CN111965606B - DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method - Google Patents

DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method Download PDF

Info

Publication number
CN111965606B
CN111965606B CN202010827172.1A CN202010827172A CN111965606B CN 111965606 B CN111965606 B CN 111965606B CN 202010827172 A CN202010827172 A CN 202010827172A CN 111965606 B CN111965606 B CN 111965606B
Authority
CN
China
Prior art keywords
interference
modulation
frequency shift
adaptive
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010827172.1A
Other languages
Chinese (zh)
Other versions
CN111965606A (en
Inventor
徐磊
赵宪涛
丁佐诚
俞成龙
栾铸徵
史厚宝
陈旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yangzhou Institute Of Marine Electronic Instruments No723 Institute Of China Shipbuilding Industry Corp
Original Assignee
Yangzhou Institute Of Marine Electronic Instruments No723 Institute Of China Shipbuilding Industry Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangzhou Institute Of Marine Electronic Instruments No723 Institute Of China Shipbuilding Industry Corp filed Critical Yangzhou Institute Of Marine Electronic Instruments No723 Institute Of China Shipbuilding Industry Corp
Priority to CN202010827172.1A priority Critical patent/CN111965606B/en
Publication of CN111965606A publication Critical patent/CN111965606A/en
Application granted granted Critical
Publication of CN111965606B publication Critical patent/CN111965606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/36Means for anti-jamming, e.g. ECCM, i.e. electronic counter-counter measures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/38Jamming means, e.g. producing false echoes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The invention discloses a DRFM technology-based self-adaptive deception suppression composite interference method, which comprises the following steps: intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, and performing secondary modulation on the frequency shift quantity in a pulse by utilizing a window function characteristic curve to generate distance dragging self-adaptive deception jamming; performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center; and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference. The invention reduces the recognition and countering probability of radar to interference, thereby achieving better interference effect and protecting the shielded target.

Description

DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method
Technical Field
The invention belongs to radar interference and anti-interference technology, and particularly relates to a self-adaptive deception suppression composite interference method based on a DRFM technology.
Background
Under the development of digital frequency storage technology (DRFM), radar interference technology is rapidly developed, traditional analog interference is changed into digital interference, and a forwarded signal has high coherence with an original signal. The distance Doppler coupling characteristic of the LFM signal enables the frequency shift forwarding interference to have better interference performance. Conventional frequency shift deception jamming based on DRFM technology is easy to identify by radar, and the radar cannot realize jamming effect after adopting anti-jamming means. The existing suppression interference often suppresses the radar in a full distance section, so that the power utilization rate is low, and power waste is caused. Conventional spoofing and jamming is typically performed in a time-sharing implementation. With the continuous improvement of the anti-interference capability of the radar, the conventional interference measure strategy cannot achieve the expected combat effectiveness.
Disclosure of Invention
The invention aims to provide a self-adaptive deception jamming composite interference method based on a DRFM technology, which is used for generating strip type deception jamming with a settable width and distance dragging type deception jamming with a preset initial jamming position by taking a shielding target as a center, and simultaneously implementing deception jamming so as to reduce the recognition and countering probability of radar on the jamming, thereby achieving a better jamming effect and protecting the shielded target.
The technical solution for realizing the purpose of the invention is as follows: an adaptive spoofing suppressing composite interference method based on a DRFM technology comprises the following steps:
intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, and performing secondary modulation on the frequency shift quantity in a pulse by utilizing a window function characteristic curve to generate distance dragging self-adaptive deception jamming;
performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Preferably, the specific steps are as follows:
intercepting radar signals and analyzing the radar signals to obtain the time width and the bandwidth width of the linear frequency modulation signals of the intercepted section;
calculating the frequency modulation slope of the intercepted radar signal;
the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Preferably, the specific method for generating the distance dragging self-adaptive spoofing interference is as follows:
setting a stripe type suppression interference suppression range taking a shielding target as a center;
calculating the frequency modulation slope after the frequency modulation slope modulation in the pressing range;
calculating the frequency shift quantity for modulating the stripe-shaped suppression interference center to the shield target position;
and generating stripe-type suppression interference with the interference center coincident with the position of the shielded target according to the frequency shift quantity.
Preferably, the frequency modulation slope after the variable frequency modulation slope modulation in the pressing range is calculated, and the specific formula is as follows:
Figure BDA0002636639640000021
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is the suppression range, T1 is the time width of the intercepted signal.
Preferably, the specific formula for calculating the frequency shift amount for modulating the stripe-shaped suppression interference center to the shield target position is as follows:
Figure BDA0002636639640000022
where a is a frequency modulation slope change coefficient, K is the frequency modulation slope of the original signal, and T1 is the time width of the intercepted signal.
Preferably, the specific method for generating the front-drag or rear-drag adaptive deception jamming which is initiated at a specified distance from the protected target is as follows:
setting an initial interference distance;
calculating an initial frequency shift amount of the first forwarding pulse according to the initial interference distance;
setting a deception jamming strategy as follows: selecting inter-pulse distance dragging interference, namely taking the initial interference distance as a starting point, dragging backwards or forwards, if the backward dragging frequency quantity is reduced pulse by pulse, and if the forward dragging frequency quantity is increased pulse by pulse;
calculating the secondary frequency shift quantity of the ith pulse;
generating front-drag or back-drag self-adaptive deception jamming which starts from a specified distance from a protected target according to the secondary frequency shift quantity.
Preferably, the set initial interference distance satisfies:
Figure BDA0002636639640000031
wherein J is 2 R 0 For initial interference distance, B is radar signal bandwidth estimation value, K is primary signal frequency modulation slope, T1 is time width of intercepted signal, T 0 For the forwarding delay time of the jammer, B1 is the bandwidth width.
Preferably, the specific formula for calculating the initial frequency shift amount of the first forwarded pulse is:
Figure BDA0002636639640000032
preferably, the maximum value of the forward interference secondary frequency shift quantity is
Figure BDA0002636639640000033
The minimum value of the secondary frequency shift quantity of the backward dragging interference is +.>
Figure BDA0002636639640000034
Preferably, if the N pulse time interference is performed on the radar and the window function with the number of 2N is w, the i-th frequency shift increment of the forward-dragging interference is f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
Compared with the prior art, the invention has the remarkable advantages that:
(1) The invention takes the shielding target as the center to form the strip type suppression interference with the settable width, and forms the distance dragging type self-adaptive deception interference with the designated position from the shielding target as the beginning, and the suppression and deception interference can be implemented simultaneously;
(2) According to the invention, interference parameters such as frequency shift quantity and the like of each interference pulse are automatically generated through a preset deception interference distance and a drag strategy;
(3) According to the method, the preset suppression interference range is used for automatically generating the interference parameters such as the frequency shift quantity, the variable tone slope quantity and the like of each interference pulse, so that the recognition and the countermeasures of the radar to the interference are reduced, a good interference effect is achieved, and the protected target is protected.
The present invention will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a flow chart of the present invention.
Fig. 2 is a graph comparing pulse pressure results before and after the initial pulse is disturbed.
Fig. 3 is a graph comparing pulse pressure results of multiple pulses before and after disturbance.
Fig. 4 is a comparative top view of the multipulse pulse pressure results before and after disturbance.
Fig. 5 is a graph showing the pulse pressure results of multiple pulses under conventional frequency shifting interference.
Detailed Description
As shown in fig. 1, in the adaptive spoofing suppressing composite interference method based on the DRFM technology, the received radar signal is subjected to pattern interception, the intercepted signal is subjected to frequency shift modulation, and the frequency shift quantity is subjected to secondary modulation in a pulse by utilizing a window function characteristic curve, so that adaptive distance dragging spoofing interference is generated.
Specifically, the frequency shift amount of deception jamming is automatically calculated according to the time width and the bandwidth of the intercepted radar signal and the preset interference position, and the secondary frequency shift amount is generated according to the dragging strategy and the selected window function.
The band-type suppression interference with the shielding target as the center and the settable width is formed by performing frequency shift modulation and frequency modulation slope modulation on the intercepted signal.
Specifically, the frequency shift quantity of suppressing interference is calculated according to the time width and bandwidth of the intercepted radar signal and the position of the shielding target, and the frequency modulation slope modulation quantity is automatically calculated according to the set suppression range.
Further, the method comprises the following specific steps:
step 1: intercepting radar signals and analyzing the radar signals to obtain a wide width T1 and a wide width B1 of the linear frequency modulation signals of the intercepted section;
step 2: calculating the frequency modulation slope K of the intercepted radar signal and giving the forwarding delay time t of the jammer 0
Step 3: the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
in a further embodiment, the specific steps of generating the stripe-shaped suppression interference with the shielding target as the center to form the configurable width are as follows:
setting a stripe type suppression interference suppression range J centering on a shield target 1 R。
Calculating the frequency modulation slope k after the modulation of the frequency modulation slope under the pressing range 1 The specific formula is as follows:
Figure BDA0002636639640000041
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is the suppression range, T1 is the time width of the intercepted signal.
Calculating shift frequency of modulating band-type suppression interference center to shield target position
Figure BDA0002636639640000051
The specific formula is as follows:
Figure BDA0002636639640000052
generating a stripe suppression interference J with an interference center coincident with the position of the shielded target according to the frequency shift 1
In a further embodiment, the specific method for generating the front-drag or rear-drag adaptive deception jamming with the designated distance from the protected target as the start is as follows:
setting an initial interference distance J 2 R 0 Namely, after radar matching and filtering, the distance from the first interference pulse to the shielded target is positive, the lagged shielded target is negative, the leading target is negative, and the set initial interference distance meets the following conditions:
Figure BDA0002636639640000053
calculating the initial frequency shift of the first forward pulse
Figure BDA0002636639640000054
The specific formula is as follows:
Figure BDA0002636639640000055
wherein the frequency shift range is [ -B1, B ].
And setting a deception jamming strategy, and selecting inter-pulse distance dragging jamming to drag or drag forwards by taking the initial jamming distance as a starting point, wherein if the backward dragging frequency quantity is reduced by pulse, the forward dragging frequency quantity is increased by pulse.
Calculating the secondary frequency shift of the ith pulse
Figure BDA0002636639640000056
The maximum value of the secondary frequency shift quantity of the forward interference is
Figure BDA0002636639640000057
The minimum value of the secondary frequency shift quantity of the backward dragging interference is
Figure BDA0002636639640000058
Let N pulse time interference to radar, window function with number of 2N be w, i-th shift increment of forward-pulling interference be f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
Generating front drag or back drag self-adaptive deception jamming J starting from specified distance of shielded target according to secondary frequency shift quantity 2
Step 4: and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Specifically, the generated composite interference is specifically:
Figure BDA0002636639640000061
where n is the number of targets, n E (1, 2, …, K), and α, β is the weight of suppression interference and spoofing interference.
Example 1
Simulation conditions:
parameter design: radar signal bandwidth b=50 MHz, time width t=50us, repetition period prt=250us, sampling rate fs=100 MHz, background noise power p1= -10dB, signal power p2=0 dB, digital frequency storage interception time width t1=25us, waiting for forwarding time T 0 Interference machine and shield target distance radar distance r=15 km, suppressing interference coverage J 1 R=950 m, suppressing the disturbance amplitude modulation α=60 dB, deception disturbance initial distance J from shield target 2 R 0 The rogue amplitude modulation β=30db is found by pulling backward and the frequency-shifting modulation window function w selects the hamming window. The conventional frequency shifting interference frequency shifting quantity is-8.233 MHz.
Simulation results:
fig. 2 shows comparison of pulse pressure results before and after the initial pulse of the radar is interfered, the radar can normally detect the target before being interfered, and after being interfered in a self-adaptive manner, the radar generates a stripe-type suppression interference effect by taking the shielded target as the center, and a deception interference effect is generated at a position 5km away from the shielded target. Fig. 3 and fig. 4 show pulse pressure results of multiple pulses before and after interference, compared with simulated three-dimensional diagrams and top views, targets can be normally detected by a radar before interference, and after self-adaptive interference, a strip type suppression interference effect continuously exists in 32 pulse duration time by taking a shielded target as a center, and deceptive interference generated at a position 5km away from the shielded target is dragged backwards pulse by pulse. Fig. 5 shows the result of pulse pressure of multiple pulses under conventional frequency-shifting interference, which is easily recognized by a radar, and the effect of spoofing interference is generated at a distance of 5km from a shield target.

