Signal-level fusion networking radar anti-cheating interference method under object signal correlation

A signal-level fusion and deceptive jamming technology, applied in the radar field, can solve the problems of not being able to fully utilize the advantages of radar networking, other information not being used effectively, and affecting the deceptive jamming of networking radars.

Active Publication Date: 2015-10-21
XIDIAN UNIV
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since each node radar in the networked radar will be subject to deceptive interference, dense false targets will lead to a high error rate in the correlation test between the measured values ​​​​of each node radar, and the location of the networked radar station is not ideal , will also affect the ability of the networked radar to resist deceptive jamming
[0004] Existing networked radars use data-level fusion to counteract deceptive jamming. In the process of measuring targets, only the point track information or track information of the target is used, but other information is not effectively used. Therefore, , the data-level fusion anti-jamming method cannot fully exert its anti-jamming ability, and cannot make full use of the advantages of radar networking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signal-level fusion networking radar anti-cheating interference method under object signal correlation
  • Signal-level fusion networking radar anti-cheating interference method under object signal correlation
  • Signal-level fusion networking radar anti-cheating interference method under object signal correlation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] refer to figure 1 , which shows an embodiment of the present invention, a networked radar anti-spoofing jamming method based on target signal correlation and signal level fusion. This embodiment may specifically include the following steps:

[0079] Step 1, each node radar receives echo data respectively, and calculates the noise power of each node radar according to the echo data.

[0080] In this embodiment, it is assumed that the networked radar includes n node radars, where n≥2, and it is assumed that the echo data of the point target after the matched filtering includes P point targets.

[0081] Said step 1 includes the following sub-steps:

[0082] 1a) It is assumed that the networked radar includes n node radars, where n≥2, and each node radar receives echo data;

[0083] It should be noted that the networked radar system in this embodiment includes n node radars, n≥2, and each node radar receives echo data that does not contain signals, that is, each node rada...

Embodiment 2

[0154] refer to figure 2 , which shows an embodiment of the present invention, a networked radar anti-spoofing jamming method based on target signal correlation and signal level fusion. This embodiment may specifically include the following steps:

[0155] Step 201, get the slow-time random complex envelope sequence of each target of the i-th node.

[0156] It should be noted that the step 201 corresponds to the step 2 in the first embodiment, and reference may be made to the relevant description of the step 2 in the first embodiment, which will not be repeated here in this embodiment.

[0157] Step 202, get the slow-time random complex envelope sequence of each target of the jth node.

[0158] It should be noted that the step 202 corresponds to the step 2 in the first embodiment, and reference may be made to the related description of the step 2 in the first embodiment, which will not be repeated here in this embodiment.

[0159] Step 203, estimating the average power;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a signal-level fusion networking radar anti-cheating interference method under object signal correlation, and the method can achieve the effective discrimination of false targets generated by different cheating interferences. The method comprises the steps: 1, enabling each junction radar to receive echo data and calculate a corresponding noise power; 2, building slow-time random complex envelope sequences of each point target at a plurality of junction radars; 3, estimating the mean power of each point target at each junction radar; 4, enabling the slow-time random complex envelope sequences of the same point target at the plurality of junction radars to be combined in a paired manner to form a plurality of envelope groups, and estimating a correlation tolerance; 5, calculating a detection threshold range; 6, searching an optimal detection threshold; 7, judging whether the correlation tolerance is greater than the optimal detection threshold or not: judging that the envelope groups pass through false target examination if the correlation tolerance is not greater than the optimal detection threshold, or else, marking two corresponding point targets as false targets; 8, eliminating the false targets.

Description

technical field [0001] The invention relates to the technical field of radars, in particular to a networked radar anti-deception jamming method based on signal level fusion under target signal correlation. Background technique [0002] Electronic spoofing technology is dedicated to deceiving the victim radar in terms of information such as direction, position, and tracking starting point, or creating so many false targets around the real target echo that the real target information cannot be extracted. One effective class of spoofing techniques is deceptive spoofing techniques. The purpose of deception is to mislead the amplitude, phase and other information of the echo received by the radar through modulated transmission or forwarding. In particular, the emergence of digital radio frequency memory (Digital Radio Frequency Memory, DRFM) has made deceptive jamming technology more mature, and transponder jammers using DRFM are widely used in self-defense jamming and team jamm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01S7/36
CPCG01S7/36
Inventor 刘楠郭玉梅李升远张林让周宇赵珊珊
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products