<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of Binary Detection of Small Unmanned Aerial Vehicles</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Denys Bakhtiiarov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Chumachenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Lavrynenko</string-name>
          <email>oleksandrlavrynenko@tks.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Chumachenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Kurushkin</string-name>
          <email>vitaliy.kurushkin@npp.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Kosmonavta Komarova ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>3 Maksym Zaliznyak, Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>312</fpage>
      <lpage>321</lpage>
      <abstract>
        <p>This research offers a method for detecting Small Unmanned Aerial Vehicles (sUAVs) in binary using state-of-the-art technology and signal processing techniques. The proposed method combines machine learning and signal analysis techniques to reliably determine the presence of sUAVs in a particular airspace. Pattern recognition, real-time data processing, and spectral analysis are the three primary phases of the approach. Qualitative characteristics of sUAV signals can be identified by spectral analysis. The system can learn and identify these properties and make judgments regarding the presence or absence of sUAVs thanks to the application of machine learning methods. Furthermore, the system's ability to recognize common patterns of sUAV activity is improved by the integration of pattern recognition. Processing data in real-time guarantees system responsiveness and lowers the number of false signals. The efficiency of the suggested sUAV detection system is strongly demonstrated by experimental results acquired in a variety of environmental circumstances. This highlights how the system can improve airspace monitoring measures' effectiveness and safety.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Binary detection</kwd>
        <kwd>signal processing</kwd>
        <kwd>spectral analysis</kwd>
        <kwd>detection accuracy</kwd>
        <kwd>airspace monitoring</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Let’s consider the task of binary detection of
small-sized targets against the background noise
of the receiving channel of an active radar system
from the perspective of the statistical hypothesis
testing theory in the presence of interference.
Initially, let’s assume that the movement
parameters of the UAV are known [1–3], hence
the form of the useful signal is known. Similar
tasks were addressed by many authors when
developing algorithms to detect signals of a
known form, which comprise a bunch of received
radio pulses, against the backdrop of additive
Gaussian noise [4]. In this section, we examine
the task of detecting a small-sized moving target
by processing a set of n amplitude beat signals in
an FMCW radar, determined for each probing
FMCW radio signal over a specific observation
interval t = [0; T].</p>
      <p>The amplitude of the ith beat signal
corresponds to the ith probing FMCW radio
pulse in the series [5].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Statement</title>
      <p>The formulation of this task is determined by the
specific nature and technical implementation of
receiving channels in typical ground-based
shortrange active radars with probing FMCW radio
signals. In such contemporary digital radars, for
each probing FMCW radio signal, signal beat
approximation, we’ll describe the correlation
function of the Gaussian random process using
a delta function. As can be inferred from
expression (1), random variations in the
background’s RCS lead to a multiplicative
transformation of the useful signal A (t) ,
meaning they act as multiplicative interference.
The background’s RCS, is
 f (b2 b2 ) ,
nonlinearly incorporated into the amplitude
expression of the reflected signal, as described
by expression (1) (through the square root).</p>
      <p>Let’s determine the density distribution of
the square root of the RCS and subsequently
the density distribution of the amplitude of the
reflected signal.</p>
      <p>It’s well-known that a nonlinear
transformation of a random variable results in
the alteration of its distribution law in the
following way [11]:</p>
      <p>W (B) = W[X = (B)] d(B) ,
dB
(2)
(3)
where W ( X ) is the normal probability density
distribution of the random variable X.</p>
      <p>W (B) is the sought-after probability density
distribution of the random variable A.</p>
      <p>(B) is the function inverse to the function
B = ( X ) .</p>
      <p>In this context, X =  f (b2 b2 ) represents a
stationary random process, B =  f (b2 b2 ) ,
and the density distribution of instantaneous
RCS values at a certain point in time is
described by a Gaussian law:
samples from the output of the analog-digital
converter are processed [6]. This processing
involves calculating the Fast Fourier Transform,
followed by delineating the amplitude spectrum
to determine the distance to relevant objects [7,
8]. Such objects could be a background surface of
a particular type. Hence, a distinctive feature of
the method discussed in this subsection is the
processing of a set of amplitude samples of
signals reflected from background surfaces or
objects included in a burst of radio pulses.</p>
      <p>First, let’s determine the probability density of
instantaneous signal values at the detector’s
input both in the presence and absence of UAVs
[9].</p>
      <p>During the observation time t = 0;T  , such
amplitude variation of the radio signal is
represented by the time function A (t) . This time
function A (t) contains information about the
presence of UAVs. Therefore, we’ll consider
A (t) it as the useful signal at the detector’s
input. Let’s first address the task of detecting
UAVs for a specific set of model parameters,
described by expression (1).</p>
      <p>Let’s assume that the detector’s input receives
an additive mixture of the useful signal A (t) and
the noise of the receiving path, which we will
consider as Gaussian and delta-correlated. As
inferred from the materials presented earlier, the
power of the useful signal exceeds the power of
the additive noise of the receiving path by 25–30
dB [6]. Under these conditions, the density
distribution of the envelope of the observed radio
signal follows a normal law with an average value
equal to the instantaneous value of the useful
signal envelope. Let’s represent the observed
signal Y(t) as the sum of the useful signal A (t)
and the receiving path noise n(t):</p>
      <p>Y (t) = A (t) + n(t) .
(1)</p>
      <p>In [10], it is demonstrated that the effective
scattering surface of the background during the
observation of the useful signal acts as a
stationary Gaussian random process. The
temporal correlation interval of this process is
considerably shorter than the duration of the
observed useful signal. As a first
where m f is the average RCS of the
background ( m =  f 0 ), in square meters; σ
f
represents the root mean square deviation of
instantaneous RCS values of the background
over the observation time of the useful signal,
in square meters [12].</p>
      <p>In this expression, to simplify the notation,
bi-static angle designations b2 and b2 have
been omitted. In general, they are functions of
time during the observation of the useful signal
A (t) . However, in the context discussed,
variations of the mentioned bi-static angles do
not result in changes to the background RCS as
described by expression (2).</p>
      <p>The random variations in the background
RCS  f over the observation time of the useful
signal can be represented as the sum of the
average value  f 0 and the fluctuation
component  f :

 f =  f 0 +  f .</p>
      <p>The multiplicative nature of interference
about the useful signal arises from fluctuations
in the RCS (Radar Cross-Section) of the
background. However, the average value of the
background’s RCS doesn’t distort the shape of
the useful signal.</p>
      <p>The probability density distribution of the
fluctuating component of the background RCS
can be written as [13]:</p>
      <p>
W ( f ) =</p>
      <p>1
2
f
  2
1 f 
− 
 e 2 f  .</p>
      <p>Expressing the random variable X through B
and calculating the derivative, we obtain:
X = (B) = B2, d(B) = 2 B .</p>
      <p>dB</p>
      <p>From this, we derive the sought distribution
law of the square root from RCS:
W (B) =
2  B
2 f
 e−12 B2−mff 2 .</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref12">7</xref>
        )
      </p>
      <p>The useful signal A (t) is the product of the
deterministic function f (t) and the square root
of the random variable  f :</p>
      <p>
        A(t) = f  f (t) = f  AOTR  1+ kA(t) + 2kA(t)cos(t)
(
        <xref ref-type="bibr" rid="ref13">8</xref>
        )
      </p>
      <p>It’s known that multiplying a stationary
random process  f by a non-random time
function f (t) results in a non-stationary
random process with the same distribution law
W (  f ) over the observation [14] interval of
the useful signal. Note that the multiplier AOTR
also varies over time as the UAV moves due to
changes in distances RAB , RBC , RAC , and the
antenna gain factor. We consider these changes
to be insignificant compared to the influence of
the oscillating multiplier f (t) . In this case, the
non-stationary process is the result of the
product of the useful signal A (t) and the
multiplicative interference  f . The
nonstationarity of the random process A (t) is due
to the variability of the variance D(  f ) by
f 2 (t) times, leading to a change in the scale of
the probability density distribution W (  f ) .</p>
      <p>
        The change in dispersion over time,
described by expression (
        <xref ref-type="bibr" rid="ref13">8</xref>
        ), according to the
law of the useful signal can be written as
follows:
(
        <xref ref-type="bibr" rid="ref9">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref1 ref10">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">6</xref>
        )
      </p>
      <p>The probability distribution density of
instantaneous values of the useful signal over
the observation period can be written as
follows [15]:</p>
      <p>
        Regrettably, the integrals in formulas (
        <xref ref-type="bibr" rid="ref12">7</xref>
        )–
(
        <xref ref-type="bibr" rid="ref14">9</xref>
        ) cannot be expressed in terms of elementary
functions and can only be determined by
numerical integration.
      </p>
      <p>W ( A ,t) </p>
      <p>AO/TR  1+ kA (t) + 2  kA (t)  cos(t)  2  f</p>
    </sec>
    <sec id="sec-3">
      <title>3. Method of Binary Detection of</title>
    </sec>
    <sec id="sec-4">
      <title>SUAV</title>
      <p>The useful signal</p>
      <p>A (t) , modulated</p>
      <p>by
multiplicative interference, is observed against
the backdrop of additive Gaussian noise in the
reception path. The noise correlation interval
of the reception path does not exceed one
microsecond. The duration of the useful signal
is in the order of seconds [16]. Hence,
disregarding the correlated noise samples n(t),
we regard it as white Gaussian noise with a
zero mean value and a probability distribution
density of instantaneous values:</p>
      <p>Where σn is the root mean square deviation of
the noise measurements in the receiving system.</p>
      <p>
        The random process A (t) is independent of
the receiving system noise. The probability
density function of the instantaneous values of
the process Y (t) from formula (1), represented as
the sum of two independent random processes, is
determined by the convolution of the probability
density of the receiving system noise, described
by expression (
        <xref ref-type="bibr" rid="ref18">11</xref>
        ), and the probability density of
the useful signal, described by expression (
        <xref ref-type="bibr" rid="ref15 ref16 ref20 ref23 ref3 ref6">10</xref>
        ), as
follows:
      </p>
      <p>
W (Y ,t) =  WA (Y − n, t) Wn (n)dn .</p>
      <p>
        −
(
        <xref ref-type="bibr" rid="ref18">11</xref>
        )
      </p>
      <p>
        Or, taking into account (
        <xref ref-type="bibr" rid="ref15 ref16 ref20 ref23 ref3 ref6">10</xref>
        ) and (
        <xref ref-type="bibr" rid="ref18">11</xref>
        ), we
obtain:
W (Y , t) =
−
 −1(Y −n)2 −mf 2 + n 2 −1(Y −n)2 −mf 2 + n 2
      </p>
      <p>2 f (t)f   n    2 f (t)f   n  
Y   e  dn −  n  e  dn</p>
      <p>−
f (t)    f  n</p>
      <p>
        The density function described by formula
(
        <xref ref-type="bibr" rid="ref24">13</xref>
        ) of the instantaneous values of the observed
signal Y (t) at the input of the detector
characterizes a non-stationary random process
with time-varying variance due to the motion of
the target relative to the background surface [16].
      </p>
      <p>It is known that the detection of small targets
is based on the processing of the observed signal.</p>
      <p>In this case, the samples of such a signal are the
amplitudes of LFM radio pulses observed over a
time interval t 0,T  . The optimal signal
detection algorithm will be sought based on the
minimum average risk criterion, taking into
account which leads to the determination of a
specific expression of the likelihood ratio.</p>
      <p>
        The density distribution described by formula
(
        <xref ref-type="bibr" rid="ref24">13</xref>
        ) of the instantaneous values of the observed
signal Y (t) at the detector’s input characterizes a
non-stationary random process with
timevarying variance due to the target’s movement
relative to the background surface.
      </p>
      <p>It is known that the detection of small targets
is based on the processing of the observed signal.</p>
      <p>In this case, the samples of such a signal are the
amplitudes of the LFMC radio pulse batch
observed over the time interval t 0,T  . The
optimal algorithm for detecting the useful signal
will be sought based on the minimization of the
average risk, the consideration of which leads to
the determination of a specific expression for the
likelihood ratio [17].</p>
      <p>L(Y ) = W (Y / H1) .</p>
      <p>W (Y / H0 )</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref27">14</xref>
        )
(
        <xref ref-type="bibr" rid="ref21">12</xref>
        )
(
        <xref ref-type="bibr" rid="ref24">13</xref>
        )
Hypothesis H₁ corresponds to the case of the
UAV’s movement in front of the background
surface, where the radio signal reflected from
the background is modulated by the reflected
radio signal from the UAV. The model of the
signal observed at the detector’s input under
the assumption of the validity of the hypothesis
      </p>
      <p>
        H1 is described by the following expression:
Y (t) = AO/TR   f (b2 b2 )  1+ kA (t) + 2  kA (t)  cos(t) = AO/TR   f (b2 b2 )  f (t)
(
        <xref ref-type="bibr" rid="ref28">15</xref>
        )
      </p>
      <p>The randomness of the process Y (t) is caused
by fluctuations in the Radar Cross-Section (RCS)
 f (b2 b2 ) of the background. The modulation
law Y (t) is determined by the function f(t), which
accounts for the non-stationary nature of the
sample distribution density Y under the
condition of UAV movement. Assuming that the
correlation interval of RCS fluctuations is much
smaller than the duration of the useful signal, we
can express the density distribution of sample
values Y under the presence of a moving UAV as
follows:
W (Y / H1, t) =
2 n</p>
      <p> 
AO/TR  2   f i=1 f (ti )
2
1 n  Yi2 −mf 
Yi  e−2AO/2TR2f i=1  f (ti ) </p>
      <p>Hypothesis H₀ corresponds to the case of the validity of the hypothesis H1 is described
receiving a radio signal reflected from the by the following expression:
background. The model of the signal observed
at the detector’s input under the assumption of</p>
      <p>Y (t) = AO/TR   f (b2 b2 ) = AO/TR   f (b2 b2 )</p>
      <p>
        The density distribution of the sample Y
under the assumption of hypothesis H₀, in this
case, is stationary, and, following a similar
pattern to expressions (
        <xref ref-type="bibr" rid="ref15 ref16 ref20 ref23 ref3 ref6">10</xref>
        ) and (
        <xref ref-type="bibr" rid="ref18">11</xref>
        ), it is
expressed as follows:
      </p>
      <p>
        Substituting the conditional probability
density functions (
        <xref ref-type="bibr" rid="ref29">16</xref>
        ) and (
        <xref ref-type="bibr" rid="ref30">17</xref>
        ) into (18), we
obtain:
      </p>
      <p>W (Y / H0) =</p>
      <p>2  nYi e−2AO/2T1R2f i=n1 (Yi2−mf )2</p>
      <p>AO/TR  2 f i=1
 2 n n Yi e−2AO/2T1R2f i=n1 Yi2f−(mti)f 2
L(Y ) =  AO/TR  2 f  i=1 f (ti )
 2 n n Yi e−2AO/2T1R2f i=n1 (Yi2−mf )2
 AO/TR  2 f  i=1</p>
      <p>
        The obtained expression describes the
desired likelihood ratio for the problem of
(
        <xref ref-type="bibr" rid="ref29">16</xref>
        )
(
        <xref ref-type="bibr" rid="ref30">17</xref>
        )
(18)
(19)
detecting UAVs in the case of multiplicative
interaction between a known useful signal and
amplitude fluctuations of the background.
      </p>
      <p>The algorithm for detecting UAVs involves
comparing the expression (19), L(Y ) , with a
certain threshold 0 . We simplify the optimal
detection algorithm described by formula (19)
through logarithmization.</p>
      <p>Therefore, the optimal algorithm for UAV
detection based on the Bayesian criterion,
considering the multiplicative interaction</p>
      <p>nYi4 − n Yi4 − 2 m  nYi2  1−
z = i=1 i=1 f 2 (ti ) f i=1
2 AO/2TR 2f
between a known useful signal and amplitude
fluctuations of the background, takes the
following form [17]:
1 </p>
      <p> zH1 (ti )
f (ti )  where 
 zH0 (ti )
z (ti ) = 2 AA1O/2T−R B12f − i=n1 ln f (ti ) −1 + ln 0 —the modified threshold of the detector,
n  m 
A =  
1 i=1  f (tif )  .</p>
      <p>2
B = n  m2 f
1
(21)</p>
      <p>In the case of discrete sampling of
observations Y (t) at the detector’s input, it
follows from expression (21) that to decide the
presence of a signal caused by UAV at the
detector’s input, a series of operations
involving the summation of nonlinearly
transformed samples from the observed
realization Y (t) and the multiplication of the
square of the realization Y (t) with a copy of the
expected useful signal, followed by summation
of the obtained results and comparison with a
threshold, should be performed [16].</p>
      <p>A distinctive feature of the modified
detector threshold z (ti ) is its time
dependency proportional to the expected
signal due to the non-stationary nature of the
random process. When the threshold level is
exceeded, the presence of the moving UAV is
confirmed; otherwise, a decision is made about
its absence [17].</p>
      <p>The structure of the optimal detector for
detecting a moving UAV under the considered
conditions is depicted in Fig. 1.
The structural diagram of the optimal detector
does not show the synchronization device
responsible for clocking the detector blocks.</p>
      <p>Since the additional phase shift during the
reflection of the radio signal by the target and the
background surface is random, it is necessary to
add a second quadrature channel to the
structural diagram presented in Fig. 2.16, where
the function f (t) is defined with a phase shift of
π/2 relative to the initial phase of the f (t)
function.</p>
      <p>The detection algorithm for UAV (21) is
expedient to implement in the digital processing
block of the amplitude signals received in the
pulse sequence. However, for the
implementation of this algorithm, including
setting the threshold, precise knowledge of
parameters such as the coordinates (angular
position) of the phase center (point) of the
background surface reflection, the values of
current bistatic angles, the three-dimensional
shape of the bistatic RCS of the target and
background, is required. Furthermore, the start
time of the UAV flight relative to the
“radarbackground” line of sight is unknown. In the
conditions of a priori uncertainty about these
parameters, the application of known
approaches to eliminate this uncertainty
significantly complicates the above algorithm
and the structural diagram of the optimal
detector [18]. To obtain a practically
implementable UAV detection algorithm, we will
make a series of simplifications relative to the
observation model Y (t) . These simplifications
will lead to the implementation of a
quasioptimal detection algorithm.</p>
      <p>We will consider the model of the observed
input signal of the detector on the interval [0, T]
as an additive sum of a non-random useful signal
and Gaussian noise limited to  fb in bandwidth:</p>
      <p>Y (t) = AOTR 1+ kA (t) + 2  kA (t)  cos(t) + n(t)</p>
      <p>For such an observation model, the detector
design has been explored by numerous authors
[19, 20]. Let’s briefly outline the results of
solving this problem. We will assume that the
data observation sampling interval is t = 1 .</p>
      <p>2  fb
W (Y / H1) =</p>
      <p>2 n
AO/TR  2  f  i=1 Yi  e</p>
      <p>1 n(Yi2 −mf )2
−2AO/2TR2f i=1</p>
      <p>For the likelihood ratio (22), the probability
density in the presence of a signal H1 is
expressed as follows:</p>
      <p>Instead of comparing it to the threshold of
the likelihood ratio or function, we can
compare the logarithms of expressions (25) or
(26). Thus, we obtain the following decision
rule for the considered detection problem [21]:
z =
2 T  zH1 (t)</p>
      <p>Y (t) A(t)dt 
N0 0  zH0 (t)</p>
      <p>.</p>
      <p>The formula z (t) = ln 0 + Ey represents the</p>
      <p>N0
modified threshold. Therefore, the detection
device for a moving small-sized target under
these conditions corresponds to the
wellknown correlation receiver scheme depicted in</p>
      <p>Fig. 2.
(24)
(25)
(22)
(23)
(26)</p>
      <p>Where σn is the root mean square deviation
of the noise samples in the receiving path.</p>
      <p>Under these conditions, the expression for
the likelihood ratio will be written in a known
manner [19]:</p>
      <p>− t nAi2
L(Y ) = e N0 i=1</p>
      <p>2t nYiAi
 e N0 i=1</p>
      <p>.</p>
      <p>The formula can be alternatively expressed
as a likelihood ratio functional, which
N0 = 2  fb represents the spectral power</p>
      <p>n
density of the noise in the receiving system.</p>
      <p>The synchronization device ensures coordinated
operation between the reference generator and the
integrator, facilitating the comparison of its output
signal z(t) with the threshold. To ensure the
functionality of the correlation detector, it is
necessary to multiply the reference and observed
signals at coincident time points. However, the
arrival time of the observed signal is unknown.
In this case, the reference signal of the
correlation detector should be time-shifted
relative to the observed signal, and a procedure
for searching and capturing the useful signal
should be performed. To simplify this
procedure, instead of a correlation detector for
the useful signal, its version with matched
filters should be used. When the useful signal’s
time coincides with the impulse response of the
matched filter, the value of the correlation
integral will match the amplitude of the output
signal of the matched filter. The impulse
response of the matched filter h() for the
useful signal A(t) is its mirrored copy, shifted
in time by t₀. The structural diagram of the UAV
detector with known parameters of its motion
using matched filters is shown in Fig. 3.
The reference signal A(t) has a random initial
phase due to the reflection of radio waves from
the target, underlying surfaces, and
background. When radio waves are reflected
from these objects, an additional phase shift
becomes random.</p>
      <p>To eliminate the dependence of the
reference signal on the influence of random
phase shifts during the reflection of radio
waves, we use a structural scheme of a detector
for a signal of known shape with a random
initial phase. In this scheme, the detector
contains
two
quadrature
generators</p>
      <p>of
reference signals, A0c (t) and A0s (t) :</p>
      <p>A0 (t) = ( A0c )2 + ( A0s )2 = const.</p>
      <p>(27)</p>
      <p>Similarly to how the envelope of a harmonic
signal expressed through quadrature
components does not depend on time:</p>
      <p>E0 (t) = E2 cos()2 + E2 sin()2 = E .</p>
      <p>(28)</p>
      <p>In this case, processing the observed signal
in the small-sized target detection task will
involve comparing it to a threshold using the
following decision statistic:
  2   2
z(t) =   Y (t) A0c (t − )d  +   Y (t) A0s (t − )d  ,
−  − 
(29)
where Y (t) is the observed realization of the
signal at the input of the detector.</p>
      <p>A0c (t) is the cosine component of the
reference signal for the matched filter hc (t) .</p>
      <p>A0s (t) is the sine component of the reference
signal for the matched filter hs (t) .</p>
      <p>The structural diagram of the quadrature
detector for the UAV with known parameters
of its motion using matched filters is shown in</p>
      <p>Fig. 4 [5].</p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusions</title>
      <p>Thus, if the motion parameters of the UAV are
known and the background reflection
characteristics are sufficiently stable, the
detector can be represented by a correlation
scheme or a scheme with matched filters.</p>
      <p>The structural scheme of the SUAV useful
signal detection device for the background radar
based on parallel matched filters is developed.</p>
      <p>Based on approximations of the widths of
functions describing the change in the amplitude
of the matched filter response at the mismatch in
the parameters of the useful signal, the method
and algorithm for calculating the number of
matched filters of the IBPLA detector for the
background radar are obtained.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>on YOLOv5l</source>
          , 10th International
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Computing</given-names>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2022</year>
          )
          <fpage>210</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>doi: 10.1109/ISCTech58360</source>
          .
          <year>2022</year>
          .
          <volume>00042</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , in: 2021 IEEE 8th International
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2021</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          10.1109/picst54195.
          <year>2021</year>
          .
          <volume>9772161</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Accelerating</given-names>
            <surname>Lens</surname>
          </string-name>
          , in: 2020 IEEE
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Infocommunications</surname>
          </string-name>
          . Science and
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/picst51311.
          <year>2020</year>
          .
          <volume>9467886</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <article-title>An Improved CornerNetLite Method for Pedestrian Detection of Unmanned Aerial Vehicle Images, China Automation Congress (</article-title>
          <year>2021</year>
          )
          <fpage>2322</fpage>
          -
          <lpage>2327</lpage>
          . doi:
          <volume>10</volume>
          .1109/CAC53003.
          <year>2021</year>
          .
          <volume>972</volume>
          8245.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Veselska</surname>
          </string-name>
          et al.,
          <article-title>A Wavelet-Based Steganographic Method for Text Hiding in an Audio Signal</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <issue>15</issue>
          ) (
          <year>2022</year>
          )
          <article-title>5832</article-title>
          . doi: 0.3390/s22155832.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Babaryka</surname>
          </string-name>
          , et al.,
          <source>Deep Learning Methods Application for Object Detection Tasks Using Unmanned Aerial Vehicles, IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</source>
          (
          <year>2022</year>
          )
          <fpage>808</fpage>
          -
          <lpage>811</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET55632.
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Development and Operation Analysis of Spectrum Monitoring Subsystem</source>
          <volume>2</volume>
          .
          <fpage>4</fpage>
          -
          <issue>2</issue>
          .5 GHz Range,
          <source>DataCentric Business and Applications</source>
          <volume>48</volume>
          (
          <year>2020</year>
          )
          <fpage>675</fpage>
          -
          <lpage>709</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -43070-2_
          <fpage>29</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bogachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers</article-title>
          , in: 5th
          <source>International Scientific and Practical Conference Problems of Infocommunications. Science and Technology</source>
          (
          <year>2018</year>
          )
          <fpage>581</fpage>
          -
          <lpage>585</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2018</year>
          .
          <volume>8632151</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Platonenko</surname>
          </string-name>
          ,
          <article-title>Video Channel Suppression Method of Unmanned Aerial Vehicles</article-title>
          ,
          <source>in: IEEE 41st International Conference on Electronics and Nanotechnology</source>
          (
          <year>2022</year>
          )
          <fpage>473</fpage>
          -
          <lpage>477</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>doi: 10.1109/ELNANO54667</source>
          .
          <year>2022</year>
          .
          <article-title>Techniques Relating to the Malicious Use 9927105</article-title>
          .
          <article-title>of Small Unmanned Aerial Systems</article-title>
          , IEEE
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Pang</surname>
          </string-name>
          , et al.,
          <source>A Novel Spatiotemporal Aerospace and Electronic Systems Saliency Method for Low-Altitude Slow Magazine</source>
          <volume>37</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>14</fpage>
          -
          <lpage>28</lpage>
          . doi: Small Infrared Target Detection, IEEE
          <volume>10</volume>
          .1109/MAES.
          <year>2022</year>
          .
          <volume>3151308</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Geoscience</surname>
            and Remote Sensing Letters [18]
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Ming</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
          </string-name>
          , Improving the
          <volume>19</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/LGRS.
          <year>2020</year>
          .
          <article-title>Performance of Seabirds Detection 3048199</article-title>
          . Combining Multiple Semantic
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <article-title>A Procedure for Segmentation Models, IEEE Failures Diagnostics of Aviation Radio International Geoscience</article-title>
          and Remote Equipment, International Conference on Sensing Symposium, Waikoloa (
          <year>2020</year>
          ) Advanced Computer Information 1608-
          <fpage>1611</fpage>
          . doi:
          <volume>10</volume>
          .1109/IGARSS39084.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Technologies</surname>
          </string-name>
          (
          <year>2023</year>
          )
          <fpage>100</fpage>
          -
          <lpage>103</lpage>
          . doi:
          <year>2020</year>
          .9324102.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          10.1109/ACIT58437.
          <year>2023</year>
          .
          <volume>10275337</volume>
          . [19]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ni</surname>
          </string-name>
          , et al.,
          <source>Ridge Detection and</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          , G. Konakhovych,
          <source>Perceptual Grouping Based Automatic O. Lavrynenko, Protected System of Counting of Rice Seedlings Using UAV Radio Control of Unmanned Aerial Images, 6th International Conference on Vehicle, 4th International Conference on Image, Vision and Computing</source>
          (
          <year>2021</year>
          )
          <fpage>61</fpage>
          -
          <lpage>Methods</lpage>
          <source>and Systems of Navigation and 65. doi: 10.1109/ICIVC52351</source>
          .
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Motion</given-names>
            <surname>Control</surname>
          </string-name>
          (
          <year>2016</year>
          )
          <fpage>196</fpage>
          -
          <lpage>199</lpage>
          . doi: 9526939.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          10.1109/MSNMC.
          <year>2016</year>
          .
          <volume>7783141</volume>
          . [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Fang</surname>
          </string-name>
          , et al.,
          <source>Infrared Small UAV Target</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          , G. Konakhovych,
          <article-title>Detection Based on Residual Image O. Lavrynenko, An Approach to Prediction via Global and Local Dilated Modernization of the Hat and COST 231 Residual Networks</article-title>
          ,
          <source>IEEE Geoscience and Model for Improvement of Remote Sensing Letters</source>
          <volume>19</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          Electromagnetic Compatibility in doi: 10.1109/LGRS.
          <year>2021</year>
          .
          <volume>3085495</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <article-title>Premises for Navigation</article-title>
          and Motion [21]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hong</surname>
          </string-name>
          , et al.,
          <source>Highway Crack Control Equipment, IEEE 5th Segmentation from Unmanned Aerial International Conference on Methods Vehicle Images Using Deep Learning, and Systems of Navigation and Motion IEEE Geoscience and Remote Sensing Control</source>
          (
          <year>2018</year>
          )
          <fpage>271</fpage>
          -
          <lpage>274</lpage>
          . doi: Letters 19 (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSNMC.
          <year>2018</year>
          .
          <volume>8576260</volume>
          . 10.1109/LGRS.
          <year>2021</year>
          .
          <volume>3129607</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yu</surname>
          </string-name>
          , et al.,
          <article-title>Spatial Cognition-Driven Deep Learning for Car Detection in Unmanned Aerial Vehicle Imagery</article-title>
          ,
          <source>IEEE Transactions on Cognitive and Developmental Systems</source>
          <volume>14</volume>
          (
          <issue>4</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1574</fpage>
          -
          <lpage>1583</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCDS.
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>Self-Attention Guidance and Multiscale Feature Fusion-Based UAV Image Object Detection</article-title>
          ,
          <source>IEEE Geoscience and Remote Sensing Letters</source>
          <volume>20</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/LGRS.
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Larin</surname>
          </string-name>
          , et al.,
          <source>Prediction of the Final Discharge of the UAV Battery Based on Fuzzy Logic Estimation of Information and Influencing Parameters, IEEE 3rd KhPI Week on Advanced Technology</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek57 572.
          <year>2022</year>
          .
          <volume>9916490</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Swinney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Woods</surname>
          </string-name>
          ,
          <article-title>A Review of Security Incidents</article-title>
          and Defence
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>