear fit for the points to determine the longitudinal angle. Aspect angle calculator 30 may then determine the aspect angle from the longitudinal angle.

In certain situations, the value of the aspect angle affects the error of the length measurement. Aspect angles of 0<.theta.<10 degrees (even with relatively poor azimuth tracking) may yield errors of +10 degrees, which in turn may yield length errors of at most 5 percent. Aspect angles of 10<.theta.<45 degrees may yield length errors of at most approximately 10 percent. In certain situations, the aspect angles may be restricted to 0<.theta.<45 degrees.

Image converter 32 adjusts the image from an ISAR format to a format compatible with apparent length calculator 34. Apparent length calculator 34 determines an apparent length of the target from the image. The apparent length may be the length of a target as the target appears in an image, without taking into account the aspect angle of the target. Operations performed by apparent length calculator 34 are described in more detail with reference to FIGS. 3 through 5F.

Actual length calculator 36 determines an actual length (or true length) of the target from the aspect angle and the apparent length. The actual length of a target may be a length measurement of the target that takes into account the aspect angle of the target. In certain embodiments, the actual length True_length may be calculated from the apparent length Apparent_length L.sub.a and the aspect angle Aspect_angle .theta. according to the formula:

.function..ident..function..theta. ##EQU00001##

Target classifier 38 classifies the target according to properties of the target, such as the actual length of the target. In certain embodiments, target classifier 38 extracts features (such as peaks) from the sum normalized range profile to identify one or more properties of the target, and determines if the properties of the target matches one or more properties of a known object. For example, the target may be a ship. If the actual length of the target is greater than 200 feet, then the target may be classified as a combatant ship.

In certain embodiments, target classifier 38 may request further information if a target cannot be classified. For example, large commercial liners, such as cruise ships, may be as long as combatants. Target classifier 38 may request additional details about the target, such as a flat upper surface indicating that the ship may be an aircraft carrier.

In certain embodiments, features of the sum normalized range profile may be used with more complex mapping techniques, such as Gaussian Mixture Models or Neural Network based classifiers for automatic target recognition purposes.

FIG. 2 illustrates one embodiment of image converter system 32 that may be used with apparent length calculator 34 of FIG. 1. In certain embodiments, ISAR image converter system 32 includes a plurality of components, such as a squaring module 12, an absolute value module 14, a standard deviation calculator 16, a mean value calculator 18, normalization modules 20 and 22, and a combiner 24. In operation, image converter system 32 receives one or more ISAR images from inverse synthetic aperture radar 24 through an interface. Standard deviation calculator 16 and normalization module 20 generate a normalized standard deviation profile from the ISAR image. Mean value calculator 18 and normalization module 22 generate a normalized mean profile from the ISAR image. Combiner 24 then combines the normalized standard deviation profile with the normalized mean profile to yield a sum normalized range profile.

Standard deviation calculator 16 generates a standard deviation profile from an ISAR image. The standard deviation profile represents a standard deviation of the image. The standard deviation profile may be generated in any suitable manner. In certain embodiments, standard deviation calculator 16 may yield a standard deviation over the Doppler for specific range bins at a time, associated with the |(ISAR_image.sup.2)|, where ISAR_image represents the pixel intensity values of the ISAR image, resulting in a one-dimensional vector. Normalization module 20 normalizes the standard deviation profile in any suitable manner to form a normalized standard deviation profile.

Mean value calculator 18 generates a mean value profile from the image. The mean value profile representing a mean value deviation of the image. In certain embodiments, mean value calculator 18 may yield a mean over the Doppler for specific range bins at a time, associated with the |(ISAR_image.sup.2)|, where ISAR_image represents the pixel intensity values of the ISAR image, resulting in a one-dimensional vector. Normalization module 22 normalizes the mean value profile in any suitable manner to form a normalized mean value profile.

Combiner 24 combines the normalized standard deviation value with the normalized mean value to yield a sum normalized range profile. The sum normalized range profile can be thought of a sum of two different distributions: one from the means and one from the standard deviations of the exponentials. The profile may capture the high mean values and high variance (that is, the square of the standard deviation (std)) values of the peak scatterers of a target. The sum normalized range profile may be used by ISAR processing system 28 to determine the true length of a target. The sum normalized range profile represents the first order and second order statistics of a two-dimensional ISAR image in a one-dimensional sum normalized range profile vector.

In certain examples of operation, the following may be performed. In the examples, the mean .mu. can be expressed as a normalized discrete sum of the distribution points:

.mu..times..function. ##EQU00002## where N represents the range bins in the distribution, and f(x=x.sub.i) represents the distribution along the Doppler axis for the exponential pixel-squared values for a particular range bin i. This yields a Gamma distribution scaled by 1/N, whereby the scale factor does not change the distribution type.

In the examples, the sums of the standard deviations of the exponentials may be described as follows. The variance Var of a random process Z made up of M independent identically distributed random variables X.sub.i is:

.function..times..function. ##EQU00003## There are no covariance terms due to the assumption of independence. The standard deviation std is:

.function..times..function. ##EQU00004## The resulting distribution has Gamma type properties.

Normalization may be performed after determining the mean and standard deviation distributions. To simplify the calculations, normalization closely matches the rate parameters of the Gamma distributions, where rate is the inverse of the scale parameters.

In certain embodiments, profile U may be expressed as U=X.sub.1+X.sub.2, where X.sub.1 and X.sub.2 are Gaussian distributions of the normalized standard deviation and mean distributions, X.sub.1.about..GAMMA.(b.sub.1,c), X.sub.2.about..GAMMA.(b.sub.2,c), .GAMMA. represents a Gamma distribution, b.sub.i represents the shape parameter for distribution i, and c represents a rate parameter. If auxiliary random variables are u=x.sub.1+x.sub.2 and v=v, then the solutions to this equation are at x.sub.1=uv and x.sub.2=u-uv=u(1-uv). The Jacobian magnitude is:

.function..delta..times..times..delta..times..times..delta..times..times.- .delta..times..times..delta..times..times..delta..times..times..delta..tim- es..times..delta..times..times. ##EQU00005##

In certain examples, independence may be assumed:

.function..GAMMA..function..times.e.function. ##EQU00006## Then: g(u,v)dudv=f(x.sub.1,x.sub.2)dx.sub.1dx.sub.2=f(x.sub.1,x.sub.2)ududv=f(x- .sub.1)f(x.sub.2)ududv.

The marginal probability density function (pdf) may be found using:

.function..times..function..times..intg..infin..infin..times..function..t- imes.d.times..intg..infin..infin..times..function..function..times.d.times- ..intg..infin..times.e.times..GAMMA..function.e.times..GAMMA..function..ti- mes.d.times..intg..infin..times.e.GAMMA..function..GAMMA..function..times.- d.times..intg..infin..times..GAMMA..function..GAMMA..function..GAMMA..func- tion..GAMMA..function.eee.times.d ##EQU00007## where

.GAMMA..function..intg..infin..times.e.times.d ##EQU00008## The latter equation shows the benefits of using mixed notations for this derivation:

.GAMMA..function..intg..infin..times.e.times.d ##EQU00009##

The pdf of the sum normalized range profile is:

.function.e.GAMMA..function. ##EQU00010## The mean for the distribution is:

.mu..function..function..times. ##EQU00011## The standard deviation for the distribution, due to independence, is:

.sigma..function..function. ##EQU00012## Accordingly, threshold T=.mu.+k.sigma. can be applied.

FIG. 3 illustrates one embodiment of a threshold calculator 40 that may be used with apparent length calculator 34 of FIG. 1. In certain embodiments, the most likely noise values may be isolated before applying a threshold technique. In the embodiments, an initial iterative loop may use an initial threshold to isolate the noise regions.

In certain embodiments, threshold calculator 40 includes an initial threshold T.sub.0 generator 70, a below initial threshold filter 72, a median operator 74, an initial threshold error calculator 76, an above initial threshold error filter 78, a below initial threshold error filter 80, and a threshold output 82. Initial threshold generator 70 determines an initial threshold from a sum normalized range profile. Below threshold filter 72 selects points of the sum normalized range profile that are below the threshold, and median operator 74 takes the median for the selected points. Initial threshold error calculator 76 calculates the error of the initial threshold. Above error threshold filter 78 returns points that are above the error threshold to threshold calculator 70. Below error threshold 80 selects points that are below the error threshold. Threshold output 82 outputs the threshold 84.

In certain embodiments, the In-phase (I) and Quadrature (Q) components can be assumed to be independent. Also, their respective noisy distributions may be regarded as Gaussian, each with a distribution N(.mu.,.sigma..sup.2), where .mu. represents the mean and .sigma..sub.2 represents the variance. The target may be assumed to be isolated with only background noise to contend with for recognition purposes.

If the means for the independent I and Q data are zero, Jacobian transformations can be used to show the square-root envelope detector {square root over (I.sup.2+Q.sup.2)} has a Rayleigh distribution. Each distribution for i,q.epsilon. has the pdf form:

.function..times..pi..times..times..sigma..times..function..times..times.- .sigma. ##EQU00013## .function..times..times..pi..times..times..sigma..times..function..times.- .times..sigma. ##EQU00013.2## The joint distribution for i,q.epsilon. is:

.function..times..pi..times..times..sigma..times..function..times..times.- .sigma. ##EQU00014##

In certain embodiments, polar coordinate conversions r= {square root over (i.sup.2+q.sup.2)} and

.theta..function. ##EQU00015## (where .theta. is an uniform distributed random variable from [-.pi.,.pi.]) may be used. The recognized solution is i=r cos(.theta.) and q=r sin(.theta.). The Jacobian magnitude yields:

.function..theta..delta..times..times..delta..times..times..delta..times.- .times..delta..times..times..theta..delta..times..times..delta..times..tim- es..times..delta..times..times..delta..theta..function..theta..times..time- s..function..theta..function..theta..times..times..times..times..theta. ##EQU00016## Thus, for 0<r<.infin. and |.theta.|<.pi.:

.times..times..theta..function..theta..function..times..pi..times..times.- .sigma..times..function..times..sigma. ##EQU00017## Independence yields:

.theta..function..theta..times..pi..times..times..times..times..times..th- eta.<.pi. ##EQU00018## ##EQU00018.2## .function..sigma..times..function..times..sigma..times..times..times..tim- es.<<.infin. ##EQU00018.3## Function f.sub.R(r) is a Rayleigh random variable with parameter .sigma..sup.2. Accordingly, each ISAR image pixel can be approximated as a Rayleigh random variable.

In certain embodiments, the ISAR image can be subsequently squared to convert the Rayleigh random variables to exponential random variables. In the embodiments, an exponential random variable has pdf f.sub.X(x)=.lamda.exp(-.lamda.x), where .lamda.represents a rate parameter. In other embodiments,

.beta..lamda. ##EQU00019## where .beta. represents the scale parameter, may be used. The transformation of the exponential form to the Rayleigh form is of the form

.times..lamda..times..lamda..times..times..lamda. ##EQU00020## In this case:

dd.lamda..lamda..times..lamda. ##EQU00021## Thus:

.function..times.dd.function..times..lamda..times..lamda..function..lamda- ..times..lamda..times..lamda..lamda..lamda..function..lamda..times. ##EQU00022## The final substitution of

.lamda..sigma. ##EQU00023## yields:

.function..sigma..times..function..times..sigma. ##EQU00024##

Performing the reverse process, after the squaring in the image conversion process, the pixels represent exponential random variables. In some cases, the inverse synthetic aperture radar process converts the image to real intensity values (such as values 0-255). Accordingly, taking the absolute value may not be required.

FIG. 4 illustrates one embodiment of a feature extractor system 42 that may be used with apparent length calculator 34 of FIG. 1. In certain embodiments, feature extractor system 42 includes a plurality of components, such as a threshold determiner 84, a below threshold filter 86, an above threshold filter 88, a isolated point refiner 44, a feature extractor 46, an intervals locator 48, a combat shadowing effects module 50, and a target region isolator 52.

In certain embodiments, feature extractor system 42 may identify one or more range bins that correspond to a target. In the embodiments, refined range bins may be identified according to intensity values of points of the sum normalized range profile. Range bins associated with peak values of the sum normalized range profile may be identified. One or more candidate range bin intervals may be determined from the refined range bins and peak range bins. A candidate range bin interval with the largest number of detections may be identified as the range bin interval of the target.

Isolated point refiner 44 determines points of interest, that is, points corresponding to the target, from points that are not of interest, such as points of a false alarm (FA), a clutter patch, or another target. In certain embodiments, isolated point refiner 44 performs a series of refining stages to remove points that are not of interest. In certain embodiments, isolated point refiner 44 may select points of interest of the sum normalized range profile according to intensity values of the points.

In certain embodiments, isolated point refiner 44 receives points (range bin values) that satisfy threshold T. For each point, intensity values of +/-N range bins are averaged to attain an upper and lower intensity value for the point. In certain embodiments, if either the upper or lower intensity value crosses another predetermined threshold, the associated point is deemed a potential target range bin.

In certain embodiments, intervals locator 48 is used to determine target regions from the separation among selected range bin values. If the separation between successive range bin values is greater than a threshold, the range bin values are flagged as an end and start of a new target region. In certain embodiments, isolated point refiner 44 and intervals locator 48 yield refined range bin intervals that may correspond to one or more targets.

Feature extractor 46 and combat shadowing effects module 50 may be used to reduce shadowing effects. Inverse synthetic aperture radars may exhibit a problem known as shadowing in which a single target may be depicted in the derived ISAR image as two or more targets. Shadowing may lead to an underestimation of the target length.

Feature extractor 46 extracts features from the sum normalized range profile. In certain embodiments, feature extractor 46 may isolate the top peak sum normalized range profile values and corresponding peak range bins. The top 15 to 25 percent, such as the 20 percent, values may be isolated.

Combat shadowing effects module 50 determines candidate range bin intervals from the peak range bins and the refined range bins. The top peak range bin interval from feature extractor 46 should be encompassed within at least one of the range bin intervals from isolated point refiner 44. If they do not, combat shadowing effects module 50 performs a subsequent fill of range bins to allow the bins to encompass the range bin interval from isolated point refiner 44. For example, the candidate range bin intervals from 48 may be [100 145], [160 230], and [250 280], and top percentage peaks may occur in range bin intervals [130 190]. The subsequent fill after 50 may yield candidate target range interval regions of [100 230] and [250 280].

Target region isolator 52 isolates the target region. In certain embodiments, target region isolator 52 determines the quantity of detections (with respect to the first threshold value T) inside the candidate range bin intervals from combat shadowing effects 50. The range bin interval with the largest number of detections is denoted as the target range bin interval. In the example, more detections were seen in interval [100 230] than in [250 280], thus the remaining range bin interval after 52 is [100 230], which yields an apparent target length (in range bin units) of L.sub.a=130.

FIGS. 5A through 5F illustrate embodiments of components that may be used by apparent length calculator 34 of FIG. 1. FIG. 5A illustrates an input/output schematic for an initial threshold module 40. The inputs include: sum_norm, which represents the sum normalized range profile; K_mult, which represents the initial b multiplicative factor in the generic T=.mu.+b.sigma. equation; W1, which represents a factor that accounts for a sudden loss in target returns when a subsequent iteration occurs in the iterative loop for initial threshold setting; and Tol4, which represents the lower bound for a conservative threshold. The output may be sum_threshold_new, which represents the algorithmic initial threshold setting. Sum_threshold_new may be subsequently alpha-tracked to maintain a smoother threshold.

FIG. 5B illustrates an input/output schematic for the isolated point refiner 44. The inputs include: sum_norm; length-flags, which represents the range bins of hits (that is, points that pass above the final threshold); and T.sub.x, which represents the final threshold setting.

Isolated point refiner 44 looks at both .+-.N_ind points from a hit and takes the subsequent means of the associated intensity values. If either or both of these means cross X.sub.iT.sub.x, the hit is kept as an pertinent event. A hit may also be kept is if the hit's intensity crosses X.sub.i+1T.sub.x, where X.sub.i+1>X.sub.i. If conservative higher thresholds are used, then lower X.sub.i and X.sub.i+1 may be used. If non-conservative lower thresholds are used (for example, for better edge and/or length detection), the higher X.sub.i and X.sub.i+1 may be used to remove otherwise rampant false alarms. The output is length_flags2, which represents the range bins that are associated with the relevant hits after throwing out per-chance passers.

FIG. 5C illustrates an input/output schematic for the feature extractor 46. The inputs includes: sum_norm; length_flags2; and top_per, which represents the top percentage number of highest peaks kept as features. The outputs include K.sub.1, which represents the intensity rank (where a lower value indicates higher intensity) associated with the sorted range bins of the peaks; and index_peaks, which represents the sorted range bins of the peaks.

FIG. 5D illustrates an input/output schematic for the intervals locator 48. The inputs include: length_flags2; rng_disp, which represents the quantity of range bin pixels on the inverse synthetic aperture radar image display; and max_pixel_spacing, which represents the maximum spacing between any two subsequent hit range bins that can be considered as the same target. The output is length_flags3, which represents the one or more candidate hit range bin intervals.

FIG. 5E illustrates one embodiment of an input/output schematic for a combat shadowing effects module 50. The inputs include: top_peaks, which represents the two-dimensional array that indicates the top peak range bins and associated intensity rank; and length_flags3. The output is length_flags3, which represents the one or more refined candidate hit range bin intervals. The range bin interval associated with the stored features (for example, peaks) may be required to be fully encompassed by one of the candidate intervals of input length_flags3.

FIG. 5F illustrates one embodiment of an input/output schematic for target region isolator 52. The inputs include: length_flags3; and rng_disp, which represents the quantity of range bin pixels on the inverse synthetic aperture radar image display. The output is length_flags3, which represents the singleton range bin interval that is associated with the most hits, as designated by the target of interest.

In certain embodiments, the apparent length procedure may be performed twice, once with a conservative threshold and once with a non-conservative threshold, to yield two lengths. The final apparent length may be a predefined weighted combination of the conservative and non-conservative apparent lengths. If the difference between the lengths is statistically too large, then the conservative apparent length is selected as the output final apparent length. A large statistical anomaly may be due to a significantly lowered threshold, leading to increased false alarms. This defeats the purpose of using the non-conservative threshold to attain better target edge detection.

In an example, the apparent length from the conservative threshold is 130 range bins, and the non-conservative apparent length is 140 range bins. If the weighting is 50% each, then the final apparent length output is 135 range bins. In another example, the apparent length from the conservative threshold is 130 range bins, and for the non-conservative apparent length is 190 range bins. The difference between the lengths is statistically too large, so 130 range bins is selected as the output apparent length.

When the ISAR image undergoes the |m.sup.2| operation, where im represents the intensity values of the pixels in an ISAR image, the pixels are of exponential type. An exponential random variable has pdf f.sub.X(x)=.lamda.exp(-.lamda.x), where .lamda. represents a rate parameter. The characteristic function is:

.PHI..function..times..intg..infin..times..lamda.e.lamda..times.e.times..- times..times.d.times..intg..infin..times..lamda.e.lamda..times..times..tim- es..times.d.times..lamda..lamda..times..times..times..lamda..lamda..times.- .times. ##EQU00025## The mean is:

.function..times..PHI.'.function..times..lamda..function..lamda..times..t- imes..times..times..lamda..lamda..times..lamda..ident..times..mu. ##EQU00026## Thus, the noise pdf is:

.function..times..mu..times..function..mu..times..lamda..times..function.- .lamda. ##EQU00027##

The probability of false alarms (PFA) is the area under the noise pdf that crosses a determination threshold T:

.times..intg..infin..times..function..times.d.times..intg..infin..times..- lamda..function..lamda..times.d.times..lamda..lamda..times.e.lamda..times.- .infin..times..times.e.lamda..times..function..mu. ##EQU00028## Solving for the threshold to maintain a constant false alarm rate yields:

.mu..function..times..times..times..times..mu..function. ##EQU00029## Noise corrupts the whole signal, so to determine the probability of detecting the superposition of an exponentially fluctuating signal in exponential noise is assumed. The mean of the distribution is: E[f.sub.S+N(s)]=E[f.sub.S(s)]+E[f.sub.N(n)]=.mu..sub.S+.mu..sub.N. where the signal+noise pdf is:

.function..mu..mu..times..function..mu..mu. ##EQU00030##

The probability of detection P.sub.det represents the probability of detecting an endpoint at a particular probability of false alarms and signal-to-noise ratio (SNR). The probability of detection is the area under the signal+noise pdf from T to .infin.:

.times..intg..infin..times..mu..mu..times..function..mu..mu..times.d.time- s..mu..mu..mu..mu..times..function..mu..mu..times..infin..times..function.- .mu..mu..times..function..mu..function..mu..mu..times..function..function. ##EQU00031##

The SNR may be referenced to the image domain, which is not exponentially distributed yet. Thus,

.times..times. ##EQU00032## where SNR.sub.dB is the SNR in dB in the image domain.

The probability P.sub.med of attaining the correct apparent length estimation using the median operator may be calculated by isolating the processes of attaining a correct apparent length (within some acceptable error bounds) at any given single opportunity and the benefits of using the median operator. The median operator's benefits can be based on equal probability of the cases: the length being too short (S), too long (L), or correct (C). Each case has a one-third probability of occurring, because determining the correct apparent length is already taken care of with an extrapolation of the previously derived P.sub.det, which takes into account the probability of false alarms and SNR levels.

The median operator can be thought of as either a sorted middle value or the point where the cumulative distribution function (CDF) of the probability distribution is equal to one-half. It is the former that applies most for this derivation.

One length value. The default case where only one length value is stored yields probability

.times. ##EQU00033## that is equally probable amongst the three states S, L, and C.

Three length values. There are 3.sup.3=27 unique combinations of the three states. The median operator results in a correct classification in the following situations.

Cases with three C's. There is a correct classification in

.times..times. ##EQU00034## Cases with two C's. There are correct classifications in

.times..times..times..times..times..times..times. ##EQU00035## Cases with one C. There is a correct classification only if S and L occur, that is, there are correct classifications in

##EQU00036## cases (or C.sub.1.sup.1C.sub.1.sup.2C.sub.1.sup.3=3!=6=P.sub.1.sup.3 cases).

Thus, for three length values, the probability is:

.times. ##EQU00037##

Five length values. There are 3.sup.5=243 unique combinations of the three states.

Cases with five C's. There is a correct classification in C.sub.5.sup.5=1 case.

Cases with four C's. There are correct classifications in

.times..times..times..times..times..times..times. ##EQU00038## Cases with one C. There are correct classifications only if there are two S's and two L's, that is, there are correct classifications in

.times..times. ##EQU00039## Cases with three C's. There are correct classifications in

.times..times..times..times..times..times..times..times..times..times..ti- mes..times. ##EQU00040## Cases with two C's. There is a correct classification only if there is at least one S and one L, which may be expressed as (cases with two C's in five slots)*(cases with an L or S)*(cases with two S's or two L's respectively in remaining three slots). Thus, there are correct classifications in

.times..times. ##EQU00041##

Thus, for five length values, the probability is:

.times. ##EQU00042## There is an increase when using five stored length values instead of a single value.

In certain embodiments, the probability of detecting a correct apparent length (that is, of detecting each endpoint at a particular SNR and probability of false alarms) within a specified error bounds may be defined as P.sub.det.sup.2. The probability of correct apparent length determination within some acceptable error bounds when using the median operator may be defined as P.sub.d.

The median combinatorial statistics yield:

##EQU00043## where A.sub.k=probability of attaining the correct length (within some bounds) when assuming equally probable short, long, or correct length cases, with k stored length values, where k equals, for example, 1, 3, 5.

Assuming linear benefits of the median operator yields:

.function..function. ##EQU00044## where when using five stored length values yields:

.function..apprxeq..function. ##EQU00045## The probability is capped at 1 (or 100 percent) and

.function..function..times..times..times..times. ##EQU00046##

The probabilities are referenced in the image domain, and may be translated to the sum normalized range profile domain. The probabilities may be translated by empirically deriving the added SNR (for example, in dB) that is required to have the same algorithmic detection in the sum normalized range profile as in the image domain. For example, the added SNR may be 2 dB. If the correct apparent length can be attained by a large target at SNR=8 dB (at the endpoints) in the image domain, then at least SNR=10 dB may be needed at the corresponding endpoints in the sum normalized range profile for same performance. This may be explained by the loss from going from a two-dimensional image to a one-dimensional vector presentation. Everything is related to the image domain, so the translation automatically occurs in that domain when plotting the P.sub.d curves.

FIG. 6 is a graph illustrating an approximate probability of detection for apparent length estimation as a function of SNR and probability of false alarms. As an example, at a target endpoint average SNR of 10 dB and probability of false alarms of 1e-4 (reasonable setting), there is an 80 percent chance of being within a specified percentage of true apparent target length. This does not take into account the errors from the aspect angle calculation.

Due to the use of iterative threshold methodology to isolate noise and unwanted regions, SNR can also be thought of as signal to interference ratio (SIR). The formula for the calculation of the SIR at the target endpoints is:

.function..function..function..function..function..function..function. ##EQU00047## The mean in the numerator accounts for a value for the leftmost and rightmost target endpoints. Noise_source represents a set of intensities associated with noise/clutter pixel samples in an ISAR image.

The feature extraction capabilities of the sum normalized range profile and the high resolution range (HRR)/A-scan profile may be compared. In an example, the ISAR images are attained at Ultra-High Resolution (UHR). The top (for example, the top two or three) target peak scatterer (PS) range bins for an ISAR image may be found using the sum normalized range profile and using the A-scan profile (with a non-coherent sum of pulses). The ISAR image may be two-dimensional, and the profiles may be one-dimensional.

A value is the deviation (in range bins) from the true bin locations calculated from the ISAR image to the bin locations found using the length estimator algorithm on the sum normalized range profile or A-scan profile. TABLE 1 illustrates examples of such values.

TABLE-US-00001 TABLE 1 Average deviation (range bins) from true top two PS locations Trial # SNRP PS1 A-scan PS1 SNRP PS2 A-scan PS2 1 6.0 87.6 16.9 56.4 2 5.8 40.1 37.6 43.7 3 2.4 17.2 4.4 16.6 4 16.2 12.6 15.5 15.9

Each table value represents the mean of 30 peak scatterer determinations (one per ISAR image). The first three trials were performed to find targets with finitely spaced peak scatterer locations, that is, locations that do not occur within a small range bin, which can also be found through visual inspection in the image domain. The last trial dealt with a target exhibiting a significant superstructure that contained many scatterers of high intensity in a small bin range.

TABLE 1 illustrates the differences between using the sum normalized range profile and using the A-scan profile. The isolation of two particular target points of interest from a two-dimensional image to a one-dimensional vector has inherent degradations. The A-scan profile compounds the degradations because the A-scan profile is based solely on summing over the Doppler dimension in an ISAR image.

The sum normalized range profile may be more robust than the A-scan profile for feature extraction using peak scatterer locations. The sum normalized range profile may yield less variance among subsequent length determinations than that of the A-scan profile. The sum normalized range profile may be preferred for total classification because the sum normalized range profile attains a viable apparent length estimate and can encode specific target features, such as locations of prominent peak scatterers.

FIG. 7 is a graph illustrating a percent deviation from true length as a function of target endpoints for an example sum normalized range profile and an example A-scan profile. Using an A-scan profile or using a sum normalized range profile yields similar performance because half of the sum normalized range profile distribution comes directly from the normalized A-scan profile. The length determinations from the sum normalized range profile may be more robust when looking at length determination variance values from one time to the next.

In certain examples, the apparent length estimate falls within a .+-.10 percent of true apparent length if: (1) there are no overwhelming land returns that span a majority of range bins (that is, the inverse synthetic aperture radar littoral enhancements are working properly); (2) the SNR at the target edge endpoints are at least 10 dB; (3) and the aspect angle .theta. is 0<.theta.<45.

FIG. 8 illustrates an example comparison of length calculation using a sum normalized range profile versus using a normalized A-scan profile.

A component (such as a module) of the systems described in the embodiments may include an interface, logic, memory, and/or other suitable element. An interface receives input, sends output, processes the input and/or output, and/or performs other suitable operation. An interface may comprise hardware and/or software.

Logic performs the operations of the component, for example, executes instructions to generate output from input. Logic may include hardware, software, and/or other logic. Logic may be encoded in one or more tangible media and may perform operations when executed by a computer. Certain logic, such as a processor, may manage the operation of a component. Examples of a processor include one or more computers, one or more microprocessors, one or more applications, and/or other logic.

In particular embodiments, the operations of the embodiments may be performed by one or more computer readable media encoded with a computer program, software, computer executable instructions, and/or instructions capable of being executed by a computer. In particular embodiments, the operations of the embodiments may be performed by one or more computer readable media storing, embodied with, and/or encoded with a computer program and/or having a stored and/or an encoded computer program.

A memory stores information. A memory may comprise one or more tangible, computer-readable, and/or computer-executable storage medium. Examples of memory include computer memory (for example, Random Access Memory (RAM) or Read Only Memory (ROM)), mass storage media (for example, a hard disk), removable storage media (for example, a Compact Disk (CD) or a Digital Video Disk (DVD)), database and/or network storage (for example, a server), and/or other computer-readable medium.

Modifications, additions, or omissions may be made to the embodiments without departing from the scope of the invention. The components of the embodiments may be integrated or separated. Moreover, the operations of the embodiments may be performed by more, fewer, or other components. For example, the operations of actual length calculator 36 and ISAR processing system 28 may be performed by one component, or the operations of apparent length calculator 34 may be performed by more than one component. Additionally, operations of the embodiments may be performed using any suitable logic comprising software, hardware, and/or other logic. As used in this document, "each" refers to each member of a set or each member of a subset of a set.

Modifications, additions, or omissions may be made to the methods without departing from the scope of the invention. The methods may include more, fewer, or other steps. Additionally, steps may be performed in any suitable order.

Although this disclosure has been described in terms of certain embodiments, alterations and permutations of the embodiments will be apparent to those skilled in the art. Accordingly, the above description of the embodiments does not constrain this disclosure. Other changes, substitutions, and alterations are possible without departing from the spirit and scope of this disclosure, as defined by the following claims.

* * * * *