Professional Documents
Culture Documents
Deinterlaving Tezi
Deinterlaving Tezi
Deinterlaving Tezi
Examensarbete 30 hp
19 Mars 2019
Shad Mahmod
Abstract ii
Shad Mahmod
Populärvetenskaplig sammanfattning
Radio detection and ranging (RADAR) är ett system som nyttjar elektromag-
netisk strålning för att kartlägga systemets omgivning. En radar skickar ut
en puls och studerar ekot av pulsen. Beroende på om ett eko uppstår, och
i sådana fall hur lång tid det tagit för ekot att uppstå, kan radarn detektera
objekt i den närliggande miljön samt objektets hastighet och avstånd relativt
radarn. En radar kan utnyttjas för en rad olika ändamål såsom utvinning av
väderleksinformation, geografisk kartläggning av markytor och detektion av
främmande föremål.
En radars ändamål kan uppskattas genom att studera strålningen som den
utsänder. Information om ändamålet kan vara kritisk i lägen med fientliga
enheter i omgivningen. I många fall fungerar radarer genom att sekvensvis
skicka ut pulser av strålning. När en antenn lyssnar efter pulser så detekterar
och registrerar den pulser från alla aktiva enheter i närheten, givet att pulserna
är tillräckligt starka. För att kunna studera miljön och uppskatta hotbilden
måste pulserna sorteras ut så att alla pulser från en viss källa klustras ihop.
I den här rapporten studeras två maskininlärningsmetoder för att sortera
dessa pulser. För båda metoderna studerar olika parametrar av pulserna så-
som deras radiofrekvens och amplitud. Den första, density-based spatial clus-
tering of applications with noise (DBSCAN), letar efter områden med en hög
densitet av pulser. Om den exempelvis detekterar att det förekommer många
pulser med en frekvens kring 10 GHz och en amplitud på -20 dB så klustrar
den ihop dem. En modifikation av DBSCAN föreslås i den här rapporten för
att identifiera källan av en puls i realtid.
Den andra metoden, fuzzy adaptive resonance theory (FART), skapar istäl-
let något som kan liknas vid virtuella pulser. För varje radar metoden tror sig
ha upptäckt, så skapas en virtuell puls med exempelvis en viss radiofrekvens
och amplitud som ska representera alla pulser tillhörande den här radarn. När
en ny puls detekteras så kommer denna puls att jämföras med alla virtuella
pulser och sägas tillhöra den virtuella pulsen som den är mest lik enligt en rad
kriterier. Värdena för den valda virtuella pulsen kommer sedan att uppdat-
eras.
Dessa metoder har studerats genom att evaluera dem på simulerad data.
Metoderna har evaluerats enligt hur väl de löser problemet när antalet radarer
ökar och när indatan har ändrats. Indatan har ändrats dels genom att reglera
vilken information om pulserna som används. Man kan exempelvis välja att
bara utnyttja information om pulsernas amplitud eller utnyttja information
om amplitud och radiofrekvens.
Resultatet visar att den nya föreslagna versionen av DBSCAN är en lämplig
lösning till klustringsproblemet. Vi kartlägger vidare hur både den föreslagna
metoden och FART påverkas av att ändra en rad parametrar samt beräkn-
ingskostnaden av att hantera en ny puls.
iv
Acknowledgements
I would like to thank all the people who have been supporting me in one
way or another throughout my project. My supervisor Rickard Norberg for
his guidance throughout this project and providing me with a deep well of
knowledge in the field of radar. My subject reader, Niklas Wahlström for tak-
ing so much time to read through my project and offering his thoughts and
suggestions to improve it. Without doubt doing much more than he initially
signed up for. My colleagues at Saab (especially Eric, Erik and Gustaf) for
always keeping their door open for discussing the field of machine learning.
Adam for being a great office-mate providing me with motivation and joy at
the workplace!
——————————————————
v
Contents
Abstract ii
Acknowledgements iv
1 Introduction 1
1.1 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2 Radar Theory 3
2.1 Basic Radar Principle . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2 Continuous Wave Radar . . . . . . . . . . . . . . . . . . . . . . . 3
2.3 Pulsed Radar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.3.1 Coherency in Pulsed Radar . . . . . . . . . . . . . . . . . 5
2.3.2 Pulse Width . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3.3 Radio Frequency . . . . . . . . . . . . . . . . . . . . . . . 6
2.3.4 Amplitude . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.5 Angle of Arrival . . . . . . . . . . . . . . . . . . . . . . . 8
2.3.6 Pulse Repetition Interval . . . . . . . . . . . . . . . . . . . 8
2.4 Electronic Warfare . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4 Method 23
4.1 Data Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2 Emitter Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.2.1 Pulse Width . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2.2 Pulse Repetition Interval . . . . . . . . . . . . . . . . . . . 24
4.2.3 Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2.4 Position . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3 Adding Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.4 Distance Function . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.5 Scaling the Features . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.6 Training and Validation Sets . . . . . . . . . . . . . . . . . . . . . 27
4.7 Programming Environment . . . . . . . . . . . . . . . . . . . . . 28
5 Results 29
5.1 DBSCAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.1.1 Parameter Tuning . . . . . . . . . . . . . . . . . . . . . . . 29
5.1.2 Choosing Features . . . . . . . . . . . . . . . . . . . . . . 30
5.1.3 Scaling Features . . . . . . . . . . . . . . . . . . . . . . . . 30
5.1.4 Online DBSCAN . . . . . . . . . . . . . . . . . . . . . . . 30
5.2 FART . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.2.1 Parameter Tuning . . . . . . . . . . . . . . . . . . . . . . . 31
5.2.2 Choosing Features . . . . . . . . . . . . . . . . . . . . . . 32
5.2.3 Scaling Features . . . . . . . . . . . . . . . . . . . . . . . . 32
5.2.4 Online FART . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.3 Comparing DBSCAN and FART . . . . . . . . . . . . . . . . . . 33
5.3.1 Increasing Number of Emitters . . . . . . . . . . . . . . . 34
5.3.2 Predicted Number of Emitters . . . . . . . . . . . . . . . 34
5.3.3 Online Clustering . . . . . . . . . . . . . . . . . . . . . . . 34
6 Discussion 36
6.1 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
6.2 Number of Emitters . . . . . . . . . . . . . . . . . . . . . . . . . . 36
6.3 Trigonometric Features with DBSCAN . . . . . . . . . . . . . . . 36
6.4 Online Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.5 Computational Costs . . . . . . . . . . . . . . . . . . . . . . . . . 37
6.6 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7 Conclusion 39
A Complexities 40
A.1 Fuzzy ART . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
A.2 DBSCAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
A.2.1 Classifying a Batch . . . . . . . . . . . . . . . . . . . . . . 40
A.2.2 Introducing a New Point . . . . . . . . . . . . . . . . . . . 41
Bibliography 43
1
Chapter 1
Introduction
Radio detection and ranging (radar) equipment is used in modern day for a
variety of tasks such as detecting airplanes, mapping surroundings and deter-
mining weather conditions [1]. The basic radar works by transmitting electro-
magnetic waves and listening to the echoes of these waves from the surround-
ing environment. These waves can be transmitted continuously or in pulses
where the radar toggles between transmission and reception. In certain sce-
narios it is of importance to hinder the usage of the electromagnetic spectrum
by hostile units while preserving it for friendly units. Actions taken with this
purpose are termed electronic warfare (EW) [2].
In an environment with active hostile units, the electromagnetic signals
transmitted from these units can give hints about their objectives and what
kind of vessels they are attached to [3]. Detecting the waves that these radars
transmit and analyzing them can therefore provide insight in determining
their threat level. When a unit aims to solve this task, its antenna detects
the signals from several transmitters simultaneously and obtains a superpo-
sition of the pulses that the radars transmit. An example is given in figure 1.1a
where two radars are active. In figure 1.1b the superimposed pulses, as seen
by the receiver, are depicted. As a first step in disentangling the pulses, a fast
Fourier transform can be done to sort the pulses out according to different fre-
quencies but even then, pulses with similar frequencies will be superimposed
on each other. There is no labeling encoded into the data and at first glance
the pulses become indistinguishable in terms of which pulse belongs to which
radar. Furthermore, the superposition of the pulses adds the two first pulses
together. This entanglement of pulse trains is called interleaving [3]. In a real
environment there is noise present as well as the occurrence of both missing
and spurious pulses.
Information regarding an individual pulse such as its time of arrival, pulse
width and amplitude is extracted and stored in a pulse descriptor word. This
information is then used to label each individual pulse such that the pulses
emanating from a certain emitter have the same labels. This task is called dein-
terleaving and to solve this task, one can look at different characteristics of the
pulses such as their amplitude and from which direction they arrived from.
The methods of deinterleaving can generally be split into two subsections.
The first one only looks at the time of arrival of the pulses and tries to find
patterns in how the pulses occur. The sequence search, the pulse searching
and the cumulative difference histogramming algorithms are some examples
of algorithms that only look at the arrival times of the pulses [4]. The second
type of methods, which will be the focus of this project, look at the different
characteristics of the pulses and matches similar pulses to each other. Fuzzy
Adaptive Resonance Theory, Fuzzy Min-Max Clustering and Self-Organizing
Chapter 1. Introduction 2
Feature Mapping are three examples of algorithms that look at different fea-
tures of the pulses and neglect the time of arrival [5].
Detected signals from two pulsed radars Superimposed pulses as seen by the target
Transmission A
Transmission B
Amplitude
Amplitude
Time Time
(a) The antenna detects pulses from (b) The superimposed pulses from fig-
two different sources (dashed and full ure 1.1a. The receiving unit is not
lines). The pulses have the same pulse able to distinguish between which
width but different amplitudes. pulses come from which source at first
glance.
Chapter 2
Radar Theory
c∆t
distance = ,
2
where c is the speed of the electromagnetic wave (≈ 3 × 108 m/s in vacuum)
and the division by 2 is to take into account the fact that the pulse has travelled
to the target and back to the transmitter [1].
A radar needs two basic components, a transmitter and a receiver, in order
to determine the range to an object. The transmitters job is to send out the
signal to the surroundings and the receiver’s job is to pick up the echoes from
the surrounding. The strengths of radar are that the user can detect targets that
are much further away than with visual instruments and that the detection
is less susceptible to weather condition. Beyond detecting target distances,
a radar can be tailored to detect a target’s velocity. This can be utilized to
distinguish moving targets from stationary scenery (e.g. trees and mountains).
Radars are classified into two general types: continuous wave (CW) radar and
pulsed radar. A CW radar transmits a wave at all times and simultaneously
listens for echoes. A pulsed radar transmits EM waves for a short duration
and then listens for echoes after each transmission. Pulsed radars can further
be categorized into non-coherent and coherent radar (see figure 2.1).
Continuous
Continous Pulsed
wave
wave wave
Coherent Non-coherent
rivals the echo. It is undesirable for the receiver to receive the transmitted sig-
nal directly from the antenna since it can interfere with the detection of echoes
and might damage sensitive equipment since the transmitted signal tends to
be several orders of magnitude larger than the echo. CW radars therefore need
some isolation between the transmitter and receiver which will limit the re-
ceiver’s ability to detect pulses. This limitation is one of the main reasons why
pulsed radar is more popular than CW [2].
PW0
PRI0
(a) A pulse (A0 ) is transmitted and an (b) Two indistinguishable pulses (A0 and
echo (B0 ) is received. Assuming that A1 ) are transmitted and an echo (B0 ) is
there are no other transmitters in the received. There is no way for a radar
area, the radar can confidently conclude to determine if B0 is an echo of A0 or
that B0 has arisen due to A0 . A1 . The calculated range could therefore
take on two values and is ambiguous.
After the PRI, the radar will transmit a new pulse. This introduces an am-
biguity if the pulses are similar since the radar cannot tell from which trans-
mitted pulse a detected echo originates from. When transmitting a pulse, there
is a maximum range that the pulse can travel and return from before the radar
transmits another pulse. This range is called the maximum unambiguous range
(ru ) and can be calculated by
c · PRI
ru = .
2
If a target lies beyond this range, the echo will appear to come from the next
pulse transmitted (see figure 2.3) [1]. This problem can be solved for instance
by changing the pulse repetition interval or changing a parameter of each
pulse (e.g. each pulse has its own distinct frequency).
Vr
fD = fO ,
c
Chapter 2. Radar Theory 6
Original wave
Coherent transmission
Amplitude
Non-coherent transmission
Time
F IGURE 2.4: Three categories of radars. In the topmost figure
the radar transmits a continuous wave during the whole time
interval. In the second figure, the coherent radar only transmits
the full, red, lines whereas the dashed lines show what a con-
tinuous wave would have transmitted. The last figure shows
a radar transmitting at the same time intervals as the previous
one. However, here the full lines are not following the dashed
lines in the broadcasting regions, so the radar is non-coherent.
where f D is the change in frequency, Vr is the radial velocity between the trans-
mitter and the target, c is the speed of light and fO is the frequency of the orig-
inal transmission [6]. Since Vr << c, f D is prone to be very small. The phase
difference between the echo and a reference signal, will however be apparent
for the duration of a pulse. By measuring the rate of change of the phase dif-
ference, the frequency shift and thus the relative radial velocity between the
transmitting and receiving units can be obtained [1]. Being able to determine
the velocity is useful for many reasons, one is that the radar can distinguish
between moving targets and stationary targets and can thus choose to neglect
things such as trees and mountains.
Pulse A Pulse A
Pulse B Pulse B
Amplitude
Amplitude
Time Time
(a) The echoes of two pulses, A and B, (b) The two pulses, A and B, are here de-
are depicted. Since the pulse widths picted when their pulse widths are in-
are narrow enough, the pulses are sep- creased.
arated.
2.3.4 Amplitude
The amplitude is calculated by measuring the signal energy. There are differ-
ent ways to do this, two ways is to either set the amplitude to the peak reg-
istered signal energy or to take the mean signal energy of a pulse. The signal
energy, in a setting where there is no loss (e.g. due to atmospheric attenuation
and signal processing), is described by the radar equation
Pavg G2 λ2 σ
Signal energy = , (2.1)
(4π )3 R4
where
G = antenna gain
R = range [m]
λ = wavelength [m]
The signal energy, and thus the amplitude, of the registered signal must be
high enough that the signal can be set apart from background noise. The radar
cross section of the target is a measure of how the area of a target is seen from
the radar of the transmitting vessel and parameters such as the material of the
target and its size [1]. The radar cross section is only of importance for the unit
Chapter 2. Radar Theory 8
that is transmitting. For the target the radar cross section is not of importance
and will not affect the registered pulse. However, the relative position of the
target to the incoming pulses does affect the registered amplitude (e.g. if the
antennas are located under a plane and the pulses are coming from above then
the amplitude is prone to be lower). Other things like blocking obstacles and
clouds can affect the amplitude between pulses.
Target Target
Radar Radar
(a) The environment extracted from the (b) The environment extracted from the
radar when the target does not jam the radar when the target jams the signal by
signal. sending out similar pulses.
Transmission and echo of a pulsed radar Transmission and echo of a pulsed radar
Amplitude
Amplitude
0 0
Time Time
(c) The larger pulse depicts the emitted (d) In this scenario, the target transmits
signal and the smaller pulse depicts the a pulse either before (green) or after (or-
echo from the target. Since the target ange) the transmitted pulse hits the tar-
does not emit any signals, only the "true" get. The radar will detect the true echo
echo will be received and a good esti- and the transmitted pulse but will not be
mate of the targets position can be ex- able to determine which pulse is the true
tracted by the radar. echo. This leads to a positional ambigu-
ity when determining the range
Chapter 3
15
10
Amplitude [dBm]
−5
−10
−15
500 1000 1500 2000 2500 3000 3500
Sample [n]
tect signals and create a pulse descriptor word (PDW) containing information for
Chapter 3. Deinterleaving of Radar Signals 11
each detected pulse. The PDW contains information about the pulse such as
its amplitude, TOA, AOA, PW and frequency. In figure 3.1, if the threshold is
set as is, two pulses will be detected and two PDWs will be retrieved (see table
3.1).
Henceforth a data point will be used to refer a vector containing different in-
formation about a specific pulse. A data set is a set of such points. The different
parameters (frequency, AOA etc.) will be called features.
Processing angles
Angles can be measured in either radians or degrees. Both units are periodical
which causes a problem since the angle is periodic. As an example, consider
the case with an angle of 360◦ = 0◦ . The models will assume that there is a
large discrepancy and assume that a pulse with an angle equal to 0◦ is dif-
ferent from one with 360◦ . In order to solve this problem the AOA is broken
down into two features, sin( AOA) and cos( AOA) (henceforth referred to as
sin/cos).
3.2 Deinterleaving
The purpose of deinterleaving is to extract the correct pulse trains from an en-
vironment of mixed pulses [3]. In other words, the objective is to determine
which pulses are transmitted from the same transmitter. When this is done,
each pulse train can be analyzed separately. This analysis can render infor-
mation regarding the intended usage of the radar from which the pulse train
originates and instantiate countermeasures if a threat is detected.
To distinguish between different pulses, one needs to look at their simi-
larities and differences. There are several approaches to solving this problem
and a general distinction between these methods are a) those who only rely on
temporal data and look for patterns in PRI (henceforth referred to as time of ar-
rival methods) and b) those who disregard temporal data and look for similar-
ities/differences in other features such as AOA, RF and amplitude (henceforth
referred to as non-time of arrival methods).
The strength of these methods is that they are relatively fast since they only
handle one feature (TOA). They are however reliant on there being a pattern in
this feature, meaning that if an emitter changes its PRI frequently the deinter-
leaver will have great difficulties extracting the correct pulse train. Spurious
and missing pulses will further impair the methods’ ability to deinterleave.
Examples of algorithms belonging to this class are the sequence search, the
pulse searching and the cumulative difference histogramming algorithms [7]
[8].
18
Frequency [GHz]
16
14
12
10
90
80
70
−53−52 60 dth
50 i
−51−50 40 e W
Amplit−49
ude−48
30 ul
[dB−47 20 P
] −46 −45
If the pulses from an emitter are identical, then the points will coincide
exactly. As the discrepancy between the pulses increases, the groups formed
by these pulses become less dense and more spread out. The models can be
tailored to work better in such an environment by tuning the parameters (see
chapter 3.6 and 3.8) of the different models to make them more flexible.
If the pulses from two different emitters are very similar in many of the
aspects, they will become increasingly difficult to distinguish from each other.
This problem can be solved to some extent as well with parameter tuning by
making the model less flexible and putting a tighter constraint on how dif-
ferent pulses belonging to a certain pulse train can be. The pulses from an
extracted pulse train will consequently be very similar.
If two pulse trains are extremely similar over all the features, the trans-
mitters themselves will have problems with distinguishing which pulses are
echoes of its own signals and it is thus rare that two radars operate with iden-
tical settings in the same environment.
Chapter 3. Deinterleaving of Radar Signals 14
3.5 Clustering
The deinterleaving task is synonymous with the correct clustering task. Let
Xi = { X1i , X2i , ..., X iM } denote a vector of size M where each X j is one of the pre-
viously mentioned features of the ith registered pulse. Let DS = {X1 , X2 , ..., XP }
be a set of P points, then a clustering C = {C1 , C2 , ..., CN } on DS is the parti-
tioning of DS into N clusters, such that all the points Xi ∈ DS belong to a
cluster Cj ∈ C. Furthermore, each point is assigned to only one cluster.
In the context of deinterleaving, DS is the set of the received pulses where
each Xi corresponds to a received pulse. The task is to create these N clusters
where each cluster corresponds to a pulse train from a specific emitter. Then
each pulse Xi is to be associated to a certain cluster Cj . If the system outputs
the correct clustering, N will be the actual number of pulse trains and each
Xi will be put in the cluster with all the other pulses that came from the same
emitter.
DBSCAN only requires two parameters from the user, e and minPts. It
also allows the user to choose which distance function to use to compute the
distance between two points. e determines the maximum distance that two
Chapter 3. Deinterleaving of Radar Signals 15
points can have from each other and still be regarded as neighbors whereas
minPts determines the number of points that needs to be in the neighborhood
of a point for it to be classified as a core point. A point is either a core point
or a border point where a core point is a point with at least minPts neighbors
within a distance e (see figure 3.5). The algorithm iterates through the points
and identifies clusters by looking for regions with a high density of points.
p
q
F IGURE 3.5: The black circles show the e neighborhood for two
different points, p and q. With minPts = 5, the q is a border
point whereas p is a core point.
3.6.1 minPts-parameter
As previously mentioned the minPts-parameter determines how many neigh-
bors a point Xi must have in order to be labeled as a core point. The higher this
number, the more densely packed must the surrounding of Xi be for it to be a
core point. It is therefore desirable to raise the value of minPts as the signal-
to-noise ratio (SNR) decreases in a setting with white noise since regions with
only noise will be less dense than regions with signals [10].
3.6.2 e-parameter
The e parameter is used to determine whether two points, Xi and X j , are neigh-
bors by determining if e ≥ dist(Xi , X j ) for some distance function. Therefore,
setting the value of e is dependent on the distance function. Schubert et al.
[10] recommend setting e as small as possible.
BORDER POINT
CORE POINTS
Hidden layer F
Output category j
F1 (T
1 ,w
1)
Input sample .
(Ti,wi)
X . arg max{Tj}
j
. )
w N
. ,
(T N
FN
Orienting subsystem
ρ wj
| Xi ∧ w j |
Tj = Tj (Xi , w j , α) = ,
α + |w j |
where α > 0 is the choice parameter that usually is set to a very small value.
Setting it to a small value will increase the tendency of the system to opt for
categories with large w j . ∧ is the fuzzy AND operator that is defined as
for two vectors a and b of size n. For a vector q of size n, |q| represents the L1
norm where
n
|q| = ∑ |qk | .
k =1
The neuron that has the highest Tj is said to be the winning neuron. If two
neurons have the same Tj the one with the smallest j wins. If Tj satisfies the
vigilance criterion
| Xi ∧ w j |
>ρ ; 1 ≥ ρ ≥ 0,
| Xi |
where ρ is called the vigilance parameter, then the weights w j are updated
wnew
j = β(Xi ∧ wold old
j ) + (1 − β )w j
where β ∈ [0, 1] is the learning rate parameter and dictates how fast the net-
works learns. If the chosen Tj does not satisfy the vigilance criterion, a new
node is chosen by taking the next largest T. This process repeats itself until
the vigilance criterion is met and if the criterion is left unsatisfied for all j a
new node q will be committed to represent a new cluster with wq = Xi . Af-
ter having processed all the data points one time, the same data points can be
reintroduced a second time for retraining. The number of epochs is then said
to be 2. Depending on β, the weights change by different amounts from the
previous epoch. This process can be repeated for any number of epochs until
the weights have converged to a constant value. When the β = 1 and the input
is complement encoded, the network will have converged after the first epoch.
The vigilance parameter determines how strict the model is when it comes
to creating new clusters. If the parameter is closer to 0, the model will not be
prone to creating new clusters since the current clusters will likely satisfy the
vigilance criterion and the reverse is true for a high value of ρ.
The computation time for handling a point for this part of the algorithm is
where N is the number of nodes in the F layer and M is the number of features
of the original input. If β = 1 it is reduced to
In the worst-case scenario, each data point renders a new node (i.e. is classified
as its own cluster).
The results obtained with a FART network is deterministic but does vary
with different parameters and are reliant on the order upon which the data is
processed meaning that the FART lacks consistency.
N00 - The pair does not belong to the same cluster in C nor in P
N11 and N00 represent correct pairwise clusterings. The Rand index (RI) is then
computed as [16]
(a) 15 different clusters (all circled in (b) The clustering of the pulses in fig-
dashed lines) are depicted. In each clus- ure 3.8a by randomly labeling the points,
ter there are only three points. rendering 31 unique clusters. Most of the
clusters consist of only one point. The RI
of the clustering is 0.93 and the ARI is -
0.025.
F IGURE 3.8: The real clusters are depicted in figure 3.8a and
the estimated clusters are depicted in 3.8b. There are 45 points
in this setting.
Chapter 4
Method
In order to test the performance of the models according to the ARI (see chap-
ter 3.9.2), the models had to be implemented. A library already existed for the
DBSCAN, so only the proposed online version that can handle new points as
well as the FART network were implemented. Furthermore, the data sets used
to test the chosen models were all simulated. This was done due to the nature
of sensitivity of the data as well as the difficulty of obtaining real labeled data
(i.e. it is easy to gather data but difficult knowing where it comes from). In
this chapter the simulation environment and data generation parameters are
detailed.
The output would then consist of an interleaved pulse train containing the
pulses emitted from the specified emitters (see table 4.2). The software takes
into account the fact that both the antenna and the emitters are moving along
some unique trajectories.
PW = c pw + x pw ,
1 x pw
f ( x pw ; λ pw ) = exp(− ), x pw ≥ 0 , (4.1)
λ pw λ pw
where x PRI is drawn from an exponential distribution using λ PRI (see eq. 4.1)
and c PRI = 10 is constant. Generating the PRI this way ensures that the PW is
1
smaller than the PRI and that the PW is at least a certain fraction ( CPRI ) of the
PRI. Note that the number of PRIs is equal to the number of PWs for a certain
pulse train and that there can be up to nmax different PWs.
Chapter 4. Method 25
+ L V W R J U D P R Y H U W K H J H Q H U D W H G I U H T X H Q F L H V
1 X P E H U R I R F F X U U H Q F H V
) U H T X H Q F \ >