Next Article in Journal
Mechanical Strength and Broadband Transparency Improvement of Glass Wafers via Surface Nanostructures
Previous Article in Journal
Multi-Target State Extraction for the SMC-PHD Filter
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Radar Constant-Modulus Waveform Design with Prior Information of the Extended Target and Clutter

1
Beijing Institute of Tracking and Telecommunications Technology (BITTT), Beijing 100094, China
2
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(6), 889; https://doi.org/10.3390/s16060889
Submission received: 29 February 2016 / Revised: 8 April 2016 / Accepted: 8 June 2016 / Published: 17 June 2016
(This article belongs to the Section Remote Sensors)

Abstract

:
Radar waveform design is of great importance for radar system performances and has drawn considerable attention recently. Constant modulus is an important waveform design consideration, both from the point of view of hardware realization and to allow for full utilization of the transmitter’s power. In this paper, we consider the problem of constant-modulus waveform design for extended target detection with prior information about the extended target and clutter. At first, we propose an arbitrary-phase unimodular waveform design method via joint transmitter-receiver optimization. We exploit a semi-definite relaxation technique to transform an intractable non-convex problem into a convex problem, which can then be efficiently solved. Furthermore, quadrature phase shift keying waveform is designed, which is easier to implement than arbitrary-phase waveforms. Numerical results demonstrate the effectiveness of the proposed methods.

1. Introduction

It has been widely acknowledged that waveform design is critically important for radar performance in areas such as target detection, clutter suppression, and target identification, especially when in the presence of channel noise and clutter [1,2]. However, optimal radar waveform is highly task-dependent and is also affected by the model of the target and surrounding environments. In the 1960s, some early research on radar waveform optimization was conducted [1,2,3,4,5]. All the early works assumed a point target model. However, as radar bandwidth and range resolution improve, the illuminated target usually exceeds one resolution cell. Thus, the point target assumption does not hold and should be replaced by an extended target model [6]. Therefore, the paper considers waveform design for extended targets.
Generally, radar waveform design methods can be broken into four categories: (1) information theory based design [7,8,9,10,11,12,13,14]; (2) ambiguity-function based design [15,16,17]; (3) detection-probability based design [18,19,20]; and (4) signal-to-clutter-plus-noise ratio (SCNR) based design [21,22,23,24,25,26,27]. Information theoretic methods were inspired by the very essence of radar—acquiring target related information [7]. Mutual information (MI) criteria between the target return and the target impulse response (TIR) was later used for radar parameter estimation and target identification [8,9,10,11,12,13,14]. The relationship between minimum mean squared error and MI metrics was discussed in [9,11], and the case of multiple extended targets was considered in [12]. Ambiguity-function based methods [15,16,17] design the transmitted waveform by reshaping its ambiguity function—suppressing the Doppler-range (angle-Doppler-range, in the MIMO radar case) region where targets might emerge. These methods require prior information about the range and Doppler distribution of clutter and/or jamming—which is more than the statistical characteristics that would be needed in the detection-probability and SCNR based methods. However, the methods based on ambiguity functions deal mainly with point targets, which is somewhat off the topic of this paper.
The basic idea of detection-probability based methods is to optimize the transmitted waveform to maximize detection probability for a given false alarm rate. It has been shown that a simple single-tone signal is optimal if the target’s Doppler is unknown and is uniformly distributed over the Doppler bandwidth [18]. Steven Kay [19] obtained an analytical solution of the optimal waveform for Gaussian-distributed point target using the Neyman-Pearson criterion. The results in [19] were heuristically extended to the multistatic radar case [20]. However, detection probability based methods encounters difficulties with extended targets and waveform-dependent clutter, because in these cases the explicit probability density function of the radar return is hard to obtain, and further analysis becomes very difficult. Fortunately, we can resort to SCNR based methods, whose optimization criterion is to maximize the output SCNR. Bell derived an eigen-waveform solution for a clutter-free environment with energy constraints, for the first time [8]. However, in practice, radar returns are usually contaminated by clutter coupled with the transmitted waveform. This coupling poses a big challenge for optimal waveform design. To overcome the problem, Pillai [22,23] proposed an iterative algorithm—which is also called the eigen-iterative algorithm in some literature—to determine the optimal transmit pulse and receiver impulse response. This iterative technique was later extended to the discrete time domain [24] and the multiple-input multi-output (MIMO) radar case [26]. However, the technique in [22,23,24] is flawed, in that it cannot guarantee a non-decreasing SCNR at each iteration step. Chen et al. [26] solved this problem under a total energy constraint through alternate optimization, improving the SCNR at each iteration, and thus guaranteeing its convergence.
However, much existing work [8,10,11,12,13,14,16,17,18,19,20,22,23,24,25,26,27] is based on the assumption that radar transmitted signals can be modulus-arbitrary—something which is still difficult to implement in present radar systems—limited by the linear range of the radio frequency (RF) power amplifier and the capabilities of present RF antennas [5,21,28,29]. Accordingly, the design of radar waveform with limited dynamic range was considered in [5,28], and constant-modulus waveform design was discussed in [21,29]. Note that constant-modulus waveform is important for power efficient radars, such as airborne and spaceborne radars. In [21], an adaptive phase-coded waveform design was proposed, but it did not take the clutter into account, which hampered its practicability. Reference [29] optimizes a phase-modulated waveform by approaching the optimal energy spectral density in the mean-square sense, but the method requires prior knowledge of the power spectral density of channel noise and clutter. In this paper, we further extend the design of constant-modulus waveforms in discrete time domain in the presence of clutter.
As is well known, the TIR is highly range and orientation sensitive [6]. Small variations in target range or orientation relative to the radar might lead to significant TIR changes. Therefore, we think that a deterministic and precisely known TIR is not realistic. Instead, we consider the TIR in a statistical way. This assumption has also been made in [8,9,10,11,12,13,14,18,19,20,26,29,30]. Note that, as will be demonstrated later, our methods are suitable for the deterministic target model as well. In addition, we concentrate on single-input single-output (SISO) radar in this paper: the extension of our methods to the MIMO radar case is straightforward.
The main contributions of this paper are summarized as follows. We propose two iterative constant-modulus waveform design methods, both using alternate optimization of the transmitted waveform and the receiving filter. One of these methods yields arbitrary-phase waveforms, while the other yields quadrature phase shift keying (QPSK) waveforms. We also discuss the relationship between a non-convex optimization problem and the corresponding convex problem that results after semi-definite relaxation (SDR), which could be instructive to similar optimization problems in signal processing fields.
The rest of the paper is organized as follows. Section 2 presents the radar signal model and formulates the signal design problem. In Section 3, two iterative constant-modulus waveform design methods are proposed. Detailed performance analysis of our methods is provided in Section 4. In Section 5, we show the results of numerical simulations and demonstrate the effectiveness of our proposed algorithms. Finally, conclusions are presented in Section 6.
Notations: Vectors and matrices are denoted by boldface lowercase and uppercase letters, respectively. Superscript T, *, and H denote transpose, conjugation and Hermitian transpose of a vector/matrix, respectively. I n is the n × n unity matrix, whereas 0 m × n and 1 m × n ( 0 n and 1 n ) indicate m × n ( n × 1 ) matrices whose elements are all 0 and 1, respectively. The subscript may be omitted if it does not cause confusion in the matrix/vector size. A m n represents the element of matrix A located at the mth row and nth column. z n or z ( n ) represents the nth component of vector z. z ( i : j ) denotes the segment of z from the ith element to jth element. E ( · ) denotes the expected value of a random variable. We write Re ( · ) , Im ( · ) , and | | for the real part, imaginary part and modulus of a complex scalar/matrix, respectively. λ i ( A ) denotes the ith largest eigenvalue of A and v i ( A ) denotes the corresponding eigenvector. A 0 ( A 0 ) means that matrix A is Hermitian positive semi-definite (positive definite). A B means that A B 0 . j is the imaginary unit. C N and N designate the complex and real normal distributions, respectively.

2. Signal Model and Problem Formulation

In this paper, we use the discrete baseband signal model illustrated in Figure 1. In this figure, s N s × 1 denotes the transmitted waveform; h t N t × 1 and h c N c × 1 are the impulse response of target and clutter, respectively; n N n × 1 denotes the sum of noise and interference/jamming with covariance matrix R n ; x denotes the returns from target and ambient clutter, while w denotes the receiving filter vector. In a practical radar system, s is converted to an analog waveform, modulated to RF, and transmitted. Inversely, the returns are received, demodulated and down-sampled to a discrete vector signal. In this paper, we focus on the discrete baseband signal in the time domain and do not discuss continuous signals or the frequency domain further.
As shown in Figure 1, we model the clutter return c as the output of a random linear time invariant (LTI) filter whose impulse response h c can be regarded as a wide sense stationary (WSS) random vector with covariance matrix R c . As mentioned in Section 1, we consider h t in a statistical way [8,9,10,11,12,13,14,18,19,20,26,29,30] and its covariance matrix is denoted as R t . We have assumed that the target is static (or equivalently, that the Doppler shift has been precisely measured and compensated), which is also implied in Figure 1. The assumption of the zero-Doppler target has also been made in [8,9,10,11,12,13,14,19,22,23,24,25,26,27,29]. According to [19], if we obtain the optimal waveform with this model, improved performance will result with the optimized waveform in the moving target case as well. We will explore the moving target case in the future.
According to our model, the returns can be formulated as:
x = h t s + c + n
where * denotes the convolution operator. The matrix form of Equation (1) is:
x = H t s + H c s + n
where H t and H c are the target and clutter convolution matrices, and are shown in Equations (3) and (4), respectively. Note that the differences between Equations (3) and (4) come from the ubiquity of the clutter, because anything in the illuminated area of the radar that does not interest us can be viewed as clutter [26]. From Equation (3), we obtain H t = [ ξ 0     ξ N s 1 ] , where ξ i = [ 0 i T ,   h t T , 0 N t i 1 T ] T . We use function H t = f ( h t , N s ) to represent the relationship between H t and h t .
H t = [ h t ( 1 ) 0 0 h t ( N t ) 0 h t ( 1 ) h t ( N t ) 0 h t ( 1 ) 0 0 h t ( N t ) ]
H c = [ h c ( 0 ) h c ( 1 ) h c ( N s + 1 ) h c ( 1 ) h c ( 0 ) h c ( 1 ) h c ( 0 ) h c ( 1 ) h c ( N t + N s 2 ) h c ( N t 1 ) ]
From Equation (4), we define vector h c as:
h c = [ h c ( N s + 1 ) h c ( 0 ) h c ( N t + N s 2 ) ] T
It is apparent that N s , N t , N n and N c , which are the length of s , h t , n and h c , respectively, satisfy the following identities:
N c = N t + 2 N s 2 , N n = N t + N s 1
Using Equation (2), the receiver output can be expressed as:
y = w H x = w H H t s s i g n a l + w H ( H c s + n ) c l u t t e r a n d n o i s e
where the target return is w H H t s , and the sum of the clutter return and channel noise is w H ( H t s + n ) . Considering the statistical property of the clutter and target, it is necessary to take the expectation value of the clutter return and target return. Thus, the SCNR of the output signal can be written as:
S C N R = E [ | w H H t s | 2 ] E [ | w H ( H c s + n ) | 2 ] w H R t s w w H ( R c s + R n ) w s H R t w s s H ( R c w + w H R n w N s I ) s
where, for notational simplicity, we let
{ R t s E [ H t s s H H t H ] , R c s E [ H c s s H H c H ] R t w E [ H t H w w H H t ] , R c w E [ H c H w w H H c ]
Define S 1 f ( s , N t ) , S 2 f ( s , N c ) , and H ˜ c f ( h c , N s ) . With the fact that H t s = S 1 h t , we have
R t s = E [ H t s s H H t H ] = E [ S 1 h t h t H S 1 H ] = S 1 R t S 1 H
Letting Q [ 0 N n × ( N s 1 )   I N n × N n   0 N n × ( N s 1 ) ] , H c can then be written as H c = Q H ˜ c . It follows that
R c s = E [ H c s s H H c H ] = Q E [ H ˜ c s s H H ˜ c H ] Q H = Q E [ S 2 h c h c H S 2 H ] Q H = Q S 2 R c S 2 H Q H
Moreover, the definition of
W [ ζ 1 ζ 2 ζ N s ] T , ζ i w ( i : N t + i 1 )
produces H t H w = W h t * , and
R t w = E [ H t H w w H H t ] = E [ W h t * h t T W H ] = W R t * W H
Use W = g ( w , N t ) to represent the relationship between W and w in Equation (12). Define w ˜ [ 0 N s 1 T   w T   0 N s 1 T ] T , and W ˜ g ( w ˜ , N c ) , then we have H c H w = H ˜ c H w ˜ = W ˜ h t * , and
R c w = E [ H c H w w H H c ] = E [ H ˜ c H w ˜ w ˜ H H ˜ c ] = E [ W ˜ h c * h c T W ˜ H ] = W ˜ R c * W ˜ H
It should be noted that, even though Equations (8) and (10)–(14) are obtained based on the statistical target assumption, they also hold for the deterministic extended target. The only difference is that the rank of R t in the deterministic case will be 1. Equations (10)–(14) provide an easy analytical way to compute matrices R t s , R c s , R t w , and R c w , whereas the randomization method presented in [26] to compute these matrices suffers from inaccuracy and heavy computation. On the basis of Equations (8) and (10)–(14), our next goal is to optimize s under the constant-modulus constraint, to maximize SCNR.

3. Constant-Modulus Waveform Design Methods

In this section, two iterative constant-modulus signal design algorithms are proposed, whose key idea is to alternately optimize the transmitted waveform s and the receiving filter w to improve SCNR at each iteration step. We adopt the following strategy: first, we optimize w for fixed transmitted waveform s; then, we optimize s under the constant modulus constraint, for the fixed receiving filter w previously found. Even though the alternate optimization strategy may become trapped by local optima, it could at least achieve the optimum separately along the w dimension and s dimension at the “trapping” point [26,31].

3.1. Algorithm 1—Arbitrary-Phase Waveform Design

First, when s is fixed, the optimization problem becomes:
max w w H R t s w w H ( R c s + R n ) w
This is the well-known Rayleigh quotient problem. The optimal solution for Equation (15) is:
w o p t = v 1 ( ( R c s + R n ) 1 R t s )
and the maximum is λ 1 ( ( R c s + R n ) 1 R t s ) . Substitution of Equation (16) back into Equation (15) yields an expression of SCNR as a function of s. However, determining the s that maximizes the SCNR using that expression is not simple. This is also why we take an alternate optimization strategy here.
When w is fixed, without the constant modulus constraint, the optimization problem turns out to be:
max s s H R t w s s H ( R c w + w H R n w N s I ) s
Similarly, the optimal solution is:
s o p t = v 1 ( ( R c w + w H R n w N s I ) 1 R t w )
with the maximum SCNR λ 1 ( ( R c w + w H R n w N s · I ) 1 R t w ) .
However, things become complicated if s is required to be constant-modulus. Recognizing that, in this case, the amplitude of s is simply a scale factor with no effect on SCNR, we henceforth assume s to be unimodular. To simplify the notation, we let R t w Ω 1 , and R c w + w H R n w N s · I Ω 2 . The optimization problem Equation (17) can then be expressed as:
max s s H Ω 1 s s H Ω 2 s s . t . | s ( k ) | = 1 , k = 1 , , N s
Unfortunately, the optimization problem Equation (19) is nonconvex, and needs to be converted to a problem that can be efficiently solved. Letting X s s H , we can rewrite Equation (19) as:
max X t r ( Ω 1 X ) t r ( Ω 2 X ) s . t . d i a g ( X ) = 1 N s , r a n k ( X ) = 1 , X 0
where t r ( · ) denote the trace of a matrix. As long as it does not lead to confusion, we henceforth omit the subscript N s of 1 N s in Equation (20). However, Equation (20) still is a nonconvex problem owing to the non-convexity of both the objective function and the constraint condition r a n k ( X ) = 1 . Fortunately, the semi-definite relaxation (SDR) technique can remove the non-convexity of constraint r a n k ( X ) = 1 by relaxing it into X 0 . The SDR technique and the following randomization approach are commonly used for optimization problems in the signal processing research area (e.g., [32], for recent literature). Applying SDR, Equation (20) then becomes:
max X t r ( Ω 1 X ) t r ( Ω 2 X ) s . t . d i a g ( X ) = 1 , X 0
Lemma 1 then converts Equation (21) into an equivalent convex problem.
Lemma 1. 
If X o p t and t o p t solve the convex optimization problem
min X , t t r ( Ω 2 X ) s . t . t r ( Ω 1 X ) = 1 , d i a g ( X ) = t 1 , X 0
then X X o p t / t o p t solves Equation (21).
Proof. 
According to the definition of X o p t and t o p t , we have
X = X o p t / t o p t 0 , d i a g ( X ) = d i a g ( X o p t ) / t o p t = 1
Hence, X is within the feasible region of Equation (21).
For any matrix X N s × N s which satisfies d i a g ( X ) = 1 ,   X 0 , we define t r ( Ω 1 X ) a , X X / a . We then have t r ( Ω 1 X ) 1 , and
t r ( Ω 2 X ' ) t r ( Ω 2 X o p t )
which derives from the fact that X o p t is the optimal solution of Equation (22). It follows that
t r ( Ω 1 X ) t r ( Ω 2 X ) = t r ( Ω 1 X o p t ) / t o p t t r ( Ω 2 X o p t ) / t o p t = t r ( Ω 1 X o p t ) t r ( Ω 2 X o p t ) = 1 t r ( Ω 2 X o p t ) 1 t r ( Ω 2 X ' ) = t r ( Ω 1 X ) t r ( Ω 2 X )
which completes the proof.
Solving the convex problem Equation (22) with the existing toolboxes (e.g., CVX toolbox [33]) is much easier than solving Equation (21). However, it should be noted that the optimal value of the objective function in Equation (22) is lower than that of Equation (19). The approximation bound for the two optima will be discussed in the next section. To obtain the optimal signal s o p t with the optimal solution X of Equation (21), we propose a customized randomization approach, shown in Table 1.
One can notice that we use s ( c a n , k ) = e x p ( j · a n g ( s ( k ) ) ) , other than s ( c a n , k ) = e x p ( j · a n g ( s ( k ) ) ) , to normalize s k in step 4 of Table 1. The reason is that, even though they perform similarly according to our numerical experiments, the former facilitates further analysis of the SDR technique in the next section. Please note that both forms perform well in our simulations. The procedure of the iterative arbitrary-phase waveform design method (i.e., Algorithm 1) is presented in Table 2.

3.2. Algorithm 2—QPSK Waveform Design

In this subsection, we discuss the waveform design method using a QPSK waveform instead of an arbitrary-phase waveform. The main difference between these two methods lies in the way candidate vectors are generated. In [34], we showed that QPSK signal could approximate a given covariance matrix quite closely. The method in [34] is based on the change of correlation properties arising from memoryless nonlinear transformation of Gaussian process [35], and could be applied here. Consider two Gaussian variables x m , x n with zero mean, unit variance, and covariance ρ. Then, the covariance γ of sgn ( x m ) and sgn ( x n ) , where sgn ( x ) takes the value +1, −1 when x is positive and negative, respectively, satisfies [35]
ρ = sin ( π 2 γ )
This equation is the foundation of our QPSK waveform design. The candidate QPSK vector design procedure using matrix X , the optimal solution of Equation (21), is presented in Table 3. Further details can be found in [34].
Note that, in Step 3, we use a forced positive Cholesky decomposition because X ˜ cannot be guaranteed to be semi-positive definite. We refer the interested readers to [34], where we presented one equivalent condition and two sufficient conditions in different forms for X ˜ 0 . We could now obtain QPSK candidate vectors s c a n , k QPSK ,   k = 1 ,   2 , , K and choose the one that maximizes the SCNR in Equation (19). We consider this subsection to be important work, because the QPSK signal generation technique is easy and mature, compared with arbitrary-phase or non-constant modulus signals.
Both our proposed iterative constant-modulus waveform design methods are summarized in Figure 2. We can see that the arbitrary-phase and QPSK waveform design methods share the same overall procedure, the only difference being the way in which candidate vectors are generated.

4. Algorithm Performance Analysis

This section is composed of two parts: we first discuss further the performance loss caused by the used semi-definite relaxation; this discussion throws new insights into similar optimization problems; we then present an upper bound analysis of the SCNR increment at each iteration, an analysis that, in our opinion, is necessary for an iterative algorithm.

4.1. Semi-Definite Relaxation and Loss of Performance

In this subsection, we focus on the relationship between the original optimization problem Equation (19) and its corresponding SDR problem Equation (21). To ensure consistency with Section 3, X still designates here the optimal solution to Equation (21) and could be obtained via the optimal solutions of Equation (22), X o p t and t o p t . We denote the optimal solution of Equation (19) by s o p t , and the corresponding optimal SCNR by u o r g , i.e., u o r g = ( s o p t H Ω 1 s o p t ) / ( s o p t H Ω 2 s o p t ) . For the sake of simplicity, we define
u s d p t r ( Ω 1 X ) t r ( Ω 2 X ) u ( r d ) max s c a n , k H Ω 1 s c a n , k s c a n , k H Ω 2 s c a n , k , k = 1 , , K u ( e p ) E ( s c a n , k H Ω 1 s c a n , k s c a n , k H Ω 2 s c a n , k )
where u ( r d ) and u ( e p ) represent the optimal and expected value of the SCNRs obtained from the candidate vectors, respectively. Based on our definitions, it is easily verified that
u o r g u ( r d ) u ( e p )
We will later further discuss the relationship of u o r g , u s d p , u ( r d ) and     u ( e p ) . The following lemma addresses the effect of modulus normalization s ( c a n , k ) = e x p ( j · a n g ( s ( k ) ) ) on the signal covariance matrix.
Lemma 2. 
Assume that X N × N is a Hermitian matrix satisfying X 0 or X 0 , d i a g ( X ) = 1 and | X p q | 1 for all 1 p < q N . s ^ denotes the unimodular random vector obtained from X with the randomization procedure of Table 1. Then we have
E ( s ^ s ^ H ) = F ( X )
where F ( · ) is a component-wise matrix function
F ( X ) = [ F ( X p q ) ] N × N
and
F ( x ) = 1 4 π 0 2 π e j θ ( arccos ( γ cos ( θ α ) ) ) 2 d θ
where x with 0 γ = | x | 1 and α = a r g ( x ) .
The proof of this Lemma is given in Appendix A. Lemma 2 provides the change of covariance matrix of the random vectors after modulus normalization. With the help of Lemma 2, we introduce the following theorem.
Theorem 3. 
For optimization problem Equations (19) and (21), it holds that
u o r g u ( r d ) u ( e p ) π u 1 4 u max u o r g
where u 1 = t r ( Ω 2 X ) , u m a x = sup k = 0 , 1 , 2   t r ( Ω 2 ( | X | ( 2 k ) X ) ) , is the Hadamard product operator, and the superscript ( k ) means
A ( k ) = A A A k
We define A ( 0 ) 1 N × N to make ( | X | ( 2 k ) X ) equal X when k = 0 .
The proof of Theorem 3 can be found in Appendix B. Particularly, if u max = tr ( Ω 2 lim k ( | X | ( 2 k ) X ) ) , and X is a matrix satisfying | X p q | < 1   f o r   1 p q N s , it follows that lim k ( | X | ( 2 k ) X ) = I and u max = tr ( Ω 2 ) . Therefore, we have
u ( r d ) π u 1 4 t r ( Ω 2 ) u o r g
From the proof in Appendix B, we can see that the performance loss of Equation (21) relative to Equation (19), is directly related to the approximation to X of the normalized unimodular vectors or QPSK vectors covariance matrix. The closer the approximation, the smaller the performance loss will be. As shown in [34], our QPSK signal design scheme could approximate the original matrix X quite closely. We will not talk further about the QPSK signal case. However, it is still interesting to note that, according to [36], there will not be any performance loss between the optimization problem
max s s H Ω 1 s s H Ω 2 s s . t . | s ( k ) | { 1 , j , 1 , j } , k = 1 , , N s
and the corresponding problem Equation (21) after relaxation followed by the discrete randomization approach presented in Equation (A2) with m = 4 .

4.2. Upper Bound Analysis of the SCNR Increment at Each Iteration

The alternate optimization scheme along the w and s dimensions guarantees that SCNR will not decrease as iterations progress. In this subsection, we present a preliminary upper bound analysis of the SCNR increment at each iteration (A loose lower bound can be taken to be 0.). Noticing that, at every iteration, we solve Equation (15) and obtain the optimal SCNR λ 1 ( ( R c s + R n ) 1 R t s ) , we just need to concentrate on λ 1 ( ( R c s + R n ) 1 R t s ) and analyze its increment. To that end, we first introduce the following lemma.
Lemma 4. 
Suppose that A N × N = Q Λ Q 1 is diagonalizable and Q is an invertible matrix, Λ is diagonal, and Δ A ,   B N × N satisfy Δ A = B A . Then for any μ { λ i ( B ) , i = 1 , , N } , there exists χ { λ i ( A ) , i = 1 , , N } such that
| χ μ | inf p 1 [ cond ( Q , p ) Δ A p ]
where · p ,   p 1 represents the p-norm of a matrix, and c o n d ( Q , p ) = Q 1 p Q p is generally called the condition number.
The proof of Lemma 4 is similar with that of Theorem 3 in [37], except for extending to arbitrary p-norm ( p 1 ). Thus, Lemma 4 can be viewed as a straightforward extension of Theorem 3 in [37]. One can refer to [37] for the proof details. From Lemma 4, we can see that the upper bound of the change of the largest eigenvalue of matrix A due to the perturbation Δ A , i.e., | λ 1 ( A + Δ A ) λ 1 ( A ) | , depends on the norm of Δ A and the condition number of matrix Q , whose columns are the eigenvectors of A .
For simplicity, we assume that R t s is full rank. The situation when R t s is rank deficient would not be much different. Given that R t s 0 , there must exist an invertible matrix M N × N such that R t s = M M H . Considering that M H ( R c s + R n ) 1 R t s ( M H ) 1 = M H ( R c s + R n ) 1 M , ( R c s + R n ) 1 R t s has the same eigenvalues as matrix M H ( R c s + R n ) 1 M , which is Hermitian and positive definite. Note that M H ( R c s + R n ) 1 M is unitary similar to a diagonal matrix, i.e.,
M H ( R c s + R n ) 1 M = P Λ P 1
where P is a unitary matrix, and Λ is diagonal with positive diagonal elements. One simple fact is that the unitary matrix P satisfies P 1 2 P 2 = 1 . To simplify the exposition, we denote Equation (34) by Θ ( s ) . Therefore, if one iteration transforms the transmitted waveform from s to s + Δ s , the upper bound of the SCNR increment in this iteration is Θ ( s + Δ s ) Θ ( s ) 2 , i.e.,
| λ 1 ( Θ ( s + Δ s ) ) λ 1 ( Θ ( s ) ) | Θ ( s + Δ s ) Θ ( s ) 2
Note that Θ ( s ) is a continuous function of s . Therefore, as Δ s 0 , the variation of Θ ( s ) also tends to 0, Θ ( s + Δ s ) Θ ( s ) 2 0 , and finally | λ 1 ( Θ ( s + Δ s ) ) λ 1 ( Θ ( s ) ) | 0 . This is sensible, and gives some insights into the rationality of Equation (35).
Also note that it is reasonable to state that the waveform design methods developed herein could be instrumental for improving the performance of the ultra-wide band cognitive radio [38] and sensor radar networks [39,40], considering that they share common issues such as clutter suppression, and extended target feature extraction. The adaption of the proposed technique to these scenarios is currently being investigated.

5. Results

In this section, we demonstrate the effectiveness of the proposed methods. The simulation parameters are as follows. The length of h t is N t = 20 , while the phase coding length of the transmitted waveform is N s = 50 . Without any loss of generality, we let the noise covariance matrix be R n = σ n 2 I , with σ n 2 = 0.01 . The sample number in the randomization approach is K = 10,000. As in [26], we use a random phase-coded signal as the initial transmitted waveform. R c is modeled as being the covariance matrix of the output of a linear time invariant (LTI) filter with impulse response h , whose input signal is complex Gaussian white noise with unit variance. h is assumed to be:
h ( n ) = { 1 , n = 0 , 1 , , 14 0 , o t h e r w i s e
The element values of R c   are illustrated graphically in Figure 3a. We denote the matrix in Figure 3a by R c ( 1 ) and further let R c   = σ c 2 R c ( 1 ) , where σ c 2 can be considered to be the clutter power. Thereby, we define the clutter-to-noise ratio (CNR) as σ c 2 / σ n 2 . Without specific statements, CNR is set to 10 dB. The iteration number starts at 1 and increases every time we compute Equation (16).
We will now test and verify the performances of the proposed Algorithms 1 and 2 in two cases: the statistical target case and the deterministic target case.

5.1. Statistical Target Case

In this subsection, we consider a statistical h t . To guarantee positive semi-definiteness, we generate R t using
R t = A A H
where A is a matrix whose elements are generated as independent and identically distributed (i.i.d.) circular complex Gaussian random variables with unit variance, except for the diagonal elements, which are shown in Figure 4. Note that this approach to generate R t is similar to the one in [26]. The considered target has five significant reflection centers and is similar to the SR-71 aircraft model [25]. Figure 3b illustrates the elements in R t . The diagonal elements of A (and R t ) can naturally be chosen differently. The parameters chosen here are simply a common example.
As a contrast, we also present the waveform design technique with the total energy constraint proposed in [26]—which also cyclically optimizes the transceiver pair, but uses Equation (18) to compute s in terms of w—instead of solving the complicated optimization problems posed by Equation (19) or (21). Consequently, it cannot guarantee the constant modulus property, which hampers the practicability of the designed waveforms. Nevertheless, the absence of the constant modulus constraint leads to a better SCNR performance with extra degrees of freedom. Additionally, to highlight the advantages of our optimization technique, we define the following discrete LFM signal:
s L F M ( n ) = exp ( j k π ( n 1 N t ) 2 ) , n = 1 , 2 , , N s
We take k = 20 in our simulation. Correspondingly, we set the vector w obtained with Equation (16) as the matched filter for s L F M .
Figure 5 shows the SCNR performances as a function of the number of iterations. The method in [26], as was expected, converges to the best SCNR among these methods, benefiting from the additional degree of freedom offered by the envelope flexibility. Note that Algorithm 1 also converges fast and has only a 0.28 dB SCNR performance loss compared with the method in [26] after convergence. Generally speaking, with the benefit of the constant modulus property, the SCNR loss of 0.28 dB is tolerable. Compared with the method in [26], Algorithm 2 shows a 0.61 dB SCNR loss, with improved implementation. The Unimodular Signal 3, which uses the phases of the results of method in [26], requires fewer computations, without any convex optimization problems to solve. However, its performance cannot be trusted, even though it performs moderately in this example. As Figure 5 shows, it might end up with a worse result than Algorithm 2. Nevertheless, it also implies that a unimodular signal with the phases of the first iteration’s result using the method in [26] is a reasonable initial waveform for Algorithm 1. Figure 6 verifies this notion. Among the four initially used waveforms, the one with the preliminary optimized result of the method in [26]—plotted with the red dashed line—converges the fastest. The LFM signal represented in Equation (36) has the worst initial SCNR and converges the slowest in this example, revealing that the LFM signal is not as advantageous for extended targets as it is for point targets.
Figure 7 presents the real and imaginary parts of the optimized signals obtained by different methods. One can clearly see that the method in [26]—marked by red diamonds—cannot guarantee the constant modulus property of the designed signal. In contrast, the results of Algorithm 1 are unimodular and lie on the unit circle, whereas the results of Algorithm 2 are fixed to four phase points, which validates our constraints for the constant-modulus signal and QPSK signal.
Figure 8 shows the SCNR performances of different methods, as a function of CNR. It is intuitive that, as the CNR increases, the SCNR performance worsens correspondingly. One can see that Algorithms 1 and 2 can closely approximate the upper bound over a large range of CNRs. Compared with the LFM signal in Figure 8, our optimization technique could achieve approximately a 5 dB SCNR gain.

5.2. Deterministic Target Case

In this subsection, we assume that the TIR h t is deterministic and known. For demonstration, h t is set as the sequence shown in Figure 4. In this case, R t = h t h t H is a rank-one matrix. The other parameters remain the same as in Section 5.1. We now briefly introduce a discrete-time version of the eigen-iterative algorithm in [22]. This algorithm was not discussed in Section 5.1, because it is not easily extended to a statistical target case. In this case of a deterministic and known TIR, the SCNR expression is reduced from Equation (8) to
S C N R = | w H T s | 2 w H ( R c s + R n ) w , T = f ( h t , N s )
where function f ( · ) is defined in Section 2. Similar with Equation (15), the optimal receiving filter in terms of s is
w o p t = ( R c s + R n ) 1 T s
Substituting Equation (38) into Equation (37) yields:
S C N R s = s H T H ( R c s + R n ) 1 T s
To maximize the new objective function in Equation (39), it seems that we just need to take s as:
v 1 ( T H ( R c s + R n ) 1 T )
However, the matrix in Equation (40) is also a function of s. The authors in [22] proposed to cyclically update s to approach the optimally transmitted waveform using Equation (40). However, as pointed out in [26], the method in [22] cannot ensure performance improvements as iterations go on. Also note that the method cannot achieve the largest eigenvalue of T H ( R c s + R c s ) 1 T as its output SCNR, because the signal s obtained with Equation (40), which would be the waveform for the next cycle, is not the s in Equation (39). Figure 9 shows the SCNR performances as a function of the iteration index in the deterministic target case. One can see that Algorithms 1 and 2 are well suited for the deterministic target case. The optimized QPSK signal performed better than both the method in [22] and LFM signal, even though it can only choose from four phase points. Compared with other methods, the method in [22] suffers from performance degradation and fluctuations. As mentioned earlier, the LFM signal in Equation (36) does not perform well in the deterministic extended target, and performed even worse than the initial random-phase signal in this example.
Figure 10 shows the SCNR performances as functions of CNR in the range 0–40 dB. We do not include the method in [22] in this example, because it did not converge. It can be seen that Algorithms 1 and 2 can closely approximate the method in [26] for a large range of CNRs, even though they are restricted to constant modulus—once again demonstrating the effectiveness of the proposed methods.

6. Conclusions

In this paper, we proposed two iterative constant-modulus waveform design algorithms for the detection of extended targets, with prior information of the target and waveform-dependent clutter. To deal with the intractable problem brought by the constant modulus constraint, we made use of a semi-definite relaxation approach and developed a customized randomization method. Moreover, combining this with our previous work, we further advanced the design of QPSK waveforms. We then discussed the relationship between the nonconvex problem and its corresponding convex form after SDR, and analyzed an upper bound on the SCNR increment at each iteration. Even though our methods were established based on a statistical target model, they can be applied to the deterministic target case as well. The obtained numerical results show that the proposed algorithms have satisfied SCNR performances in both the statistical and deterministic target cases. However, as mentioned earlier, the alternate optimization technique cannot guarantee the convergence to the global optimum. The probability of this technique getting trapped in a local optimum and the search for a better optimization strategy are open for further study. Additionally, we assumed that the statistical characteristics of the target and clutter are known. The effective estimation of these prior information from radar returns is therefore well worth exploring. We also note that the final waveforms obtained with the proposed methods may not have good performance concerning range resolution. Waveform design taking range resolution into account will also be investigated in the future.

Acknowledgments

The work of Y. Liu was supported by the National Natural Science Foundation of China (Grant No. 61571260 and 61201356). The authors also would like to express their gratitude to Zhang Zhen, from Washington University in St. Louis, and Ph.D. candidate Zhong Wen, from Stony Brook University, for proofreading and constructive discussion on the paper.

Author Contributions

Wenzhen Yue and Yan Zhang conceived and devised the idea; Yimin Liu and Jingwen Xie performed the experiments and analyzed the data; Wenzhen Yue wrote the paper and Yimin Liu proofread it and gave some constructive suggestions. All authors read and approved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 2. 
Firstly, we consider the discrete situation by defining
F m ( z ) m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n ( arccos ( Re ( ω n z ) ) ) 2
and assigning
z ^ k σ ( s k ) = { 1 , i f arg ( s k ) [ 0 , 2 π m ) ω l , i f arg ( s k ) [ l m 2 π , l + 1 m 2 π ) ω m 1 , i f arg ( s k ) [ m 1 m 2 π , 2 π )
where s   ~   C N ( 0 , X ) , m 2 is a given positive integer, and ω = e x p ( j 2 π m ) . Supposing that X p q = γ e j α ,   1 p , q N , we have
Pr ( z ^ p z ^ q = ω n ) = l = 0 m 1 Pr ( z ^ p = ω l + n , z ^ q = ω l ) = l = 0 m 1 Pr ( arg ( s p ) [ l + n m 2 π , l + n + 1 m 2 π ) , arg ( s q ) [ l m 2 π , l + 1 m 2 π ) ) = l = 0 m 1 [ 1 m 2 + 1 8 π 2 ( 2 arccos ( γ cos ( n m 2 π + α ) ) 2 arccos ( γ cos ( n 1 m 2 π + α ) ) 2 arccos ( γ cos ( n + 1 m 2 π + α ) ) 2 ) ] = 1 m + m 8 π 2 ( 2 arccos ( γ cos ( n m 2 π + α ) ) 2 arccos ( γ cos ( n 1 m 2 π + α ) ) 2 arccos ( γ cos ( n + 1 m 2 π + α ) ) 2 )
where Pr ( A ) denotes the probability that A holds, and the third equality utilizes Theorem 2.5 in [36], concerning complex bivariate normal distributions. Furthermore, we have
E [ z ^ p z ^ q ] = n = 0 m 1 ω n Pr ( z ^ p z ^ q = ω n ) = m 8 π 2 n = 0 m 1 ω n ( 2 arccos ( γ cos ( n m 2 π + α ) ) 2 arccos ( γ cos ( n 1 m 2 π + α ) ) 2 arccos ( γ cos ( n + 1 m 2 π + α ) ) 2 ) = m 8 π 2 n = 0 m 1 ( 2 ω n ω n 1 ω n + 1 ) arccos ( γ cos ( n m 2 π + α ) ) 2 = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n arccos ( γ cos ( n m 2 π + α ) ) 2 = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n arccos ( Re ( ω n X p q ) ) 2
Notice that the conjugation of F m ( X p q ) satisfies
F m ( X p q ) = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n ( arccos ( γ cos ( n m 2 π + α ) ) ) 2 = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω m n ( arccos ( γ cos ( m n m 2 π + α ) ) ) 2 = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n ( arccos ( γ cos ( n m 2 π + α ) ) ) 2 = E [ z ^ p z ^ q ]
In accordance with Table 1, the kth element of s ^ satisfies s ^ k = ( z ^ k ) * ,   k = 1 , , N . Thus, we have that
E [ s ^ p s ^ q ] = ( E [ z ^ p z ^ q ] ) = F m ( X p q )
For the discrete case, the covariance matrix of the random vector s ^ is
E [ s ^ s ^ H ] = E [ z ^ z ^ H ] = F ( X )
which holds for any integer m 2 . For a given z = γ e j α with 0 γ 1 , it holds that
F m ( z ) = m ( 2 ω 1 ω ) 8 π 2 n = 0 m 1 ω n ( arccos ( Re ( ω n z ) ) ) 2 = m 2 8 π 3 ( 1 cos ( 2 π m ) ) n = 0 m 1 [ ω n ( arccos ( γ cos ( n m 2 π α ) ) ) 2 2 π m ]
Taking the limit m , we get
F ( z ) = lim m F m ( z ) = 1 4 π 0 2 π e j θ ( arccos ( γ cos ( θ α ) ) ) 2 d θ
where the equation
lim m m 2 ( 1 cos ( 2 π m ) ) = 2 π 2
is used. This completes the proof.

Appendix B

Proof of Theorem 3. 
Define X ^ = s o p t s o p t H . X ^ is easily verified to be a feasible solution of Equation (21). Because of the optimality of X , we have
u s d p = t r ( Ω 1 X ) t r ( Ω 2 X ) t r ( Ω 1 X ^ ) t r ( Ω 2 X ^ ) = u o r g
For notational simplicity, we use Z to indicate X in the following proof procedure. One can easily check that Z satisfies the restrictions of Lemma 2. Suppose that the randomization approach with Z yields a candidate vector s ^ . Then we have
E ( s ^ s ^ H ) = F ( Z )
We now consider the relationship between Z and F ( Z ) . For z = γ e j α with 0 γ 1 , we have
F ( z ) = 1 4 π 0 2 π e j θ ( arccos ( γ cos ( θ α ) ) ) 2 d θ = 1 4 π e j α [ 0 π e j θ ( arccos ( γ cos θ ) ) 2 d θ 0 π e j θ ( arccos ( γ cos θ ) ) 2 d θ ] = 1 2 e j α 0 π e j θ arcsin ( γ cos θ ) d θ = 1 2 e j α 0 π e j θ ( γ cos θ + k = 1 ( 2 k ) ! 4 k ( k ! ) 2 ( 2 k + 1 ) ( γ cos θ ) 2 k + 1 ) d θ = π 4 γ e j α + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) γ 2 k + 1 e j α = π 4 z + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) | z | 2 k z
where the third equality exploits that arccos ( γ c o s θ ) = π arccos ( γ c o s θ ) , the next to last equality results from the two following identities:
0 π sin θ ( cos θ ) 2 k + 1 d θ = 0 , 0 π ( cos θ ) 2 k + 2 d θ = ( 2 k ) ! ( 2 k + 1 ) 2 2 k + 1 ( k ! ) 2 ( k + 1 ) π
Thus,
F ( Z ) = π 4 Z + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) | Z | ( 2 k + 1 ) Z
Subsequently, we introduce one simple fact about the Hadamard product [41]—for two positive semi-definite matrices A , B , A B remains positive semi-definite. Considering that
| Z | ( 2 k ) = ( Z Z T ) ( Z Z T ) k
We have | Z | ( 2 k ) Z 0 , further yielding F ( Z ) π 4 Z , and
t r ( Ω 1 F ( Z ) ) π 4 t r ( Ω 1 Z )
Because | Z p q | 1 for 1 p , q N s , the limit of lim k | Z | ( 2 k ) Z exists and is denoted as Z ¯ , which is a matrix whose diagonal elements are all 1 and all other elements have either 0 or 1 modulus. Hence, lim k t r ( Ω 2 ( | Z | ( 2 k ) Z ) ) = t r ( Ω 2 Z ¯ ) . A supremum for sequence t r ( Ω 2 ( | Z | ( 2 k ) Z ) ) ,   k = 0 ,   1 , must exist; let us denote it by u m a x ; therefore,
t r ( Ω 2 ( | Z | ( 2 k + 1 ) Z ) ) u max , f o r k = 0 , 1 ,
Note that both the diagonal elements of F ( X ) and of the covariance matrix of the unimodular vector s ^ are 1. Therefore, Equation (29) in Lemma 2 implies that F ( 1 ) = 1 , i.e.,
π 4 + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) = 1
Hence, it holds that
t r ( Ω 2 F ( Z ) ) = π 4 t r ( Ω 2 Z ) + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) t r ( Ω 2 ( | Z | ( 2 k + 1 ) Z ) ) ( π 4 + π 2 k = 1 ( ( 2 k ) ! ) 2 2 4 k + 1 ( k ! ) 4 ( k + 1 ) ) u max = u max
Therefore,
t r ( Ω 2 F ( Z ) ) u max u 1 t r ( Ω 2 Z )
Combining Equations (B5) and (B8) yields
t r ( Ω 1 F ( Z ) ) t r ( Ω 2 F ( Z ) ) π u 1 4 u max t r ( Ω 1 Z ) t r ( Ω 2 Z )
Using Equation (B2), one can easily get
u ( e p ) = E ( t r ( s ^ H Ω 1 s ^ ) t r ( s ^ H Ω 2 s ^ ) ) = t r ( Ω 1 E ( s ^ s ^ H ) ) t r ( Ω 2 E ( s ^ s ^ H ) ) = t r ( Ω 1 F ( Z ) ) t r ( Ω 2 F ( Z ) )
The maximum value of the random variable t r ( s ^ H Ω 1 s ^ ) t r ( s ^ H Ω 2 s ^ ) , u ( r d ) , must be larger than its expected value, u ( e p ) , when K is large enough, i.e.,
u ( r d ) u ( e p )
Simultaneous consideration of Equations (28) and (B9)–(B11) produces Equation (31). This then concludes the proof.

References

  1. Rummler, W.D. Clutter suppression by complex weighting of coherent pulse trains. IEEE Trans. Aerosp. Electron. Syst. 1966, 2, 689–699. [Google Scholar] [CrossRef]
  2. Rummler, W.D. A technique for improving the clutter performance of coherent pulse train signals. IEEE Trans. Aerosp. Electron. Syst. 1967, 6, 898–906. [Google Scholar] [CrossRef]
  3. Spafford, L.J. Optimum radar signal processing in clutter. IEEE Trans. Inf. Theory 1968, 14, 734–743. [Google Scholar] [CrossRef]
  4. Balakrishnan, A. Signal design for a class of clutter channels. IEEE Trans. Inf. Theory 1968, 14, 170–173. [Google Scholar] [CrossRef]
  5. Delong, D.F.; Hofstetter, E.M. The design of clutter-resistant radar waveforms with limited dynamic range. IEEE Trans. Inf. Theory 1969, 15, 376–385. [Google Scholar] [CrossRef]
  6. Du, L.; Liu, H.; Bao, Z.; Xing, M. Radar HRRP target recognition based on higher order spectra. IEEE Trans. Signal Process. 2005, 7, 2359–2368. [Google Scholar]
  7. Woodward, P. Probability and Information Theory, with Applications to Radar; Pergamon Press Ltd.: London, UK, 1953. [Google Scholar]
  8. Bell, M.R. Information theory and radar waveform design. IEEE Trans. Inf. Theory 1993, 39, 1578–1597. [Google Scholar] [CrossRef]
  9. Guo, D.; Shamai, S.; Verdu, S. Mutual information and minimum mean-square error in Gaussian channels. IEEE Trans. Inf. Theory 2005, 51, 1261–1282. [Google Scholar] [CrossRef]
  10. Naghibi, T.; Namvar, M.; Behnia, F. Optimal and robust waveform design for MIMO radars in the presence of clutter. Signal Process. 2010, 90, 1103–1117. [Google Scholar] [CrossRef]
  11. Yang, Y.; Blum, R.S. MIMO radar waveform design based on mutual information and minimum mean-square error estimation. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 330–343. [Google Scholar] [CrossRef]
  12. Leshem, A.; Naparstek, O.; Nehorai, A. Information theoretic adaptive radar waveform design for multiple extended targets. IEEE J. Sel. Top. Signal Process. 2007, 1, 42–55. [Google Scholar] [CrossRef]
  13. Tang, B.; Tang, J.; Peng, Y. MIMO radar waveform design in colored noise based on information theory. IEEE Trans. Signal Process. 2010, 58, 4684–4697. [Google Scholar] [CrossRef]
  14. Tang, B.; Tang, J.; Peng, Y. Waveform optimization for MIMO radar in colored noise: Further results for estimation-oriented criteria. IEEE Trans. Signal Process. 2012, 60, 1517–1522. [Google Scholar] [CrossRef]
  15. Sira, S.P.; Cochran, D.; Papandreou, S.A. Adaptive waveform design for improved detection of low-RCS targets in heavy sea clutter. IEEE J. Sel. Top. Signal Process. 2007, 1, 56–66. [Google Scholar] [CrossRef]
  16. Pezeshki, A.; Calderbank, R.; Howard, S.D.; Moran, W. Doppler resilient Golay complementary pairs for radar. In Proceedings of the 2007 IEEE Workshop on Statistical Signal Processing, Madison, WI, USA, 26–29 August 2007; pp. 483–487.
  17. Aubry, A.; de Maio, A.; Jiang, B. Ambiguity function shaping for cognitive radar via complex quartic optimization. IEEE Trans. Signal Process. 2013, 61, 5603–5619. [Google Scholar] [CrossRef]
  18. Kay, S. Optimum radar signal for detection in clutter. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 1059–1065. [Google Scholar] [CrossRef]
  19. Kay, S. Optimal signal design for detection of Gaussian point targets in stationary Gaussian clutter/reverberation. IEEE J. Sel. Top. Signal Process. 2007, 1, 31–41. [Google Scholar] [CrossRef]
  20. Kay, S. Waveform design for multistatic radar detection. IEEE Trans. Aerosp. Electron. Syst. 2009, 45, 1153–1166. [Google Scholar] [CrossRef]
  21. Zhang, J.D.; Zhu, X.; Wang, H.Q. Adaptive radar phase-coded waveform design. IET Electron. Lett. 2009, 45, 1052–1053. [Google Scholar] [CrossRef]
  22. Pillai, S.U.; Oh, H.S.; Youla, D.C.; Guerci, J.R. Optimum transmit-receiver design in the presence of signal-dependent interference and channel Noise. IEEE Trans. Inf. Theory 2000, 46, 577–584. [Google Scholar] [CrossRef]
  23. Guerci, J.R.; Pillai, S.U. Theory and application of optimum transmit-receive radar. In Proceedings of the 2000 IEEE Radar Conference, Alexandria, VA, USA, 12–21 May 2000; pp. 705–710.
  24. Garren, D.A.; Osborn, M.K.; Odom, A.C. Enhanced target detection and identification via optimised radar transmission pulse shape. IET Radar Sonar Navig. 2001, 148, 130–138. [Google Scholar] [CrossRef]
  25. Zhang, X.; Cui, C. Signal detection for cognitive radar. IET Electron. Lett. 2013, 49, 559–560. [Google Scholar] [CrossRef]
  26. Chen, C.Y.; Vaidyanathan, P.P. MIMO radar waveform optimization with prior information of the extended target and clutter. IEEE Trans. Signal Process. 2009, 57, 3533–3544. [Google Scholar] [CrossRef]
  27. Jiu, B.; Liu, H.; Zhang, L.; Wang, Y.; Luo, T. Wideband cognitive radar waveform optimization for joint target radar signature estimation and target detection. IEEE Trans. Aerosp. Electron. Syst. 2015, 51, 1530–1546. [Google Scholar] [CrossRef]
  28. Patton, L.K.; Rigling, B.D. Modulus constraints in adaptive radar waveform design. In Proceedings of the 2008 IEEE Radar Conference, Rome, Italy, 26–30 May 2008; pp. 1–6.
  29. Gong, X.; Meng, H.; Wei, Y.; Wang, X. Phase-modulated waveform design for extended target detection in the presence of clutter. Sensors 2011, 11, 7162–7177. [Google Scholar] [CrossRef] [PubMed]
  30. Wei, Y.; Meng, H.; Liu, Y.; Wang, X. Extended target recognition in cognitive radar networks. Sensors 2010, 10, 10181–10197. [Google Scholar] [CrossRef] [PubMed]
  31. Serbetli, S.; Yener, A. Transceiver optimization for multiuser MIMO systems. IEEE Trans. Signal Process. 2004, 52, 214–226. [Google Scholar] [CrossRef]
  32. Arash, K.; Aboulnasr, H.; Sergiy, A.V.; Matthew, W.M. Efficient transmit beamspace design for search-free based DOA estimation in MIMO radar. IEEE Trans. Signal Process. 2014, 62, 1490–1500. [Google Scholar]
  33. CVX Toolbox. Available online: http://cvxr.com/cvx/ (accessed on 28 December 2015).
  34. Yue, W.Z.; Zhang, Y.; Xie, J.W. QPSK signal design for given correlation matrix. IET Electron. Lett. 2016, 52, 399–401. [Google Scholar] [CrossRef]
  35. Tough, R.J.A.; Ward, K.D. The correlation properties of gamma and other non-Gaussian processes generated by memoryless nonlinear transformation. J. Phys. D Appl. Phys. 1999, 32, 3075–3084. [Google Scholar] [CrossRef]
  36. Zhang, S.; Huang, Y. Complex quadratic optimization and semidefinite programming. SIAM J. Optim. 2006, 16, 871–890. [Google Scholar] [CrossRef]
  37. Bauer, F.L.; Fike, C.T. Norms and exclusion theorems. Numer. Math. 1960, 2, 137–141. [Google Scholar] [CrossRef]
  38. Giorgetti, A. Interference mitigation technique by sequence design in UWB cognitive radio. In Proceedings of the 3rd IEEE International Symposium on Applied Sciences in Biomedical and Communication Technologies, Rome, Italy, 7–10 November 2010; pp. 1–5.
  39. Bartoletti, S.; Giorgetti, A.; Win, M.Z.; Conti, A. Blind selection of representative observations for sensor radar networks. IEEE Trans. Veh. Technol. 2015, 64, 1388–1400. [Google Scholar] [CrossRef]
  40. Bartoletti, S.; Conti, A.; Giorgetti, A.; Win, M.Z. Sensor radar networks for indoor tracking. IEEE Wirel. Commun. Lett. 2014, 3, 157–160. [Google Scholar]
  41. Zhang, X. Matrix Analysis and Applications, 2nd ed.; Tsinghua University Press: Beijing, China, 2013; pp. 67–74. [Google Scholar]
Figure 1. Illustration of the radar’s discrete baseband signal model.
Figure 1. Illustration of the radar’s discrete baseband signal model.
Sensors 16 00889 g001
Figure 2. Flowchart of the proposed iterative constant-modulus waveform design methods.
Figure 2. Flowchart of the proposed iterative constant-modulus waveform design methods.
Sensors 16 00889 g002
Figure 3. Illustration of (a) matrix R c , the covariance matrix of the clutter impulse response, h c ; (b) R t , the covariance matrix of target impulse response h t , used in Section 5.1.
Figure 3. Illustration of (a) matrix R c , the covariance matrix of the clutter impulse response, h c ; (b) R t , the covariance matrix of target impulse response h t , used in Section 5.1.
Sensors 16 00889 g003
Figure 4. Illustration of the diagonal elements of matrix A.
Figure 4. Illustration of the diagonal elements of matrix A.
Sensors 16 00889 g004
Figure 5. SCNR performances as a function of the number of iterations for different methods. The initial waveforms are identical for all methods. Algorithms 1 and 2 are the arbitrary-phase and QPSK signal design methods proposed in Section 3, respectively. Unimodular Signal 3 denotes the unimodular signal with the phase that results from the method in [26], i.e., a modulus normalized version of the waveform obtained under the total energy constraint. The upper bound is the limiting value of the SCNR obtained using the method in [26]. The SCNR of the LFM signal does not vary with the iterations, because this signal is fixed.
Figure 5. SCNR performances as a function of the number of iterations for different methods. The initial waveforms are identical for all methods. Algorithms 1 and 2 are the arbitrary-phase and QPSK signal design methods proposed in Section 3, respectively. Unimodular Signal 3 denotes the unimodular signal with the phase that results from the method in [26], i.e., a modulus normalized version of the waveform obtained under the total energy constraint. The upper bound is the limiting value of the SCNR obtained using the method in [26]. The SCNR of the LFM signal does not vary with the iterations, because this signal is fixed.
Sensors 16 00889 g005
Figure 6. SCNR performances vs. the number of iterations for different initial waveforms.
Figure 6. SCNR performances vs. the number of iterations for different initial waveforms.
Sensors 16 00889 g006
Figure 7. Real and imaginary parts of different methods’ results.
Figure 7. Real and imaginary parts of different methods’ results.
Sensors 16 00889 g007
Figure 8. (a) Comparison of the SCNR of different methods vs. CNR. The upper bound is the SCNR obtained with 100 iterations of the method in [26], while the blue line marked with circles is obtained with 30 iterations of the same method; (b) Zoomed version of the boxed region in (a).
Figure 8. (a) Comparison of the SCNR of different methods vs. CNR. The upper bound is the SCNR obtained with 100 iterations of the method in [26], while the blue line marked with circles is obtained with 30 iterations of the same method; (b) Zoomed version of the boxed region in (a).
Sensors 16 00889 g008
Figure 9. SCNR performances as a function of the number of iterations for the deterministic target case. The initial waveforms are identical for all methods.
Figure 9. SCNR performances as a function of the number of iterations for the deterministic target case. The initial waveforms are identical for all methods.
Sensors 16 00889 g009
Figure 10. (a) SCNR performances vs. CNR for the deterministic target case. The upper bound is the SCNR obtained with 100 iterations of the method in [26], while the blue line marked with circles is obtained with 30 iterations of the same method; (b) Zoomed version of the box highlighted in (a).
Figure 10. (a) SCNR performances vs. CNR for the deterministic target case. The upper bound is the SCNR obtained with 100 iterations of the method in [26], while the blue line marked with circles is obtained with 30 iterations of the same method; (b) Zoomed version of the box highlighted in (a).
Sensors 16 00889 g010
Table 1. Customized randomization approach procedure.
Table 1. Customized randomization approach procedure.
If rank ( X o p t ) = 1
  • s o p t is the first row of matrix X ;

Otherwise
Step 1
Obtain X = U Σ U H from the eigenvalue decomposition of X .
Step 2
Generate K independent random vectors v ( k ) , k = 1 ,   2 , , K , from complex-valued Gaussian distribution C N ( 0 , I ) .
Step 3
Compute s ( k ) = U Σ 1 / 2 v ( k ) , k = 1 ,   2 , , K so that the covariance matrix of s ( k ) is X .
Step 4
Normalize the modulus of s k : s ( c a n , k ) = e x p ( j · a n g ( s ( k ) ) ) , k = 1 ,   2 , , K . ( s ( c a n , k ) is a candidate vector for s o p t .)
Step 5
Choose the candidate vector that maximizes the SCNR, i.e.,
s o p t = arg max s ( c a n , k ) s ( c a n , k ) H Ω 1 s ( c a n , k ) s ( c a n , k ) H Ω 2 s ( c a n , k ) , k = 1 , , K .
Table 2. Algorithm 1 full procedure.
Table 2. Algorithm 1 full procedure.
Step 0
Initialize the transmitted signal s ( 0 ) with linear frequency modulation (LFM) signal or a random phase-coded signal.
Step 1
Compute R t s with Equation (10), and obtain the receiving filter w using Equation (16)
Step 2
Compute R t w with Equation (13), and obtain the optimal solution X of Equation (21). Use the preceding randomization approach in Table 1 to get s o p t .
Step 3
Go back to Step 1 unless the SCNR improvement becomes insignificant or iterative number becomes large enough.
Table 3. Candidate quadrature phase-shift keying (QPSK) signal vectors design procedure.
Table 3. Candidate quadrature phase-shift keying (QPSK) signal vectors design procedure.
Step 1
Denote the real part and the imaginary part of X by X R and X I , respectively.
Step 2
Generate matrix X ˜ using
X ˜ = [ A B T B A ] , A = sin ( π 2 X R ) , B = sin ( π 2 X I )
where the sine function operates element-wise: sin ( A ) = [ sin ( A m n ) ] N s × N s .
Step 3
Make a forced positive definite Cholesky decomposition X ˜ + D = Γ Γ T , where D is a diagonal matrix with nonnegative elements.
Step 4
Let β = Γ θ , where θ ~ C N ( 0 , I ) , i.e., θ is normally distributed with zero mean. The QPSK signal can then be generated by s = s g n ( β ( 1 : N s ) ) + j · s g n ( β ( N s + 1 : 2 N s ) ) .

Share and Cite

MDPI and ACS Style

Yue, W.; Zhang, Y.; Liu, Y.; Xie, J. Radar Constant-Modulus Waveform Design with Prior Information of the Extended Target and Clutter. Sensors 2016, 16, 889. https://doi.org/10.3390/s16060889

AMA Style

Yue W, Zhang Y, Liu Y, Xie J. Radar Constant-Modulus Waveform Design with Prior Information of the Extended Target and Clutter. Sensors. 2016; 16(6):889. https://doi.org/10.3390/s16060889

Chicago/Turabian Style

Yue, Wenzhen, Yan Zhang, Yimin Liu, and Jingwen Xie. 2016. "Radar Constant-Modulus Waveform Design with Prior Information of the Extended Target and Clutter" Sensors 16, no. 6: 889. https://doi.org/10.3390/s16060889

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop