The Use of Fuzzy Spaces in Signal Detection

Similar documents
False Alarm Analysis of the CATM-CFAR in Presence of Clutter Edge

3yR. r UNL. CASE CENTER 653 P02 MAY 10 -'94 14:03. TyPE MaO OATIS COVEREO March, 1994 Final Re DOM 15:- -- N. IMCf

Application Note. Application Note for BAYEX

Design and Analysis of Safety Critical Systems

Keywords: slope stability, numerical analysis, rainfall, infiltration. Yu. Ando 1, Kentaro. Suda 2, Shinji. Konishi 3 and Hirokazu.

Chapter 2 Theory and Background

ON-LINE SENSOR CALIBRATION MONITORING AND FAULT DETECTION FOR CHEMICAL PROCESSES

Reduction of False Alarm Signals for PIR Sensor in Realistic Outdoor Surveillance

How to Use Fire Risk Assessment Tools to Evaluate Performance Based Designs

AN ANALYSIS OF THE PERFORMANCE OF RESIDENTIAL SMOKE DETECTION TECHNOLOGIES UTILIZING THE CONCEPT OF RELATIVE TIME

wrong right

An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b

Optimizing Electric Humidifier Operation with an Air Side Economizer

A Method for Fire Detecting by Volume and Surface Area Concentration Based on Dual Wavelengths

Benefits of Enhanced Event Analysis in. Mark Miller

Methodology of Implementing the Pulse code techniques for Distributed Optical Fiber Sensors by using FPGA: Cyclic Simplex Coding

Radar Signal Processing

Fuzzy Logic and Fuzzy Systems

Research on Decision Tree Application in Data of Fire Alarm Receipt and Disposal

A Monte Carlo Approach for the Design of Thermal Fire Detection System

Implementation of High Throughput Radix-16 FFT Processor

Ordered Fuzzy ARTMAP: A Fuzzy ARTMAP algorithm with a fixed order

EFFECT OF COMPACTION ON THE UNSATURATED SHEAR STRENGTH OF A COMPACTED TILL

Scientific Principals and Analytical Model. Charcoal Cooler. Lisa Crofoot MECH 425, Queens University

Vision Based Intelligent Fire Detection System

Dynamic Simulation of Double Pipe Heat Exchanger using MATLAB simulink

27th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

Automatic Detection of Defects on Radiant Heaters Based on Infrared Radiation

ω = (1) Kirby S. Chapman Ph.D.

Active Sonar Detection in Shallow Water Using the Page Test

Measure Lifetime Derived from a Field Study of Age at Replacement

EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012. Sasidharan Sreedharan

Interferometric optical time-domain reflectometry for distributed optical-fiber sensing

Implementing a Reliable Leak Detection System on a Crude Oil Pipeline

Brief Contributions. Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring 1 INTRODUCTION 2 PROBLEM FORMULATION

a high level of operational reliability), and the designer (in performing probabilistic-based

Reported Fires in High-Rise Structures in Selected Occupancies with and without Automatic Extinguishing Systems by Extent of Smoke Damage

Biology Paper, CSE Style (Johnson/Arnold)

Chalk, Cheese, Fish and Fowl: Comparing noise criteria - A Northbridge example. Peter Popoff-Asotoff

Fault Isolation for Spacecraft Systems: An Application to a Power Distribution Testbed

Numerical Analysis of the Bearing Capacity of Strip Footing Adjacent to Slope

Range Dependent Turbulence Characterization by Co-operating Coherent Doppler Lidar with Direct Detection Lidar

THEORETICAL EQUILIBRIUM MOISTURE CONTENT OF WOOD UNDER VACUUM Zhangjing Chen? Fred M. Lamb1

SYNERGY IN LEAK DETECTION: COMBINING LEAK DETECTION TECHNOLOGIES THAT USE DIFFERENT PHYSICAL PRINCIPLES

Evaluation of Collector Size for Low Pressure, Fixed-Plate Sprinklers for Center Pivots 1

Simple Equations for Predicting Smoke Filling Time in Fire Rooms with Irregular Ceilings

Module Features are-configurable, no module jumpers to set

Flexibility, scalability andsecurity

However, uncertainty exists on the proper approaches to fastening claddings over exterior insulation.

A Forest Fire Warning Method Based on Fire Dangerous Rating Dan Wang 1, a, Lei Xu 1, b*, Yuanyuan Zhou 1, c, Zhifu Gao 1, d

DETECTION AND MONITORING OF ACTIVE FIRES USING REMOTE SENSING TECHNIQUES

Link loss measurement uncertainties: OTDR vs. light source power meter By EXFO s Systems Engineering and Research Team

Understanding total measurement uncertainty in power meters and detectors

Fire Detection Using Image Processing

Prediction of Psychoacoustic Parameters

Simulation Of Pneumatic Drying: Influence Of Particle Diameter And Solid Loading Ratio

GOLAY COMPLEMENTARY CODES, DOUBLE PULSE REPETITION FREQUENCY TRANSMISSION I. TROTS, A. NOWICKI, M. LEWANDOWSKI J. LITNIEWSKI, W.

Thermal Video Analysis for Fire Detection Using Shape Regularity and Intensity Saturation Features

Polarized Light Scattering of Smoke Sources and Cooking Aerosols

Uncertainty Analysis For Input Parameters Of Electrical Cabinet Fire Simulation By Coupling Latin Hypercube Sampling And CFAST

Structure Fires in Hotels and Motels

Important Considerations When Selecting a Fan for Forced Air Cooling. By: Jeff Smoot, CUI Inc

Use of Autoassociative Neural Networks for Signal Validation

Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks

Effect of Foundation Embedment of PWR Structures in SSI Analysis considering Spatial Incoherence of Ground Motions

CHAPTER 2 EXPERIMENTAL APPARATUS AND PROCEDURES

STACK EFFECT IN LIGHT WELL OF HIGH RISE APARTMENT BUILDING

Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests

Intrusion Detection System based on Speckle Pattern change in Fiber Optic Sensors...Abdulkareem H. Dagher, Shehab A kadhim, Hawraa H.

Towards Predicting High Sensitivity Smoke Detector Operational Performance in Building Environments

NEW CD WARP CONTROL SYSTEM FOR THE CORRUGATING INDUSTRY

POLYMER positive-temperature-coefficient (PPTC) resettable

THE LANDSCAPE ECOLOGICAL ASSESSMENT MODEL AND ITS APPLICATIONS

Design, Development & Testing of Double Pipe Heat Exchanger With Heat Transfer Enhancement Liners

Impacts of an Energy Star Promotion

1066. A self-adaptive alarm method for tool condition monitoring based on Parzen window estimation

Fuzzy Logic Based Coolant Leak Detection

Optical Fibres ELEC8350

Harmful Intrusion Detection Algorithm of Optical Fiber Pre-Warning System Based on Correlation of Orthogonal Polarization Signals

Compression of Fins pipe and simple Heat pipe Using CFD

PACSystems* RX3i. Thermocouple Input Module, 12 Channels, IC695ALG412. GFK-2578B October 2011

HEFAT th International Conference on Heat Transfer, Fluid Mechanics and Thermodynamics Sun City, South Africa Paper number:pp1

ACTIVE ACOUSTIC METHODOLOGY FOR DETECTING SEWER LINE OBSTRUCTIONS

5B-3 6th Asia-Oceania Symposium on Fire Science and Technology 17-20, March, 2004, Daegu, Korea

EFFECT OF WATER RADIATOR ON AIR HEATING SOLAR COLLECTOR EFFICIENCY

inter.noise 2000 The 29th International Congress and Exhibition on Noise Control Engineering August 2000, Nice, FRANCE

Performance of an Improved Household Refrigerator/Freezer

VEGETATIVE PROPAGATION OF MATURE SYCAMORE. Samuel B. Land, Jr, 1

mach 5 100kHz Digital Joulemeter: M5-SJ, M5-IJ and M5-PJ Joulemeter Probes

Research on Evaluation of Fire Detection Algorithms

PREDICTION OF SETTLEMENT RATIO OF COMPRESSIBLE SOIL UNDER EMBANKMENT LOAD USING EMPIRICAL CORELATION AND LINEAR REGRESSION

