当前位置:网站首页>Intermittent sampling and forwarding interference
Intermittent sampling and forwarding interference
2022-06-30 00:27:00 【nwsuaf_ huasir】
DRFM Jamming strategy
Intermittent sampling and forwarding interference (Interrupted sampling repeater jammer,ISRJ) It is a radar active deception jamming , The implementation of this interference depends on digital RF storage (digital radio fequency memory,DRFM) technology ,DRFM The principle is very simple , It can receive the RF signal from the radar , After sampling, it is stored and sent .DRFM There are two ways to intercept radar signals , One is full pulse storage , One is intermittent sampling storage . So it's called Siyi , One is to collect all the signals transmitted by the radar and then send them , One is to collect only a small segment and then send it .
Interference one : Full pulse storage
When full pulse storage mode is adopted , Jammer can achieve maximum signal processing gain , however , Since the forwarding delay is greater than the duration of the pulse , Therefore, the jammer can only repeat at the next pulse interval (Pulse repeat interrupt,PRI) Send inside . In view of this feature , The waveform diversity proposed by people is an effective method to combat this kind of interference . for example , Each pulse retransmission interval sends different phase coded LFM signals , Different matched filters are used to focus the target echo and jamming signal , The position of the interference signal is estimated and suppressed . Compared with intermittent storage , The interference in the full pulse storage mode is relatively easy to suppress .
Interference II : Intermittent sampling storage
It is due to the interference under full pulse storage , The delay between sampling and sending is large , Easily suppressed , Intermittent sampling storage mode has been proposed , stay 2006 In, scholars from National University of defense technology proposed intermittent sampling and forwarding jamming (Interrupted sampling repeater jammer,ISRJ),[ reference : Wang Xuesong , Liu Jiancheng , Zhangwenming , Fuqixiang , Liu Zhong , Xiexiaoxia . The mathematical principle of intermittent sampling and forwarding interference [J]. Science in China E Compilation : information science ,2006(08):891-901.]. In this mode, the jammer first intercepts a segment of the radar signal , Then delay and forward the fragment several times . The principle of intermittent sampling and forwarding interference is shown in the figure below . By changing the interception width and the number of forwarding , It can achieve the double effects of deception and suppression . Research in this area is quite popular , There is a lot of literature .
Mathematical model of intermittent sampling and forwarding interference
For the most commonly used LFM signal , The sample fragment can be expressed as :
S I ( t ) = ∑ n = 0 N − 1 rect ( t − τ − n T u T I ) e j π K r ( t − τ ) 2 (1) S_{\mathrm{I}}(t)=\sum_{n=0}^{N-1} \operatorname{rect}\left(\frac{t-\tau-n T_{\mathrm{u}}}{T_{\mathrm{I}}}\right) \mathrm{e}^{\mathrm{j} \pi K_{\mathrm{r}}(t-\tau)^{2}} \tag{1} SI(t)=n=0∑N−1rect(TIt−τ−nTu)ejπKr(t−τ)2(1)
among r e c t ( ⋅ ) \mathrm{rect}(\cdot) rect(⋅) Is a rectangular window function , T I T_{\mathrm{I}} TI Is the slice width , N N N Is the number of slices , τ \tau τ Is the slice delay . Then a complete interference signal can be expressed as :
S J ( t ) = ∑ m = 1 M S I ( t − m T I ) = ∑ m = 1 M ∑ n = 0 N − 1 rect ( t − τ − n T u − m T I T I ) e j π K r ( t − τ − m T I ) 2 (2) \begin{aligned} S_{\mathrm{J}}(t) &=\sum_{m=1}^{M} S_{\mathrm{I}}\left(t-m T_{\mathrm{I}}\right) \\ &=\sum_{m=1}^{M} \sum_{n=0}^{N-1} \operatorname{rect}\left(\frac{t-\tau-n T_{\mathrm{u}}-m T_{\mathrm{I}}}{T_{\mathrm{I}}}\right) \mathrm{e}^{\mathrm{j} \pi K_{\mathrm{r}}\left(t-\tau-m T_{\mathrm{I}}\right)^{2}} \end{aligned} \tag{2} SJ(t)=m=1∑MSI(t−mTI)=m=1∑Mn=0∑N−1rect(TIt−τ−nTu−mTI)ejπKr(t−τ−mTI)2(2)
When does the intermittent sampling and forwarding interference end ?
In the paper [Zhou, C., Q. Liu and X. Chen (2018). “Parameter estimation and suppression for DRFM-based interrupted sampling repeater jammer.” IET RADAR SONAR AND NAVIGATION 12(1): 56-63.] There is a saying :
the intercept-delay-forward process is repeated for several cycles until the falling edge of the transmission signal is detected.
He means , This interception - Delay - The forwarding process will terminate when the falling edge of the radar signal is detected .
边栏推荐
- Introduction to reptiles: data capture of Betta barrage, with 11 introductory notes attached
- 关联性——典型相关分析
- Rotating colored clover
- [QNX Hypervisor 2.2用户手册]6.2.2 Guest与Host之间通信
- 固定资产管理系统多少钱,固定资产管理系统价格
- Sword finger offer II 037 Asteroid collision
- GET 和 POST请求的本质区别是什么?
- MySQL高级篇1
- 请指教在线开户是什么意思?另外想问,现在在线开户安全么?
- Fine grained identification, classification, retrieval data set collation
猜你喜欢

Five key elements of the data center

SOFARegistry 源码|数据同步模块解析

Andorid source build/envsetup. SH details to know

自动融合,驰骋海外丨跨境电商YescomUSA携手云扩实现一站式自动化服务

项目一:部署 LAMP ecshop电商平台

01 backpack problem

Events in JS

Sword finger offer II 037 Asteroid collision

Activity invitation | the Apache Doris community essay and speech solicitation activity has begun!

HDCP Paring
随机推荐
Fine grained identification, classification, retrieval data set collation
Floating point communication
MySQL foundation 3
项目一:部署 LAMP ecshop电商平台
[advanced C language] string and memory function (II)
将日志文件存储至 RAM 以降低物理存储损耗
云呐|固定资产系统管理,nc系统管理固定资产在哪里
【编程题】迷宫问题
云呐|固定资产信息系统管理,信息化固定资产管理
[advanced C language] file operation (II)
中小企业签署ERP合同时,需要注意这几点
SOFARegistry 源码|数据同步模块解析
面试官:为什么数据库连接很消耗资源?我竟然答不上来。。一下懵了!
[advanced C language] address book implementation
[QNX Hypervisor 2.2用户手册]6.2.2 Guest与Host之间通信
8 software engineering environment
公司固定资产该哪个部门管理,一般公司固定资产怎么管理
Rotating colored clover
网络方向哪个发展更好?数据通信工程师学习路线分享
利用 CertBot 申请 Let’s Encrypt SSL 证书