Next Article in Journal
Design and Analysis of Two Piezoelectric Cymbal Transducers with Metal Ring and Add Mass
Previous Article in Journal
A Two-Dimensional Wireless and Passive Sensor for Stress Monitoring
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Interference Suppression Method for Interrupted Sampling Repeater Jamming Based on Singular Spectrum Entropy Function

1
Beijing Institute of Remote Sensing Equipment, Beijing 100854, China
2
School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(1), 136; https://doi.org/10.3390/s19010136
Submission received: 25 November 2018 / Revised: 18 December 2018 / Accepted: 28 December 2018 / Published: 2 January 2019
(This article belongs to the Section Remote Sensors)

Abstract

:
As a new type of jamming, the interrupted sampling repeater jamming (ISRJ) derived from the digital radio frequency memory (DRFM) technology, can generate coherent multiple false targets after pulse compression. At present, the traditional interference suppression method and its improved methods have insufficient characteristics and poor detection performance under the condition of low signal-to-noise ratio (SNR). Aiming at addressing this defect, this paper proposes an interference suppression method for ISRJ based on singular spectrum entropy function (SSEF) from the aspects of singular value decomposition (SVD) and information entropy theories. In this method, firstly, considering the local fine characteristics and extraction efficiency, an adaptive multi-scale segmentation (AMS) method is proposed. The purpose of this processing is to extend the salient characteristics while to smooth the similar ones. In AMS, the segmentation criterion based on average energy of segments and the constraint of minimum segmentation is also proposed, then the improved delay embedded matrix is established from the improved trajectory matrix by AMS and delay embedded mapping. Secondly, the singular spectrum of the improved delay embedded matrix is extracted by SVD. Thirdly, because the recognition algorithms based on singular spectrum analysis (SSA), classical SSE and other characteristics fail at low SNR, this paper proposes a characteristic named as SSEF retrieved from the Shannon entropy model. The following proposed entropy-based threshold detection is carried out on the echo signal to realize the band-pass filtering and interference suppression. Finally, experiment results show that in comparison with other interference suppression approaches, SSEF can increase the probability of target detection and the peak-to-side-lobe ratio (PSR) after pulse compression, which validates its stability to noise and jamming especially in the condition of low SNRs.

1. Introduction

Electronic countermeasure (ECM) techniques such as active deception jamming aim at forming false targets to confuse the victim radar, for surrounding desired radar echoes with so many false targets that the target information cannot be extracted. ECM techniques are often enhanced by using digital radio frequency memory (DRFM) systems. In a DRFM system, the interrupted radar signal is down converted first and sampled with a high-speed analogue-to-digital converter (ADC). The samples stored in memory are manipulated in amplitude, frequency and phase to generate the deception jamming, and subsequently processed by a digital-to-analogue converter (DAC), up converted and transmitted back to the victim radar.
As a classic jamming derived from DRFM, the interrupted sampling repeater jamming (ISRJ) is highly correlated to the radar signal which makes it prone to generate multiple false targets after pulse compression [1]. Meanwhile, ISRJ has become more and more ubiquitous with the developed sampling, storage and repeater hardware in DRFM and therefore a great number of the improved interference algorithms are proposed based on related researches, which includes interrupted sampling and direct repeater jamming (ISDRJ), interrupted sampling and periodic repeater jamming (ISPRJ), interrupted sampling and cyclic repeater jamming (ISCRJ) [2,3,4,5], and new jamming patterns based on ISRJ such as frequency shift modulation [6], smart noise modulation [7], and interrupted sampling signal modulation [8,9,10]. ISDRJ, ISPRJ and ISCRJ are distinguished from each other by different repeater strategies which can generate different kinds of false targets after pulse compression. The frequency-shifting deceptive jamming to LFM pulse compression radar generates the forward and backward shifting false targets by the frequency shifting on the view of group delay. The intercepted slices are frequency shift modulation before being transmitted, thus the jamming can achieve better effects for LFM signals by increasing the number of false targets and disordering their positions. Smart noise is also a famous jamming pattern based on ISRJ. When a jammer receives a radar transmitting signal, it performs the convolution with the video noise signal which combines false target pulse train with random noise, then retransmits the jamming signal to victim radar. Interrupted sampling signal modulation controls the false targets information by delay, frequency and phase modulation to achieve pull-off jamming. The active deception jamming based on ISRJ is highly coherent to the radar transmitting signal, which makes the detection of the deception jamming difficult.
In comparison with jamming technology, the anti-jamming technique turns out to be a more arduous task due to the shortage of prior signal information and published researches, as well as military sensitivity and no related theoretical frameworks and mathematical models [11]. Despite this, in depth studies are still carried out on interference suppression methods. According to [12], based on the generalized periodicity of the pseudo-random sequence modulated radar signal, its characteristics can be extracted by the eigenvector analysis which was further used for the independent component analysis (ICA). This method successfully separated the radar echo signal from the jamming signal and the recognition probability of which can be improved by multiple ICA operations, but it only applies to the condition of non-coherent interference signal and large number of ICA operations need to be performed if the jamming-to-signal ratio (JSR) is high. The Sliding-Truncation Matched Filter (STMF) method proposed in [13] first extracted the two-dimensional amplitude distribution after pulse compression by searching for the reference window width and delay of the matched filter. Based on that, the jamming slice width and the repeater period were estimated for further interference suppression. The advantage of this method is that it can accurately identify and suppress different ISRJ strategies in condition of high JSR. However, for low JSR, the jamming recognition capability of this method declines rapidly and the time efficiency becomes lower because the estimation is carried out after the two-dimensional searching. Utilizing the discontinuity of the ISRJ in the frequency domain, the improved band-pass filtering interference suppression methods based on the energy function through the short time Fourier transform (STFT) were proposed in [14,15]. These methods reduce the effects from the noise signal and improve interference suppression performance in condition of low SNR. However, considering that the minimum value of the energy function needs to be segmentally searched in time domain or time-frequency domain, therefore, their calculation volume is rather large. In [16], an interference suppression method based on the improved matching tracking and base tracking was proposed by the multi-parameter atomic decomposition of the jamming signal and the subtle feature extraction including the expansion coefficient and the primary atomic parameter set. This method can achieve high jamming recognition probability with low SNR, but the selection of a suitable complete atomic library and the extraction of the effective parameters become a problem which makes it difficult to apply in practical engineering. In [17], an energy function detection and band-pass filtering (EFDBP) method was proposed, which constructed an energy function and extracted the undisturbed signal segments by setting detection thresholds. These signal segments were used to construct a band-pass filter in the frequency domain which was windowed to optimize the matching filtering effect. The method is simple in structure and convenient in engineering application, but the interference suppression effect is unstable not only in the condition of low SNR but low JSR, and meanwhile the performance of this method can be significantly affected by different filter windows. Based on EFDBP, the compressed sensing theory was introduced into the interference suppression which regarded the band-pass filtered signal as the compressed data and constructed a minimum solution model using the linear relationship between compressed data and the echo signal in sparse frequency domain after the de-linearization process [18]. Moreover, the orthogonal matched filter tracking algorithm was further applied to reconstruct the echo signal and finally realized the interference suppression. This method successfully suppresses the interference to some extent and reconstructs the echo signal without distortion. However, the performance of this method changes with different ISRJ strategies and is particularly sensitive to the width of the time sampling window. Experiment results show that this method is completely unable to suppress the interference with small time sampling window and there will be significant phase distortion in the reconstructed echo signal. In [19,20], a particle filter (PF) anti-jamming method was proposed, which updated the band-pass filter in real time by detecting the abnormal changes of the importance weights during the particle filter process. This method is relatively practical because it doesn’t need to estimate the state transfer function and the measurement noise of the system, and meanwhile less sensitive to the JSR which solves the low target detection probability problem. However, this method is more likely to be affected by system which limits its application in real scenario. In [21,22], the waveform parameters were adjusted in real time by adaptive intra-pulse orthogonal coding and waveform diversity, so that the jamming signal and the target signal were orthogonal at the radar receiver and based on that the interference suppression could be further performed by the matched filter. This method tried to realize the interference suppression from the aspect of the transmitting system which makes it possible to separate the jamming signal and the target signal completely. However, in this method, the transmit power is reduced because of the interposition of the screen signal and meanwhile the performance of interference suppression will also degrade because it is usually applicable to the condition that jamming lags one or more pulse repetition periods.
In summary, most interference suppression methods are based on the idea of characteristics extraction, difference identification and band-pass filter construction. These methods perform well under the high SNR and high JSR condition, but when comes to low SNR, their performances will degrade. Aiming at this defect, this paper proposed an interference suppression method based on SSEF for ISRJ from the aspect of entropy characteristics. Firstly, the improved trajectory matrix is established by adaptive multi-scale segmentation (AMS) to achieve fine characteristics extraction of the echo signal and improves time efficiency. In this step, the segmentation criterion based on average energy of segments and the constraint of minimum segmentation is also propose. Secondly, the improved trajectory matrix is delay embedded mapped to develop the improved delay embedded matrix for further SVD. Thirdly, the singular spectrum of the improved delay embedded matrix is extracted. Based on the SSEF retrieved from the Shannon entropy model, threshold detection is carried out on the echo signal to realize the band-pass filtering and the interference suppression. Finally, experiment results show that in comparison with other interference suppression approaches such as EFDBP, STFT, PF, STMF, the proposed method in this paper can increase the probability of target detection and the peak-to-side-lobe ratio (PSR) after pulse compression, which validates its stability to noise and jamming especially in the condition of low SNRs.
The structure of this paper is as follows: in Section 2, the working mode of jammer and the mechanism of ISRJ is introduced, then the echo signal model is established. In Section 3, the interference suppression method based on SSEF is proposed, and the key steps of data segmentation and characteristics extraction are described in detail. In Section 4, simulation comparison experiments are carried out to quantitatively evaluate the interference suppression performances. Finally, the main conclusion and directions for future research are presented in Section 5.

2. The Mechanism of ISRJ

2.1. The Working Mode of Jammer

In order to introduce jamming more clearly, we take the airborne jammer on the condition of self-screening jamming (SSJ) as an example. In general, the jammer is divided into receiving subsystem and jamming subsystem. The receiving subsystem includes a receive antenna, a receiver and a signal processer while the jamming subsystem includes a transmit antenna, a jamming generator and a power control unit. The jammer receives the radar transmitting signal through the receive antenna after detecting the rising edge of the radar transmitting signal and generates slices by interrupted sampling, storing. Then, after modulation, the ISRJ is transmitted through the transmit antenna to victim radar. By this way, the ISRJ based on DRFM generates main false target and several other false targets located symmetrically around the main false target. The schematic diagram of jammer against radar based on ISRJ is showed in Figure 1. The rectangle in blue corresponds to the radar transmitting signal, the rectangle in yellow corresponds to the target signal and the rectangles in red correspond to ISRJ. The radar transmits a signal which pulse width is ( t 2 t 1 ). After detection and jamming generation, the echo signal includes target signal, jamming signal and noise. Here, the noise is ignored in the diagram for convenience. The delay of the target signal is τ target because the target distance is 1 2 c τ target where c is velocity of light. The pulse width of the interrupted sampling is τ js and the pulse width of the repeater is τ jt . The amplitude of the target signal is smaller than the transmitting signal due to the distance and the amplitude of the jamming is greater than target signal due to JSR. Further, the overlap of the two signals causes the amplitude to become larger.

2.2. The Principle of ISRJ

The ISRJ derived from signal sampling, storage and repeater can generate coherent multiple false targets during the matched filtering of pulse compression. At present, the papers and researches in the field of interference suppression mainly focus on pulse Doppler (PD) radar and linear frequency modulation (LFM) radar. During the process of interference suppression, signal accumulation is needed. The PD signal performs pulse accumulation in the time dimension while LFM signal performs pulse compression, which is equivalent to accumulation. Considering that the bandwidth of LFM signal is relatively wide and the resolution is high, LFM signal has great advantages for target detection [23]. Both waveforms are used in engineering applications while the interference suppression method in this paper can extract more characteristics by using LFM signal, so the main research in this paper is to deal with the interference suppression under LFM signal. Here, we assume that the transmitting radar signal is LFM signal with expression as:
s ( t ) = u ( t ) e j 2 π ( f 0 + 1 2 K t ) t = A r e c t ( t T ) e j 2 π ( f 0 + 1 2 K t ) t
where A is the amplitude, T is the pulse width, f 0 is the carrier frequency, and K is the frequency modulation slope.
The interrupted sampling signal is rectangular pulse train which can be written as:
p ( t ) = r e c t ( t τ ) · n = + δ ( t n T s ) = n = + r e c t ( t n T s τ )
where τ , T s and f s = 1 T s respectively stand for the pulse width, the period and the frequency of the sampling signal in jammer.
After interrupted sampling, the jamming signal can be expressed as:
j ( t ) = s ( t ) · p ( t ) = s ( t ) · n = + r e c t ( t n T s τ ) = τ T s · s ( t ) + 2 τ T s n = + sin ( π n f s τ ) π n f s τ · cos ( 2 π n f s t ) · s ( t )
After DAC, up converted and transmitted back to the victim radar, the echo signal received by the radar receiver can be indicated as:
r ( t ) = s ( t ) + j ( t ) + n ( t )
where s(t′) represents the echo signal, j(t′) is the jamming signal and n(t′) is the Gaussian noise. The time sequence of the radar receiver has a delay relative to that of the jammer.
As demonstrated in Figure 2, Figure 3 and Figure 4, ISRJ can be divided as ISDRJ, ISPRJ and ISCRJ by different sampling and repeater strategies. Different colored rectangles correspond to different jamming slices. Jamming signals are first sampled by different interrupted sampling signals to generate different patterns. If the repeater time window is the same as the sampling time window with 0.5 duty ratio, then ISDRJ is produced by the sampling and repeater loop right after intercepting the slice of the radar signal. Unlike ISDRJ, ISPRJ periodically repeats a certain number of the jamming slices (set by program) after sampling, then the sampling and repeater loop is applied until the signal ends. Besides that, the ISCRJ repeats the current jamming slices and the previous jamming slices in order according to the repeating period until the end of the signal which may leads to numerous multiple false targets after matched filtering.
The above Equation (3) is converted into matrix for further derivation. Here, we assume that the radar transmitting signal vector is s = [ s 1   s 2     s n ] T , where s i , i = 1, 2, …, n are the sample values of the radar signal with f s in jammer. Based on that, the interrupted sampling signal can be derived as:
j 1 = P s
where P is the interrupted sampling matrix. P is a diagonal matrix and the values of the diagonal elements are ‘one’ or ‘zero’ [22]. The element ‘one’ means the intercepting processing, while the element ‘zeros’ means the retransmitting processing.
It should be noted that the expressions of the interrupted sampling matrix are different with strategies. In this paper, the interrupted sampling matrix of ISDRJ, ISPRJ and ISCRJ are respectively named as P ISDRJ , P ISPRJ and P ISCRJ in Equations (6), (7) and (11):
P ISDRJ = [ I t f s × t f s 0 t f s × t f s I t f s × t f s 0 t f s × t f s ]
P ISPRJ = i = 1 N P i
where I is the unit matrix, 0 is zero matrix, τ and f s are the pulse width and the pulse repetition frequency (PRF) of the sampling signal in jammer, N is the time of repeater. With the initial interrupted sampling matrix P 0 composed by sub-matrix including unit matrixes and zero matrixes from Equation (8) and the transition matrix B from Equation (9), P i can be further deduced as Equation (10):
P 0 = [ I t f s × t f s 0 N t f s × N t f s I t f s × t f s 0 N t f s × N t f s ]
B = [ I n × n , 0 n × ( i τ f s + n ) ]
P i = B [ 0 τ f s × τ f s ( i ) 0 τ f s × τ f s P 0 ] B T
P ISCRJ = i = 1 N C P i
Assuming that P 0 is the initial interrupted sampling matrix of ISCRJ composed by unit matrixes and zero matrixes and C is the loop matrix, then P i can be written as Equation (13):
P 0 = [ I τ f s × τ f s 0 τ f s × τ f s I N τ f s × N τ f s 0 N τ f s × N τ f s ]
P i = B [ 0 τ f s × τ f s ( i ) 0 τ f s × τ f s P 0 ] B T
The spectrum J 1 is derived from the Fourier transform of the initial interrupted sampling signal j 1 :
J 1 = F 1 j 1 = [ e j 2 π f 1 t 1 e j 2 π f 1 t 2 e j 2 π f 1 t n e j 2 π f 2 t 1 e j 2 π f 2 t 2 e j 2 π f 2 t n e j 2 π f n t 1 e j 2 π f n t 2 e j 2 π f n t n ] j 1
where F 1 is the Fourier transform matrix. The spectrum of the jamming signal can be generated by the time delay τ 0 :
J 2 = Γ J 1 = [ e j 2 π f 1 τ 0 0 0 0 e j 2 π f 2 τ 0 0 0 0 e j 2 π f n τ 0 ] J 1
After the inverse Fourier transform, the jamming signal j can be derived as Equation (16):
j = F 2 J 2 = [ e j 2 π f 1 t 1 e j 2 π f 2 t 1 e j 2 π f n t 1 e j 2 π f 1 t 2 e j 2 π f 2 t 2 e j 2 π f n t 2 e j 2 π f 1 t n e j 2 π f 2 t n e j 2 π f n t n ] J 2
where F 2 is the inverse Fourier transform matrix.
Therefore, the ISRJ signal matrix can be summarized as Equation (17). In order to facilitate the theoretical derivation and simulation, we set radar sampling frequency f s r = f s , so radar echo signal matrix can be summarized as Equation (18):
j = F 2 Γ F 1 P s
r = s + j + n = s + F 2 Γ F 1 Ps + n = ( I + F 2 Γ F 1 P ) s + n = A s + n
where A = I + F 2 Γ F 1 P . and the radar receiver can’t be saturated by the jamming signal.

3. SSEF for ISRJ Suppression

Based on the above echo signal model, this paper proposes an SSEF-based ISRJ interference suppression method which first generates an improved delay embedded matrix through the AMS and the delay embedded mapping. After that, a singular spectrum model is applied to realize the SVD of this matrix. Related SSEF can be extracted by the establishment of the Shannon entropy model along with the threshold detection to realize the band-pass filtering of the jamming in the echo signal.

3.1. AMS

The performance of the SSEF-based interference suppression method mainly relies on the width of the segmentation window during the AMS and the reconstruction principle of the delay embedded mapping space.

3.1.1. Fixed-Scale Segmentation Window

In this section, the effect of the width about segmentation window is first discussed. Assuming that the signal sequence detected at the radar receiver is r = [ r 1   r 2     r n ] T using radar sampling frequency f s r with the width of segmentation window set as an integer l [ 1 , n ] . The trajectory matrix R of signal sequence r is formed [24]. Therefore, R can be deduced as:
R = [ r 1 r 2 r n l + 1 r 2 r 3 r n l + 2 r l r l + 1 r n ] = [ R 1 R 2 R n l + 1 ]
where R i = [ r i   r i + 1     r i + l 1 ] T , i = 1, 2, …, nl + 1.
Considering that the SSEF needs to be calculated based on the singular value after the segmentation reconstruction, there won’t be any local optimum error with long segmentation window because the large data volume can smooth the SSEF curve and make it more suitable for threshold detection. However, in this condition, the calculated SSE is of low time efficiency. Similarly, near real-time calculation can be achieved with short segmentation window because of the small data volume and meanwhile the SSE curve contains more details. But the local optimum error can lead to burrs in the signal edges after interference suppression processing. In summary, the width of the segmentation window can be written as:
l = α T f s r
where T is the pulse width of the radar transmitting signal, f s r is the PRF of radar and α is the adjusted factor determined by the slice width of the jamming with common value ranges from 0.02 to 0.25.

3.1.2. Adaptive Multi-Scale Segmentation Window

Considering that the target and the jamming in the radar echo signal are sparse relative to the noise and the recognition probability of the noise is high, short segmentation window is not required for noise. However, the short segmentation window is more advantageous for extracting the fine characteristics when it comes to the target signal or the jamming signal. It is necessary to design a reasonable window for local characteristics extraction. At the same time, the fixed width segmentation window will also lead to the decline of time efficiency. In order to solve this problem, this paper proposes an AMS method, which adaptively changes the width of the segmentation window to achieve fine characteristics extraction of the echo signal and improves time efficiency.
Assuming that l 1 = α T f s r is the initial width of segmentation window, repeat the following AMS criterion algorithm and update the variable i until all segmentation is completed. This process is constrained by l i l 1 2 :
{ l i = l i + 1 E ( R i ) E L l i = l i 1 l i = l i E ( R i ) E U o t h e r s
where l i is the width of i-th segmentation window, E ( R i ) , E L , E U respectively stand for the average energy of the i-th segment, lower threshold and upper threshold. They can be expressed as:
E ( R i ) = 1 l i p = 1 l i | r p | 2
E L = 1 N q = 1 N | r q | 2
E U = 1 N t = 1 N ( | r t | 2 E L ) 2 E L
When E ( R i ) is less than E L , the signal in the segment does not float much. The signal in this segment is a noise signal and its characteristics are relatively obvious. The segmentation window is adjusted to a long window, which is used to smooth the noise. When E ( R i ) is greater than E U , it indicates that the floatability of the signal in this segment is very large. The segmentation window is adjusted to a short window and the fine characteristics of the signal are extracted. Meanwhile, the short segmentation window is beneficial to improve the time efficiency. Since the widths of the segments after the AMS are different, the number of matrix rows is kept the same ( l max ) by the zero-padding operation. This step does not affect SVD and entropy extraction. In summary, the improved trajectory matrix formed by the AMS algorithm can be written as:
R = [ r 1 r 2 r n l ^ + 1 r 2 r 3 r n l ^ + 2 r l 1 0 0 r l 2 0 0 r l n 0 0 ] = [ R 1 R 2 R n l ^ + 1 ]
where l ^ is the number of the segment after AMS and R′ is a matrix of l max × ( n l ^ + 1 ) .

3.2. Delay Embedded Mapping

After AMS, the improved trajectory matrix R′ is delay embedded mapped in column through nonlinear transformation to develop the delay embedded matrix D for further SVD [25]. The delay embedded matrix can be written as:
D = [ D 1 D 2 D n l ^ + 1 ] = f ( R ) = f ( [ R 1 R 2 R n l ^ + 1 ] ) = [ f ( R 1 ) f ( R 2 ) f ( R n l ^ + 1 ) ]
with D i = f ( R i ) , i = 1 ,   2 ,   ,   n l ^ + 1 , where f(•) is the delay embedded mapping which can cause different singular value of the delay embedded matrix after reconstruction. The delay embedded mapping can be indicated as:
D i = f ( R i ) = [ r i r i + 1 r w r i + 1 + d r i + 2 + d r w + 1 + d r l max w + 1 r l max w + 2 r i + l max 1 ]
where w = l max w + 1 and d is the delay time responsible for the component of the delay embedded matrix.
When d = 0, D i turns into Hankel matrix with equivalent a i , j at i + j = c where c is constant [26]. Considering that the singular value of the Hankel matrix is relatively obvious, therefore it can achieve better performance during the noise reduction process. However, the extraction results cover all singular values which will increase the computation burden. In contrary, when d > 0, only main singular values are extracted and the number of which is determined by the row number. In this condition, the computation burden is relatively smaller, but it will generate ambiguous singular values and therefore deteriorate the performance of noise reduction.
As to ensure that all elements participate in the operation, d should belong to [0, w]. In this paper, d is set as 2 to solve the compromise problem between the calculation burden and the singular value extraction. Then the improved delay embedded mapping can be expressed as:
D i = f ( R i ) = [ r i r i + 1 r w r i + 3 r i + 4 r w + 3 r l max w + 1 r l max w + 2 r i + l max 1 ]

3.3. SVD

SVD is an important tool in matrix analysis which reflects the intrinsic nature of matrix vectors in statistics [27]. The main application of SVD is principal component analysis (PCA) by mapping data to the lower dimensional space and extracting data features in order of importance. Larger singular value indicates more obvious characteristics which can be further used to the sortation and the identification of the signal. Therefore, SVD is equipped with good numerical stability and geometric invariance.
According to the SVD theory [28], for each improved delay embedded matrix D i , there will be an orthogonal matrix U, V to realize:
D i = U Σ i V T
Thus, the singular spectrum of each improved delay embedded matrix is:
Σ i = diag ( σ i , 1 σ i , 2 σ i , l max w + 1 )
The singular values in singular spectrum represent the relevant characteristics contained in segments of radar echo signal. In fact, after a certain singular value, the latter values are very small, which means that the important characteristics are former ones and the rest are secondary characteristics.

3.4. Shannon Entropy Model

Information entropy is widely applied to measure the complexity of the signal which is proportional to the signal uncertainty [29]. Therefore, the information of singular spectrum can be estimated by calculating the SSE. Considering that the Gaussian distribution is equipped with the largest information quantity among different random variables, thus it has the maximum information entropy. Since different targets have different radar cross sections (RCS), the amplitude of the radar echo signal is also subject to a certain random distribution. Moreover, the amplitude of the jamming signal derived from the interrupted sampling is usually a large fixed value because of the JSR, and the information contained in the jamming signal is much smaller than the Gaussian noise and the echo signal which means its information entropy is significantly different from the other two. This can be further applied to the jamming signal extraction and the noise reduction. In this paper, the Shannon entropy is assumed to be the entropy characteristics of the singular spectrum, therefore the singular spectrum entropy of i-th delay embedded matrix is:
H SVD ( Σ i ) = j = 1 l max w + 1 p i , j log 2 p i , j
where p i , j is the probability of the j-th singular value in the singular spectrum of the i-th improved delay embedded matrix. This probability represents the proportion of each singular value in singular spectrum. For the noise, since the relative variation of singular values in singular spectrum is small, the probability of each singular value is not much different. According to the principle of entropy, SSE is a large value. For the target signal, the difference between singular values begin to increase due to RCS, which make SSE decrease. But due to the influence of target location and attenuation in transmitting, SSE does not decrease much. And for ISRJ, the amplitude of ISRJ is usually much greater than target signal and noise, so in this case there are only a few large singular values in the entire singular spectrum, which causes the difference between the probability of these large singular values and that of the rest to be much greater. Therefore, the SSE becomes much smaller than that of noise and target.
p i , j = σ i , j j = 1 l max w + 1 σ i , j
According to Equations (31) and (32), as to ensures that SSEF make sense, pi,j should be non-zero. The proof is shown in Appendix A for details. Then, the entropy-based threshold is set to extract the undisturbed target signal. The threshold detection algorithm is demonstrated as Equation (33) where H SVD ( D i ) is the SSE of the i-th improved delay embedded matrix:
{ r l i = 0 ,   H SVD ( Σ i ) < γ r ^ l i = r l i , H SVD ( Σ i ) γ
where r ^ l i is the element after interference suppression, r l i is the last non-zero element of the column in the improved trajectory matrix. The threshold can be expressed as:
γ = β 1 N i = 1 N H SVD ( Σ i )
where β is the threshold adjusted factor. Generally, the first N delay embedded matrix only contains the noise without any components of the target signal and the jamming signal. Empirically, β ranges from 0.8 to 0.9 and N values from 2 to 10. Here, β = 0.88, N = 5.
Finally, the signal after interference suppression r a can be retrieved from the updated improved trajectory matrix and the recovered signal sequence by Equation (33).

3.5. Algorithm Procedure

The flow chart of the SSEF-based ISRJ interference suppression method can be summarized as Figure 5. The specific steps can be expressed as follows:
Step 1: Computing the improved trajectory matrix R′. The echo signal sequence r = [ r 1   r 2     r n ] T received at the radar antenna is processed by AMS to generate the improved trajectory matrix R′. The mathematical expression is rewritten here:
R = [ r 1 r 2 r n l ^ + 1 r 2 r 3 r n l ^ + 2 r l 1 0 0 r l 2 0 0 r l n 0 0 ] = [ R 1 R 2 R n l ^ + 1 ]
Step 2: Computing the improve delay embedded matrix D. D is written as:
D = [ D 1 D 2 D n l ^ + 1 ]   = f ( R ) = [ f ( R 1 ) f ( R 2 ) f ( R n l ^ + 1 ) ]
where f(•) is the delay embedded mapping defined in Equation (28).
Step 3: Computing the singular spectrum Σ . Σ = [ Σ 1   Σ 2     Σ n l ^ + 1 ] , Σ i is computed by SVD in Equation (29) and expressed as:
Σ i = diag ( σ i , 1 σ i , 2 σ i , l max w + 1 )
Step 4: Computing the SSEF H SVD ( Σ ) by Equation (38). H SVD ( Σ i ) is written as Equation (31):
H SVD ( Σ ) = [ H SVD ( Σ 1 ) H SVD ( Σ 2 ) H SVD ( Σ n l ^ + 1 ) ]
Step 5: Updating the element r ^ l i in improved trajectory matrix R′ by entropy-based detection and band-pass filtering. The specific threshold detection algorithm is described below and entropy-based threshold γ is defined in Equation (34). After this step, the interference suppressed signal r a can be retrieved:
{ r l i = 0 , H SVD ( Σ i ) < γ r ^ l i = r l i , H SVD ( Σ i ) γ

4. Simulation

4.1. Comparison between Fixed-Scale Segmentation and AMS on Characteristcs Extraction

In this experiment, the transmitting radar signal is assumed to be LFM signal as shown in Equation (1). Based on the jamming model in Section 2, related parameters are set as Table 1. Here, we assume that the target is located at 4 km and the target RCS distribution satisfies Swerling IV to simulate fast moving targets such as ships and missiles.
We first carry out the simulation comparison experiment by extracting the average energy of segments with fixed-scale segmentation and AMS. In order to highlight the comparison results, the experiment is established under the condition of high SNR. That is because under this condition, both two methods are efficient and the advantage of AMS in fine characteristic can be highlighted successfully. Figure 6a is the average energy of each segment by short fixed-scale segmentation with ISCRJ and SNR = 10 dB. Figure 6b is that of long fixed-scale segmentation with the same condition. Figure 6c is the AMS result. It can be seen that the average energy function with AMS has obvious fluctuation while the function with long fixed-scale is smoother. Although the result of short fixed-scale is similar to AMS, it produces burrs in the segments where it should be smooth, which affects the characteristics recognition. Meanwhile, a large number of segmentations will reduce the time efficiency. So AMS has an advantage in fine characteristics extraction and time efficiency relative to fixed-scale segmentation.
Since the SSEF has stability to noise and jamming, we illustrate the advantages of the SSE between fixed-scale segmentation and AMS under low SNR. Figure 7a represents the SSE function of short fixed-scale segmentation with SNR = −10 dB. Figure 7b is the SSE function of long fixed-scale segmentation and Figure 7c is that of AMS with the same condition. From the figures, we can see that the SSE function of short fixed-scale segmentation are so obvious that it produces unnecessary results in terms of characteristics detection. And these fine characteristics result in the local convergence, making it difficult to distinguish between target, jamming and noise. For long fixed-scale, the sequence of the SSE function is smaller and smoother than short fixed-scale but the trend of characteristics can be seen to some extent. However, due to the relative reduction of sequence, the fine characteristics of target and jamming segments are not reflected in detail and some information will be lost for the following signal processing. So the comparison results show that the SSE function of AMS has a recognition advantage under low SNR.

4.2. Interference Suppression Based on SSEF

Based on the parameters in Section 4.1, the experiments are carried out. Figure 8a represents the echo signal with ISDRJ in time domain where there are five slices in the jamming component. Figure 8b is the pulse compression result before interference suppression where the master false target occurs at 4.15 km with multiple false targets uniformly surrounded. Figure 8c is the pulse compression result after SSEF-based interference suppression without any false target which directly proves the effectiveness of the method.
The echo signal of ISPRJ in time domain is demonstrated in Figure 9a. Figure 9b is the pulse compression result before interference suppression where the master false target occurs at 4.15 km and 4.3 km with multiple false targets uniformly surrounded. Figure 9c is the pulse compression result after SSEF interference suppression without any false target which also proves the effectiveness of this method.
Figure 10a is the echo signal of ISCRJ in time domain where the slices is repeating in order of sampled time and the stochastic intensive target after pulse compression is constructed by modulating the amplitude of the jamming signal. Figure 10b is the pulse compression result of the echo signal before interference suppression where three sets of false targets occurs along with the three repeater slices. The number of master false target in each set is equivalent to the number of the repeater slices and each master false target is surrounded by symmetrical false targets. Figure 10c is the pulse compression result after SSEF interference suppression without any false target which proves the effectiveness of this method.

4.3. Performance Comparison

As to compare the performance of different interference suppression methods, experiments are carried out between the proposed method and the STMF, the STFT, the FEDBP and the PF methods. The parameters in the experiments are the same as Section 4.1 where the probability of target detection and the PSR after pulse compression are used as evaluation criteria. According to literatures, most interference suppression methods can achieve satisfactory performance in the condition of high SNR because the characteristics of the jamming signal and the target signal are significantly different. Therefore, comparisons of the five methods in our experiment only focus on cases with SNR less than 5 dB.
Figure 11 is the probability of target detection curve after the interference suppression with three jamming patterns and five interference suppression methods where 1000 times of Monte Carlo simulation are performed on each SNR. Table 2, Table 3 and Table 4 are the probabilities of target detection of three interference patterns with JSR = 15 dB.
Results can be first made from the aspect of jamming pattern. For the same jamming pattern, the performances of five interference suppression methods increase with the SNR, which indicates the correctness of this method and the applicability of ISRJ and its improvement pattern. When the SNR is greater than 5 dB, the target detection probability of the five methods after interference suppression is greater than 0.9. This means the proposed method is comparable to the interference suppression ability of the other methods in the condition of high SNR.
It can also be concluded from the aspect of SNR that for the same JSR, the detection probability of this method after interference suppression is greatly improved compared with other four methods when the SNR is less than 0 dB (especially between −20 dB and −10 dB). This means that the proposed method has significant advantages of interference suppression and better noise stability under low SNR conditions.
For the same SNR, when the JSR is larger than 10 dB, the detection probability after interference suppression increases with the JSR value and the difference between the jamming signal and target signal become larger as well. Meanwhile, it can be observed that in this case the detection probability and the interference suppression performance of the proposed method is higher than other four methods and there is a significant improvement of detection probability when the JSR is between 5 dB to 10 dB.
Figure 12 demonstrates the PSR of the ISDRJ, ISPRJ and ISCRJ after pulse compression with SNR = −10 dB and 1000 times of Monto Carlo simulations. It is not hard to find that the PSRs of the five methods increase with the JSR and the PSR of the proposed method is larger than other four methods which means it has the best interference suppression performance compared to the others. Table 5, Table 6 and Table 7 give the PSR values of three jamming patterns after pulse compression where the proposed method can achieve the highest PSR and the best interference suppression with −10 dB SNR and 13 dB JSR.

5. Conclusions

Based on the study of ISRJ principle, this paper proposed an SSEF-based ISRJ interference suppression method aiming at the problem of multiple coherence false targets in low SNRs. This method first establishes the singular spectrum model by proposed AMS, delay embedded mapping and the following SVD. Then based on SSEF derived from the Shannon entropy, this method realizes the detection of SSE function and the band-pass filtering of the echo signal received at the radar antenna. The influence of AMS and delay embedded mapping on the interference suppression performance are analyzed during the model construction. The validity and the feasibility of this method is further proved by mathematical deduction. Through the comparison with other suppression methods, the superiority of this method is finally presented from different aspects. Experiments show that in condition of low SNR, the proposed method can achieve better noise and jamming stability. Moreover, this method gives a mathematical verification and theoretical basis for the overall design of anti-jamming in ECM. Further researches will be carried out on the application of this algorithm.

Author Contributions

Conceptualization, M.Y. and S.D.; Formal analysis, M.Y. and X.D.; Investigation, S.L.; Methodology, M.Y. and S.D.; Software, X.D. and S.L.; Supervision, S.D.; Writing–original draft, M.Y.

Funding

This research received no external funding.

Acknowledgments

The authors wish to thank the reviewers for their valuable comments on improving this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

According to Equations (31) and (32), as to ensure that SSEF make sense, pi,j should be non-zero which means any singular value in the singular spectrum is non-zero and the improved delay embedded matrix is full rank. Theoretically, the improved delay embedded matrix is obtained by the reconstruction mapping of the echo signal sequences received at the radar antenna which means the full rank property of the delay embedded matrix can be proved by the full rank of the echo signal sequences. Equation (18) shows that this can be further proved by matrix A and take ISDRJ as an example, the specific deduction can be summarized as follows:
A = I + F 2 τ F 1 P = I + [ e j 2 π f 1 t 1 e j 2 π f 2 t 1 e j 2 π f n t 1 e j 2 π f 1 t 2 e j 2 π f 2 t 2 e j 2 π f n t 2 e j 2 π f 1 t n e j 2 π f 2 t n e j 2 π f n t n ] · [ e j 2 π f 1 ( τ 0 + t 1 ) e j 2 π f 1 ( τ 0 + t 2 ) e j 2 π f 1 ( τ 0 + t n ) e j 2 π f 2 ( τ 0 + t 1 ) e j 2 π f 2 ( τ 0 + t 2 ) e j 2 π f 2 ( τ 0 + t n ) e j 2 π f n ( τ 0 + t 1 ) e j 2 π f n ( τ 0 + t 2 ) e j 2 π f n ( τ 0 + t n ) ] · P = I + [ i = 1 n e j 2 π f i × ( τ 0 + 0 × d t ) i = 1 n e j 2 π f i × ( τ 0 + 1 × d t ) i = 1 n e j 2 π f i × ( τ 0 + ( n 1 ) × d t ) i = 1 n e j 2 π f i × ( τ 0 1 × d t ) i = 1 n e j 2 π f i × ( τ 0 0 × d t ) i = 1 n e j 2 π f i × ( τ 0 + ( n 2 ) × d t ) i = 1 n e j 2 π f i × ( τ 0 ( n 1 ) × d t ) i = 1 n e j 2 π f i × ( τ 0 ( n 2 ) × d t ) i = 1 n e j 2 π f i × ( τ 0 0 × d t ) ] · P = I + i = 1 n e j 2 π f i × τ 0 × [ i = 1 n e j 2 π f i × 0 × d t i = 1 n j 2 π f i × 1 × d t i = 1 n e j 2 π f i × ( n 1 ) × d t i = 1 n e j 2 π f i × 1 × d t i = 1 n e j 2 π f i × 0 × d t i = 1 n e j 2 π f i × ( n 2 ) × d t i = 1 n e j 2 π f i × ( n 1 ¯ ) × d t i = 1 n e j 2 ¯ π f i × ( n 2 ) × d t i = 1 n e j 2 π f i × 0 × d t ] · P = I + k × [ k 11 k 12 k 1 n k 21 k 22 k 2 n k n 1 k n 2 k nn ] [ 1 ( τ f s ) 1 0 ( τ f s ) 0 1 ] = I + k × [ k 11 ( τ f s ) k 1 , ( τ f s ) 0 ( τ f s ) 0 k 1 , ( 2 τ f s + 1 ) k 21 ( τ f s ) k 2 , ( τ f s ) 0 ( τ f s ) 0 k 2 , ( 2 τ f s + 1 ) k n 1 ( τ f s ) k n , ( τ f s ) 0 ( τ f s ) 0 k n , ( 2 τ f s + 1 ) ] = I + k · K
with:
K = [ k 11 ( τ f s ) k 1 , ( τ f s ) 0 ( τ f s ) 0 k 1 , ( 2 τ f s + 1 ) k 21 ( τ f s ) k 2 , ( τ f s ) 0 ( τ f s ) 0 k 2 , ( 2 τ f s + 1 ) k n 1 ( τ f s ) k n , ( τ f s ) 0 ( τ f s ) 0 k n , ( 2 τ f s + 1 ) ]
where k = i = 1 n e j 2 π f i τ 0 , k xy = i = 1 n e j 2 π f i ( x y ) d t and d t = 1 f s is the sampling interval.
Assuming that λ is the eigenvalue of matrix K, it can be calculated based on the eigenvalue decomposition theory that:
det | λ I K | = ( λ ) l τ f s × f ( λ n l τ f s , , λ ) = 0
where l is the number of interrupted sampling window, l τ f s is the total length of interrupted sampling window sequence, n is the total length of the signal sequence, n l τ f s is the total length of the repeater window sequence which represents the total length of ISRJ, f ( λ n l τ f s , , λ ) is a function related to the eigenvalue.
The eigenvalue of matrix K can be obtained by the solution equation:
λ K = { λ 1 , λ 2 , , λ n l τ f s , 0 , 0 , , 0 l τ f s }
The eigenvalue of matrix A is:
λ A = { 1 + k λ 1 , 1 + k λ 2 , , 1 + k λ n l τ f s , 1 , 1 , , 1 l τ f s }
Therefore, the eigenvalues of matrix A are non-zero so as the determinant which proves the full rank property of matrix A and the validity of SSEF.

References

  1. Wang, X.S.; Liu, J.C.; Zhang, W.M. Mathematic principles of interrupted-sampling repeater jamming. Sci. China Ser. F Inf. Sci. 2007, 1, 113–123. [Google Scholar] [CrossRef]
  2. Zhang, P.C.; Wang, J.G. Jamming technique of intermittent-sampling predictive repeater based on DRFM. Syst. Eng. Electron. 2015, 37, 795–801. [Google Scholar]
  3. Almslmany, A.; Wang, C.Y.; Cao, Q.S. Advanced deceptive jamming model based on DRFM Sub-Nyquist sampling. In Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 12–16 January 2016; pp. 727–730. [Google Scholar]
  4. Ispir, M.; Orduyilmaz, A.; Serin, M.; Yildirim, A.; Gurbuz, A.C. Real-time multiple velocity false target generation in digital radio frequency memory. In Proceedings of the 2016 IEEE Radar Conference, Philadelphia, PA, USA, 2–6 May 2016; pp. 1–6. [Google Scholar]
  5. Shi, F.Q.; Zhou, C.; Liu, Q.H. Characteristics Analysis of Interrupted-Sampling Repeater Jamming. J. Signal Process. 2017, 33, 1616–1624. [Google Scholar]
  6. Li, C.Z.; Su, W.M.; Gu, H.; Ma, C.; Chen, J.L. Improved Interrupted Sampling Repeater Jamming based on DRFM. In Proceedings of the 2014 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Guilin, China, 5–8 August 2014; pp. 254–257. [Google Scholar]
  7. Liu, J.B.; Li, L.; Liu, Z.F. Research on Smart Noise Jamming against PD Radar. Inf. Res. 2011, 37, 19–21. [Google Scholar]
  8. Liu, Z. Jamming Technique for Countering LFM Pulse Compression Radar Based on Digital Radio Frequency Memory. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2006. [Google Scholar]
  9. Yang, S.Q.; Tian, B. Research on Intermittent-Sampling Jamming to LFM Pulse Compression Radar Based on Phase Modulation. Comput. Simul. 2016, 33, 9–13. [Google Scholar]
  10. Guo, L.; Li, H.; Li, Q.S. Interrupted Sampling Smart Jamming Method for Coherent Radar. Mod. Def. Technol. 2013, 41, 119–124. [Google Scholar]
  11. Xiong, W.; Zhang, G.; Liu, W.B. Efficient filter design against interrupted sampling repeater jamming for wideband radar. EURASIP J. Adv. Signal Process. 2017, 2017, 9. [Google Scholar] [CrossRef]
  12. Zhang, S.N.; Xie, W.; Zhu, H.; Zhao, H.C. Combined Eigenvector Analysis and Independent Component Analysis for Multi-Component Periodic Interferences Suppression in PRCPM-PD Detection System. IEEE Access 2017, 5, 12552–12562. [Google Scholar] [CrossRef]
  13. Zhou, C.; Liu, Q.H.; Zeng, T. Research on DRFM Repeater Jamming Recognition. J. Signal Process. 2017, 33, 911–917. [Google Scholar]
  14. Gong, S.X.; Wei, X.Z.; Li, X. ECCM scheme against interrupted sampling repeater jammer based on time-frequency analysis. Syst. Eng. Electron. 2014, 25, 996–1003. [Google Scholar] [CrossRef]
  15. Yang, S.Q.; Tian, B.; Zhou, R.Z. ECCM Against Interrupted Sampling Repeater Jamming Based on Time-frequency Analysis. J. Signal Process. 2016, 32, 1244–1251. [Google Scholar]
  16. Sun, M.H. Study on Algorithm of Radar Active Deception Anti-Jamming. Ph.D. Thesis, University of Electronic Science and Technology of China, Chengdu, China, 2008. [Google Scholar]
  17. Yuan, H.; Wang, C.Y.; Li, X.; An, L. A Method against Interrupted-Sampling Repeater Jamming Based on Energy Function Detection and Band-Pass Filtering. Int. J. Antennas Propag. 2017, 1, 1–9. [Google Scholar] [CrossRef]
  18. Yuan, H.; Wang, C.Y.; An, L.; Li, X. ECCM scheme against interrupted-sampling repeater jamming based on compressed sensing signal reconstruction. Syst. Eng. Electron. 2018, 40, 717–725. [Google Scholar]
  19. Zhu, H.; Zhang, H.; Tang, G.D.; Li, Z.Y. Method against radar’s deception jamming based on particle filter. High Power Laser Part. Beams 2014, 26, 160–165. [Google Scholar]
  20. Yu, M.Y.; Dong, S.B.; Duan, X.Y. An interference Suppression Algorithm of Multiple False Targets for Pulse Doppler Radar. J. Signal Process. 2017, 12, 1578–1584. [Google Scholar]
  21. Zhou, C.; Liu, F.F.; Liu, Q.H. An Adaptive Transmitting Scheme for Interrupted Sampling Repeater Jamming Suppression. Sensors 2017, 17, 2480. [Google Scholar] [CrossRef]
  22. Wei, Z.H.; Liu, Z.; Bo, P.; Rui, S. ECCM Scheme against Interrupted Sampling Repeater Jammer Based on Parameter-Adjusted Waveform Design. Sensors 2018, 18, 1141. [Google Scholar] [CrossRef]
  23. Feng, D.J.; Tao, H.M.; Yang, Y.; Liu, Z. Jamming de-chirping radar using interrupted-sampling repeater. Sci. China Inf. Sci. 2011, 54, 2138–2146. [Google Scholar] [CrossRef]
  24. Lu, Y.L.; Li, M.; Chen, H.M.; Wang, Z.Y.; Zuo, L. Countering DRFM Range Gate Pull-off Jamming Based on Singular Spectrum Analysis. J. Electron. Inf. Technol. 2016, 38, 600–606. [Google Scholar]
  25. Liu, K.; Han, J.B.; Huang, Q.H. Sorting Radar Signal Based on the Improved Resemblance Coefficient and Singular Spectrum Entropy. Mod. Radar 2015, 37, 80–85. [Google Scholar]
  26. Lu, Y.L.; Li, S.Y. CFAR detection of DRFM deception jamming based on singular spectrum analysis. Processing of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xiamen, China, 22–25 October 2017; pp. 1–6. [Google Scholar]
  27. Hong, X.C.; Zhang, G.Y.; Wang, C.Y.; Zhang, X.Z. Automatic Recognition of Intra-Pulse Modulation Type of Radar Signal Based on SVD. Electron. Inf. Warf. Technol. 2011, 26, 30–35. [Google Scholar]
  28. Yuan, B.; Yao, P.; Zheng, T.Y. Radar Emitter Signal Identification Based on Weighted Normalized Singular-value Decomposition. J. Radars 2018, 7, 1–10. [Google Scholar]
  29. Li, Z.H.; Song, W.J. Entropy Theory Method for Active Jamming Perception. J. Signal Process. 2017, 12, 1652–1656. [Google Scholar]
Figure 1. The schematic diagram of jammer against radar based on ISRJ.
Figure 1. The schematic diagram of jammer against radar based on ISRJ.
Sensors 19 00136 g001
Figure 2. Mechanism of interrupted sampling and direct repeater jamming (ISDRJ).
Figure 2. Mechanism of interrupted sampling and direct repeater jamming (ISDRJ).
Sensors 19 00136 g002
Figure 3. Mechanism of interrupted sampling and periodic repeater jamming (ISPRJ).
Figure 3. Mechanism of interrupted sampling and periodic repeater jamming (ISPRJ).
Sensors 19 00136 g003
Figure 4. Mechanism of interrupted sampling and cyclic repeater jamming (ISCRJ).
Figure 4. Mechanism of interrupted sampling and cyclic repeater jamming (ISCRJ).
Sensors 19 00136 g004
Figure 5. Flow chart of interference suppression based on SSEF.
Figure 5. Flow chart of interference suppression based on SSEF.
Sensors 19 00136 g005
Figure 6. Comparison results with ISCRJ and SNR = 10 dB. (a) The average energy function of short fixed-scale segmentation. (b) The average energy function of long fixed-scale segmentation. (c) The average energy function of AMS.
Figure 6. Comparison results with ISCRJ and SNR = 10 dB. (a) The average energy function of short fixed-scale segmentation. (b) The average energy function of long fixed-scale segmentation. (c) The average energy function of AMS.
Sensors 19 00136 g006
Figure 7. Comparison results with ISCRJ and SNR = −10 dB. (a) The SSE function of short fixed-scale segmentation. (b) The SSE function of long fixed-scale segmentation. (c) The SSE function of AMS.
Figure 7. Comparison results with ISCRJ and SNR = −10 dB. (a) The SSE function of short fixed-scale segmentation. (b) The SSE function of long fixed-scale segmentation. (c) The SSE function of AMS.
Sensors 19 00136 g007
Figure 8. Simulation results of SSEF for ISDRJ. (a) The echo signal with ISDRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Figure 8. Simulation results of SSEF for ISDRJ. (a) The echo signal with ISDRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Sensors 19 00136 g008
Figure 9. Simulation results of SSEF for ISPRJ. (a) The echo signal with ISPRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Figure 9. Simulation results of SSEF for ISPRJ. (a) The echo signal with ISPRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Sensors 19 00136 g009
Figure 10. Simulation results of SSEF for ISCRJ. (a) The echo signal with ISCRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Figure 10. Simulation results of SSEF for ISCRJ. (a) The echo signal with ISCRJ; (b) Pulse compression of the echo signal; (c) Pulse compression of echo signal after SSEF.
Sensors 19 00136 g010
Figure 11. The probability of target detection with different interference suppression methods. (a) The probability of target detection with ISDRJ and JSR = 5 dB; (b) The probability of target detection with ISDRJ and JSR = 10 dB; (c) The probability of target detection with ISDRJ and JSR = 15 dB; (d) The probability of target detection with ISPRJ and JSR = 5 dB; (e) The probability of target detection with ISPRJ and JSR = 10 dB; (f) The probability of target detection with ISPRJ and JSR = 15 dB; (g) The probability of target detection with ISCRJ and JSR = 5 dB; (h) The probability of target detection with ISCRJ and JSR = 10 dB; (i) The probability of target detection with ISCRJ and JSR = 15 dB.
Figure 11. The probability of target detection with different interference suppression methods. (a) The probability of target detection with ISDRJ and JSR = 5 dB; (b) The probability of target detection with ISDRJ and JSR = 10 dB; (c) The probability of target detection with ISDRJ and JSR = 15 dB; (d) The probability of target detection with ISPRJ and JSR = 5 dB; (e) The probability of target detection with ISPRJ and JSR = 10 dB; (f) The probability of target detection with ISPRJ and JSR = 15 dB; (g) The probability of target detection with ISCRJ and JSR = 5 dB; (h) The probability of target detection with ISCRJ and JSR = 10 dB; (i) The probability of target detection with ISCRJ and JSR = 15 dB.
Sensors 19 00136 g011
Figure 12. PSR after pulse compression with different interference suppression methods. (a) ISDRJ; (b) ISPRJ; (c) ISCRJ.
Figure 12. PSR after pulse compression with different interference suppression methods. (a) ISDRJ; (b) ISPRJ; (c) ISCRJ.
Sensors 19 00136 g012
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Signal-to-noise ratio SNR 0 dB
Jamming-to-signal ratio JSR 10 dB
Carrier frequency f 0 500 MHz
Pulse width T 10 μs
Frequency modulation slope K 20 MHz/μs
Target location R 0 4 km
Radar cross section of target RCS Swerling IV
Radar sampling frequency f sr 1.2 GHz
Jammer sampling frequency f s 1.2 GHz
Pulse width of jamming slices τ 1 μs
Pulse repetition interval of ISDRJ2 μs
Slice number of ISPRJ N ISPRJ 2
Slice number of ISCRJ N ISCRJ 3
Repeater time of ISCRJ M ISCRJ 3
Processing time of jammer τ p 500 ns
Table 2. The probability of target detection with ISDRJ and JSR = 15 dB.
Table 2. The probability of target detection with ISDRJ and JSR = 15 dB.
SNR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
−50.6790.8780.9450.5490.967
−80.6310.8280.6490.5350.937
−110.5130.6840.4750.5640.912
−140.2580.5130.3110.2590.792
−170.1020.3070.2660.2780.655
Table 3. The probability of target detection with ISPRJ and JSR = 15 dB.
Table 3. The probability of target detection with ISPRJ and JSR = 15 dB.
SNR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
−50.6940.8480.9580.5530.964
−80.6680.8480.6470.5720.916
−110.4880.6730.4830.5590.921
−140.2320.5010.3420.3020.757
−170.0760.3270.2880.2750.633
Table 4. The probability of target detection with ISCRJ and JSR = 15 dB.
Table 4. The probability of target detection with ISCRJ and JSR = 15 dB.
SNR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
−50.7050.8730.9450.5950.967
−80.6730.8370.6950.5470.912
−110.4490.6770.4880.5680.906
−140.1840.4450.3100.2350.878
−170.0850.2730.2630.3200.667
Table 5. PSR after pulse compression for ISDRJ with SNR = −10 dB.
Table 5. PSR after pulse compression for ISDRJ with SNR = −10 dB.
JSR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
51.0461.900−4.123−4.6914.546
73.1033.761−2.894−3.7864.522
96.0645.476−0.706−2.4149.146
1111.7408.7548.7697.14612.980
1311.53012.19010.4607.53314.030
1511.98012.48011.75011.48012.850
Table 6. PSR after pulse compression for ISPRJ with SNR = −10 dB.
Table 6. PSR after pulse compression for ISPRJ with SNR = −10 dB.
JSR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
51.2531.451−4.271−4.8543.877
73.2773.159−4.510−2.8144.777
96.2395.995−1.249−2.7009.572
1111.3708.3318.0567.02113.190
1311.69012.1009.9486.76913.680
1511.72011.87011.65011.24012.040
Table 7. PSR after pulse compression for ISCRJ with SNR = −10 dB.
Table 7. PSR after pulse compression for ISCRJ with SNR = −10 dB.
JSR (dB)Different Interference Suppression Methods
STMFSTFTEFDBPPFSSEF
52.7762.665−4.075−4.6045.150
75.1285.204−2.645−4.0394.987
96.1244.783−0.165−3.01110.230
1111.2407.7769.2547.46913.950
1312.13012.40010.1707.37714.630
1511.68012.68012.16011.50014.250

Share and Cite

MDPI and ACS Style

Yu, M.; Dong, S.; Duan, X.; Liu, S. A Novel Interference Suppression Method for Interrupted Sampling Repeater Jamming Based on Singular Spectrum Entropy Function. Sensors 2019, 19, 136. https://doi.org/10.3390/s19010136

AMA Style

Yu M, Dong S, Duan X, Liu S. A Novel Interference Suppression Method for Interrupted Sampling Repeater Jamming Based on Singular Spectrum Entropy Function. Sensors. 2019; 19(1):136. https://doi.org/10.3390/s19010136

Chicago/Turabian Style

Yu, Muyao, Shengbo Dong, Xiangyu Duan, and Shangchao Liu. 2019. "A Novel Interference Suppression Method for Interrupted Sampling Repeater Jamming Based on Singular Spectrum Entropy Function" Sensors 19, no. 1: 136. https://doi.org/10.3390/s19010136

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop