THE METHODS OF PROTECTION FROM THE PULSE DRFM JAMMING
DOI:
https://doi.org/10.15588/1607-3274-2024-3-1Keywords:
method, DRFM jamming, LFM pulse, radar, mathematical simulation, repeater pulse jammingAbstract
Context. The repeater reusable pulse jamming like DRFM (Digital Radio Frequency Memory) significantly complex the radar situation for radar with LFM probing signals. Besides of the marks from the existing targets the other marks are arising on the radar PPI-screen that simulate analogous to them false targets. The known methods of struggle with the repeater reusable pulse jamming like DRFM are inefficient that caused by specificity of the jamming. The synthesis of the methods of the struggle with such jamming is the actual problem
Objective. The estimation of possibilities of the known methods of noise immunity for reduction of the negative influence of pulse jamming like DFRM on the processing of the useful signals and suggestion of the alternative method of LFM signal processing on the DFRM jamming background.
Method. The efficiency of the methods is defined experimentally on the results of simulation and comparison of them with the known results presented in the literature
The results. The inefficiency of the known methods of protection from repeater pulse jamming for reduction of the negative influence of DRFM jamming on the processing of the signal reflected from the target is justified. The character of negative influence of DRFM jamming on the processing of the signal reflected from the target is defined. These jammings can create as masking effect as imitate the marks from the non-existing targets. It is shown, that device with two-side amplitude limitation on the input of compression filter which traditionally used for suppression of repeater pulse jamming is inefficient for suppression of DRFMjamming.
It is shown, that as compression filter for LFM signals with small base the filter matched with big base LFM signal can be used. However, these matched filters are not designed for LFM signal with small bases.
The conditions of matched filtration of small base pulse LFM signals in the filters matched with big base signal are defined. The sufficient condition of the matched filtration of small base signal is coinciding of their phase frequency characteristic with corresponding area of the phase frequency characteristic of the big base signal. This fact explains the effect of forming of the maximums on the output of compression filter for pulsed of DRFM jamming and the effect of forming of false marks from targets
It is shown that limitation of the level of signals before their processing in the compression filter remove the energetic advantage of lamming above useful signal, however, do not influences in the form of phase frequency characteristic of jamming. This detail of the amplitude limiter is the reason of ineffective processing of the useful signal on the background of DRFM jamming in the devices like amplitude limiter-compression filter.
The method of suppression of repeater pulse jamming is proposed. The natural assumption about correspondence of powerful samples of the input mixture to jamming samples is on the base of this method In the case of digital processing this can be realised by nullifying the samples which are above the defined level of limiter. It is shown that processing devices, which uses such limitation, provides the effective processing of the useful signal on the background of DRFM jamming.
Conclusions. The scientific novelty of the obtained results is in the further development of practice of noise immunity of the radar with LFM probing signal, specifically the device that detects the reflected signal on the background of the repeater pulse jamming is proposed. The practice of matched filtration of complex signals obtains the further development, namely, the conditions of matched filtration of LFM signals with small base in the filters matched with the signals with big bases are determined. The sufficient condition is the coincidence of phase frequency spectrum of the small base signal with corresponding area of phase frequency spectrum of the big base signal.
The practical importance of investigation is that the processing device is proposed. This device provides the value of correct detection of the signal reflected from the target approximately twice as much to the known processing devices in the most cases.
References
Gang Lu et al. Cancellation of complicated DRFM range false targets via temporal pulse diversity, Progress In Electromagnetics Research C, 2010, Vol. 16, pp. 69–84. https://doi.org/10.2528/pierc10061401
Chen X. Y., Liu Y., Wang C. DRFM-Based Jamming Signal Recognition Method Guided by Target Detection, Procedia Computer Science, 2023, Vol. 221, pp. 1013–1020. https://doi.org/10.1016/j.procs.2023.08.082
Zhou Hongping et al. Compound Radar Jamming Recognition Based on Signal Source Separation, Signal Processing, 2023, P. 109246. https://doi.org/10.1016/j.sigpro.2023.109246
Smolyakov A., Podstrigaev A. Design of DRFM-based Several Radar Targets Simulator Using FPGA, In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, Saint Petersburg, Russia, 26–29 january 2021 : proceedings. Saint Petersburg, 2021, pp. 1694–1699. doi: 10.1109/ElConRus51938.2021.9396154.
Sparrow M. J., Cikalo J. ECM techniques to counter pulse compression radar : patent 7.081.846 B1 United States Wilmington DE (US): G01S7/38 /, No. 10/877.192 ; applied on 25.06.2004 ; published on 25.07.2006, 14 p.
Cook C. Radar Signals: An Introduction to Theory and Application, [S. l.] : Elsevier Science & Technology Books, 2012.
Riabukha V., Semeniaka A., Katiushyn Ye., Atamanskiy D. Pulse DRFM jamming formation and its mathematical simulation, 2022 IEEE 2nd Ukrainian Microwave Week, Ukrainian, 14–18 november 2022: proceedings. Ukrainian, 2022. doi: 10.1109/UkrMW58013.2022.10037145.
Gao Meng et al. ed. by K. Mao Simulation research on classification and identification of typical active jamming against LFM radar, Eleventh International Conference on Signal Processing Systems. Chengdu, China, 15–17 November 2019, [S. l.], 2019. https://doi.org/10.1117/12.2559607
Qu Qizhe et al. JRNet: Jamming Recognition Networks for Radar Compound Suppression Jamming Signal], IEEE Transactions on Vehicular Technology, 2020, P. 1. https://doi.org/10.1109/tvt.2020.3032197
Zhang Haoyu et al. Fast Complex-Valued CNN for Radar Jamming Signal Recognition [Electronic resource], Remote Sensing, 2021, Vol. 13, No. 15, P. 2867. https://doi.org/10.3390/rs13152867
Chen Siwei et al. SAR Image Active Jamming Type Recognition Based on Deep CNN Model[J], Journal of Radars, 2022, Vol. 11, No. 5, pp. 897–908. doi: 10.12000/JR22143.
Zhou Hongping et al. Jamming recognition algorithm based on variational mode decomposition, IEEE Sensors Journal, 2023, Vol. 23, No. 15, pp. 17341–17349. doi: 10.1109/JSEN.2023.3283397.
Ma B. J. et al. One-dimensional Radar Active Jamming Signal Recognition Method Based on Bayesian Deep Learning, Signal Process, 2023, Vol. 39, pp. 235–243. https://doi.org/10.16798/j.issn.1003-0530.2023.02.005.
Tang Yan et al. Open world recognition of communication jamming signals [Electronic resource], China Communications, 2023, Vol. 20, No. 6, pp. 199–214. https://doi.org/10.23919/jcc.2023.00.029
Meng Y., Yu L., Wei Y. Multi-Label Radar Compound Jamming Signal Recognition Using Complex-Valued CNN with Jamming Class Representation Fusion, Remote Sensing, 2023, Vol. 15, No. 21, P. 5180. https://doi.org/10.3390/rs15215180
Lu Y. et al. Method for detecting DRFM deception jamming based on LFM rate matching, Journal of Xidian University, 2014, Vol. 41, pp. 67–73. doi: 10.3969/j.issn.1001-2400.2014.05.012.
Qu Z. et al. Radar signal recognition based on singular value entropy and fractal dimension, Systems Engineering and Electronics, 2018, Vol. 40, No. 2, pp. 303–307. doi:10.3969/j.issn.1001-506X.2018.02.10.
Lifang L. et al. Time-frequency domain feature extraction algorithm based on linear discriminant analysis, Systems Engineering and Electronics, 2019, Vol. 41, No. 10, pp. 2184 – 2190. doi:10.3969/j.issn.1001-506X.2019.10.05.
Ni Xue et al. LPI Radar Waveform Recognition Based on Multi-Resolution Deep Feature Fusion, IEEE Access, 2021, Vol. 9, pp. 26138–26146. https://doi.org/10.1109/access.2021.3058305
Lv Qinzhe et al. Radar Deception Jamming Recognition Based on Weighted Ensemble CNN With Transfer Learning IEEE Transactions on Geoscience and Remote Sensing, 2022, Vol. 60, P. 1–11. https://doi.org/10.1109/tgrs.2021.3129645
Zhou H., Wang L., Guo Z. Recognition of Radar Compound Jamming Based on Convolutional Neural Network, IEEE Transactions on Aerospace and Electronic Systems, 2023, Vol. 59, No. 6, pp. 7380–7394. https://doi.org/10.1109/taes.2023.3288080
Skolnik M. I. Radar Handbook . [S. l.], McGraw-Hill Education, 2021, 1408 p.
Van Brandt L. B. Handbook of methods of electronic suppression and jamming systems with radar control. USA., EW Engineering, Inc, 1978, 504 p.
Chasovsky V. A., Chernoborodov M. P. Digital System of Asynchronous Pulse Noise Cancellation, Telecommunications and Radio Engineering, 2003, Vol. 59, № 1–2, pp. 151–159. https://doi.org/10.1615/telecomradeng.v59.i12.160 .
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 D. V. Atamanskyi, V. P. Riabukha, V. I. Vasylyshyn, A. V. Semeniaka, E. A. Katyushyn, R. L. Stovba
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.