Next Article in Journal
Joint Design of Complementary Sequence and Receiving Filter with High Doppler Tolerance for Simultaneously Polarimetric Radar
Next Article in Special Issue
Joint Direction of Arrival-Polarization Parameter Tracking Algorithm Based on Multi-Target Multi-Bernoulli Filter
Previous Article in Journal
Superpixel-Based Style Transfer Method for Single-Temporal Remote Sensing Image Identification in Forest Type Groups
Previous Article in Special Issue
Coalition Game Theoretic Power Allocation Strategy for Multi-Target Detection in Distributed Radar Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Target Detection of Passive Bistatic Radar under the Condition of Impure Reference Signal

1
Zhejiang Institute of Communications, College of Intelligent Transportation, Hangzhou 311112, China
2
School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(15), 3876; https://doi.org/10.3390/rs15153876
Submission received: 13 July 2023 / Revised: 2 August 2023 / Accepted: 3 August 2023 / Published: 4 August 2023
(This article belongs to the Special Issue Advances in Radar Systems for Target Detection and Tracking)

Abstract

:
This paper addresses the issue of the reference signal being contaminated by target echoes due to factors such as wide beamwidths, beam pointing errors, or site errors in passive bistatic radar (PBR). Such contamination can lead to reference signal impurity and subsequently degrade the performance of traditional object detection methods. To overcome this challenge, a novel target detection method centered around the reference signal’s purification is presented. The proposed method involves the modeling, analysis, localization, and purification of the impure reference signal. First, a new signal model incorporating the impure reference signal is established, followed by a comprehensive analysis of its impact on target detection. Then, leveraging the valuable information hidden in the impure reference signal, target echoes within the impure reference signal are localized and reconstructed. Finally, the reconstructed target echoes are subtracted from the original impure reference signal to purify the reference signal. Based on the purified reference signal, traditional target detection is performed to detect the expected targets. The core advantage of this method lies in its efficient reconstruction and removal of the impure terms within the reference signal. The effectiveness of the proposed method is demonstrated through a series of simulation results.

Graphical Abstract

1. Introduction

Passive bistatic radar (PBR) employs existing non-cooperative signals, such as frequency modulation (FM) [1], digital audio broadcast (DAB) [2], digital video broadcasting—terrestrial (DVB-T) [3], digital terrestrial multimedia broadcasting (DTMB) [4], navigation signals [5,6], and so on [7,8], in the surrounding environment to detect and track targets within specific airspace regions of interest. Due to its distinctive attributes encompassing silent receiving, separate transmitter and receiver architecture, and the utilization of non-cooperative signals, the PBR exhibits extensive potential across various domains [9,10,11], including, but not limited to, anti-jamming, anti-stealth, anti-low-altitude attack, and anti-radiation missile applications, as well as spectrum sharing and utilization. Although PBR, benefiting from its inherent characteristics, has many advantages in detecting targets over traditional active radar, it also faces many challenges and difficulties. PBR works through a two-channel coherent processing scheme [12], comprising the reference channel responsible for receiving the direct path signal and the surveillance channel utilized for target detection purposes. The desired reference signal in the PBR corresponds to the original transmitter signal, commonly referred to as the direct path signal. However, no additional parameters are known for the receiving station, and only the carrier frequency, bandwidth, and location (which may be inaccurate) are known. Consequently, the acquisition of the desired reference signal, while effectively mitigating clutter and target echoes, becomes exceedingly difficult. When the received reference signal is interfered with by multipath signals or target echo signals and becomes impure, the target detection performance of the PBR will be limited. For example, real targets will be overwhelmed and cannot be detected accurately when the reference signal is heavily contaminated by an abundance of multipath clutter [13]. Indeed, several constraints, such as the site error of the transmitting station or the broad receiving beam, impose limitations on obtaining the pure reference signal.
To tackle the problem of target detection in the PBR under the condition of the impure reference signal, one approach involves the utilization of a highly directive narrow beam or antenna, pointing precisely towards the transmitter station [14]. Another strategy entails the purification or precise reconstruction of the direct path signal by leveraging the known characteristics of the transmitting signal [15]. The former approach imposes stringent demands on system design and the configuration of the practical environment, making it challenging to completely mitigate the issues of impure reference signal. On the other hand, the latter approach aims to alleviate the impact of this problem on target detection through the application of advanced signal processing methods, offering a more versatile solution. To purify the reference signal contaminated by multipath clutter, according to the constant modulus feature of the transmitting signal, several equalization algorithms based on constant modulus algorithm are proposed to restrain the multipath clutter in the reference signal [16,17,18]. A constant modulus algorithm was proposed [16], in which the reference signal is preprocessed by channel equalization. The study of the same problem was extended to an airborne PBR scenario [17], where a modified blind equalization algorithm based on cyclostationarity is presented. Furthermore, the authors of [18] combine the time domain and space domain to suppress the multipath signal present in the reference signal, but the algorithm has requirements on the PBR hardware structure. On the other hand, in order to obtain the completely pure reference signal, some direct path signal reconstruction algorithms based on signal structure features were proposed [19,20,21]. A reference signal extraction method based on the multiprocessing method in a dual-polarization antenna PBR was proposed [19], and the authors exploited sub-carrier processing, blind adaptive oblique projection, and an extensive cancelation algorithm to reconstruct the direct-path signal. The work of [20] investigated the reference signal reconstruction method for PBR exploiting DVB-T signals, in which the authors reconstructed the pure reference signal by filtering the detected quadrature amplitude modulation symbols prior to the remodulation step. In addition, a joint low-rank and sparse method is presented to purify the reference signal in DTMB-based PBR [21]. In addition, the core ideas of other methods for reconstructing reference signals are basically based on the principle of first demodulating impure reference signals and then modulating them [22,23].
While the aforementioned methods demonstrate effective measures for mitigating the performance degradation of target detection caused by the impure reference signal, current research primarily revolves around suppressing multipath clutter within the reference signal or reconstructing the direct path signal. Indeed, the performance of conventional target detection is susceptible to decline when the reference signal is perturbed by echo signals. However, this particular aspect has received limited research attention thus far. Among the sparse literature, a direction of arrival estimation algorithm for PBR when the reference channel contains the target echo was proposed [24]. In this study, the authors assumed the target echo in the reference channel and surveillance array is partially correlated, leading to a direction of arrival (DOA) estimation bias, and then established the array signal model to fix the bias. The emphasis of [24] is mainly on the impact of impure reference signals on DOA estimation, rather than on target detection. To address this research gap, this article investigates the impact of impure reference signals resulting from target echoes on target detection in the PBR. Notably, a novel signal model based on impure reference signals is established, enabling a comprehensive analysis of its effects on clutter suppression and Range-Doppler cross-correlation (RDCC). Moreover, a method is proposed to refine the reference signal utilizing conventional target detection feedback information. In comparison to existing works, the key innovations of this article are as follows:
(1)
To the best of our knowledge, this paper represents the first endeavor to analyze the influence of the residual target echo present in the reference signal on the target detection performance of the PBR. The theoretical analysis presented herein offers novel insights and ideas for advancing the field of target detection research in the PBR.
(2)
We introduce a novel received signal model, different from the existing model [25,26], which allows for the straightforward derivation and analysis of its impact on the fundamental modules of target detection. When compared to the conventional receiving model, the proposed model introduces a single mathematical item, yet it offers crucial attributes for addressing the target detection problem in the presence of impure reference signals.
(3)
Drawing upon the insights garnered from the influence of the residual target echo on target detection within the reference signal, a novel method for purifying the reference signal is presented. Leveraging detection feedback information, the proposed approach capitalizes on the inherent regularities in the influence of the impure reference signal. Unlike existing target detection methods unsuitable for this specific scenario, the proposed method involves the localization of the target echo in the impure reference signal utilizing traditional target detection results. Subsequently, a subspace projection method is employed to reconstruct the echo, followed by the elimination of the undesired target echo through subtraction from the original impure reference signal.
The rest of this article is organized as follows. The signal model under the condition of impure reference signal interfered by target echoes and its influence on traditional target detection are described in Section 2. Then, Section 3 presents the proposed reference signal clean-up method and target detection method, and the effectiveness of the proposed methods via the numerical simulations is demonstrated in Section 4. The conclusions are summarized in Section 5.

2. Signal Model and Problem Analysis

In this section, the received signal model with the reference signal interfered by target echoes is established, and its effect on target detection, mainly including clutter suppression and RDCC, is derived and analyzed in detail.

2.1. Signal Model

Figure 1 illustrates a representative detection scenario in the PBR system, considering the presence of the impure reference signal. The received signal within the surveillance channel adheres to the conventional assumptions of the PBR system, encompassing components such as direct path or multipath clutter, target echo, and noise signal. In contrast to the traditional reference signal, the reference channel in the newly proposed signal model not only comprises the direct path clutter, a limited amount of multipath clutter, and noise signal, but it also incorporates the reception of target echo signals. The presence of moving echo signals within the reference channel induces unexpected Doppler frequency shifts, posing several challenges to the conventional target detection methods employed in PBR systems.
Following the process of analog-to-digital sampling and subsequent digital down-conversion, the ideal reference signal is characterized by the following model:
S ref [ l ] = a ref d [ l ] + z ref [ l ]
with
l = 1 , , L
where Sref [l] denotes the nth sampling datum received by the reference channel, d[l] represents the lth sampling data of the direct path signal, a ref is the corresponding complex amplitude, the received noise signal is represented by z ref [ l ] , and L is the data length. When a target appears in the airspace in the direction the reference channel is pointed at, the reference signal represented by (1) can be rewritten as:
S ref [ l ] = a ref d [ l ] + n = 1 N T b n d [ l τ n f s ] e j 2 π f dn l / f s + z ref [ l ]
where b n , τ n f s , and f dn denote the complex amplitude, range unit respecting to direct path signal, and Doppler frequency shift of the nth target echo in the reference signal, respectively. Moreover, f s is the baseband signal sampling rate, and NT represents the number of targets in the reference signal.
Similarly, the surveillance signal received by the surveillance channel can be represented as:
S sur [ l ] = c = 1 N C a c d [ l τ c f s ] + m = 1 N M b ¯ m d [ l τ m f s ] e j 2 π f dm l / f s + z sur [ l ]
where a c and τ c f s are the complex amplitude and range cell of the direct path or multipath clutter in the surveillance signal, respectively; NC is the number of clutters; b ¯ m , τ m f s , and f dm denote the complex amplitude, range unit, and Doppler frequency shift of the mth target echo in the surveillance signal, respectively; NM is the target number; and z sur is the echo noise.
Generally, the target echo received by the reference channel can also be simultaneously detected by the surveillance channel, that is, NMNT. For the sake of analytical convenience and without sacrificing generality, let NT = 2 and NT = 1, so the reference signal and echo signal represented by (3) and (4), respectively, can be further updated as:
S ref [ l ] = a ref d [ l ] + b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s + z ref [ l ]
S sur [ l ] = c = 1 N c a c d [ l τ c f s ] + b ¯ 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s + b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s + z sur [ l ]