Claims (8)

1. The adaptive spoofing suppressing composite interference method based on the DRFM technology is characterized by comprising the following steps of:
intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, performing secondary modulation on a frequency shift quantity in a pulse by utilizing a window function characteristic curve, and generating distance dragging self-adaptive deception jamming, wherein the specific method for generating the distance dragging self-adaptive deception jamming comprises the following steps of:
setting a stripe type suppression interference suppression range taking a shielding target as a center;
the frequency modulation slope after the modulation of the down-conversion frequency modulation slope in the pressing range is calculated, and the specific formula is as follows:
Figure FDA0004212321030000011
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is a pressing range, and T1 is the time width of intercepting signals;
calculating the frequency shift quantity for modulating the stripe-shaped suppression interference center to the shield target position;
generating a stripe suppression interference with an interference center coincident with the position of the shielded target according to the frequency shift quantity;
performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
2. The adaptive spoofing suppressing composite interference method based on the DRFM technique according to claim 1, wherein the specific steps are as follows:
intercepting radar signals and analyzing the radar signals to obtain the time width and the bandwidth width of the linear frequency modulation signals of the intercepted section;
calculating the frequency modulation slope of the intercepted radar signal;
the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
3. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 1, wherein the specific formula for calculating the shift amount for modulating the stripe-shaped suppressed interference center to the shield target position is:
Figure FDA0004212321030000012
wherein a is a frequency modulation slope change coefficient, K is the frequency modulation slope of the original signal, T1 is the time width of the intercepted signal, T 0 And forwarding delay time for the jammer.
4. The adaptive spoofing suppressing composite interference method based on the DRFM technique of claim 1, wherein the specific method of generating the front-drag or rear-drag adaptive spoofing interference starting at a specified distance from the protected target is:
setting an initial interference distance;
calculating an initial frequency shift amount of the first forwarding pulse according to the initial interference distance;
setting a deception jamming strategy as follows: selecting inter-pulse distance dragging interference, namely taking the initial interference distance as a starting point, dragging backwards or forwards, if the backward dragging frequency quantity is reduced pulse by pulse, and if the forward dragging frequency quantity is increased pulse by pulse;
calculating the secondary frequency shift quantity of the ith pulse;
generating front-drag or back-drag self-adaptive deception jamming which starts from a specified distance from a protected target according to the secondary frequency shift quantity.
5. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 4, wherein the set initial interference distance satisfies:
Figure FDA0004212321030000021
wherein J is 2 R 0 For initial interference distance, B is radar signal bandwidth estimation value, K is primary signal frequency modulation slope, T1 is time width of intercepted signal, T 0 For the forwarding delay time of the jammer, B1 is the bandwidth width.
6. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 4 wherein the specific formula for calculating the initial frequency shift amount of the first forwarded pulse is:
Figure FDA0004212321030000022
t 0 for the forwarding delay time of the jammer, T1 is the time width of the intercepted signal, J 2 R 0 For the initial interference distance, K is the frequency modulation slope of the original signal.
7. According to claim 4The adaptive deception suppression composite interference method based on the DRFM technology is characterized in that the maximum value of the forward-dragging interference secondary frequency shift quantity is
Figure FDA0004212321030000023
The minimum value of the secondary frequency shift quantity of the backward dragging interference is
Figure FDA0004212321030000024
B is radar signal bandwidth estimation value, +.>
Figure FDA0004212321030000025
For the initial amount of frequency shift of the first forwarded pulse, B1 is the bandwidth width.
8. The adaptive spoofing suppressing composite interference method based on DRFM technology as defined in claim 7, wherein if the window function with the number of 2N is w, the i-th shift increment of the forward pulling interference is f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
CN202010827172.1A 2020-08-17 2020-08-17 DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method Active CN111965606B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010827172.1A CN111965606B (en) 2020-08-17 2020-08-17 DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010827172.1A CN111965606B (en) 2020-08-17 2020-08-17 DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method

Publications (2)

Publication Number Publication Date
CN111965606A CN111965606A (en) 2020-11-20
CN111965606B true CN111965606B (en) 2023-06-30

Family

ID=73388202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010827172.1A Active CN111965606B (en) 2020-08-17 2020-08-17 DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method

Country Status (1)

Country Link
CN (1) CN111965606B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113556795B (en) * 2021-07-20 2023-03-24 哈尔滨海能达科技有限公司 Method for determining first-time forwarding equipment, related device and computer storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103399303A (en) * 2013-07-22 2013-11-20 西安电子科技大学 Method and system for resisting dense forwarding type defraud interference of airborne radar
CN103532656A (en) * 2013-08-08 2014-01-22 北京理工大学 Broadband linear frequency-modulated (LFM) signal multi-decoy interference method based on fractional Fourier domain channelization
CN105005032A (en) * 2015-07-21 2015-10-28 电子科技大学 SAR frequency-shifting jamming method based on series inversion imaging algorism
CN105629207A (en) * 2015-12-22 2016-06-01 南京理工大学 Radar signal processing system based on DRFM (Digital Radio-Frequency Memory) technology and dense target jamming generation method
CN109375180A (en) * 2018-10-23 2019-02-22 哈尔滨工程大学 It is a kind of based on intermittent sampling forwarding radar interfere FPGA implementation method in advance
CN110824441A (en) * 2019-10-31 2020-02-21 上海交通大学 Deception jamming system and method based on time modulation technology
CN111323760A (en) * 2020-03-16 2020-06-23 西安电子科技大学 Multi-stage modulation interference system and method based on digital radio frequency storage DRFM

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103399303A (en) * 2013-07-22 2013-11-20 西安电子科技大学 Method and system for resisting dense forwarding type defraud interference of airborne radar
CN103532656A (en) * 2013-08-08 2014-01-22 北京理工大学 Broadband linear frequency-modulated (LFM) signal multi-decoy interference method based on fractional Fourier domain channelization
CN105005032A (en) * 2015-07-21 2015-10-28 电子科技大学 SAR frequency-shifting jamming method based on series inversion imaging algorism
CN105629207A (en) * 2015-12-22 2016-06-01 南京理工大学 Radar signal processing system based on DRFM (Digital Radio-Frequency Memory) technology and dense target jamming generation method
CN109375180A (en) * 2018-10-23 2019-02-22 哈尔滨工程大学 It is a kind of based on intermittent sampling forwarding radar interfere FPGA implementation method in advance
CN110824441A (en) * 2019-10-31 2020-02-21 上海交通大学 Deception jamming system and method based on time modulation technology
CN111323760A (en) * 2020-03-16 2020-06-23 西安电子科技大学 Multi-stage modulation interference system and method based on digital radio frequency storage DRFM

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Fengbo Chen et al..A method against DRFM dense false target jamming based on jamming recognization.《IET International Radar Conference 2015》.2015,第1-4页. *
张路 等.基于DRFM的欺骗干扰仿真研究.《电子技术与软件工程》.2017,第102-103页. *
李彦栓 等.基于DRFM的欺骗干扰与压制干扰技术研究.《电子科技》.2015,第28卷(第6期),第158-161页. *

Also Published As

Publication number Publication date
CN111965606A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN113640761B (en) Signal processing method for preventing false targets between pulses of frequency agile radar
CN106932761B (en) A kind of cognition perseverance mould waveform design method of antinoise signal dependent form interference
CN111965606B (en) DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method
CN107894585B (en) Multi-decoy generation method based on phase modulation surface
CN113376601B (en) Frequency agile radar sidelobe suppression method based on CLEAN algorithm
CN112578350B (en) Airborne SAR interference effect simulation method under high-energy microwave interference
CN110794374B (en) Parameter identification method for intermittent sampling forwarding interference
CN112014806B (en) Unintentional interference suppression method for airborne radar under complex interference scene
Karimi et al. Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter
CN115575908B (en) Radar interference parameter optimization method and system based on pulse description words
CN114252857A (en) Energy function and band-pass filtering based intermittent sampling forwarding type interference resisting method
CN110927693B (en) Pulse compression method combining matched filtering with sparse inversion
CN114966572A (en) Intermittent sampling forwarding interference countermeasure method based on intra-pulse segmented LFM waveform
CN114755639A (en) Adaptive generation method for multi-style composite deception jamming facing tracking countermeasure
CN112014807B (en) Self-adaptive clutter suppression method for frequency agile radar
CN116953683A (en) Intermittent sampling forwarding interference suppression method based on intra-pulse waveform cognition optimization design
CN112346022A (en) Dense false target interference suppression method based on two-dimensional reduced fractional Fourier transform
CN115327491A (en) Method for resisting transfer type false target interference by radar inter-pulse waveform agility
CN110673118A (en) Active sonar single-frequency pulse train waveform design and detection algorithm
CN113625233B (en) Reinforced learning-based radar anti-interference intelligent decision method
CN113238194B (en) Broadband phased array radar anti-decoy interference method based on fractional domain-frequency domain processing
CN114994616A (en) Design method for anti-intermittent sampling direct forwarding interference waveform of intra-pulse segment shielding
CN109212494A (en) A kind of stealthy interference waveform design method of radio frequency for radar network system
Wei et al. A new method of phase-perturbed LFM chirp signals for SAR ECCM
Liu et al. Design and analysis of multiple false targets against pulse compression radar based on OS-CFAR

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant