Radar Warning Receiver (RWR) Time-Coincident Pulse Data Extraction and Processing
Radar Warning Receiver (RWR) Time-Coincident Pulse Data Extraction and Processing
Abstract—This paper will present an approach for video conversion interface circuit is the extended-range
implementing an airborne radar warning receiver (RWR) detector logarithmic video amplifier (ERDLVA).
pulse data extraction (PDE) and processing technique
capable of handling multiple time-coincident radio-frequency This work presents an approach for accurately
(RF) pulse input threat emitter signals received in a dense interpreting incoming time-coincident pulse signal data for
threat radar signal environment. The pulse data extraction highly sensitive RWR systems in dense threat emitter
technique is specifically developed to accommodate the RF to environments. The concepts described use some well-
video response of current commercial-off- the-shelf (COTS) known real-time signal processing techniques optimized for
or militarized COTS (MOTS) extended-range detector specific ERDLVA noise and waveform performance
logarithmic video amplifiers (ERDLVAs), including characteristics along with simultaneous RWR multi-
extracting signal information in the presence of device noise. quadrant data processing. This combination of techniques
The approach uses a combination of time-domain filtering, facilitates identification of threat emitter locations in a non-
adjustable thresholds, and edge detection techniques ideal noisy environment. The approach enables accurate
combined with a four-quadrant data comparison to extract interpretation of time-coincident RF threat signals as a
individual pulse data from overlapped multi-source and standalone monopulse detection method, and can also be
uncorrelated noisy pulse inputs, and the processed data used to complement current deinterleaving and processing
output can be used as part of the presented PDE algorithm
methods.
and also may provide pre-processing for currently used pulse
deinterleaving and sorting methods. The developed technique Section II of the paper will discuss the motivation
has the potential to provide system response that is optimized behind this work. Section III will present a block diagram
for various threat environments via pre-deployment of a typical four quadrant RWR system and include
programming or continuous-time dynamic variations in the description of the key components included in RF to video
PDE. conversion circuits. Components of the system where
specific performance characteristics contribute to the pulse
Keywords - RWR, radar warning receiver, pulse processing,
data extraction processing methods will be identified and
signal processing, electronic countermeasures, ECM
explained. Section IV of the paper will show an example of
detected, partially coincident RF input pulses that might be
I. INTRODUCTION received and detected by a single quadrant of an RWR
With expected increasing range and accuracy of modern subsystem using a COTS ERDLVA device. Section V will
radar-guided ground-to-air and air-to-air weapons systems, provide a description of the PDE algorithm and an outline
there is a need for combat aircraft RWRs to receive, detect, of specific components of the algorithm including noise
and identify threat radar signals at greater distances via floor & minimum detectable level threshold setting, signal
increased receiver sensitivity. However, increased receiver multi-sampling variation, moving average filter window
sensitivity can also result in an overload of RF sensor point sizing, and d/dt or derivative threshold settings.
receive/detection circuits in dense threat environments Section VI presents simulated results for a low-probability
where a significant increase in time-coincident or pulse-on- coincident threat emitter signal group to demonstrate the
pulse (POP) signals may be present. In addition to effectiveness of the processing techniques for a difficult to
fundamental operational challenges, there is a demand for distinguish time-coincident RF signal group. A comparison
Department of Defense (DoD) RWR systems to utilize will also be presented to show the differences in raw video
COTS or MOTS circuit and system components to provide data vs. PDE-processed video signals for the algorithm
acceptable performance while minimizing hardware cost output. The data extraction technique will be presented
and development time. In RWR systems, a typical RF to operating on synthesized pulse data that includes Gaussian
random noise used to replicate non-ideal RWR system
DLVA Signal
ANT Processor
RF Filter Detector
Special
Interface
Video ADC
RF Processing
Log Video µP
Amp Amp
subsystem
0.0 0.0 ADC & µP
0 2 4 6 8 10 12 14 Decision algorithm
time
& volt/power
Figure 2. Detected coincident pulse addition. calculations
VI. PDE ALGORITHM EXAMPLE Fig. 4 qualitatively illustrates the high level of
A multiple pulse signal threat environment is simulated probability for varying levels of time-coincidence for the
to demonstrate operation and effectiveness of the PDE four presented signals, with the time from 0-15us
algorithm. Fig. 4 shows relative power levels for the exhibiting the greatest percentage of overlap in this
simulation (unitless) of the four signals for a randomly example. A quantitative probability of signal overlap can
selected 100us time sample while Fig. 5 shows relative be computed using ‘window functions’ in a similar fashion
azimuthal threat positions. The example uses a low- that probability of intercept (POI) might be calculated for
probability scenario consisting of four uncorrelated uncorrelated scanning antennas or sweeping receivers.
coincident signals with various pulse widths and PRIs, with Closed-form solutions for various parameters including
a 15us interval highlighted where close and coincident probability of intercept for any two signals in a given time
monopulse information is difficult to extract. Table I and mean period between signal coincidence can be found
provides signal IDs, absolute power incident to aircraft (if in [6] but will not be presented in detail in this work as the
emitter positioned at antenna boresight), pulse width, and focus will be on the extraction of information from the
PRI. multi-signal coincidence condition expected to exist.
3
4 • d/dt threshold = 0.14V
Vout (v)
0.5
maximum detected voltages at the 225º and 315º quadrant 0.0
receivers. Part of the PDE decision process is to determine -0.5
when a positive edge is processed as an individual input -1.0
t (us)
pulse or as a summation of separate, coincident pulses. This -1.5
0.0 5.0 10.0 15.0
is achieved by ‘holding’ the voltage/power signal in a
particular quadrant at an initial ‘start’ signal until a 1.5
45 deg PDE algorithm output
corresponding ‘stop’ is identified. For the signals in Fig. 6 1.0
this is illustrated by ‘P1E_start’ edge identification in the 0.5
Vout (v)
45° quadrant followed by ‘P1N_start’ edge. Since the 0.0
‘P1E_stop’ edge has not yet been detected, equations (1) -0.5
Vout (v)
0.5
0.0
the stop edges are also used to provide end of pulse info -0.5
and pulse width, up to the limitations of the ERDLVA -1.0
t (us)
RF/logarithmic amplifiers in the system. -1.5
Also significant to note, since direction finding relies on a 0.0 5.0 10.0 15.0
comparison of the relative power and detected voltages in 135 deg PDE algorithm output
1.5
two adjacent quadrants with the two strongest detected 1.0
signals at that particular time, using just the initial edge 0.5
Vout(v)
2.0
simultaneous RWR multi-quadrant processing to enable
1.5
interpretation of time-coincident RF threat signals. The
1.0 approach was shown through simulations to provide an
accurate method of separating time-coincident detected RF
0.5 signals with video outputs typical of commonly available
COTS ERDLVAs.
0.0
0.0 5.0
t (us)
10.0 15.0 In this paper the presentation is limited to specific,
static cases to allow for ‘discrete’ explanation of the
(a) concepts. It is understood that in different threat
environments with highly dynamic threat/platform relative
45 deg video out spatial positioning an infinite number of signal
3.0
combinations can be encountered. This necessitates a more
2.5 exhaustive examination of the presented research to refine
and optimize the concepts for specific operational
2.0 environments and tailor the approach for complementary
video out (v)