13
1 Adaptive Radar Detection and Classification Algorithms for Multiple Coherent Signals Sudan Han, Linjie Yan, Yuxuan Zhang, Pia Addabbo, Senior Member, IEEE, Chengpeng Hao, Senior Member, IEEE, and Danilo Orlando, Senior Member, IEEE Abstract—In this paper, we address the problem of target detection in the presence of coherent (or fully correlated) signals, which can be due to multipath propagation effects or electronic attacks by smart jammers. To this end, we formulate the problem at hand as a multiple-hypothesis test that, besides the conventional radar alternative hypothesis, contains additional hypotheses accounting for the presence of an unknown number of interfering signals. In this context and leveraging the classifi- cation capabilities of the Model Order Selection rules, we devise penalized likelihood-ratio-based detection architectures that can establish, as a byproduct, which hypothesis is in force. Moreover, we propose a suboptimum procedure to estimate the angles of arrival of multiple coherent signals ensuring (at least for the considered parameters) almost the same performance as the ex- haustive search. Finally, the performance assessment, conducted over simulated data and in comparison with conventional radar detectors, highlights that the proposed architectures can provide satisfactory performance in terms of probability of detection and correct classification. Index Terms—Adaptive Radar Detection, Classification, Elec- tronic Counter-CounterMeasures, Fully Coherent Signals, Gen- eralized Likelihood Ratio Test, Model Order Selection Rules, Multipath, Radar, Smart Jammer. I. I NTRODUCTION In recent years, radar systems have become ubiquitous in real life due to the advances in digital architectures and minia- turization technologies. More importantly, the huge amount of computational power has paved the way for sophisticated processing algorithms fed by digital samples and leading to new architectures where the presence of analog hardware resources devoted to a specific task is very limited [1]–[3]. As a consequence, modern radar systems are extremely flexible and can incorporate different functions without additional hardware components. In system design, the turning point is represented by the knocking down of high-frequency sampler and processing board costs that have allowed the development of fully-digital architectures. In this evolving scenario, radar research commu- nity continues to devise algorithms with increased complexity Sudan Han is with the National Innovation Institute of Defense Technology, Beijing, China. E-mail: [email protected]. Pia Addabbo is with Universit` a degli studi “Giustino Fortunato”, Benevento, Italy. E-mail: [email protected]. Linjie Yan, Yuxuan Zhang, and Chengpeng Hao are with Insti- tute of Acoustics, Chinese Academy of Sciences, Beijing, China. E- mail: [email protected]; [email protected]; [email protected]. Danilo Orlando is with the Engineering Faculty of Universit` a degli Studi “Niccol` o Cusano”, via Don Carlo Gnocchi 3, 00166 Roma, Italy. E-mail: [email protected]. that take full advantage of the potential provided by digital architectures. The quid pro quo of the increased computa- tional power is represented by the enhanced performance as corroborated, for instance, by the space and/or time adaptive algorithms developed in the open literature. As a matter of fact, focusing on the radar detection task and starting from the seminal works by Kelly [4], [5], a plethora of decision schemes have been proposed by enriching the design assumptions in order to account for a priori information and/or specific aspects of the application/system under consideration [4], [6]–[20]. It is also important to underline that the benefits coming from the aforementioned technology advances have been also exploited by the Electronic Warfare (EW) systems, which have adapted themselves to the more and more reliable capabilities of radar systems leading to a more effective class of electronic countermeasures referred to as smart jammers [3], [21]–[25]. For instance, modern noise-like jamming systems are capable of transmitting narrow-band interfering signals which are concurrent with the radar pulses according to the radar pulse repetition interval after having estimated it (EW integrated systems). Moreover, they can use an intrapulse modulation to generate a noise bandwidth at radio frequency, while main- taining phase coherence over a group of successive jamming pulses [25]. Remarkably, this kind of jammers can generate signals that are coherent (i.e., fully correlated) with the desired signal even though the former impinge on the radar from different directions [26], [27]. An analogous situation occurs in scenarios where, due to multipath propagation, replicas of the original signal come back to the receiver with a sufficiently small delay difference [27], [28]. The main drawback caused by the presence of multiple coherent signals is that they can completely destroy the perfor- mance of the most common high-resolution direction finding algorithms for adaptive array systems [29], [30]. As a matter of fact, coherent signals appear as a single signal impinging on the array of sensors and that, more importantly, arrives from a direction which is quite different from that of the sought sig- nals. As a consequence, high-resolution eigenstructure-based techniques as, for instance, MUltiple SIgnal Classification algorithm [29], fail to correctly resolve the signals jeopardizing the Angle of Arrival (AoA) estimation [26]. Similar remarks also hold for another important approach to AoA estimation, namely the CLEAN algorithm [31] which consists in iterative cancellations of strong signals under the assumption that the spatial covariance matrix results from the sum of contributions associated with uncorrelated sources. Remarkably, it can be used for the detection of weak targets embedded in strong arXiv:2012.12688v1 [eess.SP] 23 Dec 2020

Adaptive Radar Detection and Classification Algorithms for

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

1

Adaptive Radar Detection and ClassificationAlgorithms for Multiple Coherent Signals

Sudan Han, Linjie Yan, Yuxuan Zhang, Pia Addabbo, Senior Member, IEEE,Chengpeng Hao, Senior Member, IEEE, and Danilo Orlando, Senior Member, IEEE

Abstract—In this paper, we address the problem of targetdetection in the presence of coherent (or fully correlated) signals,which can be due to multipath propagation effects or electronicattacks by smart jammers. To this end, we formulate theproblem at hand as a multiple-hypothesis test that, besides theconventional radar alternative hypothesis, contains additionalhypotheses accounting for the presence of an unknown numberof interfering signals. In this context and leveraging the classifi-cation capabilities of the Model Order Selection rules, we devisepenalized likelihood-ratio-based detection architectures that canestablish, as a byproduct, which hypothesis is in force. Moreover,we propose a suboptimum procedure to estimate the angles ofarrival of multiple coherent signals ensuring (at least for theconsidered parameters) almost the same performance as the ex-haustive search. Finally, the performance assessment, conductedover simulated data and in comparison with conventional radardetectors, highlights that the proposed architectures can providesatisfactory performance in terms of probability of detection andcorrect classification.

Index Terms—Adaptive Radar Detection, Classification, Elec-tronic Counter-CounterMeasures, Fully Coherent Signals, Gen-eralized Likelihood Ratio Test, Model Order Selection Rules,Multipath, Radar, Smart Jammer.

I. INTRODUCTION

In recent years, radar systems have become ubiquitous inreal life due to the advances in digital architectures and minia-turization technologies. More importantly, the huge amountof computational power has paved the way for sophisticatedprocessing algorithms fed by digital samples and leading tonew architectures where the presence of analog hardwareresources devoted to a specific task is very limited [1]–[3]. Asa consequence, modern radar systems are extremely flexibleand can incorporate different functions without additionalhardware components.

In system design, the turning point is represented by theknocking down of high-frequency sampler and processingboard costs that have allowed the development of fully-digitalarchitectures. In this evolving scenario, radar research commu-nity continues to devise algorithms with increased complexity

Sudan Han is with the National Innovation Institute of Defense Technology,Beijing, China. E-mail: [email protected].

Pia Addabbo is with Universita degli studi “Giustino Fortunato”, Benevento,Italy. E-mail: [email protected].

Linjie Yan, Yuxuan Zhang, and Chengpeng Hao are with Insti-tute of Acoustics, Chinese Academy of Sciences, Beijing, China. E-mail: [email protected]; [email protected];[email protected].

Danilo Orlando is with the Engineering Faculty of Universita degli Studi“Niccolo Cusano”, via Don Carlo Gnocchi 3, 00166 Roma, Italy. E-mail:[email protected].

that take full advantage of the potential provided by digitalarchitectures. The quid pro quo of the increased computa-tional power is represented by the enhanced performance ascorroborated, for instance, by the space and/or time adaptivealgorithms developed in the open literature. As a matter offact, focusing on the radar detection task and starting from theseminal works by Kelly [4], [5], a plethora of decision schemeshave been proposed by enriching the design assumptions inorder to account for a priori information and/or specific aspectsof the application/system under consideration [4], [6]–[20].

