4.7 Article

A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling

期刊

REMOTE SENSING
卷 15, 期 20, 页码 -

出版社

MDPI
DOI: 10.3390/rs15205015

关键词

inverse synthetic aperture radar (ISAR); deception jamming; sub-Nyquist sampling; template

向作者/读者索取更多资源

This paper proposes a jamming method based on sub-Nyquist sampling to generate multiple false targets with different shapes on ISAR images, aiming to achieve better deception effects.
In recent decades, the deception jamming approach based on digital radio frequency memory (DRFM) for inverse synthetic aperture radar (ISAR) has been a well-researched topic. Various types of jamming signals based on interrupted-sampling repeater jamming (ISRJ) can induce one-dimensional multiple high-resolution range profile (HRRP) false targets or two-dimensional realistic multiple ISAR false targets for deception. However, these existing methods generate false targets that are identical to the real target. The ISRJ false target also generates a main false target whose energy is much higher than other sub-false targets. Thus, it is easy to discover that the radar has suffered jamming. In order to generate better, more confusing jamming signals, this paper proposes a jamming method based on sub-Nyquist sampling jamming to induce realistic, multiple false targets on ISAR images. It improves a template multiplication modulated time-delay method to eliminate and add scatterers on the selected false target to change its ISAR shape. The frequency-shift parameters of the template jamming signal are analyzed and derived in detail for eliminating and adding scatterers at the specified location. Thus, multiple false targets with different ISAR shapes and similar energy are generated, which can create better deception effects. Meanwhile, this method can adjust the number of false targets and the location of changed-shape false targets. Furthermore, the resolution of the false target can adaptively change with the radar pulse width and the accumulated pulse number. The simulation results show that the proposed deception jamming strategy works.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据