OPTIMAL radar detection in clutter requires appropriate
|
|
- Hillary Bradford
- 5 years ago
- Views:
Transcription
1 An Efficient CFAR Algorithm for Piecewise Homogeneous Environments. Jeong Hun Kim and Mark R. Bell School of Electrical and Computer Engineering, Purdue University Abstract A new constant false alarm rate (CFAR) detection algorithm operating in non-homogeneous clutter is proposed in this paper. The proposed CFAR algorithm, CUT-inclusive (CI) CFAR, utilizes a goodness-of-fit test for determining and combining homogeneous windows, resulting in a higher detection performance. The CI-CFAR algorithm layout and analytical properties for the ideal case are investigated. In comparison to the traditional Cell-averaging (CA) CFAR and Order-statistic (OS) CFAR, it is demonstrated that CI-CFAR outperforms both in most situations. Also, the relationship between efficient sorting and homogeneity is investigated. Index Terms Anderson-Darling Test, CFAR, Order statistic (OS), CI-CFAR I. INTRODUCTION OPTIMAL radar detection in clutter requires appropriate selection of the detector threshold. One common approach to threshold selection in clutter environments with unknown or changing statistics is to estimate the clutter statistics from resolution cells surrounding the resolution cell under test. The implicit assumptions in this approach are that the resolution cells used to estimate the clutter statistics are target free and the clutter returns from these cells are statistically representative of the clutter statistics of the cell under test. When either of these two assumptions is violated, the threshold computed using this approach may result in a significant degradation of detector performance, either in the form of a higher probability of false alarm or a lower probability of target detection. In radar detection problems, detection thresholds are usually selected to maximize the probability of target detection while holding the false alarm constant. So the standard approach to adaptive threshold selection is to estimate a threshold value based on the radar returns from resolution cells surrounding the cell under test that will yield a constant probability of false alarm. The algorithms used to compute these adaptive thresholds are called Constant False Alarm Rate (CFAR) algorithms. In implementing CFAR algorithms, a decision must be made as to how large a collection of reference cells should be used to estimate the detection threshold. This region is called the reference window. If the clutter statistics are homogeneous across all resolution cells in a neighborhood surrounding the cell under test, then using a larger reference window will result in more accurate estimates of the clutter statistics and a corresponding improvement in detector performance. However, if there is significant spatial variation and hence nonhomogeneous statistical behavior in the neighborhood surrounding the cell under test, selecting too large a reference window will result in inaccurate estimates of the clutter statistics and the corresponding detection threshold will not be well matched to the cell under test. For this reason, selection of the reference window size and region is an important consideration in designing CFAR detectors. Furthermore, because a particular radar scene may include large homogeneous regions as well as regions with significant inhomogeneity, it may not be the case that one reference window size is appropriate across the whole radar scene. For this reason, approaches to the adaptive selection of reference windows are of interest. Multiresolution techniques provide one possible approach to measuring the variation in clutter statistics on different spatial scales, and this information can be used to adaptively select reference windows. In real radar scenes, another issue we must consider is that as the size of the reference window increases, the likelihood that one or more of the reference cells contains a target also increases. Since the presence of interfering targets tends to increase the average radar return from the resolution cells containing these targets, order statistic based techniques can provide robust threshold selection having significant immunity to a small number of interfering targets in the reference window. In this paper, we develop a CFAR algorithm that combines multiresolution and order statistic techniques (in the form of empirical distribution functions) for adaptive reference window selection. One particular benefit of the technique is computational efficiency because the cell under test does not have to be accounted for in setting up the reference window because of the robustness of the order statistic techniques used. For this reason, we call this algorithm Cell-under-test Inclusive CFAR (CI-CFAR.) A. Idea behind CI-CFAR II. CUT-INCLUSIVE(CI) CFAR The main concept of CI-CFAR is to find and group homogeneous regions in a radar scene. One commonly used method for finding and grouping homogeneous samples is image segmentation. However, most detection system require very quick response time from receiving data to declaring whether or not a target was detected and image segmentation methods are generally a very computationally intense process. Hence, using image segmentation in a detection system is not practical. We must find another method that will yield reasonable performance while being computationally efficient.
2 2 One such method is the Empirical Distribution Function (EDF) goodness-of-fit test. The CI-CFAR method in this paper has the following characteristics that distinguish it from other traditional CFAR algorithms: ) The concept of a moving/sliding window is not used. 2) Homogeneous regions are combined into larger reference windows using EDF goodness-of-fit tests. 3) A separate threshold is not calculated for each CUT, but rather a single threshold is calculated for each homogeneous region. B. Statistical Test for Merging (Anderson-Darling test) Goodness-of-Fit tests are a class of hypotheses tests that determine whether a pool of random samples came from a single distribution or not. The χ 2 test is a classic example of such a test. However, it was shown in [2] that goodness-offit tests based on empirical distribution functions (EDF) are generally more powerful. The most well known goodness-offit test based on EDF statistics is probably the Kolmogorov- Smirnov (K-S) test. There are numerous papers out that describe the performance of the K-S test. In [3], Stephens observed that the Anderson-Darling (A-D) test is generally more powerful than the K-S test for testing departures from the true distribution in the tail, particularly when there are many statistical outliers in the sample. This is similar to a typical radar detection problem, therefore the A-D test seems to be an appropriate test to use for CI-CFAR. We have in fact compared the K-S and A-D test in this work and found the A-D test to be superior. Implementation of the A-D goodness-of-fit test is rigorously explained in ([, p ], [4]) and will not be repeated here. C. Description of CI-CFAR Algorithm The CI-CFAR algorithm can be described as follows : ) Given a clutter map, use the Anderson-Darling test to see if whether or not the adjacent q-by-q windows (in one direction only, whether horizontal or vertical) come from the same distribution (i.e. are homogeneous). If they are homogeneous, then combine them into a single window. Repeat for all window pairs. This assumes that each of the q 2 samples in the q-by-q windows are homogeneous. 2) Only for those windows that were determined to be homogeneous and combined into a single window in the previous step, check if the adjacent windows are again homogeneous or not. If they are, merge into a single window. Repeat for all window pairs. 3) Repeat step 2 until no more windows are merged or until a pre-determined number of windows are merged. 4) Including the CUT, use the sorted data (data is already sorted in the previous steps) to find the k-th OS for the entire window. Thus, a single threshold will be used for comparison in deciding whether an outlier is present or not. 5) If the CUT exceeds the assigned threshold for the entire window, declare that a target is present. Otherwise, decide that there is no target. Note, that the single threshold to be used by CI-CFAR is equal to the multiplication of the k-th OS and scalar multiplicative factor γ. Although the use of a single threshold may slightly degrade performance, it will speed up the detection computation because there won t be a need to calculate the threshold over and over for each CUT as in conventional CFAR methods. III. PERFORMANCE ANALYSIS OF CI-CFAR A. Calculating Probability of False Alarm (P fa ) for CI-CFAR For calculating the size of our test, we will first assume that we will be only interested in γ >, which corresponds to the range where P fa is small. (γ : scalar multiplicative factor.) Also, we will assume that the algorithm will be operating in a clutter environment that has exponentially distributed power, which is generally accepted when there are a large number of random scatterers. This also offers ease of comparison with other CFAR algorithms since many CFAR algorithms are usually tested in exponentially powered clutter. Also, the following equality will be used several times in the proof, b b ia (Q ci) ta c a b ( ) b t (t a)! (b t)! (Q ct) for a, b Z and Q, c R. A special form of the above equality will be more useful, b b i0 (Q i) t0 () ( ) b t t! (b t)! (Q t), (2) which can be shown trivially from the original form. For the case of low P fa, we make the following assumptions : ) Threshold multiplicative factor γ is greater than (γ > ) which corresponds to low P fa. 2) The number k in the k-th OS for calculating the threshold is fixed. 3) The number of samples is N and the samples are IID with distribution of Exp(). 4) The CUT is also included in the pool of N samples. 5) Hypothesis H 0 is in effect, i.e. no target present, where, ) Z i, i, 2,..., N : OS of the N samples in increasing order. 2) Z k : k-th OS for calculating the threshold. 3) Z m : m-th OS which is also the CUT with no target. 4) S : Sample space of all possible outcomes. We compute the probability of false alarm as follows : P fa P H0 [H declared] P H0 [Z m γz k ]. Since the sample space can be partitioned as we have S [m < k] [m k] [m > k], P fa P H0 [(Z m γz k ) S] P H0 [(Z m γz k ) (m < k)] + P H0 [(Z m γz k ) (m k)] + P H0 [(Z m γz k ) (m > k)].
3 3 Since γ >, it is obvious that P H0 [(Z m γz k ) (m k)] 0. Thus, P fa P H0 [(Z m γz k ) (m > k)] P H0 [(Z m γz k ) ((m k + ) (m N))] P H0 [(Z m γz k ) (m k + )] + + P H0 [(Z m γz k ) (m N)] P H0 [Z k+ γz k ] + + P H0 [Z N γz k ] N P H0 [Z m γz k ]. mk+ Our problem now is to find P H0 [Z m γz k ] where m k +, k + 2,..., N. For this, it is necessary to find the joint pdf of Z m and Z k. (m > k) Noting that the CUT Z m is fixed at the m-th position, we actually only have N samples to choose from, thus the joint pdf for Z m and Z k, f km (x, y) is, ( )( )( )( )( ) N N k N k N m f km (x, y) k m k N m F k (x)f(x)[f (y) F (x)] m k f(y)[ F (y)] N m where F (x) ( e x ) [0, ] (x), f(x) e x [0, ] (x). Thus we have (N )! f km (x, y) (k )! (m k )! (N m)! ( e x ) k e x [e x e y ] m k e (N m+)y. By using the Binomial theorem to expand the powers and some simple calculus steps, we have P H0 [Z m γz k ] m k s0 k t0 Therefore, N P fa mk+ N mk+ x0 yγx f km (x, y)dydx (N )!( ) m s t (N m)! s! (m k s)! t! (k t)! (N k s)(k + s t + γ(n k s)). P H0 [Z m γz k ] m k s0 k t0 (N )!( ) m s t (N m)! s! (m k s)! t! (k t)! (N k s)(k + s t + γ(n k s)) k i0 N i N i + γ. (3) where γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). The last equality can be proven by using (). Similarly, for the case of high P fa or equivalently, when Fig.. CI-CFAR P fa Verification for N9 (a) Low P fa, i.e. γ > (b) High P fa, i.e. 0 γ < 0 γ <, it can be shown that, P fa k 2 i0 N i N i + γ. (4) where γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). Fig. demonstrates that the theoretic P fa matches the simulation results. Note the jump in Fig.. This happens at the P fa corresponding to γ and is due to the fact that the CUT is included in deciding the threshold. B. Calculating Probability of Detection ( P d ) for CI-CFAR Calculating P d of CI-CFAR for the ideal case (i.e. target embedded in homogeneous clutter) is very similar to that of finding P fa. As it turns out, there isn t a closed form expression for P d, but it can be simplified to a form where numerical evaluations are simple. For calculating P d, we make the following assumptions : ) Threshold multiplicative factor γ is greater than (γ > ) which corresponds to low P fa. 2) The number k in the k-th OS for calculating the threshold is fixed.
4 4 3) sample (CUT) is distributed with Exp(u) while N samples are Exp(). All samples are independent of each other. There are total of N samples. 4) The CUT is also included in the pool of N samples. 5) Hypothesis H is in effect, i.e. a target is present, where, ) Z i, i, 2,..., N : OS of the N samples in increasing order. 2) Z k : k-th OS for calculating the threshold. 3) Z m : m-th OS which is also the CUT with a target. (Exp(u)) 4) S : Sample space of all possible outcomes. We compute the probability of detection as follows : P d P H [H declared] P H [Z m γz k ] P H [(Z m γz k ) S] P H [(Z m γz k ) (m < k)] + P H [(Z m γz k ) (m k)] + P H [(Z m γz k ) (m > k)]. Since γ >, it is obvious that Thus, P H [(Z m γz k ) (m k)] 0. P d P H [(Z m γz k ) (m > k)] N P H [Z m γz k ]. mk+ Our problem now is to find P H [Z m γz k ] where m k +, k + 2,..., N. For this, it is necessary to find the joint pdf of Z m and Z k when H is in effect. (m > k) Noting that the CUT Z m is fixed at the m-th position with distribution Exp(u), we actually only have N samples of distribution Exp() to choose from, thus the joint pdf for Z m and Z k, f km (x, y) is, ( )( )( )( )( ) N N k N k N m f km (x, y) k m k N m F k (x)f(x)[f (y) F (x)] m k g(y)[ F (y)] N m where F (x) e x [0, ] (x), f(x) e x [0, ] (x) and g(x) u e x u [0, ] (x). Thus we have f km (x, y) (N )! u(k )! (m k )! (N m)! ( e x ) k e x [e x e y ] m k e (N m+ u )y. By using the Binomial theorem to expand the powers and some simple calculus steps, we have P H [Z m γz k ] m k s0 k t0 x0 yγx f km (x, y)dydx (N )! ( ) m s t u(n m)! s! (m k s)! t! (k t)! (N k s + u )(k + s t + γ(n k s + u )). Therefore, N P d mk+ N mk+ P H [Z m γz k ] m k s0 k t0 (N )! ( ) m s t u(n m)! s! (m k s)! t! (k t)! (N k s + u ) (k + s t + γ(n k s + u )). where u is the target mean, γ is the scalar multiplicative factor, N is the number of samples and k is the number corresponding to the OS we have chosen for the threshold (usually the 80-th percentile of N). Fig. 2. CI-CFAR P d Verification for (a) N 9, k 7, u 5 (b) N, k 8, u 3 Fig. 2 demonstrates that the analytic expression for P d is consistent with the simulation results. C. Presentation and interpretation of results Fig. 3 through Fig. 3 are simulation results from a 2-by- 2 exponential (mean of ) clutter map of 44 samples. For our purposes of simulating CI-CFAR, q 3, i.e. the clutter map was pre-divided into 3-by-3 windows where each of the windows are assumed to be homogeneous. Also, in step 3 of the CI-CFAR algorithm, the algorithm was terminated if 4 3-
5 5 A Description Target in homogeneous clutter. Layout B Target is adjacent to an outlier. Target in homogeneous clutter. C Target is adjacent to a window of mean 3. Windows NOT in the direction of A-D test. D Target is adjacent to a window of mean 0. E Windows NOT in the direction of A-D test. Target is in the center of the window. Target is adjacent to a window of mean 0. Windows in the direction of A-D test. F Target is adjacent to a window of mean 0. Windows are in the direction of A-D test. G 6 samples in Target s window has mean 0. Target is not in these 6 samples. H 6 samples in Target s window has mean 3. Target is not in these 6 samples. I 6 samples in Target s window has mean 0. Target is in one of these 6 samples. TABLE I DESCRIPTION OF NON-HOMOGENEOUS CLUTTER SCENARIO Fig. 3. ROC for target, homogeneous clutter. Scenario A Fig. 4. Comparison of CI-CFAR with OS-CFAR and CA-CFAR of window size 3-by-3, 5-by-5 and 7-by-7 by-3 windows were merged by the A-D test. A target of mean, 2, 3, 5, 7, 9 was used and P fa is ranged from 0 6 to 0 4. As explained before, it is assumed that the samples in each 3-by-3 window are homogeneous. Thus there are 6 homogeneous windows with each window having 9 samples. This assumption is needed in this type of CI-CFAR for the following reason. In using the A-D test, we are ultimately determining if a given number of samples are indeed homogeneous through EDF goodness-of-fit tests. It turns out that in most cases, the A-D test will usually determine that 2 samples are indeed homogeneous regardless of their underlying distribution. Another way of saying it is that if sample is added to a pool of 9 samples, then the A-D test will usually determine that the whole pool of 0 samples is homogeneous, even if the added single sample is a huge outlier. Thus, it is somewhat impractical to just start with 2 samples and keep adding single samples to the A-D test because the results will usually hold significant error. That is why the 9 samples in a single window are assumed to be homogeneous. The proposed CI-CFAR algorithm was also tested in a field of clutter where the 9 samples in a single window are NOT homogeneous to see how the performance would be affected in those situations. Fig. 3 corresponds to Scenario A in Table I and represents the case where all of the background clutter is homogeneous, having mean of and only a single target is in the entire clutter map. For this ideal situation, we would expect CA- CFAR to perform best but, as the results show, CI-CFAR has the best performance, CA-CFAR next and OS-CFAR last. The CA-CFAR and OS-CFAR behavior can be explained from the fact that CA-CFAR is optimal in homogeneous clutter but it is at first look somewhat surprising that CI-CFAR performs better than CA-CFAR in this ideal clutter map. This is due to the fact that since the background clutter is homogeneous, the CI-CFAR algorithm will combine 4 windows in most cases, thus instead of having 9 samples to detect targets, it will have 36 samples. Since CA-CFAR and OS-CFAR have a fixed window of 9 samples, it is highly likely that CI-CFAR with 36 samples will have better detection performance. Then it is a good question to ask, what window sizes are required by OS-CFAR and/or CA-CFAR to achieve similar performance to CI-CFAR in homogeneous clutter? Fig. 4 gives the answer to this question. The figure shows the case for a target of mean 3 for illustrative purposes. The results were nearly identical regardless of target mean. While the CI-CFAR algorithm was kept the same as before, the OS-CFAR and CA-CFAR were tested with window sizes of 3-by-3, 5-by-5 and 7-by-7. For the same algorithm, higher performance was achieved for larger window size as expected. It is shown that for 3-by-3 windows, CA-CFAR and OS-CFAR are both inferior to CI- CFAR. However, if the window size is increased to 5-by- 5, OS-CFAR shows almost equivalent performance whereas
6 6 CA-CFAR outperforms CI-CFAR entirely. If the window size is increased to 7-by-7 for OS-CFAR and CA-CFAR, they both outperform CI-CFAR. Thus it can be concluded that given an equal number of samples, OS-CFAR and CA-CFAR both have better performance than CI-CFAR if the clutter is homogeneous. Fig. 5. ROC for 2 adjacent target, homogeneous clutter. Scenario B Fig. 5 is the result of Scenario B, which is identical to Scenario A with the exception of an additional target right next to the previous one. The targets were also placed in the same 3-by-3 window and have the same mean. This demonstrates the case where target may mask the other. In this case, it is known that CA-CFAR will be inferior compared to OS-CFAR as is shown in Fig. 5. Note that for low target mean, CA-CFAR is superior to OS-CFAR because since the target mean is low, it will be virtually the same as having homogeneous clutter around the CUT, thus CA-CFAR will have better performance. As the target mean increases, the clutter of windows will become less homogeneous and thus OS-CFAR will behave better than CA-CFAR. (This is shown in Fig. 5) Even in the 2 target case, CI-CFAR is superior to the other two algorithms because the A-D test will still merge the nearby windows for detection even if there are 2 outliers in one of the windows. Thus, in most cases CI-CFAR will run the detection test with 8 or 36 samples, rather than 9, yielding a better detection even in the case of 2 outliers. Fig. 6. ROC for target, non-homogeneous clutter scenario C Fig. 6 through Fig. 2 are simulation results for the nonhomogeneous clutter scenarios. Fig. 6, Scenario C, is the case where there is a single target in the edge of one of the windows and the window next to the target (which will be adjacent to the target s window) has a different mean of 3, whereas all the other windows have mean. It is also set so that the non-homogeneous windows will not be compared with the target s window by the A-D test for homogeneity. Now, although the entire window has a different mean of 3, the mean is not large enough so that the A-D test will mostly accept that the windows are homogeneous. (It was actually accepted to be homogeneous 53.5% of the time.) Because this non-homogeneous window is accepted half the time as homogeneous by the A-D test, this results in a higher false alarm rate than the intended setting used for calculating the threshold. (This is clearly shown in the log-log plot of Fig. 6) Regardless of this matter, since the non-homogeneous window cannot be merged with the target s window (because it is not in the same direction.) the performance of CI-CFAR is expected to have minimal impact in compared to Fig. 3. This is certainly the case as shown in Fig. 6 and CI-CFAR is again superior to the other algorithms. Fig. 7. ROC for target, non-homogeneous clutter scenario D Scenario D in Fig. 7 is identical to Scenario C except that the non-homogeneous window is set to a higher mean of 0. As can be seen in Fig. 7, the performance of CA- CFAR is drastically reduced due to the high increase of the mean. On the other hand, OS-CFAR and CI-CFAR seem to have only modest degradation in performance. Especially, CI- CFAR seems to have not been affected as much. This is due to the way CI-CFAR is implemented. As explained previously, the A-D test only merges windows in one specific direction that is pre-set in the beginning. This means that if the nonhomogeneous window (no matter how close it is to a target) is in a position that is not consistent with the A-D test direction, it will have very little effect, if not none, on the performance. On the other hand, it also implies that if the non-homogeneous window is indeed in the direction of the A-D test, CI-CFAR will be affected. This will be shown in the next few figures. Fig. 8 and Fig. 9, corresponding to Scenario E and F respectively, are cases where the same non-homogeneous window of mean 0 from Scenario D is moved so that it
7 7 Fig. 8. ROC for target, non-homogeneous clutter scenario E Fig. 0. ROC for target, non-homogeneous clutter scenario G Fig. 9. ROC for target, non-homogeneous clutter scenario F Fig.. ROC for target, non-homogeneous clutter scenario H lies in the direction of the A-D test with the target s window. Scenario E has the target in the center of the window whereas in Scenario F, the target is on the edge of the homogeneous and non-homogeneous window. It can be expected that the performance of CI-CFAR will remain relatively equal for both cases because the non-homogeneous window will have equal effects in both cases and since the target s window is homogeneous, the target location within the window will have no impact on the performance. But CA-CFAR and OS-CFAR will have poorer performance in Scenario F than Scenario E because non-homogeneous samples will be also included in the reference window for Scenario F. This is displayed in Fig. 8 and Fig. 9. Fig. 0, Fig. and Fig. 2, corresponding to Scenario G, H and I respectively, shows how CI-CFAR can fail drastically. In Scenario G and H, there is a single target on the edge of a window in which there are 6 non-homogeneous samples. Scenario G has non-homogeneous clutter of mean 0 while in Scenario H, it has mean 3. Now, because of the way the clutter is laid out, it can be expected that the performance of CA-CFAR and OS-CFAR in Scenario G will be identical to the performance in Scenario F, since the non-homogeneous clutter mean is identical to 0. This can be easily verified from the figures. Now, in both Scenario G and H, it can be noted that the CI-CFAR performs significantly worse than both CA-CFAR and OS-CFAR. This is due to the underlying assumption that Fig. 2. ROC for target, non-homogeneous clutter scenario I the 9-sample window is homogeneous is broken. Because of the underlying assumption, the target is being compared with a non-homogeneous clutter that has higher mean than itself, thus resulting in a lower P d. Scenario I is similar to Scenario G, the only difference being that the target is embedded within one of the non-homogeneous samples. Again, CI-CFAR performs worse than both CA-CFAR and OS-CFAR as shown in Fig. 2. In order to improve performance in the case where the underlying assumption is violated, it is necessary to check the homogeneity of a single window prior to the A-D test.
8 8 Note that it isn t feasible to check the homogeneity of a given window by each sample separately. (For example, the A-D test for this case, i.e. N 9, k 9, results in giving no information regarding the homogeneity of the samples.) Thus, it is still required to divide the window into a smaller sized sub-windows, where the samples in each sub-windows are assumed to be homogeneous, for an EDF test to give any result. This again raises questions such as, what if the smaller sized sub-windows are not homogeneous and does different dividing method have different results? This hasn t been answered yet and is a future research topic. Fig. 3. Probability of detection in terms of SNR Fig. 3 is the plot of P d Vs. SNR for CI-CFAR, CA- CFAR And OS-CFAR with P fa set to 0 6. As can be noted from the figure, in an ideal clutter map, CI-CFAR has better performance because it merged the nearby windows and has more samples to estimate from. Also, it can be seen that CA- CFAR performs better than OS-CFAR as expected in an ideal clutter map. In most cases, CI-CFAR outperforms CA-CFAR and OS- CFAR. It is in those situations where the basic assumption of each window being homogeneous is violated that the performance of CI-CFAR degrades. To overcome this problem, it may be necessary to generate a test that will be able to reasonably determine the homogeneity of 2 samples, or i.e. determine the homogeneity of a single sample with a pool of N samples. Also, it will be worthwhile to expand the CI-CFAR s A-D algorithm so that the direction of the test is not fixed but can be generalized, possibly to all nearby windows. IV. SUMMARY AND CONCLUSION In this paper, a new CFAR algorithm that yields higher performance than CA-CFAR in homogeneous clutter while also robust in non-homogeneous clutter was introduced. The derivation and formula for calculating P fa and P d in homogeneous situations were proven for a simple case of CI- CFAR. A more complex version of CI-CFAR that incorporates the Anderson-Darling test of goodness-of-fit was introduced, which had the benefit of merging homogeneous clutter samples for better estimates and performance. It also decreases computational burden because only a single threshold is calculated for the entire homogeneous window. Also, this enables CI- CFAR to not keep track of the CUT for detection purposes, which makes implementation simpler. (I m still working on this last sentence so that it will sound better.) It has been shown through simulations that CI-CFAR performs better in most clutter map situations than CA-CFAR and OS-CFAR except for the case when the homogeneity of each window assumption is broken. It has also been pointed out that the Anderson-Darling test should be expanded into multi-direction and/or be able to determine the homogeneity of a single sample with respect to a pool of N samples. This will lead to a more general algorithm of CI-CFAR that will yield even better performance and possibly be robust to the inhomogeneity of each window. Also, it might be practical to test the homogeneity of each window before any other steps of the CI-CFAR using the k-sample Anderson-Darling test. Although this will increase the computational burden unnecessarily for the homogeneous clutter map case, it will definitely prevent severe performance loss when the homogeneity of each window assumption is broken. For example, if the homogeneity of each window is determined to be not true, the algorithm may choose to use another CFAR algorithm such as traditional OS-CFAR rather than CI-CFAR to prevent severe performance degrades. ACKNOWLEDGEMENT This work has been funded by the Air Force Office of Scientific Research (AFOSR) MURI Adaptive Waveform Design for Full Spectral Dominance. REFERENCES [] M. Rimbert, CFAR Detection Techniques based on EDF Statistics, Ph.D Thesis, School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, Aug [2] M. A. Stephens, EDF statistics for goodness-of-fit and some comparisons, 69(347): , Journal of the American Statistical Association, Sept [3] M. A. Stephens, Goodness-of-Fit Techniques, pp , Marcel Dekker, New York, 986. [4] F. W. Scholz and M. A. Stephens, K-Sample Anderson-Darling Tests, Vol. 82, No. 399 pp , Journal of the American Statistical Association, Sept [5] R. D. Reiss, Approximate Distributions of Order Statistics with Applications to Nonparametric Statistics, Springer, New York, 989. [6] D. M. Raymond and M. M. Fahmy Optimal M-D Sorting using Distributions of Order Statistics, Vol. 4, pp , 99 International Conference on Acoustics, Speech and Signal Processing, Apr. 99. [7] H. M. Mahmoud, Sorting, A Distribution Theory, Wiley-Interscience Series in Discrete Mathematics and Optimization, New York, [8] P. P. Gandhi and S. A. Kassam, Analysis of CFAR processor in nonhomogeneous background, IEEE Trans. Aerosp. Electron. Syst., Vol. 24, No. 4, pp , July 988. [9] V. G. Hansen, Constant false alarm rate processing in search radars, Proceedings of the IEEE 973 International Radar Conference, pp , London, 973. [0] G. V. Trunk, Range resolution of targets using automatic detectors, IEEE Trans. Aerosp. Electron. Syst., vol. 4, No. 5, pp , Sept [] I. Ozgunes, P. P. Gandhi and S. A. Kassam, A variably trimmed mean CFAR radar detector, IEEE Trans. Aerosp. Electron. Syst., Vol. 28, No. 4, pp , Oct [2] H. Rohling Radar CFAR Thresholding in Clutter and Multiple target situations, IEEE Trans. Aerosp. Electron. Syst., Vol. 9, No. 4, pp , July 983. [3] A. R. Elias-Fuste, M. G. G. de Marcado and E. de los Reyes Davo Analysis of some modified order statistic CFAR: OSGO and OSSO CFAR, IEEE Trans. Aerosp. Electron. Syst., 26:97 202, Jan. 990.
Modified Anderson-Darling Test-Based Target Detector in Non-Homogenous Environments
Sensors 04, 4, 6046-606; doi:0.3390/s4096046 Article OPE ACCESS sensors ISS 44-80 www.mdpi.com/journal/sensors Modified Anderson-Darling Test-Based Target Detector in on-homogenous Environments Yang Li,,
More informationNonparametric Estimation of Distribution Function using Bezier Curve
Communications for Statistical Applications and Methods 2014, Vol. 21, No. 1, 105 114 DOI: http://dx.doi.org/10.5351/csam.2014.21.1.105 ISSN 2287-7843 Nonparametric Estimation of Distribution Function
More informationQUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,
More informationRobust Signal-Structure Reconstruction
Robust Signal-Structure Reconstruction V. Chetty 1, D. Hayden 2, J. Gonçalves 2, and S. Warnick 1 1 Information and Decision Algorithms Laboratories, Brigham Young University 2 Control Group, Department
More informationEmpirical risk minimization (ERM) A first model of learning. The excess risk. Getting a uniform guarantee
A first model of learning Let s restrict our attention to binary classification our labels belong to (or ) Empirical risk minimization (ERM) Recall the definitions of risk/empirical risk We observe the
More informationTwo-dimensional Totalistic Code 52
Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable
More informationRobust Shape Retrieval Using Maximum Likelihood Theory
Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationCharacter Recognition
Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches
More informationImage denoising in the wavelet domain using Improved Neigh-shrink
Image denoising in the wavelet domain using Improved Neigh-shrink Rahim Kamran 1, Mehdi Nasri, Hossein Nezamabadi-pour 3, Saeid Saryazdi 4 1 Rahimkamran008@gmail.com nasri_me@yahoo.com 3 nezam@uk.ac.ir
More informationPower Functions and Their Use In Selecting Distance Functions for. Document Degradation Model Validation. 600 Mountain Avenue, Room 2C-322
Power Functions and Their Use In Selecting Distance Functions for Document Degradation Model Validation Tapas Kanungo y ; Robert M. Haralick y and Henry S. Baird z y Department of Electrical Engineering,
More informationSome Applications of Graph Bandwidth to Constraint Satisfaction Problems
Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept
More informationFast Anomaly Detection Algorithms For Hyperspectral Images
Vol. Issue 9, September - 05 Fast Anomaly Detection Algorithms For Hyperspectral Images J. Zhou Google, Inc. ountain View, California, USA C. Kwan Signal Processing, Inc. Rockville, aryland, USA chiman.kwan@signalpro.net
More informationUse of Extreme Value Statistics in Modeling Biometric Systems
Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision
More informationBESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION
Proceedings of the 1996 Winter Simulation Conference ed. J. M. Charnes, D. J. Morrice, D. T. Brunner, and J. J. S\vain BESTFIT, DISTRIBUTION FITTING SOFTWARE BY PALISADE CORPORATION Linda lankauskas Sam
More informationA HYBRID METHOD FOR SIMULATION FACTOR SCREENING. Hua Shen Hong Wan
Proceedings of the 2006 Winter Simulation Conference L. F. Perrone, F. P. Wieland, J. Liu, B. G. Lawson, D. M. Nicol, and R. M. Fujimoto, eds. A HYBRID METHOD FOR SIMULATION FACTOR SCREENING Hua Shen Hong
More informationChapter 3. Bootstrap. 3.1 Introduction. 3.2 The general idea
Chapter 3 Bootstrap 3.1 Introduction The estimation of parameters in probability distributions is a basic problem in statistics that one tends to encounter already during the very first course on the subject.
More informationA Robust Wipe Detection Algorithm
A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,
More informationComparison between Various Edge Detection Methods on Satellite Image
Comparison between Various Edge Detection Methods on Satellite Image H.S. Bhadauria 1, Annapurna Singh 2, Anuj Kumar 3 Govind Ballabh Pant Engineering College ( Pauri garhwal),computer Science and Engineering
More informationEXTREME POINTS AND AFFINE EQUIVALENCE
EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard
More informationApplication of Characteristic Function Method in Target Detection
Application of Characteristic Function Method in Target Detection Mohammad H Marhaban and Josef Kittler Centre for Vision, Speech and Signal Processing University of Surrey Surrey, GU2 7XH, UK eep5mm@ee.surrey.ac.uk
More informationA Virtual Laboratory for Study of Algorithms
A Virtual Laboratory for Study of Algorithms Thomas E. O'Neil and Scott Kerlin Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract Empirical studies
More informationLOESS curve fitted to a population sampled from a sine wave with uniform noise added. The LOESS curve approximates the original sine wave.
LOESS curve fitted to a population sampled from a sine wave with uniform noise added. The LOESS curve approximates the original sine wave. http://en.wikipedia.org/wiki/local_regression Local regression
More informationInternational Journal of Mathematical Archive-7(9), 2016, Available online through ISSN
International Journal of Mathematical Archive-7(9), 2016, 189-194 Available online through wwwijmainfo ISSN 2229 5046 TRIPLE CONNECTED COMPLEMENTARY ACYCLIC DOMINATION OF A GRAPH N SARADHA* 1, V SWAMINATHAN
More informationA Keypoint Descriptor Inspired by Retinal Computation
A Keypoint Descriptor Inspired by Retinal Computation Bongsoo Suh, Sungjoon Choi, Han Lee Stanford University {bssuh,sungjoonchoi,hanlee}@stanford.edu Abstract. The main goal of our project is to implement
More informationOPTIMIZING CHEMICAL SENSOR ARRAY SIZES
OPTIMIZING CHEMICAL SENSOR ARRAY SIZES G. C. Osbourn, R. F. Martinez, J. W. Bartholomew, W. G. Yelton, A. J. Ricco* Sandia National Laboratories, Albuquerque, NM 87 185-1423, "ACLARA Biosciences, Inc.,
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationInterference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting
More informationLine Segment Based Watershed Segmentation
Line Segment Based Watershed Segmentation Johan De Bock 1 and Wilfried Philips Dep. TELIN/TW07, Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium jdebock@telin.ugent.be Abstract. In this
More informationLocally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling
Locally Weighted Least Squares Regression for Image Denoising, Reconstruction and Up-sampling Moritz Baecher May 15, 29 1 Introduction Edge-preserving smoothing and super-resolution are classic and important
More informationConstructive floorplanning with a yield objective
Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu
More informationDisjoint directed cycles
Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint
More informationSAR SURFACE ICE COVER DISCRIMINATION USING DISTRIBUTION MATCHING
SAR SURFACE ICE COVER DISCRIMINATION USING DISTRIBUTION MATCHING Rashpal S. Gill Danish Meteorological Institute, Ice charting and Remote Sensing Division, Lyngbyvej 100, DK 2100, Copenhagen Ø, Denmark.Tel.
More informationClustering Using Graph Connectivity
Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the
More informationImage Quality Assessment Techniques: An Overview
Image Quality Assessment Techniques: An Overview Shruti Sonawane A. M. Deshpande Department of E&TC Department of E&TC TSSM s BSCOER, Pune, TSSM s BSCOER, Pune, Pune University, Maharashtra, India Pune
More informationA Non-Iterative Approach to Frequency Estimation of a Complex Exponential in Noise by Interpolation of Fourier Coefficients
A on-iterative Approach to Frequency Estimation of a Complex Exponential in oise by Interpolation of Fourier Coefficients Shahab Faiz Minhas* School of Electrical and Electronics Engineering University
More informationA Study on Similarity Computations in Template Matching Technique for Identity Verification
A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical
More informationMotivation. Technical Background
Handling Outliers through Agglomerative Clustering with Full Model Maximum Likelihood Estimation, with Application to Flow Cytometry Mark Gordon, Justin Li, Kevin Matzen, Bryce Wiedenbeck Motivation Clustering
More informationStructural and Syntactic Pattern Recognition
Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent
More informationof Nebraska - Lincoln. Follow this and additional works at:
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, Department of Mathematics Mathematics, Department of 6-1975 POLYGONS HAVE EARS G.H. Meisters University
More informationA Robust Method for Circle / Ellipse Extraction Based Canny Edge Detection
International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 5, May 2015, PP 49-57 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Robust Method for Circle / Ellipse
More informationMatched filters for multispectral point target detection
Matched filters for multispectral point target detection S. Buganim and S.R. Rotman * Ben-Gurion University of the Negev, Dept. of Electro-optical Engineering, Beer-Sheva, ISRAEL ABSRAC Spectral signatures
More informationA Probabilistic Approach to the Hough Transform
A Probabilistic Approach to the Hough Transform R S Stephens Computing Devices Eastbourne Ltd, Kings Drive, Eastbourne, East Sussex, BN21 2UE It is shown that there is a strong relationship between the
More informationExtracting the Range of cps from Affine Typing
Extracting the Range of cps from Affine Typing Extended Abstract Josh Berdine, Peter W. O Hearn Queen Mary, University of London {berdine, ohearn}@dcs.qmul.ac.uk Hayo Thielecke The University of Birmingham
More informationMRF Based LSB Steganalysis: A New Measure of Steganography Capacity
MRF Based LSB Steganalysis: A New Measure of Steganography Capacity Debasis Mazumdar 1, Apurba Das 1, and Sankar K. Pal 2 1 CDAC, Kolkata, Salt Lake Electronics Complex, Kolkata, India {debasis.mazumdar,apurba.das}@cdackolkata.in
More informationGeometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1.
Discrete Comput Geom 18:455 462 (1997) Discrete & Computational Geometry 1997 Springer-Verlag New York Inc. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope
More informationAn Eternal Domination Problem in Grids
Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger
More informationLecture 2 - Introduction to Polytopes
Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.
More informationAssessing the Quality of the Natural Cubic Spline Approximation
Assessing the Quality of the Natural Cubic Spline Approximation AHMET SEZER ANADOLU UNIVERSITY Department of Statisticss Yunus Emre Kampusu Eskisehir TURKEY ahsst12@yahoo.com Abstract: In large samples,
More informationIntegral Cryptanalysis of the BSPN Block Cipher
Integral Cryptanalysis of the BSPN Block Cipher Howard Heys Department of Electrical and Computer Engineering Memorial University hheys@mun.ca Abstract In this paper, we investigate the application of
More informationDetecting Salient Contours Using Orientation Energy Distribution. Part I: Thresholding Based on. Response Distribution
Detecting Salient Contours Using Orientation Energy Distribution The Problem: How Does the Visual System Detect Salient Contours? CPSC 636 Slide12, Spring 212 Yoonsuck Choe Co-work with S. Sarma and H.-C.
More informationAdaptive Doppler centroid estimation algorithm of airborne SAR
Adaptive Doppler centroid estimation algorithm of airborne SAR Jian Yang 1,2a), Chang Liu 1, and Yanfei Wang 1 1 Institute of Electronics, Chinese Academy of Sciences 19 North Sihuan Road, Haidian, Beijing
More informationLearning to Segment Document Images
Learning to Segment Document Images K.S. Sesh Kumar, Anoop Namboodiri, and C.V. Jawahar Centre for Visual Information Technology, International Institute of Information Technology, Hyderabad, India Abstract.
More informationThe Geometry of Carpentry and Joinery
The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose
More informationNeuro-fuzzy admission control in mobile communications systems
University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University
More informationMultiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku
Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Todd K. Moon and Jacob H. Gunther Utah State University Abstract The popular Sudoku puzzle bears structural resemblance to
More informationA Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase
More informationMathematically Rigorous Software Design Review of mathematical prerequisites
Mathematically Rigorous Software Design 2002 September 27 Part 1: Boolean algebra 1. Define the Boolean functions and, or, not, implication ( ), equivalence ( ) and equals (=) by truth tables. 2. In an
More informationPedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016
edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract
More informationMathematics of networks. Artem S. Novozhilov
Mathematics of networks Artem S. Novozhilov August 29, 2013 A disclaimer: While preparing these lecture notes, I am using a lot of different sources for inspiration, which I usually do not cite in the
More informationThe Perils of Unfettered In-Sample Backtesting
The Perils of Unfettered In-Sample Backtesting Tyler Yeats June 8, 2015 Abstract When testing a financial investment strategy, it is common to use what is known as a backtest, or a simulation of how well
More informationReliable Communication using Packet Coding for Underwater Acoustic Channels
Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu
More informationAdaptive Quantization for Video Compression in Frequency Domain
Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani
More informationApplication of QNA to analyze the Queueing Network Mobility Model of MANET
1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:
More informationComputational Statistics and Mathematics for Cyber Security
and Mathematics for Cyber Security David J. Marchette Sept, 0 Acknowledgment: This work funded in part by the NSWC In-House Laboratory Independent Research (ILIR) program. NSWCDD-PN--00 Topics NSWCDD-PN--00
More informationTexture Segmentation by Windowed Projection
Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw
More informationUse of Multi-category Proximal SVM for Data Set Reduction
Use of Multi-category Proximal SVM for Data Set Reduction S.V.N Vishwanathan and M Narasimha Murty Department of Computer Science and Automation, Indian Institute of Science, Bangalore 560 012, India Abstract.
More informationAn Empirical Comparison of Spectral Learning Methods for Classification
An Empirical Comparison of Spectral Learning Methods for Classification Adam Drake and Dan Ventura Computer Science Department Brigham Young University, Provo, UT 84602 USA Email: adam drake1@yahoo.com,
More information129 (2004) MATHEMATICA BOHEMICA No. 4, , Liberec
129 (2004) MATHEMATICA BOHEMICA No. 4, 393 398 SIGNED 2-DOMINATION IN CATERPILLARS, Liberec (Received December 19, 2003) Abstract. A caterpillar is a tree with the property that after deleting all its
More informationEffective Memory Access Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time Management
International Journal of Computer Theory and Engineering, Vol., No., December 01 Effective Memory Optimization by Memory Delay Modeling, Memory Allocation, and Slack Time Management Sultan Daud Khan, Member,
More informationLocating 1-D Bar Codes in DCT-Domain
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449
More informationDevelopment of Time-Dependent Queuing Models. in Non-Stationary Condition
The 11th Asia Pacific Industrial Engineering and Management Systems Conference Development of Time-Dependent Queuing Models in Non-Stationary Condition Nur Aini Masruroh 1, Subagyo 2, Aulia Syarifah Hidayatullah
More informationOn the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling
International Journal of Performability Engineering Vol. 9, No. 2, March 2013, pp. 123-132. RAMS Consultants Printed in India On the Role of Weibull-type Distributions in NHPP-based Software Reliability
More informationAdapting Mixed Workloads to Meet SLOs in Autonomic DBMSs
Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca
More informationSandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing
Generalized Additive Model and Applications in Direct Marketing Sandeep Kharidhi and WenSui Liu ChoicePoint Precision Marketing Abstract Logistic regression 1 has been widely used in direct marketing applications
More informationFast 3D Mean Shift Filter for CT Images
Fast 3D Mean Shift Filter for CT Images Gustavo Fernández Domínguez, Horst Bischof, and Reinhard Beichel Institute for Computer Graphics and Vision, Graz University of Technology Inffeldgasse 16/2, A-8010,
More informationClassification of Multispectral Image Data by Extraction and Classification of Homogeneous Objects
Classification of Multispectral Image Data by Extraction and Classification of Homogeneous Objects R. L. KETTIG AND D. A. LANDGREBE, SENIOR MEMBER, IEEE Copyright (c) 1976 Institute of Electrical and Electronics
More informationOff-Line and Real-Time Methods for ML-PDA Target Validation
Off-Line and Real-Time Methods for ML-PDA Target Validation Wayne R. Blanding*, Member, IEEE, Peter K. Willett, Fellow, IEEE and Yaakov Bar-Shalom, Fellow, IEEE 1 Abstract We present two procedures for
More informationBounds on the signed domination number of a graph.
Bounds on the signed domination number of a graph. Ruth Haas and Thomas B. Wexler September 7, 00 Abstract Let G = (V, E) be a simple graph on vertex set V and define a function f : V {, }. The function
More informationIncompatibility Dimensions and Integration of Atomic Commit Protocols
The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer
More informationJoint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading
Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara
More informationUsing the Kolmogorov-Smirnov Test for Image Segmentation
Using the Kolmogorov-Smirnov Test for Image Segmentation Yong Jae Lee CS395T Computational Statistics Final Project Report May 6th, 2009 I. INTRODUCTION Image segmentation is a fundamental task in computer
More informationOn the performance of turbo codes with convolutional interleavers
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 5 On the performance of turbo codes with convolutional interleavers Sina
More informationLogic and Computation
Logic and Computation From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world. This is
More informationAdaptive Linear Programming Decoding of Polar Codes
Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar
More informationOPTIMIZATION, OPTIMAL DESIGN AND DE NOVO PROGRAMMING: DISCUSSION NOTES
OPTIMIZATION, OPTIMAL DESIGN AND DE NOVO PROGRAMMING: DISCUSSION NOTES MILAN ZELENY Introduction Fordham University, New York, USA mzeleny@fordham.edu Many older texts, with titles like Globally Optimal
More informationMulticast Transport Protocol Analysis: Self-Similar Sources *
Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,
More informationLight Field Occlusion Removal
Light Field Occlusion Removal Shannon Kao Stanford University kaos@stanford.edu Figure 1: Occlusion removal pipeline. The input image (left) is part of a focal stack representing a light field. Each image
More informationSamuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR
Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report
More informationRadar Target Identification Using Spatial Matched Filters. L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory
Radar Target Identification Using Spatial Matched Filters L.M. Novak, G.J. Owirka, and C.M. Netishen MIT Lincoln Laboratory Abstract The application of spatial matched filter classifiers to the synthetic
More informationCLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS
CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:
More informationA COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY
A COMPARISON OF WAVELET-BASED AND RIDGELET- BASED TEXTURE CLASSIFICATION OF TISSUES IN COMPUTED TOMOGRAPHY Lindsay Semler Lucia Dettori Intelligent Multimedia Processing Laboratory School of Computer Scienve,
More informationIndependence Number and Cut-Vertices
Independence Number and Cut-Vertices Ryan Pepper University of Houston Downtown, Houston, Texas 7700 pepperr@uhd.edu Abstract We show that for any connected graph G, α(g) C(G) +1, where α(g) is the independence
More informationHow Much Logic Should Go in an FPGA Logic Block?
How Much Logic Should Go in an FPGA Logic Block? Vaughn Betz and Jonathan Rose Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario, Canada M5S 3G4 {vaughn, jayar}@eecgutorontoca
More informationDigital Image Processing. Prof. P. K. Biswas. Department of Electronic & Electrical Communication Engineering
Digital Image Processing Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Image Enhancement Frequency Domain Processing
More informationDesign of Orthogonal Graph Wavelet Filter Banks
Design of Orthogonal Graph Wavelet Filter Banks Xi ZHANG Department of Communication Engineering and Informatics The University of Electro-Communications Chofu-shi, Tokyo, 182-8585 JAPAN E-mail: zhangxi@uec.ac.jp
More informationContrast adjustment via Bayesian sequential partitioning
Contrast adjustment via Bayesian sequential partitioning Zhiyu Wang, Shuo Xie, Bai Jiang Abstract Photographs taken in dim light have low color contrast. However, traditional methods for adjusting contrast
More informationImage Restoration by Revised Bayesian-Based Iterative Method
ADVCOMP 2011 : The Fifth International Conference on Advanced Engineering Computing and Applications in Sciences Image Restoration by Revised Bayesian-Based Iterative Method Sigeru Omatu, Hideo Araki Osaka
More informationCharacterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs
ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha
More informationFPGA Implementation of a Nonlinear Two Dimensional Fuzzy Filter
Justin G. R. Delva, Ali M. Reza, and Robert D. Turney + + CORE Solutions Group, Xilinx San Jose, CA 9514-3450, USA Department of Electrical Engineering and Computer Science, UWM Milwaukee, Wisconsin 5301-0784,
More information