CN111965606B - DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method - Google Patents
DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method Download PDFInfo
- Publication number
- CN111965606B CN111965606B CN202010827172.1A CN202010827172A CN111965606B CN 111965606 B CN111965606 B CN 111965606B CN 202010827172 A CN202010827172 A CN 202010827172A CN 111965606 B CN111965606 B CN 111965606B
- Authority
- CN
- China
- Prior art keywords
- interference
- modulation
- frequency shift
- adaptive
- frequency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
- G01S7/36—Means for anti-jamming, e.g. ECCM, i.e. electronic counter-counter measures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
- G01S7/38—Jamming means, e.g. producing false echoes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
The invention discloses a DRFM technology-based self-adaptive deception suppression composite interference method, which comprises the following steps: intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, and performing secondary modulation on the frequency shift quantity in a pulse by utilizing a window function characteristic curve to generate distance dragging self-adaptive deception jamming; performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center; and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference. The invention reduces the recognition and countering probability of radar to interference, thereby achieving better interference effect and protecting the shielded target.
Description
Technical Field
The invention belongs to radar interference and anti-interference technology, and particularly relates to a self-adaptive deception suppression composite interference method based on a DRFM technology.
Background
Under the development of digital frequency storage technology (DRFM), radar interference technology is rapidly developed, traditional analog interference is changed into digital interference, and a forwarded signal has high coherence with an original signal. The distance Doppler coupling characteristic of the LFM signal enables the frequency shift forwarding interference to have better interference performance. Conventional frequency shift deception jamming based on DRFM technology is easy to identify by radar, and the radar cannot realize jamming effect after adopting anti-jamming means. The existing suppression interference often suppresses the radar in a full distance section, so that the power utilization rate is low, and power waste is caused. Conventional spoofing and jamming is typically performed in a time-sharing implementation. With the continuous improvement of the anti-interference capability of the radar, the conventional interference measure strategy cannot achieve the expected combat effectiveness.
Disclosure of Invention
The invention aims to provide a self-adaptive deception jamming composite interference method based on a DRFM technology, which is used for generating strip type deception jamming with a settable width and distance dragging type deception jamming with a preset initial jamming position by taking a shielding target as a center, and simultaneously implementing deception jamming so as to reduce the recognition and countering probability of radar on the jamming, thereby achieving a better jamming effect and protecting the shielded target.
The technical solution for realizing the purpose of the invention is as follows: an adaptive spoofing suppressing composite interference method based on a DRFM technology comprises the following steps:
intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, and performing secondary modulation on the frequency shift quantity in a pulse by utilizing a window function characteristic curve to generate distance dragging self-adaptive deception jamming;
performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Preferably, the specific steps are as follows:
intercepting radar signals and analyzing the radar signals to obtain the time width and the bandwidth width of the linear frequency modulation signals of the intercepted section;
calculating the frequency modulation slope of the intercepted radar signal;
the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Preferably, the specific method for generating the distance dragging self-adaptive spoofing interference is as follows:
setting a stripe type suppression interference suppression range taking a shielding target as a center;
calculating the frequency modulation slope after the frequency modulation slope modulation in the pressing range;
calculating the frequency shift quantity for modulating the stripe-shaped suppression interference center to the shield target position;
and generating stripe-type suppression interference with the interference center coincident with the position of the shielded target according to the frequency shift quantity.
Preferably, the frequency modulation slope after the variable frequency modulation slope modulation in the pressing range is calculated, and the specific formula is as follows:
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is the suppression range, T1 is the time width of the intercepted signal.
Preferably, the specific formula for calculating the frequency shift amount for modulating the stripe-shaped suppression interference center to the shield target position is as follows:
where a is a frequency modulation slope change coefficient, K is the frequency modulation slope of the original signal, and T1 is the time width of the intercepted signal.
Preferably, the specific method for generating the front-drag or rear-drag adaptive deception jamming which is initiated at a specified distance from the protected target is as follows:
setting an initial interference distance;
calculating an initial frequency shift amount of the first forwarding pulse according to the initial interference distance;
setting a deception jamming strategy as follows: selecting inter-pulse distance dragging interference, namely taking the initial interference distance as a starting point, dragging backwards or forwards, if the backward dragging frequency quantity is reduced pulse by pulse, and if the forward dragging frequency quantity is increased pulse by pulse;
calculating the secondary frequency shift quantity of the ith pulse;
generating front-drag or back-drag self-adaptive deception jamming which starts from a specified distance from a protected target according to the secondary frequency shift quantity.
Preferably, the set initial interference distance satisfies:
wherein J is 2 R 0 For initial interference distance, B is radar signal bandwidth estimation value, K is primary signal frequency modulation slope, T1 is time width of intercepted signal, T 0 For the forwarding delay time of the jammer, B1 is the bandwidth width.
Preferably, the specific formula for calculating the initial frequency shift amount of the first forwarded pulse is:
preferably, the maximum value of the forward interference secondary frequency shift quantity isThe minimum value of the secondary frequency shift quantity of the backward dragging interference is +.>
Preferably, if the N pulse time interference is performed on the radar and the window function with the number of 2N is w, the i-th frequency shift increment of the forward-dragging interference is f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
Compared with the prior art, the invention has the remarkable advantages that:
(1) The invention takes the shielding target as the center to form the strip type suppression interference with the settable width, and forms the distance dragging type self-adaptive deception interference with the designated position from the shielding target as the beginning, and the suppression and deception interference can be implemented simultaneously;
(2) According to the invention, interference parameters such as frequency shift quantity and the like of each interference pulse are automatically generated through a preset deception interference distance and a drag strategy;
(3) According to the method, the preset suppression interference range is used for automatically generating the interference parameters such as the frequency shift quantity, the variable tone slope quantity and the like of each interference pulse, so that the recognition and the countermeasures of the radar to the interference are reduced, a good interference effect is achieved, and the protected target is protected.
The present invention will be described in further detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a flow chart of the present invention.
Fig. 2 is a graph comparing pulse pressure results before and after the initial pulse is disturbed.
Fig. 3 is a graph comparing pulse pressure results of multiple pulses before and after disturbance.
Fig. 4 is a comparative top view of the multipulse pulse pressure results before and after disturbance.
Fig. 5 is a graph showing the pulse pressure results of multiple pulses under conventional frequency shifting interference.
Detailed Description
As shown in fig. 1, in the adaptive spoofing suppressing composite interference method based on the DRFM technology, the received radar signal is subjected to pattern interception, the intercepted signal is subjected to frequency shift modulation, and the frequency shift quantity is subjected to secondary modulation in a pulse by utilizing a window function characteristic curve, so that adaptive distance dragging spoofing interference is generated.
Specifically, the frequency shift amount of deception jamming is automatically calculated according to the time width and the bandwidth of the intercepted radar signal and the preset interference position, and the secondary frequency shift amount is generated according to the dragging strategy and the selected window function.
The band-type suppression interference with the shielding target as the center and the settable width is formed by performing frequency shift modulation and frequency modulation slope modulation on the intercepted signal.
Specifically, the frequency shift quantity of suppressing interference is calculated according to the time width and bandwidth of the intercepted radar signal and the position of the shielding target, and the frequency modulation slope modulation quantity is automatically calculated according to the set suppression range.
Further, the method comprises the following specific steps:
step 1: intercepting radar signals and analyzing the radar signals to obtain a wide width T1 and a wide width B1 of the linear frequency modulation signals of the intercepted section;
step 2: calculating the frequency modulation slope K of the intercepted radar signal and giving the forwarding delay time t of the jammer 0 ;
Step 3: the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
in a further embodiment, the specific steps of generating the stripe-shaped suppression interference with the shielding target as the center to form the configurable width are as follows:
setting a stripe type suppression interference suppression range J centering on a shield target 1 R。
Calculating the frequency modulation slope k after the modulation of the frequency modulation slope under the pressing range 1 The specific formula is as follows:
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is the suppression range, T1 is the time width of the intercepted signal.
Calculating shift frequency of modulating band-type suppression interference center to shield target positionThe specific formula is as follows:
generating a stripe suppression interference J with an interference center coincident with the position of the shielded target according to the frequency shift 1 。
In a further embodiment, the specific method for generating the front-drag or rear-drag adaptive deception jamming with the designated distance from the protected target as the start is as follows:
setting an initial interference distance J 2 R 0 Namely, after radar matching and filtering, the distance from the first interference pulse to the shielded target is positive, the lagged shielded target is negative, the leading target is negative, and the set initial interference distance meets the following conditions:
calculating the initial frequency shift of the first forward pulseThe specific formula is as follows:
wherein the frequency shift range is [ -B1, B ].
And setting a deception jamming strategy, and selecting inter-pulse distance dragging jamming to drag or drag forwards by taking the initial jamming distance as a starting point, wherein if the backward dragging frequency quantity is reduced by pulse, the forward dragging frequency quantity is increased by pulse.
The maximum value of the secondary frequency shift quantity of the forward interference isThe minimum value of the secondary frequency shift quantity of the backward dragging interference is
Let N pulse time interference to radar, window function with number of 2N be w, i-th shift increment of forward-pulling interference be f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
Generating front drag or back drag self-adaptive deception jamming J starting from specified distance of shielded target according to secondary frequency shift quantity 2 。
Step 4: and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
Specifically, the generated composite interference is specifically:
where n is the number of targets, n E (1, 2, …, K), and α, β is the weight of suppression interference and spoofing interference.
Example 1
Simulation conditions:
parameter design: radar signal bandwidth b=50 MHz, time width t=50us, repetition period prt=250us, sampling rate fs=100 MHz, background noise power p1= -10dB, signal power p2=0 dB, digital frequency storage interception time width t1=25us, waiting for forwarding time T 0 Interference machine and shield target distance radar distance r=15 km, suppressing interference coverage J 1 R=950 m, suppressing the disturbance amplitude modulation α=60 dB, deception disturbance initial distance J from shield target 2 R 0 The rogue amplitude modulation β=30db is found by pulling backward and the frequency-shifting modulation window function w selects the hamming window. The conventional frequency shifting interference frequency shifting quantity is-8.233 MHz.
Simulation results:
fig. 2 shows comparison of pulse pressure results before and after the initial pulse of the radar is interfered, the radar can normally detect the target before being interfered, and after being interfered in a self-adaptive manner, the radar generates a stripe-type suppression interference effect by taking the shielded target as the center, and a deception interference effect is generated at a position 5km away from the shielded target. Fig. 3 and fig. 4 show pulse pressure results of multiple pulses before and after interference, compared with simulated three-dimensional diagrams and top views, targets can be normally detected by a radar before interference, and after self-adaptive interference, a strip type suppression interference effect continuously exists in 32 pulse duration time by taking a shielded target as a center, and deceptive interference generated at a position 5km away from the shielded target is dragged backwards pulse by pulse. Fig. 5 shows the result of pulse pressure of multiple pulses under conventional frequency-shifting interference, which is easily recognized by a radar, and the effect of spoofing interference is generated at a distance of 5km from a shield target.
Claims (8)
1. The adaptive spoofing suppressing composite interference method based on the DRFM technology is characterized by comprising the following steps of:
intercepting a received radar signal, performing frequency shift modulation on the intercepted signal, performing secondary modulation on a frequency shift quantity in a pulse by utilizing a window function characteristic curve, and generating distance dragging self-adaptive deception jamming, wherein the specific method for generating the distance dragging self-adaptive deception jamming comprises the following steps of:
setting a stripe type suppression interference suppression range taking a shielding target as a center;
the frequency modulation slope after the modulation of the down-conversion frequency modulation slope in the pressing range is calculated, and the specific formula is as follows:
wherein a is the frequency modulation slope change coefficient, C is the light speed, K is the frequency modulation slope of the original signal, J 1 R is a pressing range, and T1 is the time width of intercepting signals;
calculating the frequency shift quantity for modulating the stripe-shaped suppression interference center to the shield target position;
generating a stripe suppression interference with an interference center coincident with the position of the shielded target according to the frequency shift quantity;
performing frequency shift modulation on the intercepted signal and simultaneously performing frequency shift slope modulation on the intercepted signal to generate stripe-type suppression interference with a settable width by taking a shielding target as a center;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
2. The adaptive spoofing suppressing composite interference method based on the DRFM technique according to claim 1, wherein the specific steps are as follows:
intercepting radar signals and analyzing the radar signals to obtain the time width and the bandwidth width of the linear frequency modulation signals of the intercepted section;
calculating the frequency modulation slope of the intercepted radar signal;
the intercepted signals are subjected to frequency shift modulation and frequency change slope modulation at the same time, so that stripe-type suppression interference with the width being set is generated by taking a shielding target as the center; generating front drag or rear drag self-adaptive deception jamming which starts from a specified distance from a protected target by performing frequency shift modulation on the intercepted signal and performing secondary frequency shift modulation according to a drag strategy and a window function;
and carrying out weighted modulation on the suppression interference and the deception interference to generate composite interference.
3. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 1, wherein the specific formula for calculating the shift amount for modulating the stripe-shaped suppressed interference center to the shield target position is:
wherein a is a frequency modulation slope change coefficient, K is the frequency modulation slope of the original signal, T1 is the time width of the intercepted signal, T 0 And forwarding delay time for the jammer.
4. The adaptive spoofing suppressing composite interference method based on the DRFM technique of claim 1, wherein the specific method of generating the front-drag or rear-drag adaptive spoofing interference starting at a specified distance from the protected target is:
setting an initial interference distance;
calculating an initial frequency shift amount of the first forwarding pulse according to the initial interference distance;
setting a deception jamming strategy as follows: selecting inter-pulse distance dragging interference, namely taking the initial interference distance as a starting point, dragging backwards or forwards, if the backward dragging frequency quantity is reduced pulse by pulse, and if the forward dragging frequency quantity is increased pulse by pulse;
calculating the secondary frequency shift quantity of the ith pulse;
generating front-drag or back-drag self-adaptive deception jamming which starts from a specified distance from a protected target according to the secondary frequency shift quantity.
5. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 4, wherein the set initial interference distance satisfies:
wherein J is 2 R 0 For initial interference distance, B is radar signal bandwidth estimation value, K is primary signal frequency modulation slope, T1 is time width of intercepted signal, T 0 For the forwarding delay time of the jammer, B1 is the bandwidth width.
6. The adaptive spoofing-suppressing composite interference method based on the DRFM technique of claim 4 wherein the specific formula for calculating the initial frequency shift amount of the first forwarded pulse is:
t 0 for the forwarding delay time of the jammer, T1 is the time width of the intercepted signal, J 2 R 0 For the initial interference distance, K is the frequency modulation slope of the original signal.
7. According to claim 4The adaptive deception suppression composite interference method based on the DRFM technology is characterized in that the maximum value of the forward-dragging interference secondary frequency shift quantity isThe minimum value of the secondary frequency shift quantity of the backward dragging interference isB is radar signal bandwidth estimation value, +.>For the initial amount of frequency shift of the first forwarded pulse, B1 is the bandwidth width.
8. The adaptive spoofing suppressing composite interference method based on DRFM technology as defined in claim 7, wherein if the window function with the number of 2N is w, the i-th shift increment of the forward pulling interference is f Δψmax Xw (i), the i-th shift increment of the backward interference is f Δψmin ×w(i)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010827172.1A CN111965606B (en) | 2020-08-17 | 2020-08-17 | DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010827172.1A CN111965606B (en) | 2020-08-17 | 2020-08-17 | DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111965606A CN111965606A (en) | 2020-11-20 |
CN111965606B true CN111965606B (en) | 2023-06-30 |
Family
ID=73388202
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010827172.1A Active CN111965606B (en) | 2020-08-17 | 2020-08-17 | DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111965606B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113556795B (en) * | 2021-07-20 | 2023-03-24 | 哈尔滨海能达科技有限公司 | Method for determining first-time forwarding equipment, related device and computer storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103399303A (en) * | 2013-07-22 | 2013-11-20 | 西安电子科技大学 | Method and system for resisting dense forwarding type defraud interference of airborne radar |
CN103532656A (en) * | 2013-08-08 | 2014-01-22 | 北京理工大学 | Broadband linear frequency-modulated (LFM) signal multi-decoy interference method based on fractional Fourier domain channelization |
CN105005032A (en) * | 2015-07-21 | 2015-10-28 | 电子科技大学 | SAR frequency-shifting jamming method based on series inversion imaging algorism |
CN105629207A (en) * | 2015-12-22 | 2016-06-01 | 南京理工大学 | Radar signal processing system based on DRFM (Digital Radio-Frequency Memory) technology and dense target jamming generation method |
CN109375180A (en) * | 2018-10-23 | 2019-02-22 | 哈尔滨工程大学 | It is a kind of based on intermittent sampling forwarding radar interfere FPGA implementation method in advance |
CN110824441A (en) * | 2019-10-31 | 2020-02-21 | 上海交通大学 | Deception jamming system and method based on time modulation technology |
CN111323760A (en) * | 2020-03-16 | 2020-06-23 | 西安电子科技大学 | Multi-stage modulation interference system and method based on digital radio frequency storage DRFM |
-
2020
- 2020-08-17 CN CN202010827172.1A patent/CN111965606B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103399303A (en) * | 2013-07-22 | 2013-11-20 | 西安电子科技大学 | Method and system for resisting dense forwarding type defraud interference of airborne radar |
CN103532656A (en) * | 2013-08-08 | 2014-01-22 | 北京理工大学 | Broadband linear frequency-modulated (LFM) signal multi-decoy interference method based on fractional Fourier domain channelization |
CN105005032A (en) * | 2015-07-21 | 2015-10-28 | 电子科技大学 | SAR frequency-shifting jamming method based on series inversion imaging algorism |
CN105629207A (en) * | 2015-12-22 | 2016-06-01 | 南京理工大学 | Radar signal processing system based on DRFM (Digital Radio-Frequency Memory) technology and dense target jamming generation method |
CN109375180A (en) * | 2018-10-23 | 2019-02-22 | 哈尔滨工程大学 | It is a kind of based on intermittent sampling forwarding radar interfere FPGA implementation method in advance |
CN110824441A (en) * | 2019-10-31 | 2020-02-21 | 上海交通大学 | Deception jamming system and method based on time modulation technology |
CN111323760A (en) * | 2020-03-16 | 2020-06-23 | 西安电子科技大学 | Multi-stage modulation interference system and method based on digital radio frequency storage DRFM |
Non-Patent Citations (3)
Title |
---|
Fengbo Chen et al..A method against DRFM dense false target jamming based on jamming recognization.《IET International Radar Conference 2015》.2015,第1-4页. * |
张路 等.基于DRFM的欺骗干扰仿真研究.《电子技术与软件工程》.2017,第102-103页. * |
李彦栓 等.基于DRFM的欺骗干扰与压制干扰技术研究.《电子科技》.2015,第28卷(第6期),第158-161页. * |
Also Published As
Publication number | Publication date |
---|---|
CN111965606A (en) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113640761B (en) | Signal processing method for preventing false targets between pulses of frequency agile radar | |
CN106932761B (en) | A kind of cognition perseverance mould waveform design method of antinoise signal dependent form interference | |
CN111965606B (en) | DRFM (digital radio frequency modulation) technology-based adaptive deception suppression composite interference method | |
CN107894585B (en) | Multi-decoy generation method based on phase modulation surface | |
CN113376601B (en) | Frequency agile radar sidelobe suppression method based on CLEAN algorithm | |
CN112578350B (en) | Airborne SAR interference effect simulation method under high-energy microwave interference | |
CN110794374B (en) | Parameter identification method for intermittent sampling forwarding interference | |
CN112014806B (en) | Unintentional interference suppression method for airborne radar under complex interference scene | |
Karimi et al. | Adaptive OFDM waveform design for cognitive radar in signal-dependent clutter | |
CN115575908B (en) | Radar interference parameter optimization method and system based on pulse description words | |
CN114252857A (en) | Energy function and band-pass filtering based intermittent sampling forwarding type interference resisting method | |
CN110927693B (en) | Pulse compression method combining matched filtering with sparse inversion | |
CN114966572A (en) | Intermittent sampling forwarding interference countermeasure method based on intra-pulse segmented LFM waveform | |
CN114755639A (en) | Adaptive generation method for multi-style composite deception jamming facing tracking countermeasure | |
CN112014807B (en) | Self-adaptive clutter suppression method for frequency agile radar | |
CN116953683A (en) | Intermittent sampling forwarding interference suppression method based on intra-pulse waveform cognition optimization design | |
CN112346022A (en) | Dense false target interference suppression method based on two-dimensional reduced fractional Fourier transform | |
CN115327491A (en) | Method for resisting transfer type false target interference by radar inter-pulse waveform agility | |
CN110673118A (en) | Active sonar single-frequency pulse train waveform design and detection algorithm | |
CN113625233B (en) | Reinforced learning-based radar anti-interference intelligent decision method | |
CN113238194B (en) | Broadband phased array radar anti-decoy interference method based on fractional domain-frequency domain processing | |
CN114994616A (en) | Design method for anti-intermittent sampling direct forwarding interference waveform of intra-pulse segment shielding | |
CN109212494A (en) | A kind of stealthy interference waveform design method of radio frequency for radar network system | |
Wei et al. | A new method of phase-perturbed LFM chirp signals for SAR ECCM | |
Liu et al. | Design and analysis of multiple false targets against pulse compression radar based on OS-CFAR |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |