OPTIMAL radar detection in clutter requires appropriate

Size: px
Start display at page:

Download "OPTIMAL radar detection in clutter requires appropriate"

Transcription

1 An Efficient CFAR Algorithm for Piecewise Homogeneous Environments. Jeong Hun Kim and Mark R. Bell School of Electrical and Computer Engineering, Purdue University Abstract A new constant false alarm rate (CFAR) detection algorithm operating in non-homogeneous clutter is proposed in this paper. The proposed CFAR algorithm, CUT-inclusive (CI) CFAR, utilizes a goodness-of-fit test for determining and combining homogeneous windows, resulting in a higher detection performance. The CI-CFAR algorithm layout and analytical properties for the ideal case are investigated. In comparison to the traditional Cell-averaging (CA) CFAR and Order-statistic (OS) CFAR, it is demonstrated that CI-CFAR outperforms both in most situations. Also, the relationship between efficient sorting and homogeneity is investigated. Index Terms Anderson-Darling Test, CFAR, Order statistic (OS), CI-CFAR I. INTRODUCTION OPTIMAL radar detection in clutter requires appropriate selection of the detector threshold. One common approach to threshold selection in clutter environments with unknown or changing statistics is to estimate the clutter statistics from resolution cells surrounding the resolution cell under test. The implicit assumptions in this approach are that the resolution cells used to estimate the clutter statistics are target free and the clutter returns from these cells are statistically representative of the clutter statistics of the cell under test. When either of these two assumptions is violated, the threshold computed using this approach may result in a significant degradation of detector performance, either in the form of a higher probability of false alarm or a lower probability of target detection. In radar detection problems, detection thresholds are usually selected to maximize the probability of target detection while holding the false alarm constant. So the standard approach to adaptive threshold selection is to estimate a threshold value based on the radar returns from resolution cells surrounding the cell under test that will yield a constant probability of false alarm. The algorithms used to compute these adaptive thresholds are called Constant False Alarm Rate (CFAR) algorithms. In implementing CFAR algorithms, a decision must be made as to how large a collection of reference cells should be used to estimate the detection threshold. This region is called the reference window. If the clutter statistics are homogeneous across all resolution cells in a neighborhood surrounding the cell under test, then using a larger reference window will result in more accurate estimates of the clutter statistics and a corresponding improvement in detector performance. However, if there is significant spatial variation and hence nonhomogeneous statistical behavior in the neighborhood surrounding the cell under test, selecting too large a reference window will result in inaccurate estimates of the clutter statistics and the corresponding detection threshold will not be well matched to the cell under test. For this reason, selection of the reference window size and region is an important consideration in designing CFAR detectors. Furthermore, because a particular radar scene may include large homogeneous regions as well as regions with significant inhomogeneity, it may not be the case that one reference window size is appropriate across the whole radar scene. For this reason, approaches to the adaptive selection of reference windows are of interest. Multiresolution techniques provide one possible approach to measuring the variation in clutter statistics on different spatial scales, and this information can be used to adaptively select reference windows. In real radar scenes, another issue we must consider is that as the size of the reference window increases, the likelihood that one or more of the reference cells contains a target also increases. Since the presence of interfering targets tends to increase the average radar return from the resolution cells containing these targets, order statistic based techniques can provide robust threshold selection having significant immunity to a small number of interfering targets in the reference window. In this paper, we develop a CFAR algorithm that combines multiresolution and order statistic techniques (in the form of empirical distribution functions) for adaptive reference window selection. One particular benefit of the technique is computational efficiency because the cell under test does not have to be accounted for in setting up the reference window because of the robustness of the order statistic techniques used. For this reason, we call this algorithm Cell-under-test Inclusive CFAR (CI-CFAR.) A. Idea behind CI-CFAR II. CUT-INCLUSIVE(CI) CFAR The main concept of CI-CFAR is to find and group homogeneous regions in a radar scene. One commonly used method for finding and grouping homogeneous samples is image segmentation. However, most detection system require very quick response time from receiving data to declaring whether or not a target was detected and image segmentation methods are generally a very computationally intense process. Hence, using image segmentation in a detection system is not practical. We must find another method that will yield reasonable performance while being computationally efficient.

2 2 One such method is the Empirical Distribution Function (EDF) goodness-of-fit test. The CI-CFAR method in this paper has the following characteristics that distinguish it from other traditional CFAR algorithms: ) The concept of a moving/sliding window is not used. 2) Homogeneous regions are combined into larger reference windows using EDF goodness-of-fit tests. 3) A separate threshold is not calculated for each CUT, but rather a single threshold is calculated for each homogeneous region. B. Statistical Test for Merging (Anderson-Darling test) Goodness-of-Fit tests are a class of hypotheses tests that determine whether a pool of random samples came from a single distribution or not. The χ 2 test is a classic example of such a test. However, it was shown in [2] that goodness-offit tests based on empirical distribution functions (EDF) are generally more powerful. The most well known goodness-offit test based on EDF statistics is probably the Kolmogorov- Smirnov (K-S) test. There are numerous papers out that describe the performance of the K-S test. In [3], Stephens observed that the Anderson-Darling (A-D) test is generally more powerful than the K-S test for testing departures from the true distribution in the tail, particularly when there are many statistical outliers in the sample. This is similar to a typical radar detection problem, therefore the A-D test seems to be an appropriate test to use for CI-CFAR. We have in fact compared the K-S and A-D test in this work and found the A-D test to be superior. Implementation of the A-D goodness-of-fit test is rigorously explained in ([, p ], [4]) and will not be repeated here. C. Description of CI-CFAR Algorithm The CI-CFAR algorithm can be described as follows : ) Given a clutter map, use the Anderson-Darling test to see if whether or not the adjacent q-by-q windows (in one direction only, whether horizontal or vertical) come from the same distribution (i.e. are homogeneous). If they are homogeneous, then combine them into a single window. Repeat for all window pairs. This assumes that each of the q 2 samples in the q-by-q windows are homogeneous. 2) Only for those windows that were determined to be homogeneous and combined into a single window in the previous step, check if the adjacent windows are again homogeneous or not. If they are, merge into a single window. Repeat for all window pairs. 3) Repeat step 2 until no more windows are merged or until a pre-determined number of windows are merged. 4) Including the CUT, use the sorted data (data is already sorted in the previous steps) to find the k-th OS for the entire window. Thus, a single threshold will be used for comparison in deciding whether an outlier is present or not. 5) If the CUT exceeds the assigned threshold for the entire window, declare that a target is present. Otherwise, decide that there is no target. Note, that the single threshold to be used by CI-CFAR is equal to the multiplication of the k-th OS and scalar multiplicative factor γ. Although the use of a single threshold may slightly degrade performance, it will speed up the detection computation because there won t be a need to calculate the threshold over and over for each CUT as in conventional CFAR methods. III. PERFORMANCE ANALYSIS OF CI-CFAR A. Calculating Probability of False Alarm (P fa ) for CI-CFAR For calculating the size of our test, we will first assume that we will be only interested in γ >, which corresponds to the range where P fa is small. (γ : scalar multiplicative factor.) Also, we will assume that the algorithm will be operating in a clutter environment that has exponentially distributed power, which is generally accepted when there are a large number of random scatterers. This also offers ease of comparison with other CFAR algorithms since many CFAR algorithms are usually tested in exponentially powered clutter. Also, the following equality will be used several times in the proof, b b ia (Q ci) ta c a b ( ) b t (t a)! (b t)! (Q ct) for a, b Z and Q, c R. A special form of the above equality will be more useful, b b i0 (Q i) t0 () ( ) b t t! (b t)! (Q t), (2) which can be shown trivially from the original form. For the case of low P fa, we make the following assumptions : ) Threshold multiplicative factor γ is greater than (γ > ) which corresponds to low P fa. 2) The number k in the k-th OS for calculating the threshold is fixed. 3) The number of samples is N and the samples are IID with distribution of Exp(). 4) The CUT is also included in the pool of N samples. 5) Hypothesis H 0 is in effect, i.e. no target present, where, ) Z i, i, 2,..., N : OS of the N samples in increasing order. 2) Z k : k-th OS for calculating the threshold. 3) Z m : m-th OS which is also the CUT with no target. 4) S : Sample space of all possible outcomes. We compute the probability of false alarm as follows : P fa P H0 [H declared] P H0 [Z m γz k ]. Since the sample space can be partitioned as we have S [m < k] [m k] [m > k], P fa P H0 [(Z m γz k ) S] P H0 [(Z m γz k ) (m < k)] + P H0 [(Z m γz k ) (m k)] + P H0 [(Z m γz k ) (m > k)].

3 3 Since γ >, it is obvious that P H0 [(Z m γz k ) (m k)] 0. Thus, P fa P H0 [(Z m γz k ) (m > k)] P H0 [(Z m γz k ) ((m k + ) (m N))] P H0 [(Z m γz k ) (m k + )] + + P H0 [(Z m γz k ) (m N)] P H0 [Z k+ γz k ] + + P H0 [Z N γz k ] N P H0 [Z m γz k ]. mk+ Our problem now is to find P H0 [Z m γz k ] where m k +, k + 2,..., N. For this, it is necessary to find the joint pdf of Z m and Z k. (m > k) Noting that the CUT Z m is fixed at the m-th position, we actually only have N samples to choose from, thus the joint pdf for Z m and Z k, f km (x, y) is, ( )( )( )( )( ) N N k N k N m f km (x, y) k m k N m F k (x)f(x)[f (y) F (x)] m k f(y)[ F (y)] N m where F (x) ( e x ) [0, ] (x), f(x) e x [0, ] (x). Thus we have (N )! f km (x, y) (k )! (m k )! (N m)! ( e x ) k e x [e x e y ] m k e (N m+)y. By using the Binomial theorem to expand the powers and some simple calculus steps, we have P H0 [Z m γz k ] m k s0 k t0 Therefore, N P fa mk+ N mk+ x0 yγx f km (x, y)dydx (N )!( ) m s t (N m)! s! (m k s)! t! (k t)! (N k s)(k + s t + γ(n k s)). P H0 [Z m γz k ] m k s0 k t0 (N )!( ) m s t (N m)! s! (m k s)! t! (k t)! (N k s)(k + s t + γ(n k s)) k i0 N i N i + γ. (3) where γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). The last equality can be proven by using (). Similarly, for the case of high P fa or equivalently, when Fig.. CI-CFAR P fa Verification for N9 (a) Low P fa, i.e. γ > (b) High P fa, i.e. 0 γ < 0 γ <, it can be shown that, P fa k 2 i0 N i N i + γ. (4) where γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). Fig. demonstrates that the theoretic P fa matches the simulation results. Note the jump in Fig.. This happens at the P fa corresponding to γ and is due to the fact that the CUT is included in deciding the threshold. B. Calculating Probability of Detection ( P d ) for CI-CFAR Calculating P d of CI-CFAR for the ideal case (i.e. target embedded in homogeneous clutter) is very similar to that of finding P fa. As it turns out, there isn t a closed form expression for P d, but it can be simplified to a form where numerical evaluations are simple. For calculating P d, we make the following assumptions : ) Threshold multiplicative factor γ is greater than (γ > ) which corresponds to low P fa. 2) The number k in the k-th OS for calculating the threshold is fixed.

4 4 3) sample (CUT) is distributed with Exp(u) while N samples are Exp(). All samples are independent of each other. There are total of N samples. 4) The CUT is also included in the pool of N samples. 5) Hypothesis H is in effect, i.e. a target is present, where, ) Z i, i, 2,..., N : OS of the N samples in increasing order. 2) Z k : k-th OS for calculating the threshold. 3) Z m : m-th OS which is also the CUT with a target. (Exp(u)) 4) S : Sample space of all possible outcomes. We compute the probability of detection as follows : P d P H [H declared] P H [Z m γz k ] P H [(Z m γz k ) S] P H [(Z m γz k ) (m < k)] + P H [(Z m γz k ) (m k)] + P H [(Z m γz k ) (m > k)]. Since γ >, it is obvious that Thus, P H [(Z m γz k ) (m k)] 0. P d P H [(Z m γz k ) (m > k)] N P H [Z m γz k ]. mk+ Our problem now is to find P H [Z m γz k ] where m k +, k + 2,..., N. For this, it is necessary to find the joint pdf of Z m and Z k when H is in effect. (m > k) Noting that the CUT Z m is fixed at the m-th position with distribution Exp(u), we actually only have N samples of distribution Exp() to choose from, thus the joint pdf for Z m and Z k, f km (x, y) is, ( )( )( )( )( ) N N k N k N m f km (x, y) k m k N m F k (x)f(x)[f (y) F (x)] m k g(y)[ F (y)] N m where F (x) e x [0, ] (x), f(x) e x [0, ] (x) and g(x) u e x u [0, ] (x). Thus we have f km (x, y) (N )! u(k )! (m k )! (N m)! ( e x ) k e x [e x e y ] m k e (N m+ u )y. By using the Binomial theorem to expand the powers and some simple calculus steps, we have P H [Z m γz k ] m k s0 k t0 x0 yγx f km (x, y)dydx (N )! ( ) m s t u(n m)! s! (m k s)! t! (k t)! (N k s + u )(k + s t + γ(n k s + u )). Therefore, N P d mk+ N mk+ P H [Z m γz k ] m k s0 k t0 (N )! ( ) m s t u(n m)! s! (m k s)! t! (k t)! (N k s + u ) (k + s t + γ(n k s + u )). where u is the target mean, γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). Fig. 2. CI-CFAR P d Verification for (a) N 9, k 7, u 5 (b) N, k 8, u 3 Fig. 2 demonstrates that the analytic expression for P d is consistent with the simulation results. C. Presentation and interpretation of results Fig. 3 through Fig. 3 are simulation results from a 2-by- 2 exponential (mean of ) clutter map of 44 samples. For our purposes of simulating CI-CFAR, q 3, i.e. the clutter map was pre-divided into 3-by-3 windows where each of the windows are assumed to be homogeneous. Also, in step 3 of the CI-CFAR algorithm, the algorithm was terminated if 4 3-

5 5 A Description Target in homogeneous clutter. Layout B Target is adjacent to an outlier. Target in homogeneous clutter. C Target is adjacent to a window of mean 3. Windows NOT in the direction of A-D test. D Target is adjacent to a window of mean 0. E Windows NOT in the direction of A-D test. Target is in the center of the window. Target is adjacent to a window of mean 0. Windows in the direction of A-D test. F Target is adjacent to a window of mean 0. Windows are in the direction of A-D test. G 6 samples in Target s window has mean 0. Target is not in these 6 samples. H 6 samples in Target s window has mean 3. Target is not in these 6 samples. I 6 samples in Target s window has mean 0. Target is in one of these 6 samples. TABLE I DESCRIPTION OF NON-HOMOGENEOUS CLUTTER SCENARIO Fig. 3. ROC for target, homogeneous clutter. Scenario A Fig. 4. Comparison of CI-CFAR with OS-CFAR and CA-CFAR of window size 3-by-3, 5-by-5 and 7-by-7 by-3 windows were merged by the A-D test. A target of mean, 2, 3, 5, 7, 9 was used and P fa is ranged from 0 6 to 0 4. As explained before, it is assumed that the samples in each 3-by-3 window are homogeneous. Thus there are 6 homogeneous windows with each window having 9 samples. This assumption is needed in this type of CI-CFAR for the following reason. In using the A-D test, we are ultimately determining if a given number of samples are indeed homogeneous through EDF goodness-of-fit tests. It turns out that in most cases, the A-D test will usually determine that 2 samples are indeed homogeneous regardless of their underlying distribution. Another way of saying it is that if sample is added to a pool of 9 samples, then the A-D test will usually determine that the whole pool of 0 samples is homogeneous, even if the added single sample is a huge outlier. Thus, it is somewhat impractical to just start with 2 samples and keep adding single samples to the A-D test because the results will usually hold significant error. That is why the 9 samples in a single window are assumed to be homogeneous. The proposed CI-CFAR algorithm was also tested in a field of clutter where the 9 samples in a single window are NOT homogeneous to see how the performance would be affected in those situations. Fig. 3 corresponds to Scenario A in Table I and represents the case where all of the background clutter is homogeneous, having mean of and only a single target is in the entire clutter map. For this ideal situation, we would expect CA- CFAR to perform best but, as the results show, CI-CFAR has the best performance, CA-CFAR next and OS-CFAR last. The CA-CFAR and OS-CFAR behavior can be explained from the fact that CA-CFAR is optimal in homogeneous clutter but it is at first look somewhat surprising that CI-CFAR performs better than CA-CFAR in this ideal clutter map. This is due to the fact that since the background clutter is homogeneous, the CI-CFAR algorithm will combine 4 windows in most cases, thus instead of having 9 samples to detect targets, it will have 36 samples. Since CA-CFAR and OS-CFAR have a fixed window of 9 samples, it is highly likely that CI-CFAR with 36 samples will have better detection performance. Then it is a good question to ask, what window sizes are required by OS-CFAR and/or CA-CFAR to achieve similar performance to CI-CFAR in homogeneous clutter? Fig. 4 gives the answer to this question. The figure shows the case for a target of mean 3 for illustrative purposes. The results were nearly identical regardless of target mean. While the CI-CFAR algorithm was kept the same as before, the OS-CFAR and CA-CFAR were tested with window sizes of 3-by-3, 5-by-5 and 7-by-7. For the same algorithm, higher performance was achieved for larger window size as expected. It is shown that for 3-by-3 windows, CA-CFAR and OS-CFAR are both inferior to CI- CFAR. However, if the window size is increased to 5-by- 5, OS-CFAR shows almost equivalent performance whereas

6 6 CA-CFAR outperforms CI-CFAR entirely. If the window size is increased to 7-by-7 for OS-CFAR and CA-CFAR, they both outperform CI-CFAR. Thus it can be concluded that given an equal number of samples, OS-CFAR and CA-CFAR both have better performance than CI-CFAR if the clutter is homogeneous. Fig. 5. ROC for 2 adjacent target, homogeneous clutter. Scenario B Fig. 5 is the result of Scenario B, which is identical to Scenario A with the exception of an additional target right next to the previous one. The targets were also placed in the same 3-by-3 window and have the same mean. This demonstrates the case where target may mask the other. In this case, it is known that CA-CFAR will be inferior compared to OS-CFAR as is shown in Fig. 5. Note that for low target mean, CA-CFAR is superior to OS-CFAR because since the target mean is low, it will be virtually the same as having homogeneous clutter around the CUT, thus CA-CFAR will have better performance. As the target mean increases, the clutter of windows will become less homogeneous and thus OS-CFAR will behave better than CA-CFAR. (This is shown in Fig. 5) Even in the 2 target case, CI-CFAR is superior to the other two algorithms because the A-D test will still merge the nearby windows for detection even if there are 2 outliers in one of the windows. Thus, in most cases CI-CFAR will run the detection test with 8 or 36 samples, rather than 9, yielding a better detection even in the case of 2 outliers. Fig. 6. ROC for target, non-homogeneous clutter scenario C Fig. 6 through Fig. 2 are simulation results for the nonhomogeneous clutter scenarios. Fig. 6, Scenario C, is the case where there is a single target in the edge of one of the windows and the window next to the target (which will be adjacent to the target s window) has a different mean of 3, whereas all the other windows have mean. It is also set so that the non-homogeneous windows will not be compared with the target s window by the A-D test for homogeneity. Now, although the entire window has a different mean of 3, the mean is not large enough so that the A-D test will mostly accept that the windows are homogeneous. (It was actually accepted to be homogeneous 53.5% of the time.) Because this non-homogeneous window is accepted half the time as homogeneous by the A-D test, this results in a higher false alarm rate than the intended setting used for calculating the threshold. (This is clearly shown in the log-log plot of Fig. 6) Regardless of this matter, since the non-homogeneous window cannot be merged with the target s window (because it is not in the same direction.) the performance of CI-CFAR is expected to have minimal impact in compared to Fig. 3. This is certainly the case as shown in Fig. 6 and CI-CFAR is again superior to the other algorithms. Fig. 7. ROC for target, non-homogeneous clutter scenario D Scenario D in Fig. 7 is identical to Scenario C except that the non-homogeneous window is set to a higher mean of 0. As can be seen in Fig. 7, the performance of CA- CFAR is drastically reduced due to the high increase of the mean. On the other hand, OS-CFAR and CI-CFAR seem to have only modest degradation in performance. Especially, CI- CFAR seems to have not been affected as much. This is due to the way CI-CFAR is implemented. As explained previously, the A-D test only merges windows in one specific direction that is pre-set in the beginning. This means that if the nonhomogeneous window (no matter how close it is to a target) is in a position that is not consistent with the A-D test direction, it will have very little effect, if not none, on the performance. On the other hand, it also implies that if the non-homogeneous window is indeed in the direction of the A-D test, CI-CFAR will be affected. This will be shown in the next few figures. Fig. 8 and Fig. 9, corresponding to Scenario E and F respectively, are cases where the same non-homogeneous window of mean 0 from Scenario D is moved so that it

7 7 Fig. 8. ROC for target, non-homogeneous clutter scenario E Fig. 0. ROC for target, non-homogeneous clutter scenario G Fig. 9. ROC for target, non-homogeneous clutter scenario F Fig.. ROC for target, non-homogeneous clutter scenario H lies in the direction of the A-D test with the target s window. Scenario E has the target in the center of the window whereas in Scenario F, the target is on the edge of the homogeneous and non-homogeneous window. It can be expected that the performance of CI-CFAR will remain relatively equal for both cases because the non-homogeneous window will have equal effects in both cases and since the target s window is homogeneous, the target location within the window will have no impact on the performance. But CA-CFAR and OS-CFAR will have poorer performance in Scenario F than Scenario E because non-homogeneous samples will be also included in the reference window for Scenario F. This is displayed in Fig. 8 and Fig. 9. Fig. 0, Fig. and Fig. 2, corresponding to Scenario G, H and I respectively, shows how CI-CFAR can fail drastically. In Scenario G and H, there is a single target on the edge of a window in which there are 6 non-homogeneous samples. Scenario G has non-homogeneous clutter of mean 0 while in Scenario H, it has mean 3. Now, because of the way the clutter is laid out, it can be expected that the performance of CA-CFAR and OS-CFAR in Scenario G will be identical to the performance in Scenario F, since the non-homogeneous clutter mean is identical to 0. This can be easily verified from the figures. Now, in both Scenario G and H, it can be noted that the CI-CFAR performs significantly worse than both CA-CFAR and OS-CFAR. This is due to the underlying assumption that Fig. 2. ROC for target, non-homogeneous clutter scenario I the 9-sample window is homogeneous is broken. Because of the underlying assumption, the target is being compared with a non-homogeneous clutter that has higher mean than itself, thus resulting in a lower P d. Scenario I is similar to Scenario G, the only difference being that the target is embedded within one of the non-homogeneous samples. Again, CI-CFAR performs worse than both CA-CFAR and OS-CFAR as shown in Fig. 2. In order to improve performance in the case where the underlying assumption is violated, it is necessary to check the homogeneity of a single window prior to the A-D test.

8 8 Note that it isn t feasible to check the homogeneity of a given window by each sample separately. (For example, the A-D test for this case, i.e. N 9, k 9, results in giving no information regarding the homogeneity of the samples.) Thus, it is still required to divide the window into a smaller sized sub-windows, where the samples in each sub-windows are assumed to be homogeneous, for an EDF test to give any result. This again raises questions such as, what if the smaller sized sub-windows are not homogeneous and does different dividing method have different results? This hasn t been answered yet and is a future research topic. Fig. 3. Probability of detection in terms of SNR Fig. 3 is the plot of P d Vs. SNR for CI-CFAR, CA- CFAR And OS-CFAR with P fa set to 0 6. As can be noted from the figure, in an ideal clutter map, CI-CFAR has better performance because it merged the nearby windows and has more samples to estimate from. Also, it can be seen that CA- CFAR performs better than OS-CFAR as expected in an ideal clutter map. In most cases, CI-CFAR outperforms CA-CFAR and OS- CFAR. It is in those situations where the basic assumption of each window being homogeneous is violated that the performance of CI-CFAR degrades. To overcome this problem, it may be necessary to generate a test that will be able to reasonably determine the homogeneity of 2 samples, or i.e. determine the homogeneity of a single sample with a pool of N samples. Also, it will be worthwhile to expand the CI-CFAR s A-D algorithm so that the direction of the test is not fixed but can be generalized, possibly to all nearby windows. IV. SUMMARY AND CONCLUSION In this paper, a new CFAR algorithm that yields higher performance than CA-CFAR in homogeneous clutter while also robust in non-homogeneous clutter was introduced. The derivation and formula for calculating P fa and P d in homogeneous situations were proven for a simple case of CI- CFAR. A more complex version of CI-CFAR that incorporates the Anderson-Darling test of goodness-of-fit was introduced, which had the benefit of merging homogeneous clutter samples for better estimates and performance. It also decreases computational burden because only a single threshold is calculated for the entire homogeneous window. Also, this enables CI- CFAR to not keep track of the CUT for detection purposes, which makes implementation simpler. (I m still working on this last sentence so that it will sound better.) It has been shown through simulations that CI-CFAR performs better in most clutter map situations than CA-CFAR and OS-CFAR except for the case when the homogeneity of each window assumption is broken. It has also been pointed out that the Anderson-Darling test should be expanded into multi-direction and/or be able to determine the homogeneity of a single sample with respect to a pool of N samples. This will lead to a more general algorithm of CI-CFAR that will yield even better performance and possibly be robust to the inhomogeneity of each window. Also, it might be practical to test the homogeneity of each window before any other steps of the CI-CFAR using the k-sample Anderson-Darling test. Although this will increase the computational burden unnecessarily for the homogeneous clutter map case, it will definitely prevent severe performance loss when the homogeneity of each window assumption is broken. For example, if the homogeneity of each window is determined to be not true, the algorithm may choose to use another CFAR algorithm such as traditional OS-CFAR rather than CI-CFAR to prevent severe performance degrades. ACKNOWLEDGEMENT This work has been funded by the Air Force Office of Scientific Research (AFOSR) MURI Adaptive Waveform Design for Full Spectral Dominance. REFERENCES [] M. Rimbert, CFAR Detection Techniques based on EDF Statistics, Ph.D Thesis, School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, Aug [2] M. A. Stephens, EDF statistics for goodness-of-fit and some comparisons, 69(347): , Journal of the American Statistical Association, Sept [3] M. A. Stephens, Goodness-of-Fit Techniques, pp , Marcel Dekker, New York, 986. [4] F. W. Scholz and M. A. Stephens, K-Sample Anderson-Darling Tests, Vol. 82, No. 399 pp , Journal of the American Statistical Association, Sept [5] R. D. Reiss, Approximate Distributions of Order Statistics with Applications to Nonparametric Statistics, Springer, New York, 989. [6] D. M. Raymond and M. M. Fahmy Optimal M-D Sorting using Distributions of Order Statistics, Vol. 4, pp , 99 International Conference on Acoustics, Speech and Signal Processing, Apr. 99. [7] H. M. Mahmoud, Sorting, A Distribution Theory, Wiley-Interscience Series in Discrete Mathematics and Optimization, New York, [8] P. P. Gandhi and S. A. Kassam, Analysis of CFAR processor in nonhomogeneous background, IEEE Trans. Aerosp. Electron. Syst., Vol. 24, No. 4, pp , July 988. [9] V. G. Hansen, Constant false alarm rate processing in search radars, Proceedings of the IEEE 973 International Radar Conference, pp , London, 973. [0] G. V. Trunk, Range resolution of targets using automatic detectors, IEEE Trans. Aerosp. Electron. Syst., vol. 4, No. 5, pp , Sept [] I. Ozgunes, P. P. Gandhi and S. A. Kassam, A variably trimmed mean CFAR radar detector, IEEE Trans. Aerosp. Electron. Syst., Vol. 28, No. 4, pp , Oct [2] H. Rohling Radar CFAR Thresholding in Clutter and Multiple target situations, IEEE Trans. Aerosp. Electron. Syst., Vol. 9, No. 4, pp , July 983. [3] A. R. Elias-Fuste, M. G. G. de Marcado and E. de los Reyes Davo Analysis of some modified order statistic CFAR: OSGO and OSSO CFAR, IEEE Trans. Aerosp. Electron. Syst., 26:97 202, Jan. 990.

Modified Anderson-Darling Test-Based Target Detector in Non-Homogenous Environments

Modified Anderson-Darling Test-Based Target Detector in Non-Homogenous Environments Sensors 04, 4, 6046-606; doi:0.3390/s4096046 Article OPE ACCESS sensors ISS 44-80 www.mdpi.com/journal/sensors Modified Anderson-Darling Test-Based Target Detector in on-homogenous Environments Yang Li,,

More information

Nonparametric Estimation of Distribution Function using Bezier Curve

Nonparametric Estimation of Distribution Function using Bezier Curve Communications for Statistical Applications and Methods 2014, Vol. 21, No. 1, 105 114 DOI: http://dx.doi.org/10.5351/csam.2014.21.1.105 ISSN 2287-7843 Nonparametric Estimation of Distribution Function

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Robust Signal-Structure Reconstruction

Robust Signal-Structure Reconstruction Robust Signal-Structure Reconstruction V. Chetty 1, D. Hayden 2, J. Gonçalves 2, and S. Warnick 1 1 Information and Decision Algorithms Laboratories, Brigham Young University 2 Control Group, Department

More information

Empirical risk minimization (ERM) A first model of learning. The excess risk. Getting a uniform guarantee

Empirical risk minimization (ERM) A first model of learning. The excess risk. Getting a uniform guarantee A first model of learning Let s restrict our attention to binary classification our labels belong to (or ) Empirical risk minimization (ERM) Recall the definitions of risk/empirical risk We observe the

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Robust Shape Retrieval Using Maximum Likelihood Theory

Robust Shape Retrieval Using Maximum Likelihood Theory Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

Image denoising in the wavelet domain using Improved Neigh-shrink

Image denoising in the wavelet domain using Improved Neigh-shrink Image denoising in the wavelet domain using Improved Neigh-shrink Rahim Kamran 1, Mehdi Nasri, Hossein Nezamabadi-pour 3, Saeid Saryazdi 4 1 Rahimkamran008@gmail.com nasri_me@yahoo.com 3 nezam@uk.ac.ir

More information

Power Functions and Their Use In Selecting Distance Functions for. Document Degradation Model Validation. 600 Mountain Avenue, Room 2C-322

Power Functions and Their Use In Selecting Distance Functions for. Document Degradation Model Validation. 600 Mountain Avenue, Room 2C-322 Power Functions and Their Use In Selecting Distance Functions for Document Degradation Model Validation Tapas Kanungo y ; Robert M. Haralick y and Henry S. Baird z y Department of Electrical Engineering,

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

Fast Anomaly Detection Algorithms For Hyperspectral Images

Fast Anomaly Detection Algorithms For Hyperspectral Images Vol. Issue 9, September - 05 Fast Anomaly Detection Algorithms For Hyperspectral Images J. Zhou Google, Inc. ountain View, California, USA C. Kwan Signal Processing, Inc. Rockville, aryland, USA chiman.kwan@signalpro.net

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION

BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION Proceedings of the 1996 Winter Simulation Conference ed. J. M. Charnes, D. J. Morrice, D. T. Brunner, and J. J. S\vain BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION Linda lankauskas Sam

More information

A HYBRID METHOD FOR SIMULATION FACTOR SCREENING. Hua Shen Hong Wan

A HYBRID METHOD FOR SIMULATION FACTOR SCREENING. Hua Shen Hong Wan Proceedings of the 2006 Winter Simulation Conference L. F. Perrone, F. P. Wieland, J. Liu, B. G. Lawson, D. M. Nicol, and R. M. Fujimoto, eds. A HYBRID METHOD FOR SIMULATION FACTOR SCREENING Hua Shen Hong

More information

Chapter 3. Bootstrap. 3.1 Introduction. 3.2 The general idea

Chapter 3. Bootstrap. 3.1 Introduction. 3.2 The general idea Chapter 3 Bootstrap 3.1 Introduction The estimation of parameters in probability distributions is a basic problem in statistics that one tends to encounter already during the very first course on the subject.

More information

A Robust Wipe Detection Algorithm

A Robust Wipe Detection Algorithm A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,

More information

Comparison between Various Edge Detection Methods on Satellite Image

Comparison between Various Edge Detection Methods on Satellite Image Comparison between Various Edge Detection Methods on Satellite Image H.S. Bhadauria 1, Annapurna Singh 2, Anuj Kumar 3 Govind Ballabh Pant Engineering College ( Pauri garhwal),computer Science and Engineering

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

Application of Characteristic Function Method in Target Detection

Application of Characteristic Function Method in Target Detection Application of Characteristic Function Method in Target Detection Mohammad H Marhaban and Josef Kittler Centre for Vision, Speech and Signal Processing University of Surrey Surrey, GU2 7XH, UK eep5mm@ee.surrey.ac.uk

More information

A Virtual Laboratory for Study of Algorithms

A Virtual Laboratory for Study of Algorithms A Virtual Laboratory for Study of Algorithms Thomas E. O'Neil and Scott Kerlin Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract Empirical studies

More information

LOESS curve fitted to a population sampled from a sine wave with uniform noise added. The LOESS curve approximates the original sine wave.

LOESS curve fitted to a population sampled from a sine wave with uniform noise added. The LOESS curve approximates the original sine wave. LOESS curve fitted to a population sampled from a sine wave with uniform noise added. The LOESS curve approximates the original sine wave. http://en.wikipedia.org/wiki/local_regression Local regression

More information

International Journal of Mathematical Archive-7(9), 2016, Available online through ISSN

International Journal of Mathematical Archive-7(9), 2016, Available online through  ISSN International Journal of Mathematical Archive-7(9), 2016, 189-194 Available online through wwwijmainfo ISSN 2229 5046 TRIPLE CONNECTED COMPLEMENTARY ACYCLIC DOMINATION OF A GRAPH N SARADHA* 1, V SWAMINATHAN

More information

A Keypoint Descriptor Inspired by Retinal Computation

A Keypoint Descriptor Inspired by Retinal Computation A Keypoint Descriptor Inspired by Retinal Computation Bongsoo Suh, Sungjoon Choi, Han Lee Stanford University {bssuh,sungjoonchoi,hanlee}@stanford.edu Abstract. The main goal of our project is to implement

More information

OPTIMIZING CHEMICAL SENSOR ARRAY SIZES

OPTIMIZING CHEMICAL SENSOR ARRAY SIZES OPTIMIZING CHEMICAL SENSOR ARRAY SIZES G. C. Osbourn, R. F. Martinez, J. W. Bartholomew, W. G. Yelton, A. J. Ricco* Sandia National Laboratories, Albuquerque, NM 87 185-1423, "ACLARA Biosciences, Inc.,

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

Line Segment Based Watershed Segmentation

Line Segment Based Watershed Segmentation Line Segment Based Watershed Segmentation Johan De Bock 1 and Wilfried Philips Dep. TELIN/TW07, Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium jdebock@telin.ugent.be Abstract. In this

More information

Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling

Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling Moritz Baecher May 15, 29 1 Introduction Edge-preserving smoothing and super-resolution are classic and important

More information

Constructive floorplanning with a yield objective

Constructive floorplanning with a yield objective Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

SAR SURFACE ICE COVER DISCRIMINATION USING DISTRIBUTION MATCHING

SAR SURFACE ICE COVER DISCRIMINATION USING DISTRIBUTION MATCHING SAR SURFACE ICE COVER DISCRIMINATION USING DISTRIBUTION MATCHING Rashpal S. Gill Danish Meteorological Institute, Ice charting and Remote Sensing Division, Lyngbyvej 100, DK 2100, Copenhagen Ø, Denmark.Tel.

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

Image Quality Assessment Techniques: An Overview

Image Quality Assessment Techniques: An Overview Image Quality Assessment Techniques: An Overview Shruti Sonawane A. M. Deshpande Department of E&TC Department of E&TC TSSM s BSCOER, Pune, TSSM s BSCOER, Pune, Pune University, Maharashtra, India Pune

More information

A Non-Iterative Approach to Frequency Estimation of a Complex Exponential in Noise by Interpolation of Fourier Coefficients

A Non-Iterative Approach to Frequency Estimation of a Complex Exponential in Noise by Interpolation of Fourier Coefficients A on-iterative Approach to Frequency Estimation of a Complex Exponential in oise by Interpolation of Fourier Coefficients Shahab Faiz Minhas* School of Electrical and Electronics Engineering University

More information

A Study on Similarity Computations in Template Matching Technique for Identity Verification

A Study on Similarity Computations in Template Matching Technique for Identity Verification A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical

More information

Motivation. Technical Background

Motivation. Technical Background Handling Outliers through Agglomerative Clustering with Full Model Maximum Likelihood Estimation, with Application to Flow Cytometry Mark Gordon, Justin Li, Kevin Matzen, Bryce Wiedenbeck Motivation Clustering

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information

of Nebraska - Lincoln. Follow this and additional works at:

of Nebraska - Lincoln. Follow this and additional works at: University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, Department of Mathematics Mathematics, Department of 6-1975 POLYGONS HAVE EARS G.H. Meisters University

More information

A Robust Method for Circle / Ellipse Extraction Based Canny Edge Detection

A Robust Method for Circle / Ellipse Extraction Based Canny Edge Detection International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 5, May 2015, PP 49-57 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Robust Method for Circle / Ellipse

More information

Matched filters for multispectral point target detection

Matched filters for multispectral point target detection Matched filters for multispectral point target detection S. Buganim and S.R. Rotman * Ben-Gurion University of the Negev, Dept. of Electro-optical Engineering, Beer-Sheva, ISRAEL ABSRAC Spectral signatures

More information

A Probabilistic Approach to the Hough Transform

A Probabilistic Approach to the Hough Transform A Probabilistic Approach to the Hough Transform R S Stephens Computing Devices Eastbourne Ltd, Kings Drive, Eastbourne, East Sussex, BN21 2UE It is shown that there is a strong relationship between the

More information

Extracting the Range of cps from Affine Typing

Extracting the Range of cps from Affine Typing Extracting the Range of cps from Affine Typing Extended Abstract Josh Berdine, Peter W. O Hearn Queen Mary, University of London {berdine, ohearn}@dcs.qmul.ac.uk Hayo Thielecke The University of Birmingham

More information

MRF Based LSB Steganalysis: A New Measure of Steganography Capacity

MRF Based LSB Steganalysis: A New Measure of Steganography Capacity MRF Based LSB Steganalysis: A New Measure of Steganography Capacity Debasis Mazumdar 1, Apurba Das 1, and Sankar K. Pal 2 1 CDAC, Kolkata, Salt Lake Electronics Complex, Kolkata, India {debasis.mazumdar,apurba.das}@cdackolkata.in

More information

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1.

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1. Discrete Comput Geom 18:455 462 (1997) Discrete & Computational Geometry 1997 Springer-Verlag New York Inc. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

Lecture 2 - Introduction to Polytopes

Lecture 2 - Introduction to Polytopes Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.

More information

Assessing the Quality of the Natural Cubic Spline Approximation

Assessing the Quality of the Natural Cubic Spline Approximation Assessing the Quality of the Natural Cubic Spline Approximation AHMET SEZER ANADOLU UNIVERSITY Department of Statisticss Yunus Emre Kampusu Eskisehir TURKEY ahsst12@yahoo.com Abstract: In large samples,

More information

Integral Cryptanalysis of the BSPN Block Cipher

Integral Cryptanalysis of the BSPN Block Cipher Integral Cryptanalysis of the BSPN Block Cipher Howard Heys Department of Electrical and Computer Engineering Memorial University hheys@mun.ca Abstract In this paper, we investigate the application of

More information

Detecting Salient Contours Using Orientation Energy Distribution. Part I: Thresholding Based on. Response Distribution

Detecting Salient Contours Using Orientation Energy Distribution. Part I: Thresholding Based on. Response Distribution Detecting Salient Contours Using Orientation Energy Distribution The Problem: How Does the Visual System Detect Salient Contours? CPSC 636 Slide12, Spring 212 Yoonsuck Choe Co-work with S. Sarma and H.-C.

More information

Adaptive Doppler centroid estimation algorithm of airborne SAR

Adaptive Doppler centroid estimation algorithm of airborne SAR Adaptive Doppler centroid estimation algorithm of airborne SAR Jian Yang 1,2a), Chang Liu 1, and Yanfei Wang 1 1 Institute of Electronics, Chinese Academy of Sciences 19 North Sihuan Road, Haidian, Beijing

More information

Learning to Segment Document Images

Learning to Segment Document Images Learning to Segment Document Images K.S. Sesh Kumar, Anoop Namboodiri, and C.V. Jawahar Centre for Visual Information Technology, International Institute of Information Technology, Hyderabad, India Abstract.

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku

Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Todd K. Moon and Jacob H. Gunther Utah State University Abstract The popular Sudoku puzzle bears structural resemblance to

More information

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase

More information

Mathematically Rigorous Software Design Review of mathematical prerequisites

Mathematically Rigorous Software Design Review of mathematical prerequisites Mathematically Rigorous Software Design 2002 September 27 Part 1: Boolean algebra 1. Define the Boolean functions and, or, not, implication ( ), equivalence ( ) and equals (=) by truth tables. 2. In an

More information

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016 edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract

More information

Mathematics of networks. Artem S. Novozhilov

Mathematics of networks. Artem S. Novozhilov Mathematics of networks Artem S. Novozhilov August 29, 2013 A disclaimer: While preparing these lecture notes, I am using a lot of different sources for inspiration, which I usually do not cite in the

More information

The Perils of Unfettered In-Sample Backtesting

The Perils of Unfettered In-Sample Backtesting The Perils of Unfettered In-Sample Backtesting Tyler Yeats June 8, 2015 Abstract When testing a financial investment strategy, it is common to use what is known as a backtest, or a simulation of how well

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

Adaptive Quantization for Video Compression in Frequency Domain

Adaptive Quantization for Video Compression in Frequency Domain Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani

More information

Application of QNA to analyze the Queueing Network Mobility Model of MANET

Application of QNA to analyze the Queueing Network Mobility Model of MANET 1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:

More information

Computational Statistics and Mathematics for Cyber Security

Computational Statistics and Mathematics for Cyber Security and Mathematics for Cyber Security David J. Marchette Sept, 0 Acknowledgment: This work funded in part by the NSWC In-House Laboratory Independent Research (ILIR) program. NSWCDD-PN--00 Topics NSWCDD-PN--00

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

Use of Multi-category Proximal SVM for Data Set Reduction

Use of Multi-category Proximal SVM for Data Set Reduction Use of Multi-category Proximal SVM for Data Set Reduction S.V.N Vishwanathan and M Narasimha Murty Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India Abstract.

More information

An Empirical Comparison of Spectral Learning Methods for Classification

An Empirical Comparison of Spectral Learning Methods for Classification An Empirical Comparison of Spectral Learning Methods for Classification Adam Drake and Dan Ventura Computer Science Department Brigham Young University, Provo, UT 84602 USA Email: adam drake1@yahoo.com,

More information

129 (2004) MATHEMATICA BOHEMICA No. 4, , Liberec

129 (2004) MATHEMATICA BOHEMICA No. 4, , Liberec 129 (2004) MATHEMATICA BOHEMICA No. 4, 393 398 SIGNED 2-DOMINATION IN CATERPILLARS, Liberec (Received December 19, 2003) Abstract. A caterpillar is a tree with the property that after deleting all its

More information

Effective Memory Access Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time Management

Effective Memory Access Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time Management International Journal of Computer Theory and Engineering, Vol., No., December 01 Effective Memory Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time Management Sultan Daud Khan, Member,

More information

Locating 1-D Bar Codes in DCT-Domain

Locating 1-D Bar Codes in DCT-Domain Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449

More information

Development of Time-Dependent Queuing Models. in Non-Stationary Condition

Development of Time-Dependent Queuing Models. in Non-Stationary Condition The 11th Asia Pacific Industrial Engineering and Management Systems Conference Development of Time-Dependent Queuing Models in Non-Stationary Condition Nur Aini Masruroh 1, Subagyo 2, Aulia Syarifah Hidayatullah

More information

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling International Journal of Performability Engineering Vol. 9, No. 2, March 2013, pp. 123-132. RAMS Consultants Printed in India On the Role of Weibull-type Distributions in NHPP-based Software Reliability

More information

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca

More information

Sandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing

Sandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing Generalized Additive Model and Applications in Direct Marketing Sandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing Abstract Logistic regression 1 has been widely used in direct marketing applications

More information

Fast 3D Mean Shift Filter for CT Images

Fast 3D Mean Shift Filter for CT Images Fast 3D Mean Shift Filter for CT Images Gustavo Fernández Domínguez, Horst Bischof, and Reinhard Beichel Institute for Computer Graphics and Vision, Graz University of Technology Inffeldgasse 16/2, A-8010,

More information

Classification of Multispectral Image Data by Extraction and Classification of Homogeneous Objects

Classification of Multispectral Image Data by Extraction and Classification of Homogeneous Objects Classification of Multispectral Image Data by Extraction and Classification of Homogeneous Objects R. L. KETTIG AND D. A. LANDGREBE, SENIOR MEMBER, IEEE Copyright (c) 1976 Institute of Electrical and Electronics

More information

Off-Line and Real-Time Methods for ML-PDA Target Validation

Off-Line and Real-Time Methods for ML-PDA Target Validation Off-Line and Real-Time Methods for ML-PDA Target Validation Wayne R. Blanding*, Member, IEEE, Peter K. Willett, Fellow, IEEE and Yaakov Bar-Shalom, Fellow, IEEE 1 Abstract We present two procedures for

More information

Bounds on the signed domination number of a graph.

Bounds on the signed domination number of a graph. Bounds on the signed domination number of a graph. Ruth Haas and Thomas B. Wexler September 7, 00 Abstract Let G = (V, E) be a simple graph on vertex set V and define a function f : V {, }. The function

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Using the Kolmogorov-Smirnov Test for Image Segmentation

Using the Kolmogorov-Smirnov Test for Image Segmentation Using the Kolmogorov-Smirnov Test for Image Segmentation Yong Jae Lee CS395T Computational Statistics Final Project Report May 6th, 2009 I. INTRODUCTION Image segmentation is a fundamental task in computer

More information

On the performance of turbo codes with convolutional interleavers

On the performance of turbo codes with convolutional interleavers University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 5 On the performance of turbo codes with convolutional interleavers Sina

More information

Logic and Computation

Logic and Computation Logic and Computation From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world. This is

More information

Adaptive Linear Programming Decoding of Polar Codes

Adaptive Linear Programming Decoding of Polar Codes Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar

More information

OPTIMIZATION, OPTIMAL DESIGN AND DE NOVO PROGRAMMING: DISCUSSION NOTES

OPTIMIZATION, OPTIMAL DESIGN AND DE NOVO PROGRAMMING: DISCUSSION NOTES OPTIMIZATION, OPTIMAL DESIGN AND DE NOVO PROGRAMMING: DISCUSSION NOTES MILAN ZELENY Introduction Fordham University, New York, USA mzeleny@fordham.edu Many older texts, with titles like Globally Optimal

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Light Field Occlusion Removal

Light Field Occlusion Removal Light Field Occlusion Removal Shannon Kao Stanford University kaos@stanford.edu Figure 1: Occlusion removal pipeline. The input image (left) is part of a focal stack representing a light field. Each image

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

Radar Target Identification Using Spatial Matched Filters. L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory

Radar Target Identification Using Spatial Matched Filters. L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory Radar Target Identification Using Spatial Matched Filters L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory Abstract The application of spatial matched filter classifiers to the synthetic

More information

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:

More information

A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY

A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY Lindsay Semler Lucia Dettori Intelligent Multimedia Processing Laboratory School of Computer Scienve,

More information

Independence Number and Cut-Vertices

Independence Number and Cut-Vertices Independence Number and Cut-Vertices Ryan Pepper University of Houston Downtown, Houston, Texas 7700 pepperr@uhd.edu Abstract We show that for any connected graph G, α(g) C(G) +1, where α(g) is the independence

More information

How Much Logic Should Go in an FPGA Logic Block?

How Much Logic Should Go in an FPGA Logic Block? How Much Logic Should Go in an FPGA Logic Block? Vaughn Betz and Jonathan Rose Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario, Canada M5S 3G4 {vaughn, jayar}@eecgutorontoca

More information

Digital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering

Digital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering Digital Image Processing Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Image Enhancement Frequency Domain Processing

More information

Design of Orthogonal Graph Wavelet Filter Banks

Design of Orthogonal Graph Wavelet Filter Banks Design of Orthogonal Graph Wavelet Filter Banks Xi ZHANG Department of Communication Engineering and Informatics The University of Electro-Communications Chofu-shi, Tokyo, 182-8585 JAPAN E-mail: zhangxi@uec.ac.jp

More information

Contrast adjustment via Bayesian sequential partitioning

Contrast adjustment via Bayesian sequential partitioning Contrast adjustment via Bayesian sequential partitioning Zhiyu Wang, Shuo Xie, Bai Jiang Abstract Photographs taken in dim light have low color contrast. However, traditional methods for adjusting contrast

More information

Image Restoration by Revised Bayesian-Based Iterative Method

Image Restoration by Revised Bayesian-Based Iterative Method ADVCOMP 2011 : The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences Image Restoration by Revised Bayesian-Based Iterative Method Sigeru Omatu, Hideo Araki Osaka

More information

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha

More information

FPGA Implementation of a Nonlinear Two Dimensional Fuzzy Filter

FPGA Implementation of a Nonlinear Two Dimensional Fuzzy Filter Justin G. R. Delva, Ali M. Reza, and Robert D. Turney + + CORE Solutions Group, Xilinx San Jose, CA 9514-3450, USA Department of Electrical Engineering and Computer Science, UWM Milwaukee, Wisconsin 5301-0784,

More information