Smoke Alarm Response Time:

Temperature Control of Heat Exchanger Using Fuzzy Logic Controller

Numerical Studies On The Performance Of Methanol Based Air To Air Heat Pipe Heat Exchanger

Economic Analysis of Solar Assisted Chemical Heat Pump Dryer

Module multisensor system for strategic objects protection

SYSTEM AND METHOD FOR THE DETECTION AND CONTROL OF ILLICIT TRAFFICKING OF SPECIAL NUCLEAR MATERIALS

COMPARISON OF NFPA AND ISO APPROACHES FOR EVALUATING SEPARATION DISTANCES

Effect of Placement of Footing on Stability of Slope

Study on Drying Shrinkage Strain and Moisture Transfer in Concrete with Finish Coating Materials

Transcription:

The Use of Fuzzy Spaces in Signal Detection S. W. Leung and James W. Minett Department of Electronic Engineering, City University of Hong Kong Correspondence to: Dr. Peter S. W. Leung Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue Kowloon Tong Kowloon Hong Kong

The Use of Fuzzy Spaces in Signal Detection S. W. Leung and James W. Minett Abstract: The Fuzzy CFAR (Constant False Alarm Rate) detector, which is based on the M- out-of- binary detector, is characterized and compared with the optimal eyman-pearson detector. It replaces the crisp M-out-of- binary threshold with a soft, continuous threshold, implemented as a membership function. This function is chosen so that the output is equal to the false alarm rate of the binary detector, and therefore maps the observation set to a False Alarm Space corresponding to the false alarm rate, P FA. An analogous membership function is also developed mapping observations to a Detection Space which corresponds to the detection rate, P D. These two spaces allow different detectors to be compared directly with respect to the two important detection performance indices, P FA and P D. Comparison of the False Alarm Space and Detection Space indicates that the Fuzzy CFAR detector and eyman-pearson detector detect signals in a different manner and have different detection properties. evertheless, performance results illustrate that the Fuzzy CFAR detector achieves detection performance comparable to the optimal eyman-pearson detector. Keywords: Decision Making; Signal Detection 1. Introduction Constant False Alarm Rate (CFAR) detectors [4, 8-10] and other threshold-based detectors [7, 12] form the basis of many decision making systems such as in radar detection and digital communication. Detection algorithms are generally optimized with respect to a particular set of cost functions chosen for the specific application. In this paper we present the Fuzzy 2

CFAR detector [5-6] and compare it to the eyman-pearson detector [1, 12-13], which provides optimal detection in many situations in which cost is too vague for meaningful assignment of cost functions [13]. We describe the underlying principles and detection criteria for each detector, and also show how the Fuzzy CFAR detector is adapted from the classic M-out-of- binary detector [10]. We go on to discuss the use of Fuzzy Spaces [6], explaining how they allow analysis and direct comparison of the detection properties of detectors. 2. Detection Criteria In signal detection, we are often interested in determining the presence of a weak signal, corrupted by noise. CFAR detectors generally implement decision rules based on a crisp threshold producing binary output, either 0 or 1 [10]. Often, such discontinuous decision rules give rise to a significant loss of information, producing far from optimal detection performance. The Fuzzy CFAR detector replaces the binary threshold with a soft, continuous threshold producing smooth output in order to reduce information loss. The following sections compare the detection criteria of this detector with the optimal eyman-pearson detector, and the classic M-out-of- detector which it adapts. oise can be modeled as a random process, reducing the detection problem to a statistical hypothesis test. An appropriate hypothesis test for detection of a signal in a noisy channel is H H 0 1 : : y = n y = M + n " o Target" " Target", (2.1) where y represents an observation of the channel, n the observed noise, and M the signal which may be present in the channel. In this study, we consider only the basic case of a constant signal in zero-mean white Gaussian noise, with observations assumed independent and, therefore, uncorrelated [1]. Although simple, this model allows us to introduce the 3

concepts required to characterize the Fuzzy CFAR detector, and to compare it to the eyman-pearson and M-out-of- detectors. We now present a brief review of each detector, including the derivation of the Fuzzy CFAR detector from the M-out-of- detector. 2.1 eyman-pearson Criterion The eyman-pearson criterion specifies the optimal decision rule for a hypothesis test with constrained rate of false alarm and is often used when the cost functions associated with hypotheses are unknown. The eyman-pearson detector is implemented as shown in Figure 1. For each observation set, independent measurements of the detection channel are made. The mean value is then thresholded to provide the target decision. For our chosen noise/signal model with independent observations, the eyman-pearson threshold, TH X, is given implicitly by [1] P FA : = Pr 1 ( X TH X H ), X = 0 : i= 1 Y i, (2.2) where P FA is the chosen false alarm rate; hypothesis Target is accepted when X TH X. This produces the eyman-pearson decision rule X Target < otarget TH X : = σ Φ 1 FA ( 1 P ), (2.3) where Φ -1 is the inverse cumulative distribution function of the standard Gaussian distribution, and σ 2 is the noise mean power. The detection rate is given by [1] P D ( X TH ) : = Pr H, (2.4) X 1 which for Gaussian noise is P D = 1 Φ Φ FA ( P ) M 1 σ 1 1, (2.5) where Φ is the cumulative distribution function of the standard Gaussian distribution. 4

2.2 M-out-of- Criterion The M-out-of- or Binary detector found widespread application in the early years of radar when operators were still using head-phones to listen to the detection channel [10]. Although now little used as a detector, it forms the basis for the new class of fuzzy detectors introduced by the authors in [5-6]. The M-out-of- detector is shown in Figure 2 as used for radar detection. At each range bin, observations are made, as for the eyman-pearson detector. However, each observation, y i, is thresholded independently, producing binary output, µ(y i ), 0 : yi < THY µ : yi. (2.6) 1 : yi THY These binary outputs are then summed and a Target is declared when the sum is greater than or equal to M, i.e. i=1 Target µ ( yi ) M. (2.7) < otarget The threshold, TH Y, is defined implicitly by P FA { Pr ( Yi TH H )} Y 0 j = M :, (2.8) i= j 1 or equivalently M ( Y ) i TH Y H for all Y = i Y j, Y 1 jm FA P : = Pr, 0, (2.9) reflecting the fact that at least M of the observations should exceed the chosen threshold with constrained false alarm rate. The detection rate is given by P D = j M { ( Yi TH H ) } Y 1 i = j1 Pr, (2.10) which for Gaussian noise is 5

P D = FA ( P ) M 1 Φ Φ 1 1 1. (2.11) σ 2.3 Fuzzy Criterion The Fuzzy CFAR detector adapts the M-out-of- detector by replacing the binary threshold of Equation 2.6 with a soft threshold, shown in Figure 3. The reason for adapting the M-outof- detector in this way is to deal with the uncertainty in selecting a fixed value of the binary threshold, TH Y ; this new fuzzy threshold provides soft decisions with a smooth transition from certain acceptance to certain rejection of a hypothesis. In this way the detector retains more information than the binary detector. The soft threshold is implemented as a fuzzy membership function [3, 14], Θ (y i ), assigning membership to hypothesis H 0, o Target. Furthermore, it is defined so that membership values are distributed uniformly on [0,1] under H 0, ( ζ y ζ ~ ) Θ : y Pr H, (2.12) i i 0 so that Θ(y i ) is the probability that an observation exceeds threshold y i under the o Target hypothesis. The reason for this particular definition is two-fold: The membership function is monotone decreasing, guaranteeing that stronger observations are assigned smaller membership to the o Target hypothesis, i.e. y y Θ( y ) Θ( y ) i ; (2.13) j i j The M-out-of- criterion, as interpreted in equation (2.9), requires that the false alarm rate associated with at least M individual observations be smaller than some threshold for a Target to be declared. With our choice of membership function, the M-out-of- decision rule can be written as Θ Target < M FA ( y i ) P yi = y j,, y 1 j M otarget, (2.14) 6

hence presenting the threshold explicitly in terms of false alarm rate. The Fuzzy CFAR criterion adapts this decision rule by declaring Target when the false alarm rate associated with the entire observation set is small enough. Since observations are independent, the Fuzzy CFAR decision rule for observations is given by Θ Target < FA ( y i ) P i = 1 otarget, (2.15) where threshold, P FA, is just the false alarm rate of the associated M-out-of- detector, allowing the False Alarm Space concept to be developed in Section 3. The block diagram of the Fuzzy CFAR detector is shown in Figure 4. With this detector, if even a single observation suggests Target with sufficient certainty (Θ(y i ) << 1), the detector outputs Target. This will be discussed further in Section 3.2. In our simple example, the membership function is Θ : y 1 Φ y σ, (2.16) the complement of the cumulative distribution function under H 0, and has the form shown in Figure 3. The false alarm rate of the scan detector is P FA = ( ) ( ) i i lnα 1 1 i= 1 i! α, (2.17) while the detection rate is given by the integral P D = α dy 1 Θ ( y ) i = 1 i dy. (2.18) 3. Fuzzy Spaces A standard method for comparing the performance of detectors is to consider the detection rate achieved at chosen false alarm rates. It may often be instructive to consider which observations give rise to the differences in the quoted detection and false alarm rates. In this 7

section, we look into this by defining two new spaces, the False Alarm Space and the Detection Space, which make the comparison of such differences trivial. 3.1 False Alarm Space The o Target membership function, Θ, defined in equation (2.12) maps the observation space, S :=, into a fuzzy hyper-cube [4], ` := [0,1]. The threshold of each detector forms an 1 dimensional subspace of `, partitioning it into a False Alarm Region, `1, and a Rejection Region, `0. Under H 0, observations which map to a point in `1 result in an incorrect acceptance of H 1, i.e. a false alarm. Observations which map to a point in `0 result in a correct rejection of H 1. Due to the choice of membership function, Θ, and the independence of observations, the false alarm rate of a detector is simply the hyper-volume of its associated False Alarm Region, `1 [6]. We therefore call ` the False Alarm Space. Figure 5 shows the threshold and False Alarm Region for each detector projected into the False Alarm Space. In order to clearly illustrate the form of each threshold, we show the False Alarm Space at 10% false alarm rate in two dimensions only. However, the thresholds have the same general form at higher dimensions. The False Alarm Regions differ considerably, highlighting how different observations generate false alarms for each detector: The eyman-pearson detector favors selecting the Target hypothesis, H 1 when Θ(y i ) for both observations is sufficiently small the False Alarm Region has non-linear bound; The M-out-of- binary detector with 2-out-of-2 decision rule selects H 1, whenever Θ(y i ) for both observations is smaller than the threshold, and with 1-out-of-2 decision rule selects H 1 whenever Θ(y i ) for either observation is smaller than the threshold 1 FA P = P FA the False Alarm Region is bounded by a square; 8

The Fuzzy CFAR detector favors selecting H 1 when Θ(y i ) for either observation is sufficiently small the False Alarm Region is bounded by a hyperbola. It is these differences in the False Alarm Regions of each detector that give rise to differences in detection performance, discussed in the following section. 3.2 Detection Space A second membership function, Ψ, is defined to measure the degree to which an observation is consistent with hypothesis H 1, Target. This membership function is analogous to the false alarm membership function described in Section 2.3 and is defined so that membership values, Ψ(y i ), are distributed uniformly on [0,1] under hypothesis H 1. Ψ maps the observation space, S =, into a fuzzy hyper-cube, D := [0,1]. The detection threshold partitions D into a Detection Region, D 1, and a Miss Region, D 0. Under H 1, observations which map to a point in D 1 result in a correct acceptance of H 1, i.e. a target is detected, while observations which map to a point in D 0 result in an incorrect rejection of H 1, i.e. a missed target. The detection rate of the detector is thus the hypervolume of the Detection Region, D 1 [6] hence we call D the Detection Space. For Gaussian noise, the Target membership function is Ψ : y 1 Φ y M1 σ, (3.1) the complement of the cumulative distribution function under H 1. A plot of the two-dimensional Detection Space for each detector is shown in Figure 6. The eyman-pearson detector favors detection when Ψ(y i ) for both observations is sufficiently large; The 2-out-of-2 binary detector has square Detection Region, while the 1-out-of-2 detector has square Miss Region; 9

The Fuzzy CFAR detector favors detection when Ψ(y i ) for either observation is sufficiently large. Without calculating the actual detection rates of the detectors, it is apparent that the Fuzzy CFAR detector generates fewer detections than the eyman-pearson detector when observations are approximately equal (region D 1 ), but more detections when observations are significantly different (region D + 1 ). For a general scan, the eyman-pearson detector selects Target when all observations are sufficiently large, whereas the Fuzzy CFAR detectors also allows the Target hypothesis to be selected when even a single observation is sufficiently large. These differences in the Detection Regions of the eyman-pearson and Fuzzy Detectors may be significant in certain applications, such as in radar detection of Swerling 2 & 4 fluctuating targets [11] when signal observations may vary more rapidly than expected. 4. Performance The performance characteristics of each detector are summarized in Figures 7 & 8. Figure 7 plots the detection rate for each detector at several practical false alarm rates, while Figure 8 shows the signal-to-noise ratio (SR) required for each detector to achieve the specified detection performance. The M-out-of- detector provides poorer detection performance than either the eyman- Pearson detector or the Fuzzy CFAR detector, due mainly to its use of a binary threshold. It is also evident that for a two scan scheme, the performance of the Fuzzy CFAR detector differs by no more than 0.2 db from that of the optimal eyman-pearson detector. As discussed in Section 3.2, the Fuzzy CFAR detector may also be less susceptible to degradation of detection performance when, due to uncertain knowledge of target fluctuations, signal observations fluctuate more rapidly than expected. 10

5. Conclusion This paper has reviewed the principles of signal detection using both binary and fuzzy thresholds to implement decision rules. The Fuzzy CFAR detector has been shown to outperform the classic M-out-of- binary detector, which it extends, and to have performance comparable to that of the optimal eyman-pearson detector. By particular choice of the threshold membership function, the threshold of the Fuzzy CFAR detector is related directly to the false alarm rate. A method for analyzing the performance of a detector by projecting its threshold into two fuzzy spaces, the False Alarm Space and the Detection Space, has been demonstrated. The false alarm rate and detection rate of the detector can be calculated from the hyper-volume of the False Alarm Region and Detection Region, respectively. Moreover, detectors can be characterized and compared in terms of these spaces by examining which observations give rise to false alarms and valid detections. References [1] M. H. DeGroot, Probability and Statistics, 2nd. Ed., (Addison-Wesley, Reading MA, 1989) 437-452. [2] H. M. Finn & R. S. Johnson, Adaptive Detection Mode with Threshold Control as a Function of Spatially Sampled Clutter-Level Estimates, in: RCA Review 29 (1968) 414-464. [3] G. J. Klir and T. A. Folger, Fuzzy Sets, Uncertainty and Information, (Prentice Hall, Englewood Cliffs, 1992) 1-32. [4] B. Kosko, eural etworks and Fuzzy Systems, (Prentice Hall, Englewood Cliffs, 1992) 262-295. 11

[5] S.W. Leung, Signal Detection by Fuzzy Logic, in: Proc. of FUZZ-IEEE/IFES 95, Yokohama, Japan (Mar. 20-24, 1995) 199-202. [6] S.W. Leung and James W. Minett, Signal Detection Using Fuzzy Membership Functions, in: Proc. SYS 95 International AMSE Conference, Brno, Czech Rep. (July 3-5, 1995) pp. 89-92. [7] J. Minkoff, Signals, oise & Active Sensors - Radar, Sonar, Laser Radar, (John Wiley & Sons, ew York, 1992) 87-96. [8] D. T. agle and J. Saniie, Performance Analysis of Linearly Combined Order Statistic CFAR Detectors, in: IEEE Trans. Aerospace & Electronic Systems 31 (1995) 522-533. [9] Raghavan, Qiu and McLaughlin, CFAR Detection In Clutter With Unknown Correlation Properties, in: IEEE Trans. Aerospace & Electronic Systems 31 (1995) 647-656. [10] M. Skolnik, Radar Handbook, 2nd Ed., (McGraw-Hill, ew York, 1990). [11] R. Swerling, Probability of Detection for Fluctuating Targets, in: IRE Trans. IT-6 (April, 1960) 269-308. [12] H. L. Van Trees, Detection, Estimation and Modulation Theory, Vol. 1, (John Wiley & Sons, ew York, 1968) 19-4. [13] P. K. Varshney, Distributed Detection and Data Fusion, (Springer-Verlag, ew York, 1997). [14] L.A. Zadeh, Fuzzy Sets, in: Information & Control, Vol. 8, (1965) 338-353. 12

W Bins Test Bins Square Law Detector 1 W Average Scans Scans per Bin Choose False Alarm Rate Bin Average eyman-pearson Threshold Threshold each Bin Target Decision for each Bin Figure 1 Block diagram of the eyman-pearson Detector 13

W Bins Test Bin Square Law Detector scans per bin M-out-of- threshold Choose False Alarm Rate threshold each bin to produce binary output Test Bin sum binary output compare summed output with M Target Decision for each Bin 14

Threshold Output Binary Threshold, µ Soft Threshold, Θ TH Y Signal Observation 15

W Bins Square Law Detector Scans per Bin Membership Function apply membership function to each bin Test Bins 1 W Multiply Scans Choose False Alarm Rate Bin Product Fuzzy CFAR Threshold threshold each bin Target Decision for each Bin 16

Membership, Θ (y2) 1.0 M-out-of- Threshold eyman-pearson Threshold Fuzzy CFAR Threshold 0.0 0.0 Membership, Θ (y 1 ) 1.0 17

Membership, Ψ (y2) 1.0 M-out-of- Threshold D 1 + Fuzzy CFAR Threshold eyman-pearson Threshold D 1-0.0 D 1 + 0.0 Membership, Ψ (y 1 ) 1.0 18

100.0% Detection Rate (%) 8 db 10.0% 6 db 4 db 1.0% eyman-pearson Detector Fuzzy CFAR Detector M-out-of- (2-out-of-2) Binary Detector 0.1% 1.0E-08 1.0E-07 1.0E-06 1.0E-05 1.0E-04 False Alarm Rate 19

16 Signal-to-oise Ratio (db) 15 14 13 90.0 % Detection Rate eyman-pearson Detector Fuzzy CFAR Detector M-out-of- (2-out-of-2) Binary Detector 12 11 99.9 % Detection Rate 10 9 8 1.0E-08 1.0E-07 1.0E-06 1.0E-05 1.0E-04 False Alarm Rate 20

Figure Captions Figure 1. Block Diagram of the eyman-pearson Detector Figure 2. Block Diagram of the M-out-of- Binary Detector Figure3. Comparison of Binary and Soft Threshold Figure 4. Block Diagram of the Fuzzy CFAR Detector Figure 5. Threshold and False Alarm Region of the Fuzzy CFAR, eyman-pearson and M-out-of- Detector. (Signal-to-oise Ratio = 0 db, False Alarm Rate = 10%) Figure 6. Threshold and Detection Region of the Fuzzy CFAR, eyman-pearson and M-out-of- Detector. (Signal-to-oise Ratio = 0 db, False Alarm Rate = 10%) Figure 7. Plot of Detection Rate against False Alarm Rate (Signal-to-oise Ratio 4 db, 6 db, and 8 db) Figure 8. Signal-to-oise Ratio against False Alarm Rate (Detection Rate 90.0 % and 99.9 %) 21