 Research
 Open access
 Published:
Efficient filter design against interrupted sampling repeater jamming for wideband radar
EURASIP Journal on Advances in Signal Processing volume 2017, Article number: 9 (2017)
Abstract
Interrupted sampling repeater jamming (ISRJ) is an effective coherent jamming, which can induce false highresolution range profile (HRRP) and image to greatly complicate the target detection and recognition of wideband radar. To counter ISRJ, an efficient filter is designed based on the timefrequency (TF) characteristic differences between target echo and ISRJ. Meanwhile, a feasible jamming suppression scheme is proposed, which not only could eliminate ISRJ but also could reserve the target echo. The main emphasis is that the received echo suppressed by our scheme is similar with the true target’s HRRP on the basis of high correlation coefficient (CC) and large signaljammingtonoise ratio (SJNR) improvement factor. Simulation results are covered to illustrate the feasibility and validness of jamming suppression.
1 Introduction
Considerable attention has been paid to the electromagnetic jamming and antijamming for radar system in the electronic countermeasure (ECM) community over the past two decades [1–5]. To prevent or complicate the radar target detection and recognition, much work has been done on the jamming techniques, especially some new jamming tricks that appear to counter the wideband radar system, such as the interrupted sampling repeater jamming (ISRJ) [1–9], falsetarget digital image synthesizer (DIS) [10–12], and scatter wave jamming (SWJ) [13–15]. As a coherent repeater jamming, ISRJ firstly proposed by Wang et al. [1] can induce a train of false targets after the pulse compression (PC) without completely sampling and storing the whole radar pulse. The method can be used by a digital radio frequency memory (DRFM)based repeater jammer and has received growing attention from ECM community for its excellent jamming performances and advantages. Wang et al. [1] analyzed the relationship between ISRJ’s parameters and jamming effects. Besides, the timedomain, frequencydomain, and amplitude characteristics of ISRJbased false targets were described in [2]. The induced false targets make it more difficult to detect and recognize the true target. Moreover, the jamming signal could cancel the echo of true target. Feng et al. [4] explored the three conditions that should be met for the cancelation of target echo, including the repeater power, delayed time, and repeater frequency. Moreover, since the false targets induced by ISRJ always contain the phase variation information for crossrange resolution, the jamming trick also has been employed to generate twodimensional false image and has showed its potential against radar imaging [5–9]. Wang and Cai [5] proposed the intermittent sampling jamming to counter the bi and multistatic synthetic aperture radars (SARs). To counter the inverse SAR (ISAR), a subNyquist sampling jamming was proposed with the compressive sensing (CS)based reconstruction algorithm [6]. Meanwhile, Pan et al. [7] investigated a CSbased matched filtering algorithm and applied it to the highresolution range profile (HRRP) reconstruction of subNyquist sampling jamming. In view of the induced false HRRP and image, ISRJ provides a complex countermeasure against the wideband radar to detect and recognize target.
Fortunately, several antijamming techniques have been well studied to counter the repeater jamming [15–18]. The very effective electronic countercountermeasure (ECCM) for radar system is pulse diversity [16, 17], which is often adopted to combat the DRFMbased repeater jammer. However, to the best of our knowledge, most strategies are designed for the whole pulse sampling jamming including the pulse diversity, while the schemes for ISRJ might be fewer. Gong et al. [18] proposed an ECCM scheme to suppress the ISRJ for dechirping ISAR and investigated the suppression effects for single point target. However, the strategy was only based on the ISRJ model of single point target, and the interrupted pulse samples were repeated once. The jamming suppression effects on different orders, delayed time, jammingtosignal ratio (JSR), and signaltonoise ratio (SNR) were not considered. Besides, suppression results were depicted but not evaluated. Moreover, the jamming suppression effect of approach I relies on the time width selection of frequency smoothing window. Some jamming residue affects the suppression performances.
It is noticed that the target for wideband radar, which is also called as extended target, is represented as a series of scatterers instead of a single point. Compared with the ISRJ of single point target, the ISRJ of extended target is more complicated followed with the target scattering. It is also essential to generate the false HRRP or image against the wideband radar. In this work, we focus on the ISRJ against wideband dechirping linear frequency modulation (LFM) radar, put forward an efficient filter for the extended target on the principles of timefrequency (TF) characteristic differences via shorttime Fourier transform (STFT). Compared with the previous contributions [18], our work is proved to have the following improvements. (1) The proposed filter expands the jamming suppression approach for the extended target and is more suitable for the ISRJ against wideband radar. (2) The TF characteristic differences between target echo and ISRJ are summarized and analyzed in detail. (3) We expand the analysis of jamming suppression effects on ISRJ with different orders, delayed time, duty ratio, JSR, and SNR. (4) Correlation coefficient (CC) and signaljammingtonoise ratio (SJNR) improvement factor are adopted to evaluate the jamming suppression performances. (5) The overall jamming suppression scheme is depicted further. The designed filter not only could suppress the jamming and noise but also would reserve the target echo. Besides, the suppressed returns have high HRRP similarity with the target echo. It is beneficial for the target detection and recognition of wideband radar.
The remainder of our paper is structured as follows. In Section 2, the principles of ISRJ are first introduced. Then, we describe the signal model of extended target with ISRJ in Section 3. Section 4 addresses the designed filter. Meanwhile, two assessment factors of jamming suppression are depicted and the overall suppression scheme is proposed further. In Section 5, numerous simulations have been carried out and simulation results are presented, whereas conclusion is given in Section 6.
2 Principles of ISRJ
ISRJ is apt to be carried out, and the jamming style is feasible. The trick of ISRJ has been employed to confuse the wideband radar and protect the important military target, such as the fighter, seeker, and other air vehicles.
As shown in Fig. 1, it is assumed that the radar and escorted jammer are relatively stationary, the radar is located at O, the target is located at G decided by the vector R _{ t } , and the escorted jammer is located at J decided by the vector R _{ j }. The vector from the protected target to the jammer is R _{ tj }, and the included angle is denoted as α. Herein, the pointscatter model is usually employed to model a manmade target. Suppose that the target consists of N _{ t } scatterers, and each scatterer is with the position (x _{ i }, y _{ i }), complex scattering coefficient β _{ i }, and vector r _{ i }, which is relative to the reference point of target. The dashed arrow lines represent the paths of electromagnetic propagation. When the target is irradiated with the wideband radar wave, the target echo after scattering is firstly intercepted, interrupted, and stored by a preposition jammer. Then, the interrupted samples are repeated once or several times and transmitted to the radar. Besides, the amplitude modulation is sometimes necessary. Finally, the ISRJ and true target’s echo is all received by the radar receiver along the radar lineofsight (RLOS).
Let N _{ r } denote the repeater times, which is also called orders [2, 4]. Generally, there are three types of repeater. They are direct repeater jamming, repetitive repeater jamming, and circular repeater jamming. As depicted in Fig. 2, the interrupted sampling function of DRFMbased repeater jammer can be depicted as a rectangle envelope pulse train p(t) with the duration τ and interval T _{ s } [1]
where rect_{0}(t/τ) is a rectangle envelope pulse, which is 1 for 0 ≤ t ≤ τ and 0 otherwise; * stands for the convolution operation; and δ(⋅) refers to the delta function. The duty ratio is defined as D _{ r } = τ/T _{ s }. The direct repeater jamming immediately modulates and repeats the interrupted samples only once, whereas for the repetitive repeater jamming, the repeaters take place in the current interval T _{ s } ^{i} several times. With regard to the circular repeater jamming, the interrupted samples in the current T _{ s } ^{i} and the ones in the last T _{ s } ^{j} (j = 1,2,⋯,i) are all restored, modulated, and repeated with a fixed circular order in the interval T _{ s } ^{i} − τ. Compared with the first two types of ISRJ, the circular one has some extra requirements, such as more restored space and more random repeater order. It makes the DRFMbased repeater jammer more complicated. The direct repeater jamming and repetitive one are more common, and their suppression performances have been investigated in this paper.
3 Signal model
Without loss of generality, a dechirping LFM radar is considered and the transmitted signal \( \mathbf{s}\left(\widehat{t},{t}_m\right) \) is defined by
where \( \mathrm{rect}\left(\widehat{t}/{T}_p\right) \) represents a rectangle envelope pulse, which is 1 for \( \left\widehat{t}\right\le {T}_p/2 \) and 0 otherwise; T _{ p } is the pulse width; f _{0} refers to the radar carrier frequency; and K is the chirp rate. Let T _{PRI} denote the pulse repeat interval (PRI). t _{ m } = mT _{PRI} and \( \widehat{t}=t{t}_m \) stand for the slow time and fast time, respectively [19]. When the bandwidth of radar signal B is large, the target echo is always considered as the coherent summation of complex time returns from target scatterers and is expressed as
where R _{ t } ^{i} = R _{ t } + r _{ i } is the radical distance between target’s ith scatterer and radar antenna. Then, the interrupted samples \( {\mathbf{I}}_s\left(\widehat{t},{t}_m\right) \) of the radar transmitted signal can be regarded as [1]
Without consideration of the jammer system’s inherent delay (about tens of nanosecond), the ISRJ signal for repeater can be written as
where η _{JSR} is the JSRbased coefficient, \( {\tau}_{\varDelta J}^i=\left({R}_j+{R}_{tj}^i+{R}_t^i\right)/c \) is the jamming propagation delay for the ith scatterer, R _{ tj } ^{i} = R _{ tj } + r _{ i } denotes the radical distance between jammer’s receiver and target’s ith scatterer, N _{ j } = ⌊T _{ p }/T _{ s }⌋ refers to the generated integer of a radar pulse by intermittent sampling, ⌊ ⋅ ⌋ means the rounding operation toward negative infinity, and the time delay τ _{ d } ^{n} of the nth (n = 0,1,⋯,N _{ j } − 1) interrupted sampling is considered as same, i.e., τ _{ d } ^{i} = τ _{ d } ^{j} = τ _{ dk } (i ≠ j). Followed with N _{ r } times of repeaters, the ISRJ arrives at
It is seen that ISRJ also repeats the phase and azimuth direction information of the target echo, which makes the induced false targets would have the similar structure and attitude with the true target.
Furthermore, let N _{0} denote the additive noise in the range cells, then the total received echo is given as
For the dechirping radar, the stretch trick is always employed to process the LFM waveform with large bandwidth and obtain the PC result. It loosens the requirement for sampling frequency and can obtain highrange resolution by mixing the echo with the radar reference signal. Herein, the reference signal \( {\mathbf{s}}_r\left(\widehat{t},{t}_m\right) \) can be expressed as Eq. (8):
where t _{ref} = 2R _{ r }/c, R _{ r } are the reference time and range, respectively. Then, the mixed target echo and ISRJ signal for the repeater arrive at the formulas as
where \( {R}_{\varDelta t}^i={R}_t^i{R}_r \), \( {R}_{\varDelta j}^i(n)={R}_j^i(n){R}_r \), and R _{ j } ^{i}(n) = (R _{ j } + R _{ tj } ^{i} + R _{ t } ^{i})/2 + c(nT _{ s } + τ _{ d } ^{n})/2. Further, the mixed ISRJ with N _{ r } times of repeaters is given as
The stretch processing result of total echo in Eq. (7) is expressed as
Followed with the Fourier transform (FT), we can get the HRRP of received echo from Eq. (13), where FT(⋅) denotes the FT and Ñ _{0} and \( {\widehat{\mathbf{N}}}_0 \) refer to the stretch and FT results of additive noise N _{0}.
It can be seen that the HRRP of each order false target contains the phase variation information for crossrange resolution and would further induce the false twodimensional image. It was also analyzed in [5–9].
4 Jamming suppression
4.1 TF characteristics analysis
From Eqs. (9) and (11), it is seen that there is great similarity between the mixed true target echo and mixed ISRJ in the time domain; meanwhile, it has been analyzed that the frequency spectrum of ISRJ is a superposition of shifted replicas of the echo’s frequency spectrum [1]. The traditional FTbased spectrum analysis algorithms are failed to discriminate and suppress ISRJ. However, instantaneous frequency (IF) is more suitable for characterizing the timevarying features of the signal. It provides an alternative approach to depict the characteristics of the above signal. The IF of mixed true target echo \( {\tilde{\mathbf{s}}}_T\left(\widehat{t},{t}_m\right) \) is given as
And the IF of mixed ISRJ \( {\tilde{\mathbf{s}}}_J\left(\widehat{t},{t}_m\right) \) is written as
It can be analyzed that some characteristic differences as follows make it feasible to design a filter to suppress ISRJ, especially on the time points when the jammer receives and samples the radar signal.

(1)
For the kth repeater and the ith scatterer, the IF of ISRJ in the pulse duration is not continuous due to 2[R _{ j } ^{i}(n + 1) − R _{ j } ^{i}(n)]/c = T _{ s } > τ, while the one of true target echo is continuous [18].

(2)
For the kth repeater and the ith scatterer, the relative delayed time 2R _{ j } ^{i}(n)/c + kτ = (R _{ j } + R _{ tj } ^{i} + R _{ t } ^{i})/c + (nT _{ s } + τ _{ d } ^{n}) + kτ of ISRJ in Eq. (15) is different from the delayed time 2R _{ t } ^{i}/c of true target echo in Eq. (14). It contributes to make the TF energy distribution of each order ISRJ shift from the one of true target echo.

(3)
From Fig. 2, we can draw out that the time for interrupted sampling and repeated transmitting is divisional in the pulse duration, i.e., the receivetransmit antenna of jammer works asynchronously.
4.2 Filter design
On the premise of ensuring the target echo to be reserved and jamming to be suppressed, the ideal weights of filter for the range bins of target should be 1, while the ones for the other range bins should be 0. In the subsection, an effective filter is designed to suppress ISRJ based on the analyzed TF characteristic differences.
From Eqs. (14) and (15), it is obvious that the calculated IF of mixed target echo and jamming returns are all stationary and linear. It means that the conventional liner timefrequency analysis (TFA) methods are qualified to analyze their TF characteristics, such as STFT [20] and wavelet transform (WT) [21]. In this paper, STFT is employed to extract the TF characteristics, which is established on the assumption that the considered signal is piecewisely stationary in a short time. By performing STFT on the mixed target echo and mixed jamming returns, the energy distribution of TF representation can be described as
where STFT(⋅) represents the STFT and \( \omega \left(\widehat{t}\right) \) means the frequency smoothing window. Moreover, the TF energy distribution of total received echo arrives at
where N _{1} = STFT(Ñ _{0})^{2} represents noise energy followed with STFT.
In the time domain, we employ the same trick in [18] to find the time points with great TF characteristic differences when the jammer samples the radar signal and first sum \( \mathbf{T}{\mathbf{F}}_{\mathrm{TJ}}\left(\widehat{t},f\right) \) along the frequency direction and define the result as
It is assumed that the energy concentrated domain of Eq. (19) is [t _{1}, t _{2}] in the pulse duration, the time points of which satisfy that Φ(t _{1}) > ζ, Φ(t _{2}) > ζ and \( \boldsymbol{\Phi} \left(\widehat{t}\right)<\zeta, \widehat{t}\notin \left[{t}_1,{t}_2\right] \), and ζ is the energy threshold. Then, we divide the domain [t _{1}, t _{2}] into L segments and select the time point \( {\widehat{t}}_l^{\min } \) with the minimum value of \( \boldsymbol{\Phi} \left(\widehat{t}\right) \) in each segment [t _{ l1}, t _{ l2}] as follows:
where T _{ w } = (t _{2} − t _{1})/L is the width of each segment. The selected time points \( {\left\{{\widehat{t}}_l^{\min}\right\}}_{l=1}^L \) with great TF characteristic differences are considered for the interrupted sampling of jammer, i.e., the ISRJ might be absent at these points in the mixed returns. In addition, the received echo after stretch processing near these time points could be regarded as the mixed target echo. It is extracted and represented as
Subsequently, we have the normalized filter H(f) and express it as
where κ is the maximum of \( {\left\mathrm{F}\mathrm{T}\left({\mathbf{s}}_e\left(\widehat{t}\right)\right)\right}^2 \). It can be seen that the designed weights of H(f) for the target range bins are larger and even be 1, while the ones for the other range bins are much smaller and even be 0. Finally, the jamming and noise are suppressed after multiplying the HRRP of the received returns by the designed filter function. It can be formulated as
4.3 Suppression performance assessment
Herein, the CC and SJNR improvement factor are adopted to evaluate the jamming suppression performances of our proposed algorithm.
In general, the CC between the ideal HRRP of target \( {\tilde{\mathbf{P}}}_T\left(f,{t}_m\right) \) and the filtered result P(f, t _{ m }) can be taken to evaluate the jamming suppression performances for wideband radar. It is always hoped that the expected CC would satisfy
where
ρ _{0}∊ [0, 1] refers to the lower bound of CC (LBCC).
The other performance assessment is indicated by the SJNR improvement factor. For the wideband radar, the power of target and jamming extends some range bins. We have the improvement factor of SJNR represented as
where \( \left({\mathrm{Amp}}_p^{S_{\max }},{\mathrm{Amp}}_p^{J_{\max }}\right) \) and \( \left({\mathrm{Amp}}_{{\tilde{p}}_{\mathrm{echo}}}^{S_{\max }},{\mathrm{Amp}}_{{\tilde{p}}_{\mathrm{echo}}}^{J_{\max }}\right) \) denote the maximum amplitudes of target and jamming in P(f, t _{ m }) and \( {\tilde{\mathbf{P}}}_{\mathrm{echo}}\left(f,{t}_m\right) \), respectively. \( {\mathrm{Amp}}_p^{N_{\mathrm{ave}}} \) and \( {\mathrm{Amp}}_{{\tilde{p}}_{\mathrm{echo}}}^{N_{\mathrm{ave}}} \) refer to the average noise amplitudes before and after the jamming suppression.
4.4 Jamming suppression working flow
The working flowchart of wideband radar for ISRJ suppression is given in Fig. 3. When the protected target echo and ISRJ are received simultaneously, the wideband radar system will primarily judge whether ISRJ exists. It could be identified based on the representation characteristics of HRRP and SAR/ISAR image. If the ISRJ is detected and confirmed, the radar system has to extract the time points with great differences of TF energy distribution. Then, the proposed filter is constructed and the PC result of received returns will be fed to the filter. Finally, the jamming suppression performances will be evaluated. If the suppression result has high CC and large SJNR improvement factor, the target could be detected and recognized. If some ISRJ residue still retains with low CC and small SJNR improvement factor, the jamming mode will be identified with other characteristics and another corresponding antijamming measures will be adopted further, such as the trick of complicated radar waveform and some measures of low probability of interception.
5 Simulation results and analysis
In this work, the simulated radar system is a wideband LFM ISAR, whose parameters and target and jammer are all listed in Table 1. These parameters are also cited in [2, 18]. It is pointed out that the hamming window is employed as the frequency smoothing window \( \omega \left(\widehat{t}\right) \) in Eqs. (16), (17), and (18), and the energy threshold ζ in Eq. (20) is set as 0.1 after the normalization of \( \boldsymbol{\Phi} \left(\widehat{t}\right) \). The simulated seeker, as shown in Fig. 4a, is regarded as the extended target, which is consisted of 16 scatterers with each reflection coefficient β _{ i } = 0.4. The location of G in Table 1 and Fig. 1 means the position of the seeker head scatterer, which is also denoted as the reference origin of coordinate in Fig. 4a. At the beginning, Fig. 4b illustrates the ideal target’s HRRP without jamming and noise. Then, some simulations of jamming suppression have been carried out, and suppression results are analyzed in detail.
5.1 ISRJ effects
In the subsection, ISRJ is first investigated against the seeker detection and recognition. When SNR = 25 dB and JSR = 20 dB, Fig. 5 shows the jamming effects for radar system with the delayed time τ _{ d } ^{n} = 5.45 μs and different order (N _{ r } = 1, 3). Besides, the ones with delayed time τ _{ d } ^{n} = 5.11 μs are depicted in Fig. 6.
The generated HRRP of false targets also demonstrate that the number of false targets is related to the order [1–4]. In addition, it is seen that ISRJ can induce false targets or barrage jamming, especially the preposition false target, which would greatly complicate the target detection and recognition of radar system.
5.2 Jamming suppression performances
Herein, the jamming suppression performances of the proposed filter are presented. In view of the unknown sampling duration time of DRFMbased jammer, we just select single time point \( {\widehat{t}}_l^{\min } \) in each segment [t _{ l1}, t _{ l2}] in Eq. (21). Four different cases are discussed in detail.
5.2.1 Performances versus order
As a representation, Fig. 7a shows the energy distribution \( \mathbf{T}{\mathbf{F}}_T\left(\widehat{t},f\right) \) of the protected target echo via STFT, while the energy distribution \( \mathbf{T}{\mathbf{F}}_{\mathrm{TJ}}\left(\widehat{t},f\right) \) for Fig. 5 is depicted in Fig. 7b, c. When the interrupted samples are repeated once (N _{ r } = 1), the selected time points in Eq. (20) are symbolized by the notation “Δ” in Fig. 8a, where the segment number is M = 5. The filter function is shown in Fig. 8b, and the jamming suppression result of our proposed filter is further illustrated in Fig. 8c. Similarly, when the interrupted samples are repeated thrice (N _{ r } = 3), the simulation results are presented in Fig. 9. We can find that not only the jamming and noise are suppressed but also the target echo is reserved effectively.
5.2.2 Performances versus delayed time
As shown in Figs. 5 and 6, it is concluded that different delayed times would induce different effects of false target, which might be preposition, postposition, or barrage jamming. Different from case 1, the jamming suppression performances for Fig. 6a with the delayed time τ _{ d } ^{n} = 5.11 μs are investigated. As a comparison, the jamming suppression result of approach I in [18] is shown in Fig. 10a, while that of our proposed filter is shown in Fig. 10b. Since the time width of \( \omega \left(\widehat{t}\right) \) is smaller than the sampling duration τ, the spectrum of the target signal spreads by the windowing. Then, the ISRJ near the target, especially the barrage jamming, is hardly to be suppressed by the approach I and some jamming residues are still reserved in Fig. 10a. From Fig. 10b, it implies that our proposed jamming suppression scheme also can obtain desired suppression performances on the barrage jamming in Fig. 6a, although a little of the jamming residue exists around the target range bins.
5.2.3 Performances versus SNR and JSR
In this case, the effects of different SNR and JSR on jamming suppression are shown. The number of Monte Carlo trials is 200 for each of the different SNR or JSR. For the case of Fig. 8, the curves of CC are shown in Fig. 11a, and the curves of SJNR improvement factor are presented in Fig. 11b. Analogously, Fig. 12 depicts the jamming suppression performances with different SNRs and JSRs for the case of Fig. 9. From Figs. 11 and 12, we can summarize the observations as follows:

1.
The curves of CC climb observably when SNR < 25 dB and increase slightly when SNR > 25 dB. In Fig. 11a, the CC for each JSR is larger than 0.8 when SNR > 25 dB. In Fig. 12a, when SNR > 25 dB, the CCs for JSR = 15 and 20 dB arrive at 0.9, while the ones for JSR = 25 and 30 dB are larger than 0.8. Without generality, the LBCC ρ _{0} is set as 0.8. It is indicated that when SNR > 25 dB, the received echo suppressed by our proposed scheme is similar with the HRRP of ideal target echo, which is helpful for the target detection and recognition of wideband radar.

2.
The SJNR improvement factor grows in collaboration with SNR increasing and larger SJNR improvement factor can be obtained in the case of larger JSR. It means that our proposed scheme can distinctly improve the SJNR and is also beneficial to increase the effectual range of radar target detection in the complicated electromagnetic environment.
5.2.4 Performances versus duty ratio
In the above three cases, the duty ratio D _{ r } all is 25%. In the case of Fig. 8, when the duration τ is set as 10 μs and D _{ r } = 50%, the jamming effect and suppression result are shown as Fig. 13a, b, respectively. It is demonstrated that the duty ratio mainly affects the amplitude of false target [1, 2]. Our proposed method is also suitable for the case of large duty ratio.
6 Conclusions
Increasing attention has been paid to the ISRJ, which can greatly complicate the target detection and recognition of wideband radar. The novelty of this paper is that an efficient filter is designed and expanded to counter ISRJ based on the TF characteristic differences between target echo and ISRJ in the domain of TF spectrum, where the energy concentrates. Meanwhile, a feasible jamming suppression scheme is proposed. The jamming suppression effects on ISRJ are also analyzed with different orders, delayed time, SNR, JSR, and duty ratio. Numerous results demonstrate that the designed filter can effectively suppress the jamming and noise. Moreover, the received echo suppressed by our scheme is similar with the target’s HRRP on the basis of high CC and large SJNR improvement factor. It is beneficial for the target detection and recognition of wideband radar.
References
X Wang, J Liu, W Zhang, Q Fu, Z Liu, X Xie, Mathematic principles of interruptedsampling repeater jamming (ISRJ). Science in China, Series F: Information Sciences 50(1), 113–123 (2007)
D Feng, H Tao, Y Yang, Z Liu, Jamming dechirping radar using interrupted sampling repeater. Science in China, Series F: Information Sciences 54(10), 2138–2146 (2011)
S Gong, X Wei, X Li, Y Ling, Mathematic principle of active jamming against wideband LFM radar. J. Syst. Eng. Electron. 26(1), 50–60 (2015)
D Feng, L Xu, W Wang, H Yang, Radar target echo cancellation using interruptedsample repeater. IEICE Electronic Express 11(8), 1–6 (2014)
W Wang, J Cai, A technique for jamming bi and multistatic SAR systems. IEEE Geosci. Remote Sens. Lett. 40(1), 80–82 (2007)
W Wang, X Pan, Y Liu, D Feng, Q Fu, SubNyquist sampling jamming against ISAR with compressive sensing. IEEE Sensors J. 14(9), 3131–3136 (2014)
X Pan, W Wang, G Wang, SubNyquist sampling jamming against ISAR with CSbased HRRP reconstruction. IEEE Sensors J. 16(6), 1597–1602 (2016)
X Pan, W Wang, D Feng, Y Liu, Q Fu, G Wang, On deception jamming for countering bistatic ISAR based on subNyquist sampling. IET Radar, Sonar and Navigation 8(3), 173–179 (2014)
X Pan, W Wang, D Feng, J Huang, Q Fu, G Wang, Rotational micromotion modulated jamming for countering ISAR based on intermittent sampling repeater. Progress In Electromagnetics Research C 36, 41–56 (2013)
PE Pace, DJ Fouts, S Ekestorm, C Karow, Digital false target image synthesizer for countering ISAR. IEE Proc. Radar Sonar and Navigation 149(5), 248–257 (2002)
DJ Fouts, PE Pace, C Karow, SRT Ekestorm, A single chip false target radar image generator for countering wideband imaging radars. IEEE SolidState Circuits 37(6), 751–759 (2002)
L Xu, D Feng, X Pan, Q Liu, X Wang, An improved digital falsetarget image synthesizer method for countering inverse synthetic aperture radar. IEEE Sensors J. 15(10), 5870–5877 (2015)
B Zhao, F Zhou, M Tao, Z Zhang, Z Bao, Improved method for synthetic aperture radar scattered wave deception jamming. IET Radar Sonar and Navigation 8(8), 971–976 (2014)
T Li, W Chen, G Lu, D Wang, A study on scatterwave jamming for countering SAR, (Builin, Germany), in International Conference on Microwave and Millimeter Wave Technology, 2007, pp. 1–4
W Xiong, G Zhang, F Wen, J Yin, Trilinear decompositionbased spatialpolarizational filter method for deception jamming suppression of radar. IET Radar Sonar and Navigation 10(4), 765–773 (2016)
J Zhang, D Zhu, G Zhang, New antivelocity deception jamming technique using pulses with adaptive initial phases. IEEE Trans. Aerosp. Electron. Syst. 49(2), 1290–1300 (2013)
W Xiong, X Wang, G Zhang, Cognitive waveform design for antivelocity deception jamming with adaptive initial phases (Philadelphia, USA), in 2016 IEEE Radar Conference, 2016, pp. 1–5
S Gong, X Wei, X Li, ECCM scheme against interrupted sampling repeater jammer based on timefrequency analysis. J. Syst. Eng. Electron. 25(6), 996–1003 (2014)
MA Richards, Fundamentals of radar signal processing (McGrawHill Professional, New York, 2005), pp. 116–117
X Li, G Bi, Systematic analysis of uncertainty principles of the local polynomial Fourier transform. EURASIP J. Adv. Signal. Process. 2014(1), 181 (2014)
G Yu, Y Zhou, General linear chirplet transform. Mech. Syst. Signal Process. 70–71, 958–973 (2016)
Acknowledgements
The authors thank the associate editor Guolong Cui and the anonymous reviewers for their beneficial comments and suggestions that improve the quality of this paper.
Funding
This work was supported by the National Natural Science Foundation of China under grants 61471191 and 61501233, the Aeronautical Science Foundation of China under grant 20152052026, the Funding of Jiangsu Innovation Program for Graduate Education under grant KYZZ16_0169, and the Fundamental Research Funds for the Central Universities and this is partly funded by China Scholarship Council.
Authors’ contributions
WX and GZ designed the jamming suppression scheme and experiments. WX and WBL performed the experiments and analyzed the experiment results. WX and GZ contributed to the manuscript drafting and critical revision. All authors read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Xiong, W., Zhang, G. & Liu, W. Efficient filter design against interrupted sampling repeater jamming for wideband radar. EURASIP J. Adv. Signal Process. 2017, 9 (2017). https://doi.org/10.1186/s1363401704463
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363401704463