It is also important to underline that the benefits comingfrom the aforementioned technology advances have been alsoexploited by the Electronic Warfare (EW) systems, which haveadapted themselves to the more and more reliable capabilitiesof radar systems leading to a more effective class of electroniccountermeasures referred to as smart jammers [3], [21]–[25].For instance, modern noise-like jamming systems are capableof transmitting narrow-band interfering signals which areconcurrent with the radar pulses according to the radar pulserepetition interval after having estimated it (EW integratedsystems). Moreover, they can use an intrapulse modulationto generate a noise bandwidth at radio frequency, while main-taining phase coherence over a group of successive jammingpulses [25]. Remarkably, this kind of jammers can generatesignals that are coherent (i.e., fully correlated) with the desiredsignal even though the former impinge on the radar fromdifferent directions [26], [27]. An analogous situation occursin scenarios where, due to multipath propagation, replicas ofthe original signal come back to the receiver with a sufficientlysmall delay difference [27], [28].

The main drawback caused by the presence of multiplecoherent signals is that they can completely destroy the perfor-mance of the most common high-resolution direction findingalgorithms for adaptive array systems [29], [30]. As a matterof fact, coherent signals appear as a single signal impinging onthe array of sensors and that, more importantly, arrives from adirection which is quite different from that of the sought sig-nals. As a consequence, high-resolution eigenstructure-basedtechniques as, for instance, MUltiple SIgnal Classificationalgorithm [29], fail to correctly resolve the signals jeopardizingthe Angle of Arrival (AoA) estimation [26]. Similar remarksalso hold for another important approach to AoA estimation,namely the CLEAN algorithm [31] which consists in iterativecancellations of strong signals under the assumption that thespatial covariance matrix results from the sum of contributionsassociated with uncorrelated sources. Remarkably, it can beused for the detection of weak targets embedded in strong

arX

iv:2

012.

1268

8v1

[ee

ss.S

P] 2

3 D

ec 2

020

2

interference signals [32]–[34].In order to mitigate the effects of coherent signals, data

feeding the direction finding algorithm can be suitably prepro-cessed in order to decrease the correlation of the impingingsignals. In this respect, spatial smoothing technique [30]combines data obtained from synthetic subarrays whose sizeis lower than that of the original array with the drawbackof a reduced angular resolution. In the context of subspace-based algorithms, in [35] a method based upon the weightedsubspace fitting criterion is proposed to jointly detect andestimate the number and the related parameters of the coherentsignals. However, this method does not allow for the controlof the probability of false alarm (Pfa) which is of primaryconcern in radar. Alternative approaches against the coherentsignals problem can rely on the Maximum Likelihood (ML)estimation [36] which, however, is computationally intensiveand requires the knowledge of the number of coherent signals,or the compressed sensing paradigm where a further stage forestimate fusion is required [37], [38].

Thus, in order to save computational resources (due to theactivation of additional processing stages also in situationswhere they are not required) and to take advantage of the fullangular resolution of the system, a detection stage capableof deciding for the presence of a target and possible coherentsignals by estimating, as a byproduct, their number along withother side information is highly desirable. In fact, when thisstage declares the presence of noncoherent signals, directionfinding algorithms can be applied without losses in resolution.On the other hand, when coherent signals are present, therough estimates of the corresponding parameters provided bythis stage can be used to drive ML-based direction finding al-gorithms to reduce their computational load. Remarkably, suchstage can be viewed as an Electronic Counter-CounterMeasure.

With the above remarks in mind, in this paper we devise adetection architecture accounting for the presence of coherentsignals and that can provide an estimate of their number aswell as the AoAs. To this end, at the design stage, we formu-late the problem at hand in terms of a multiple hypothesis test,comprising the usual null (or interference-only) hypothesis, theconventional signal-plus-interference hypothesis, and multiplealternative hypotheses that differ in the number of coherentechoes. These signals are assumed to follow Swerling II TargetModel, which assumes that the Radar Cross Section (RCS) ofthe target obeys the chi-squared distribution with two degreesof freedom [1]. Then, assuming an upper bound on the numberof impinging signals (that can be dictated by system parame-ters), we conceive likelihood-ratio-based decision rules whichexploit suitable penalty terms borrowed from the Model OrderSelection (MOS) rules [39], [40]. Therefore, the proposedarchitectures can provide an estimate of the actual numberof coherent signals. As for the AoA estimation, the angularsector under consideration is sampled to form a discrete setof angular positions that are used at the design stage. Besides,since the exhaustive search can become very time demandingfor high numbers of signals, we design a suboptimum itera-tive procedure providing satisfactory performance at least forthe considered numerical examples. Finally, the performanceassessment is conducted over synthetic data in comparison

with classical detection architectures and highlights that theproposed schemes represent an effective means to face withthe problem of target detection in the presence of coherentsignals.

The remainder of the paper is organized as follows. SectionII is devoted to problem formulation and the definitions usedin the next derivations, while the design of the detection andestimation architectures is described in Section III. SectionIV shows the effectiveness of the proposed strategies throughnumerical examples on simulated data. Finally, Section Vcontains concluding remarks and charts a course for futureworks.

A. Notation and Acronyms

In the sequel, vectors and matrices are denoted by bold-face lower-case and upper-case letters, respectively. Symbolsdet(·), Tr (·), (·)T , and (·)† denote the determinant, trace,transpose, and complex conjugate transpose, respectively. If Aand B are two generic sets, then A×B denotes the Cartesianproduct between A and B. As to the numerical sets, C is theset of complex numbers, and CN×M is the Euclidean space of(N ×M)-dimensional complex-valued matrices (or vectors ifM = 1). The imaginary unit is indicated by j. The Euclideannorm of a generic vector x is denoted by ‖x‖ whereas themodulus of a complex number x is denoted by |x|. The symbolE[·] denotes statistical expectation while 0 and I are the nullvector/matrix and the identity matrix, respectively, of propersize. Given two events A and B, the conditional probabilityof A given B is denoted by P (A|B). The acronyms PDFand IID mean Probability Density Function and Independentand Identically Distributed, respectively. For a given matrixA, λmaxA denotes the maximum eigenvalue of A. Finally,we write x ∼ CNN (m,M) if x is a complex circular N -dimensional normal vector with mean m and positive definitecovariance matrix M .

II. PROBLEM FORMULATION

Let us assume that a search radar system is equipped with auniform linear array with N antennas and transmits L pulses inthe nominal beam position during one scan cycle. Then, eachantenna collects L samples from the cell under test. Denote byzl ∈ CN×1, l = 1, . . . , L, the vector whose entries are the lthreturns from each antenna and by ZL = [z1, . . . ,zL] ∈ CN×Lthe overall data matrix, the classical radar detection problemconsists in deciding whether or not ZL contains the targetof interest, namely, a component whose signature coincideswith the nominal steering vector. Before proceeding withthe problem formulation, it is important to state here thatthe columns of ZL are assumed statistically independentand, hence, temporally noncoherent, whereas each column isrepresentative of both spatially correlated clutter and spatiallycoherent useful signal components (a point better explainedbelow).

As customary, we assume that a set of K (K ≥ N )secondary data, zk ∈ CN×1, k = 1, . . . ,K, free of targetcomponents and sharing the same statistical properties ofthe interference in the cell under test, is available [4], [7],

3

[12], [41]. Under the above assumptions, this problem can beformulated in terms of a conventional binary hypothesis testwhose expression is (see [4], [7], [12] and references therein)

H0 :

zl = nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,

H1 :

zl = αlv(θt) + nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,

(1)

where

• nl,nk ∼ CNN (0,M), l = 1, . . . , L, k = 1, . . . ,K,are IID with unknown positive definite covariance matrixM ∈ CN×N representative of the thermal noise plusclutter; M is referred to in the following as InterferenceCovariance Matrix (ICM);

• α1, . . . , αL ∼ CN 1(0, σ2α) with σ2

α > 0 are IID randomvariables accounting for both the target response (RCS)and channel effects (Swerling II target model [1]);

• v(θt) ∈ CN×1 is the nominal (spatial) steering vectorwhose expression is

v(θt)=[1, expjπ sin(θt), . . . , expjπ(N−1) sin(θt)]T,

where θt is the (known) AoA of the target measured withrespect to the array broadside and we have assumed thatthe inter-element spacing is half the operating wavelengthin order to avoid the aliasing of the spatial frequency.

However, as stated in Section I, in practical applicationsthe generic zl might not only contain the direct echo butalso returns from other directions and that, more importantly,are coherent (i.e., fully correlated) with the former due, forinstance, to the effects of multipath propagation and/or thepresence of smart jammers [26]–[28]. As a consequence, theconventional radar detection problem (1) consisting of twohypotheses may be no longer representative of the actual oper-ating scenario. In fact, in such case, the alternative hypothesiscan be replaced by the following

H1,M :

zl = αlv(θt) +

M∑i=1

βl,iv(θi) + nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,(2)

where M is the actual number of coherent signals, which isunknown. However, notice that the uncertainty on M naturallyleads to multiple alternative hypotheses, H1,i say, which differin the number of coherent signals. Therefore, assuming anupper bound, Mc say, on the latter unknown parameter, apossible approach to account for the presence of possible fully-correlated signals consists in considering a multiple hypothesistest where besides the conventional H0 and H1 hypotheses,Mc < N additional hypotheses1, corresponding to scenarios

1The constraint Mc < N is due to both the fact that N degrees of freedomare required to estimate N AoAs also making matrix V i, defined in (6), full-column rank.

containing a different number of coherent signals, appear.Therefore, problem (1) can be generalized as follows

H0 :

zl = nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,

H1,0 :

zl = αlv(θt) + nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,

H1,i :

zl = αlv(θt) +

i∑k=1

βl,kv(θk) + nl, l = 1, . . . , L,

zk = nk, k = 1, . . . ,K,(3)

i = 1, . . . ,Mc, where the αls, the nls, and the nks have beenalready defined for problem (1) and• Mc ≥ M is an upper bound on the number of coherent

signals2;• given i ∈ 1, . . . ,Mc and k ∈ 1, . . . , i, the coef-

ficients β1,k, . . . , βL,k ∈ C are IID complex Gaussianrandom variables with zero mean and variance σ2

k > 0;they represent the complex amplitudes of the kth coherentsignal over the time3;

• given i ∈ 1, . . . ,Mc, θ1, . . . , θi are the unknown AoAsof the additional coherent signals.

Finally, we assume that, ∀i = 1, . . . ,Mc, the random variablesαl, βl,1, . . . , βl,i are fully correlated. Otherwise stated, givenl ∈ 1, . . . , L and i ∈ 1, . . . ,Mc, ∀k, h ∈ 1, . . . , i andk 6= h the following equalities hold

E[αlβl,k] = σασk and E[βl,kβl,h] = σkσh. (4)

In order to unburden the notation, hereafter we omit thedependence of the steering vectors on the AoAs and denote byvt the nominal steering vector whereas we use pi to indicatethe steering vector associated with the coherent signal whoseAoA is θi.

Before concluding this section, we provide some definitionsthat will come in handy for the next developments. More pre-cisely, the PDF of ZL under H0 has the following expression

f0(ZL;M) =

[1

πN det(M)

]Lexp

[−Tr

(M−1ZLZ

†L

)],

(5)whereas its PDF under the generic H1,i, i = 0, . . . ,Mc, isgiven by

f1,i(ZL;M ,Ri,V i) =

[1

πN det(M + V iRiV†i )

]L× exp

−Tr

[(M + V iRiV

†i

)−1

ZLZ†L

], (6)

where V i = [vt,p1, . . . ,pi] ∈ CN×(i+1) and Ri =E[νl,iν

†l,i] ∈ C(i+1)×(i+1), l = 1, . . . , L, with νl,i =

[αl, βl,1, . . . , βl,i]T ∈ C(i+1)×1. It is understood that when

i = 0, V 0 and νl,0 coincide with vt and αl, respectively.

2Note that problem (3) reduces to (1) when Mc = 0.3It is worth noticing that Swerling II target model is also adopted for the

coherent signals.

4

III. DETECTION ARCHITECTURE DESIGNS

In this section, we devise a detection architecture for prob-lem (3) that relies on a penalized log-likelihood ratio test [29],[42] whose generic structure is given by

[Λi(ZL)− c · h(i)

] H1,i><H0

η, (7)

where

i = arg maxi=0,...,Mc

Λi(ZL)− c · h(i)

, (8)

η is the detection threshold to be set according to a desired4

Pfa,

Λi(ZL) = log

maxRi

maxθ1,...,θi

f1,i(ZL;M ,Ri,V i)

f0(ZL;M)(9)

with5 M a suitable estimate ofM , and c·h(i) is a penalty termborrowed from the MOS rules [39] with h(i) the number ofunknown real-valued parameters under the H1,i hypothesis andc a suitable scaling factor. Specifically, c can be set accordingto the Akaike Information Criterion (AIC), Bayesian Informa-tion Criterion (BIC), and Generalized Information Criterion(GIC), namely

c =

1, for AIC-based Detector (AIC-D),log(2LN)/2, for BIC-based Detector (BIC-D),(1 + ρ)/2, ρ > 1, for GIC-based Detector (GIC-D).

(10)Two important remarks are now in order. First, notice thatΛi(ZL) is the logarithm of a decision statistic obtained byresorting to a modified Generalized Likelihood Ratio Test(GLRT)-based design procedure [7], where the ICM is firstlyassumed known and then replaced by an estimate. In thespecific case, we use the ML estimate based upon the trainingsamples only (namely, the sample covariance matrix that isinvertible with probability 1 since K ≥ N ), whose expressionis6

M =1

K

K∑k=1

zkz†k. (11)

Second, the correlation of the signals makes the columns ofthe positive semidefinite matrix Ri proportional. Therefore,the resulting rank is 1 and it can be factorized as

Ri = rir†i , (12)

where ri ∈ C(i+1)×1. As a consequence, the number ofunknown real-valued parameters under H1,i can be written

4Hereafter, we denote by η the generic detection threshold.5Notice that for i = 0, the maximization at the numerator of (9) is with

respect to σ2α only.

6This design choice is dictated by the fact that deriving closed-formexpression for the plain GLRT is not mathematically tractable at least tothe best of authors’ knowledge.

as h(i) = N2 + 1 + 2i. With the above remarks in mind, letus proceed by deriving Λ0(ZL), namely

Λ0(ZL) = log

maxσ2α

f1,0(ZL;M , σ2α,vt)

f0(ZL;M)

= maxσ2α

− L log det(M + σ2

αvtv†t)− Tr

[(M + σ2

αvtv†t

)−1

×ZLZ†L]

+ L log det(M) + Tr[M−1ZLZ

†L

]. (13)

Applying the Woodbury identity [43], we come up with thefollowing expression

Λ0(ZL) = maxσ2α

[−L log(1 + σ2

α‖vw‖2) +σ2αv†wSwvw

1 + σ2α‖vw‖2

],

(14)where vw = M

−1/2vt and Sw = M

−1/2ZLZ

†LM

−1/2. Let

us define the function

g0(σ2α) = −L log(1 + σ2

α‖vw‖2) +σ2α

1 + σ2α‖vw‖2

v†wSwvw

(15)and observe that limσ2

α→0 g0(σ2α) = 0 and

limσ2α→+∞ g0(σ2

α) = −∞. Thus, in order to maximizeg0(σ2

α), we find the zeros of its first derivative with respectto σ2

α to obtain

σ2α =

v†wSwvw − L‖vw‖2

L‖vw‖4, if v†wSwvw > L‖vw‖2,

0, otherwise.(16)

Moreover, g0(σ2α) is monotonic increasing when σ2

α <(v†wSwvw − L‖vw‖2)/(L‖vw‖4) and decreasing for σ2

α >(v†wSwvw − L‖vw‖2)/(L‖vw‖4) (provided that v†wSwvw >L‖vw‖2). As a consequence, (16) represents a maximum pointof g0(σ2

α). It follows that (14) can be recast as

Λ0(ZL) =−L log

(v†wSwvwL‖vw‖2

)+v†wSwvw‖vw‖2

−L,if v†wSwvw>L‖vw‖2,

0, otherwise.(17)

The next step towards the computation of (7) consists inderiving Λi(ZL) for i = 1, . . . ,Mc. To this end, observe that

Λi(ZL) = log

maxRi

maxθ1,...,θi

f1,i(ZL;M ,Ri,V i)

f0(ZL;M)

= maxRi,

θ1,...,θi

− L log det(M+V iRiV

†i )−Tr

[(M+V iRiV

†i

)−1

×ZLZ†L]

+ L log det(M) + Tr(M−1ZLZ

†L

). (18)

Replacing (12) into the most right-hand side of the aboveequation and applying the Woodbury identity leads to

Λi(ZL) = maxri

maxθ1,...,θi

−L log(1 + r†iV

†w,iV w,iri)

+r†iV

†w,iSwV w,iri

1 + r†iV†w,iV w,iri

, (19)

5

where V w,i = M−1/2

V i and Sw has been previouslydefined. Since V i has a Vandermonde structure and Mis nonsingular, also matrices Ai = V †w,iV w,i and Bi =

V †w,iSwV w,i are nonsingular and (19) can be expressed interms of these matrices as

Λi(ZL)=maxri

maxθ1,...,θi

−L log(1 + r†iAiri) +

r†iBiri

1 + r†iAiri

.

(20)Exploiting the Cholesky decomposition of Ai, given by

Ai = CiC†i , (21)

where Ci ∈ C(i+1)×(i+1) is a lower triangular matrix, theright-hand side of (20) can be recast as

maxri,

θ1,...,θi

−L log(1+r†iCiC

†iri)+

r†iCiC−1i Bi(C

†i )−1C†iri

1+r†iCiC†iri

= maxai

maxθ1,...,θi

−L log(1 + ‖ai‖2) +

a†iDiai1 + ‖ai‖2

, (22)

whereai = C†iri, Di = C−1

i Bi(C†i )−1. (23)

As further step towards the solution of the above problem, wedecompose ai as the product of a positive scalar

√ai, with

ai > 0, times a unit-norm vector ua,i. Thus, problem (22) istantamount to

maxai>0

maxua,i‖ua,i‖=1

maxθ1,...,θi

−L log(1 + ai) +

aiu†a,iDiua,i

1 + ai

.

(24)Denoting by

g(ai) = −L log(1 + ai) +ai

1 + aiu†a,iDiua,i, (25)

the maximization with respect to ai can be performed byinvestigating the behavior of g(ai) over the interval (0,+∞).Specifically, since the following equalities hold

limai→0

g(ai) = 0, limai→+∞

g(ai) = −∞, (26)

we can search for the stationary points of g(ai) in the interiorof its domain by setting to zero its first derivative with respectto ai to obtain

ai =

u†a,iDiua,i − L

L, if u†a,iDiua,i > L,

0, otherwise.(27)

Moreover, it is not difficult to show that g(ai) is increasingwhen ai < (u†a,iDiua,i − L)/L and decreasing in the oppo-site case (provided that u†a,iDiua,i > L). As a consequence,(27) represents a maximum point. Now, plugging (27) into(24), the maximization problem can be recast as (29) at thebottom of this page.

The maximization over ua,i can be conducted by definingthe function f(x) = x − L log x + L logL − L, which ismonotonic increasing for x ≥ L. In fact, its first derivativeis df(x)

dx = 1 − Lx ≥ 0, ∀x ≥ L. Therefore, the maximum

of f(u†a,iDiua,i) with respect to ua,i can be obtained bydirectly optimizing argument, i.e., u†a,iDiua,i. Exploiting theRayleigh-Ritz Theorem [43], we obtain that

maxua,i‖ua,i‖=1

u†a,iDiua,i = λmaxDi, (28)

and the maximum is attained when ua,i is the normalizedeigenvector of Di corresponding to its maximum eigenvalue.Gathering the above results, we obtain (30) at the bottom ofthis page.

The last optimization problem to be solved is with respectto the AoAs of the coherent signals. In this respect, sincederiving closed-form expressions for the ML estimates ofθ1, . . . , θi represents a difficult task (at least to the best ofauthors’ knowledge), we devise grid-search methods. Moreprecisely, the angular sector under surveillance is sampledto form a discrete set of angular positions which is denotedby Ω = ω1, . . . , ωS (see Figure 1). The cardinality of Ωcan be chosen according to both the computational poweravailable at the receiver and the system requirements interms of reactivity time intervals. It is clear that a densesampling of the angular sector increases the processingtime but can provide better estimation results with respectto the case where the sampling interval is large. However,in the latter case, the computational load is lower than inthe former case. Nevertheless, an iterative approach canbe pursued for the maximization under the generic H1,i

hypothesis and for each i ∈ 1, . . . ,Mc. Specifically, giveni ∈ 1, . . . ,Mc and assuming that H1,i holds true, we startby roughly sampling the angular sector of interest and usethis search grid to come up with preliminary estimates of theassumed i AoAs. Then, we use these estimates to identify arestricted angular sector (resulting from the union of partiallyoverlapped narrow sectors) comprising suitable guard bands.

Λi(ZL) =

maxua,i‖ua,i‖=1

maxθ1,...,θi

−L log(u†a,iDiua,i) + u†a,iDiua,i + L logL− L, if u†a,iDiua,i > L,

0, otherwise.(29)

Λi(ZL) =

maxθ1,...,θi

−L log λmaxDi+ λmaxDi+ L logL− L, if λmaxDi > L,

0, otherwise.(30)

6

Figure 1: Sampling of the angular sector under surveillance.

The new angular sector of interest is sampled through ashorter sampling interval and the maximization under H1,i

is repeated over the new search grid. As a result, the gridpoints can be very close to the actual angular positions (atleast for high signal power values) improving the estimationquality. Finally, notice that this procedure is applied for eachi = 1, . . . ,Mc before forming the decision statistic and,in a single application, the number of supposed interferersis maintained constant. As for the single search procedureunder the generic H1,i hypothesis with i ≥ 1, observe thatin situations where, according to the system geometry andantenna beamwidth, Mc is enough low, an exhaustive grid-based search can be conducted over the set

Ω× Ω× . . .× Ω︸ ︷︷ ︸i times

= Ωi, ∀i ∈ 1, . . . ,Mc, (31)

with the constraint that admissible candidates are such thatω1 6= ω2 6= . . . 6= ωi. On the other hand, exhaustive gridsearch can be prohibitive for large Mc values. In this case,in order to limit the number of operations, we design asuboptimum search method relying on the cyclic optimizationparadigm [44]. Specifically, let us assume that H1,i is trueand that i − 1 estimates, Θ

(0)1,i = θ(0)

2 , . . . , θ(0)i ⊂ Ω say,

are available, then we select θ1 ∈ Ω exploiting the followingcriterion

θ(1)1 = arg max

θ1∈Ω, θ1 /∈Θ(0)1,i

−L log λmaxDi(θ1, Θ

(0)1,i )

+λmaxDi(θ1, Θ(0)1,i )

, (32)

where Di(θ1, Θ(0)1 ) is computed as Di in (23) with the

difference that V i is replaced by the following matrix

V i

(θ1, Θ

(0)1,i

)=[vt,v (θ1) ,v(θ

(0)2 ), . . . ,v(θ

(0)i )]. (33)

The new estimate θ(1)1 is used to form Θ

(0)2,i =

θ(1)1 , θ

(0)3 , . . . , θ

(0)i and the update of θ2 is obtained as

θ(1)2 = arg max

θ2∈Ω, θ2 /∈Θ(0)2,i

−L log λmaxDi(θ2, Θ

(0)2,i )

+λmaxDi(θ2, Θ(0)2,i )

, (34)

where Di(θ2, Θ(0)2,i ) is built up using

V i

(θ2, Θ

(0)2,i

)=[vt,v(θ

(1)1 ),v(θ2),v(θ

(0)3 ), . . . ,v(θ

(0)i )].

(35)The above steps continue until the ith update occurs to obtainΘ

(1)1,i = θ(1)

2 , . . . , θ(1)i , which can be used to repeat the entire

refinement procedure.Summarizing, the update of the kth AoA within the nth

(n ≥ 1) procedure cycle has the following expression

θ(n)k = arg max

θk∈Ω, θk /∈Θ(n−1)k,i

−L log λmaxDi(θk, Θ

(n−1)k,i )

+λmaxDi(θk, Θ(n−1)k,i )

, (36)

1 ≤ k ≤ i, where

Θ(n−1)k,i =

θ

(n)1 , . . . θ

(n)k−1, θ

(n−1)k+1 , . . . , θ

(n−1)i

(37)

and Di(θk, Θ(n−1)k,i ) is defined as

in (23) with V i

(θk, Θ

(n−1)k,i

)=

[vt,v(θ(n)1 ), . . . ,v(θ

(n)k−1),v(θk),v(θ

(n−1)k+1 ), . . . ,v(θ

(n−1)i )].

It is important to observe that the above procedure leads toa nondecreasing sequence of log-likelihood function values,namely

Li(θ(0)1 , Θ

(0)1,i ) ≤ Li(θ

(1)1 , Θ

(0)1,i ) = Li(θ

(0)2 , Θ

(0)2,i ) ≤

Li(θ(1)2 , Θ

(0)2,i ) ≤ . . . ≤ Li(θ

(n)k , Θ

(n−1)k,i ) ≤ . . . (38)

where

Li(θ(n)k , Θ

(m)k,i ) = −L log λmaxDi(θ

(n)k , Θ

(m)k,i )

+ λmaxDi(θ(n)k , Θ

(m)k,i )+ L logL− L. (39)

The entire procedure may terminate when

∆Li(n) =

∣∣∣Li(θ(n+1)1 , Θ

(n+1)1,i )− Li(θ

(n)1 , Θ

(n)1,i )∣∣∣∣∣∣Li(θ(n+1)

1 , Θ(n+1)1,i )

∣∣∣ < ε, (40)

where ε > 0, or n ≥ Nmax where Nmax is the maximumallowable number of iterations.

Finally, as for the initialization of the procedure, given thereceived vectors, we proceed by first computing

r1 =

∣∣∣∣∣ 1LL∑l=1

z†lv(ω1)

∣∣∣∣∣2

, . . . , rS =

∣∣∣∣∣ 1LL∑l=1

z†lv(ωS)

∣∣∣∣∣2

, (41)

then, sort the above values in decreasing order, namely

rk1 ≥ rk2 ≥ . . . ≥ rkS , (42)

and select ωk1 , . . . , ωki . The behavior of the proposed architec-tures coupled with the above estimation procedure is assessedin the next section by means of numerical examples.

7

IV. ILLUSTRATIVE EXAMPLES AND DISUSSION

In this section, the performance of the proposed detectionarchitectures is investigated drawing upon synthetic data andconsidering three operating scenarios. In the first case, onlythe target of interest is present, whereas in the second sce-nario, an additional coherent signal is considered. Finally, thethird scenario contains the signal of interest along with twoadditional coherent signals. The performance metrics are• the Probability of Detection under H1,i, i ≥ 0,

(Pd,i) defined as the probability of rejecting H0 whenthe latter is false and given a preassigned Pfa =P (reject H0|H0 is true);

• the Probability of Correct Classification (Pcc), namely theprobability of deciding7 for H1,i under H1,i;

• the Root Mean Square Error (RMSE) in angle whoseexpression is√√√√E

[1

M

M∑m=1

mink=1,...,i

(θm − θk)2

], (43)

where θk, k = 1, . . . , i, are the AoA estimates of the coherentsignals when H1,i is declared. Since deriving closed-form ex-pressions for the above quantities represents a mathematicallyintractable task (at least to the best of authors’ knowledge),we estimate them resorting to the Monte Carlo countingtechniques (also replacing the statistical expectation of theRMSE with the sample mean over the Monte Carlo trials).More precisely, we exploit 103 independent trials to estimatethe considered performance metrics, whereas the detectionthresholds are set over 100/Pfa, with Pfa = 10−3.

As stated before, the analysis starts from the conventionalcase where only the target echoes impinge on the radarand proceeds with two more difficult cases that assume thepresence of two and three coherent signals (including that ofinterest), respectively. As for the operating setup, the coherentsignals share the same power as the target signal, whereasthe angular sector under surveillance ranges from −25 to 25degrees and is sampled at 1 degree. The Signal-to-Interference-plus-Noise Ratio (SINR) is defined as SINR = σ2

αv†tM

−1vt,where M = σ2

nI + CNRM c, CNR = 20 dB is the Clutter-to-Noise Ratio, σ2

n = 1 is the noise power, and M c is theclutter covariance matrix whose (i, j)th entry is defined asM c(i, j) = ρ

|i−j|c with ρc = 0.9 the one-lag correlation

coefficient. Moreover, all the numerical examples assumeN = 16, L = 32, θt = 0, and Mc = 4.

As for the angular positions of the coherent signals, webegin the analysis assuming that they belong to the search grid.In this case, the obtained curves represent an upper bound onthe performance that can be attained exploiting fine and finesearch grids (possibly considering the previously describediterative maximization procedure). Then, we investigate thebehavior of the proposed architectures when the actual po-sitions of the coherent signals are in between the points ofthe search grid. Specifically, we generate them as uniformly

7The detection threshold is set according to the preassigned Pfa also inthis case.

distributed in intervals of different sizes and centered on thenominal search grid points (a point better explained below).

Finally, we compare the proposed architectures with well-known decision schemes, namely the Generalized AdaptiveMatched Filter (GAMF) and the Generalized Adaptive Sub-space Detector (GASD) given by [41]

L∑l=1

|v†tM−1zl|2

v†tM−1vt

H1,0><H0

η and (44)

L∑l=1

|v†tM−1zl|2

v†tM−1vt∑Lm=1 z

†mM

−1zm

H1,0><H0

η, (45)

respectively.Before presenting the detection and classification results for

each of the aforementioned cases, it is important to assessthe convergence rate of the estimation procedure under eachhypothesis as well as the sensitivity of the Pfa with respectto ρc and CNR. To this end, in Figure 2, we plot the rootmean square values for ∆Li(n), i = 2, 3, 4, versus n underH0, H1,0, H1,1, and H1,2; as for H1,1 and H1,2, we setθ1 = 10 and θ2 = 18. Inspection of the figure highlightsthat a number of iterations n = 5 is enough to guaranteeε ≤ 10−3 under each hypothesis. As for the Pfa behavior,in Figure 3, we estimate it for different values of ρc givenCNR (subplot (a)) and for different values of CNR given ρc(subplot (b)) when the thresholds are computed assuming thenominal values for these parameters (namely, ρc = 0.9 andCNR = 20 dB) and Pfa = 10−3. It turns out that all theconsidered architectures can guarantee Pfa values containedwithin the interval [0.0007, 0.0011] providing a rather robustbehavior to the considered parameter variations.

In the next three figures, we investigate the detection andclassification performance when the conventional alternativehypothesis H1,0, which contemplates the presence of the signalof interest only (first scenario), is in force. Specifically, inFigure 4, we show the Pd,0 curves as functions of the SINRassuming N = 16, L = 32, K = 32, and different valuesfor ρ. This preliminary analysis allows us to quantify thesensitivity of GIC-D with respect to its tuning parameter incomparison with the other considered architectures. It turns outthat increasing ρ leads to improved detection performances forGIC-D, whose loss with respect to both the GAMF and GASD,which overcome the other architectures, ranges from about 1.9dB for ρ = 20 to about 0.5 dB for ρ = 80 at Pd,0 = 0.9. On theother hand, AIC-D and BIC-D experience a loss of about 2.2dB with respect to GAMF and GASD at Pd,0 = 0.9. In Figure5, we analyze the effects of K on the performance by doublingthe value used in Figure 4. Moreover, in order to quantify theloss due to the estimation of M we also report the curvesof the clairvoyant detectors which assume that M is known.The most evident change with respect to the previous figure isthat all the detection curves clearly move towards the left partof the plot, namely a significant improvement in performanceoccurs. In addition, GIC-D with ρ = 80, GAMF, and GASDalmost share the same performance while AIC-D and BIC-D continue to exhibit a loss of about 2 dB at Pd,0 = 0.9

8

1 2 3 4 5

n

10-10

10-5

100

H0

i=2

i=3

i=4

1 2 3 4 5

n

10-10

10-5

100

H1,0

i=2

i=3

i=4

1 2 3 4 5

n

10-10

10-5

100

H1,1

i=2

i=3

i=4

1 2 3 4 5

n

10-10

10-5

100

H1,2

i=2

i=3

i=4

Figure 2: Convergence curves under H0, H1,0, H1,1, and H1,2

assuming N = 16, L = 32, K = 32, θ1 = 10, and θ2 = 18.

0 5 10 15 20 25 30 35 40

CNR (dB)

10-4

10-3

10-2

Pfa

(b)

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

0 0.2 0.4 0.6 0.8 1

c

10-4

10-3

10-2

Pfa

(a)

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

Figure 3: Pfa versus ρc (subplot (a)) and CNR (subplot (b)) forthe GAMF, GASD, AIC-D, BIC-D, and GIC-D with differentvalues of ρ assuming N = 16, L = 32, and K = 32.

with respect to the former. The figure also highlights that theloss associated to the estimation of M is of about 3.5 dB (atPd,0 = 0.9). In the last figure of this first study case (Figure6), we analyze the classification capabilities of the proposedarchitectures through the probabilities of classification (Pc)and the Pcc estimated at two different SINR values. The figureclearly highlights the inclination of AIC-D to overestimate thehypothesis model, whereas the penalty term of BIC-D allowsto mitigate this effect even though the Pcc is less than 0.4.On the other hand, GIC-D can be suitably tuned in order

-5 0 5 10 15

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd,0

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =40)

GIC-D ( =60)GIC-D ( =80)

Figure 4: Pd,0 versus SINR for the GAMF, GASD, AIC-D,BIC-D, and GIC-D with different values of ρ assuming N =16, L = 32, and K = 32.

-5 0 5 10 15

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd,0

GAMF,K=64

GASD,K=64

AIC-D,K=64

BIC-D,K=64

GIC-D,K=64 ( =80)AIC-D,known M

BIC-D,known M

GIC-D,known M ( =80)

Figure 5: Pd,0 versus SINR for the GAMF, GASD, AIC-D,BIC-D, GIC-D with ρ = 80, AIC-D with known M , BIC-D with known M , and GIC-D with known M and ρ = 80assuming N = 16, L = 32, and K = 64.

to attain satisfactory classification performance. Specifically,when ρ = 80, GIC-D correctly classifies the environment witha probability very close to 1.

Now, we address the intermediate scenario, where besidesthe signal of interest, a coherent signal enters the antenna froman angular direction θ1. The hypothesis corresponding to thisscenario is H1,1. In Figure 7, we plot Pd,1 versus SINR forN = 16, L = 32, K = 32, and θ1 = 10; moreover, severalvalues of ρ are considered. Notice that in the presence of theadditional coherent signal, GAMF and GASD are no longerat the top of the performance ranking with the GASD notcapable of providing a Pd,1 above 0.1 due to its selectivebehavior [12], at least for the considered parameter values.On the other hand, the remaining detectors share about thesame performance with a gain of about 10 dB with respectto the GAMF; observe also that GIC-D slightly improves itsperformance as ρ grows. In the next figure, we assess thebehavior of the considered decision schemes when θ1 takes ondifferent values. Specifically, we set θ1 = 15, 20, whereasthe remaining parameters are the same as in the previous figureexcept for ρ = 80. The figure shows that the performance of

9

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dB

Pcc

Pcc

Pcc

Pcc

Figure 6: Classification probabilities for the AIC-D, BIC-D,GIC-D with ρ = 20, and GIC-D with ρ = 80 under H1,0

assuming N = 16, L = 32, and K = 32.

-15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,1

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =40)

GIC-D ( =60)GIC-D ( =80)

Figure 7: Pd,1 versus SINR for the GAMF, GASD, AIC-D,BIC-D, and GIC-D with different values of ρ assuming N =16, L = 32, K = 32, and θ1 = 10.

-15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,1

GAMF, 1 =15 °

GASD, 1 =15 °

AIC-D, 1 =15 °

BIC-D, 1 =15 °

GIC-D ( =80) , 1 =15 °

GAMF, 1 =20 °

GASD, 1 =20 °

AIC-D, 1 =20 °

BIC-D, 1 =20 °

GIC-D ( =80) , 1 =20 °

Figure 8: Pd,1 versus SINR for the GAMF, GASD, AIC-D,BIC-D, and GIC-D assuming different values of θ1, N = 16,L = 32, and K = 32.

-15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,1

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =80)AIC-D, known M

BIC-D, known M

GIC-D, known M ( =80)

AIC-D, known AoA

BIC-D, known AoA

GIC-D ( =80), known AoAAIC-D, known M and AoA

BIC-D, known M and AoAGIC-D, known M and AoA ( =80)

Figure 9: Pd,1 versus SINR for the GAMF, GASD, AIC-D,AIC-D with known parameters, AIC-D with known M only,AIC-D with known AoA only, BIC-D, BIC-D with knownparameters, BIC-D with known M only, BIC-D with knownAoA only, GIC-D with ρ = 80, GIC-D with ρ = 80 andknown parameters, GIC-D with ρ = 80 and known M only,and GIC-D with ρ = 80 and known AoA only, assumingN = 16, L = 32, K = 64, and θ1 = 10.

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dB

Pcc

Pcc

Pcc

Pcc

Figure 10: Classification probabilities for the AIC-D, BIC-D,and GIC-D with ρ = 20, 80 under H1,1 assuming N = 16,L = 32, K = 32, and θ1 = 10.

the proposed architectures exhibits a gain of about 2 dB (atPd,1 = 0.9) when the angular separation between the coherentsignals increases with the GIC-D slightly outperforming theother schemes, whereas the performance of the GAMF andGASD degrades due to the fact that the composition of thecoherent signals results in a direction that moves away fromthe nominal steering angle. In Figure 9, we account for adifferent value of K leaving unaltered the parameters N,L andalso quantify the loss due to the estimation of the AoA and/orM . As expected, increasing K improves the performance ofall detectors. Moreover, it turns out that estimating the AoA isnot as crucial as the estimation of the covariance matrix since

10

-20 -15 -10 -5 0 5 10 15

SINR (dB)

0

2

4

6

8

10

12

14

16

18

RM

SE

in

an

gle

(d

eg

)

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

Figure 11: RMSE in angle versus SINR for the AIC-D, BIC-D, and GIC-D with ρ = 20, 80 under H1,1 assuming N = 16,L = 32, K = 32, and θ1 = 10.

the loss associated with the estimation of AoA is of about 1 dBat Pd,1 = 0.9 and with respect to the architectures where allthe parameters are known, by contrast that associated with theestimation of M is approximately 3 dB. Again, GIC-D withρ = 80 slightly overcomes the other proposed schemes. In thelast two figures related to this intermediate scenario, we showthe classification and estimation performance. Specifically,Figure 10 contains the classification histograms, whereas thecurves of RMSE in angle versus the SINR are presented inFigure 11. The former figure confirms the behavior observed inFigure 6 and, hence, the superior performance of GIC-D withrespect to AIC-D and BIC-D that are inclined to overestimatethe number of coherent signals. As for the RMSE, all theproposed architectures share almost the same performance forSINR≥ −5 dB. The main differences occur for low SINRvalues where, based upon (43), the overestimation of thenumber of coherent signals for the AIC-D and BIC-D leadsto lower RMSE values than GIC-D. As a matter of fact, given(43) and for low SINR values, it is more likely to draw anestimate from the set provided by AIC-D/BIC-D that is in anarrower neighborhood of a true angular position with respectto all the estimates provided by GIC-D. As a consequence, theresulting error for AIC-D/BIC-D takes on lower values thanthe error for GIC-D.

Finally, the last scenario is the most challenging sinceit encompasses the presence of two coherent signals withnominal positions θ1 = 10 and θ2 = 18 in addition tothe signal of interest. Besides, we consider two situations thatdiffer in the actual positions of the coherent signals. In thefirst situation, they are exactly located at θ1 and θ2, whereasin the second case, the positions of the two coherent signalsare uniformly generated in the intervals [θ1 −∆θ, θ1 + ∆θ]and [θ2 − ∆θ, θ2 + ∆θ], where ∆θ ∈ 0.3, 0.5. Thedetection performance for matched signals is shown in Figure12, where we also plot the architectures that assume partial/fullknowledge of the parameter values. Moreover, we compare theresults obtained through the exhaustive search for the AoAestimation (left subplot) with those provided by the proposed

suboptimum procedure (right subplot). The figure highlightsthat the search procedures return detection curves that are veryclose to each other. In addition, the same remarks for Figure9 also hold in this case. The classification performance andthe RMSE curves for both the exhaustive and suboptimumsearch procedures are shown in Figure 13-15. Inspection ofthese figures confirms the excellent classification capabilitiesof GIC-D, whereas AIC-D and BIC-D can provide better AoAestimates than GIC-D for low SINR values (≤ −10 dB). Inaddition, it is important to underline that there does not exista valuable difference in performance between the exhaustivesearch and the suboptimum search algorithm. Finally, the lastfour figures assess the behavior of the considered architectures(coupled with the suboptimum search procedure) when theAoAs of the coherent signals are uniformly generated at eachMonte Carlo trial in an interval of length 2∆θ and centeredaround the nominal positions. Figures 16 and 17 assume∆θ = 0.3, whereas in Figures 18 and 19, we set ∆θ = 0.5.These numerical examples highlight that, from the detectionpoint of view, the mismatch between the search grid pointsand the actual positions of the coherent signals leads to aslight performance deterioration, that is more noticeable for∆θ = 0.5, while leaving the previously observed hierarchyunaltered. Note that we do not assume any mismatch related tothe signal of interest since it requires a different performanceanalysis that accounts for the mismatch degree and is outof the scope of the present work. As for the classificationperformance, AIC-D and BIC-D continue to exhibit a clearinclination to overestimate the number of signals, while GIC-D with ρ = 20 returns a probability of correct classificationlower than that for matched signals. Finally, the classificationperformance of GIC-D with ρ = 80 is not degraded by thecoherent signal mismatches.

Summarizing, the above analysis has singled out GIC-Dwith ρ = 80 as the recommended detection architecturecapable of providing a satisfactory detection and classificationperformance in the presence of coherent signals at least forthe considered scenarios.

V. CONCLUSIONS

In this paper, we focused on the adaptive radar detection inthe presence of fully correlated signals besides that of interest.Such additional signals may be due to multipath propagationeffects or to the action of malicious platforms (smart jammers).In order to account for different operating scenarios, at the de-sign stage, we have considered a multiple-hypothesis test thatalso includes the classical radar signal-plus-interference hy-pothesis and devised likelihood-ratio-based decision schemeswhose statistics under a specific hypothesis depend on a suit-able penalty factor tuned according to the number of unknownparameters under that hypothesis (leveraging the approach ofthe MOS rules). As a result, such architectures are providedwith classification capabilities returning, as a byproduct, anestimate of the number of coherent signals impinging on theradar system. The performance analysis has been carried outresorting to simulated data considering three different scenar-ios with an increasing number of coherent signals. Moreover,

11

-20 -15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd,2

Exhaustive Grid Search

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)

GIC-D ( =80)AIC-D known M

BIC-D known MGIC-D known M ( =20)

GIC-D known M ( =80)AIC-D known AoAs

BIC-D known AoAs

GIC-D known AoAs ( =20)

GIC-D known AoAs ( =80)AIC-D known M and AoAs

BIC-D known M and AoAsGIC-D known M and AoAs ( =20)

GIC-D known M and AoAs ( =80)

-20 -15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd,2

Suboptimal Search

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)

GIC-D ( =80)AIC-D known M

BIC-D known MGIC-D known M ( =20)

GIC-D known M ( =80)AIC-D known AoAs

BIC-D known AoAs

GIC-D known AoAs ( =20)

GIC-D known AoAs ( =80),AIC-D known M and AoAs

BIC-D known M and AoAsGIC-D known M and AoAs ( =20)

GIC-D known M and AoAs ( =80)

Figure 12: Pd,2 versus SINR for the GAMF, GASD, AIC-D,AIC-D with known parameters, AIC-D with known M only,AIC-D with known AoA only, BIC-D, BIC-D with knownparameters, BIC-D with known M only, BIC-D with knownAoA only, GIC-D with ρ = 20, 80, GIC-D with ρ = 20, 80and known parameters, GIC-D with ρ = 20, 80 and knownM only, and GIC-D with ρ = 20, 80 and known AoA only,exhaustive grid search (left subplot) and suboptimum search(right subplot) assuming N = 16, L = 32, K = 32, θ1 = 10,and θ2 = 18.

for comparison purposes, the curves for the GAMF and GASDhave been also reported. The analysis has singled out the GIC-D with ρ = 80 as the recommended detection architecturesince it overcomes the remaining proposed decision schemesin terms of both detection and classification performance.

Future research tracks may include the design of (possiblyspace-time) processing architectures that account for coherentsignals spread along the range dimension or aimed at operat-ing in scenarios where multiple coherent and/or uncorrelatedsignals are present.

REFERENCES

[1] M. A. Richards, J. A. Scheer, and W. A. Holm, Principles of ModernRadar: Basic Principles. Raleigh, NC: Scitech Publishing, 2010.

[2] W. L. Melvin and J. A. Scheer, Principles of Modern Radar: AdvancedTechniques, S. Publishing, Ed., Edison, NJ, 2013.

[3] M. A. Richards, W. L. Melvin, J. A. Scheer, and W. A. Holm, Principlesof Modern Radar: Radar Applications, Volume 3, ser. Electromagneticsand Radar. Institution of Engineering and Technology, 2013.

[4] E. J. Kelly, “An adaptive detection algorithm,” IEEE Transactions onAerospace and Electronic Systems, vol. 22, no. 2, pp. 115–127, 1986.

[5] E. J. Kelly and K. Forsythe, “Adaptive Detection and Parameter Estima-tion for Multidimensional Signal Models,” Lincoln Lab, MIT, Lexington,US, Technical Report 848, 1989.

[6] W. L. Melvin, “Space-time Adaptive Radar Performance in Heteroge-neous Clutter,” IEEE Transactions on Aerospace and Electronic Systems,vol. 36, no. 2, pp. 621–633, 2000.

[7] F. C. Robey, D. R. Fuhrmann, E. J. Kelly, and R. Nitzberg, “A CFARadaptive matched filter detector,” IEEE Transactions on Aerospace andElectronic Systems, vol. 28, no. 1, pp. 208–216, 1992.

[8] F. Gini and A. Farina, “Vector Subspace Detection in Compound-Gaussian Clutter Part I: Survey and New Results,” IEEE Transactionson Aerospace and Electronic Systems, vol. 38, no. 4, pp. 1295–1311,2002.

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dBP

ccPcc

Pcc

Pcc

Exhaustive Grid Search

Figure 13: Classification probabilities for the AIC-D, BIC-D,and GIC-D with ρ = 20, 80 under H1,2 assuming N = 16,L = 32, K = 32, θ1 = 10, θ2 = 18, and the exhaustivegrid search.

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dBPcc

Suboptimum Search

Pcc

Pcc

Pcc

Figure 14: Classification probabilities for the AIC-D, BIC-D,and GIC-D with ρ = 20, 80 under H1,2 assuming N = 16,L = 32, K = 32, θ1 = 10, θ2 = 18, and the suboptimumsearch.

[9] D. Orlando and G. Ricci, “A Rao Test With Enhanced SelectivityProperties in Homogeneous Scenarios,” IEEE Transactions on SignalProcessing, vol. 58, no. 10, pp. 5385–5390, 2010.

[10] W. Liu, W. Xie, and Y. Wang, “Rao and Wald Tests for Distributed Tar-gets Detection With Unknown Signal Steering,” IEEE Signal ProcessingLetters, vol. 20, no. 11, pp. 1086–1089, 2013.

[11] Y. I. Abramovich and B. A. Johnson, “GLRT-based detection-estimationfor undersampled training conditions,” IEEE Transactions on SignalProcessing, vol. 56, no. 8, pp. 3600–3612, 2008.

[12] F. Bandiera, D. Orlando, and G. Ricci, Advanced Radar DetectionSchemes Under Mismatched Signal Models. San Rafael, US: SynthesisLectures on Signal Processing No. 8, Morgan & Claypool Publishers,2009.

[13] W. Liu, W. Xie, J. Liu, and Y. Wang, “Adaptive Double SubspaceSignal Detection in Gaussian Background—Part I: Homogeneous En-vironments,” IEEE Transactions on Signal Processing, vol. 62, no. 9,pp. 2345–2357, 2014.

[14] W. Liu, J. Liu, Y. Gao, G. Wang, and Y. L. Wang, “Multichannel signaldetection in interference and noise when signal mismatch happens,”

12

-20 -10 0 10

SINR (dB)

0

2

4

6

8

10

12

14

16

RM

SE

in a

ngle

(deg)

Exhaustive Grid Search

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

-20 -10 0 10

SINR (dB)

0

2

4

6

8

10

12

14

16

RM

SE

in a

ngle

(deg)

Suboptimal Search

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

Figure 15: RMSE in angle versus SINR for the AIC-D, BIC-D, and GIC-D with ρ = 20, 80 under H1,2 assuming N = 16,L = 32, K = 32, θ1 = 10, θ2 = 18, exhaustive search grid(left subplot), and suboptimum search (right subplot).

-15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,1

GAMFGASDAIC-DBIC-DGIC-D ( =20)GIC-D ( =80)

-15 -10 -5 0 5

SINR (dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,2

GAMF

GASD

AIC-D

BIC-D

GIC-D ( =20)GIC-D ( =80)

Figure 16: Pd,1 versus SINR (left subplot) and Pd,2 versusSINR (right subplot) for the GAMF, GASD, AIC-D, BIC-D,and GIC-D with ρ = 20, 80 when the actual AoAs of thecoherent signals are uniformly generated in between θi−0.3

and θi + 0.3, i = 1, 2, assuming N = 16, L = 32, K = 32,θ1 = 10, θ2 = 18, and the suboptimum search.

Signal Processing, vol. 166, p. 107268, 2020.[15] J. Liu, S. Sun, and W. Liu, “One-step persymmetric GLRT for subspace

signals,” IEEE Transaction on Signal Processing, vol. 14, no. 67, pp.3639–3648, July 15 2019.

[16] C. Hao, S. Gazor, G. Foglia, B. Liu, and C. Hou, “Persymmetric adaptivedetection and range estimation of a small target,” IEEE Transactions onAerospace and Electronic Systems, vol. 51, no. 4, pp. 2590–2604, 2015.

[17] G. Foglia, C. Hao, A. Farina, G. Giunta, D. Orlando, and C. Hou,“Adaptive Detection of Point-Like Targets in Partially HomogeneousClutter With Symmetric Spectrum,” IEEE Transactions on Aerospaceand Electronic Systems, vol. 53, no. 4, pp. 2110–2119, 2017.

[18] C. Hao, D. Orlando, G. Foglia, and G. Giunta, “Knowledge-BasedAdaptive Detection: Joint Exploitation of Clutter and System SymmetryProperties,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1489–1493, October 2016.

[19] G. Foglia, C. Hao, G. Giunta, and D. Orlando, “Knowledge-aidedadaptive detection in partially homogeneous clutter: Joint exploitationof persymmetry and symmetric spectrum,” Digital Signal Processing,

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dB

Pcc

Pcc

Pcc

Pcc

Figure 17: Classification probabilities for AIC-D, BIC-D, GIC-D with ρ = 20, 80 under H1,2 when the actual AoAs of thecoherent signals are uniformly generated in between θi−0.3

and θi + 0.3, i = 1, 2, assuming N = 16, L = 32, K = 32,θ1 = 10, θ2 = 18, and the suboptimum search.

-15 -10 -5 0 5

SINR(dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,1

GAMF

GASD

AIC-D

BIC-D

GIC-D( =20)

GIC-D( =80)

-15 -10 -5 0 5

SINR(dB)

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Pd

,2

GAMF

GASD

AIC-D

BIC-D

GIC-D( =20)

GIC-D( =80)

Figure 18: Pd,1 versus SINR (left subplot) and Pd,2 versusSINR (right subplot) for the GAMF, GASD, AIC-D, BIC-D,and GIC-D with ρ = 20, 80 when the actual AoAs of thecoherent signals are uniformly generated in between θi−0.5

and θi + 0.5, i = 1, 2, assuming N = 16, L = 32, K = 32,θ1 = 10, θ2 = 18, and the suboptimum search.

vol. 67, no. Supplement C, pp. 131 – 138, 2017.[20] P. Wang, Z. Sahinoglu, M. Pun, and H. Li, “Persymmetric Parametric

Adaptive Matched Filter for Multichannel Adaptive Signal Detection,”IEEE Transactions on Signal Processing, vol. 60, no. 6, pp. 3322–3328,2012.

[21] D. K. Barton, Radar Equations for Modern Radar, ser. Artech Houseradar library. Artech House, 2013.

[22] D. J. Bachmann, R. J. Evans, and B. Moran, “Game Theoretic Analysisof Adaptive Radar Jamming,” IEEE Transactions on Aerospace andElectronic Systems, vol. 47, no. 2, pp. 1081–1100, 2011.

[23] H. Gao, J. Wang, C. Jiang, and X. Zhang, “Equilibrium between astatistical MIMO radar and a jammer,” in 2015 IEEE Radar Conference(RadarCon), 2015, pp. 0461–0466.

[24] D. C. Schleher, Electronic Warfare in the Information Age, ser. Artech

13

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

AIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

BIC-D

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =20)

SINR=10dB

SINR=20dB

H1,0

H1,1

H1,2

H1,3

H1,4

0

0.2

0.4

0.6

0.8

1

Pc

GIC-D ( =80)

SINR=10dB

SINR=20dB

Pcc

Pcc

Pcc

Pcc

Figure 19: Classification probabilities for AIC-D, BIC-D, GIC-D with ρ = 20, 80 under H1,2 when the actual AoAs of thecoherent signals are uniformly generated in between θi−0.5

and θi + 0.5, i = 1, 2, assuming N = 16, L = 32, K = 32,θ1 = 10, θ2 = 18, and the suboptimum search.

House radar library. Artech House, 1999.[25] F. Neri, Introduction to Electronic Defense Systems. Norwood, MA:

Artech House, 2018.[26] N. Yuen and B. Friedlander, “DOA estimation in multipath: an approach

using fourth-order cumulants,” IEEE Transactions on Signal Processing,vol. 45, no. 5, pp. 1253–1263, 1997.

[27] A. J. Weiss and B. Friedlander, “Performance analysis of spatial smooth-ing with interpolated arrays,” IEEE Transactions on Signal Processing,vol. 41, no. 5, pp. 1881–1892, 1993.

[28] Tie-Jun Shan and T. Kailath, “Adaptive beamforming for coherentsignals and interference,” IEEE Transactions on Acoustics, Speech, andSignal Processing, vol. 33, no. 3, pp. 527–536, 1985.

[38] L. Yan, P. Addabbo, C. Hao, D. Orlando, and A. Farina, “New ECCMTechniques Against Noiselike and/or Coherent Interferers,” IEEE Trans-actions on Aerospace and Electronic Systems, vol. 56, no. 2, pp. 1172–1188, 2020.

[29] H. L. Van Trees, Optimum Array Processing (Detection, Estimation, andModulation Theory, Part IV). John Wiley & Sons, 2002.

[30] Tie-Jun Shan, M. Wax, and T. Kailath, “On spatial smoothing fordirection-of-arrival estimation of coherent signals,” IEEE Transactionson Acoustics, Speech, and Signal Processing, vol. 33, no. 4, pp. 806–811, 1985.

[31] P. Stoica and R. Moses, Spectral Analysis of Signals. Pearson PrenticeHall, 2005.

[32] F. Ansari, M. Taban, and S. Gazor, “A novel sequential algorithm forclutter and direct signal cancellation in passive bistatic radars,” EURASIPJournal on Advances in Signal Processing, no. 134, 2016.

[33] B. Feng, T. Wang, C. Liu, C. Chen, and W. Chen, “An effective CLEANalgorithm for interference cancellation and weak target detection in pas-sive radar,” in Conference Proceedings of 2013 Asia-Pacific Conferenceon Synthetic Aperture Radar (APSAR), 2013, pp. 160–163.

[34] K. Kulpa, “The CLEAN type algorithms for radar signal processing,”in 2008 Microwaves, Radar and Remote Sensing Symposium, 2008, pp.152–157.

[35] M. Viberg, B. Ottersten, and T. Kailath, “Detection and estimation insensor arrays using weighted subspace fitting,” IEEE Transactions onSignal Processing, vol. 39, no. 11, pp. 2436–2449, 1991.

[36] I. Ziskind and M. Wax, “Maximum likelihood localization of multiplesources by alternating projection,” IEEE Transactions on Acoustics,Speech, and Signal Processing, vol. 36, no. 10, pp. 1553–1560, 1988.

[37] X. Tan, W. Roberts, J. Li, and P. Stoica, “Sparse Learning via IterativeMinimization With Application to MIMO Radar Imaging,” IEEE Trans-actions on Signal Processing, vol. 59, no. 3, pp. 1088–1101, March2011.

[39] P. Stoica and Y. Selen, “Model-order selection: A review of informationcriterion rules,” IEEE Signal Processing Magazine, vol. 21, no. 4, pp.36–47, 2004.

[40] P. Stoica and P. Babu, “On the Proper Forms of BIC for Model OrderSelection,” IEEE Transactions on Signal Processing, vol. 60, no. 9, pp.4956–4961, September 2012.

[41] E. Conte, A. De Maio, and G. Ricci, “GLRT-based adaptive detectionalgorithms for range-spread targets,” IEEE Transactions on SignalProcessing, vol. 49, no. 7, pp. 1336–1348, July 2001.

[42] P. Addabbo, D. Orlando, and G. Ricci, “Adaptive Radar Detection ofDim Moving Targets in Presence of Range Migration,” IEEE SignalProcessing Letters, vol. 26, no. 10, pp. 1461–1465, Oct 2019.

[43] R. A. Horn and C. R. Johnson, Matrix Analysis, C. U. Press, Ed., 1985.[44] P. Stoica and Y. Selen, “Cyclic minimizers, majorization techniques,

and the expectation-maximization algorithm: a refresher,” IEEE SignalProcessing Magazine, vol. 21, no. 1, pp. 112–114, 2004.