2.2. Analysis of the Influence of Signal Model on Target Detection

In this subsection, the impact of the new signal model on the PBR target detection is analyzed from two aspects:
(1) Influence on Clutter Suppression: In the PBR, the extensive cancellation algorithm (ECA) [27,28] is a widely used algorithm for clutter suppression. The fundamental concept behind the ECA is to reduce clutter by projecting the surveillance signal onto the orthogonal subspace created by the reference signal and its time-delayed cells, and its projection coefficients vector is given by:
W = V H V 1 V H S sur
where (•)H represents the Hermitian transpose operation and V denotes the orthogonal subspace created by the reference signal Sref and its time-delayed cells. Furthermore, the key expression of the ECA can be given as:
S err [ l ] = S sur [ l ] k = 1 K W [ k ] S ref [ l k + 1 ]
where Serr and W denote the residual signal and the corresponding projection matrix of the ECA, respectively. In addition, K represents the maximum time-delayed cells of the reference signal. Substituting (5) and (6) into the above formula, (8) is further expressed as:
S err [ l ] = φ c [ l ] + φ T 1 [ l ] + φ T 2 [ l ] + φ z [ l ]
where
φ c [ l ] = c = 1 N c a c d [ l τ c f s ] k = 1 K W [ k ] a ref d [ l k + 1 ]
φ T 1 [ l ] = ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s
φ T 2 [ l ] = b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s
φ z [ l ] = z sur [ l ] k = 1 K W [ k ] z ref [ l k + 1 ]
where   φ c , φ T 1 , φ T 2 , and   φ z denote residual clutter, the echo around target 1, the echo around target 2, and the noise, respectively. For comparison, in the same way, substituting (1) and (6) into (8) produces:
S ¯ err [ l ] = φ c [ l ] + φ ¯ T 1 [ l ] + φ T 2 [ l ] + φ z [ l ]
where   φ c , φ T 2 , and   φ z are the same as the three terms in (9), and the only difference between (9) and (14) is φ ¯ T 1 , which is given by:
φ ¯ T 1 [ l ] = b ¯ 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s
From (11) and (15), when the reference signal is impure, it can be inferred that in the presence of an impure reference signal, the target echo within the surveillance signal after the ECA will inevitably be influenced by the same target signal received by the reference channel. The potential impact on target detection can be categorized as follows: firstly, the amplitude of the real target will experience attenuation, thereby reducing the signal-to-noise ratio (SNR) associated with the target. Then, some false targets attached to the real target may appear.
(2) Influence on the Cross-Ambiguity Function (CAF): Followed by the RDCC, in the PBR, the SNR of target detection is improved by utilizing the RDCC based on CAF [29], which is defined as:
ξ [ r , p ] = l = 1 L S err [ l ] S ref * [ l r ] e j 2 π p l / L
where (•)* means the conjugate operation, r = τ r f s denotes the range cell of the target of interest, and p = f dp L / f s is the corresponding Doppler cell. Substituting (5) and (9) into (16) yields:
ξ [ r , p ] = ξ c 1 [ r , p ] + ξ c 2 [ r , p ] + ξ c 3 [ r , p ] + ξ T 1 1 [ r , p ] + ξ T 1 2 [ r , p ] + ξ T 1 3 [ r , p ] ξ T 2 1 [ r , p ] ξ T 2 2 [ r , p ] ξ T 2 3 [ r , p ] + ξ T 3 1 [ r , p ] + ξ T 3 2 [ r , p ] + ξ T 3 3 [ r , p ] + ξ z [ r , p ]
where
ξ c 1 [ r , p ] = l = 1 L c = 1 N c a c d [ l τ c f s ] k = 1 K W [ k ] a ref d [ l k + 1 ] × a ref * d * [ l r ] e j 2 π p l / L
ξ c 2 [ r , p ] = l = 1 L c = 1 N c a c d [ l τ c f s ] k = 1 K W [ k ] a ref d [ l k + 1 ] × b 1 * d * [ l τ 1 f s r ] e j 2 π f d 1 l / f s e j 2 π p l / L
ξ c 3 [ r , p ] = l = 1 L c = 1 N c a c d [ l τ c f s ] k = 1 K W [ k ] a ref d [ l k + 1 ] × z ref * [ l r ] e j 2 π p l / L
ξ T 1 1 [ r , p ] = l = 1 L ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s a ref * d * [ l r ] e j 2 π p l / L
ξ T 1 2 [ r , p ] = l = 1 L ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s × b 1 * d * [ l τ 1 f s r ] e j 2 π f d 1 l / f s e j 2 π p l / L
ξ T 1 3 [ r , p ] = l = 1 L ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s z ref * [ l r ] e j 2 π p l / L
ξ T 2 1 [ r , p ] = l = 1 L k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s a ref * d * [ l r ] e j 2 π p l / L
ξ T 2 2 [ r , p ] = l = 1 L k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s × b 1 * d * [ l τ 1 f s r ] e j 2 π f d 1 l / f s e j 2 π p l / L
ξ T 2 3 [ r , p ] = l = 1 L k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s z ref * [ l r ] e j 2 π p l / L
ξ T 3 1 [ r , p ] = l = 1 L b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s a ref * d * [ l r ] e j 2 π p l / L
ξ T 3 2 [ r , p ] = l = 1 L b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s b 1 * d * [ l τ 1 f s r ] e j 2 π f d 1 l / f s e j 2 π p l / L
ξ T 3 3 [ r , p ] = l = 1 L b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s z ref * [ l r ] e j 2 π p l / L
ξ z [ r , p ] = l = 1 L Z [ l ] a r e f d [ l r ] + b 1 d [ l τ 1 f s r ] e j 2 π f d 1 l / f s + z ref [ l r ] * e j 2 π p l / L
where ξ c 1 , ξ c 2 , and ξ c 3 represent the matching results of the residual clutter with the direct path clutter, target echo, and noise in the reference signal, respectively. ξ T 1 1 , ξ T 1 2 , and ξ T 1 3 denote the matching results of the target existing in both the surveillance channel and reference channel, respectively. ξ T 2 1 , ξ T 2 2 , and ξ T 2 3 are the matching results of the false targets, respectively. ξ T 3 1 , ξ T 3 2 , and ξ T 3 3 are the matching results of the target only received by the surveillance channel, respectively. ξ z refers to the matching results of the noise.
After the ECA, theoretically, the residual clutter will not affect the CAF of the target. In addition, due to the random nature of noise, the CAF of the noise does not matter. Furthermore, although the target signal in residual surveillance signal and the one in the reference signal can be matched, the energy intensity is negligible. Therefore, the matching results involved in these cases will be ignored in the following analysis, and (17) is further simplified as:
ξ [ r , p ] = ξ T 1 1 [ r , p ] ξ T 2 1 [ r , p ] + ξ T 3 1 [ r , p ] = l = 1 L ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s a ref * d * [ l r ] e j 2 π p l / L l = 1 L k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s × a ref * d * [ l r ] e j 2 π p l / L + l = 1 L b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s a r e f * d * [ l r ] e j 2 π p l / L
Following a similar derivation, substituting (5) and (14) into (16) produces:
ξ ¯ [ r , p ] = ξ ¯ T 1 1 [ r , p ] + ξ T 3 1 [ r , p ] = l = 1 L b ¯ 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s a ref * d * [ l r ] e j 2 π p l / L + l = 1 L b ¯ 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s a ref * d * [ l r ] e j 2 π p l / L
Comparing (31) and (32), it can be found that the amplitude of target T1 in (31) is lower than that of target T1 in (32); that is, the impure reference signal will negatively benefit the detection of the target received by both the surveillance channel and reference channel. On the other hand, compared to (32), (31) has one more matching term, which has the same Doppler shift as target T1, but the range cells demonstrate a pseudo-random distribution related to the clutter suppression coefficients, thereby interfering with the normal detection of target T1.

3. Proposed Target Detection Method under the Condition of Impure Reference Signal

To overcome the negative impact of the impure reference signal on target detection, a novel target detection method based on fusion feedback and reference signal purification is proposed. The detailed process is introduced as follows.

3.1. Localization of Impure Terms in the Reference Signal

As discussed in the previous section, when the reference signal is perturbed by target echoes, resulting in signal impurity, the presence of false targets originating from real targets becomes apparent. These false targets share the same Doppler shifts as their corresponding real targets, while their range cells exhibit a pseudo-random distribution influenced by clutter suppression coefficients. That is to say, in this case, there will be several sparsely distributed points exceeding the detection threshold in a certain Doppler channel of the Range–Doppler detection plane. These points comprise a mixture of real and false targets, presenting challenges for direct identification. However, exploiting the relative positions of these points, which are associated with clutter suppression weights, enables the distinction and localization of real and false targets. To illustrate this concept, we consider a scenario where the direct path and multipath clutters in the surveillance signal occur on the 1st, 8th, and 19th range cells. Consequently, during the projection process of clutter suppression, the projection coefficients will have peaks on the 1st, 8th, and 19th cells, while the remaining range cells demonstrate negligible projection coefficients due to the absence of significant clutter. By building upon this quantitative analysis, (9) can be further expanded as:
S err [ l ] = ψ c [ l ] + ψ T r 1 [ l ] + ψ T f 1 [ l ] + ψ T f 2 [ l ] + ψ T r 2 [ l ] + ψ z [ l ] = c = 1 N c a c d [ l τ c f s ] W [ 1 ] a ref d [ l ] W [ 8 ] a ref d [ l - 7 ] W [ 19 ] a ref d [ l - 18 ] + ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s W [ 8 ] b 1 d [ l ( τ 1 f s + 7 ) ] e j 2 π f d 1 l / f s e - j 14 π f d 1 / f s W [ 19 ] b 1 d [ l ( τ 1 f s + 18 ) ] e j 2 π f d 1 l / f s e - j 36 π f d 1 / f s + b ¯ 2 d [ l τ 2 f s ] e j 2 π f d 2 l / f s + φ z [ l ]
From (33), it is not difficult to deduce that four targets will be generated after the RDCC, among which ψ T r 1 and ψ T r 2 are real targets, while ψ T f 1 and ψ T f 2 are false. Moreover, the range cells of the two false targets are located at τ 1 f s + 7 and τ 1 f s + 18 , respectively. That is, the relative distances between the real target ψ T r 1 and the two false targets are 7 and 18 range cells, respectively. Therefore, the positions where the false targets appear are related to the peak values of the projection weight coefficients of the clutter suppression. Employing the prior information, the impure terms in the reference signal introduced by the target echo can be located.

3.2. Reference Signal Purification Method

Based on the method proposed in the previous subsection, the identification of the impure component within the reference signal can be achieved. The subsequent focus of this subsection revolves around the reconstruction of the signal and the subsequent purification of the reference signal through subtraction from the original reference signal. This purification process aims to mitigate the adverse impact of impurities on target detection.
Comparing (9) and (14), it can be seen that the only difference between the two formulas is φ T 1 [ l ] in (9). For analysis, here, φ T 1 [ l ] is rewritten as:
φ T 1 [ l ] = ( b ¯ 1 W [ 1 ] b 1 ) d [ l τ 1 f s ] e j 2 π f d 1 l / f s k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s
Due to the fact that a target is received by both the reference channel and the surveillance channel, the two channels should be very close to each other. As a result, it can be considered that the energy of the target received by the two channels is approximately equal, i.e., b ¯ 1 b 1 . In the practical scenarios of the PBR, in order to achieve full coverage of the airspace, multiple digital wave beams are generally employed for target detection. Among them, one wave beam serves as the reference channel, used to receive the reference signal, while the rest are surveillance channels, used to detect signals from the targets of interest. These digital wave beams overlap and cover each other. Therefore, this approximation is reasonable for the surveillance channels adjacent to the reference channel, but it does not hold true for other surveillance channels that are far away from the reference channel. Based on this approximation, (34) is further expressed as:
φ T 1 [ l ] = ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s k = 2 K W [ k ] b 1 d [ l τ 1 f s k + 1 ] e j 2 π f d 1 ( l k + 1 ) / f s
where ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s is the real target term after clutter suppression, while b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s is the original term of this target, and the other term is the set of false targets originated from the real target. When the target in the reference signal is eliminated, the false targets will also disappear. In other words, if b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s can be reconstructed, and then the impure reference signal with the existence of b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s can be purified. Although it is almost impossible to reconstruct b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s directly, it can be reconstructed indirectly from ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s .
Among ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s , τ 1 f s and f d 1 can be obtained by the proposed localization method, while W [ 1 ] is known. Therefore, as long as ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s is estimated, b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s can be reconstructed. To achieve this purpose, inspired by the ECA, ( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s in φ T 1 [ l ] can be estimated by utilizing the subspace projection method similar to the ECA. Given τ 1 f s and f d 1 , the subspace of the estimated impure term constructed by the impure reference signal is represented as:
V ˜ = S ref [ l τ 1 f s ] e j 2 π f d 1 l / f s
Replacing Ssur with Serr, the weights of the ECA can be updated as:
W ˜ = ( V ˜ H V ˜ ) 1 V ˜ H S err
Equation (37) indicates that the residual signal Serr after clutter suppression is projected onto the subspace V ˜ of the estimated impure term in the reference signal to obtain the energy projection coefficients W ˜ of the signal, which matches the impure term in Serr. Therefore, based on W ˜ , the impure term in Ssur can be estimated as:
( 1 W [ 1 ] ) b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s V ˜ W ˜
After rearranging, (38) is given by:
b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s V ˜ W ˜ 1 W [ 1 ]
The left term of (39) is equal to the impure term introduced by the reference signal in (5), and the right one is the corresponding reconstruction term. Obviously, by subtracting (39) from (5), the purified reference signal can be obtained, which is expressed as:
S ˜ ref [ l ] = S ref [ l ] V ˜ W ˜ 1 W [ 1 ] = a ref d [ l ] + b 1 d [ l τ 1 f s ] e j 2 π f d 1 l / f s V ˜ W ˜ 1 W [ 1 ] 0 + z ref [ l ] a ref d [ l ] + z ref [ l ]
From (40), it is easy to see that the purified reference signal and (1) are almost equivalent. Treating (40) as the reference signal for target detection, theoretically normal detection results can be obtained.

3.3. Target Detection Method Based on Impure Reference Signal

Combined with the localization and reconstruction methods proposed above, the flowchart of the target detection method under the condition of an impure reference signal is shown in Figure 2, while the detailed steps of the proposed method are summarized in Algorithm 1.
Algorithm 1 The core steps of the target detection method under the condition of impure reference signal.
1Input: Original reference signal Sref, surveillance signal Ssur.
2Initialization:   Set   the   maximum   range   cell   R ,   the   maximum   Doppler   cell   F ,   the   pairwise   matching   gate   Δ R  and other related parameters.
3Clutter suppression: Apply ECA on Sref and Ssur to obtain the residual signal Serr and weight coefficients W.
4RDCC:   Exploiting   ( 10 )   to   calculate   the   two - dimensional   range - Doppler   matrix   to   be   detected   ξ [ r , p ] .
5Points detection: Go through each p channel in [1, F] with interval 1 to achieve all the points exceeding the detection threshold.
For p = 1, 2, …, F do
Each cell is detected in turn as follows:
ξ ¯ [ r , p ] = 1 , ξ [ r , p ] τ p 0 , other
end
6Weights analysis: Sort the weight coefficients of W, and save the corresponding range cells l1 and l2 of the two coefficients with the largest values.
7Points matching :   Based   on   ξ ¯ [ r , p ] , go through each p channel in [1, F] with interval 1 to distinguish between real and false targets, while saving real targets information, which is performed as
For p = 1, 2, …, F do
Pairwise matching is conducted for range cells with a value of one within the channel as follows
If   r i r j l 2 l 1 Δ R ( suppose   r i < r j ) ,   ξ ¯ [ r , p ] = 1 ,   otherwise ,   ξ ¯ [ r , p ] = 0 .
end
8Purity verification:   Based   on   ξ ¯ [ r , p ] , go through each p channel in [1, F] with interval 1 to determine whether the reference signal is pure.
For p = 1, 2, …, F do
If   ξ ¯ [ r , p ] = 1 , record the corresponding range cell r and Doppler cell p, and pass them to next step; otherwise, enter the next loop.
end
9Reconstruction: Based on the saved r and p, the target signal in the reference signal is reconstructed via (20).
10Purification: The reference signal is purified via (21).
11Target detection: Based on the purified reference signal and surveillance signal, go back to step 3, 4, and 5 to obtain the updated ξ ¯ .
12Output: Save the detection result matrix ξ ¯ and then output it for subsequent signal processing.

4. Simulations and Analysis

In this section, the effectiveness of the proposed method is validated and analyzed by using both it and a traditional method to process the simulated data. In the experiments, the FM signal is utilized as the transmitting signal of the PBR. The key system parameters used for simulated data are listed in Table 1 and the detailed parameters of the reference signal and surveillance signal are described in Table 2 and Table 3, respectively. From Table 2 and Table 3, it can be seen that the only difference between the pure case and the impure case is whether the surveillance signal is included in the reference signal. Next, the proposed target detection method and conclusions of the theoretical analysis are verified from two aspects.
(1) Validation of the impact of impure reference signals on target detection performance: In this subsection, the traditional target detection method is employed for target detection in the pure case and the impure case. First, the ECA is used to suppress clutter in both cases, and the difference between them in clutter suppression is evaluated using the clutter suppression factor (CSF), which is defined as:
γ = 10 log ( S sur 2 2 / S err 2 2 ) ( d B )
where y stands for the CSF, and the bigger, the better. The values of the CSF for those two target methods are shown in Figure 3. From Figure 3, it can be observed that, regardless of whether the reference signal is pure or not, the values of the CSFs of the two methods are almost equivalent, and the value of the proposed method is slightly higher. The main reason for this difference is the additional target term in (9). On the other hand, it is further shown that in the surveillance signal, the energy of the targets is almost negligible compared to that of the clutter. Then, the RDCC processing results of the traditional target detection method in the pure case and the impure case are given in Figure 4a,b, respectively. As is apparent, more suspected real targets can be observed clearly in Figure 4b and the energy of the real target, whose range cell is 73, is also weakened, thus verifying the negative benefit of the impure reference signals on target detection. Furthermore, the unit average detection method is applied to detect the targets, and the detection results are shown in Figure 5a,b. By comparison, it is not difficult to see that more false targets will be detected in the impure case, among which, in addition to real targets, some of them are random false targets, and the rest are false targets derived from the real target. There is no doubt that the existence of more false targets will bring more interference to the localization and tracking of real targets.
(2) Effectiveness of the proposed target detection method: In this subsection, based on the impure reference signal and the surveillance signal, the proposed method and the traditional method are utilized to detect the three targets in the surveillance signal, respectively. Firstly, the ECA is performed to obtain the weights of the clutter suppression of the two methods, and the amplitudes of the weights of the proposed method are presented in detail in Table 4. As is shown, within the range cells where the clutter actually appears, such as in cells 1, 10, and 25, the corresponding weight values will have obvious peaks, while those corresponding to the other range cells are very small, which is consistent with the previous analysis. The core reason for this phenomenon is that clutter plays a major role due to the orthogonality between targets and the reference signal subspace. Then, the detection results of the two methods for target 1 and target 2 are depicted in Figure 6 and Figure 7, respectively. By comparison, it can be found that exploiting the proposed method for target detection can effectively overcome the problems of weakening target energy and generating false targets occurring in the conventional detection method. Next, the detection results of target 3 using the two methods are given in Figure 8. Clearly, target 3 existed only in the surveillance signal and is insensitive to whether the reference signal is disturbed by other targets or not; at the same time, the proposed method will not have any negative impact on the detection of target 3. Moreover, Figure 9 shows an overall comparison of the detection results obtained by using the proposed method and the traditional method to process the impure reference signal. It is easy to observe that the proposed method effectively purifies the reference signal and achieves cleaner target detection results. Finally, based on Matlab2020b and Intel i5 CPU processors, the execution efficiency of the two methods is compared in Figure 10. It can be seen that the execution efficiency of the proposed method is lower than that of the traditional method. The main reason for this problem is that the proposed method regards the detection results of the traditional method as feedback information, and on this basis, signal recognition and reconstruction are added successively, thus reducing the computational efficiency. Furthermore, according to the flowchart of the proposed method in Figure 2, the proposed method is divided into three modules: one is the feedback module, another is the detection module, and the last one is the reference signal purification module. Table 5 provides the running time and proportion of time each module takes up in the proposed method. It is evident that the main computational cost of the proposed method lies in the feedback and detection modules. These two modules process different data, but the methods are the same, allowing them to be accelerated through parallel computing.
Although the foregoing contents demonstrate the effectiveness of the proposed method in dealing with the problem of the impure reference signal, it is undeniable that the proposed method still has certain limitations. Firstly, for multiple targets with the same velocity, such as grouped targets, the tracks of these targets may fall into the same Doppler cell, causing interference in distinguishing real and false targets, thereby rendering the proposed method ineffective. Secondly, the proposed method is not applicable in cases where the surveillance channel is far from the reference channel––for example, when the surveillance channel and the reference channel are deployed back-to-back. The overlap of the main lobe of the surveillance channel and the reference channel is a fundamental condition for applying the proposed method. Lastly, although the proposed method can theoretically handle any targets with different Doppler frequencies in the reference signal, in practice, there is a trade-off between performance and efficiency.

5. Conclusions

In this paper, a comprehensive investigation was conducted to analyze the implications of target-echo-induced disturbances within the reference signal on conventional target detection methods. Subsequently, a pioneering approach for addressing this scenario was introduced. Specifically, leveraging the distinctive attributes of impure reference signals, a novel signal model was devised, followed by a detailed examination of its impact on the principal components of target detection. Drawing upon the valuable information embedded within the reference signal, a novel target detection method was proposed that incorporates a two-step process involving signal localization and subsequent signal reconstruction. In comparison to traditional methods, the proposed approach effectively mitigates the adverse effects of impure reference signals on target detection, thereby enhancing the integrated gain of the RDCC for specific real targets while minimizing the occurrence of false targets. Extensive simulation results have corroborated the superiority of the proposed method. However, although the proposed method has achieved some satisfying results, there are still some remaining issues that deserve to be studied in the future. For example, the current implementation of the proposed method exhibits relatively low computational efficiency, which may impede its practical application. Enhancing the execution efficiency of the proposed method through the integration of parallel processors is an ongoing effort. In addition, how to deal with the problem of impure reference signals when the main lobe of the reference channel and the surveillance channel do not overlap is another valuable research topic.

Author Contributions

Conceptualization, Y.W., Z.C. and D.P.; Methodology, Y.W.; Software, Y.W.; Formal analysis, Y.W.; Writing – original draft, Y.W.; Project administration, Z.C.; Funding acquisition, Z.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 61701148.

Data Availability Statement

Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Malanowski, M.; Kulpa, K.; Kulpa, J.; Samczynski, P.; Misiurewicz, J. Analysis of detection range of FM-based passive radar. IET Radar Sonar Navig. 2014, 8, 153–159. [Google Scholar] [CrossRef]
  2. Daun, M.; Nickel, U.; Koch, W. Tracking in multistatic passive radar systems using DAB/DVB-T illumination. Signal Process. 2012, 92, 1365–1386. [Google Scholar] [CrossRef]
  3. Klincewicz, K.; Samczy’nski, P. Method of Calculating Desynchronization of DVB-T Transmitters Working in SFN for PCL Applications. Sensors 2020, 20, 5776. [Google Scholar] [CrossRef]
  4. Lü, M.; Yi, J.; Wan, X.; Zhan, W. Co-channel Interference in DTMB-Based Passive Radar. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 2138–2149. [Google Scholar] [CrossRef]
  5. Nasso, I.; Santi, F. A centralized ship localization strategy for passive multistatic radar based on navigation satellites. IEEE Geosci. Remote Sens. Lett. 2022, 19, 1–5. [Google Scholar] [CrossRef]
  6. Zhang, C.; Shi, S.; Yan, S.; Gong, J. Moving Target Detection and Parameter Estimation Using BeiDou GEO Satellites-Based Passive Radar with Short-Time Integration. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2023, 16, 3959–3972. [Google Scholar] [CrossRef]
  7. Edrich, M.; Schroeder, A.; Meyer, F. Design and performance evaluation of a mature FM/DAB/DVB-T multi-illuminator passive radar system. IET Radar Sonar Navig. 2014, 8, 114–122. [Google Scholar] [CrossRef]
  8. Raja, S.A.; Noor, H.A.; Nur, E.A. Analysis on target detection and classification in LTE based passive forward scattering radar. Sensors 2016, 16, 1607. [Google Scholar] [CrossRef] [Green Version]
  9. Baxter, W.; Aboutanios, E.; Hassanien, A. Joint radar and communications for frequency-hopped MIMO systems. IEEE Trans. Signal Process. 2022, 70, 729–742. [Google Scholar] [CrossRef]
  10. Wang, L.; He, H.; Han, X.; He, Y.; Li, Z. The DOA and polarization estimation of coherent signals via UCA-IEVS. In Proceedings of the International Conference on Signal Processing and Communication Technology, Harbin, China, 23–25 December 2022; pp. 116–125. [Google Scholar]
  11. Colone, F.; Filippini, F.; Pastina, D. Passive radar: Past, present, and future challenges. IEEE Aerosp. Electron. Sys. Mag. 2022, 38, 54–69. [Google Scholar] [CrossRef]
  12. Kuschel, H.; Cristallini, D.; Olsen, K.E. Tutorial: Passive radar tutorial. IEEE Aerosp. Electron. Syst. Mag. 2019, 34, 2–19. [Google Scholar] [CrossRef]
  13. Zhao, D.; Wang, J.; Chen, G.; Wang, J.; Guo, S. Clutter cancellation based on frequency domain analysis in passive bistatic radar. IEEE Access 2020, 8, 43956–43964. [Google Scholar] [CrossRef]
  14. Mazurek, G.; Kulpa, K.; Malanowski, M.; Droszcz, A. Experimental seaborne passive radar. Sensors 2021, 6, 2171. [Google Scholar] [CrossRef] [PubMed]
  15. Cao, W.; Li, X.; Hu, W.; Lei, J.; Zhang, W. OFDM reference signal reconstruction exploiting subcarrier-grouping-based multi-level Lloyd-Max algorithm in passive radar systems. IET Radar Sonar Navig. 2017, 11, 873–879. [Google Scholar] [CrossRef]
  16. Krysik, P.; Gajo, Z.; Kulpa, J.S.; Malanowski, M. Reference channel equalization in FM passive radar using the constant magnitude algorithm. In Proceedings of the IEEE 15th International Radar Symposium, Gdansk, Poland, 16–18 June 2014; pp. 1–4. [Google Scholar]
  17. Guo, S.; Wang, J.; Ma, H.; Wang, J. Modified blind equalization algorithm based on cyclostationarity for contaminated reference signal in airborne PBR. Sensors 2020, 20, 788. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Colone, F.; Cardinali, R.; Lombardo, P.; Crognale, O.; Cosmi, A.; Lauri, A.; Bucciarelli, T. Space–time constant modulus algorithm for multipath removal on the reference signal exploited by passive bistatic radar. IET Radar Sonar Navig. 2009, 3, 253–264. [Google Scholar] [CrossRef]
  19. Yi, Y.; Zhu, L.; Liang, L.; Fu, Y. Reference signal extraction based on multiprocessing method in dual-polarization antenna passive radar. Int. J. Microw. Wirel. Technol. 2022, 9, 1–11. [Google Scholar] [CrossRef]
  20. Mahfoudia, O.; Horlin, F.; Neyt, X. Performance analysis of the reference signal reconstruction for DVB-T passive radars. Signal Process. 2019, 158, 26–35. [Google Scholar] [CrossRef] [Green Version]
  21. Zuo, L.; Wang, J.; Zhao, T.; Cheng, Z. A Joint Low-Rank and Sparse Method for Reference Signal Purification in DTMB-Based Passive Bistatic Radar. Sensors 2021, 21, 3607. [Google Scholar] [CrossRef] [PubMed]
  22. Baczyk, M.; Malanowski, M. Reconstruction of the reference signal in DVB-T-based passive radar. Int. J. Electron. Telecommun. 2011, 57, 42–48. [Google Scholar] [CrossRef] [Green Version]
  23. Tang, H.; Wan, X.; Yi, J.; Liu, Y.; Ke, H. Performance of the least squares filter for passive radar interference cancellation applications. IET Radar Sonar Navig. 2017, 11, 1208–1215. [Google Scholar] [CrossRef]
  24. Lyu, X.; Wang, J. Direction of arrival estimation in passive radar based on deep neural network. IET Signal Process. 2021, 15, 612–621. [Google Scholar] [CrossRef]
  25. Zuo, L.; Wang, J.; Sui, J.; Li, N. An inter-subband processing algorithm for complex clutter suppression in passive bistatic radar. Remote Sens. 2021, 13, 4954. [Google Scholar] [CrossRef]
  26. Sui, J.; Wang, J.; Zuo, L.; Gao, J. Multistage least squares algorithms for clutter suppression in airborne passive radar based on subband operation. IEEE Trans. Aerosp. Electron. Syst. 2022, 59, 1893–1909. [Google Scholar] [CrossRef]
  27. Colone, F.; O’hagan, D.W.; Lombardo, P.; Baker, C.J. A multistage processing algorithm for disturbance removal and target detection in passive bistatic radar. IEEE Trans. Aerosp. Electron. Syst. 2009, 45, 698–722. [Google Scholar] [CrossRef]
  28. Colone, F.; Palmarini, C.; Martelli, T.; Tilli, E. Sliding extensive cancellation algorithm for disturbance removal in passive radar. IEEE Trans. Aerosp. Electron. Syst. 2016, 52, 1309–1326. [Google Scholar] [CrossRef]
  29. He, Y.; Zhang, C.S.; Tang, X.M.; Chu, X.J.; Ding, J.H. Coherent integration loss due to pulses loss and phase modulation in passive bistatic radar. Digit. Signal Process. 2013, 23, 1265–1276. [Google Scholar] [CrossRef]
Figure 1. Sketch map of the PBR system with impure reference signal.
Figure 1. Sketch map of the PBR system with impure reference signal.
Remotesensing 15 03876 g001
Figure 2. Flowchart of the proposed target detection.
Figure 2. Flowchart of the proposed target detection.
Remotesensing 15 03876 g002
Figure 3. Values of the CSF of traditional target detection in pure case and impure case.
Figure 3. Values of the CSF of traditional target detection in pure case and impure case.
Remotesensing 15 03876 g003
Figure 4. RDCC results of traditional target detection in pure case and impure case: (a) results of pure case; (b) results of impure case.
Figure 4. RDCC results of traditional target detection in pure case and impure case: (a) results of pure case; (b) results of impure case.
Remotesensing 15 03876 g004
Figure 5. Detection results of traditional target detection in pure case and impure case: (a) results of pure case; (b) results of impure case.
Figure 5. Detection results of traditional target detection in pure case and impure case: (a) results of pure case; (b) results of impure case.
Remotesensing 15 03876 g005
Figure 6. Detection results of the traditional method and the proposed method for target 1: (a) results of the traditional method; (b) results of the proposed method.
Figure 6. Detection results of the traditional method and the proposed method for target 1: (a) results of the traditional method; (b) results of the proposed method.
Remotesensing 15 03876 g006
Figure 7. Detection results of the traditional method and the proposed method for target 2: (a) results of the traditional method; (b) results of the proposed method.
Figure 7. Detection results of the traditional method and the proposed method for target 2: (a) results of the traditional method; (b) results of the proposed method.
Remotesensing 15 03876 g007
Figure 8. Detection results of the traditional method and the proposed method for target 3: (a) results of the traditional method; (b) results of the proposed method.
Figure 8. Detection results of the traditional method and the proposed method for target 3: (a) results of the traditional method; (b) results of the proposed method.
Remotesensing 15 03876 g008
Figure 9. Comparison of the detection results of the two target detection methods in impure case: (a) results of the traditional method; (b) results of the proposed method.
Figure 9. Comparison of the detection results of the two target detection methods in impure case: (a) results of the traditional method; (b) results of the proposed method.
Remotesensing 15 03876 g009
Figure 10. Comparison of processing efficiency between the traditional method and the proposed method.
Figure 10. Comparison of processing efficiency between the traditional method and the proposed method.
Remotesensing 15 03876 g010
Table 1. System parameters of target detection.
Table 1. System parameters of target detection.
DescriptionParameterValue
Data lengthL200,000
Maximum range cellR200
Maximum Doppler cellL2000
Clutter suppression orderK100
Pairwise matching gateΔR1
Table 2. Reference signal parameters.
Table 2. Reference signal parameters.
DescriptionRange CellDoppler (Hz)Pure CaseImpure Case
Clutter10
Target 17389×
Target 238−70×
NoiseFollowing a Gaussian distribution
Table 3. Surveillance signal parameters.
Table 3. Surveillance signal parameters.
DescriptionRange CellDoppler (Hz)Pure CaseImpure Case
Clutter 110
Clutter 2100
Clutter 3250
Clutter 4400
Clutter 5560
Clutter 6780
Target 17389
Target 238−70
Target 310233
NoiseFollowing a Gaussian distribution
Table 4. Amplitudes of the clutter suppression weights of the proposed method.
Table 4. Amplitudes of the clutter suppression weights of the proposed method.
Range CellAmplitudes (Rounded Results)
1–100.2760.0000.0000.0010.0020.0020.0020.0020.0020.274
11–200.0030.0030.0030.0030.0020.0020.0010.0000.0010.002
21–300.0030.0040.0050.0050.2490.0060.0060.0060.0050.004
31–400.0030.0010.0000.0010.0020.0030.0040.0050.0060.203
41–500.0060.0060.0060.0050.0030.0020.0000.0000.0010.002
51–600.0030.0030.0040.0040.0050.1290.0060.0060.0060.006
61–700.0060.0050.0050.0040.0030.0020.0010.0000.0020.003
71–800.0040.0050.0060.0060.0060.0050.0040.0900.0020.002
81–900.0010.0010.0010.0020.0020.0030.0030.0040.0040.004
91–1000.0040.0040.0030.0020.0020.0000.0000.0000.0000.000
Table 5. Running time and time proportion of each module in the proposed method.
Table 5. Running time and time proportion of each module in the proposed method.
ModuleRunning Time (s)Proportion (%)
Feedback2.1248.62
Purification0.173.90
Detection2.0747.48
Total4.36100
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, Y.; Chen, Z.; Peng, D. Target Detection of Passive Bistatic Radar under the Condition of Impure Reference Signal. Remote Sens. 2023, 15, 3876. https://doi.org/10.3390/rs15153876

AMA Style

Wu Y, Chen Z, Peng D. Target Detection of Passive Bistatic Radar under the Condition of Impure Reference Signal. Remote Sensing. 2023; 15(15):3876. https://doi.org/10.3390/rs15153876

Chicago/Turabian Style

Wu, Yong, Zhikun Chen, and Dongliang Peng. 2023. "Target Detection of Passive Bistatic Radar under the Condition of Impure Reference Signal" Remote Sensing 15, no. 15: 3876. https://doi.org/10.3390/rs15153876

APA Style

Wu, Y., Chen, Z., & Peng, D. (2023). Target Detection of Passive Bistatic Radar under the Condition of Impure Reference Signal. Remote Sensing, 15(15), 3876. https://doi.org/10.3390/rs15153876

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop