CN111896952B - Multi-target deception jamming method and device based on 1-bit quantization - Google Patents

Multi-target deception jamming method and device based on 1-bit quantization Download PDF

Info

Publication number
CN111896952B
CN111896952B CN202010555834.4A CN202010555834A CN111896952B CN 111896952 B CN111896952 B CN 111896952B CN 202010555834 A CN202010555834 A CN 202010555834A CN 111896952 B CN111896952 B CN 111896952B
Authority
CN
China
Prior art keywords
signal
radar
formula
target
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010555834.4A
Other languages
Chinese (zh)
Other versions
CN111896952A (en
Inventor
黄磊
王浩瑱
赵博
侯万幸
蒯成玲
包为民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN202010555834.4A priority Critical patent/CN111896952B/en
Publication of CN111896952A publication Critical patent/CN111896952A/en
Application granted granted Critical
Publication of CN111896952B publication Critical patent/CN111896952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/38Jamming means, e.g. producing false echoes
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • G01S13/90Radar or analogous systems specially adapted for specific applications for mapping or imaging using synthetic aperture techniques, e.g. synthetic aperture radar [SAR] techniques
    • G01S13/9094Theoretical aspects
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/021Auxiliary means for detecting or identifying radar signals or the like, e.g. radar jamming signals
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • G01S13/90Radar or analogous systems specially adapted for specific applications for mapping or imaging using synthetic aperture techniques, e.g. synthetic aperture radar [SAR] techniques

Abstract

The invention discloses a multi-target deception jamming method and a multi-target deception jamming device based on 1 bit quantization, wherein the method comprises the following steps: generating a single-frequency signal according to the false point offset and the broadband radar parameter; according to the generated single-frequency signal, carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value, and adding false point information to the quantized 1-bit signal to form a deception jamming signal; and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar. The invention realizes multi-target deception jamming while quantifying, saves computing resources compared with the conventional deception jamming, and can generate a plurality of false targets compared with the existing 1-bit deception jamming, thereby simplifying system constitution, reducing power consumption and improving efficiency.

Description

Multi-target deception jamming method and device based on 1-bit quantization
Technical Field
The invention relates to the technical field of radar signal processing, in particular to a multi-target deception jamming method and device based on 1-bit quantization, intelligent equipment and a storage medium.
Background
Synthetic Aperture radar (sar), an active earth observation system, can be installed on flight platforms such as airplanes, satellites, spacecraft, etc., and can perform earth observation all day long and all day long, and has a certain ground surface penetration capability. Therefore, the SAR system has unique advantages in disaster monitoring, environment monitoring, ocean monitoring, resource exploration, crop estimation, mapping, military and other aspects, and can play a role in which other remote sensing means are difficult to play.
The SAR (synthetic aperture radar) deception jamming machine generates a false target by delaying and modulating the phase of the intercepted SAR signal according to a pre-designed false scene, and has lower power and better jamming effect compared with the traditional jamming suppression. The jammer generates a vivid false target in a real scene, so that the information acquisition and decision of the SAR are disturbed, and therefore, research on SAR deception interference draws wide attention of scholars. However, as the false scene increases, the computational complexity and the computation time required for generating the spoofing interference also increase, which not only puts higher requirements on the cost of the jammer, but also on the real-time performance of the jammer. In order to reduce the computation amount of the SAR spoofing jammer and improve the real-time performance of spoofing interference generation, a more concise and efficient interference generation method needs to be researched.
In the prior art, when multi-target deception jamming modulation is carried out, the method has the advantages of large occupation of computing resources, high power consumption, large computation amount and complex system.
Thus, there is a need for improvement and development of the prior art.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a multi-target deception jamming method, apparatus, intelligent device and storage medium based on 1-bit quantization, aiming at solving the problems of the prior art, such as large computing resource occupation, high power consumption, large computation and complex system when performing multi-target deception jamming modulation.
The technical scheme adopted by the invention for solving the problems is as follows:
a multi-target spoofing interference method based on 1-bit quantization, wherein the method comprises:
generating a single-frequency signal according to the false point offset and the broadband radar parameter;
according to the generated single-frequency signal, carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value, and adding false point information to the quantized 1-bit signal to form a deception jamming signal;
and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar.
The multi-target deception jamming method comprises the following steps of generating a single-frequency signal according to the false point offset and the broadband radar parameter:
and the jammer generates a single-frequency signal according to the false point offset and the broadband radar parameter.
The multi-target deception jamming method comprises the following steps of generating a single-frequency signal according to the false point offset and the broadband radar parameter:
and identifying the false point offset by taking the position of the jammer as a coordinate origin.
The multi-target deception jamming method comprises the following steps of generating a single-frequency signal according to the false point offset and the broadband radar parameter:
obtaining parameter K of broadband radarr
Generating a single-frequency signal h according to the offset DeltaR of the desired dummy pointsThe expression is as follows:
Figure BDA0002544293810000021
wherein A issIs the signal amplitude, KrIn order to tune the frequency of the radar signal,
Figure BDA0002544293810000031
is the initial phase (which may take any constant).
The multi-target deception jamming method comprises the steps of carrying out 1-bit quantization on an intercepted broadband radar signal by using a single-frequency signal as a threshold value according to a generated single-frequency signal, and adding false point information to the quantized 1-bit signal to form a deception jamming signal:
intercepting radar signals;
the intercepted radar signal is compared with hs(tr) Performing IQ orthogonal sampling after comparison;
the I path sampling value is quantized into 1 bit, the Q path sampling value is quantized into 1 bit after the sign inversion, 1 bit quantization and signal conjugation are realized, and accordingly 1 bit deception jamming signals are intercepted and captured.
The multi-target deception jamming method is characterized in that deception jamming signals are forwarded to a radar, and the step of forming multi-target deception jamming in a broadband radar comprises the following steps:
directly forwarding the signals after quantitative acquisition to a radar;
and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar.
The multi-target deception jamming method comprises the steps of carrying out 1-bit quantization on an intercepted broadband radar signal by using a single-frequency signal as a threshold value according to a generated single-frequency signal, and adding false point information to the quantized 1-bit signal to form a deception jamming signal:
the generation of a plurality of false points is realized by modifying a single-frequency threshold signal and subsequent 1-bit quantization and deception jamming modulation processing;
and realizing quantization and multi-target deception jamming generation through one-time quantization.
A multi-target spoofing jamming device based on 1-bit quantization, wherein the device comprises:
the single-frequency signal generating module is used for generating a single-frequency signal according to the false point offset and the broadband radar parameter;
the 1-bit quantization module is used for carrying out 1-bit quantization on the intercepted broadband radar signal by taking the single-frequency signal as a threshold value according to the generated single-frequency signal, and adding false point information to the quantized 1-bit signal to form a deception jamming signal;
and the multi-target deception jamming forming module is used for forwarding the deception jamming signal to the radar and forming multi-target deception jamming in the broadband radar.
An intelligent device comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory, and wherein the one or more programs configured to be executed by the one or more processors comprise instructions for performing the method of any of the above.
A non-transitory computer readable storage medium having instructions therein which, when executed by a processor of an electronic device, enable the electronic device to perform a method as any one of above.
The invention has the beneficial effects that: the invention provides a multi-target deception jamming method based on 1 bit quantization. The method can carry out multi-target deception jamming on the broadband radar including the SAR radar. The jammer generates a specific single-frequency signal according to the false point offset and the broadband radar parameter, performs 1-bit quantization on the intercepted broadband radar signal by taking the signal as a threshold value, and forwards the deception jamming generated by modulation to the radar, so that the multi-target deception jamming is formed in the broadband radar. The invention realizes multi-target deception jamming while quantifying, saves computing resources compared with the conventional deception jamming, and can generate a plurality of false targets compared with the existing 1-bit deception jamming, thereby simplifying system constitution, reducing power consumption and improving efficiency.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a multi-target spoofing jamming method according to an embodiment of the present invention.
Fig. 2 is a comparison of distance-dimensional imaging effects of conventional spoofing interference and novel spoofing interference formed by Δ R ═ 20m in the multi-target spoofing interference method provided by the embodiment of the present invention.
Fig. 3 is a comparison of distance-dimensional imaging effects of conventional spoofing interference and novel spoofing interference formed by Δ R-40 m of the multi-target spoofing interference method provided by the embodiment of the present invention.
Fig. 4 is a schematic block diagram of a multi-target spoofing jamming device according to an embodiment of the present invention.
Fig. 5 is a schematic block diagram of an internal structure of an intelligent device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and back … …) are involved in the embodiment of the present invention, the directional indications are only used to explain the relative positional relationship between the components, the movement situation, and the like in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indications are changed accordingly.
Radar, which finds objects and determines their spatial position by radio. Thus, radar is also referred to as "radiolocation". Radars are electronic devices that detect objects using electromagnetic waves. The radar emits electromagnetic waves to irradiate a target and receives the echo of the target, so that information such as the distance from the target to an electromagnetic wave emission point, the distance change rate (radial speed), the azimuth and the altitude is obtained.
Jammers refer to electronic devices that emit or retransmit electronic jamming signals and are used to disturb or fool hostile electronic devices, reducing or even disabling their effectiveness.
The purpose of spoofing interference is to deliberately create false signals. These signals are camouflaged much like those expected by an enemy device, thereby enticing the enemy to misunderstand or use the information obtained. The purpose of spoofing interference is not to suppress the disturbed system with external noise so that it cannot detect the true signal, but to deliberately create a false signal. A deception jamming can transform the radar signal and forward it to radar, so that the radar can track the fake target without existence and the real target can be protected. In addition, a large number of false targets can be formed, so that the system of the other party is difficult to obtain valuable information from the false targets, and even the data processing system of the radar is full of work and cannot work normally due to the fact that the number of the false targets is too large.
The inventor finds the problems of more computing resource occupation, high power consumption, large computation amount and more complex system when carrying out multi-target deception jamming modulation in the prior art,
in order to solve the above technical problem, an embodiment of the present invention provides a multi-target spoofing interference method based on 1-bit quantization. The method can carry out multi-target deception jamming on the broadband radar including the SAR radar. The jammer generates a specific single-frequency signal according to the false point offset and the broadband radar parameter, performs 1-bit quantization on the intercepted broadband radar signal by taking the signal as a threshold value, and forwards the deception jamming generated by modulation to the radar, so that the multi-target deception jamming is formed in the broadband radar. The invention realizes multi-target deception jamming while quantifying, saves computing resources compared with the conventional deception jamming, and can generate a plurality of false targets compared with the existing 1-bit deception jamming, thereby simplifying system constitution, reducing power consumption and improving efficiency.
Exemplary method
As shown in fig. 1, an embodiment of the present invention provides a multi-target spoofing interference method based on 1-bit quantization, where the multi-target spoofing interference method may be applied to an intelligent device, and the intelligent device may be an intelligent jammer. In the embodiment of the invention, the multi-target spoofing interference method comprises the following steps:
s100, generating a single-frequency signal according to the false point offset and the broadband radar parameter;
in the implementation of the invention, the jammer is adopted to generate a specific single-frequency signal according to the false point offset and the broadband radar parameter, for example, the identification of the false point offset is carried out by taking the position of the jammer as a coordinate origin.
In an implementation, the present invention may set a specific (or specific) single frequency signal, and perform 1-bit quantization on the acquired radar signal using the specific single frequency signal to generate a modulated spoofing interference signal. The specific implementation process is as follows:
the method comprises the following steps: the parameters of the broadband radar are obtained,
obtaining broadband radar parameters, e.g. K, e.g. by scouting, intelligence, etcr(ii) a In this embodiment, the radar parameter is preferably a frequency modulation of a radar signal. In this embodiment, the method mainly aims at obtaining radar parameters and how to generate deception jamming signals after intercepting radar signals.
Step two: generating a single-frequency signal h according to the offset DeltaR of the desired dummy pointsThe expression is as follows:
Figure BDA0002544293810000071
wherein A issIs the signal amplitude, KrIn order to tune the frequency of the radar signal,
Figure BDA0002544293810000072
is the initial phase (which may take any constant).
In the embodiment of the invention, the offset Δ R is the offset of a false target point which is expected to be generated on the enemy radar finally relative to the position of the jammer, for example, the jammer is 1km away from the radar, and if the enemy radar is expected to detect a target 1050m away, the offset is 50 m. The signal amplitude is the signal amplitude collected.
Step S200, according to the generated single-frequency signal, carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value, and adding false point information in the quantized 1-bit signal;
intercepting radar signals;
the intercepted radar signal is compared with hs(tr) Performing IQ orthogonal sampling after comparison; in the embodiment of the invention, IQ orthogonal sampling is a commonly used acquisition method for radar signal processing hardware, and has the effect of converting common signals into real parts and imaginary parts in a complex signal form. And complex signal processing in the algorithm is conveniently realized subsequently, wherein the I path signal is the real part of the complex signal, and the Q path signal is the imaginary part of the complex signal. The steps are realized by hardware, and the method is simply realized by the stepsIQ sampling is carried out after the signals are received, the signals are divided into IQ two paths, and then h is used for dividing the IQ two paths into hs(tr) Quantization processing is performed for the threshold value, so that 1-bit quantization of the signal can be achieved.
The I path of sampling values are quantized into 1 bit, the Q path of sampling values are quantized into 1 bit after the sign inversion, and the conjugation processing of signals is realized while the 1 bit quantization is realized. This step also adds false point information to the quantized signal for deceptive jamming modulation.
In the invention, the "signal conjugation" is specifically to quantize the I-path sampling value into 1 bit, and quantize the Q-path sampling value into 1 bit after inverting the sign. The I path of sampling value is the real part of the signal, and the Q path is the imaginary part of the signal. That is, the signal is x + jy before this step and x-jy after processing, so that conjugation is realized.
In the embodiment of the invention, the I path sampling value is quantized into 1 bit, the Q path sampling value is quantized into 1 bit after the sign is inverted, and the 1 bit quantization and the signal conjugation are realized, so that the interception of the 1 bit deception jamming signal is realized.
The processed signals already contain signals of false points, and interference can be generated on an enemy radar.
And step S300, forwarding the deception jamming signal to the radar, and forming multi-target deception jamming in the broadband radar.
When the method is implemented specifically, a quantized intercepted signal can be directly forwarded to the radar, and further interference modulation can be carried out according to needs, wherein the interference modulation comprises the steps of delaying the intercepted signal, and carrying out convolution on the intercepted signal by adopting a one-dimensional distance image containing the characteristics of a false target, so that the false target is far away from an interference machine and has a vivid scattering characteristic. Wherein the time delay amount
Figure BDA0002544293810000081
△R1Is the distance of the decoy from the jammer; one-dimensional range profile of
Figure BDA0002544293810000082
σwIs the reflection coefficient of a set decoy。
And forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar. As shown in the simulation results of fig. 2, the simulation results of the present invention can generate two false target points a1 and b1, whereas the conventional spoofing disturbs only one false target point.
The invention realizes the generation of a plurality of false points by modifying a single-frequency threshold signal and subsequent bit quantization and deception jamming modulation processing; and realizing quantization and multi-target deception jamming generation through one-time quantization.
Preferably, in the embodiments of the present invention, the radar transmits a chirp pulse having a duration TrSuppose at TrA certain time inside is trFrequency of the signal at the carrier frequency fcAs a center, with trIs increased by an increase of KrAnd rect () is the rectangular envelope of the signal. The signal form is represented as follows:
Figure BDA0002544293810000091
expression (1) represents a chirp signal transmitted by a radar transmitter.
Jammer in-range transmitter RJThe truncated radar signal is expressed as follows:
Figure BDA0002544293810000092
equation (2) represents the signal intercepted by the jammer.
Wherein τ isJFor the delay of the radar signal from the transmitter to the jammer, the expression is as follows:
τJ=2RJ/c (3)
for the distance of the jammer from the transmitter
Substituting (3) into (2), and performing frequency-removing processing on the intercepted signal to obtain a signal expression as follows:
Figure BDA0002544293810000093
in the formula (4), the frequency carrier is removed after substituting (3) into (2), i.e. exp (j2 π f) is removedctr) Item, at the same time
Figure BDA0002544293810000094
λ is the signal wavelength.
Quantizing the (4) type signal by using a single-frequency time-varying threshold signal can obtain an expression of the quantized signal:
sI1(tr)=csign[sI(tr)+hs(tr)] (5)
wherein
Figure BDA0002544293810000095
Order to
Figure BDA0002544293810000096
Figure BDA0002544293810000097
Wherein, the expression of (5) represents the quantization process, and the quantized signal is 1-bit data.
The formula (5) is simplified after being expanded, and can be written as follows:
Figure BDA0002544293810000101
in the formula of alpha0=1,α1=α2=...=2。AmnRepresenting the magnitude of the introduced harmonics, A when m + n is an even numbermnWhen m + n is an odd number, 0,
Figure BDA0002544293810000102
Jm(. cndot.) represents a Bessel function of order m.
Equation (6) is the result of the post-expansion reduction of equation (5), and represents the quantized signal expression.
And (6) knowing that the quantized signal is formed by mixing the original signal, the threshold signal and harmonic signals of the original signal and the threshold signal, wherein harmonic components can be selected to generate deception jamming signals. At the moment, the selected harmonic component generates a false target, and the rest harmonics generate single-frequency noise interference, so that mixed interference can be realized.
In order to make modulated signal possess good focusing imaging capability, the harmonic component in which the 1 st harmonic of original signal is participated, i.e. m is 1, is selected, so that A ismnNon-zero, n can only take even numbers. And because when m is determined, AmnSince the value of (a) becomes smaller as n increases, n is 2 (0 is not taken because m is 1, and n is 0, which indicates an original signal component and cannot be modulated by a threshold signal). The modulation component is thus obtained as follows:
Figure BDA0002544293810000103
where equation (7) is a term of equation (6) and false point information is carried by the term and passed to the radar.
It can be seen from the above equation that the modulation frequency of the component is opposite to the original signal, which results in the mismatch of the matched filter, so that it needs to be conjugate to make the modulation frequency consistent with the original signal, i.e.:
s'I1(tr)=csign[sI(tr)+hs(tr)]* (8)
csign [. cndot ] in equation (8) is a sign function whose effect is to take the sign of the signal, i.e., 1-bit quantization of the signal.
Wherein the spoofed interference component is:
Figure BDA0002544293810000104
let theta+=φ+2ψ,θ-=φ-2ψ,θ+Generating a false point, θ, at the set offset position-Generating a dummy point centered on the jammer positionCalled another dummy point.
The above formula (9) represents the result of the conjugation process on the modulation component. This equation is actually a part (item) of equation (8) after expansion.
At theta+Determining a single frequency threshold signal parameter for the false point modulation object, and determining theta+The deployment is as follows:
Figure BDA0002544293810000111
the formula (10) includes target point information that can be analyzed after the radar receives the signal, and the target point information analyzed by the radar can be shifted by modifying related parameters in the target point information.
T in the formula (10)rThe independent term only influences the phase of the signal, independently of the distance compression, wherein
Figure BDA0002544293810000118
The initial phase of the single frequency signal may be set to a constant.
Will trThe related items are proposed as follows:
Figure BDA0002544293810000112
to generate a dummy point offset Δ R, the following expression is required:
Figure BDA0002544293810000113
the combined type (11) and the formula (12) are simplified, and the following formula can be obtained:
Figure BDA0002544293810000114
Figure BDA0002544293810000115
the items are negligible and therefore have
Figure BDA0002544293810000116
Namely, the implementation of the invention sets a specific single-frequency signal, and uses the signal to carry out 1-bit quantization on the collected radar signal, thereby generating a modulated deception jamming signal. The method comprises the following implementation processes:
the method comprises the following steps: obtaining radar parameters, e.g. K, by scouting, intelligence, etcr
Step two: generating a single-frequency signal h according to the offset DeltaR of the desired dummy pointsThe expression is as follows:
Figure BDA0002544293810000117
wherein A issIs the signal amplitude, KrIn order to tune the frequency of the radar signal,
Figure BDA0002544293810000121
is the initial phase (which may take any constant).
Step three: intercepting radar signal and mixing it with hs(tr) After comparison, IQ orthogonal sampling is carried out, the I path sampling value is quantized into 1 bit, and the Q path sampling value is quantized into 1 bit after the sign inversion (signal taking conjugate); (now 1-bit quantization and dummy point information attachment have been achieved).
Step four: and directly forwarding the signal after quantitative acquisition or further modulating to realize more true deception interference.
Therefore, the method has the advantages that the modulation of the deception interference is realized while the 1-bit quantization is carried out, the signal processing flow is greatly shortened, the signal processing speed is accelerated, and the reduction of the interference effect caused by the change of the radar parameters can be greatly avoided. Meanwhile, a specific single-frequency signal is easy to generate, and is easier to realize on hardware compared with the traditional method. In addition, the method finally realizes the mixed interference of the single-frequency noise and the false target, so that the radar is more difficult to detect the real target or acquire the error information.
The effect of the method can be further illustrated by the following simulation experiment. The simulation platform uses MATLAB (MATLAB is commercial mathematical software produced by MathWorks company in America, and is used for high-level technical computing language and interactive environment of algorithm development, data visualization, data analysis and numerical calculation, and mainly comprises two parts of MATLAB and Simulink).
The simulation parameters are as follows:
carrier frequency (GHz) 9
Signal bandwidth (MHz) 150
Pulse width (us) 5
Sampling rate (MHz) 300
Jammer distance (km) 10
The simulation result is shown in fig. 2, and a comparison is made between the distance-dimensional imaging effect of the conventional deception jamming and the distance-dimensional imaging effect of the novel deception jamming, wherein Δ R is 20. Wherein, the right side of fig. 2 is the imaging effect of the conventional deception jamming (HRRP high-resolution range profile); fig. 2 shows on the left the new deception jamming (HRRP high resolution range image) imaging effect of the present invention.
Taking the jammer position as the origin of coordinates facilitates identification of the ghost point offset. It can be seen from the left side of fig. 2 that the interference effect of the new spoofing interference is good, two symmetric dummy points (a1 and b1) are generated (the jammer is taken as a symmetric center), and the new spoofing interference introduces a large amount of noise (the region indicated by C in fig. 2 is noise) besides the dummy points, which is known to be single-frequency noise introduced by single-frequency threshold quantization by principle derivation.
The left graph of fig. 2 shows the result of radar imaging processing of the spoofed interfering echo generated by the present invention, a1 and b1 show two false points generated, and the right graph shows the result of the conventional method, which has only one false point (the right peak), and the result of the method has a large amount of single-frequency noise, the lower region.
Fig. 3 only modifies the offset, and the rest is similar to fig. 2.
Fig. 3 shows the simulation result after adjusting the distance offset, and it can be seen that the interference effect of the new spoofing interference is still good after adjusting the offset.
Certainly, in the specific implementation, two points are generated and are also regarded as 'deception jamming', but in order to improve the fidelity, (1) further time delay can be carried out, so that the position of the false target is not only around the original point; (2) the false target range profile is convolved with the 1-bit interception signal, so that the false target has more realistic scattering characteristics.
In summary, the present invention provides a multi-target spoofing interference method based on 1-bit quantization, which is characterized in that the generation of a plurality of false points is realized by modifying a single-frequency threshold signal and performing subsequent processing. The invention realizes the quantization and the multi-target deception jamming generation through one-time quantization, saves the 2-time quantization process of the conventional 1-bit deception jamming system by 1 time, greatly simplifies the construction of a signal processing system and reduces the cost of the system. The key to the interference generation of the present invention is the generation of a specific single frequency signal and the operation of taking the conjugate after quantization.
According to the method, the specific single-frequency threshold signal is generated by modifying the single-frequency threshold signal, the intercepted radar signal is quantized by using the specific single-frequency threshold signal, the quantized radar signal is conjugated, a false target is generated by using harmonic components in the conjugated radar signal, and single-frequency noise interference is generated by using the rest harmonics, so that mixed interference of single-frequency noise and the false target is realized, and the radar is more difficult to detect a real target or acquire error information.
According to the technical scheme, the quantization and the multi-target deception jamming generation are realized through one-time quantization, the 2-time quantization process of a conventional 1-bit deception jamming system is saved by 1 time, the composition of a signal processing system is greatly simplified, and the cost of the system is also reduced.
Exemplary device
As shown in fig. 4, an embodiment of the present invention provides a multi-target spoofing interference device based on 1-bit quantization, where the device includes:
a single-frequency signal generating module 510, configured to generate a single-frequency signal according to the false point offset and the wideband radar parameter;
a 1-bit quantization module 520, configured to perform 1-bit quantization on the intercepted wideband radar signal according to the generated single-frequency signal, using the single-frequency signal as a threshold, and add false point information to the quantized 1-bit signal to form a spoofed interference signal;
and a signal forwarding module 530, configured to forward the spoofed interference signal to the radar, so as to form multi-target spoofed interference in the broadband radar.
Based on the above embodiments, the present invention further provides an intelligent device, and a schematic block diagram thereof may be as shown in fig. 5. The intelligent device comprises a processor, a memory, a network interface, a display screen and a temperature sensor which are connected through a system bus. Wherein the processor of the smart device is configured to provide computing and control capabilities. The memory of the intelligent device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the intelligent device is used for connecting and communicating with an external terminal through a network. The computer program is executed by a processor to implement a multi-objective spoofing interference method based on 1-bit quantization. The display screen of the intelligent device can be a liquid crystal display screen or an electronic ink display screen, and the temperature sensor of the intelligent device is arranged in the intelligent device in advance and used for detecting the operating temperature of the internal device.
It will be understood by those skilled in the art that the block diagram shown in fig. 5 is a block diagram of only a portion of the structure associated with the inventive arrangements and is not intended to limit the smart devices to which the inventive arrangements may be applied, and that a particular smart device may include more or less components than those shown, or some components may be combined, or have a different arrangement of components.
In one embodiment, a smart device is provided that includes a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs include instructions for:
generating a single-frequency signal according to the false point offset and the broadband radar parameter;
according to the generated single-frequency signal, carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value, and carrying out deception jamming modulation on the quantized 1-bit signal;
and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when executed. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
In summary, the invention discloses a multi-target deception jamming method, a multi-target deception jamming device and a storage medium based on 1 bit quantization, and the invention provides a multi-target deception jamming method based on 1 bit quantization. Multi-target spoofing interference may be performed for wideband radars, including SAR radars. The jammer generates a specific single-frequency signal according to the false point offset and the broadband radar parameter, performs 1-bit quantization on the intercepted broadband radar signal by taking the signal as a threshold value, and forwards the deception jamming generated by modulation to the radar, so that the multi-target deception jamming is formed in the broadband radar. The invention realizes multi-target deception jamming while quantifying, saves computing resources compared with the conventional deception jamming, and can generate a plurality of false targets compared with the existing 1-bit deception jamming, thereby simplifying system constitution, reducing power consumption and improving efficiency.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. A multi-target deception jamming method based on 1-bit quantization is characterized by comprising the following steps:
generating a single-frequency signal according to the false point offset and the broadband radar parameter;
according to the generated single-frequency signal, carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value, and adding false point information to the quantized 1-bit signal to form a deception jamming signal; wherein the performing, according to the generated single frequency signal, 1-bit quantization on the intercepted wideband radar signal using the single frequency signal as a threshold comprises:
the radar emits a chirp of duration
Figure 156079DEST_PATH_IMAGE001
In a
Figure 401115DEST_PATH_IMAGE001
A certain moment in time is
Figure 649694DEST_PATH_IMAGE002
Frequency of signal at carrier frequency
Figure 372799DEST_PATH_IMAGE003
Is centered with
Figure 656013DEST_PATH_IMAGE002
Is increased by an increase of
Figure 806372DEST_PATH_IMAGE004
Figure 666880DEST_PATH_IMAGE005
Is a signal rectangular envelope; the signal form is represented as follows:
Figure 69043DEST_PATH_IMAGE006
(1)
formula (1) represents a chirp signal transmitted by a radar transmitter;
jammer in-range transmitter
Figure 346045DEST_PATH_IMAGE007
The truncated radar signal is expressed as follows:
Figure 667305DEST_PATH_IMAGE008
(2)
formula (2) represents signals intercepted by the jammer;
wherein
Figure 624897DEST_PATH_IMAGE009
For the delay of the radar signal from the transmitter to the jammer, the expression is as follows:
Figure 955384DEST_PATH_IMAGE010
(3)
RJdistance of the jammer from the transmitter;
the formula (3) is substituted into the formula (2), and the signal expression after the carrier frequency removal processing is carried out on the intercepted signal is as follows:
Figure 806665DEST_PATH_IMAGE011
(4)
the formula (4) is obtained by substituting the formula (3) into the formula (2), and performing carrier frequency elimination processing to eliminate
Figure 705351DEST_PATH_IMAGE012
Item, at the same time
Figure 274873DEST_PATH_IMAGE013
Figure 18838DEST_PATH_IMAGE014
Is the signal wavelength;
quantizing the signal of formula (4) by using a single-frequency time-varying threshold signal to obtain an expression of the quantized signal:
Figure 990205DEST_PATH_IMAGE015
(5)
wherein the content of the first and second substances,
Figure 918847DEST_PATH_IMAGE016
let us order
Figure 116610DEST_PATH_IMAGE017
Figure 523320DEST_PATH_IMAGE018
Wherein, the expression (5) represents the quantization process, and the quantized signal is 1 bit data;
the equation (5) is simplified after being analyzed and is written as follows:
Figure 490139DEST_PATH_IMAGE019
(6)
in the formula
Figure 592612DEST_PATH_IMAGE020
;AmnRepresenting the magnitude of the introduced harmonics, A when m + n is an even numbermn=0, when m + n is an odd number,
Figure 136726DEST_PATH_IMAGE021
,Jm(. cndot.) represents a Bessel function of order m;
expression (6) is the result of post-expansion simplification of expression (5), and represents a quantized signal expression;
the quantized signal is known from the formula (6) and is formed by mixing an original signal, a threshold signal and harmonic signals of the original signal and the threshold signal, a deception jamming signal is generated by adopting a harmonic component, and single-frequency noise jamming is generated by the rest of harmonics, so that mixed jamming is realized;
using the harmonic component with the 1 st harmonic of the original signal, i.e. m =1, in order to make AmnNon-zero, n is an even number; taking n = 2; obtaining a modulated component such asThe following:
Figure 222494DEST_PATH_IMAGE022
(7)
wherein the formula (7) is an item of the formula (6), and the false point information is carried by the formula (7) and is transmitted to the radar;
conjugate processing is performed on equation (7) so that the modulation frequency is consistent with the original signal, that is:
Figure 168453DEST_PATH_IMAGE023
(8)
csign [. cndot. ] in equation (8) is a sign function, i.e. 1-bit quantization of the signal;
wherein the spoofed interference component is:
Figure 438897DEST_PATH_IMAGE024
(9)
order to
Figure 345673DEST_PATH_IMAGE025
,
Figure 94187DEST_PATH_IMAGE026
A first dummy point is generated at the set offset position,
Figure 35598DEST_PATH_IMAGE027
generating a second false point, wherein the first false point and the second false point are symmetrical by taking the position of the jammer as the center;
wherein, formula (9) represents the result of the conjugate processing of the modulation component; formula (9) is a developed term of formula (8);
to be provided with
Figure 476943DEST_PATH_IMAGE026
Determining single frequency threshold signal parameters for false point modulation objects
Figure 995649DEST_PATH_IMAGE028
The deployment is as follows:
Figure 688799DEST_PATH_IMAGE029
(10)
the formula (10) includes target point information analyzed by the radar after receiving the signal, and relevant parameters are modified to enable the target point information analyzed by the radar to generate deviation;
and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar.
2. The multi-target spoof jamming method of claim 1, wherein the step of generating a single frequency signal based on the false point offset and wideband radar parameters comprises: and the jammer generates a single-frequency signal according to the false point offset and the broadband radar parameter.
3. The multi-target spoof interference method of claim 1, wherein the step of generating single frequency signals based on the false point offsets and wideband radar parameters comprises:
and identifying the false point offset by taking the position of the jammer as a coordinate origin.
4. The multi-target spoof jamming method of claim 1, wherein the step of generating a single frequency signal based on the false point offset and wideband radar parameters comprises:
obtaining parameters of a broadband radar
Figure 343771DEST_PATH_IMAGE030
Offset according to desired dummy point
Figure 831384DEST_PATH_IMAGE031
Generating a single frequency signal
Figure 840316DEST_PATH_IMAGE032
The expression is as follows:
Figure 196211DEST_PATH_IMAGE033
wherein
Figure 846635DEST_PATH_IMAGE034
In order to be the amplitude of the signal,
Figure 629784DEST_PATH_IMAGE035
in order to tune the frequency of the radar signal,
Figure 732869DEST_PATH_IMAGE036
is the initial phase and is constant.
5. The multi-target spoofing interference method of claim 4, wherein the step of quantizing the intercepted wideband radar signal by using the single frequency signal as a threshold according to the generated single frequency signal, and performing spoofing interference modulation on the quantized 1-bit signal comprises:
intercepting radar signals;
the intercepted radar signal is compared with
Figure 892455DEST_PATH_IMAGE037
Performing IQ orthogonal sampling after comparison;
the I path sampling value is quantized into 1 bit, the Q path sampling value is quantized into 1 bit after the sign inversion, 1 bit quantization and signal conjugation are realized, and therefore 1 bit deception jamming signals are intercepted and captured.
6. The multi-target spoof interference method of claim 1 wherein the step of forwarding the spoof interference to the radar, and forming the multi-target spoof interference in the wideband radar comprises:
directly forwarding the signals after quantitative acquisition to a radar;
and forwarding the deception jamming signal to the radar to form multi-target deception jamming in the broadband radar.
7. The multi-target spoof interference method of claim 1, wherein the step of quantizing the intercepted wideband radar signal by using the single frequency signal as a threshold according to the generated single frequency signal, and adding dummy point information to the quantized 1-bit signal to form a spoof interference signal comprises:
the generation of a plurality of false points is realized by modifying a single-frequency threshold signal and subsequent 1-bit quantization and deception jamming modulation processing;
and realizing quantization and multi-target deception jamming generation through one-time quantization.
8. A multi-target spoofing interference apparatus based on 1-bit quantization, the apparatus comprising:
the single-frequency signal generating module is used for generating a single-frequency signal according to the false point offset and the broadband radar parameter;
the 1-bit quantization module is used for carrying out 1-bit quantization on the intercepted broadband radar signal by using the single-frequency signal as a threshold value according to the generated single-frequency signal, and adding false point information in the quantized 1-bit signal to form a deception jamming signal; wherein the performing, according to the generated single frequency signal, 1-bit quantization on the intercepted wideband radar signal using the single frequency signal as a threshold comprises:
the radar emits a chirp of duration
Figure 522019DEST_PATH_IMAGE001
In a
Figure 679331DEST_PATH_IMAGE001
A certain moment in time is
Figure 394346DEST_PATH_IMAGE002
Frequency of signal at carrier frequency
Figure 232989DEST_PATH_IMAGE003
Is centered with
Figure 717060DEST_PATH_IMAGE002
Is increased by an increase of
Figure 717377DEST_PATH_IMAGE004
Figure 922618DEST_PATH_IMAGE005
Is a signal rectangular envelope; the signal form is represented as follows:
Figure 424006DEST_PATH_IMAGE006
(1)
formula (1) represents a chirp signal transmitted by a radar transmitter;
jammer in-range transmitter
Figure 903529DEST_PATH_IMAGE007
The truncated radar signal is expressed as follows:
Figure 199381DEST_PATH_IMAGE008
(2)
formula (2) represents signals intercepted by the jammer;
wherein
Figure 764355DEST_PATH_IMAGE009
For the delay of the radar signal from the transmitter to the jammer, the expression is as follows:
Figure 803855DEST_PATH_IMAGE010
(3)
RJis the distance of the jammer from the transmitter;
the formula (3) is substituted into the formula (2), and the signal expression after the carrier frequency removal processing is carried out on the intercepted signal is as follows:
Figure 262518DEST_PATH_IMAGE011
(4)
the formula (4) is obtained by substituting the formula (3) into the formula (2), and performing carrier frequency elimination processing to eliminate
Figure 870217DEST_PATH_IMAGE012
Item, at the same time
Figure 47121DEST_PATH_IMAGE013
Figure 500099DEST_PATH_IMAGE014
Is the signal wavelength;
quantizing the signal of formula (4) by using a single-frequency time-varying threshold signal to obtain an expression of the quantized signal:
Figure 78848DEST_PATH_IMAGE015
(5)
wherein the content of the first and second substances,
Figure 857448DEST_PATH_IMAGE016
let us order
Figure 256068DEST_PATH_IMAGE017
Figure 628582DEST_PATH_IMAGE018
Wherein, expression (5) represents the quantization process, and the quantized signal is 1-bit data;
the equation (5) is simplified after being analyzed and is written as follows:
Figure 937203DEST_PATH_IMAGE019
(6)
in the formula
Figure 11339DEST_PATH_IMAGE020
;AmnRepresenting the amplitude of the introduced harmonics, A when m + n is an even numbermn=0, when m + n is an odd number,
Figure 631676DEST_PATH_IMAGE021
,Jm(. cndot.) represents a Bessel function of order m;
expression (6) is the result of post-expansion simplification of expression (5), and represents a quantized signal expression;
the quantized signal is known from the formula (6) and is formed by mixing an original signal, a threshold signal and harmonic signals of the original signal and the threshold signal, a deception jamming signal is generated by adopting a harmonic component, and single-frequency noise jamming is generated by the rest of harmonics, so that mixed jamming is realized;
the harmonic component with the 1 st harmonic of the original signal, i.e. m =1, is used to make AmnNon-zero, n is an even number; taking n = 2; the modulation components are obtained as follows:
Figure 957615DEST_PATH_IMAGE022
(7)
wherein the formula (7) is an item of the formula (6), and the false point information is carried by the formula (7) and is transmitted to the radar;
conjugate processing is performed on equation (7) so that the modulation frequency is consistent with the original signal, that is:
Figure 979798DEST_PATH_IMAGE023
(8)
csign [. cndot ] in equation (8) is a sign function, i.e., 1-bit quantization of the signal;
wherein the spoofed interference component is:
Figure 100200DEST_PATH_IMAGE024
(9)
order to
Figure 738992DEST_PATH_IMAGE025
,
Figure 603043DEST_PATH_IMAGE026
A first dummy point is generated at the set offset position,
Figure 479732DEST_PATH_IMAGE027
generating a second false point, wherein the first false point and the second false point are symmetrical by taking the position of the jammer as the center;
wherein, formula (9) represents the result of the conjugate processing of the modulation component; formula (9) is a developed term of formula (8);
to be provided with
Figure 161249DEST_PATH_IMAGE026
Determining single frequency threshold signal parameters for false point modulation objects
Figure 897124DEST_PATH_IMAGE028
The deployment is as follows:
Figure 423920DEST_PATH_IMAGE029
(10)
the formula (10) includes target point information analyzed by the radar after receiving the signal, and relevant parameters are modified to enable the target point information analyzed by the radar to generate deviation;
and the multi-target deception jamming forming module is used for forwarding the deception jamming signal to the radar and forming multi-target deception jamming in the broadband radar.
9. A smart device comprising memory to store one or more programs, the one or more programs for execution by the one or more processors to perform the method of any of claims 1-7.
10. A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of an electronic device, enable the electronic device to perform the method of any one of claims 1-7.
CN202010555834.4A 2020-06-17 2020-06-17 Multi-target deception jamming method and device based on 1-bit quantization Active CN111896952B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010555834.4A CN111896952B (en) 2020-06-17 2020-06-17 Multi-target deception jamming method and device based on 1-bit quantization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010555834.4A CN111896952B (en) 2020-06-17 2020-06-17 Multi-target deception jamming method and device based on 1-bit quantization

Publications (2)

Publication Number Publication Date
CN111896952A CN111896952A (en) 2020-11-06
CN111896952B true CN111896952B (en) 2022-05-10

Family

ID=73207711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010555834.4A Active CN111896952B (en) 2020-06-17 2020-06-17 Multi-target deception jamming method and device based on 1-bit quantization

Country Status (1)

Country Link
CN (1) CN111896952B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112799023A (en) * 2020-12-25 2021-05-14 中国人民解放军63892部队 Multi-false-target interference method for fast forwarding
CN113484829B (en) * 2021-06-30 2023-09-05 深圳大学 Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar
CN114755640B (en) * 2022-06-15 2022-09-16 北京宏锐星通科技有限公司 Radar signal interference method, device, electronic equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5706013A (en) * 1996-08-09 1998-01-06 The United States Of America As Represented By The Secretary Of The Air Force Nonhomogeneity detection method and apparatus for improved adaptive signal processing
US8035545B2 (en) * 2009-03-13 2011-10-11 Raytheon Company Vehicular surveillance system using a synthetic aperture radar
US9074848B1 (en) * 2011-04-13 2015-07-07 Litel Instruments Precision geographic location system and method utilizing an image product
CN103675769B (en) * 2013-12-06 2015-11-25 西安电子科技大学 Based on the Squint SAR cheating interference method of distributed receiver
CN104267379B (en) * 2014-09-15 2016-12-07 电子科技大学 A kind of active radar and passive radar based on Waveform Design works in coordination with anti-interference method
PL410209A1 (en) * 2014-11-21 2016-05-23 Akademia Marynarki Wojennej im. Bohaterów Westerplatte Method for elimination of interferences in GNSS system and the system of elimination of interferences in GNSS system
CN106772280B (en) * 2017-01-23 2019-03-05 深圳大学 A kind of SAR cheating interference production method and system based on a bit sample
CN110045375B (en) * 2019-05-28 2020-12-29 深圳大学 Method and system for processing one-bit SAR echo data
CN110515099B (en) * 2019-08-01 2022-03-18 厦门大学 Firewall device and anti-cheating method for Beidou time service cheating interference
CN110879404B (en) * 2019-08-19 2022-02-01 中国电波传播研究所(中国电子科技集团公司第二十二研究所) GNSS deception jamming detection method based on combination of correlation peak and residual signal
CN111077504B (en) * 2020-01-16 2022-04-01 深圳大学 Gaussian 1 bit mixed interference signal generation method, device, equipment and medium

Also Published As

Publication number Publication date
CN111896952A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN111896952B (en) Multi-target deception jamming method and device based on 1-bit quantization
Ender On compressive sensing applied to radar
CN111650585B (en) Near-field millimeter wave sparse MIMO scanning array full-focusing imaging method and device
Shan et al. Efficient architecture and hardware implementation of coherent integration processor for digital video broadcast‐based passive bistatic radar
Huang et al. A novel approach for spaceborne SAR scattered-wave deception jamming using frequency diverse array
CN107976673B (en) MIMO radar imaging method for improving imaging quality of large-scene target
CN108132461B (en) Method for inhibiting direct current leakage of frequency modulation continuous wave landing radar
CN104237886B (en) High-precision synthetic aperture radar imaging method
CN107942295A (en) A kind of sparse antenna of forward sight array SAR system
CN114047483A (en) Radar waveform design method based on initial phase-PRI joint modulation
Giusti et al. Electronic countermeasure for OFDM‐based imaging passive radars
CN110988869B (en) Imaging method and device based on MIMO array
CN113484829B (en) Method for generating 1-bit multi-decoy deception jamming aiming at synthetic aperture radar
CN112285658A (en) Recursive computation based method for rapidly generating satellite-borne SAR deception jamming signal
CN106980110A (en) A kind of sidelobe cancellation method of adaptive confrontation active pressing jamming containing multipath
CN108761457B (en) High-precision three-dimensional rapid imaging method and device based on MIMO array synthetic aperture
CN115598604A (en) Forwarding SAR deception jamming method and system based on intra-pulse inter-pulse amplitude-phase joint coding, storage medium and electronic equipment
CN111665475B (en) Radar main lobe interference suppression method and device, electronic equipment and storage medium
CN115184877A (en) Multi-parameter optimization SAR anti-interference method based on RD imaging
CN114791592A (en) Synthetic aperture radar countermeasure simulation method, device, electronic equipment and medium
Yu et al. Scattered wave deception jamming against squint SAR using frequency diverse array
CN114152918A (en) Anti-intermittent main lobe interference method based on compressed sensing
CN112255596A (en) Space-borne SAR deception jamming signal generation method based on spatial frequency interpolation
CN113311431B (en) Deception jamming inhibition method and system based on single-channel SAR single imaging
CN113030877A (en) Precise intermittent sampling interference method for canceling narrow-band self-adaptive side lobe

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant