Next Article in Journal
Energy Efficient SWIPT Based Mobile Edge Computing Framework for WSN-Assisted IoT
Next Article in Special Issue
A New Pseudolinear Filter for Bearings-Only Tracking without Requirement of Bias Compensation
Previous Article in Journal
PHY, MAC, and RLC Layer Based Estimation of Optimal Cyclic Prefix Length
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

TMA from Cosines of Conical Angles Acquired by a Towed Array

1
Naval Group, 83190 Ollioules, France
2
Université de Toulon, Aix Marseille Univ, CNRS, IM2NP, CS 60584, 83041 Toulon, CEDEX 9, France
3
Naval Group—Technocampus Océan, 44340 Bouguenais, France
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(14), 4797; https://doi.org/10.3390/s21144797
Submission received: 18 June 2021 / Revised: 9 July 2021 / Accepted: 12 July 2021 / Published: 14 July 2021

Abstract

:
This paper deals with the estimation of the trajectory of a target in constant velocity motion at an unknown constant depth, from measurements of conical angles supplied by a linear array. Sound emitted by the target does not necessarily navigate along a direct path toward the antenna, but can bounce off the sea bottom and/or off the surface. Observability is thoroughly analyzed to identify the ghost targets before proposing an efficient way to estimate the trajectory of the target of interest and of the ghost targets when they exist.

1. Introduction

Bearings-only target motion analysis (BOTMA) is a problem that has been widely studied and various solutions have been proposed in the literature: batch [1,2,3,4,5] or recursive filter (such as extended Kalman filter [6,7,8], unscented Kalman filter [9], particle filter [10], modified instrumental variable [11,12,13]), or a mix of recursive and batch methods [14]. Citing all the papers dealing with this topic is now a hard task. Among the abundant literature, most papers share the same assumption: the target is moving in a straight line with a constant speed, while the passive observer is maneuvering adequately in order to ensure the observability of the target [15,16,17]. The bearings are the measurements.
In this paper, we are concerned with the same problem, except that the available measurements are the cosine of the relative bearings, also called conical angles because the target belongs to the cone of ambiguity whose revolution axis is the line along which the towed array is moving (see [18] p. 39). Implicitly, we consider a target moving in 3D at a constant and unknown depth in near field; in this case, the two more energetic rays are the direct and the reflected paths (bottom or surface). In most cases, the sound bounces off the sea bottom. Therefore, we extend our analysis to surface- and sea bottom-bounced rays.
Indeed, the array detects the cosine of the relative angle of the direction of arrival by means of a suitable spatial filtering method such as beamforming, or more sophisticated techniques (see [19]). In the near field, sound can propagate to the sensor array along the direct path and/or the bottom-reflected path, and/or the surface-reflected path. Most of the time, at most, two rays coming from the same target are detected [18,20].
Unlike Gong [21] and Blanc-Benon [22], who addressed the three-dimensional target motion analysis (TMA) from a sequence of time differences of arrival (TDOA) of a signal traveling by two different paths coupled with a sequence of azimuths, we assume in this paper that the available measurements are the cosines of the conical angles only. In [23], a similar problem was addressed, but observability was not studied. We will consider two situations: the first case is devoted to TMA when sound propagates along a non-direct path at each sampling time. This will be the topic of Section 3: we will conduct observability analysis and identify all the ghost targets, given a set of noise-free measurements. We will prove that an assumption of the target’s depth makes the target’s trajectory observable, but not estimable (in the sense that the asymptotic performance given by the Cramér–Rao lower bound—CRLB—of the estimator of the depth is out of the physical constraints, that is, the source is navigating between the surface and the sea bottom).
In the fourth section, we will consider scenarios in which the antenna changes its own route. We will prove that the trajectory of the target is almost certainly observable.
In the fifth section, we will assume that sound will propagate along the direct path and the bottom-reflected path. The two rays will be assumed as being detected. Observability analysis will reveal that only three ghost targets at most exist without maneuvering the antenna. We will check that, in this case, the depth is not “estimable”. We will give a palliative, allowing us to propose an estimator which is operationally acceptable, the price being a small bias. Convincing simulations will be given at the end of this section, proving that, even when the duration of the scenario is short, the estimated trajectory is very close to the true one. A conclusion ends the paper.

2. Notation and Problem Formulation

We consider two underwater vehicles moving at their own constant depth. The first mobile is a surface vessel or a submarine towing a horizontal sensor array, and the second one is the target of interest. Given a Cartesian coordinate system, the acoustic center of the array is located at time t at ( x O ( t ) y O ( t ) z O ) T . At the same time, the target is at ( x T ( t ) y T ( t ) z T ) T . The respective horizontal positions of the target of interest and of the center of the array at time t are denoted by P T ( t ) = ( x T ( t ) y T ( t ) ) T and P O ( t ) = ( x O ( t ) y O ( t ) ) T . The sea bottom depth (assumed to be a constant) is denoted as D. The source is said to be endfire to the line array if its trajectory is in the same line as the array (which implies that the array and the source are at the same depth, and share the same route). It is broadside to the antenna if it navigates in the vertical plane orthogonal to the line array and passing by the acoustic center of the array. The sensor array detects the line of sight of the target; more precisely, ad hoc array processing (or spatial filtering) delivers at time t the cosine of the conical angle c a ( t ) given by cos ( c a ( t ) ) = cos ( θ ( t ) h ( t ) ) cos ( ϕ ( t ) ) m ( t ) , where θ ( t ) and ϕ ( t ) are, respectively, the azimuth (or bearing) and the elevation of the path along which the sound emitted by the source propagates. The angle h ( t ) is the heading of the sensor array. Denoting the relative position coordinates of the source with reference to the acoustic center of the array by x O T ( t ) = x T ( t ) x O ( t ) and y O T ( t ) = y T ( t ) y O ( t ) , we have θ ( t ) = a r c t a n ( x O T ( t ) , y O T ( t ) ) . Figure 1 displays the different angles and the two actors (the observer reduced to the linear array, and the target).
The ray of the sound (or signal) emitted by the source can be reflected by the bottom and/or the surface or travels in the surface or deep channel. The sound–speed profile makes the paths curve. In this paper, we will consider that the target is in the near field (the distance between the source and the array is less than 20 km), and the bottom depth is in the range 2000–5000 m. Due to the large curvature of the ray (about 80 km), we will approximate the path of the sound as a set of zigzags defined by the reflections on the bottom or on the surface. So, we implicitly use the Snell law widely employed in geometrical optics. An image-source is created whose depth ζ T will be called “image-depth”. A path is then defined by the triplet ( δ , n B , n S ) , where
  • δ indicates the direction of the path of the sound emitted by the source: if the path is toward the surface, δ = 1 , otherwise δ = + 1 ,
  • n B is the number of bottom reflections, and
  • n S is the number of surface reflections.
Figure 2 illustrates three different paths
We have to consider the depth difference between the array and the image-source defined by ζ O T ζ T z O if the ray has been reflected (by the sea bottom or by the surface), or ζ O T z T z O if the sound wave uses the direct path.
A general expression of ζ O T based on the triplet ( δ , n B , n S ) is given by ζ O T ( δ , n B , n S ) = 2 δ n B ( 1 ) n S + n B D z O + ( 1 ) n S + n B z T . Note that, given the path, the link between ζ O T ( δ , n B , n S ) and z T is linear: ζ O T ( δ , n B , n S ) = a z T + b , the constants being a function of the triplet ( δ , n B , n S ) , D , and z O . Moreover, ζ O T ( δ , n B , n S ) is null if and only if the antenna and the target are navigating at the same depth ( z T = z O ), and sound is traveling in the direct path. In this case, cos ( ϕ ( t ) ) = 1 . For the sake of simplicity of the notations, we will simply subsequently denote ζ O T instead of ζ O T ( δ , n B , n S ) .
For the above examples, we have ζ O T ( 1 , 0 , 0 ) = z T z O (direct path), ζ O T ( + 1 , 1 , 0 ) = 2 D ( z T + z O ) (bottom-reflected path), and ζ O T ( + 1 , 2 , 1 ) = 4 D ( z T + z O ) (bottom-surface-bottom reflected path). Note that ζ O T ( δ , n B , n S ) can be negative (the image-source is above the surface). Consequently, the cosine of the elevation is cos ( ϕ ( t ) ) = x O T 2 ( t ) + y O T 2 ( t ) x O T 2 ( t ) + y O T 2 ( t ) + ζ O T 2 ( δ , n B , n S ) .
Figure 3a displays the cone of ambiguity, defined by the set of sources sharing the same cos ( ϕ ( t ) ) . In Figure 3b, we plot a direct ray and a bottom-bounced ray, which allows us to figure out the various angles with which we will work.
We assume that the source is moving in constant velocity (CV) motion during the scenario. Our challenge is to estimate its trajectory, i.e., the state vector defining it, X ( x T ( t * ) y T ( t * ) z T x ˙ T y ˙ T ) T , for a chosen t * , from noisy measurements.
We consider two situations:
  • Only one ray is detected by the array during the scenario; in this case, we have at each time t a measurement m ( t ) , given the path along which the wave propagates.
  • Two rays (traveling on two different paths) arrive at the sensor’s antenna. In this case, the available measurement at time t is a couple of measurements, say ( m 1 ( t ) , m 2 ( t ) ) , given the two paths along which the wave propagates.
After the spatial filtering, the antenna supplies a noisy measurement of m ( t ) or a noisy measurement of ( m 1 ( t ) , m 2 ( t ) ) . The noisy measurements are regularly acquired at t k = ( k 1 ) Δ t , k { 1 , , N } , for a fixed sampling time Δ t .
Before attempting to estimate X , we must answer several questions:
  • Is the vector X observable from the set of measurements { m ( t ) , t [ 0 , T ] } ? Note that, in TMA problems, observability is often analyzed in continuous time (see [15,17], for example), even though the noisy measurements are given in discrete time.
  • If not, what are the ghost targets (those which could be detected at the same set of measurements { m ( t ) , t [ 0 , T ] } )?
  • How do we make X observable or with which new information?
  • Is the vector X observable from the set of couples { ( m 1 ( t ) , m 2 ( t ) ) , t [ 0 , T ] } ?
For the cases where X is observable, we have then to compute the asymptotical performance of an unbiased estimator (given by the CRLB [24]), and the performance of our estimators in terms of bias and the covariance matrix. It is worth noting that using the FIM to prove observability can lead to a wrong conclusion [25]. This why we use an analytic approach.

3. TMA from One Ray

In this section, we consider the case where the array collects the cosine of a conical angle, the path of the ray being known by the operator. We start by analyzing the observability of the trajectory of the source of interest.

3.1. Observability Analysis

Theorem 1.
Let a linear antenna measure the cosine of a conical angle in the direction of a source, both in CV motion. The path of the sound emitted by the source is known, as is also the sea bottom depth.
1. 
If the target is broadside to the antenna, then the set of ghost targets is composed of virtual sources broadside to the antenna.
2. 
If the target is endfire to the antenna, the set of ghost targets is composed of virtual sources endfire to the antenna.
3. 
If the target has the same heading as the array (but is not endfire to it), then the set of ghost targets is composed of virtual targets with the same heading as the antenna. More precisely, the ghost image of each ghost target is moving on a cylinder whose axis is the antenna axis, and whose radius is a positive scalar β . The relative ghost target velocity is equal to β times the target’s velocity. The initial distance between the ghost image and the center of the antenna is equal to β times the initial distance between the target-image and the center of the antenna.
4. 
In any other case, for a chosen image-depth ζ G , the set of ghost targets is composed of virtual targets whose motion relative to the array is defined by P O G ( t ) = β P O T ( t ) or P O G ( t ) = β S P O T ( t ) , where S is the 2D axial symmetry around the line of the array, and β is a positive scalar. The scalar β is equal to | ζ O G | | ζ O T | if ζ O T 0 . If ζ O T = 0 (which can happen with a direct path only), β can have any positive value.
Preamble: In the following proof, we choose t * = 0 . Instead of working with the state vector X = ( x T ( 0 ) y T ( 0 ) z T x ˙ T y ˙ T ) T , we will use the relative state vector of the image source, which is Y ( x 0 T ( 0 ) y O T ( 0 ) ζ O T x ˙ O T y ˙ O T ) T . The reason for this is that we are able to recover X from Y without ambiguity.
We will prove this theorem in the special case where the heading of the antenna is equal to 0°, and the value y O T ( t ) is positive. This can be easily obtained with an ad hoc rotation of the whole scenario. This will simplify the expression of the measurement, without loss of generality.
Proof of Theorem 1. 
We are seeking the ghost target whose horizontal position at time t is ( x G ( t ) y G ( t ) ) T , detected in the same cosine of the conical angle, that is
y O T ( t ) x O T 2 ( t ) + y O T 2 ( t ) + ζ O T 2 = y O G ( t ) x O G 2 ( t ) + y O G 2 ( t ) + ζ O G 2 , with x O G ( t ) = x G ( t ) x O ( t ) , y O G ( t ) = y G ( t ) y O ( t ) , and ζ O G is the image-depth of the ghost target. This equality is equivalent to
y O T 2 ( t ) x O T 2 ( t ) + y O T 2 ( t ) + ζ O T 2 = y O G 2 ( t ) x O G 2 ( t ) + y O G 2 ( t ) + ζ O G 2
Note that because the target is moving (as is the ghost target also), the denominators of the left term and of the right term of (1) are two polynomial functions of degree 2.
Case 1: y O T ( t ) is a zero function, i.e., t   y O T ( t ) = 0 .
This means the source is broadside to the antenna: Y T = ( x 0 T ( 0 ) 0 ζ O T x ˙ O T 0 ) T .
In this case, y O T ( t ) = 0 , t [ 0 , T ] . Hence, the set of ghost targets is composed of the virtual targets broadside to the antenna: Y G = ( x 0 G ( 0 ) 0 ζ O G x ˙ O G 0 ) T .
Case 2: y O T ( t ) is not a zero function.
If y ˙ O T = 0 , then y O T ( t ) is a constant. To respect the degrees of the terms of (1), y O G ( t ) is a constant too.
If y ˙ O T 0 , then there is a root, say t ˜ , such as y O T ( t ˜ ) = 0 , since y O T ( t ) is a polynomial function of degree 1. Consequently, y O G ( t ˜ ) = 0 , and t t ˜ , y O G ( t ) 0 .
We deduce that, in both cases ( y ˙ O T = 0 , and y ˙ O T 0 ), there exists a positive value β such that y O G ( t ) = β y O T ( t ) .
( 1 ) { [ x O G 2 ( t ) + y O G 2 ( t ) + ζ O G 2 ] β 2 [ x O T 2 ( t ) + y O T 2 ( t ) + ζ O T 2 ] } y O T 2 ( t ) = 0 x O G 2 ( t ) + ζ O G 2 = β 2 [ x O T 2 ( t ) + ζ O T 2 ]
The quantity x O T 2 ( t ) + ζ O T 2 can be equal to zero at any time, or at one time or never.
Subcase 1: t , x O T 2 ( t ) + ζ O T 2 = 0 .
Then, x O T ( t ) = 0 , t and ζ O T = 0 . Note that this case is the one when the target is traveling in the endfire to the array and at the same depth as the antenna and the path is the direct one. For the same reason,   x O G ( t ) = 0 , t and ζ O G = 0 . The set of ghost targets is hence composed of virtual targets traveling in the endfire to the array and at the same depth as the antenna.
Subcase 2: t ˘ such that x O T 2 ( t ˘ ) + ζ O T 2 0 .
We deduce from (2) that
x O G 2 ( 0 ) = β 2 x O T 2 ( 0 ) + β 2 ζ O T 2 ζ O G 2
x O G ( 0 ) x ˙ O G = β 2 x O T ( 0 ) x ˙ O T
x ˙ O G 2 = β 2 x ˙ O T 2
If x ˙ O T = 0 , then
Y G = ( ± β 2 x O T 2 ( 0 ) + β 2 ζ O T 2 ζ O G 2 β y O T ( 0 ) ζ O G 0 β y ˙ O T ) T , for any positive constant β and any positive constant ζ O G less than β 2 x O T 2 ( 0 ) + β 2 ζ O T 2 . Note that, when y ˙ O T = 0 , the target is motionless relative to the center of the array (both have the same velocity); and when y ˙ O T 0 , the target has the same heading as the array.
If x ˙ O T 0 , then squaring the elements of (4), and using (5), we draw from (3) that β 2 ζ O T 2 = ζ O G 2 . If ζ O T = 0 , then ζ O G = 0 , and the scalar β can take any positive value; else β = | ζ O G | | ζ O T | . In both cases, the trajectory of a ghost target is defined by the state vector Y G = ( ± β x O T ( 0 ) β y O T ( 0 ) β ζ O T ± β x ˙ O T β y ˙ O T ) T . □
Remark 1.
1. 
When the source and the observer are at the same depth, and the path is direct, Theorem 1 recovers the conclusions given in [26].
2. 
The cases (1), (2) and (3) of Theorem 1 are “rare events”, since the events of dealing with a source in endfire, broadside or having the same heading as the antenna during the scenario occur with a probability equal to 0.However,when the target has a trajectory close to one of these special cases, the estimates will have a poor behavior.
3. 
For case (4), when the detected ray is not a direct path, for example, when the ray is bottom-reflected, a hypothesis about the source is sufficient to obtain one solution, corresponding to a ghost target. Indeed, if we suppose that the depth of the target is z A s (whereas the true value is z T ), then we have β = 2 D ( z A s + z O ) 2 D ( z T + z O ) , whose biggest value β M a x = 2 D z O 2 D ( z T + z O ) , and the minimum value is β M i n = 2 D ( z M a x + z O ) 2 D ( z T + z O ) , where z M a x is the largest depth of a submarine vehicle. Typically, in deep water, D 4000 m. A reasonable choice of z M a x could be 400 m. We can then have a range of β : [ β M i n , β M a x ] = [ 7600 z O 8000 ( z T + z O ) , 8000 z O 8000 ( z T + z O ) ] . For instance, when the depths of the antenna and the target are, respectively, 200 and 100 m, we have [ β M i n , β M a x ] = [ 0.974 , 1.013 ] . In this way, we bound the set of ghost targets, and we can expect that the bias induced by a wrong choice of z A s is very low.
4. 
For case (4) again, with a direct path, if the target is not at the same depth as the antenna, β = z A s z O z T z O . Because β is a positive number, z A s z O has the same sign as z T z O : if z T > z O , then z O < z A s z M a x , and [ β M i n , β M a x ] = [ 0 , z M a x z O z T z O ] ; if z T < z O , then 0 z A s < z O , and [ β M i n , β M a x ] = [ 0 , z O z T z O ] . In both cases, the range [ β M i n , β M a x ] is too wide to be useful.
If the target and the antenna are at the same depth, β can take any positive value.

3.2. Estimation of the Trajectory

We run 500 Monte Carlo simulations for a typical scenario described as follows:
The observer starts from ( 0 0 ) T at the depth z O = 200   m. Its speed and heading are, respectively, 5 m/s and 0°. The initial position of the target is ( 5000 7000 ) T and its depth is z T = 100   m. Its route is 45° and its speed is 4 m/s.
  • The measurements are collected every 4 s ( Δ t = 4   s). The scenario lasts 20 min.
  • The sea bottom depth is 4000 m. The detected ray is a bottom-reflected ray.
  • The assumed target depth is z A s = 200   m (whereas the true one is 100 m).
  • First, the measurements have been corrupted with an additive Gaussian noise whose standard deviation is σ = 1.7 × 10 2 .
Then, we choose the least squares estimator, which is identical to the maximum likelihood estimator with these assumptions. Note that, in open literature about TMA, the confidence regions are given by the confidence ellipsoid obtained with the covariance matrix of the estimate. Since the maximum likelihood estimate is asymptotically efficient under nonrestrictive conditions, we use here the Cramér–Rao lower bound to compute such confidence regions.
The result of the simulation is presented in Table 1 and illustrated in Figure 4. Obviously, even if the assumption made on the target’s depth makes the state vector observable, it remains inestimable: the hugeness of the diagonal elements of the CRLB does not allow this kind of TMA to be employed. We note in Figure 4 that the cloud of horizontal estimates is hyperbola-shaped. This is because the state vector is “weakly” estimable. The parametric equation of this hyperbola is
{ x ( ω ) = ζ A s sinh ( ω )   y ( ω ) = ζ A s m 1 m 2 cosh ( ω ) ,   with   ζ A s = 2 D ( z A s + z O ) ,   and   m = y O T ( 0 ) x O T 2 ( 0 ) + y O T 2 ( 0 ) + ζ O T 2
We further reduced the standard deviation to σ = 1.7 × 10 4 in order to appreciate the behavior of the MLE. With this (unrealistic) value, the MLE is efficient, as shown in Table 2 and in Figure 5 (which validates our observability analysis).
Our conclusion is that the state vector is not estimable, even though it is observable with an assumption on the target’s depth.
This is why we propose to maneuver the antenna in order to render the state vector observable with no assumption on the target’s depth, and to augment the information about it.

4. TMA with One Ray When the Array Maneuvers

In this section, the antenna maneuvers, i.e., it changes its own heading. We start by proving that the state vector is observable (without any assumption on the target’s depth). Then, we have recourse to perform Monte Carlo simulations to evaluate the performance of the MLE.

4.1. Observability Analysis

Theorem 2.
Suppose the antenna’s trajectory is composed of two successive legs at constant velocity (however with the same speed). Let the target be in CV motion. The linear array acquires the conical angles of the wave emitted from the target, the path of the ray being known as well as the sea bottom depth. If the target is broadside or endfire to the antenna during a leg, then there is at most a ghost target. Otherwise, there is no ghost target.
Due to its length, the proof of this theorem is given in the Appendix A.

4.2. Estimation

In this subsection, we present the result of 500 Monte Carlo simulations that are run to illustrate the behavior of the proposed estimators. First, we give the scenario used here.
The center of the array and the initial position of the source are, respectively, at ( 0 0 200 ) T and ( 5000 7000 100 ) T at the very beginning of the scenario. The speed of the array is a constant along the scenario and is equal to 5 m/s. The trajectory of the array is composed of two legs linked by an arc of a circle. The first leg lasts 1 min 40 s, during which the array’s heading is 135°. Then, the array turns to the right with a turn rate equal to 20°/min to adopt a new heading equal to 270°. The duration of the maneuver is hence equal to 6 min 44 s. The second leg lasts 5 min, so the total duration of the scenario is 13 min and 20 s. Meanwhile, the target is navigating with a heading equal to 45° and a speed of 4 m/s. The bottom depth is D = 4000   m.
The state vector we have to estimate is hence X = ( 5000 7000 100 2.83 2.83 ) T .
The array is assumed to measure the cosines of the conical angles of the bottom-reflected path given by
m ( t k ) = y O T ( t k ) x O T 2 ( t k ) + y O T 2 ( t k ) + [ 2 D ( z T + z O ) ] 2 + ε k
Measurements are acquired every Δ t = 4 s, with t k = ( k 1 ) Δ t .
The noise vector ε k is assumed to be Gaussian, 0-mean and its standard deviation equal to σ = 1.7 × 10 2 . The vectors ε k are also assumed to be temporally independent.
Again, we choose the least squares estimator.

4.2.1. Estimation of X

The 500 obtained estimates of the initial horizontal position are plotted in Figure 6, together with the trajectory of the target, the 90%-confidence ellipse and the trajectory of the array. Again, the view is from the sky.
The performance of the estimator (bias and standard deviation of each component) is presented in Table 3.
A convenient way to evaluate the behavior of an estimator is to compute the so-called normalized estimation error squared (NEES) [27], defined as N l = ( X ^ l X ) T F ( X ^ l X ) , where F is the FIM, and X ^ l is the estimate computed at the l -th simulation. If X ^ l is Gaussian-distributed with X as the mathematical expectation and the CRLB as the covariance matrix, then N l is chi-square distributed with d degrees of freedom ( χ d 2 ), where d is the dimension of X (here 5). From the central limit theorem, the averaged NEES N S 1 N S i m l = 1 N S i m N l is approximately Gaussian; its mathematical expectation is d, and its standard deviation is equal to 2 d N S i m .
From our simulations, we obtain N S = 5.34 .
In conclusion, the estimator can be declared efficient. However, the minimum standard deviation of the target’s depth is not compatible with the physical constraints: with the standard deviation given in Table 3, the target could be up above the sea surface! Therefore, a palliative of this is to impose a depth on the target. Indeed, we saw in Section 3.1 that a supposed depth creates a small bias in estimation of the horizontal position of the target.

4.2.2. Estimation of X Reduced When the Depth of the Target Is Fixed

Now, the third component of X does not have to be estimated. The new state vector is the denoted as X r = ( x T ( 0 ) y T ( 0 ) x ˙ T y ˙ T ) T . We impose that z A s = 200   m (whereas the true depth is still 100 m). Hence, we introduce a bias.
Figure 7 displays the position’s estimates in the same manner as Figure 6. The bias is not visible to the naked eye. However, Table 4 reveals this bias, which may be acceptable in a real situation. Even though the averaged NEES (=7.31) is out of its 90% confidence interval, its value remains acceptable.
The main interest of assuming the depth to be known is to economize on the CPU time, and reduce the standard deviation of the remaining components to estimate. We are in the presence of the well-known bias–variance tradeoff.

4.2.3. Estimation of the Reduced State Vector by the Conventional BOTMA

In such a scenario, the conventional BOTMA can be run by neglecting the site effect, so by imposing that cos ( ϕ ( t ) ) = 1 ,   t . The (incorrect) noise-free measurement model is then
cos ( α ( t ) ) = cos ( θ ( t ) h ( t ) ) .
The results are plotted in Figure 8. Obviously, a huge bias appears, leading to an averaged NEES equal to 1960. More precisely, the bias on the components of the reduced state vector is ( 3062.8 2319.9 14.4 15.8 ) T , rendering the BOTMA inoperative. Clearly, the conventional BOTMA cannot be recommended for the near field. This justifies a posteriori the interest in taking the site effect and the nature of the wave ray into account, as previously pointed out in the introduction of [23].

5. TMA from the Direct Path and the Bottom-Reflected Path

We assume in this section that the sound wave emitted by the target travels on the direct path and the bottom-reflected path.

5.1. Observability

Theorem 3.
Let a linear antenna and a source both be in CV motion.
The antenna acquires the cosines of the conical angles of the direct path and of the bottom-reflected path.
1. 
If the target is broadside to the array, then the set of ghost targets is uncountable: it is composed of all the (virtual) targets at broadside to the array.
2. 
If the target is endfire to the antenna, the set of ghost targets is composed of virtual sources at endfire to the antenna.
3. 
If the route of the antenna and the route of the target are parallel, then the set of ghost targets is uncountable: at each depth z G , there are two ghost targets moving on a cylinder whose axis is the antenna axis, and the radius is a positive scalar β = D z G D z T . The relative ghost target velocity is equal to β times the target’s velocity. The initial distance between the ghost image and the center of the antenna is equal to β times the initial distance between the ghost image and the center of the antenna.
4. 
If the route of the antenna and the route of the target are not parallel, then there are three ghost targets whose motion relative to the antenna is P O G ( t ) = S P O T ( t ) ,   P O G ( t ) = β P O T ( t ) , and P O G ( t ) = β S P O T ( t ) , where S is the matrix of the axial symmetry around the line of the antenna, and β D z O D z T . If the depth of the antenna is equal to the depth of the source, then there is one single ghost target given by P O G ( t ) = S P O T ( t ) .
Proof of Theorem 3. 
With no loss of generality, we will again assume that the axis of the sensor array is pointed toward north and that the target is in the half-space where the second component y of any vector is positive. A convenient rotation helps us in this case. So the noise-free measurements at time t are m 1 ( t ) = y O T ( t ) x O T 2 ( t ) + y O T 2 ( t ) + z O T 2 , and m 2 ( t ) = y O T ( t ) x O T 2 ( t ) + y O T 2 ( t ) + [ 2 D ( z T + z O ) ] 2 .
We have to seek a five-dimensional state vector X G = ( x G ( 0 ) y G ( 0 ) z G x ˙ G y ˙ G ) T defining the trajectory of a ghost target, i.e., producing the same noise-free measurement as X , that is m 1 ( t ) = y O G ( t ) x O G 2 ( t ) + y O G 2 ( t ) + z O G 2 , and m 2 ( t ) = y O G ( t ) x O G 2 ( t ) + y O G 2 ( t ) + [ 2 D ( z G + z O ) ] 2 .
hence satisfying the two following equalities (in time):
y O T ( t ) x O T 2 ( t ) + y O T 2 ( t ) + z O T 2 = y O G ( t ) x O G 2 ( t ) + y O G 2 ( t ) + z O G 2
y O T ( t ) x O T 2 ( t ) + y O T 2 ( t ) + [ 2 D ( z T + z O ) ] 2 = y O G ( t ) x O G 2 ( t ) + y O G 2 ( t ) + [ 2 D ( z G + z O ) ] 2
under the constraint that z G is in [ 0 , D ] .
Case 1: y O T ( t ) is a zero function, i.e., t   y O T ( t ) = 0 .
The target is broadside to the antenna, so any ghost targets will be too (see Case 1 in the proof of theorem 1).
Case 2: y O T ( t ) is not a zero function.
From Case 2 of the proof of theorem 1, there is a positive scalar β such that y O G ( t ) = β y O T ( t ) .
( 6 ) x O G 2 ( t ) + y O G 2 ( t ) + z O G 2 = β x O T 2 ( t ) + y O T 2 ( t ) + z O T 2 [ x O G 2 ( t ) + y O G 2 ( t ) + z O G 2 ] = β 2 [ x O T 2 ( t ) + y O T 2 ( t ) + z O T 2 ]
( 7 ) [ x O G 2 ( t ) + y O G 2 ( t ) + [ 2 D ( z G + z O ) ] 2 ] = β 2 [ x O T 2 ( t ) + y O T 2 ( t ) + [ 2 D ( z T + z O ) ] 2 ]
Subtracting (9) from (8), we get z O G 2 [ 2 D ( z G + z O ) ] 2 = β 2 [ z O T 2 [ 2 D ( z T + z O ) ] 2 ] .
Now, we simplify the expressions of these two terms:
z O G 2 [ 2 D ( z G + z O ) ] 2 = 4 ( D z G ) ( D z O )
z O T 2 [ 2 D ( z T + z O ) ] 2 = 4 ( D z T ) ( D z O )
We deduce from this that
β = D z G D z T
Note that β = 1 iif z G = z T .
( 8 ) x O G 2 ( t ) + y O G 2 ( t ) + z O G 2 = β 2 [ x O T 2 ( t ) + y O T 2 ( t ) + z O T 2 ] x O G 2 ( t ) β 2 x O T 2 ( t ) = β 2 z O T 2 z O G 2
Since x O G 2 ( t ) β 2 x O T 2 ( t ) is a polynomial function of degree 2, (11) is equivalent to
x O G 2 ( 0 ) = β 2 x O T 2 ( 0 ) + β 2 z O T 2 z O G 2
x O G ( 0 ) x ˙ O G = β 2 x O T ( 0 ) x ˙ O T
x ˙ O G 2 = β 2 x ˙ O T 2
First case  x ˙ O T = 0
Equation (14) implies that x ˙ O G = 0 .
Consequently, for any z G in [ 0 , D ] , the vector X O G = ( ± β 2 x O T 2 ( 0 ) + β 2 z O T 2 z O G 2 β y O T ( 0 ) z O G 0 β y ˙ O T ) T (with β = D z G D z T ) defines the trajectory of a ghost target.
Second case  x ˙ O T 0
Using (14), and squaring the terms of (13), we get x O G 2 ( 0 ) = β 2 x O T 2 ( 0 ) .
Reporting this in (12), we obtain finally β 2 z O T 2 = z O G 2 , i.e.,
β 2 = ( z O G z O T ) 2
If z T = z O , then z G = z O . In this case, β = 1 , and consequently y O G ( t ) = y O T ( t ) and x O G 2 ( t ) = x O T 2 ( t ) from (11). The source’s trajectory is observable up to the axial symmetry around the (Oy)-axis.
Equations (10) and (15) give us D z G D z T = ( z O G z O T ) 2 .
The unknown z G is hence a root of the following equation of degree 2:
( z G z O ) 2 ( z T z O ) 2 D z T ( D z G ) = 0 which can be expanded as follows: z G 2 + z G [ 2 z O + ( z T z O ) 2 D z T ] D ( z T z O ) 2 D z T + z O 2 = 0 .
Of course, z T is a root of this equation. For this value, z G = z T , hence β = 1 .
The second root ( z G itself) is hence 2 z O z T ( z T z O ) 2 D z T z G . We can check readily that z G z O = z O z T ( z T z O ) 2 D z T = ( z O z T ) ( D z T ) ( z T z O ) 2 D z T .
Hence, z G z O z T z O = z O D D z T (which is negative).
We deduce from this that:
  • when the target’s depth is larger than the array’s depth, there is a ghost whose depth is smaller than the array’s depth, and vice versa.
  • β , which is a positive coefficient, is equal to D z O D z T , or 1.
Therefore, we have identified three ghost targets:
the first one is defined by X O G = ( x O T ( 0 ) y O T ( 0 ) z O T x ˙ O T y ˙ O T ) T ,
the second is defined by X O G = ( β x O T ( 0 ) β y O T ( 0 ) β z O T β x ˙ O T β y ˙ O T ) T ,
and the third by X O G = ( β x O T ( 0 ) β y O T ( 0 ) β z O T β x ˙ O T β y ˙ O T ) T . □
Remark 2.
Most of the time, the depth of a submarine vehicle is under the operational constraint: values of z T are in [ 0 , z M a x ] and z M a x D . For example, z M a x = 400   m, while D = 4000 m.
The proof of the previous theorem must be adapted to this new constraint.
First, we use the fact that the function u f ( u ) 2 z O u ( u z O ) 2 D u is an involution, i.e., f ( f ( u ) ) = u .
Since  f ( 0 ) = 2 z O z 0 2 D ,  f ( 2 z O z 0 2 D ) = 0 .
Now the question is: what are the values of z O for which the following inequality holds: 2 z O z 0 2 D z M a x , the greatest value of z O guaranteeing that 2 z O z 0 2 D z T z M a x is D D 1 z M a x D (which is less than z M a x ).
If z O > D D 1 z M a x D , then z G > z M a x . In this case, there is a unique ghost target given by X G = ( x T ( 0 ) y T ( 0 ) z T x ˙ T y ˙ T ) T .
If z O D D 1 z M a x D , then z G z M a x . In this case, there are three ghost targets:
one is defined by X G = ( x T ( 0 ) y T ( 0 ) z T x ˙ T y ˙ T ) T ,
the second is defined by X G = ( β x T ( 0 ) β y T ( 0 ) f ( z T ) β x ˙ T β y ˙ T ) T ,
and the third by X G = ( β x T ( 0 ) β y T ( 0 ) f ( z T ) β x ˙ T β y ˙ T ) T .
Note that the operational constraint allows us to benefit from the following range:
D z M a x D β D D z M a x . For example, when z M a x = D 10 , 0.9 β 1.11 . Consequently, the ghost target is very close to the target of interest.

5.2. Estimation of the Trajectory

This section is devoted to the estimation of the target’s trajectory, or in other words, the estimation of X with t * = 0 (the first time). Before going into detail, we compute the so-called Cramér–Rao lower bound to evaluate the asymptotical performance of any unbiased estimator.
We have considered two typical scenarios. In both, the array is assumed motionless (or, more realistically, all the mobiles are referenced to it) at the depth z O = 200   m, and the state vector defining the target’s trajectory is given by the state vector X = ( 5000 7000 100 2.83 2.83 ) T . The standard deviation of the measurement is σ = 1.7 × 10 2 . The total duration of the scenario is 5 min, and the sampling time is Δ t = 4 s; consequently, the number of measurement couples is N = 75 .
In the first scenario, the bottom depth is D = 2000 m, while in the second, D = 4000 m.
Note that in the first scenario, β = 0.89 , and in the second one, β = 0.97 . The ghost target is hence very close to the target of interest.

5.2.1. Estimability

As pointed out in Section 1, the state vector X is “estimable” if its asymptotical performance given by the CRLB is compatible with the physical constraints. Typically, if the minimum standard deviation defined by the square root of the third diagonal element of the CRLB (hence of the depth) is much larger than the depth, then X is declared non-estimable.
  • First scenario
For this scenario, the square root of the diagonal of the CRLB σ C R L B = ( 1.16   × 10 6 1.59   × 10 6 8.22   × 10 5 637.9 646.1 ) T .
2.
Second scenario
With the bottom depth, things are not much better, since σ C R L B = ( 6.59   × 10 5 8.96   × 10 5 9.73   × 10 5 352.6 362.2 ) T .
In both cases, the minimum standard deviations are huge. We can conclude that the state vector is not estimable. Computations of minimum standard deviations were made for various scenarios; in all, the state vector is not estimable.
A palliative of this is to fix the depth of the source at an arbitrary and realistic value, say z A s , and compute the CRLB of the reduced state vector X r ( x T ( 0 ) y T ( 0 ) x ˙ T y ˙ T ) T when we assume that z T = z A s . For example, for z A s = 300 m, the minimum standard deviations are
σ C R L B = ( 281.17 319.37 1.78 2.02 ) T   for   the   first   scenario ,   and
σ C R L B = ( 130.1 115.3 0.80 0.71 ) T   for   the   sec ond   one .
Therefore, we propose to estimate the state vector with this hypothesis ( z A s = 300 m). In so doing, we introduce a bias. The next subsection gives us the result of the 500 Monte Carlo simulations.

5.2.2. Monte Carlo simulations

The computation of the maximum likelihood estimator (MLE) is made with the Gauss‒Newton routine. No numerical issue was encountered.
  • First scenario
The performance of the MLE is summarized in Table 5. We have numerically computed the bias and the empirical standard deviation (given, respectively in the second and third column of the table). We can see that the empirical standard deviation is very close to that given by the CRLB. However, as expected, the MLE is biased (of course, there is no bias if we choose z A s = z T ). In Figure 9, the 90% confidence ellipse is drawn, together with the cloud of the 500 estimates (in pink).
2.
Second scenario: Bottom depth D = 4000 m.
Again, the performance is presented in Table 6. The bias of the estimator is similar to the one obtained for the first scenario. Only the empirical standard deviations of ( x T ( 0 ) y T ( 0 ) ) T are larger than that computed from the CRLB. However, Figure 10 shows us that the cloud of estimates is close to the true value and not spread.
What is remarkable is the short duration and still the very good performance (in terms of accuracy) of the result. Numerous simulations (not reported here) were performed; all confirm the correct performance of the MLE. The shortness of the scenario is crucial, because everything that we propose here works properly under the condition that the sea bottom is a plane. During a short scenario, this assumption is likely.

6. Conclusions

In this paper, conical-angle TMA has been addressed, and various multipaths of sound have been taken into account. The sensor is a line array. Observability was analyzed deeply, allowing all the existing ghost targets to be identified. The main results are that, if the array detects one ray (corresponding to one path), the trajectory is not observable: the set of ghost targets is composed of trajectories that are homothetic to the trajectory of the target of interest, and their symmetrical images by the axial symmetry around the line array. If the array detects two rays (corresponding to two different paths), the number of ghost targets is reduced to three (except when the target is endfire or broadside to the antenna). When the antenna maneuvers, the target’s trajectory is observable (apart from the special scenario where there is one single ghost target). Even for “observable” scenarios, the depth of the target is not estimable (its asymptotical standard deviation is huge). In these cases, we give a non-restrictive palliative that allows us to provide estimates close to the truth.
In the future, in this context, many problems remain to be faced: identification of the paths, maneuvering targets, and fusion of data collected by other sensors, as in [28]. The problem of seeking a “good” maneuver of the observer, as it was solved in a 2D environment [29,30,31], will be addressed in the future. Some of these problems are already under investigation.

Author Contributions

Conceptualization, A.L. and A.-C.P.; methodology, C.J.; software, A.L.; validation, A.L., A.-C.P., C.J. and D.L.; formal analysis, A.L.; investigation, A.L.; resources, D.L.; data curation, A.L.; writing—original draft preparation, C.J.; writing—review and editing, A.L. and C.J.; visualization, A.-C.P.; supervision, A.-C.P.; project administration, not applicable; funding acquisition, not applicable. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Theorem 2. 
The proof is made when the first leg is towards North (as previously).
Hence, V 1 = [ 0 v ] , V 2 = [ v sin ( α ) v cos ( α ) ] , S 1 = [ 1 0 0 1 ] , and S 2 = [ cos ( 2 α ) sin ( 2 α ) sin ( 2 α ) cos ( 2 α ) ] .
Moreover, we assume α k π .
From Theorem 1, we have to consider the four following cases for each leg:
  • the target is broadside to the antenna,
  • the target is endfire to the antenna,
  • the target has the same heading as the array (but is not endfire to it),
  • the other cases.
Note that if the target is in case (1) during the first leg, then in case (2) during the second one (provided that this situation is possible), the conclusion about observability will be the same as if the target is in case (2) during the first leg, then in case (1) during the second leg. To be convinced of this, we just have to reverse the time in the equation. This remark allows us to shorten the proof.
Case 1: the target is broadside to the antenna during the first leg.
Hence, P T ( 0 ) = [ x T ( 0 ) 0 ] , and V O T = [ c T 0 ] during the first leg, which implies P O T ( t ) = [ x T ( 0 ) + t c T 0 ] for t τ . The ghost targets are also in the broadside, hence P O G ( t ) = [ x G ( 0 ) + t c G 0 ] and V O G = [ c G 0 ] for t τ .
Can the target be endfire to the antenna? If so, the target has the same heading as the antenna during the second leg or, in other words, V T V 2 = λ V 2 , and P O T ( t ) , which is equal to P O T ( t ) = P O T ( τ ) + ( t τ ) ( V T V 2 ) , is collinear with V 2 , whenever t τ . The first condition cannot be satisfied since V T = [ c T v ] , and V 2 = [ ± v 0 ] . There is no ghost.
We skip the case where the target is in case (3) during the second leg. This will be treated later. Therefore, we now have to consider the other cases during the second leg. There are two possibilities for the ghost targets: those whose trajectories are defined by (i) P O G ( t ) = β P O T ( t ) , and those whose trajectories are given by (ii) P O G ( t ) = β S 2 P O T ( t ) , both for t τ .
The derivative of (i) is V G V 2 = β V T β V 2 , hence V G = β V T + ( 1 β ) V 2 .
[ c G v ] = β [ c T v ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] ,
which implies that ( 1 β ) cos ( α ) = 1 β . Since cos ( α ) 1 , β = 1 . There is no ghost given by (i).
The derivative of (ii) is V G V 2 = β S 2 V T β V 2 , hence V G = β S 2 V T + ( 1 β ) V 2 .
[ c G v ] = β [ c T cos ( 2 α ) + v sin ( 2 α ) c T sin ( 2 α ) + v cos ( 2 α ) ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] .
We deduce that β = v 1 cos ( α ) c T sin ( 2 α ) + v cos ( 2 α ) v cos ( α ) .
One ghost exists if c T sin ( 2 α ) + v cos ( 2 α ) v cos ( α ) is a positive quantity. If so, we then compute c G . There is one ghost at most.
Case 2: the target is endfire to the antenna during the first leg.
Hence, P T ( 0 ) = [ 0 y T ( 0 ) ] , and V O T = [ 0 c T ] , which implies that P O T ( t ) = [ 0 y T ( 0 ) + t c T ] for t τ . During this first leg, the ghost targets are also endfire to the antenna, so P O G ( t ) = [ 0 y G ( 0 ) + t c G ] for t τ , and V G V 1 = [ 0 c G ] .
Again, we skip the case where the target is in case (3) during the second leg. This will be treated later. So, we now have to consider the other cases during the second leg. There are two possibilities for the ghost targets: those whose trajectories are defined by (i) P O G ( t ) = β P O T ( t ) and those whose trajectories are given by (ii) P O G ( t ) = β S 2 P O T ( t ) , both for t τ .
The derivative of (i) is V G V 2 = β V T β V 2 , hence V G = β V T + ( 1 β ) V 2 .
[ 0 c G + v ] = β [ 0 c T + v ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] .
We deduce that β = 1 . There is no ghost.
Now, differentiating (ii) gives us V G V 2 = β S 2 V T β V 2 , hence V G = β S 2 V T + ( 1 β ) V 2 .
[ 0 c G + v ] = β ( c T + v ) [ sin ( 2 α ) cos ( 2 α ) ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] .
β ( c T + v ) sin ( 2 α ) + ( 1 β ) v sin ( α ) = 0 .
We deduce that β = v sin ( α ) c T sin ( 2 α ) + v sin ( 2 α ) v sin ( α ) . One ghost exists if c T sin ( 2 α ) + v sin ( 2 α ) v sin ( α ) is a negative quantity. If so, we then compute c G . There is one ghost at most.
Case 3: the target has the same heading as the array (but is not endfire to it)
As in case (2), V O T = [ 0 c T ] , but here, the first component of P O T ( t ) is not zero. Hence, V T = [ 0 c T + v ] , and the target cannot be endfire to the antenna during the second leg. In this case, V O G = [ 0 β c T ] , hence V G = [ 0 β c T + v ] .
Can the target be broadside to the antenna? The answer is positive if V 2 V T and V O T is collinear to P O T ( t ) , when t τ . The first condition implies that V 2 = [ ± v 0 ] . Since P O T ( t ) = P O T ( τ ) + ( t τ ) ( V T V 2 ) , the second condition is satisfied if P O T ( τ ) is collinear to V T V 2 . This is not the case when the first component of P O T ( τ ) is zero, while the first component of V T V 2 is ± v .
So, we now have to consider the other cases during the second leg. There are two possibilities for the ghost targets: those whose trajectories are defined by (i) P O G ( t ) = β P O T ( t ) and those whose trajectories are given by (ii) P O G ( t ) = β S 2 P O T ( t ) , both for t τ .
The derivative of (i) is V G V 2 = β V T β V 2 , hence V G = β V T + ( 1 β ) V 2 or, in other words,
[ 0 β c T + v ] = [ 0 β ( c T + v ) ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] . We conclude that β = 1 , i.e., there is no ghost.
If P O G ( t ) = β S 2 P O T ( t ) , then V G = β S 2 V T + ( 1 β ) V 2
[ 0 β c T + v ] = β ( c T + v ) [ sin ( 2 α ) cos ( 2 α ) ] + ( 1 β ) v [ sin ( α ) cos ( α ) ] .
This implies that α = 0 , which must be rejected by assumption. There is no ghost.
The other cases:
In the other cases, the motion of ghost targets is defined during the first leg by
when t τ ,
P O G ( t ) = β 1 P O T ( t )
or   P O G ( t ) = γ 1 S 1 P O T ( t )
and during the second leg by
when t τ ,
P O G ( t ) = β 2 P O T ( t )
or   P O G ( t ) = γ 2 S 2 P O T ( t )
Hence, at time τ , the position of a ghost target is
P O G ( τ ) = β 1 P O T ( τ )
or   P O G ( τ ) = γ 1 S 1 P O T ( τ )
and   P O G ( τ ) = β 2 P O T ( τ )
or   P O G ( τ ) = γ 2 S 2 P O T ( τ )
Of course, (A5) and (A6) are not compatible, and neither are (A7) and (A8).
Now, let us show that (A5) is not compatible with (A8):
Indeed, if P O G ( τ ) = β 1 P O T ( τ ) = γ 2 S 2 P O T ( τ ) , then
β 1 γ 2 P O T ( τ ) = S 2 P O T ( τ )
Equation (A9) implies that P O T ( τ ) is an eigenvector of S 2 , with the eigenvalue β 1 γ 2 . Since β 1 γ 2 is positive, this eigenvalue is equal to 1, i.e., γ 2 = β 1 . Hence, P O T ( τ ) is in the second leg.
Hence, the set of ghost targets is reduced to those whose positions at time τ are given by (A5) or (A6), and (A7). Now suppose that a ghost target satisfies (A6) and (A7). By the same computation, we conclude that P O T ( τ ) is in the first leg, which is impossible since P O T ( τ ) is in the second leg.
We have proven that (A5) and (A7) only are compatible. It follows that a ghost target verifies these two equalities (given by (A1) and (A3)):
P O G ( τ ) = β 1 P O T ( τ ) = β 2 P O T ( τ ) .
Hence, β 1 = β 2 .
Now taking the derivative of the two members of (A1) and of (A3), we obtain
V G = β 1 ( V T V 1 ) + V 1 = β 1 ( V T V 2 ) + V 2 , which is equivalent to
( β 1 1 ) ( V 2 V 1 ) = 0 .
Since V 2 V 1 , β 1 = 1 .
Putting this value into (A1) or (A3), we finally get P G ( t ) = P T ( t ) . The “ghost” is the target of interest. In conclusion, there is no ghost target. □

References

  1. Nardone, S.; Lindgren, A.; Gong, K. Fundamental properties and performance of conventional bearings-only target motion analysis. IEEE Trans. Autom. Control 1984, 29, 775–787. [Google Scholar] [CrossRef]
  2. Song, T.L.; Um, T.Y. Practical guidance for homing missiles with bearings-only measurements. IEEE Trans. Aerosp. Electron. Syst. 1996, 32, 434–443. [Google Scholar] [CrossRef]
  3. Clavard, J.; Pillon, D.; Pignol, A.-C.; Jauffret, C. Target Motion Analysis of a Source in a Constant Turn from a Nonmaneuvering Observer. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 1760–1780. [Google Scholar] [CrossRef]
  4. Farina, A. Target tracking with bearingsOnly measurements. Signal. Process 1999, 78, 61–78. [Google Scholar] [CrossRef]
  5. Jauffret, C.; Pillon, D.; Pignol, A.-C. Bearings-Only Maneuvering Target Motion Analysis from a Nonmaneuvering Platform. IEEE Trans. Aerosp. Electron. Syst. 2010, 46, 1934–1949. [Google Scholar] [CrossRef]
  6. Zhang, Y.; Lan, J.; Mallick, M.; Li, X.R. Bearings-Only Filtering Using Uncorrelated Conversion Based Filters. IEEE Trans. Aerosp. Electron. Syst. 2021, 57, 882–896. [Google Scholar] [CrossRef]
  7. Aidala, V.; Hammel, S. Utilization of modified polar coordinates for bearings-only tracking. IEEE Trans. Autom. Control 1983, 28, 283–294. [Google Scholar] [CrossRef] [Green Version]
  8. Arulampalam, S.; Clark, M.; Vinter, R. Performance of the shifted Rayleigh filter in single-sensor bearings-only tracking. In Proceedings of the 2007 10th International Conference on Information Fusion, Quebec, QC, Canada, 9–12 July 2007; pp. 1–6. [Google Scholar]
  9. Laneuville, D.; Jauffret, C. Recursive Bearings-Only TMA via Unscented Kalman Filter: Cartesian vs. Modified Polar Coordinates. In Proceedings of the 2008 IEEE Aerospace Conference, Big Sky, MT, USA, 1–8 March 2008; pp. 1–11. [Google Scholar]
  10. Arulampalam, M.S.; Ristic, B.; Gordon, N.; Mansell, T. Bearings-Only Tracking of Maneuvring Targets Using Particle Filters. Eurasip J. App. Sig. Process. 2004, 15, 2351–2365. [Google Scholar]
  11. Zhang, Y.J.; Xu, G.Z. Bearings-Only Target Motion Analysis via Instrumental Variable Estimation. IEEE Trans. Signal. Process. 2010, 58, 5523–5533. [Google Scholar] [CrossRef]
  12. Doğançay, K. On the efficiency of a bearings-only instrumental variable estimator for target motion analysis. Signal. Process. 2005, 85, 481–490. [Google Scholar] [CrossRef]
  13. Chan, Y.T.; Rea, T.A. Bearings-only tracking using data fusion and instrumental variables. In Proceedings of the Proceedings of the Third International Conference on Information Fusion, Paris, France, 10–13 July 2000. [Google Scholar]
  14. Kirubarajan, T.; Bar-Shalom, Y.; Lerro, D. Bearings-only tracking of maneuvering targets using a batch-recursive estimator. IEEE Trans. Aerosp. Electron. Syst. 2001, 37, 770–780. [Google Scholar] [CrossRef]
  15. Jauffret, C.D.; Pillon, D. Observability in Passive Target Motion Analysis. IEEE Trans. Aerosp. Electro. Syst. 1996, AES-32, 1290–1300. [Google Scholar] [CrossRef]
  16. Le Cadre, J.; Jauffret, C. Discrete-time observability and estimability analysis for bearings-only target motion analysis. IEEE Trans. Aerosp. Electron. Syst. 1997, 33, 178–201. [Google Scholar] [CrossRef]
  17. Nardone, S.C.; Aidala, V.J. Observability Criteria for Bearings-Only Target Motion Analysis. IEEE Trans. Aerosp. Electron. Syst. 1981, AES-17, 162–166. [Google Scholar] [CrossRef]
  18. Urick, R.J. Principles of Underwater Sound; McGraw-Hill: New York, NY, USA, 1983. [Google Scholar]
  19. Van Trees, H.L. Optimum Array Processing: Part IV of Detection, Estimation, and Modulation Theory; Wiley Interscience: New York, NY, USA, 2002. [Google Scholar]
  20. Abraham, D.A. Underwater Acoustic Signal Processing: Modeling, Detection, and Estimation; Modern Acoustic and Signal Processing; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
  21. Gong, K.F. Multipath Target Motion Analysis: Properties and Implication of the Multipath Process; in Technical Report 6687; NUSC: Newport, RI, USA, 1982. [Google Scholar]
  22. Blanc-Benon, P.; Jauffret, C. Target Motion Analysis from Bearing and Time-delay Measurements: The Use of Multipath. IEEE Trans. Aerosp. Electron. Syst. 1997, AES-33, 813–824. [Google Scholar] [CrossRef]
  23. Oh, R.; Song, T.L.; Choi, J.W. Batch Processing through Particle Swarm Optimization for Target Motion Analysis with Bottom Bounce Underwater Acoustic Signals. Sensors 2020, 20, 1234. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Steven, S.M. Fundamentals if Statistical Signal Processing—Estimation Theory; Prentice Hall: Englehood Cliffs, NJ, USA, 1993. [Google Scholar]
  25. Jauffret, C. Observability and fisher information matrix in nonlinear regression. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 756–759. [Google Scholar] [CrossRef]
  26. Pignol, A.-C.; Jauffret, C.; Pillon, D. A statistical fusion for a leg-by-leg bearings-only TMA without observer maneuver. In Proceedings of the 13th International Conference on Information Fusion, Edinburgh, UK, 26–29 July 2010; Volume 6, pp. 1–8. [Google Scholar] [CrossRef]
  27. Bar-Shalom, Y.; Rong Li, X.; Kirubarajan, T. Estimation and Tracking: Principles, Techniques and Software; Artech House: Boston, MA, USA, 1993. [Google Scholar]
  28. Payan, J.; Lebon, A.; Perez, A.-C.; Jauffret, C.; Laneuville, D. Passive Target Motion Analysis by Fusion of Linear Arrays and Sonobuoys in a Cluttered Environment. IEEE Trans. Aerosp. Electron. Syst. 2021, 1. [Google Scholar] [CrossRef]
  29. Le Cadre, J.-P.; Gauvrit, H. Optimization of the observer motion for bearings-only target motion analysis. In Proceedings of the 1st Australian Data Fusion Symposium, Adelaide, SA, Australia, 21–22 November 1996; pp. 190–195. [Google Scholar]
  30. Fawcett, J. Effect of course maneuvers on bearings-only range estimation. IEEE Trans. Acoust. Speech, Signal. Process 1988, 36, 1193–1199. [Google Scholar] [CrossRef]
  31. Passerieux, J.M.; Van Cappel, D. Optimal observer maneuver for bearings-only tracking. IEEE Trans. Aerosp. Electron. Syst. 1998, 34, 777–788. [Google Scholar] [CrossRef]
Figure 1. A typical scenario, viewed from the sky.
Figure 1. A typical scenario, viewed from the sky.
Sensors 21 04797 g001
Figure 2. Three examples of ray paths: the solid line represents the direct path ( δ , n B , n S ) = ( + 1 , 0 , 0 ) , the dashed-dotted line represents the bottom reflected path ( δ , n B , n S ) = ( + 1 , 1 , 0 ) , and the dashed line represents the bottom-surface-bottom reflected path ( δ , n B , n S ) = ( + 1 , 2 , 1 ) .
Figure 2. Three examples of ray paths: the solid line represents the direct path ( δ , n B , n S ) = ( + 1 , 0 , 0 ) , the dashed-dotted line represents the bottom reflected path ( δ , n B , n S ) = ( + 1 , 1 , 0 ) , and the dashed line represents the bottom-surface-bottom reflected path ( δ , n B , n S ) = ( + 1 , 2 , 1 ) .
Sensors 21 04797 g002
Figure 3. Cones of ambiguity. (a) The cones that the target belongs to, and the one that the image-target belongs to. (b) Example of conical angles of the target and of the image-target, for a bottom-reflected ray: ϕ D and ϕ B are the elevations of the direct path and of the bottom-reflected path, respectively.
Figure 3. Cones of ambiguity. (a) The cones that the target belongs to, and the one that the image-target belongs to. (b) Example of conical angles of the target and of the image-target, for a bottom-reflected ray: ϕ D and ϕ B are the elevations of the direct path and of the bottom-reflected path, respectively.
Sensors 21 04797 g003
Figure 4. The cloud of estimated position (in green), a piece of the hyperbola (intersection of the cone of ambiguity and the plane z = z A s ( = 200   m ) , for σ = 1.7   × 10 2 .
Figure 4. The cloud of estimated position (in green), a piece of the hyperbola (intersection of the cone of ambiguity and the plane z = z A s ( = 200   m ) , for σ = 1.7   × 10 2 .
Sensors 21 04797 g004
Figure 5. The cloud of estimated position (in green) for σ = 1.7 × 10 4 . The cloud is no longer hyperbola-shaped. The small black segment is the 90%-confidence ellipsoid.
Figure 5. The cloud of estimated position (in green) for σ = 1.7 × 10 4 . The cloud is no longer hyperbola-shaped. The small black segment is the 90%-confidence ellipsoid.
Sensors 21 04797 g005
Figure 6. The cloud of the 500 initial positions estimates and the 90%-confidence ellipse.
Figure 6. The cloud of the 500 initial positions estimates and the 90%-confidence ellipse.
Sensors 21 04797 g006
Figure 7. The cloud of the 500 initial positions estimates with the reduced state vector and the 90%-confidence ellipse.
Figure 7. The cloud of the 500 initial positions estimates with the reduced state vector and the 90%-confidence ellipse.
Sensors 21 04797 g007
Figure 8. The cloud (in green) of the 500 initial positions estimates given by the classic BOTMA together with the 90%-confidence ellipse.
Figure 8. The cloud (in green) of the 500 initial positions estimates given by the classic BOTMA together with the 90%-confidence ellipse.
Sensors 21 04797 g008
Figure 9. The location of the sensor array (in black), the cloud of the 500 estimates and the 90%-confidence ellipse when D = 2000 m, z A s = 300   m, and z T = 100   m. The symmetrical cloud is plotted too.
Figure 9. The location of the sensor array (in black), the cloud of the 500 estimates and the 90%-confidence ellipse when D = 2000 m, z A s = 300   m, and z T = 100   m. The symmetrical cloud is plotted too.
Sensors 21 04797 g009
Figure 10. The location of the sensor array (in black), the cloud of the 500 estimates of the initial positions, and the 90%-confidence ellipse when D = 4000 m, z A s = 300   m, and z A s = 100   m, together with the symmetrical cloud.
Figure 10. The location of the sensor array (in black), the cloud of the 500 estimates of the initial positions, and the 90%-confidence ellipse when D = 4000 m, z A s = 300   m, and z A s = 100   m, together with the symmetrical cloud.
Sensors 21 04797 g010
Table 1. Performance of the estimator of the reduced state vector when σ = 1.7 × 10 2 , in terms of bias, sample standard deviation and the one given by the square root of the diagonal of the CRLB.
Table 1. Performance of the estimator of the reduced state vector when σ = 1.7 × 10 2 , in terms of bias, sample standard deviation and the one given by the square root of the diagonal of the CRLB.
X r Bias σ s a m p σ C R L B
5000 m−3525696213,356
7000 m−236740525599
2.83 m/s−1.371.814.35
2.83 m/s0.531.622.75
Table 2. Performance of the estimator of the reduced state vector with σ = 1.7 × 10 4 .
Table 2. Performance of the estimator of the reduced state vector with σ = 1.7 × 10 4 .
X r Bias σ s a m p σ C R L B
5000 m60.40138.67133.56
7000 m88.2058.4255.99
2.83 m/s0.0430.0440.044
2.83 m/s0.0370.0280.028
Table 3. Performance of the estimator of the plain state vector.
Table 3. Performance of the estimator of the plain state vector.
X Bias σ s a m p σ C R L B
5000 m−44.77854.72868.12
7000 m−68.161162.11173.60
100 m7.14558.55545.99
2.83 m/s0.0921.671.65
2.83 m/s0.1942.722.68
Table 4. Performance of the estimator of the reduced state vector.
Table 4. Performance of the estimator of the reduced state vector.
X r Bias σ s a m p σ C R L B
5000 m65.40655.61606.41
7000 m93.05831.75762.56
2.83 m/s0.0341.711.58
2.83 m/s0.0632.762.52
Table 5. Performance of the estimator of the reduced state vector.
Table 5. Performance of the estimator of the reduced state vector.
X r Bias σ s a m p σ C R L B
5000 m401.12281.85281.17
7000 m557.24330.87319.37
2.83 m/s0.131.581.78
2.83 m/s0.121.812.02
Table 6. Performance of the estimator.
Table 6. Performance of the estimator.
X r Bias σ s a m p σ C R L B
5000 m306.81219.28130.08
7000 m432.46276.61115.26
2.83 m/s0.180.740.80
2.83 m/s0.180.660.71
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lebon, A.; Perez, A.-C.; Jauffret, C.; Laneuville, D. TMA from Cosines of Conical Angles Acquired by a Towed Array. Sensors 2021, 21, 4797. https://doi.org/10.3390/s21144797

AMA Style

Lebon A, Perez A-C, Jauffret C, Laneuville D. TMA from Cosines of Conical Angles Acquired by a Towed Array. Sensors. 2021; 21(14):4797. https://doi.org/10.3390/s21144797

Chicago/Turabian Style

Lebon, Antoine, Annie-Claude Perez, Claude Jauffret, and Dann Laneuville. 2021. "TMA from Cosines of Conical Angles Acquired by a Towed Array" Sensors 21, no. 14: 4797. https://doi.org/10.3390/s21144797

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop