Next Article in Journal
Implementation of Two-Stream Emission Model for L-Band Retrievals on the Tibetan Plateau
Next Article in Special Issue
Target Detection and DOA Estimation for Passive Bistatic Radar in the Presence of Residual Interference
Previous Article in Journal
Mapping Plant Diversity Based on Combined SENTINEL-1/2 Data—Opportunities for Subtropical Mountainous Forests
Previous Article in Special Issue
GMT-WGAN: An Adversarial Sample Expansion Method for Ground Moving Targets Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform

1
The School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen 518107, China
2
The National Key Laboratory of Science and Technology on Information System Security, Beijing 100101, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2022, 14(3), 491; https://doi.org/10.3390/rs14030491
Submission received: 17 November 2021 / Revised: 10 January 2022 / Accepted: 12 January 2022 / Published: 20 January 2022
(This article belongs to the Special Issue Radar High-Speed Target Detection, Tracking, Imaging and Recognition)

Abstract

:
An elliptical Hough transform (EHT) algorithm is proposed in the framework of track-before-detect (TBD) for joint detection and tracking of weak exoatmospheric targets. The new approach exploits the fact that when restricted to a two-body problem, the exoatmospheric target often follows an elliptical orbit, and thus the Hough transform integrated with orbital geometry information would have better detection performance. The relationship between the original radar measurements in data space and the elliptical parameters in parameter space is explicitly derived with multiple steps of coordinate transformation. It is found that the data points mapping into the parameter space essentially represent a quartic curve. An EHT-based algorithm is then designed, and orbit planarity is also taken into account to reduce the effect of noise accumulation. The influences of primary and secondary thresholds and the signal-to-noise ratio (SNR) on the detection performance are compared by simulations. Additionally, a real radar tracking dataset from a scientific satellite on 28 May 2017 is used to investigate the efficiency of the method. By adding some imaginary clutter to the raw orbit, the results indicate that it is very effective in detecting the real satellite trajectory in a low signal-to-noise ratio (SNR) environment. The advantage of the new method lies in it can not only simultaneously detect and track weak exoatmospheric targets but also can predict the trajectory by using these available detected parameters.

Graphical Abstract

1. Introduction

An important issue in the radar tracking community that arouses wide attention is the detection and tracking of weak (dim) targets in very low signal-to-noise ratio (SNR) environments [1,2,3,4,5]. A key difficulty for solving this lies in the inherent relationship between target detection probability and false alarm probability. To achieve a certain value of detection probability sufficient to maintain the track, one must lower the detection threshold, which in effect inevitably increases the false alarm probability. On the other hand, as the false alarm rate increases (due to clutter, jamming, or thermal noise), traditional recursive trackers, e.g., the Kalman filter (KF) combined with some association scheme [6,7], might have degraded tracking accuracy or even lead to track losses due to the appearance of massively and undesirably validated points.
Ballistic target tracking (BTT) is a good example for illustrating this. During the midcourse (exoatmospheric flight), many countermeasures are adopted to improve the survival capability of the reentry vehicles [8]. For instance, applying radar absorbing material (RAM) [9], shaping the surface, releasing chaff [10], and deployment of repeater jammers [11,12,13] are some notable representatives. Among these, stealth techniques, e.g., shaping, and RAM might reduce the radar cross-section (RCS) of the reentry vehicles to a considerably lower level. Typically, the RCS of an X-band cone-shaped warhead can be reduced to a lower bound of 0.0001 m2 or even smaller [8]. When scanning a predetermined large surveillance volume, this will make the radar face a very low SNR environment. In some cases, even with the help of apriori early-warning indications (e.g., handover of the early-warning satellite), the tracking radar still cannot have the capability to find targets of interest in a certain surveillance volume. As a result, the attacker would decrease the range at which the reentry vehicles would be expected to be tracked well by surveillance radar or even lead to frequent loss of its tracks during the exoatmospheric flight.
Instead of awkward working, an alternative way for the victim radar is to employ some sophisticated algorithms, and to change into a track-before-detect (TBD) [14] processing mode, such that the target’s detection and tracking can be made simultaneously at a much greater surveillance range, or at least within the predetermined acquisition range. TBD approaches are quite effective algorithms for detecting weak targets in dense clutter environments in that they process multiple frames of raw data directly instead of single-frame data alone. For TBD processing, the judgment is carried out according to some accumulation metric. When the accumulation parameters are detected, the target tracks are picked up simultaneously. Since the detection is executed in the parameter space, even if the target measurements are not continuous and some points are lost due to signal decay, TBD may still work with a good performance. Therefore, TBD indeed has the advantages of providing a higher probability of detection at the same level of probability of false alarms, while circumventing the troublesome data association problem. TBD has a large family, and many algorithms can fall into this category, such as the Hough transform (HT) [15,16,17,18], maximum likelihood approach (MLA) [19,20], sequential hypothesis testing [21,22], maximum likelihood-probabilistic data association (ML-PDA) [3,4], [23,24], particle filter track-before-detect (PF-TBD) [25,26,27,28,29], 3D matched filtering [30,31], 4D-TBD [32], dynamic programming (DP) [33,34,35], etc. During the past several decades, many extensive studies of TBD have been published in the available literature. Generally, these techniques have some common characteristics. They typically use unthresholded data or thresholded data with significantly lower thresholds and operate on measurement data over several scans in a batch-processing fashion. As a consequence, this usually requires more computational load and has the drawback of not being real-time compared to that of recursive tracking families. Since “a sophisticated software can save sensor hardware” [6], to detect and track low SNR targets at ranges greater than that of a traditional recursive processing mode, it is very important to employ some sophisticated algorithms to extend radar performance under stressful circumstances.
There have been many TBD approaches highlighting detecting weak infrared targets and aircraft targets; however, not many of them have been applied for exoatmospheric applications, especially for those Hough transform ones. The Hough transform is a classical method that has been widely used in radar tracking fields, such as in track initiation [36,37] and joint detection and tracking [15,16,17,18], but very few results have been reported on exoatmospheric applications. The reason partly lies in that the exoatmospheric target often follows a parabolic curve (or more precisely elliptical curve); therefore, the standard Hough transform (SHT) [38] which is intended to detect straight lines, cannot be expected to have better performance. If the accumulation time is sufficiently short, a straight line is a good approximation of an exoatmospheric target trajectory, and the SHT works well. However, it is not the case for long time accumulation (such as the entire midcourse time); in the latter case, the SHT may work badly due to the inherent mismatch of the model. Therefore, one must resort to some innovations wherein the HT can have better detection performance. Note that when restricted to a two-body problem, the motion of an exoatmospheric target is essentially a part of an elliptical orbit, governed by the Keplerian motion equation [39]. What is more natural and rational, as well as practice, is to develop TBD methods specific for exoatmospheric targets that more fully exploit the inherent geometrical or motional characteristics of this kind of object.
The approach we presented is the elliptical Hough transform (EHT) [40]; we extend this algorithm and test it with field data. Since this approach coincides with the theoretical motion model, it is expected that it will have better performance than that of the simple SHT. It must be noted that the EHT we presented differs vastly from those classical ones used in the detection of ellipses in the image processing field, although their names are somewhat similar. For the detection of ellipses in an image, the methods commonly used are the five-dimensional parameter method [41,42], randomized Hough transform (RHT) [43,44], and geometric symmetry method [45,46]. These approaches cannot be directly applied to exoatmospheric applications. For instance, due to the radar line-of-sight limitation, the trajectory of an exoatmospheric target is usually only a part of an elliptical orbit, in contrast to an entire ellipse; therefore, the geometric symmetry method cannot account for this case.
This study is focused on the design of a new Hough detection algorithm. The approach we presented can not only detect a weak reentry vehicle in an earlier midcourse phase but also can predict the orbit with these available detected parameters. More specifically, it has the advantage of the integration of detection, tracking, and prediction capability. Nonetheless, to limit the scope of this investigation, the algorithm should be confined to some hypotheses. One of these hypotheses is the apriori information of early warning, such that the radar can search only limited surveillance space, improve the scan data rate, and reduce the high search dimension of the parameters by a track-while-scan (TWS) mode.
The main contributions of this work are as follows:
(i)
The relationships between the elliptical parameters and the radar raw measurements are established with multiple steps of coordinate transformation. Interestingly, a single data point mapping into the parameter space represents a quartic curve.
(ii)
The EHT detection algorithm is systematically designed, and the planarity of the track is also taken into account to reduce the cumulative effect of noise or clutter.
(iii)
The estimation performances related to the primary and secondary thresholds, measurement error, and SNR are analyzed and verified both by simulations and field data. Thus, a guideline is obtained as to what parameters should be used in similar scenarios.
Specifically, we use the real radar tracking data set of a scientific satellite on the day 28 May 2017 to investigate the efficiency of the method. By adding some imaginary (artificial) clutter to imitate a very low SNR environment, the results indicate that it is very effective in detecting the satellite trajectory in heavy clutter.
The remainder of this paper is organized as follows. Section 2 opens with the elliptical characteristics of exoatmospheric targets. Section 3 establishes the analytical relationship between the raw radar measurements and the defined elliptical parameters. Section 4 presents the EHT algorithm steps in detail. This is followed in Section 5 by simulations and field data analysis. Concluding remarks and recommendations for follow-on studies are provided in the last section.

2. Elliptical Characteristic of Exoatmospheric Targets

The entire trajectory of a ballistic target can be divided into three basic portions: boost, ballistic (coast, midcourse, or exoatmospheric), and reentry [47]. Among these, the boost and reentry phases are relatively short compared with the Earth’s radius, and take place only in close vicinity of Earth. On the contrary, the ballistic phase is an exoatmospheric, free-flight motion, continuing until the atmosphere is reached again. Usually, a typical intercontinental ballistic missile (ICBM) can last about 30 min in the midcourse, which constitutes the main flight time and range of a ballistic target’s motion. Therefore, the defense radar must detect and track this type of target earlier. In particular, it is expected that the target will be detected and tracked during the entire exoatmospheric phase. Under these circumstances, the defense system will have more time to intercept a target and also evaluate its performance of the engagement.
During exoatmospheric flight, the predominant force acting on the target is Earth’s gravity, while the effect of atmospheric drag, Earth non-sphericity, and the gravitational forces due to other celestial bodies can be ignored. Under these assumptions, the dynamics (motion) models of the target are governed by the laws of Keppler [39]. Since the target has a negligible mass relative to the Earth, the gravitational acceleration of the target is the solution of a so-called restricted two-body problem, obtained by Newton’s inverse-square gravity law as
a G ( r ) = μ r 2 u r = μ r 3 r
where r is the vector from the Earth’s center to the target, r | r | is its length, u r r / r is the unit vector in the direction of r , and μ = 3.986005 × 10 14 m 3 / s 2 is the Earth gravitational constant.
Using Equation (1) combined with the conservation laws of mechanical energy and moment of momentum, it can be demonstrated that the trajectory follows an elliptical orbit in essence. For a comprehensive treatment of the theories and solutions to the two-body problem, the reader is referred to [39].
To illustrate this, a new coordinate system (CS) is set up (we denote it as THIS-CS), and the target-Earth-radar geometry is shown in Figure 1. In this scenario, the curve Γ denotes the target trajectory in the exoatmospheric phase, with A the thrust cutoff or burnout point, C the apogee, and B the reentry point. The inside sphere Ω R denotes the Earth’s surface, while the outside sphere denotes the atmospheric boundary (in this paper, we simply assume that this boundary coincides with the turnoff and reentry points. The THIS-CS O e x y z is a right-handed inertial system, with the origin O e at Earth’s center, axis O e x pointing in the AB direction, axis O e y pointing in the O e C direction, and axis O e z perpendicular to the orbit plane. In this user-defined CS, the elliptical orbit of the target in the exoatmospheric phase can be simply formulated as
Γ : x 2 b 2 + [ y ( a 2 b 2 ) 1 / 2 ] 2 a 2 = 1 , | x | ( r e + H C ) sin ( θ / 2 ) , y 0 , z = 0
where a and b are the semi-major and semi-minor axes of the ellipse, respectively, i.e., a = OC and b = OD . Note that wherein O is the real ellipse center, while the Earth center is only a focus, with half focal length OO e = a 2 b 2 . Furthermore, r e = 6378.11 × 10 3 m is the average Earth radius, H C = O e A r e is the height of turnoff, θ is the range angle of the entire midcourse, i.e., θ = AO e B . According to classical astrodynamics, these elliptical parameters can be determined by the turnoff parameters [39]
{ a = μ r k r k V k 2 2 μ b = r k cos θ k [ υ k / ( 2 υ k ) ] 1 / 2
θ = 2 arcsin [ υ k cos 2 θ k tan θ k 1 + υ k ( υ k 2 ) cos 2 θ k ]
where r k , V k , and θ k are the initial reference (or thrust cutoff) range, velocity, and tilt angle, respectively; υ k is the energy parameter, defined as υ k V k 2 / ( μ / r k ) . Let H be the radar altitude, note that H H C , then the radar is located somewhere on Earth’s surface, i.e.,
x R 2 + y R 2 + z R 2 = ( r e + H ) 2 , x R , y R , z R Ω R
where Ω R is a spherical region, related to many limitations, such as geopolitics and the natural environment.
From Figure 1, we can draw out some constraint relationships between the elliptical parameters a , b , and θ .
The reentry point B has the following coordinates
{ x B = ( r e + H C ) sin ( θ / 2 ) y B = ( r e + H C ) cos ( θ / 2 )
Substituting Equation (6) into Equation (2), we obtain
( r e + H C ) 2 sin 2 ( θ / 2 ) b 2 + [ ( r e + H C ) cos ( θ / 2 ) a 2 b 2 ] 2 a 2 = 1
Expansion of Equation (7) and collection of the terms yield the following constraint
Λ ( a , b , θ ) ( a 2 b 2 ) ( r e + H C ) 2 cos 2 ( θ / 2 ) + 2 b 2 a 2 b 2 ( r e + H C ) cos ( θ / 2 ) + b 4 a 2 ( r e + H C ) 2 = 0
Equation (8) is a quadratic equation related to cos ( θ / 2 ) . Denote the following symbols as
A 1 ( a 2 b 2 ) ( r e + H C ) 2 B 1 2 b 2 a 2 b 2 ( r e + H C ) C 1 b 4 a 2 ( r e + H C ) 2
Note that we use the subscript to differentiate between symbols in Figure 1. Thus, we have the classic solution as
cos ( θ / 2 ) = B 1 ± B 1 2 4 A 1 C 1 2 A 1 = b 2 a 2 b 2 ( r e + H C ) ± a 2 ( a 2 b 2 ) ( r e + H C ) 4 ( a 2 b 2 ) ( r e + H C ) 2 = b 2 ( r e + H C ) a 2 b 2 ± a a 2 b 2
Next, it can be demonstrated that cos ( θ 1 / 2 ) = b 2 a ( r e + H C ) ( r e + H C ) a 2 b 2 is not a valid solution. In fact, the expansion of cos 2 ( θ 1 / 2 ) yields
cos 2 ( θ 1 / 2 ) = [ b 2 a ( r e + H C ) ] 2 ( r e + H C ) 2 ( a 2 b 2 ) = 1 + b 2 [ ( r e + H C ) 2 + 2 a ( r e + H C ) + b 2 ] ( r e + H C ) 2 ( a 2 b 2 ) > 1
Obviously, Equation (11) is a contradiction, since we have a common sense that 0 cos 2 ( θ 1 / 2 ) 1 . It is not difficult to prove that another solution is a feasible one. Thus, the range angle θ has the following expression:
θ = 2 acos [ b 2 + a ( r e + H C ) ( r e + H C ) a 2 b 2 ]
Similarly, treating a as a variable, and solving Equation (8), and ruling out unreasonable solutions, we can obtain the expression of a as
a 2 = b 2 ctan 2 ( θ / 2 ) + b 4 [ 1 + cos 2 ( θ / 2 ) ] ( H C + r e ) 2 sin 4 ( θ / 2 ) 2 b 3 cos ( θ / 2 ) b 2 ( H C + r e ) 2 sin 2 ( θ / 2 ) ( H C + r e ) 2 sin 4 ( θ / 2 )
Using a similar approach, we have the expression b as (Actually, we have four solutions, but only one is valid. For the sake of brevity, we do not list them here)
b 2 = a ( H C + r e ) 1 2 cos 2 ( θ / 2 ) ( H C + r e ) 2 + 1 2 ( H C + r e ) cos ( θ / 2 ) 4 a 2 4 a ( H C + r e ) + cos 2 ( θ / 2 ) ( H C + r e ) 2
Thus, Equations (13) and (14) have built up the relationship between a , b , and θ , which is the constraint condition for the presented EHT method.

3. Relationship between Measurements and Elliptical Parameters

In practice, the measurements are usually available in the radar spherical CS at discrete time instants. Next, we establish the relationship between the radar raw measurements and the above-mentioned elliptical parameters through multiple steps of coordinate transformation.
Let Z ( R , A , E ) T be the raw radar measurements in the radar-centered spherical CS (range, azimuth, and elevation), and denote r ENU ( x ENU , y ENU , z ENU ) Τ the vector in the radar-centered East-North-Up coordinate system (ENU-CS) [47], then the first-step coordinate transformation is
{ x ENU = R cos E cos A y ENU = R cos E sin A z ENU = R sin E
Let L , B , and H be the known radar longitude, latitude, and altitude, respectively, and denote r ECF = ( x ECF , y ECF , z ECF ) T the vector in the Earth-centered fixed (ECF) CS; then, the coordinate transformation between the ENU-CS and the ECF-CS can be obtained as
r ECF = T ENU ECF ( r ENU + ξ 1 )
where ξ 1 = ( 0 , 0 , r e + H ) T is a known vector. T ENU ECF is a 3 × 3 orthogonal transformation matrix from the ENU-CS to the ECF-CS, i.e.,
T ENU ECF = [ T ECF ENU ] 1 = [ T ECF ENU ] T
Note that T ECF ENU is related to the radar position (height H , longitude L , and latitude B ) and can be expanded by the product of three rotation matrices
T ENU ECF = R Z ( π / 2 L ) R Y ( π ) R X ( π / 2 + B ) = [ sin ( L ) cos ( L ) sin ( B ) cos ( L ) cos ( B ) cos ( L ) sin ( L ) sin ( B ) sin ( L ) cos ( B ) 0 cos ( B ) sin ( B ) ]
Note that in Figure 1 the ellipse is with reference to an inertial CS, whereas the measurement is obtained in the non-inertial CS. We should build up the relationship between the non-inertial CS and the inertial CS. The coordinate transformation between the Earth-centered inertial CS (ECI-CS) and the ECF-CS is
r ECI = T ECF ECI r ECF = R Z ( ω t ) r ECF
where ω = 7.292115   rad / s is the Earth’s rotation rate, t is the time with t = 0 , indicating the time at thrust-cutoff point A . The expansion of T ECF ECI is as
T ECF ECI = [ cos ( ω t ) sin ( ω t ) 0 sin ( ω t ) cos ( ω t ) 0 0 0 1 ]
The coordinate transformation between the ECI-CS and the launching inertial CS (LCI-CS) is
r LCI = T ECI LCI ( r ECI ξ 2 )
where ξ 2 is the thrust cutoff point described in the ECF-CS, i.e., point A in Figure 1, denoting A 0 the launching geodetic azimuth (defined as the angle anticlockwise from the launching direction to the meridian line at the thrust cutoff point), L C and B C the longitude and latitude of the thrust cutoff, respectively, then ξ 2 has the following expression when restricted to a spherical Earth model
ξ 2 = [ x C y C z C ] = [ ( r e + H C ) cos B C cos L C ( r e + H C ) cos B C sin L C ( r e + H C ) sin B C ]
The transformation matrix T ECI LCI involved in Equation (21) can be expanded as
T ECI LCI = R Y ( π / 2 A 0 ) R X ( B C ) R Z ( L C π / 2 ) = [ sin ( A 0 ) sin ( L C ) 0 0 0 cos ( B C ) sin ( L C ) 0 0 0 cos ( B C ) sin ( A 0 ) ]
The last step of coordinate transformation from the LCI-CS to the THIS-CS defined in Figure 1 is
r THIS = T LCI THIS ( r LCI + ξ 3 ) = R Z ( θ / 2 ) ( r LCI + ξ 3 )
where ξ 3 = ( 0 , r e + H C , 0 ) T . Note that the difference between the LCI-CS and THIS-CS is the translation of the origin by range r e + H C and the rotation of the CS by angle θ / 2 .
Figure 2 gives the flow chart of the above-mentioned coordinate transformations, which is relatively complicated. The rudimentary operations are translations and rotations.
Substitution of Equations (16)–(23) into Equation (24) and collections of terms yield the following equation:
r THIS = T LCI THIS { T ECI LCI [ T ECF ECI T ENU ECF ( r ENU + ξ 1 ) ξ 2 ] + ξ 3 } = T LCI THIS T ECI LCI T ECF ECI T ENU ECF r ENU + T LCI THIS T ECI LCI T ECF ECI T ENU ECF ξ 1 T LCI THIS T ECI LCI ξ 2 + T LCI THIS ξ 3 T ENU THIS ( r ENU + ξ 1 ) T ECI THIS ξ 2 + T LCI THIS ξ 3
where the transformation matrices are expanded as follows
T ENU THIS = R Z ( θ / 2 ) R Y ( π / 2 A 0 ) R X ( B C ) × R Z ( L C L ω t ) R Y ( π ) R X ( π / 2 + B )
T ECI THIS = R Z ( θ / 2 ) R Y ( π / 2 A 0 ) R X ( B C ) R Z ( L C π / 2 )
T LCI THIS = R Z ( θ / 2 )
The full expansions of the above matrices are
T ENU THIS = [ cos ( θ / 2 ) cos ( L L C + ω t ) sin A 0 0 0 0 cos B C cos ( θ / 2 ) cos ( L L C + ω t ) sin B 0 0 0 cos B C sin A 0 sin B ]
T ECI THIS = [ cos ( θ / 2 ) sin A 0 sin L C 0 0 0 cos B C cos ( θ / 2 ) sin L C 0 0 0 cos B C sin A 0 ]
T LCI THIS = [ cos ( θ / 2 ) sin ( θ / 2 ) 0 sin ( θ / 2 ) cos ( θ / 2 ) 0 0 0 1 ]
Up to this point, Equation (25) has built up the interrelationship between raw radar measurements Z and the elliptical vector r THIS = ( x , y , z ) T . If all the relevant parameters are correct, the projection of the raw observations onto the THIS-CS defined in this paper will be a part of an elliptical curve and in a plane. The full expansion of r THIS is considerably complicated, but it can still be reformulated as the following form
r THIS Φ ( Z ; L C , B C , H C , A 0 , θ , a , b ) = Φ ( [ R , A , E ] T ; L C , B C , H C , A 0 , θ , a , b )
where Φ ( . ) is a nonlinear vector function. Or equivalently, we have the implicit equation
Γ : φ ( Z ; a , b , θ , A 0 , L C , B C , H C ) = 0 , [ R , A , E ] D
Note that in Equation (33) the measurement is Z = ( R , A , E ) T , which is usually limited to a preconditioned surveillance region D, and can be obtained directly by the radar with some measurement errors, whereas the parameters { a , b , θ , A 0 , L C , B C , H C } are usually unknown and need to be determined. This is also the focus of our investigation. A simple way to implement the EHT is to map the 3-D raw data into a 7-D parameter space and to make an exhaustive search. Since higher search dimensionality (7-D) requires much more processing load and data storage, and it is not easy to implement in real time, one must resort to some heuristic approaches to reduce the search dimensionality in the first place.
These parameters can be divided roughly into two groups: elliptical parameters a , b , θ and reference parameters A 0 , L C , B C , H C . Elliptical parameters are those, in essence, related to the thrust-cutoff parameters r k , V k , θ k and are the parameters we must search via a voting scheme in the parameter space, whereas the reference parameters A 0 , L C , B C , H C are not essential and can be roughly obtained by an early-warning radar (or by an early-warning satellite) as apriori.
If the early-warning information is not available, some heuristic methods can also be developed to estimate these parameters. For instance, A 0 , in essence, determines that z = 0 in the THIS-CS. Considering the factor of noise, we can search A 0 by minimizing the sum of the absolute value z . Furthermore, note that the thrust-cutoff point A ( L C , B C , H C ) is only a reference point, which is not unique and dependent on the altitude H C at the thrust cutoff point. For a common practice, H C = 80   km is a reasonable reference value. Thus, the final reference parameters might be reduced to two-dimensions, i.e., L C and B C . If the early-warning information is not available, three independent standard polynomial Hough transforms can be used to detect in the separate R t , A t , and E t planes. The detection results are then combined and transformed to the geodetic CS; the extrapolated value at altitude H C = 80   km is the requisite reference thrust cutoff point.
In the following sections, for the sake of conciseness and due to space limitations, we assume that the early-warning information { A 0 , L C , B C , H C } = { A 0 , ξ 2 } is available, but with some estimation errors. Thus, the main work is focused on the search scheme for the elliptical parameters a , b , and θ . Actually, according to Equations (13) and (14), it can be seen that a , b , and θ are not independent. Known any of the two, then another parameter is obtained. However, it is difficult to use Equations (13) and (14), since in most cases θ is usually applied at first. Equations (13) and (14) can be used as constraints to greatly reduce the huge search space.

4. Elliptical Hough Transform

4.1. Data Space and Parameter Space

Note that before transformation Equation (24), all the data expressed in the LCI-CS are explicitly known, except for some measurement errors and early-warning parameter-related errors. However, the transformation Equation (24) is still ambiguous since θ is an undetermined parameter, which must be searched over all possible discrete values, together with the search of parameters a and b .
In fact, if we denote
r LCI 0 r LCI + ξ 3 ( x LCI 0 , y LCI 0 , z LCI 0 ) T
as a new vector, then the LCI0-CS can be viewed as the LCI-CS, translating from the cutoff point A to the Earth center O e . The vector r LCI 0 is also a known quantity related to the measurements.
Using r LCI 0 to represent Equation (2) and expanding the rotation matrix R Z ( θ / 2 ) , we obtain the three-parameter elliptical equation as
Γ : [ cos ( θ 2 ) x ECI 0 sin ( θ 2 ) y ECI 0 ] 2 b 2 + [ sin ( θ 2 ) x ECI 0 + cos ( θ 2 ) y ECI 0 ] 2 a 2 = 1 s . t . { | cos ( θ 2 ) x ECI 0 sin ( θ 2 ) y ECI 0 | ( r e + H C ) sin ( θ 2 ) sin ( θ 2 ) x ECI 0 + cos ( θ 2 ) y ECI 0 0 z ECI 0 = 0
Thus, the EHT maps the points r LCI 0 in the converted data space into curves in a a b θ three-parameter space. Note that, when discussed here, ( a , b , θ ) are the state variables, whereas ( x LCI 0 , y LCI 0 , z LCI 0 ) are the parameters. According to Equation (35), it is difficult to judge the curve type in the Hough parameter space. Instead, we use the vector in the THIS-CS to analyze its properties. Using the coordinate relationship
{ x = cos ( θ 2 ) x ECI 0 sin ( θ 2 ) y ECI 0 y = sin ( θ 2 ) x ECI 0 + cos ( θ 2 ) y ECI 0 z = z ECI 0
to replace Equation (35), it follows from that Equation (35) can be rewritten as
a 2 y 2 + b 2 x 2 a 2 b 2 y 2 x 2 = 0 , θ 2 arcsin ( | x | r e + H C )
Thus, for a given value θ , the vector r THIS in THIS-CS can be explicitly computed by using Equation (36); then, the data mapping Equation (37) results in a planar quartic curve, instead of an elliptic curve.
It can be seen that any one of the quartic curves in the Hough parameter space corresponds to the set of all possible elliptical curves in the data space in the THIS-CS through the corresponding data point. If an elliptical curve of points does exist in the THIS-CS, the curve is represented in Hough parameter space as the point of intersection of all of the mapped quartic curves, i.e., in the parameter space, multiple quartic curves will gather at a point, and the parameters at this point are the desirable ones we are searching for.

4.2. Algorithm Design

Next, we give full steps of the algorithm design for the presented EHT. The basic idea is illustrated in Figure 3, and it has four main parts.
(i)
Primary Threshold Processing: The radar operates in a TBD mode, searching a limited number of sectors (surveillance region) D . The search is implemented via a sequential mode, i.e., every resolution cell in the region is scanned only once during a search frame time Δ t . The radar raw pulse compressed signals (range-azimuth-elevation channels) are through a much lower primary threshold η . In this way, we obtain the original measurement points { t , R , A , E } , although this dataset contains quite a lot of clutter.
(ii)
Elliptical Hough Transform: Firstly, the values of the reference parameters, as well as the rough bound of the elliptic parameters, are obtained from the apriori information. The parameter space is then quantized in the a b θ dimensions. Any R A E t cell with a value exceeding η is mapped into parameter space via multiple steps of coordinate transformation, and its power is reset to count 1. When a primary threshold crossing is mapped into the parameter space, its power (note, we use a binary integrator; hence, its power is 1) is added into the a b θ cells that intersect the corresponding quartic curve in the parameter space. In this way, the accumulator cell at the intersection of multiple quartic curves will have a high value; this is called voting accumulation.
(iii)
Secondary Threshold Processing: A secondary threshold can be applied in the parameter space to declare detections of targets of interest. Note that if the secondary threshold is set too low, there might be multiple detection scatters in neighboring parameter cells. In fact, there indeed may be only one target; it is the quantization of parameter space that leads to the false alarm. To reduce false alarms and meanwhile obtain fine estimation accuracy of the desired parameters, a clustering method can serve this purpose.
(iv)
Inverse Coordinate Transformations: The detected elliptical parameters a b θ are back-transformed into the measurement space R A E t by a series of inverse coordinate transformations, and both detection and tracking results are announced to show the time history and current position of the target. Meanwhile, it is very easy to use the detected parameters to predict the long-term evolutionary behaviors of the trajectory. For instance, the intersection between the detected trajectory and the Earth’s surface is the landing point.
The detailed algorithm to implement the EHT is listed as follows:
Step 1: Search the surveillance space D sequentially and store the N frame raw measurement data. If the power of one R A E t cell exceeds the primary threshold η , then its position Z is recorded. Thus, during the time interval N Δ t , we obtain the total measurement data Z N { Z 1 : N } , wherein the i th frame has m i measurements, and the total number of measurements in the processing period is m = i = 1 N m i .
Step 2: Discretize the three-dimensional parameter space a × b × θ [ a L , a U ] × [ b L , b U ] × [ θ L , θ B ] (the parameter discretization region can be obtained according to the early warning or determined by experience), and obtain n a × n b × n θ cells. The parameter resolutions are
{ Δ a = ( a U a L ) / n a Δ b = ( b U b L ) / n b Δ θ = ( θ U θ L ) / n θ
and the parameter values can be obtained as
{ a ( i ) = a L + ( i 1 / 2 ) Δ a , i = 1 , , n a b ( j ) = b L + ( j 1 / 2 ) Δ b , j = 1 , , n b θ ( k ) = θ L + ( k 1 / 2 ) Δ θ , k = 1 , , n θ
Set the initial accumulation variable as
c ( i , j , k ) = 0 , 1 i n a , 1 j n b , 1 k n θ , i , j , k
Step 3: For every θ ( k ) , 1 k n θ and every data Z total number m), use the apriori information of early warning A ^ 0 , L ^ C , B ^ C , H ^ C to calculate the converted data r THIS via Equation (25). Thus, we have
r ^ THIS ( l , k ) = [ x ^ ( l , k ) , y ^ ( l , k ) , z ^ ( l , k ) ] T , 1 l m ; 1 k n θ
Step 4: For every r ^ THIS ( l , k ) and every a ( i ) , compute the semi-minor axis b ( i , k , l )
b ( i , k , l ) = a ( i ) x ^ 2 ( l , k ) a 2 ( i ) y ^ 2 ( l , k ) , 1 i n a , 1 k n θ , 1 l m
Step 5.1: Scheme I (Binary integration): For every b ( i , k , l ) and every b ( j ) , if b ( i , k , l ) subjects to
| b ( j ) b ( i , k , l ) | Δ b / 2 { 1 i n a 1 j n b 1 k n θ 1 l m
Then, the count of the accumulation cell c ( i , j , k ) is added to 1, i.e.,
c ( i , j , k ) = c ( i , j , k ) + 1
Step 5.2: Scheme II (Plane-constrained integration): For every b ( i , k , l ) and every b ( j ) , if b ( i , k , l ) subjects to Equation (42), then the accumulation steps change to
c ( i , j , k ) = c ( i , j , k ) + e q | z ^ ( l , k ) |
where q is a design coefficient.
Step 6: Set the secondary threshold η Hough in the Hough parameter space, if c ( i , j , k ) η Hough , we obtain a detected cell, and the estimation parameters are obtained as a ^ = a ( i ) , b ^ = b ( j ) , and θ ^ = θ ( k ) . In certain cases, the detections might be multiple and scatter in several adjacent regions. A k-means clustering method or hierarchical agglomerative clustering method [48] can be employed to combine the neighboring detected cells into one cell.
Step 7: Suppose ultimately that we have detected n targets with parameters [ a ^ ( k ) , b ^ ( k ) , θ ^ ( k ) ] , 1 k n . Using a series of inverse coordinate transformations indexed by Equation (37) back to Equation (15), we can retrieve the positions of targets of interest in any desirable CS. In this way, the presented EHT method declares the detection and tracking results simultaneously. Furthermore, it is also possible to use the estimated parameters to predict the long-term trajectory of the targets to be detected.
Note that, in Equation (44), we have considered the fact that the orbit of an exoatmospheric target in the midcourse usually follows a planar trajectory, hence z ^ ( l , k ) might be sufficiently small if the target turns out to be the true one. However, for random thermal noises or clutter, they would uniformly intersperse in the surveillance space and might have large values for z ^ ( l , k ) . Therefore, for Scheme II, it indeed has the advantage of improving the accumulation performance for true targets, as well as reducing the false-alarm rate for noises. When in the case q 0 , e q | z ^ ( l , k ) | 1 , Scheme II will reduce to Scheme I, whereas when q we will have e q | z ^ ( k ) | 0 . For the latter case, both targets and noises have no accumulation effect. Because remains a design parameter, in this investigation, we find that when q = 0.01 0.0001 it might have better accumulation performance.
Now we analyze the computational complexity of the EHT. The points in the measurement space correspond to a quadratic curve in the parameter space. Using apriori information to partition the parameter search space, we obtain a total of n a × n b × n θ quantized parameters. Assuming that the total number of measurements is m during N-frame scan, then in theory, the total of n a × n b × n θ × m cumulative calculations will be performed. In fact, since a , b , θ have the constraint relationship Equation (37), b does not need to be quantified, and the total computation is n a × n θ × m . It follows that the more the number of targets, the denser the clutter, the longer the accumulation time, and the higher the accuracy of parameter quantization, the more time consuming the algorithm is.
Furthermore, in the above steps, we have used a three-dimensional search parameter space a b θ instead of two-dimensional space a b indicated by Equations (13) and (14). Since Equations (13) and (14) are relatively computationally sophisticated, we only use them as a constraint to reduce the number of search points. That is to say, when implementing the step of discretization Equation (39), we select only the points that satisfy Equations (13) or (14) to implement the mapping. Using Equation (14) as an example, the selection is judged as
| b ( i , k , l ) b ^ ( i , k ) | Δ b
where b ( i , k , l ) is the measurement-related computed value of b , b ^ ( i , k ) is the theoretical computed value of b according to Equation (14), and Δ b is introduced to account for all types of measurement errors. With the steps of preselection, unlike pairs of a ( i ) b ( j ) θ ( k ) can be greatly reduced.

4.3. Detection and False Alarm Probabilities

Next, we analyze the statistical performance of the EHT.
The thermal noise-induced false alarm is considered as Rayleigh distributed in amplitude or exponential in power. Assuming a square law cell detector, then the normalized power probability of distribution (pdf) of noise is
f ( x ) = e x
For the sake of simplicity, we assume the exoatmospheric target follows a Swerling II distribution. Note that in reality, it is rarely the case that a reentry vehicle follows a classical Swerling model; instead, it depends on a lot of elements. Herein, since the Swerling II model has the simplest analytical expression of the probability of detection P d , we use it only to give a clear picture of the statistics of the method. Note that any other target fluctuation models are also applicable to this analysis.
The power pdf of the target is
f ( x | S ) = exp ( x / ( 1 + S ) ) / ( 1 + S )
where S is the SNR. It is easy to obtain the P d for single R A E t detection cell as
P d = η f ( x | S ) d x = exp ( η / ( 1 + S ) )
where η ln ( P fa ) is the primary threshold, with P fa the probability of false alarms for noises. Obviously, the larger the value of P fa is, the lower the threshold η will be. To guarantee the subsequent Hough detection of a target, the primary threshold η should be set relatively lower.
To obtain the final probability of detection P d Hough per Hough parameter space cell, we follow the same way originated from Carlson [17]. Let n be the total number of R A E t cells that can contribute to a given parameter space cell. There are total m data points exceeding the primary threshold η . Thus, the probability of this event is P d k ( 1 P d ) m n a n θ n , where m n a n θ is in essence the maximum accessible number for a given Hough parameter cell. According to [17], we directly give the probability P d Hough that a given cell in parameter space exceeds the secondary threshold η Hough as follows:
P d Hough = P { c > η Hough } = n = 1 m n a n θ C m n a n θ k P d n ( 1 P d ) m n a n θ n P { y = i = 1 n c i > η Hough }
where c denotes the accumulation power for this given parameter cell and c i is the power of the i th data point. Actually, for binary integration (Scheme I), c i 1 , 1 n m n a n θ ; whereas for plane-constrained integration (Scheme II), c i = e q | z ^ ( i ) | , 1 n m n a n θ . Obviously, for Scheme I, the final probability of detection is reduced to
P d Hough = P { c > η Hough } = n = η Hough m n a n θ C m n a n θ n P d n ( 1 P d ) m n a n θ n
where . denotes the rounding operation. The P d Hough for Scheme II is obtained as
P d Hough = P { c > η Hough } = n = 1 m n a n θ C m n a n θ n P d n ( 1 P d ) m n a n θ n P { y = i = 1 n e q | z ^ t ( i ) | > η Hough }
Note that it is difficult to obtain the analytical expression P { y = i = 1 k e q | z ^ t ( i ) | > η Hough } since the accumulation statistic y has a sophisticated distribution. For the sake of conciseness, we do not go into the details of the detection and false alarm probabilities in this investigation. Once P d Hough is available, the false alarm probability can be obtained by limiting S 0 .
Actually, the detection performance relates to many elements, such as the primary threshold η , secondary threshold η Hough , SNR, resolution cell of discretization Δ a × Δ b × Δ θ , total processing Plane-constrained integration NΔt, radar measurement errors, and estimation accuracy of early-warning information, etc. Most of these statistics do not have analytical expressions and need massive Monte Carlo simulations to give a quantitative evaluation.

5. Simulations

In this section, we consider an example of a single search radar scenario and investigate the performances of the presented EHT algorithm.

5.1. Scenario Description

The simulation scenario is depicted as follows.
Target: We assume a single reentry vehicle flying in the exoatmospheric phase. The initial reference velocity, altitude, and tilt angle at the thrust cutoff point are 2500 m/s, 80 km, and 40.3070°, respectively, which subsequently determine the total exoatmospheric flight time of approximately 370 s. At the reference time t = 0 , the target is located at 0° N latitude 0°E longitude, pointing to the direction of East. The apogee is 0°N latitude 3.03485°E longitude, and the reentry point is 0° N latitude 6.0697° E longitude.
Radar: The radar is positioned at 2°N latitude 4.5°E longitude with a scan period Δ t = 0.5   s . The measurement accuracies of range, azimuth, and elevation are σ R = 50   m and σ A = σ E = 1   mrad , respectively. The radar has received some apriori early warning information from the satellite; thus, the surveillance space is restricted to a limited region of D = 230 × 30 × 30 km3. The processing time interval is [150, 250] s. Thus, the accumulation frame number is N = 200 , which accounts for a total data time of about 100 s.
False alarm: The number of false alarm detections is Poisson distributed with a spatial density λ = 8.69 × 10 5 /km3, which determines an average number of 18 false alarms of a single scan in the surveillance space D. Note that λ is essentially a function of the cell false alarm probability P fa of the radar and is independent across frames.
Early warning information: The true reference parameters provided by the early warning are A 0 = π / 2 , L C = 0 ° , B C = 0 ° , and H C = 80   km . The indicated errors are assumed to be Gauss distributed with standard deviations σ A 0 = 1   mrad and σ L C = σ L B = 0.05 ° .
EHT specification: The Hough search space is restricted to [ a L , a U ] = [ 6600   km ,   6800   km ] , [ b L , b U ] = [ 1000   km ,   2000   km ] , and [ θ L , θ U ] = [ 5 ° , 7 ° ] , with a resolution Δ a = 2000   m , Δ b = 2500   m , and Δ θ = 0.01 ° . The total quantization points are approximate 8 × 106. The judgment of the successful detection of a target is set as [ ( a a ^ ) 2 + ( b b ^ ) 2 ] 1 / 2 5 × 10 3   m and | θ θ ^ | 0.01 ° . Note that the threshold of judgment remains a design parameter in practice, adjusted/tuned mostly based on engineering experience and intuition. Actually, the optimal threshold is difficult to derive as it is related to specific radar-target geometry and related to many issues.

5.2. Raw Measurements

The radar measurements are available in radar spherical CS at discrete time instants. Figure 4 shows the true target and radar raw measurements in the preconditioned surveillance space D, with Figure 4a the measurements in the radar raw PPI display and Figure 4b the converted measurements in THIS-CS defined in this paper. It can be seen that, while the trajectory of the target in the PPI display is a continuous and complicated curve, in the THIS-CS it indeed is a part of the elliptical curve and symmetrical with the Earth center.
Note that in Figure 4 we do not consider the SNR. The gray-scale plot of all 200-frame primary threshold detections is shown in Figure 5, with darker points denoting higher power. Actually, the threshold η = 2.3026 means an average SNR of 10 dB. It can be seen that the target is more visible as an elliptical curve, but it scatters in a cluttered environment. Conventional recursive trackers usually need an average SNR of 20 dB sufficient to maintain the track, and in this low SNR case, they may lose tracks due to frequent misdetections of the target erroneously associated with unwanted clutter points.

5.3. Integration Effects

Figure 6 and Figure 7 show the accumulation effects in the Hough parameter space, with Figure 6 for Scheme I, Binary integration, and Figure 7 for Scheme II, Plane-constrained integration, q = 0.001 . The target SNR is still 10 dB and the primary threshold is η = 2.3026 . For the sake of compactness, we do not show the accumulation effect in the θ dimension, since it has similar behaviors. It can be seen from Figure 6a and Figure 7a, in the parameter space, we did observe that multiple quartic curves gather together.
The two schemes can concentrate both on the true parameters ( a , b , θ ) = ( 3397.9   km , 1135.4   km , 6.0697 ° ) , but their accumulation effects have slight differences. It can be observed that Scheme II has a better accumulation effect than Scheme I. The reason partly lies in that Scheme II has sufficiently considered orbit planarity as a constraint, wherein the noises located outside the orbit plane have been largely suppressed. For this reason, in the following analysis, unless stated explicitly, we will use Scheme II, i.e., Plane-constrained integration to implement the EHT.

5.4. Parameter Estimation

With the K-means clustering, we can obtain the ultimate estimations of Hough parameters for the EHT. Figure 8 shows the estimated parameters of the EHT with different secondary thresholds η Hough = 10 and η Hough = 3 , wherein the symbol “★” denotes the clustering center and “·” denotes the secondary threshold crossings. It can be seen that, when the Hough threshold η Hough is relatively high, only a few points can pass the threshold, and the estimation accuracy of parameters will be satisfactory. However, this is not the case for a lower threshold. In Figure 8b, the secondary threshold is set to η Hough = 3 , and we can observe that the clustering center deviates vastly from the true value.
Once the parameters in the Hough parameter space are obtained, they can be mapped back into the measurement space RAEt or any other CSs, to show the time history and current position of the target. Figure 9 shows the corresponding detected curve, true trajectory, and raw measurements in a single plot, with Figure 9a the detection threshold η Hough = 10 and Figure 9b η Hough = 3 . It can be seen from Figure 9a that, the presented EHT works well as the detection result approximates highly to the nominal true trajectory. In contrast to Figure 9a, Figure 9b shows that it has worse detection performance. Because its secondary threshold is relatively low, multiple crossings will be recorded and this will reduce the clustering performance. However, in reality, the secondary threshold η Hough is still a key design parameter and needs to be determined by experience or massive Monte Carlo simulations.

5.5. Performance Comparison

Next, we investigate the detection performance due to the influence of the primary threshold, secondary threshold, radar measurement error, and SNR. This is achieved by massive Monte Carlo runs. In the following simulations, the accumulation time interval is still restricted to [150, 250] s. To assess the performance of the proposed method, 10,000 Monte Carlo numerical simulations were performed in Matlab® on a computing platform characterized by a 3.6 GHz Intel Core I7–4790 processor with 32 GB RAM.
Figure 10 shows the detection performance concerning the primary threshold η and SNR. Figure 11 shows the detection performance concerning the secondary threshold η Hough and radar measurement errors.
From Figure 10 and Figure 11, some conclusions are obvious. We briefly summarize them as follows:
(i)
The larger the SNR is, the higher the detection probability obtained;
(ii)
The lower the primary threshold is, the higher the detection probability obtained;
(iii)
The higher the secondary threshold is, the higher the detection probability obtained;
(iv)
The higher the radar measurement accuracy is, the higher the detection probability obtained.
Note that in Figure 11, it does not mean that the higher the secondary threshold, the better. It can be observed that, when η Hough is set too high to cause no secondary threshold crossings, it may result in missing alarms, and consequently decrease the probability of detection. Alternatively, one can set no secondary threshold and assume that the peak value corresponds to the desired target. However, this may also induce false alarms, since even if there is no target, the detector will still declare a target.
In fact, the detection performance relates to many elements, such as the primary threshold η , secondary threshold η Hough , SNR, resolution cell of discretization Δ a × Δ b × Δ θ , total processing time interval N Δ t , radar measurement errors, and the estimation accuracy of early-warning information. Most of the statistics do not have analytical expressions and need massive Monte Carlo simulations to give a quantitative evaluation.
Table 1 shows the average running time of the EHT method with different parameters. The primary false alarm probability is varied in the range P f = { 0.01 , 0.1 , 1 } and the parameter space quantization in the range n a n b n θ = { 200 3 , 400 3 , 600 3 } . The target accumulation time interval is still restricted to [150, 250] s. As seen in Table 1, the computational load of the algorithm does increase as the primary detection threshold decreases and the number of quantization units increases. Nonetheless, this processing time is still within the total accumulated time. The total running time will also be greatly reduced if a parallel processing strategy and hardware computational platform are used.
Next, we investigate the performance in a very low SNR environment. Figure 12 gives the detected curves in the THIS-CS with an average SNR of 0 dB, which means that the primary threshold is very low, and most of the clutter points will contribute to the Hough space accumulation, while that of the target points will be greatly decreased. The other parameters are Scheme II, Plane-constrained integration, with q = 0.001 , time interval (150–250) s, primary threshold η = 0, and secondary threshold η Hough = 10 .
Transforming Figure 12 to the radar raw R-A-E measurement space with inverse coordinate transforms, we obtain the detection and tracking results. As shown in Figure 13a, the detected trajectory of ETH highly coincides with the true value. The ETH is a TBD method since detection and tracking are announced simultaneously. In fact, although the primary threshold is lowered and the clutter becomes massive, this also means that the probability of detection of the target becomes higher. In order to compare the performance, Figure 13b shows the tracking results of traditional data processing via a detect-before-track (DBT) mode. In Figure 13b, the track initialization is three-point differentiation, the association algorithm is nearest neighbor (NN), and the filtering algorithm is interacting multiple model (IMM). The filter parameters are adjusted to the best. Nevertheless, as can be seen from Figure 13b, the traditional DBT method tracks a large number of temporary tracks. Specifically, the tracks of the target are often intermittent. In fact, there are a total of 18 tracks that belong to the same target, and the total number of temporary tracks reaches 253. This not only wastes radar tracking resources, but also poses a challenge for subsequent target discrimination.
Figure 14 gives the accumulation effect of multiple targets, with Figure 14a the accumulation effect in the Hough parameter and Figure 14b the detection result in THIS-CS. The parameters are still Scheme II, Plane-constrained integration, with q = 0.001 , time interval [150, 250] s, primary threshold η = 0 , and secondary threshold η Hough = 10 . The difference between these two targets is the difference in release altitude of 10 km. As can be seen, our method can also detect multiple targets at the same time. In fact, the Hough transform is based on a voting mechanism where the accumulation between targets is independent; thus, the Hough transform has implied parallelism, as well as multi-target detection capability. We also find through simulation that our method is able to detect the same target even if the trajectory passes through the surveillance area and then returns to the surveillance area.

5.6. Field Data Analysis

To evaluate the effectiveness of the presented EHT method, we also use filed data to investigate the overall performance. The radar is a phased-array radar, which is manufactured by the China Electronics Technology Group Corporation (CETC) and is operated at the X-band. The data we analyzed involves a constellation comprising three identical scientific satellites of the European Space Agency (ESA), which are designed to provide the best survey of the geomagnetic field and its temporal evolution of the Earth system.
To meet the need for the detection accuracy of the magnetic field of the Earth system, the satellite constellation consists of three circular orbits, with satellites A and C approximately 450 km above the ground, and satellite B 530 km above the ground. Because these data span different periods, we use only the real tracking data of satellite A to investigate the performance. The shape of satellite A is shown on the left of Figure 15.
The orbital elements of satellite A are listed in Table 2. It can be seen from Table 2 that, the trajectory is approximately a part of a circular orbit, as the eccentricity e = 0.003368 is close to zero. According to the basic knowledge of astronomy, we can calculate the true elliptical parameters (a,b,θ) = (6811.4487 km, 6811.4483 km, 0°). Since the target is a satellite and it has a circular orbit, the range angle θ indeed can be of any value.
Figure 16 shows the raw measurements of the satellite when tracked in the radar centered spherical CS. The data is collected on 8 May 2017. The total observation time is approximately 272 s of its exoatmospheric flight, with the range in the interval [1296 km, 1950 km], azimuth in the interval [225.7384°, 300.6767°], and elevation in the interval [4.4123°,14.6599°]. Since the radar is a phased-array radar and has the ability of adaptive scheduling, the maximum revisiting period is 3.94 s, the minimum period is 0.067 s, and the average is 0.5 s. The measurement accuracies of the range, azimuth, and elevation of the radar are approximate σ R = 200   m , σ A = 0.00228   rad , and σ E = 0.0011769   rad , respectively.
With a series of coordination transformations, the satellite trajectory in the presented THIS-CS can be obtained. As can be seen in Figure 17, the trajectory of the orbit is indeed a part of a circular orbit, with an average height of approximately 449 m. Due to the radar line-of-sight limitation, the radar can only observe a small part of the entire circular orbit.
Since the raw data set is the independent tracking data containing the raw measurements of range, azimuth, and elevation, and for some reason lacking the SNR information, obviously, it cannot be used directly to evaluate the performance of the elliptical Hough transform, as the Hough transform usually needs target data, as well as clutter data.
To investigate the algorithm performance in stressful environments, we add some imaginary (non-real and man-made) clutter data, combining the raw satellite data to constitute a simulated cluttered environment.
The number of clutter detections is still assumed to be Poisson distributed with spatial density λ = 8.69 × 10 5 /km3, which determines an average number of 18 false alarms of a single scan in the surveillance space.
Thus, the field data are preprocessed with the following steps: adding clutter data (imaginary), implementation of the elliptical Hough transform, and inversion to the original CS.
Figure 18 shows the accumulation effects in the Hough parameter space of the synthetic data. The parameters are Scheme II, Plane-constrained integration with q = 0.001 , time interval [0, 272] s, and average SNR = 10 dB. The other parameters are assumed to be the same as earlier. It can be seen from Figure 16 that the corresponding quartic curves intersect at some point and have a high value in the parameter space. In fact, by setting the secondary threshold η Hough = 10 and using the K-means clustering method, we obtain the detected elliptical parameters ( a ^ , b ^ , θ ^ ) = ( 6808.3778   km ,   6833.7457   km , 0.003523 ° ) , which are now very close to the true values ( a , b , θ ) = ( 6811.4487   km , 6811.4483   km , 0 ° ) .
Once the parameters in the Hough parameter space are obtained, they can be converted back into the measurement CS or any other CSs to show the time history and current position of the target. Figure 19a shows the corresponding detected curve, assumed (imaginary) clutter, and raw satellite measurements in the THIS-CS, while Figure 19b shows the same result in the radar-centered ENU-CS. It can be seen from these two figures that the EHT works well, as the detected trajectory approximates highly to the true measurements of the satellite. An interesting fact in Figure 19 is that there seems to be a fixed deviation in the detection process. Even without adding any clutter (using the original tracking data), this fixed deviation will still exist and cannot be ruled out. The reason partly lies in the fact that a spherical Earth model is employed, which might result in systematic errors and cannot reflect the truth. Perhaps adopting a more precisely ellipsoidal Earth model would mitigate this effect, and this needs further investigation.

6. Conclusions

When tracking low observable targets in the presence of clutter, more challenges will occur. The TBD is a quite effective scheme to deal with low observable targets, as it exchanges the time for obtaining better SNR according to some accumulation metric. In this paper, still within the TBD framework, we present a new Hough detector, i.e., an elliptical Hough transform (EHT) detector, to detect and track weak exoatmospheric targets in the presence of heavy clutter. Both simulations and field data verify the validity of the algorithm. The advantage of the new algorithm lies in that it is specifically designed for exoatmospheric targets; hence, it indeed has the effect of integrating detection, tracking, and even prediction functions. Nonetheless, for multiple target detection, there are still some issues. One problem is that the number of k-means clustering centers still needs to be adjusted by experience. Another issue is that the secondary threshold also has an impact on the multi-target detection performance, especially in the presence of both large and small targets. All these problems need further investigation.
This method can also be extended to other situations. For instance, multisensor integration, data fusion, polarizations, and Doppler measurements can also be added to the approach to improve performance. Furthermore, in addition to using geometrical information of elliptical orbit, other motional information can also be used to design a TBD algorithm to detect an exoatmospheric target. For instance, many exoatmospheric targets have conservation characteristics (conservation laws of mechanical energy and moment of momentum); thus, a simple linear Hough transform detector may be used to detect a physically existent target and discriminate between false targets (e.g., active decoys, which are physically non-existent). The previous work has gained some interesting results concerning joint tracking and discrimination [49,50,51]; future work will be focused on TBD processing in joint detection and tracking and discrimination of weak exoatmospheric targets in clutter and jamming environments. This will be an intellectually motivating field and needs further investigation.

Author Contributions

Conceptualization, B.R.; methodology, B.R.; software, B.R.; validation, B.R., Y.Z. and Y.N.; formal analysis, Y.Z.; investigation, B.R.; resources, B.R.; data curation, B.R.; writing—original draft preparation, B.R.; writing—review and editing, Y.Z.; visualization, B.R.; supervision, Y.N.; project administration, Y.N.; funding acquisition, B.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by Shenzhen Science and Technology Program under Grant KQTD20190929172704911.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the editor and anonymous reviewers for processing our manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zheng, J.; Chen, R.; Yang, T.; Liu, X.; Liu, H.; Su, T.; Wan, L. An efficient strategy for accurate detection and localization of UAV swarms. IEEE Internet Things J. 2021, 8, 15372–15381. [Google Scholar] [CrossRef]
  2. Zheng, J.; Yang, T.; Liu, H.; Su, T.; Wan, L. Accurate detection and localization of unmanned aerial vehicle swarms-enabled mobile edge computing system. IEEE Trans. Industr. Inform. 2021, 7, 5059–5067. [Google Scholar] [CrossRef]
  3. Sivananthan, S.; Kirubarajan, T.; Bar-Shalom, Y. Radar power multiplier for acquisition of low observables using an ESA radar. IEEE Trans. Aerosp. Electron. Syst. 2001, 37, 401–418. [Google Scholar] [CrossRef]
  4. Chen, H.; Bar-Shalom, Y.; Pattipati, K.R. MDL approach for multiple low observable track initiation. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 862–882. [Google Scholar] [CrossRef]
  5. Park, J.D.; Doherty, J.F. Track detection of low observable targets using a motion model. IEEE Access 2015, 3, 1408–1415. [Google Scholar] [CrossRef]
  6. Bar-Shalom, Y.; Li, X.R. Multitarget-Multisensor Tracking: Principles and Techniques; YBS Publishing: Storrs, CT, USA, 1995. [Google Scholar]
  7. Blackman, S.; Popoli, R. Design and Analysis of Modern Tracking Systems; Artech House: Boston, MA, USA, 1999. [Google Scholar]
  8. Sessler, A.M.; Cornwall, J.M.; Dietz, B. Countermeasures—A Technical Evaluation of the Operational Effectiveness of the Planned US National Missile Defense System; Union of Concerned Scientist: Cambridge, MA, USA, 2000. [Google Scholar]
  9. Xu, L.; Feng, D.; Pan, X.; Liu, Q.; Wang, X. An improved digital false-target image synthesizer method for countering inverse synthetic aperture radar. IEEE Sens. J. 2015, 15, 5870–5877. [Google Scholar] [CrossRef]
  10. Liu, Y.; Xing, S.; Liu, Y.; Li, Y.; Wang, X. Maximum likelihood angle estimation of target in the presence of chaff centroid jamming. IEEE Access 2018, 6, 74416–74428. [Google Scholar] [CrossRef]
  11. Feng, D.; Xu, L.; Pan, X.; Wang, X. Jamming wideband radar using interrupted-sampling repeater. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 1341–1354. [Google Scholar] [CrossRef]
  12. Pan, X.; Wang, W.; Wang, G. Sub-nyquist sampling jamming against ISAR with CS-based HRRP reconstruction. IEEE Sens. J. 2016, 16, 1597–1602. [Google Scholar] [CrossRef]
  13. Pan, X.; Liu, J.; Chen, J.; Xie, Q.; Ai, X. Sub-nyquist sampling jamming against chirp-ISAR with CS-D range compression. IEEE Sens. J. 2018, 18, 1140–1149. [Google Scholar] [CrossRef]
  14. Fiscante, N.; Addabbo, P.; Clemente, C.; Biondi, F.; Giunta, G.; Orlando, D. A track-before-detect strategy based on sparse data processing for air surveillance radar applications. Remote Sens. 2021, 13, 662. [Google Scholar] [CrossRef]
  15. Yan, B.; Xu, N.; Wang, G.; Yang, S.; Xu, L.P. Detection of multiple maneuvering extended targets by three-dimensional Hough transform and multiple hypothesis tracking. IEEE Access 2019, 7, 80717–80732. [Google Scholar] [CrossRef]
  16. Carlson, B.D.; Evans, E.D.; Wilson, S.L. Search radar detection and track with the Hough transform. Part I: System concept. IEEE Trans. Aerosp. Electron. Syst. 1994, 30, 102–108. [Google Scholar] [CrossRef]
  17. Carlson, B.D.; Evans, E.D.; Wilson, S.L. Search radar detection and track with the Hough transform. Part II: Detection statistics. IEEE Trans. Aerosp. Electron. Syst. 1994, 30, 108–115. [Google Scholar]
  18. Carlson, B.D.; Evans, E.D.; Wilson, S.L. Search radar detection and track with the Hough transform. Part III: Detection performance with binary integration. IEEE Trans. Aerosp. Electron. Syst. 1994, 30, 116–124. [Google Scholar] [CrossRef]
  19. Tonissen, S.M.; Bar-Shalom, Y. Maximum likelihood track-before-detect with fluctuating target amplitude. IEEE Trans. Aerosp. Electron. Syst. 1998, 34, 796–809. [Google Scholar] [CrossRef]
  20. Pohlig, S.C. An algorithm for detection of moving optical targets. IEEE Trans. Aerosp. Electron. Syst. 1989, 25, 56–63. [Google Scholar] [CrossRef]
  21. Blostein, S.D.; Richardson, H.S. A sequential detection approach to target tracking. IEEE Trans. Aerosp. Electron. Syst. 1994, 36, 197–212. [Google Scholar] [CrossRef]
  22. Blostein, S.D.; Huang, T.S. Detecting small moving objects in image sequences using sequential hypothesis testing. IEEE Trans. Aerosp. Electron. Syst. 1991, 39, 1161–1629. [Google Scholar] [CrossRef]
  23. Jauffret, C.; Bar-shalom, Y. Track formation with bearing and frequency measurements in clutter. IEEE Trans. Aerosp. Electron. Syst. 1990, 26, 999–1010. [Google Scholar] [CrossRef]
  24. Blanding, W.R.; Willett, P.K.; Bar-Shalom, Y. Offline and real-time methods for ML-PDA track validation. IEEE Trans. Signal Process. 2007, 55, 1994–2006. [Google Scholar] [CrossRef]
  25. Garcia-Fernandez, A.F. Track-before-detect labeled multi-bernoulli particle filter with label switching. IEEE Trans. Aerosp. Electron. Syst. 2016, 52, 2123–2138. [Google Scholar] [CrossRef]
  26. Garcia-Fernandez, A.F. Track before detect for radar using stochastic particle flow filters. In Proceedings of the 2020 IEEE Radar Conference (RadarConf20), Florence, Italy, 21–25 September 2020; pp. 1–6. [Google Scholar]
  27. Bao, Z.; Jiang, Q.; Liu, F. A PHD-Based Particle Filter for Detecting and Tracking Multiple Weak Targets. IEEE Access 2019, 7, 145843–145850. [Google Scholar] [CrossRef]
  28. Zhichao, B.; Qiuxi, J.; Fangzheng, L. Multiple model efficient particle filter based track-before-detect for maneuvering weak targets. J. Syst. Eng. Electron. 2020, 31, 647–656. [Google Scholar] [CrossRef]
  29. Kim, D.; Ristic, B.; Guan, R.; Rosenberg, L. A Bernoulli Track-Before-Detect Filter for Interacting Targets in Maritime Radar. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 1981–1991. [Google Scholar] [CrossRef]
  30. Reed, I.; Gagliardi, R.; Stotts, L. A recursive moving-target-indication algorithm for optical image sequences. IEEE Trans. Aerosp. Electron. Syst. 1990, 26, 434–439. [Google Scholar] [CrossRef]
  31. Reed, I.; Gagliardi, R.; Stotts, L. Optical moving target detection with 3D matched filtering. IEEE Trans. Aerosp. Electron. Syst. 1985, 24, 327–335. [Google Scholar] [CrossRef]
  32. Yan, B.; Enrico, P.; Xu, N.; Sun, Z.; Xu, L.P. Multiple maneuvering extended targets detection by 3D projection and tracklet association. Signal Process. 2021, 179, 107821. [Google Scholar] [CrossRef]
  33. Yi, W.; Morelande, M.R.; Kong, L.; Yang, J. An efficient multi-frame track-before-detect algorithm for multi-target tracking. IEEE Sel. Top. Signal Process. 2013, 7, 421–434. [Google Scholar] [CrossRef]
  34. Yan, B.; Xu, L.; Li, M.; Yan, J.Z. Track-before-detect algorithm based on dynamic programming for multi-extended-targets detection. IET Signal Process. 2017, 11, 674–686. [Google Scholar] [CrossRef]
  35. Yi, W.; Fang, Z.; Li, W.; Hoseinnezhad, R.; Kong, L. multi-frame track-before-detect algorithm for maneuvering target tracking. IEEE Trans. Veh. Technol. 2020, 69, 4104–4118. [Google Scholar] [CrossRef]
  36. Chen, J.; Leung, H.; Lo, T. A modified probabilistic data association filter in a real clutter environment. IEEE Trans. Aerosp. Electron. Syst. 1996, 32, 300–313. [Google Scholar] [CrossRef]
  37. Leung, H.; Hu, Z.; Blanchette, M. Evaluation of multiple target track initiation techniques in real radar tracking environment. IEE Proc.-Radar Sonar Navig. 1996, 143, 246–254. [Google Scholar] [CrossRef]
  38. Illingworth, J.; Kittler, J. A Survey of the Hough transform. Comput. Vis. Graph. Image Process. 1988, 44, 87–116. [Google Scholar] [CrossRef]
  39. Bate, R.R.; Mueller, D.D.; White, J.E. Fundamentals of Astrodynamics; Dover: Mineola, NY, USA, 1971. [Google Scholar]
  40. Rao, B.; Zong, Z.W.; Nie, Y.P. Track-before-detect of weak ballistic target using elliptical Hough Transform. In Proceedings of the IET International Radar Conference, Xian, China; 14–16 April 2013. [Google Scholar]
  41. Tsuji, S.; Mstsumoto, M. Detection of ellipses by a modified Hough transformation. IEEE Trans. Comput. 1978, 27, 777–781. [Google Scholar] [CrossRef]
  42. Yuen, H.K.; Illingworth, J.; Kittler, J. Detecting partially occluded ellipses using the Hough transform. Image Vis. Comput. 1989, 7, 31–37. [Google Scholar] [CrossRef]
  43. Li, W.; Cui, X.; Guo, L.; Chen, J.; Gao, X. Tree root automatic recognition in ground penetrating radar profiles based on randomized Hough transform. Remote Sens. 2016, 8, 436. [Google Scholar] [CrossRef] [Green Version]
  44. Lu, W.; Tan, J. Detection of incomplete ellipse in images with strong noise by iterative randomized Hough transform (IRHT). Pattern Recognit. 2008, 41, 1268–1279. [Google Scholar] [CrossRef]
  45. Sewisy, A.A.; Leberl, F. Detection ellipses by finding lines of symmetry in the images via Hough transform applied to straight lines. Image Vision Comput. 2001, 19, 857–866. [Google Scholar] [CrossRef]
  46. Ho, C.T.; Chen, L.H. A fast ellipse/circle detector using geometric symmetry. Pattern Recognit. 1995, 28, 117–124. [Google Scholar] [CrossRef] [Green Version]
  47. Li, X.R.; Jilkov, V.P. Survey of maneuvering target tracking—Part II: Motion models of ballistic and space targets. IEEE Trans. Aerosp. Electron. Syst. 2010, 46, 96–119. [Google Scholar] [CrossRef]
  48. Lu, Y.; Wan, Y. PHA: A fast potential-based hierarchical agglomerative clustering method. Pattern Recognit. 2013, 46, 1227–1239. [Google Scholar] [CrossRef]
  49. Rao, B.; Xiao, S.P.; Wang, X.S. Joint tracking and discrimination of exoatmospheric active decoys using nine-dimensional parameter-augmented EKF. Signal Process. 2011, 91, 2247–2258. [Google Scholar] [CrossRef]
  50. Rao, B.; Zhao, Y.L.; Xiao, S.P.; Wang, X.S. Discrimination of exoatmospheric active decoys using acceleration information. IET Radar Sonar Navig. 2010, 4, 626–638. [Google Scholar] [CrossRef]
  51. Rao, B.; Xiao, S.P.; Wang, X.S.; Wang, T. Maximum likelihood approach to the estimation and discrimination of exoatmospheric active phantom tracks using motion features. IEEE Trans. Aerosp. Electron. Syst. 2012, 48, 794–820. [Google Scholar]
Figure 1. “Target-Radar-Earth” geometry.
Figure 1. “Target-Radar-Earth” geometry.
Remotesensing 14 00491 g001
Figure 2. Flow chart of coordinate transformations.
Figure 2. Flow chart of coordinate transformations.
Remotesensing 14 00491 g002
Figure 3. Flow chart of the Elliptical Hough Transform algorithm.
Figure 3. Flow chart of the Elliptical Hough Transform algorithm.
Remotesensing 14 00491 g003
Figure 4. Raw measurements in surveillance space. (a) Measurements in radar PPI display. (b) Measurements in THIS-CS.
Figure 4. Raw measurements in surveillance space. (a) Measurements in radar PPI display. (b) Measurements in THIS-CS.
Remotesensing 14 00491 g004
Figure 5. Gray-scale plot of converted data in THIS-CS during the interval [150, 250] s. The SNR of the target is 10 dB.
Figure 5. Gray-scale plot of converted data in THIS-CS during the interval [150, 250] s. The SNR of the target is 10 dB.
Remotesensing 14 00491 g005
Figure 6. Accumulation effect of EHT (Scheme I, binary integration, [150, 250] s). (a) a b space. (b) a dimension. (c) b dimension.
Figure 6. Accumulation effect of EHT (Scheme I, binary integration, [150, 250] s). (a) a b space. (b) a dimension. (c) b dimension.
Remotesensing 14 00491 g006
Figure 7. Accumulation effect of EHT (Scheme II, Plane-constrained integration, with q = 0.001 , [150, 250] s). (a) a b space. (b) a dimension. (c) b dimension.
Figure 7. Accumulation effect of EHT (Scheme II, Plane-constrained integration, with q = 0.001 , [150, 250] s). (a) a b space. (b) a dimension. (c) b dimension.
Remotesensing 14 00491 g007
Figure 8. Estimated parameters of EHT with different secondary thresholds, via the K-means clustering method. (a) η Hough = 10 . (b) η Hough = 3 .
Figure 8. Estimated parameters of EHT with different secondary thresholds, via the K-means clustering method. (a) η Hough = 10 . (b) η Hough = 3 .
Remotesensing 14 00491 g008
Figure 9. Detection and tracking results of EHT, with different secondary thresholds. (a) η Hough = 10 . (b) η Hough = 3 .
Figure 9. Detection and tracking results of EHT, with different secondary thresholds. (a) η Hough = 10 . (b) η Hough = 3 .
Remotesensing 14 00491 g009
Figure 10. Detection performance related to SNR and primary threshold.
Figure 10. Detection performance related to SNR and primary threshold.
Remotesensing 14 00491 g010
Figure 11. Detection performance related to measurement error and secondary threshold.
Figure 11. Detection performance related to measurement error and secondary threshold.
Remotesensing 14 00491 g011
Figure 12. Detection and tracking results of EHT, with SNR=0 dB, primary threshold η = 0 , and secondary threshold η Hough = 10 .
Figure 12. Detection and tracking results of EHT, with SNR=0 dB, primary threshold η = 0 , and secondary threshold η Hough = 10 .
Remotesensing 14 00491 g012
Figure 13. Comparison of detection and tracking performance with conventional Kalman filters. (a) Presented EHT method. (b) Conventional Kalman filter with NN association strategy.
Figure 13. Comparison of detection and tracking performance with conventional Kalman filters. (a) Presented EHT method. (b) Conventional Kalman filter with NN association strategy.
Remotesensing 14 00491 g013
Figure 14. Accumulation effect of EHT with two targets (Scheme II, Plane-constrained integration, with q = 0.001, (150–250) s), showing in ab space. (a) Accumulation effect in Hough parameter. (b) Detection result in THIS-CS.
Figure 14. Accumulation effect of EHT with two targets (Scheme II, Plane-constrained integration, with q = 0.001, (150–250) s), showing in ab space. (a) Accumulation effect in Hough parameter. (b) Detection result in THIS-CS.
Remotesensing 14 00491 g014
Figure 15. Shapes of satellites A and B.
Figure 15. Shapes of satellites A and B.
Remotesensing 14 00491 g015
Figure 16. Real satellite measurement data in the radar-centered spherical CS.
Figure 16. Real satellite measurement data in the radar-centered spherical CS.
Remotesensing 14 00491 g016
Figure 17. Real satellite measurement data converted into the THIS-CS.
Figure 17. Real satellite measurement data converted into the THIS-CS.
Remotesensing 14 00491 g017
Figure 18. Accumulation effect of EHT with real data (Scheme II, Plane-constrained integration, with q = 0.001 , [0, 272] s). (a) a b space. (b) a dimension. (c) b dimension.
Figure 18. Accumulation effect of EHT with real data (Scheme II, Plane-constrained integration, with q = 0.001 , [0, 272] s). (a) a b space. (b) a dimension. (c) b dimension.
Remotesensing 14 00491 g018
Figure 19. Detection and tracking results of EHT with real data, with the primary threshold η = 2.3026 and secondary threshold η Hough = 10 . (a) in the THIS-CS. (b) in the ENU-CS.
Figure 19. Detection and tracking results of EHT with real data, with the primary threshold η = 2.3026 and secondary threshold η Hough = 10 . (a) in the THIS-CS. (b) in the ENU-CS.
Remotesensing 14 00491 g019
Table 1. Computational Load with Different Parameters.
Table 1. Computational Load with Different Parameters.
False Alarm Rate
(Point Number)
nanbnθ = 2003nanbnθ = 4003nanbnθ = 6003
Pf = 0.01 (924)0.3814 s0.9579 s1.7943 s
Pf = 0.1 (3557)1.3723 s3.9687 s7.5323 s
Pf = 1 (7042)2.7169 s7.8832 s14.9521 s
Table 2. Parameters of Satellite A.
Table 2. Parameters of Satellite A.
SymbolQuantityTrue Value
asemi-major axis6811.44871 km
eeccentricity0.0003368
iinclination87.3681°
right ascension of ascending node173.0810°
ωargument of periapsis96.9899°
ftrue anomaly263.1742°
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rao, B.; Zhou, Y.; Nie, Y. Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform. Remote Sens. 2022, 14, 491. https://doi.org/10.3390/rs14030491

AMA Style

Rao B, Zhou Y, Nie Y. Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform. Remote Sensing. 2022; 14(3):491. https://doi.org/10.3390/rs14030491

Chicago/Turabian Style

Rao, Bin, Yongkun Zhou, and Yuanping Nie. 2022. "Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform" Remote Sensing 14, no. 3: 491. https://doi.org/10.3390/rs14030491

APA Style

Rao, B., Zhou, Y., & Nie, Y. (2022). Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform. Remote Sensing, 14(3), 491. https://doi.org/10.3390/rs14030491

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop