Professional Documents
Culture Documents
INTRODUCTION
In some of our radar range equation problems we looked at finding the
detection range based on SNRs of 13 and 20 dB. We now want to develop some
of the theory that explains the use of these particular SNR values. More
specifically, we want to examine the concept of detection probability, PD . Our
need to study detection from a probabilistic perspective stems from the fact that
the signals we deal with are noise-like. From our studies of RCS we found that,
in practice, the signal return looks random. In fact, Swerling has convinced us
that we should use statistical models to represent target signals. Also, in
addition to the target signal we found that the signals in the radar contain a
noise component, which also needs to be dealt with using the concepts of
random variables, random processes and probabilities.
To develop the requisite equations for detection probability we need to
develop a mathematical characterization of the target signal, the noise signal
and the target-plus-noise signal at various points in the radar. From the above,
we will use the concepts of random variables and random processes to
characterize these quantities. We start with a characterization of noise and
then progress to the target and target-plus-noise signals.
NOISE IN RECEIVERS
We will characterize noise for the two most common types of receiver
implementations. The first receiver configuration is illustrated in Figure 1 and
it termed the IF representation. In this representation, both the matched filter
and the signal processor are implemented at some intermediate frequency, or
IF. The second receiver configuration is illustrated in Figure 2 and is termed
the baseband representation. In this configuration, the signal processing is
implemented at baseband. The IF configuration is common to older radars and
the baseband representation is common to more modern radars that use digital
signal processing.
( t ) cos ( wIF t -
n IF ( t ) = Nφ ( t) ) (1)
©2005 M. C. Budge, Jr 1
where n IF ( t ) n ( t ) , N ( t ) and φ ( t ) are random processes. If we expand (1) using
trig identities we get
n IF ( t ) = Nφ
( t ) cos ( t ) cosNwIF t + φ( t ) sin ( t ) sin w IF t
(2)
= n I ( t ) cos wIF t + n Q ( t ) sin w IF t
1
f n I ( n ) = f nQ ( n ) =
2
2s 2
e-n . (3)
s 2p
We will now show that N ( t ) is Rayleigh and φ ( t ) is uniform on ( -p , p ] . We
r = x2 + y2 (4)
and
�y �
φ = tan -1 � �, (5)
�x �
where tan ( y x ) denotes the four-quadrant arctangent, then the joint density
-1
�f �
f rφ ( r, f ) = rf xy ( r cos f , r sin f ) U ( r ) rect � �. (6)
�2p �
In our case x = n I , y = nQ , r = N and φ = φ . Thus, we have
N = n 2I + nQ2 (7)
�n �
φ = tan -1 � Q � (8)
�n I �
and
1
E.g. Papoulis, A. “Probability, Random Variables, and Stochastic Processes” McGraw-Hill
©2005 M. C. Budge, Jr 2
�f �
f Nφ ( N , f ) = Nf n I nQ ( N cos f , N sin f ) U ( N ) rect � �. (9)
�2p �
Now, since n I and nQ are independent, Gaussian and zero-mean with equal
variance
� 1 � 1
� �
f n I nq ( nI , nQ ) = f n I ( n I ) f nQ ( nQ ) = �
2
2s 2 - n2 2s 2
e - nI �
� e Q �
�s 2p �
�s 2p �. (10)
1 - ( n + n ) 2s
2 2 2
e I Q
2ps 2
N -( N 2 cos2 f + N 2 sin 2 f ) 2s 2 �f �
f Nφ ( N , f ) = e U ( N ) rect � �
2ps 2 �2p �
. (11)
N -N2 �f �
= e 2s 2
U ( N ) rect � �
2ps 2 �2p �
From random variable theory, we can find the marginal density from the joint
density by integrating with respect to the variable we want to eliminate. Thus,
� N -N2
f N ( N ) = �f Nφ ( N , f ) df = e 2s 2
U( N) (12)
-� s2
and
� 1 �f �
f φ ( f ) = �f Nφ ( N , f ) dN = rect � �. (13)
-� 2p �2p �
This proves the assertion that N ( t ) is Rayleigh and φ ( t ) is uniform on ( -p , p ] .
{
PnIF = E { n 2IF ( t ) } = E ( n I ( t ) cos wIF t + nQ ( t ) sin w IF t )
2
}
= E { n 2I ( t ) cos 2 wIF t} + E { nQ2 ( t ) sin 2 wIF t}
(15)
+ 2 E { n I ( t ) nQ ( t ) cos wIF t sin wIF t}
=s2
©2005 M. C. Budge, Jr 3
In (15), the term on the third line is zero because n I = n I ( t ) t = t1
and nQ = nQ ( t ) t = t1
�1 1 �
PnB = E { n B ( t ) n*B ( t ) } = E � ( n I ( t ) + jnQ ( t ) ) ( n I ( t ) - jn Q ( t ) ) �
�2 2
1 1 . (17)
= E { n 2I ( t ) } + E { nQ2 ( t ) }
2 2
= s = PnIF
2
N( t)
nB ( t ) = e jφ( t ) (18)
2
where
©2005 M. C. Budge, Jr 4
N ( t ) = n 2I ( t ) + nQ2 ( t ) (19)
and
�n ( t ) �
φ ( t ) = tan -1 � Q �. (20)
�n I ( t ) �
It will be noted that the definitions n I ( t ) . nQ ( t ) , N ( t ) and φ ( t ) are consistent
between the IF and baseband representations. This means that both
representations are equivalent in terms of the statistical properties of the noise.
We will reach the same conclusion for the signal. The ramifications of this are
that the detection and false alarm performance of both types of receiver/signal
processor configurations will be the same. Thus the future detection and false
alarm probability equations that we derive will be applicable to either receiver
configuration.
It should be noted that, if the receiver you are analyzing is not of one of
the two forms indicated above, the ensuing detection and false alarm
probability equations may not be applicable to it. The most notable exception
to the two representations above is the case where the receiver uses only the I
or Q channel in baseband processing. While this is not a common receiver
configuration, it is sometimes used. In this case, one would need to derive a
different set of detection and false alarm probability equations that would be
specifically applicable to the configuration.
SIGNAL IN RECEIVERS
We now want to turn our attention to developing a representation of the
signals at the output of the signal processor of the receiver. Consistent with the
noise case, we want to consider both IF and baseband receiver configurations.
Thus, for our analyses we will use Figures 1 and 2 but replace n ( t ) with s ( t ) ,
N ( t ) with S ( t ) , φ ( t ) with θ ( t ) , n I ( t ) with s I ( t ) and nQ ( t ) with sQ ( t ) .
We will need to develop three signal representations: one for SW0/SW5
targets, one for SW1/SW2 targets and one for SW3/SW4 targets. We have
already acknowledged that the SW1 through SW4 target RCS models are
random process models. To be consistent, and consistent with what happens
in an actual radar, we will also use a random process model for the SW0/SW5
target RCS.
Since the target RCS models are random processes we must also
represent the target voltage signals in the radar (henceforth termed the target
signal) as random processes. To that end, the IF representation of the target
signal is
s IF ( t ) = Sθ( t ) cos ( swIF t - ( t ) ) = sI ( t ) cos wIF t + Q ( t ) sin wIF t (21)
where
©2005 M. C. Budge, Jr 5
s I ( t ) = Sθ( t ) cos ( t) (22)
and
sQ ( t ) = Sθ( t ) sin ( t) . (23)
It will be noted that both of the signal models are consistent with the noise
voltage model of the previous sections.
θ = θ( t) t = t1
are independent.2
At this point we need to develop separate signal models for the different
types of targets because the signal amplitude fluctuations, S ( t ) , of each are
governed by different models.
SW0/SW5
For the SW0/SW5 target case we assume that the target RCS is
constant. This means that the target power, and thus the target signal
amplitude, will be constant. This means that we let
S( t) = S . (26)
2
We have made a large number of assumptions concerning the statistical properties of the signal
and noise. A natural questions is: Are the assumptions reasonable? The best answer to this
question is that we design radars so that the assumptions are satisfied. In particular, we
endeavor to make the receiver and signal processor linear. Because of this and the central limit
theorem, we can reasonable assume that n I ( t ) and n Q ( t ) are Gaussian. Further, if we enforce
reasonable constraints on the bandwidth of receiver components we can reasonable assume the
independence requirements. The stationarity requirements are easily satisfied if we assume that
the receiver gains don’t change with time. We enforce the zero-mean assumption by using
bandpass processes to eliminate DC components. For signals, we won’t need the Gaussian
requirement. However, we will need the stationarity, zero-mean and other requirements. These
are usually satisfied for signals based on the same assumptions as for noise and by the
requirement that the target RCS is a stationary process and that φ ( t ) is uniform on ( -p , p ] and
is wide-sense stationary. Both of the latter assumptions are valid for practical radars and
targets.
©2005 M. C. Budge, Jr 6
also random variables (rather than random processes). s IF ( t ) is a random
process because of the presence of the wIF t term.
The density functions of s I and sQ are the same and are given by
1 �s �
f sI ( s ) = f sQ ( s ) = rect � �. (28)
p S -s 2
�2 S �
2
We note that the random variables s I and sQ are not independent since they
are “tied” together through the random variable θ .
The signal power is given by
PsIF = E { sθ {
IF ( t ) } = E ( S cos
2
θ cos wIF t + S sin sin wIF t )
2
}
= S 2 E { cos2 θ} cos 2 wIF t + S 2 E { sin 2 θ} sin 2 wIF t . (29)
2p -p
2
Similarly, we get
1
E { sin 2 θ} = (31)
2
and
E { cos θ sin θ} = 0 . (32)
�1 � 2 �1 � 2 S2
PsIF = S 2 � �cos wIF t + S 2 � �sin wIF t + 2 ( 0 ) S cos wIF t sin wIF t = . (33)
�2 � �2 � 2
From (25) the baseband signal model is
1 S
sB ( t ) = sB =
2
( Q) =
s I + jsθ
2
θ( cos + j sin ). (34)
©2005 M. C. Budge, Jr 7
SW1/SW2
For the SW1/SW2 target case we have already stated that the target RCS
is governed by the density function
1 -s s AV
fσ ( s ) = e U (s ) . (35)
s AV
Since the power is a direct function of the RCS (from the radar range
equations), the signal power at the signal processor output has a density
function that is the same form as (35). That is
1 - p PS
fP ( p ) = e U ( p) (36)
PS
PT GT GR l 2
where PS = s AV (37)
( 4p )
3
R4L
From random variable theory it can be shown that the signal amplitude, S ( t ) ,
is governed by the density function
S - S 2 2 PS
fS ( S ) = e U ( S) . (38)
PS
Which is recognized as a Rayleigh density function. This, combined with the
fact that θ ( t ) in (21) is uniform, and the assumption that S = S ( t ) t = t1
and
θ = θ( t) t = t1
are independent, leads to the interesting observation that the signal
model for a SW1/SW2 target is of the same form as the noise model. That is,
the IF signal model for a SW1/SW2 target is of the form
s IF ( t ) = Sθ( t ) cos ( swIF t - ( t ) ) = sI ( t ) cos wIF t + Q ( t ) sin wIF t (39)
Furthermore, s I = s I ( t ) t = t1
and sQ = sQ ( t ) t = t1
are independent.
{
PsIF = E { s 2IF ( t ) } = E ( s I ( t ) cos wIF t + sQ ( t ) sin wIF t )
2
}
= E { s 2I ( t ) } cos 2 w IF t + E { sQ2 ( t ) } sin 2 w IF t . (41)
©2005 M. C. Budge, Jr 8
Invoking the independence of s I = s I ( t ) t = t1
and sQ = sQ ( t ) t = t1
and the fact that
s I ( t ) and sQ ( t ) are zero mean and have equal variances of PS leads to the
conclusion that
PsIF = PS . (42)
The baseband representation of the signal is
1 S ( t ) jθ( t )
sB ( t ) =
2
( s I ( t ) + jsQ ( t ) ) =
2
e (43)
where the various terms are as defined above. The power in the baseband
signal representation can be written as
�1 1 �
PsB = E { s B ( t ) s*B ( t ) } = E � ( s I ( t ) + jsQ ( t ) ) ( s I ( t ) - js Q ( t ) ) �
�2 2
(44)
1
( )
= E { s 2I ( t ) } + E { sQ2 ( t ) } = PS
2
as expected.
SW3/SW4
For the SW3/SW4 target case we have already stated that the target RCS
is governed by the density function
4s -2s s AV
fσ ( s ) = e U (s ) . (45)
s AV
2
Since the power is a direct function of the RCS (from the radar range
equations), the signal power at the signal processor output has a density
function that is the same form as (45). That is
4 p -2 p PS
fP ( p ) = e U ( p) (46)
PS2
PT GT GR l 2
where PS = s AV (47)
( 4p )
3
R4L
From random variable theory it can be shown that the signal amplitude, S ( t ) ,
is governed by the density function
2 S 3 - S 2 PS
fS ( S ) = 2 e U ( S) . (48)
PS
Unfortunately, this is about as far as we can carry the signal model
development for the SW3/SW4 case. We can invoke the previous statements
and write
©2005 M. C. Budge, Jr 9
s IF ( t ) = Sθ( t ) cos ( swIF t - ( t ) ) = sI ( t ) cos wIF t + Q ( t ) sin wIF t (49)
and
1 S ( t ) jθ( t )
sB ( t ) =
2
( s I ( t ) + jsQ ( t ) ) =
2
e . (50)
{(
PsIF = E { s2IF ( t ) } = E Sθ( t ) cos ( wIF t - ( t) ) )
2
}
. (51)
1
= PsB = E { s B ( t ) s *
B ( t)} = E { S 2 ( t ) } = PS
2
We will need to deal with the inability to characterize s I ( t ) and sQ ( t ) when we
consider the characterization of signal-plus-noise.
SIGNAL-PLUS-NOISE IN RECEIVERS
Now that we have characterizations for signals and for noise we want to
develop characterizations for the sum of signal and noise. That is, we want to
develop the appropriate density functions for
v ( t) = s( t) + n ( t) . (52)
vB ( t ) = ( sI ( t ) + nI ( T ) ) + j ( sI ( t ) + nI ( t ) )
= v I ( t ) + jv Q ( t )
. (54)
V( t)
= eψ( t )
2
In either representation, the primary variable of interest is the magnitude of the
signal-plus-noise voltage, V ( t ) , since this is the quantity used in computing
detection probability. We will compute the other quantities as needed.
We will begin the development with the easiest case, which is the
SW1/SW2 case, and progress through the SW0/SW5 case to the most difficult,
which is the SW3/SW4 case.
©2005 M. C. Budge, Jr 10
SW1/SW2
For the SW1/SW2 case we found that the real and imaginary parts of
both the signal and noise were zero-mean, Gaussian random processes. Since
Gaussian random processes are relatively easy to work with we will use the
baseband representation to derive the density function of V ( t ) . Since s I ( t )
and n I ( t ) are Gaussian, v I ( t ) will also be Gaussian. Since s I ( t ) and n I ( t )
are zero-mean, v I ( t ) will also be zero-mean. Finally, since s I ( t ) and n I ( t ) are
independent, the variance of v I ( t ) will equal to the sum of the variances of
s I ( t ) and n I ( t ) . That is
s v2 = PS + s 2 . (55)
fvI ( v ) =
1
e
(
- v 2 2 PS +s 2 )
2p ( PS + s 2 )
. (56)
Since s I = s I ( t ) t = t1
, nI = nI ( t ) t = t1
, sQ = s Q ( t ) t = t1
and nQ = nQ ( t ) t = t1
are
mutually independent, v I ( t ) = v I ( t ) t = t1
and v Q ( t ) = vQ ( t ) t = t1
are independent.
This, with the above and our previous discussions of noise and the SW1/SW2
signal model, leads to the observation that V ( t ) is Rayleigh. Thus the density
of V ( t ) is
V -V 2 2( PS +s 2 )
fV ( V ) = e U (V ) . (58)
PS + s 2
SW0/SW5
Since s I ( t ) and sQ ( t ) are not Gaussian for the SW0/SW5 case when we
add them to n I ( t ) and nQ ( t ) the resulting v I ( t ) and v Q ( t ) will not be
Gaussian. This means that directly manipulating v I ( t ) and v Q ( t ) to obtain
the density function of V ( t ) will be difficult. Therefore, we take a different tack
©2005 M. C. Budge, Jr 11
and invoke some properties of joint and marginal density functions.
Specifically, we use
f Vψθ ( V ,y , q ) = f Vψ ( V ,y θ = q ) f θ ( q ) . (59)
We then use
� �
fV ( V ) = ��f ( V ,y ,q ) dy dq
Vψθ (60)
-�-�
to get the density function of V ( t ) . This procedure involves some tedious math
but it is math that can be found in many books on random variable theory.
To execute the derivation we start with the IF representation and write
where we have made use of (27). If we expand (61) and group terms we get
( )1 -� 2s 2
f v I vQ vI , vQ θ = q = e �
� �
�
. (64)
2ps 2
If we invoke the discussions on page 2 (Equations (4), (5) and (6)) we can write
�y �
f Vψ ( V ,y θ = q ) = Vf v I vQ ( V cosy ,V siny θ = q ) U ( V ) rect � �. (65)
�2p �
If we substitute from (64) we get
V ( V cosy + S cos q ) 2 + ( V siny + S sin q ) 2 �
-� �y �
f Vψ ( V ,y θ = q ) =
2s 2
e � �
U ( V ) rect � �. (66)
2ps 2
�2p �
We can manipulate the exponent to yield
©2005 M. C. Budge, Jr 12
V �y �
f Vψ ( V ,y θ = q ) =
V 2 + S 2 + 2VS cos( y -q ) �2s 2
-�
e� �
U ( V ) rect � � (67)
2ps 2
�2p �
Finally we can use
1 �q �
fθ ( q ) = rect � � (68)
2p �2p �
along with (59) to write
V V 2 + S 2 + 2VS cos( y -q ) �2s 2
-� �y � �q �
f Vψθ ( V ,y ,q ) = e � �
U ( V ) rect � �rect � �. (69)
( 2p ) s �2p � �2p �
2 2
�V -( V 2 + S 2 ) 2s 2 �
fV ( V ) = � 2 e U (V ) �
�s �
� � . (70)
1 -2VS cos( y -q ) 2s 2 �y � �q �
dy dq
( 2p ) -��
� e rect � � rect � �
�2p � �2p �
2
�-�
We recognize that the integrand is periodic with a period of 2p and that the
integral is performed over a period. This means that we can evaluate the
integral over any period. Specifically, we will choose the period from q to
2p + q . With this we get
2p +q
1
�y ( S ,V ) = -2VS cos( y -q ) 2 s 2
�e dy . (72)
2p q
©2005 M. C. Budge, Jr 13
�
�V -( V 2 + S 2 ) 2s 2 �� VS ��1 �q � �
fV ( V ) = � 2 e U ( V ) �I 0 � 2 �
� �
rect � � dq �
�s �� s ��2p -� �2p � �
(74)
V � VS �-( V 2 + S 2 ) 2s 2
= 2 I0 � 2 �e U (V )
s �s �
where the last step derives from the fact that the integral with respect to q is
equal to one. Equation (74) is the desired result, which is the density function
of V ( t ) .
SW3/SW4
As with the SW0/SW5 case, s I ( t ) and sQ ( t ) are not Gaussian for the
SW3/SW4 case. Thus, when we add them to n I ( t ) and nQ ( t ) the resulting
v I ( t ) and v Q ( t ) will not be Gaussian. This means that directly manipulating
v I ( t ) and v Q ( t ) to obtain the density function V ( t ) will be difficult. Based on
our experience with the SW0/SW5 signal, we will again use the
joint/conditional density approach. In this case we note that the if signal-plus-
noise voltage is given by
v IF ( t ) = Sθ( t ) cos ( N
wIF t - ( t ) ) + φ( t ) cos ( wIF t - ( t ) )
. (75)
( t ) cos ( wIF t -
= Vψ ( t) )
In this case we will need to find the joint density of V ( t ) , S ( t ) , ψ ( t ) and θ ( t )
and perform the appropriate integration to get the marginal density of V ( t ) .
More specifically, we will find
f VSψθ ( V , S ,y ,q ) = f Vψ ( V ,y θ = q , S = S ) f Sθ ( S ,q ) (76)
and
� � �
fV ( V ) = ���f ( V , S ,y ,q ) dy dq dS .
VSψθ (77)
-�-�-�
�2 S 3 2 �
�1 �q ��
f Sθ ( S , q ) = f S ( S ) f θ ( q ) = � 2 e - S PS U ( S ) �
� rect � � �. (79)
�PS �2p
� �2p �
�
If we substitute (78) and (79) into (76) we get
©2005 M. C. Budge, Jr 14
V V 2 + S 2 + 2VS cos( y -q ) �2s 2
-� �y �
f VSψθ ( V , S ,y , q ) = e � �
U ( V ) rect � �
2ps 2
�2p �
. (80)
�2 S 3 - S 2 PS �
�1 �q �
�
�� 2 e U ( S) �
� rect � �
�
�PS �2p
� �2p �
�
From (77) we can write
V -V 2 �� 2 S 3 -a S 2 �
fV ( V ) = e 2s 2
�� 2 e �yq ( S ,V ) U ( S ) ds �
U (V ) (81)
s2 � P
-� S �
where
1 1
a= + (82)
PS 2s 2
and
� �
1 �y � �q �
�yq ( S ,V ) = -2VS cos( y -q ) 2s 2
dy dq .
( 2p ) ��e rect � rect �
� � (83)
�2p � �2p
2
-�-� �
We recognize (83) as the same double integral of (70). Thus, using the work
from pages 13 and 14 we get
VS �
�
�yq ( S ,V ) = �y ( S ,V ) = I 0 � 2 � (84)
�s �
and
V -V 2 �� 2 S 3 -a S 2 �
VS � �
fV ( V ) = e 2s 2
�� 2 e I 0 � 2 � U ( S ) ds �
U (V )
s2 �-�
PS �s � �
�
. (85)
V � VS � �
2 S 3 -a S 2 �
U (V )
2
2s 2
= 2 e -V
s �
�
�0
P S
2
e I0 � 2 �
�s �
ds �
�
To complete the calculation of f V ( V ) we must compute the integral
�
s 3e -a s I 0 ( b s ) ds
2
�= 2 � (86)
0
where
b =V s2 . (87)
It turns out that Maple was able to compute the integral as
1 � b 2 �b 2 4a
�= 2 �
1+ e . (88)
a � 4a � �
With this f V ( V ) becomes
©2005 M. C. Budge, Jr 15
2V -V 2 �1 � b 2 �b 2 �
fV ( V ) = e 2s 2
1+
�2 � �e 4a
U (V )
� (89)
PS2s 2 �a � 4a � �
which, after manipulation can be written as
2V � 2 PSV 2 �-V 2 ( 2s 2 + PS )
fV ( V ) = 2s +
� �e U (V ) . (90)
( 2s 2
+ PS )
2
�
� ( 2s 2
+ PS ) �
�
Now that we have completed the characterization of noise, signal and
signal-plus-noise we are ready to attack the detection problem.
DETECTION PROBABILITY
A functional block diagram of the detection process is illustrated in
Figure 3. It consists of a magnitude detector and a threshold. The magnitude
detector determines the magnitude of the signal coming from the signal
processor and the threshold is a binary decision that outputs a detection signal
if the signal magnitude is above some threshold or a no-detection if the signal
magnitude is below the threshold.
©2005 M. C. Budge, Jr 16
Figure 4 – IF and Baseband Detectors – Linear and Square Law
For the linear detector the output will be N ( t ) when only noise is present at the
signal processor output and V ( t ) when signal-plus-noise is present at the
signal processor output.
©2005 M. C. Budge, Jr 17
Pd - detection probability = P ( V �T target present ) (91)
and
where V = V ( t ) t = t1
is the signal-plus-noise voltage evaluated at a specific time
and N = N ( t ) t = t1
is the noise voltage evaluated at a specific time. This carries
some subtle implications. First, when one finds detection probability it is
tacitly assumed that the target return is present at the time the output of the
threshold device is checked. Likewise, when one finds false alarm probability it
is tacitly assumed that the target return is not present at the time the output of
the threshold device.
In practical applications it is more appropriate to say: At the time the
output of the threshold device is checked the probability that there will be a
threshold crossing is equal to Pd if the signal contains a target signal and Pfa if
the signal does not contain a target signal. In typical applications the output of
the threshold device will be checked at times separated by a pulse width and
will result in many checks per PRI.
It will be noted that the above probabilities are conditional probabilities.
In normal practice we don’t explicitly use the conditioning and write
Pd = P ( V ( t ) �T ) (93)
and
Pfa = P ( N ( t ) �T ) (94)
and recognize that we should use signal-plus-noise when we assume the target
is present and noise only when we assume that the target is not present.
The above assumes that the detector preceding the threshold device is a
linear detector. If the detector is a square law detector the appropriate
equations would be
Pd = P ( V 2 ( t ) �T 2 ) (95)
and
Pfa = P ( N 2 ( t ) �T 2 ) . (96)
and
©2005 M. C. Budge, Jr 18
� �
f N ( n ) dn or Pfa =
Pfa = � �f ( n ) dn
N2
(98)
T T2
In the above T is the threshold voltage level and T 2 is the threshold expressed
as normalized power.
To avoid having to use two sets of Pd and Pfa equations we will digress to
show that we can compute them using either of the integrals of (97) and (98).
In homework 7 you showed that if x = y then
f x ( x ) = 2 xf y ( x 2 ) . (99)
If we write
�
f V ( v ) dv
Pd = � (100)
T
Pd = � 2vf V2 ( v 2 ) dv .
f V ( v ) dv = � (101)
T T
f V ( v ) dv =
Pd = � �f ( x ) dx .
V2
(102)
T T2
Similar results apply to Pfa and indicate that one can use either form to
compute detection and false alarm probability.
If we examine the equations for Pd and Pfa we note that both are
integrals over the same limits. This integration is illustrated graphically in
Figure 5. It will be noted that Pd and Pfa are areas under their respective
density functions to the right of the threshold value. Thus, increasing the
threshold decreases the probabilities and decreasing the threshold increases
the probabilities. This is not exactly what we want. Ideally, we want to select
the threshold so that we have Pfa = 0 and Pd = 1 . However this is not possible
and we therefore usually choose the threshold as some sort of tradeoff between
Pd and Pfa . In fact, what we actually do is choose the threshold to achieve a
certain Pfa and find other means of increasing Pd . If we refer to (12) the only
parameter that affects f N ( n ) is the noise power, s 2 . While we have some
control over this via noise figure and effective noise bandwidth, executing this
control can be very expensive. On the other hand, f V ( v ) is dependent upon
both PS and s 2 . Thus, this gives us some degree of control. In fact, what we
©2005 M. C. Budge, Jr 19
usually try to do is affect both f N ( n ) and f V ( v ) by increasing PS and
decreasing s 2 . The net result of this is that we try to maximize SNR.
T2
TNR = (104)
2s 2
as the threshold-to-noise ratio. As indicated earlier, we usually select a desired
Pfa and, from this derive the required TNR as
©2005 M. C. Budge, Jr 20
Pd =
1
2
(
1 - erf ( TNR - SNR ))
�
( ) �.
2
- ( TNR - SNR ) (106)
2
PS S2
SNR = = (107)
s 2 2s 2
is the signal-to-noise ratio that one would compute from the radar range
equation and
x
2
erf ( x ) = �
e -u2
du (108)
p 0
and
In (109) and (110) SNR is the signal-to-noise ratio computed from the radar
range equation.
Figure 6 contains plots of Pd versus SNR for the three target types with
Pfa = 10-6 , a typical value. It is interesting to note the Pd behavior for the three
target types. In general, the SW0/SW5 target provides the largest Pd for a given
SNR, the SW1/SW2 target provides the lowest Pd and the SW3/SW4 is
somewhere between the other two. With some thought this makes sense. For
the SW0/SW5 target model the only thing affecting a threshold crossing is the
noise (since the RCS of the target is constant). For the SW1/SW2 the target
RCS can fluctuate considerably, thus both noise and RCS fluctuation affects
the threshold crossing. The standard assumption for the SW3/SW4 model is
that it consists of a predominant (presumably constant RCS) scatterer and
several smaller scatterers. Thus, the threshold crossing for the SW3/SW4
target is affected somewhat by RCS fluctuation, but not to the extent of the
SW1/SW2 target.
-6
It is interesting to note that the SNR required for Pd = 0.5 , with Pfa = 10 ,
on a SW1/SW2 target is about 13 dB. This same SNR gives a Pd = 0.9 on a
©2005 M. C. Budge, Jr 21
SW0/SW5 target. To obtain a Pd = 0.9 on a SW1/SW2 target requires a SNR of
about 21 dB. These numbers are the origin of the 13 dB and 20 dB SNR
numbers we used in our radar range equation studies.
©2005 M. C. Budge, Jr 22
COMPUTATION OF Pfa
One of the parameters in the detection probability equations is
threshold-to-noise ratio, TNR . As indicated in (105), TNR = - ln Pfa , where Pfa is
the false alarm probability. False alarm probability is set by system
requirements.
In a radar, false alarms result in wasted radar resources (energy,
timeline and hardware) in that every time a false alarm occurs the radar must
expend resources determining that it did, in fact, occur. Said another way,
every time the output of the amplitude detector exceeds the threshold, T , a
detection is recorded. The radar data processor does not know, a priori,
whether the detection is a target detection or the result of noise (i.e. a false
alarm). Therefore, the radar must verify each detection. This usually requires
transmission of another pulse and another threshold check (an expenditure of
time and energy). Further, until the detection is verified, it must be carried in
the computer as a valid target detection (a expenditure of hardware).
In order to minimize wasted radar resources we wish to minimize the
possibility of a false alarm. Said another way, we want to minimize Pfa .
However, we can’t set Pfa to an arbitrarily small value because this will increase
TNR and reduce detection probability, Pd (see (106), (109) and (110)). As a
result we set Pfa to provide an acceptable number of false alarms within a given
time period. This last statement provides the criterion normally used to
compute Pfa . Specifically, one states that Pfa is chosen to provide an average of
one false alarm within a time period that is termed the false alarm time, T fa .
T fa is usually set by some criterion that is driven by radar resource limitations.
tk
Pfa = . (111)
T fa
©2005 M. C. Budge, Jr 23
Figure 3-7 – Illustration of False Alarm Time
©2005 M. C. Budge, Jr 24
a duration, DT , that is less than the PRI, T . In a search radar, DT might be
only slightly less than T . However, for a track radar, DT , may be significantly
less than T . With the above, we can compute the number of range samples per
PRI as
DT
NR = . (113)
t DR
Each of the range samples provides represents a chance that a false alarm will
occur.
In a time period of T fa the radar will transmit
T fa
N pulse = (114)
T
pulses. Thus, the number of range samples (and thus chances for false alarm)
that one has over the time period of T fa is
N fa = N R N pulse . (115)
©2005 M. C. Budge, Jr 25
DT 300 ms
NR = = = 300 . (118)
t DR 1 ms
This results in
N fa = N R N pulse = 300 �5000 = 1.5 �106 (119)
and
1 1
Pfa = = 6
= 6.667 �10-7 . (120)
N fa 1.5 �10
©2005 M. C. Budge, Jr 26