当前位置:网站首页>Intermittent sampling and forwarding interference
Intermittent sampling and forwarding interference
2022-06-30 00:27:00 【nwsuaf_ huasir】
DRFM Jamming strategy
Intermittent sampling and forwarding interference (Interrupted sampling repeater jammer,ISRJ) It is a radar active deception jamming , The implementation of this interference depends on digital RF storage (digital radio fequency memory,DRFM) technology ,DRFM The principle is very simple , It can receive the RF signal from the radar , After sampling, it is stored and sent .DRFM There are two ways to intercept radar signals , One is full pulse storage , One is intermittent sampling storage . So it's called Siyi , One is to collect all the signals transmitted by the radar and then send them , One is to collect only a small segment and then send it .
Interference one : Full pulse storage
When full pulse storage mode is adopted , Jammer can achieve maximum signal processing gain , however , Since the forwarding delay is greater than the duration of the pulse , Therefore, the jammer can only repeat at the next pulse interval (Pulse repeat interrupt,PRI) Send inside . In view of this feature , The waveform diversity proposed by people is an effective method to combat this kind of interference . for example , Each pulse retransmission interval sends different phase coded LFM signals , Different matched filters are used to focus the target echo and jamming signal , The position of the interference signal is estimated and suppressed . Compared with intermittent storage , The interference in the full pulse storage mode is relatively easy to suppress .
Interference II : Intermittent sampling storage
It is due to the interference under full pulse storage , The delay between sampling and sending is large , Easily suppressed , Intermittent sampling storage mode has been proposed , stay 2006 In, scholars from National University of defense technology proposed intermittent sampling and forwarding jamming (Interrupted sampling repeater jammer,ISRJ),[ reference : Wang Xuesong , Liu Jiancheng , Zhangwenming , Fuqixiang , Liu Zhong , Xiexiaoxia . The mathematical principle of intermittent sampling and forwarding interference [J]. Science in China E Compilation : information science ,2006(08):891-901.]. In this mode, the jammer first intercepts a segment of the radar signal , Then delay and forward the fragment several times . The principle of intermittent sampling and forwarding interference is shown in the figure below . By changing the interception width and the number of forwarding , It can achieve the double effects of deception and suppression . Research in this area is quite popular , There is a lot of literature .
Mathematical model of intermittent sampling and forwarding interference
For the most commonly used LFM signal , The sample fragment can be expressed as :
S I ( t ) = ∑ n = 0 N − 1 rect ( t − τ − n T u T I ) e j π K r ( t − τ ) 2 (1) S_{\mathrm{I}}(t)=\sum_{n=0}^{N-1} \operatorname{rect}\left(\frac{t-\tau-n T_{\mathrm{u}}}{T_{\mathrm{I}}}\right) \mathrm{e}^{\mathrm{j} \pi K_{\mathrm{r}}(t-\tau)^{2}} \tag{1} SI(t)=n=0∑N−1rect(TIt−τ−nTu)ejπKr(t−τ)2(1)
among r e c t ( ⋅ ) \mathrm{rect}(\cdot) rect(⋅) Is a rectangular window function , T I T_{\mathrm{I}} TI Is the slice width , N N N Is the number of slices , τ \tau τ Is the slice delay . Then a complete interference signal can be expressed as :
S J ( t ) = ∑ m = 1 M S I ( t − m T I ) = ∑ m = 1 M ∑ n = 0 N − 1 rect ( t − τ − n T u − m T I T I ) e j π K r ( t − τ − m T I ) 2 (2) \begin{aligned} S_{\mathrm{J}}(t) &=\sum_{m=1}^{M} S_{\mathrm{I}}\left(t-m T_{\mathrm{I}}\right) \\ &=\sum_{m=1}^{M} \sum_{n=0}^{N-1} \operatorname{rect}\left(\frac{t-\tau-n T_{\mathrm{u}}-m T_{\mathrm{I}}}{T_{\mathrm{I}}}\right) \mathrm{e}^{\mathrm{j} \pi K_{\mathrm{r}}\left(t-\tau-m T_{\mathrm{I}}\right)^{2}} \end{aligned} \tag{2} SJ(t)=m=1∑MSI(t−mTI)=m=1∑Mn=0∑N−1rect(TIt−τ−nTu−mTI)ejπKr(t−τ−mTI)2(2)
When does the intermittent sampling and forwarding interference end ?
In the paper [Zhou, C., Q. Liu and X. Chen (2018). “Parameter estimation and suppression for DRFM-based interrupted sampling repeater jammer.” IET RADAR SONAR AND NAVIGATION 12(1): 56-63.] There is a saying :
the intercept-delay-forward process is repeated for several cycles until the falling edge of the transmission signal is detected.
He means , This interception - Delay - The forwarding process will terminate when the falling edge of the radar signal is detected .
边栏推荐
- leetcode 416. Partition Equal Subset Sum 分割等和子集(中等)
- How to realize the spelling correction function in search engine
- Serpentine matrix (array simulates direction, D represents turning)
- Five key elements of the data center
- 蛇形矩阵(数组模拟方向, d代表转弯)
- Solr basic operations 12
- 证券开户有优惠吗究竟网上开户是否安全么?
- 浮点数通信
- TP5查询AND和OR条件嵌套
- Finding a job in 2022 is the "last lesson" for graduates
猜你喜欢
![[advanced C language] string and memory function (II)](/img/1a/14ff6a078419e407845d60485be60e.png)
[advanced C language] string and memory function (II)

云呐|如何利用系统管理固定资产?如何进行固定资产管理?

Sword finger offer II 037 Asteroid collision
![[daily question 1] traversal of binary tree](/img/e2/313251d574f47708abca308c4c8d5d.png)
[daily question 1] traversal of binary tree

After 8 years of polishing, "dream factory of game design" released an epic update!

MySQL advanced 2

云原生爱好者周刊:炫酷的 Grafana 监控面板集合

Sofaregistry source code | data synchronization module analysis

Can't recognize the original appearance

Quick pow: how to quickly find power
随机推荐
MySQL foundation 2
Connection query of SQL Server database
传统微服务框架如何无缝过渡到服务网格 ASM
【编程题】迷宫问题
俞敏洪:我的退与进;架构师必须了解的5种最佳软件架构模式;Redis夺命52连问|码农周刊VIP会员专属邮件周报 Vol.096
VIM plug in manager VIM plug installation method
[rust weekly library] Tokei - a utility for statistics of code lines and other information
JS的初步语法
分布式任务调度 ElasticJob demo
How to seamlessly transition from traditional microservice framework to service grid ASM
IO stream summary
Cloud native enthusiast weekly: cool collection of grafana monitoring panels
How to realize the spelling correction function in search engine
[advanced C language] address book implementation
SOFARegistry 源码|数据同步模块解析
Sword finger offer II 035 Minimum time difference
Root cause of glideexception: failed decodepath{directbytebuffer- > gifdrawable- > drawable}
Mysql:sql overview and database system introduction | dark horse programmer
单位固定资产怎么管理,行政单位的固定资产应该怎么管理
Vulnhub靶机-MoriartyCorp