Beruflich Dokumente
Kultur Dokumente
Ahmed Abdalla, Zhao Yuan, Sowah Nii Longdon, Joyce Chelangate Bore, Tang Bin
School of Electronic Engineering, University of Electronic Science and Technology of China,
Chengdu 610054, P.R. China
E-mail: ahmed.baoney6@hotmail.com
AbstractIn this paper, Electronic counter countermeasure
DRFM jammer that reasonably look like the target return but
must be pulled off from the target return. In view of both RFT
KeywordsElectronic
counter
countermeasure
(ECCM);
I. INTRODUCTION
Modern deception electronic counter measures (ECM)
techniques are enhanced by ways of accurate replication and
reproduction of the radar signal through the digital radio
frequency memory (DRFM), which attempts to deceive the
radar systems and therefore make it hard to discriminate true
and false targets. This kind of jamming signals can be fully
coherently processed by the radar receiver, which means that it
can be processed similar to the real targets. A variety of ECM
heuristic approaches have been proposed such as [1,2,3].
Project supported by the National Defense Pre-Research
Foundation of China (NO.9140A07030713DZ02101).
ICSPCC2015
978-1-4799-8920-1/15/$31.00 2015 IEEE
LITERATURE SURVEY
classes as follows:
[4,5,6,7, 8,9,10,11,12]
in
the
full-rate
orthogonal
pulse
block
and
aims to
produce false targets which have a different chirp rate with the
transformed signal, and the chirp rate is n times greater than
the original signal. Soumekh[9] provided a study of two
methods for perturbing the phase of an LFM chirp to generate
diverse pulses to counter a repeater jammer . The first one was
based on adding a slow-fluctuating phase to an LFM chirp,
while the other method introduced slight perturbations in the
rate of an LFM chirp in the slow-time domain. Moreover, it
suggested a way to penalize the jammer that tries to repeat the
pulse sequences of radar signal by modeling a focused
range-Doppler map of the ECM targets by matched filtering
with jammer pulse sequence to clip the signatures of the phony
targets.
All above listed techniques do not suppress the false target
simultaneously. Therefore, a suppression algorithm based on
the joint time-frequency pulse diversity is proposed by Lu G et
al.[10] to cancel the false target at current received pulse.
This is achieved in one pulse repetition interval (PRI) by using
the orthogonal frequency division multiplexing (OFDM). Yu C
et al.[11] proposed a schema to enhance the pulse diversity by
combining it with the Fast-time Space Time Adaptive
Processing (STAP) in multichannel SAR. This approach is able
to defeat false targets. Moreover, it had better performance in
another type of jamming known as terrain scattered
interference (TSI).
B. Techniques that aim to eliminate the R-VGS
Generally, these techniques use different approaches to
incessantly.
This
method
used
PERFORMANCE ANALYSIS
instantaneous
III.
both gate capturing and gate pulling time, since it has the
TABLE I.
Features Analysis
RFT styles
Jammer penalization
Techniques
Akhtar[4,5,7]
Xia et al [7]
Lu et al [8]
Soumekh[9]
Lu et al[10]
Yu et al.[11]
Multiple false
CI @SMSP
TSI
RFT
target
Supports the
property
property
Low
Medium
Low
High
High
Very high
High
Very high
High
High
Extremely high
Very high
Estimated
Well compensated
Ignored
Estimated
Not required
Estimated
Support the
Supports the
motion
Utilize all the received
signals
property
simultaneously suppress
the RFT
property
Computational burden
IV.
Low
Low
Low
High
Medium
Very high
TABLE II.
Features Analysis
Techniques
Gu X et all[14]
Lu et al.[15]
Zhang J et al.[16]
Fu X et al.[17]
Provided against
Against RGPO ,
R-VGPO, R-VGPI
RGPI
Computational burden
Very high
High
Low
Extremely high
probability of successful
Medium
High
Low
Extremely high
Pulling periods
Pulling periods
Capturing, Pulling
R-VGS styles
anti-R-VGP
specified at procedure periods
of R-VGS
periods
ACKNOWLEDGMENT
existing radars.
Implementation of perfect signal processing ability,
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
performance.
V. CONCLUSION
This paper presents a survey on radar deception jamming
ECCM methods and discusses their performance assessment.
[9]