Next Article in Journal
A GPU-Based Integration Method from Raster Data to a Hexagonal Discrete Global Grid
Previous Article in Journal
Higher-Order Convolutional Neural Networks for Essential Climate Variables Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LPI Sequences Optimization Method against Summation Detector Based on FFT Filter Bank

The School of College of Electronic Science and Technology, National University of Defense Technology (NUDT), Changsha 410073, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2024, 16(11), 2021; https://doi.org/10.3390/rs16112021
Submission received: 17 April 2024 / Revised: 27 May 2024 / Accepted: 1 June 2024 / Published: 4 June 2024
(This article belongs to the Section Engineering Remote Sensing)

Abstract

:
Waveform design is a crucial factor in electronic surveillance (ES) systems. In this paper, we introduce an algorithm that designs a low probability of intercept (LPI) radar waveform. Our approach directly minimizes the detection probability of summation detectors based on FFT filter banks. The algorithm is derived from the general quadratic optimization framework, which inherits the monotonic properties of such methods. To expedite overall convergence, we have integrated acceleration schemes based on the squared iterative method (SQUAREM). Additionally, the proposed algorithm can be executed through fast Fourier transform (FFT) operations, enhancing computational efficiency. With some modifications, the algorithm can be adjusted to incorporate spectral constraints, increasing its flexibility. Numerical experiments indicate that our proposed algorithm outperforms existing ones in terms of both intercept properties and computational complexity.

1. Introduction

During radar detection and tracking, the radar waveform is susceptible to detection, posing a significant threat to the radar’s operation and survival [1,2]. As a result, radar systems continually demand advanced low-intercept technology. The objective is to develop a low probability of intercept (LPI) radar systems that can effectively detect targets while minimizing the likelihood of detection by ES systems [3]. This ensures enhanced security for both the radar system and its associated platforms.
Indeed, the concept of LPI radar was first developed in the 1980s [4]. Over the years, through iterative advancements, a plethora of low-interception technologies have progressively been implemented. Currently, the development of LPI radar primarily targets the two critical interception stages of the ES system: the power interception phase and the radar signature interception phase [5]. The power interception phase involves the ES’s broad reception of all electromagnetic signals, detecting signals when their amplitude surpasses a certain threshold [6]. On the other hand, the radar signature interception phase refers to the process where the ES system extracts and identifies features from the detected signals [7].
The use of low-power continuous wave technology to diminish the chance of power interception is a superior low-interception method. It minimizes the peak of instantaneous power in the waveform by spreading the energy over an extended duration, thereby reducing the reconnaissance system’s probability of interception [8,9]. Low-side-lobe antenna technology deliberately prevents the ES system from acquiring excess radiated energy, effectively preventing energy leakage and decreasing the interception likelihood [10]. Similarly, the dual/multi-station radar system reduces the interception probability by positioning the radar transmitter as far from the reconnaissance receiver as possible, thereby limiting the receiver’s energy acquisition [11].
The frequency shortcut [12,13], pseudo-random [14], and complex waveform modulation techniques [15] are employed with the aim of reducing the interception probability of radar signatures. However, these techniques also inadvertently increase the processing complexity of the reconnaissance system. Furthermore, the issue of designing a low probability of identification (LPID) waveforms is being examined, with a specific focus on the aspect of time complexity [16,17].
The aforementioned tools for low-interception do not delve into the potential influence that waveform design could have on low-interception performance. In reality, waveform design is a crucial method for impacting ES systems [18]. The design of LPI radar waveforms has been employed as a countermeasure against ES systems as far back as the 1990s [19,20]. Among the various techniques, shortening the parameters of the waveform is an effective low-intercept method that targets the reduction in feature interception probability [21,22].
The swift fluctuation in radar waveform parameters makes it difficult for the receiver to accurately identify the relevant parameters of the waveform, which in turn obstructs effective classification and identification [23]. Furthermore, the advent of innovative radar systems has led to a heightened degree of versatility in waveform design [24]. The development of these cutting-edge radar systems primarily focuses on MIMO radar waveform design, utilizing waveform diversity to boost the adaptability of LPI radar waveform design. The incorporation of transmit beamforming further enhances the radar’s stealth detection capabilities [25].
Nonetheless, as processing power improves, an increasing number of reconnaissance systems can intercept complex waveforms. They achieve this by analyzing and extracting suspicious features from the received signals [26,27]. Even under low signal-to-noise ratio conditions, contemporary low-interception systems are capable of identifying the potential characteristics of radar waveforms [28].
In recent years, a number of scholars have utilized Kullback–Leibler (KL) divergence for the measurement to represent the feature interception and identification process of radar missions and ES systems, which takes into account the detection characteristics under the joint entropy constraint for LPI waveform design, aiming to make the reconnaissance system lose more information [29,30]. However, simply utilizing the clustering and dispersion characteristics of the frequency domain distribution is not well adapted to the characteristics of modern wide-band ES systems [31,32].
To better obscure waveform features and enhance detection capabilities, a waveform design method was developed. This method conceals the spectral features of the waveform within the spectral features of the background noise. Under a specific received signal-to-noise ratio, the discrepancy between the periodic spectrum of the designed waveform and that of the Gaussian white noise is minimized. This minimization increases the complexity of feature extraction for reconnaissance receivers, thereby boosting the waveform’s low-interception performance.
Waveform design methods aimed at reducing the probability of power interception in LPI radar initially distribute signal power over a wider frequency band using pulse compression theory [33,34]. The advent of new regime radars then amplified the signal’s bandwidth, resulting in a wider signal bandwidth and a larger frequency range for energy distribution. Furthermore, MIMO radar waveform design minimizes the peak power captured by the interception system through the transmission beamforming technique [35,36]. The emergence of advanced frequency diversity array (FDA) radars [37], which utilize electronically scanned methods, further broadened the technical scope of LPI radar waveform design research.
Undeniably, diminishing the peak radiated power of passive reconnaissance systems is an efficacious method for low interception. However, this leads to a decline in detection performance as the energy radiated at the target diminishes. Therefore, target detection with low radiated power is typically accomplished through energy accumulation over the duration of the pulse train, which unfortunately compromises radar sensitivity.
Detecting signals that are embedded in the radio spectrum is a common challenge in various applications, including spectrum detectors in cognitive radio systems [38], cognitive radar systems [39], and ES systems [40]. More specifically, the challenge involves detecting signals within a spectrum using a receiver that has an instantaneous bandwidth (IBW).
One possible solution for this challenge is to use the total power radiometer [41], also known as the energy detector. This detector does not require a calculated frequency spectrum and compresses the entire band (i.e., the samples) into a single detection variable. This variable is then compared to a detection threshold. However, the frequency resolution of these detectors is limited to the entire IBW.
Another type of detector involves calculating the detection variable for each band in the digital spectrum, which is then compared to a threshold [42]. The frequency resolution of these detectors is limited to the bandwidth of the band.
We chose to use the FFT filter bank-based summation detector, which is a modified version of the basic FFT filter bank detector [43]. The FFT summation detector groups FFT bins to correspond with the desired channelization and estimates the power contained in each channel by summing the power computed for the individual bins.
In this paper, we present the MPI (monotonic minimizer for the probability of intercept) algorithm, which is designed to efficiently reduce the detection probability of summation detectors based on FFT filter banks in a monotonic manner. The MPI algorithm is derived by applying a general quadratic optimization framework method to the probability of intercept minimization problem, resulting in a simple closed-form solution at each iteration. The power method-like iteration (PMLI) formulation, as mentioned in [44], provides valuable guarantees regarding the convergence of the waveform itself. Furthermore, the algorithm’s implementation is computationally efficient due to the utilization of fast Fourier transform (FFT). However, the nature of the unimodular constraint may lead to the slow convergence of the MPI algorithm, particularly for large lengths. To address this issue, we propose the application of acceleration schemes based on the squared iterative method (SQUAREM). Additionally, for scenarios involving spectral and similarity constraints, we developed a modified algorithm of a similar form.

2. Problem Formulation

Figure 1 shows the LPI radar and ES system framework. Conventional LPI radars employ a generalized low-intercept design scheme, including power control, complex modulation, and ultra-low sidelobe, to make it more difficult to process the radar signal at the ES side. This achieves LPI potency to some extent.
The problem of interest is to design a complex unimodular sequence { s n } n = 1 N , where N is the length of the sequence, minimizing the probability of detection P d , i.e.,
min s P d s . t . | s n | = 1 , n = 0 , , N 1
Next, we will restate Equation (1) from the perspective of a summation detector based on an FFT filter bank detection algorithm.

2.1. Receiver Signal Detection

Assuming that there are M channels in the sampled bandwidth, which are uniformly distributed in frequency, an integer number of K FFT bins are assigned per channel for power estimation. Therefore, an FFT of length M × K is required to compute the power for the M channels. Let W be the diagonal matrix consisting of a linear-phase FIR filter of length M K , which can be expressed as W = Diag [ w 1 , , w M K ] T .
Under the assumption of a complex Gaussian white noise background and a distribution where n follows a mean of 0 and a variance of σ n 2 , the received signal consists of a combination of n and s . After down-conversion, the received vector r = [ r 1 , r 2 , , r ( P 1 ) ( 1 γ ) MK + MK ] is divided into P overlapping sample vectors r 1 , , r P as follows:
r m = r m ( 1 γ ) M K + 1 , r m ( 1 γ ) M K + 2 , , r m ( 1 γ ) M K + M K T
where each vector r m has γ M K samples in common with the preceding vector r m 1 and 0 γ < 1 is overlapping ratio. The step length can be expressed as L = ( 1 γ ) M K . The vector r m is windowed by the FIR filter matrix W , resulting in the windowed sample vector x m :
x m = w 1 r m L + 1 , w 2 r m L + 2 , , w M K r m L + M K T
For the simplicity of expression, define the selection matrix J p , which can be expressed as:
J p = 0 M K × ( p 1 ) L | I M K | 0 M K × ( P p ) L
where I M K is a unit diagonal matrix of dimension M K . The detection variable κ m for the mth channel of the FFT filter bank-based summation detector is expressed as [45]:
κ m = 1 P p = 1 P ( C m H W J p r ) H ( C m H W J p r ) = p s P p = 1 P ( C m H W J p s ) H ( C m H W J p s ) + c m
where C m = [ α ( m 1 ) K , , α m K 1 ] T and α k = 1 / ( M K ) · [ 1 , e j 2 π k M K , , e j 2 π k ( M K 1 ) M K ] T . In addition, p s is the received power of s and the scalar c m represents the detection scalar associated with noise. When the influence of filters is disregarded, E { c m } = 1 M σ n 2 , where E { · } is the operator for mean. A signal is declared to exist in the mth channel only if κ m μ t h , where μ t h is the detection threshold. It should be noted that adjusting the value of μ t h can achieve the desired false alarm probability P f a .
In the case where the detection threshold μ t h and σ n 2 is fixed, the waveform design problem for LPI in the mth channel can be expressed as min s κ m . The detection vector κ is defined as a column vector comprising the elements κ 1 , κ 2 , , κ M . Therefore, the output signal-to-noise ratio (SNR) of the mth channel can be expressed as:
S N R m = p s p = 1 P ( C m H W J p s ) H ( C m H W J p s ) P c m
The maximum output SNR of all channels is equal to the total output SNR of the FFT filter bank-based summation detector. Assuming uniform noise levels across all channels, the waveform design problem for LPI scenarios can be succinctly formulated as min s max m κ m , m = 1 , , M . Consequently, the LPI problem (1) becomes
min s κ s . t . | s n | = 1 , n = 0 , , N 1
where · is the infinity norm operator.

2.2. LPI Radar Waveform Design

Assuming that the optimization variable s is an N-dimensional vector, where N equals M K + ( P 1 ) L , without loss of generality. In this case, we can disregard the energy distortion caused by FIR filters and noise, and set W equal to the identity matrix I . Then, the sufficiency problem of Equation (7) can be formulated as follows (as proven in Appendix A):
min s max m , p ( C m H J p s ) H ( C m H J p s ) s . t . | s n | = 1 , n = 0 , , N 1
According to Parseval’s theorem, m = 1 M ( C m H J p s ) H ( C m H J p s ) = M K and it can be further obtained that 0 max m , p ( C m H J p s ) H ( C m H J p s ) M K . The optimal value of Equation (8) must be greater than K; hence, the equivalence problem for Equation (8) can be formulated as follows:
min s m = 1 M p = 1 P ( C m H J p s ) H ( C m H J p s ) K 2 s . t . | s n | = 1 , n = 0 , , N 1
It is important to note that the number of channels is not a priori information, and therefore, Equation (9) can be formulated more appropriately as follows:
min s m = 1 M K p = 1 P ( α m H J p s ) H ( α m H J p s ) 1 2 s . t . | s n | = 1 , n = 0 , , N 1
Expanding the square in the objective function yields:
min s m = 1 M K p = 1 P ( ( ( α m H J p s ) H ( α m H J p s ) ) 2 2 ( α m H J p s ) H ( α m H J p s ) + 1 ) s . t . | s n | = 1 , n = 0 , , N 1
Using Parseval’s theorem, it can be shown that the second term in the objective function is a constant, i.e., m = 1 M K p = 1 P ( α m H J p s ) H ( α m H J p s ) P M K . Therefore, by ignoring the constant terms, the problem can be simplified as follows:
min s m = 1 M K p = 1 P ( ( α m H J p s ) H ( α m H J p s ) ) 2 s . t . | s n | = 1 , n = 0 , , N 1
Let us denote the sliding window matrix as S .
S = J 1 s | | J P s
Equation (12) can be rewritten as
min s m = 1 M K ( ( α m H S ) H ( α m H S ) ) 2 s . t . | s n | = 1 , n = 0 , , N 1
For the sake of better expression, let us define X = SS H and A m = α m α m H . With these definitions, Equation (12) can be rewritten as:
min s m = 1 M K Tr ( X A m ) 2 s . t . | s n | = 1 , n = 0 , , N 1
It is worth noting that Equation (15) changes the quartic function on S into a quadratic function on X .

2.3. Optimization Problem

The optimization problem for LPI radar waveform design against a summation detector based on FFT filter bank, as denoted by (15), lacks the capability to construct a fuzzy function for the waveform. This limitation prevents the guarantee of certain desirable properties, such as a lower integrated sidelobe level (ISL).
Similarity constraints refer to the requirement that the designed waveform has a certain degree of similarity or correlation among its different components. Several studies have shown that enforcing a similarity constraint on a waveform can control the shape of its ambiguity function [46,47], partially circumventing issues such as significant modulus variation, poor range resolution, and/or high peak sidelobe levels. In Equation (15), we consider the following similarity constraint:
s ^ s 0 ξ
where s 0 denotes the reference waveforms, ξ is a use-specific parameter which rules the size of similarity region. For a given ξ > 0 , (16) can be transformed into the following optimization problem:
min s m = 1 M K Tr ( X A m ) 2 s . t . | s n | = 1 , n = 0 , , N 1 s ^ s 0 ξ
Furthermore, in practical applications, radar systems must satisfy spectral constraints in addition to having good autocorrelation properties. For example, certain spectral powers must be below specified levels.
Spectral constraints, such as limiting the power in a certain frequency band, denoted by the set of indices Ω [ 1 , M K ] , can be expressed as follows: the power in Ω should be lower than a certain threshold ϵ .
k Ω α k H S 2 2 ϵ
From (16) and (18), the optimization problem (15) can be rewritten as:
min s m = 1 M K Tr ( X A m ) 2 s . t . | s n | = 1 , n = 0 , , N 1 s ^ s 0 ξ k Ω α k H S 2 2 ϵ

3. Optimization Development

In this section, we develop an algorithm for LPI waveform design based on the general quadratic optimization framework.

3.1. Monotonic Minimizer for Probability of Intercept

As Tr ( X A m ) = vec ( X ) H · vec ( A m ) , Equation (15) can be considered as a quadratic optimization problem of generic form as follows:
min s vec ( X ) H Φ vec ( X ) s . t . | s n | = 1 , n = 0 , , N 1
where Φ is a positive definite and Φ = m = 1 M K vec ( A m ) · vec ( A m ) H . Because of Φ I , Equation (20) is NP-hard for the constraint set [48,49]. A monotonically decreasing objective of (20) can be achieved by iteratively updating vec ( X ) by solving the following nearest problem at each iteration, where G = Φ I :
max s vec ( X ) G vec ( X ) ( i ) 2 s . t . | s n | = 1 , n = 0 , , N 1
where X ( i ) = S ( i ) ( S ( i ) ) H at iteration k. However, according to (21), vec ( X ) is a quadratic form of vec ( S ) , unimodular constraints are equivalent to making the ( p 1 ) M K + p th element of vec ( X ) equal to MK. To solve the problem given in Equation (21), an efficient way is to expand it as follows:
max s vec ( X ) H vec ( X ) 2 Re ( vec ( X ) H G vec ( X ( i ) ) ) + vec ( X ( i ) ) H ( G H G ) vec ( X ( i ) ) s . t . | s n | = 1 , n = 0 , , N 1
Additionally, we have M K P 2 vec ( X ) H · vec ( X ) ( M K P ) 2 (proof in Appendix B), which is just a constant. After ignoring the constant term in Equation (23), the majorized problem of Equation (22) is given by:
min s Re ( vec ( X ) H G vec ( X ( i ) ) ) s . t . | s n | = 1 , n = 0 , , N 1
which can be rewritten as
min s m = 1 M K Re ( Tr ( X ( i ) A m ) · Tr ( X A m ) ) Tr ( X ( i ) X ) s . t . | s n | = 1 , n = 0 , , N 1
We define T ( i ) = A H S ( i ) , where A is the discrete Fourier transform (DFT) matrix given by A = 1 M K [ α 1 , , α M K ] T , and q ( i ) C M K . The m-th element of q ( i ) can be expressed as q m ( i ) = t m ( i ) · ( t m ( i ) ) H , where ( t m ( i ) ) is the m-th row vector of T ( i ) . Let Q = Diag { q ( i ) } , then Equation (24) can be written as:
min s Re ( Tr ( S H ( A Q ( i ) A H S ( i ) ( S ( i ) ) H ) S ( i ) ) ) s . t . | s n | = 1 , n = 0 , , N 1
It is worth noting that Q is essentially a spectral power sum matrix that encompasses all bands and Equation (25) is a quadratic function on S . Due to A H A = I , Equation (25) can be formulated as:
min s Re ( Tr ( S H ( A H Ψ ( i ) A ) S ( i ) ) ) s . t . | s n | = 1 , n = 0 , , N 1
where Ψ ( i ) = Q ( i ) T ( i ) ( T ( i ) ) H , let M ( i ) = Ψ ( i ) q max ( i ) I , where q max ( i ) = max p { q p ( i ) : p = 1 , , M K } . Equation (27) can be written as:
min s Re ( Tr ( S H ( A M ( i ) A H ) S ( i ) ) ) s . t . | s n | = 1 , n = 0 , , N 1
By defining Z ( i ) = A M ( i ) T ( i ) , when we only consider the unimodular constraint, the majorized problem of Equation (27) can be simplified as follows:
min s S Z ( i ) Fro s . t . | s n | = 1 , n = 0 , , N 1
· Fro in (28) represents the Frobenius norm operator. It is easy to see that the problem given in Equation (27) has a closed-form solution, which is given by:
S = e j arg ( Z ( i ) )
It is important to note that the solution of (29) considers only unimodular constraints, specifically | s n | = 1 , n = 0 , , N 1 , and the solution of the similarity constraint and the spectral constraints in (19) will be presented in Section 4.2. The overall algorithm is summarized in Algorithm 1. While local optimization algorithms typically ensure a monotonic behavior of the optimization objective and eventual convergence through the optimization process, the monotonic minimizer for probability of intercept (MPI) formulation itself provides useful insights, as demonstrated in Appendix C.
Algorithm 1 MPI-Monotonic minimizer for probability of intercept
  •     Require: the size of S , i.e., M K , P
  •     1: Set k = 0 ,initialize S ( 0 )
  •     2: repeat
  •     3:      T ( i ) = A H S ( i ) , Q ( i ) = Diag ( q ( i ) )
  •     4:      Ψ ( i ) = Q ( i ) T ( i ) ( T ( i ) ) H
  •     5:      q max ( i ) = max p { q p ( i ) : p = 1 , , M K }
  •     6:      M ( i ) = Ψ ( i ) q max ( i ) I
  •     7:      Z ( i ) = A M ( i ) T ( i )
  •     8:      S ( i ) = e j arg ( Z ( i ) )
  •     9:      k k + 1
  •     10: until convergence
The sliding window matrix S , defined by Equation (13), can be uniquely obtained from s . However, the converse is not true. According to the mapping relation, s can be mapped by several columns of S , with the number of mappings depending on the overlap time of the receiver window. To better extract s from S , waveform extraction approaches are introduced based on the number-first and length-first principles, respectively.

3.1.1. Number-First

In this subsection, we present a sequence extraction approach based on the time-domain circular shift theorem, which yields a sequence characterized by a constant envelope in the time–frequency domain.
Theorem 1.
Let S * be an optimized sliding window matrix, where s m represents the mth column of S * . Assuming that A s m 2 2 ϱ , where ϱ is a positive number, there exists a unique transformation s ^ m ( n ) = s m ( m o d ( n , M K ) ) . This transformation guarantees that the resulting sliding window matrix S ^ m satisfies the inequality A S ^ m Fro 2 P ϱ .
Proof of Theorem 1.
From Equation (13), the sliding window matrix of s ^ m is
S ^ m = J 1 s ^ m | | J P s ^ m
Let U ^ m = A S ^ m and u p m , p = 1 , , P is the pth colomn of U ^ m . According to the time-domain cyclic shift theorem [50]
A s m 2 2 = u p m 2 2 ϱ , p = 1 , , P
U ^ m Fro 2 can be expanded as
U ^ m Fro 2 = p = 1 P i = 1 M K | u i , p m | 2 = p = 1 P u p m 2 2 = P · u p m 2 2 P · ϱ , p = 1 , , P
where u i , p m is the ( i , p ) th element of U ^ m . Proof is complete.    □
From Theorem 1, we can obtain the expression for s from the sliding window matrix S as follows:
s ^ i ( n ) = s i ( m o d ( n , M K ) ) , n = 1 , , N , i = 1 , , P
where s i denotes the i-th column vector of S . It should be noted that any column in S is convergent. Therefore, we can obtain at most P distinct s ^ from S . However, the cyclic nature of s ^ leads to a deterioration in the correlation property. When N is relatively large, this approach is not suitable for constructing the sequence.

3.1.2. Length-First

In this subsection, we introduce a length-first extraction method. As mentioned in the previous section, the number-first extraction approach, while better conforming to (14), is not suitable for constructing long sequences when N is relatively large due to the cyclic nature of the time-domain. In such cases, we can extract s ^ as follows:
s ^ = vec ( S )
Clearly, the s ^ extracted in this way has a maximum length of P M K . It is worth mentioning that the sequence obtained by this extraction will be somewhat distorted for γ > 0 . However, due to Theorem 1, the sequence is somewhat robust. For ease of discussion, in this paper, we only consider the length-first extracted method.

3.2. Minimizer Constrained by Similarity Constraint and Spectral Constraint

In this subsection, we provide optimized solutions for similarity constraints and spectral constraints for MPI.

3.2.1. Constrained by Similarity Constraint

The similarity constrain in Equation (16) is equivalent to Re ( s ^ n * s 0 ( n ) ) 1 ξ 2 / 2 for n = 1 , 2 , , N , implying that arg ( s ^ n ) [ γ n , γ n + δ ] , where γ n = arg ( s 0 ( n ) ) arccos ( 1 ξ 2 / 2 ) , δ = 2 arccos ( 1 ξ 2 / 2 ) . Letting φ n be the phase of s ^ n , the optimal solution φ n * can be given as [51]:
φ n * = γ n + δ , i f cos ( φ n + γ n + δ ) cos ( φ n + γ n ) γ n , i f cos ( φ n + γ n + δ ) < cos ( φ n + γ n )

3.2.2. Constrained by Spectral Constraint under Similarity Constraint

As shown in Equation (18), the optimization problem is utilized to enforce similarity constraints and spectral constraints, ensuring that the designed waveforms satisfy these requirements.
For a given ϵ > 0 in (19), we can always find a ρ such that problem (14) can be transformed into the following equivalent problem:
min S m = 1 M K ( ( α m H S ) H ( α m H S ) ) 2 + ρ k Ω ( α k H S ) H ( α k H S ) s . t . | s n | = 1 , n = 0 , , N 1 s ^ s 0 ξ
where Ω is the low-power frequency band. From here, we can follow the derivation of MPI to obtain the spectral-MPI algorithm for problem (26), and (26) can be rewritten as:
min S Re ( Tr ( T H ( Q ^ ( i ) T ( i ) ( T ( i ) ) H ) ( T ( i ) ) H ) ) s . t . | s n | = 1 , n = 0 , , N 1 s ^ s 0 ξ
where Q ^ ( i ) = Diag { q ^ ( i ) } , and the m-th element of q ^ ( i ) can be rewritten as
q ^ m ( i ) = t p ( i ) ( t p ( i ) ) H + ρ / 2 , m Ω t p ( i ) ( t p ( i ) ) H , o t h e r w i s e .
By defining q ^ max ( i ) = max m { q ^ m ( i ) : m = 1 , , n 0 } , Ψ ^ ( i ) = Q ^ ( i ) T ( i ) ( T ( i ) ) H and M ^ ( i ) = Ψ ^ ( i ) q ^ max ( i ) I , the problem can be recast as shown in (28):
min S Re ( Tr ( S H ( A M ^ ( i ) A H ) S ( i ) ) ) s . t . | s n | = 1 , n = 0 , , N 1 s ^ s 0 ξ
This problem has the same form as problem (28), for which the similarity constraint solution is shown in Equation (35). Therefore, we can follow the same steps as before to derive the spectral-MPI algorithm, the main steps of which are listed in Algorithm 2.
Algorithm 2 Spectral-MPI
  •     Require: the size of S , i.e., M K , P
  •     1: Set k = 0 ,initialize S ( 0 )
  •     2: repeat
  •     3:      q ^ m ( i ) = t p ( i ) ( t p ( i ) ) H + ρ / 2 , m Ω t p ( i ) ( t p ( i ) ) H , o t h e r w i s e .
  •     4:      T ( i ) = A H S ( i ) , Q ^ ( i ) = Diag { q ^ ( i ) }
  •     5:      Ψ ^ ( i ) = Q ^ ( i ) T ( k ) ( T ( k ) ) H
  •     6:      q ^ max ( i ) = max m { q ^ m ( i ) : m = 1 , , n 0 }
  •     7:      M ^ ( i ) = Ψ ^ ( i ) q ^ max ( k ) I
  •     8:      Z ^ ( i ) = A M ^ ( i ) T ( i )
  •     9:      S ( i ) = e j arg ( Z ^ ( i ) )
  •     10:      k k + 1
  •     11: until convergence

3.3. Computational Complexity of the Minimizer

The computational complexity of each iteration in MPI is primarily dominated by two matrix multiplications involving A , as shown in Algorithm 1. These computations can be easily performed using FFT and IFFT operations. Specifically, in the i-th iteration, the i-th column of T ( i ) corresponds to the M K -FFT operation of the i-th column of S ( i ) , with a computational complexity of O ( M K P log ( M K ) ) . The matrix product T ( i ) ( T ( i ) ) H needs to be computed only once, and Q can be obtained from a diagonal vector, with a computational complexity of O ( M K + P ( M K ) 2 ) . Similarly, the matrix Z ( i ) can be obtained by P  M K -IFFT operation, with a computational complexity of O ( M K P log ( M K ) ) . Additionally, the computational complexity of performing complex angle operations on Z ^ ( i ) is denoted by O ( M K P ) . In summary, the computational complexity of each iteration can be expressed as O ( 2 M K P log ( M K ) + M K ( M K P + P + 1 ) ) . The MPI algorithm exhibits high computational efficiency by using P FFT and IFFT operations, making it suitable for designing long sequences.

3.4. Acceleration Scheme

We also propose an improved version of the MPI algorithm to speed up the convergence process.
The MPI algorithm is derived based on the majorization–minimization principle, and the nature of the majorization functions determines the convergence rate of the algorithm. However, numerical simulations have shown that MPI converges very slowly when N is large. In this subsection, we address this issue and propose an acceleration scheme to improve the convergence speed of the algorithm. The acceleration scheme is called the squared iterative method (SQUAREM), which was originally proposed in [52] to accelerate any EM algorithm. Here, we outline the main steps of SQUAREM and modify it accordingly to address the waveform design problem we encounter.
Let F denote the fixed-point mapping during the iterations of the proposed MPI algorithm (noting that the mapping varies with the enforced constrains), i.e.,
S ( i + 1 ) = F ( S ( i ) )
Motivated by the Cauchy–Barzilai–Borwein (CBB) method for accelerating the convergence of the classical Cauchy method for solving linear equations, the SQUAREM method iterates as follows:
S ( i + 1 ) = e j arg ( S ( i ) 2 α ( i ) R ( i ) + ( α ( i ) ) 2 V ( i ) )
where R ( i ) = F ( S ( i ) ) S ( i ) , V ( i ) = F ( F ( S ( i ) ) ) F ( S ( i ) ) R ( i ) , and α ( i ) is the step-length in i-th iteration. Follow the step update approach as follows:
α ( i ) = R Fro V Fro
where · Fro is the Frobenius norm. To ensure the descent property, a backtracking strategy is adopted. This strategy repeatedly halves the distance between α ( i ) and 1 (i.e., α ( i ) ( α ( i ) 1 ) / 2 ) until the descent property is maintained. Monotonicity can be determined by checking whether A H S ( i + 1 ) Fro A H S ( i ) Fro holds or not. The accelerated MPI based on SQUAREM is summarized in Algorithm 3.
It is worth noting that in each iteration, the acceleration scheme requires the computation of S ( i + 1 ) and S ( i + 2 ) , as well as the Frobenius norm and angle operations associated with M K P , which increases the computational complexity of the acceleration scheme. However, the acceleration scheme can significantly reduce the number of iterations, thereby achieving a faster convergence time.
Algorithm 3 Accelerate-MPI
  •     Require: the size of S , i.e., M K , P .
  •     1: Set k = 0 ,initialize S ( 0 )
  •     2: repeat
  •     3:      R ( i ) = F ( S ( i ) ) S ( i ) ,
  •     4:      V ( i ) = F ( F ( S ( i ) ) ) F ( S ( i ) ) R ( i ) ,
  •     5:      α ( i ) = R Fro V Fro
  •     6:      S ( i + 1 ) = e j arg ( S ( i ) 2 α ( i ) R ( i ) + ( α ( i ) ) 2 V ( i ) )
  •     7:      while  A H S ( i + 1 ) Fro A H S ( i ) Fro
  •     8:           α ( i ) ( α ( i ) 1 ) / 2
  •     9:           S ( i + 1 ) = e j arg ( S ( i ) 2 α ( i ) R ( i ) + ( α ( i ) ) 2 V ( i ) )
  •     10:      end while
  •     11:      k k + 1
  •     12: until convergence

4. Numerical Results and Analysis

In this section, we provide several numerical examples to demonstrate the performance of the proposed algorithm. All experiments were performed on a PC with a 2.9 GHz AMD-Ryzen7-4800HS CPU and 24 GB RAM.

4.1. Convergence Performance

We first compared the convergence speed of the MPI algorithm with the accelerated MPI algorithm, measured by the square root of (14), denoted by Λ ( i ) . For all algorithms in this experiment, the stopping criterion was set to | Λ ( i + 1 ) Λ ( i ) 10 8 | , and the initial sequence { x n ( 0 ) } n = 1 N was chosen to be { e j 2 π θ n } n = 1 N , where { θ n } n = 1 N are independent random variables uniformly distributed in [ 0 , 1 ] . In the spectrum-MPI of this subsection, the low power frequency band Ω is set to [ 0.2 , 0.8 ] and ρ = 1 . To reduce the amount of computation, the sequence extraction approach in this paper is based on the principle of length-first.
Figure 2 shows the convergence properties of the MPI algorithm and the spectral MPI algorithm with their respective acceleration schemes for different parameters. We observe that the proposed MPI and spectral-MPI algorithms always converge monotonically, and the accelerated algorithm is effective in increasing the convergence rate. Additionally, Figure 3 compares the convergence time of the MPI, accelerated MPI, and CAN [53] algorithms with respect to the sequence length N. The results show that the accelerated MPI algorithm has a faster convergence time than the MPI algorithm. Moreover, since the size of the FFT operation is related to the size of M K , the convergence time of the proposed algorithm does not significantly increase with the sequence length, unlike the case of CAN.

4.2. LPI Performance

Subsequently, an experiment is conducted to illustrate the superior interference performance of the proposed sequence in comparison to commonly utilized sequences like SIN, LFM, CAN, and Golomb [54]. Among these, SIN and LFM can be respectively defined as a sine signal represented by exp ( j 0.2 π n ) and a linear frequency modulated signal represented by exp ( j 0.2 π n 2 / N ) . Assuming a free-space propagation model and neglecting gain and loss, the relationship between the maximum propagation distance r m a x and the minimum received power p s m i n can be expressed as [55]:
r m a x = P t G t G r λ 2 4 π 2 p s m i n 1 / 2
where P t , λ , G t , and G r represent the transmit power, wavelength, transmit gain, and receive gain, respectively. In this experiment, we only consider the cases where G t = 1 and G r = 1 . On one hand, P t = 10 2 watts and λ = 0.1 meters. The sequence is parameterized by N = 512 , M = 16 , K = 16 . The minimum output power p o m i n after processing with the FFT filter bank-based summation detector can be represented as p o m i n = p s m i n · max m p = 1 P ( C m H W J p s ) H ( C m H W J p s ) P K .
Figure 4 compares the intercept distances between common sequences and the proposed sequence for p s m i n [ 90 , 70 ] dBm and ES system setting: M = 8 ,   K = 16 . In this configuration, if max m p = 1 P ( C m H W J p s ) H ( C m H W J p s ) P K = 1 , the theoretical lower bound is computed. Obviously, the proposed sequences have a smaller maximum propagation distance than the normal sequence under the same p s m i n , especially for SIN with LFM sequences. Moreover, the proposed sequence almost reaches the theoretical lower bound.
Figure 5 compares the maximum intercept distance of the proposed waveform for a minimum received power p s m i n of −80 dBm and window lengths M K ranging from 80 to 256. The results demonstrate that the proposed algorithm does not require prior knowledge of the receiver window length M K and maintains a low interception property across different window lengths.

4.3. Autocorrelation Performance

To investigate the degree to which the similarity constraint improves the autocorrelation properties of the sequence, we conducted an experiment to evaluate the merit factor (MF) under a different ξ . The MF is defined as the ratio of the central lobe energy to the total energy of all other lobes, as proposed by Golay in 1972 [56].
MF = | r 0 | 2 2 k = 1 k = N 1 | r k | 2
where r k denotes aperiodic autocorrelations which can be defined as:
r k = n = 1 N k x n x n + k * = r k * , k = 0 , , N 1
The accelerated-MPI algorithm initialized by Golomb or random (RN) sequence are applied to the following lengths: N = 2 7 , 2 8 , 2 9 , 2 10 , 2 11 , 2 12 , with ξ = 0.01 . We chose the CAN sequence with superior MF properties as the reference sequence. The MF of the resulting sequences is shown in Figure 6. We observe that the MF of the proposed algorithm is almost independent of the sequence length. Figure 7 compares the MF of the accelerated-MPI initialized by Golomb and RN, respectively, versus ξ from 0 to 1, and the proposed sequence is parameterized by N = 512 ,   M = 8 ,   K = 16 . The results demonstrate that the similarity constraint can improve certain properties as ξ increases, which increases the flexibility of the design.
In addition, we considered the design of spectral constraints with low spectral power in frequency bands [ 0 , 0.2 ) ( 0.3 , 0.5 ) ( 0.8 , 1 ] . Figure 8 shows the time–frequency energy flow of the output sequence generated by spectral-MPI when initialized with a Golomb sequence and ρ = 1 . To observe the change in time–frequency energy more intuitively due to spectral constraints, Figure 9 shows the time–frequency energy flow without spectral constraints. We observe that the power in the pre-specified frequency bands has been suppressed, and the time–frequency flow is similar to the constant-envelope smooth.

5. Conclusions

We have introduced the MPI algorithm, an efficient method for minimizing the probability of intercept. This algorithm is derived from the general quadratic optimization framework. In scenarios involving spectral and similarity constraints, we also developed the spectral-MPI algorithm to achieve enhanced properties within the same framework as MPI. Additionally, we have explored acceleration schemes to expedite the MPI algorithm. Numerical results demonstrate that, when applied to FFT filter bank-based summation detectors, the proposed MPI algorithm can generate sequences with a lower probability of intercept compared to common sequences. Moreover, it can be utilized to design sequences with suppressed spectral power in arbitrary frequency bands. Importantly, all of the proposed algorithms can be efficiently implemented using FFT and have demonstrated computational efficiency in practical applications.

Author Contributions

Conceptualization, methodology, software, and writing—original draft preparation, Q.L.; supervision, F.G.; software and validation, K.X.; writing—review and editing, Z.L.; funding acquisition, W.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 62101570 and in part by the National Natural Science Foundation of China under Grant 61901494.

Data Availability Statement

The original contributions presented in this study are included in the article, whilst further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Proof of sufficiency of (7). 
To prove that (8) is a sufficient condition for (7), we need to prove
max m , p ( C m H H J p r ) H ( C m H H J p r ) κ
Assuming that there exist m 0 and p 0 such that
max m , p ( C m H H J p r ) H ( C m H H J p r ) = ( C m 0 H H J p 0 r ) H ( C m 0 H H J p 0 r )
When P = 1 , it is obvious that
( C m 0 H H J p 0 r ) H ( C m 0 H H J p 0 r ) κ
When P > 1 , assuming there exists m 1 such that
κ = 1 P p = 1 P ( C m 1 H H J p r ) H ( C m 1 H H J p r )
Let p = p 1 be the maximal term in the summation on the right-hand side of (A4), i.e.,
( C m 1 H H J p 1 r ) H ( C m 1 H H J p 1 r ) ( C m 1 H H J p r ) H ( C m 1 H H J p r ) , p [ 1 , P ]
Therefore, we have:
( C m 1 H H J p 1 r ) H ( C m 1 H H J p 1 r ) 1 P p = 1 P ( C m 1 H H J p r ) H ( C m 1 H H J p r ) = κ
According to the definition,
( C m 0 H H J p 0 r ) H ( C m 0 H H J p 0 r ) ( C m 0 H H J p 0 r ) H ( C m 0 H H J p 0 r ) κ
This proves that (8) is a sufficient condition for (7). The proof is complete.     □

Appendix B

Proof 
of upper and lower bounds for vec ( X ) H · vec ( X ) . The matrix S can be represented as:
S = s 1 s L + 1 s ( P 1 ) L + 1 s 2 s L + 2 s ( P 1 ) L + 2 s M K s L + M K s ( P 1 ) L + M K
Since X = S S H , the elements of X , denoted by x i j , can be expressed as:
x i j = p = 1 P s i + ( p 1 ) L * s j + ( p 1 ) L
Given that s H e n H e n s = 1 , for n = 0 , , N 1 , we can express vec ( X ) H · vec ( X ) as:
vec ( X ) H · vec ( X ) = i = 1 M K j = 1 M K p = 1 P s p + ( i 1 ) L * s p + ( j 1 ) L 2 = i = 1 M K j = 1 j i M K r ˜ i , j 2 + M K P 2 = i = 1 M K j = 1 j i M K s i H · s j 2 + M K P 2
where r ˜ i , j is the inner product of the vectors of the i-th and j-th windows. When i , j , s i H · s j = 0 , we have vec ( X ) H · vec ( X ) = M K P 2 . When i , j , s i H · s j = P , we have vec ( X ) H · vec ( X ) = M K 2 P 2 . Thus, we can conclude that:
M K P 2 vec ( X ) H · vec ( X ) ( M K ) 2 P 2
The proof is complete.     □

Appendix C

Proof of convergence of the MPI algorithm .
S ( i + 1 ) can be expressed as from (30):
R S ( i ) = R s 1 ( i ) | | R s P ( i )
where R = A M ( i ) A H and s p ( i ) is the pth column of S ( i ) . It is easy to know that R is a positive definite. The monotonicity of the MPI algorithm requires proof of the following equation:
p = 1 P ( s p ( i + 1 ) ) H R s p ( i + 1 ) p = 1 P ( s p ( i + 1 ) ) H R s p ( i + 1 ) 0
Note that
S ( i + 1 ) R S ( i ) Fro 2 = p = 1 P s p ( i + 1 ) R s p ( i ) 2 2
Expanding each term in (A12), we have
p = 1 P s p ( i + 1 ) R s p ( i ) 2 2 = const p = 1 P 2 Re ( ( s p ( i + 1 ) ) H R s ( i ) )
For each p, s p ( i + 1 ) is equivalently the maximizer of the criterion Re ( ( s p ( i + 1 ) ) H R s ( i ) ) . Moreover, if s p ( i + 1 ) s p ( i ) , clearly, we have
p = 1 P ( s m ( i + 1 ) ) H R s ( i + 1 ) > p = 1 P 2 Re ( ( s p ( i + 1 ) ) H R s ( i ) ) p = 1 P ( s m ( i ) ) H R s ( i ) > p = 1 P ( s m ( i ) ) H R s ( i )
as Re ( ( s p ( i + 1 ) ) H R s ( i ) ) > ( s m ( i ) ) H R s ( i ) , p = 1 , , P . The proof is complete.    □

References

  1. Hu, X.; Yang, J.; Meng, C.; Xu, Y.; Xie, Y. Analysis of Radar Survival Probability against Front Door Coupling Attack Based on Beam Pattern. In Proceedings of the 2023 3rd International Conference on Neural Networks, Information and Communication Engineering (NNICE), Guangzhou, China, 24–26 February 2023; pp. 122–126. [Google Scholar]
  2. Bang, J.H.; Park, H.D.; Lee, W.; Kim, D.; Kim, H.N. Accurate Estimation of LPI Radar Pulse Train Parameters via Change Point Detection. IEEE Access 2023, 11, 12796–12807. [Google Scholar] [CrossRef]
  3. Shi, C.; Wang, F.; Sellathurai, M.; Zhou, J.; Salous, S. Low Probability of Intercept-Based Optimal Power Allocation Scheme for an Integrated Multistatic Radar and Communication System. IEEE Syst. J. 2020, 14, 983–994. [Google Scholar] [CrossRef]
  4. Glenn, A. Low probability of intercept. IEEE Commun. Mag. 1983, 21, 26–33. [Google Scholar] [CrossRef]
  5. Pace, P.E.; Griffiths, H.D. Detecting and Classifying Low Probability of Intercept Radar – Second Edition. Aeronaut. J. 2011, 115, 389. [Google Scholar] [CrossRef]
  6. Grossi, E.; Taremizadeh, H.; Venturino, L. Radar Target Detection and Localization Aided by an Active Reconfigurable Intelligent Surface. IEEE Signal Process. Lett. 2023, 30, 903–907. [Google Scholar] [CrossRef]
  7. Li, X.; Cai, Z. Deep Learning and Time-Frequency Analysis Based Automatic Low Probability of Intercept Radar Waveform Recognition Method. In Proceedings of the 2023 IEEE 23rd International Conference on Communication Technology (ICCT), Wuxi, China, 20–22 October 2023; pp. 291–296. [Google Scholar]
  8. Jia, J.; Han, Z.; Liu, L. Review on Low Intercept Radar Signal Design Technology. In Proceedings of the 2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS), Shenyang, China, 29–31 July 2022; pp. 434–437. [Google Scholar]
  9. Yang, H.; Chen, J. Design of Costas/PSK Continuous Wave LPI Radar Signal. Int. J. Electron. 2017, 104, 404–415. [Google Scholar] [CrossRef]
  10. Tao, W.; Kaili, J.; Jingyi, L.; Tingting, J.; Bin, T. Research on LPI radar signal detection and parameter estimation technology. J. Syst. Eng. Electron. 2021, 32, 566–572. [Google Scholar] [CrossRef]
  11. Xie, M.; Yi, W.; Kong, L.; Kirubarajan, T. Receive-Beam Resource Allocation for Multiple Target Tracking with Distributed MIMO Radars. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2421–2436. [Google Scholar] [CrossRef]
  12. Shi, Y.; An, K.; Li, Y. Index Modulation Based Frequency Hopping: Anti-Jamming Design and Analysis. IEEE Trans. Veh. Technol. 2021, 70, 6930–6942. [Google Scholar] [CrossRef]
  13. Nowak, M.J.; Zhang, Z.; LoMonte, L.; Wicks, M.; Wu, Z. Mixed-Modulated Linear Frequency Modulated Radar-Communications. IET Radar Sonar Navig. 2017, 11, 313–320. [Google Scholar] [CrossRef]
  14. Alexander, D.B.; Narayanan, R.M.; Himed, B. Analysis of Sparse Co-Prime Sensing Array Performance Using Wideband Noise Signals. In Proceedings of the 2017 51st Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 29 October–1 November 2017; pp. 1147–1151. [Google Scholar]
  15. Qiongdan, H.; Yong, L.; Yaoping, Z.; Yinjuan, F. Design and Characteristic Analysis of Multicarrier Chaotic Phase Coded Radar Pulse Train Signal. Int. J. Antennas Propag. 2014, 2014, 724294. [Google Scholar]
  16. Chen, K.; Zhang, J.; Chen, S.; Zhang, S.; Zhao, H. Recognition and Estimation for Frequency-Modulated Continuous-Wave Radars in Unknown and Complex Spectrum Environments. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 6098–6111. [Google Scholar] [CrossRef]
  17. Chen, K.; Wang, L.; Zhang, J.; Chen, S.; Zhang, S. Semantic Learning for Analysis of Overlapping LPI Radar Signals. IEEE Trans. Instrum. Meas. 2023, 72, 8501615. [Google Scholar] [CrossRef]
  18. Liu, X.; Zhang, T.; Yu, X.; Shi, Q.; Cui, G.; Kong, L. LPI waveform design for radar system against cyclostationary analysis intercept processing. Signal Process. 2022, 201, 108681. [Google Scholar] [CrossRef]
  19. Schrick, G.; Wiley, R.G. Interception of LPI radar signals. In Proceedings of the IEEE International Conference on Radar, Arlington, VA, USA, 7–10 May 1990; pp. 108–111. [Google Scholar] [CrossRef]
  20. Luo, M.; Zhong, T.; Li, M.; Li, X.; Li, Z.; Wu, J.; Yang, J. Low Probability of Intercept Waveform Optimization Method for Sar Imaging. In Proceedings of the 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS, Brussels, Belgium, 11–16 July 2021; pp. 3963–3966. [Google Scholar] [CrossRef]
  21. Liu, S.; Cao, Y.; Yeo, T.S.; Wang, F.; Han, J. Range Sidelobe Suppression for Randomized Stepped-Frequency Chirp Radar. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 3874–3885. [Google Scholar] [CrossRef]
  22. Liu, S.; Cao, Y.; Yeo, T.S.; Wu, W.; Liu, Y. Adaptive Clutter Suppression in Randomized Stepped-Frequency Radar. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 1317–1333. [Google Scholar] [CrossRef]
  23. Hao, X.; Feng, Z.; Yang, S.; Wang, M.; Jiao, L. Automatic Modulation Classification via Meta-Learning. IEEE Internet Things J. 2023, 10, 12276–12292. [Google Scholar] [CrossRef]
  24. Wang, L.; Wang, W.Q.; Guan, H.; Zhang, S. LPI Property of FDA Transmitted Signal. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 3905–3915. [Google Scholar] [CrossRef]
  25. Gong, P.; Zhang, Z.; Wu, Y.; Wang, W.Q. Joint Design of Transmit Waveform and Receive Beamforming for LPI FDA-MIMO Radar. IEEE Signal Process. Lett. 2022, 29, 1938–1942. [Google Scholar] [CrossRef]
  26. Jin, Y.; Duan, P.; Ji, H. Parameter Estimation of LFM Signals Based on Scaled Ambiguity Function. Circuits Syst. Signal Process. 2016, 35, 4445–4462. [Google Scholar] [CrossRef]
  27. Hamschin, B.M.; Ferguson, J.D.; Grabbe, M.T. Interception of Multiple Low-Power Linear Frequency Modulated Continuous Wave Signals. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 789–804. [Google Scholar] [CrossRef]
  28. Alphonse, S.; Williamson, G.A. On Estimating Nonlinear Frequency Modulated Radar Signals in Low SNR Environments. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 1793–1802. [Google Scholar] [CrossRef]
  29. Chen, J.; Wang, J.; Zhang, Y.; Wang, F.; Zhou, J. Spatial Information-Theoretic Optimal LPI Radar Waveform Design. Entropy 2022, 24, 1515. [Google Scholar] [CrossRef] [PubMed]
  30. Chen, J.; Wang, F.; Zhou, J. Information-Theoretic Optimal Radar Waveform Selection with Multi-Sensor Cooperation for LPI Purpose. IEEE Access 2022, 10, 113649–113661. [Google Scholar] [CrossRef]
  31. Williams, E.C.; Bridges, C.P.; Bowyer, M.D.J. Nowhere to hide? Passive, non-cooperative maritime surveillance from a nanosat. In Proceedings of the 2018 IEEE Aerospace Conference, Big Sky, MT, USA, 3–10 March 2018; pp. 1–10. [Google Scholar] [CrossRef]
  32. Ellis, P.; Rheeden, D.V.; Dowla, F. Use of Doppler and Doppler Rate for RF Geolocation Using a Single LEO Satellite. IEEE Access 2020, 8, 12907–12920. [Google Scholar] [CrossRef]
  33. Kim, I.; Park, K.H.; Song, M.K.; Song, H.Y.; Lee, J.Y. Design of LPI signals using optimal families of perfect polyphase sequences. In Proceedings of the 2016 International Symposium on Information Theory and Its Applications (ISITA), Monterey, CA, USA, 30 October–2 November 2016; pp. 261–264. [Google Scholar]
  34. Warnke, L.; Correll, B.; Swanson, C.N. The Density of Costas Arrays Decays Exponentially. IEEE Trans. Inf. Theory 2023, 69, 575–581. [Google Scholar] [CrossRef]
  35. Gong, P.; Xu, K.; Wu, Y.; Zhang, J.; So, H.C. Optimization of LPI-FDA-MIMO Radar and MIMO Communication for Spectrum Coexistence. IEEE Wirel. Commun. Lett. 2023, 12, 1076–1080. [Google Scholar] [CrossRef]
  36. Su, Y.; Cheng, T.; He, Z. LPI-Constrained Collaborative Transmit Beampattern Optimization and Resource Allocation for Maneuvering Targets Tracking in Colocated MIMO Radar Network. Signal Process. 2023, 207, 108935. [Google Scholar] [CrossRef]
  37. Antonik, P.; Wicks, M.C.; Griffiths, H.D.; Baker, C.J. Frequency diverse array radars. In Proceedings of the 2006 IEEE Conference on Radar, Verona, NY, USA, 24–27 April 2006; p. 3. [Google Scholar] [CrossRef]
  38. Pandit, S.; Singh, G. Spectrum Sensing in Cognitive Radio Networks: Potential Challenges and Future Perspective. In Spectrum Sharing in Cognitive Radio Networks: Medium Access Control Protocol Based Approach; Springer International Publishing: Cham, Switzerland, 2017; pp. 35–75. [Google Scholar] [CrossRef]
  39. Aubry, A.; Carotenuto, V.; De Maio, A.; Govoni, M.A.; Farina, A. Experimental Analysis of Block-Sparsity-Based Spectrum Sensing Techniques for Cognitive Radar. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 355–370. [Google Scholar] [CrossRef]
  40. Kuzdeba, S.; Radlbeck, A.; Anderson, M. Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures. In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–9. [Google Scholar] [CrossRef]
  41. Mariani, A.; Giorgetti, A.; Chiani, M. Energy Detector Design for Cognitive Radio Applications. In Proceedings of the 2010 International Waveform Diversity and Design Conference, Niagara Falls, ON, Canada, 8–13 August 2010; pp. 53–57. [Google Scholar]
  42. Saarnisaari, H.; Vartiainen, J. Signal detection with spectrum windows. Heliyon 2022, 8, e10054. [Google Scholar] [CrossRef]
  43. Wang, J.; Xie, Y.; Li, B.; Yang, C.; Hu, S. The Reconfigurable Pipelined Variable-Point FFT Processor Design. In Proceedings of the 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), Chongqing, China, 11–13 December 2019; pp. 1–4. [Google Scholar]
  44. Soltanalian, M.; Tang, B.; Li, J.; Stoica, P. Joint Design of the Receive Filter and Transmit Sequence for Active Sensing. IEEE Signal Process. Lett. 2013, 20, 423–426. [Google Scholar] [CrossRef]
  45. Wang, S.; Inkol, R.; Rajan, S.; Patenaude, F. On the Performance Gain of the FFT Filter-Bank-Based Summation and Majority CFAR Detectors. IEEE Trans. Instrum. Meas. 2009, 58, 1778–1788. [Google Scholar] [CrossRef]
  46. Tang, B.; Li, J.; Liang, J. Alternating direction method of multipliers for radar waveform design in spectrally crowded environments. Signal Process. 2018, 142, 398–402. [Google Scholar] [CrossRef]
  47. Aubry, A.; DeMaio, A.; Farina, A.; Wicks, M. Knowledge-Aided (Potentially Cognitive) Transmit Signal and Receive Filter Design in Signal-Dependent Clutter. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 93–117. [Google Scholar] [CrossRef]
  48. Soltanalian, M.; Stoica, P. Designing Unimodular Codes Via Quadratic Optimization. IEEE Trans. Signal Process. 2014, 62, 1221–1234. [Google Scholar] [CrossRef]
  49. Xu, Y.; Lu, C.; Deng, Z.; Liu, Y.F. New Semidefinite Relaxations for a Class of Complex Quadratic Programming Problems. J. Glob. Optim. 2023, 87, 255–275. [Google Scholar] [CrossRef]
  50. Mitra, S.K.; Kuo, Y. Digital Signal Processing—A Computer Based Approach; McGraw-Hill Higher Education: New York, NY, USA, 2006. [Google Scholar]
  51. Cheng, Z.; He, Z.; Liao, B.; Fang, M. MIMO Radar Waveform Design with PAPR and Similarity Constraints. IEEE Trans. Signal Process. 2018, 66, 968–981. [Google Scholar] [CrossRef]
  52. Varadhan, R.; Roland, C. Simple and globally convergent methods for accelerating the convergence of any em algorithm. Scand. J. Stat. 2008, 35, 335–353. [Google Scholar] [CrossRef]
  53. Stoica, P.; He, H.; Li, J. New Algorithms for Designing Unimodular Sequences with Good Correlation Properties. IEEE Trans. Signal Process. 2009, 57, 1415–1425. [Google Scholar] [CrossRef]
  54. Zhang, N.; Golomb, S.W. Polyphase sequence with low autocorrelations. IEEE Trans. Inf. Theory 1993, 39, 1085–1089. [Google Scholar] [CrossRef]
  55. Martino, A.D. Introduction to Modern EW Systems; Artech House: Norwood, MA, USA, 2018. [Google Scholar]
  56. Golay, M. A class of finite binary sequences with alternate auto-correlation values equal to zero. IEEE Trans. Inf. Theory 1972, 18, 449–450. [Google Scholar] [CrossRef]
Figure 1. The sketch of the LPI radar and ES system framework.
Figure 1. The sketch of the LPI radar and ES system framework.
Remotesensing 16 02021 g001
Figure 2. Comparison of the convergence between MPI and spectral-MPI with different parameters and their respective accelerated versions.
Figure 2. Comparison of the convergence between MPI and spectral-MPI with different parameters and their respective accelerated versions.
Remotesensing 16 02021 g002
Figure 3. Comparison of the convergence time of the spectral-MPI and accelerate-spectral-MPI.
Figure 3. Comparison of the convergence time of the spectral-MPI and accelerate-spectral-MPI.
Remotesensing 16 02021 g003
Figure 4. Comparison of the maximum propagation distance of common sequence and accelerated-MPI initialized by different sequences.
Figure 4. Comparison of the maximum propagation distance of common sequence and accelerated-MPI initialized by different sequences.
Remotesensing 16 02021 g004
Figure 5. Comparison of the maximum propagation distance between normal waveforms and accelerated-MPI with different M K .
Figure 5. Comparison of the maximum propagation distance between normal waveforms and accelerated-MPI with different M K .
Remotesensing 16 02021 g005
Figure 6. Comparison of the merit factor of common sequences and accelerated-MPI initialized by different sequences.
Figure 6. Comparison of the merit factor of common sequences and accelerated-MPI initialized by different sequences.
Remotesensing 16 02021 g006
Figure 7. Comparison of the merit factor of accelerated-MPI initialized by different sequences versus ξ .
Figure 7. Comparison of the merit factor of accelerated-MPI initialized by different sequences versus ξ .
Remotesensing 16 02021 g007
Figure 8. Time–frequency energy flow of spectral-MPI with low spectral power in frequency bands [ 0 , 0.2 ) ( 0.3 , 0.5 ) ( 0.8 , 1 ] .
Figure 8. Time–frequency energy flow of spectral-MPI with low spectral power in frequency bands [ 0 , 0.2 ) ( 0.3 , 0.5 ) ( 0.8 , 1 ] .
Remotesensing 16 02021 g008
Figure 9. Time–frequency energy flow of spectral-MPI with low spectral power in frequency bands [ 0 , 1 ] .
Figure 9. Time–frequency energy flow of spectral-MPI with low spectral power in frequency bands [ 0 , 1 ] .
Remotesensing 16 02021 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Q.; Guo, F.; Xiong, K.; Liu, Z.; Hu, W. LPI Sequences Optimization Method against Summation Detector Based on FFT Filter Bank. Remote Sens. 2024, 16, 2021. https://doi.org/10.3390/rs16112021

AMA Style

Liu Q, Guo F, Xiong K, Liu Z, Hu W. LPI Sequences Optimization Method against Summation Detector Based on FFT Filter Bank. Remote Sensing. 2024; 16(11):2021. https://doi.org/10.3390/rs16112021

Chicago/Turabian Style

Liu, Qiang, Fucheng Guo, Kunlai Xiong, Zhangmeng Liu, and Weidong Hu. 2024. "LPI Sequences Optimization Method against Summation Detector Based on FFT Filter Bank" Remote Sensing 16, no. 11: 2021. https://doi.org/10.3390/rs16112021

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop