期刊文献+

多无人机在组网雷达中的虚假目标轨迹生成 被引量:2

False Target Trajectory Generation of Multi-UAV in Radar Network
下载PDF
导出
摘要 组网雷达系统具有较强的抗干扰能力,如何对组网雷达实施行之有效的干扰,是当今电子对抗界面临的一个重大问题。多无人机对组网雷达的协同干扰是近年来新兴的一种雷达干扰方式。通过协同控制无人机的飞行轨迹,可在敌方的组网雷达系统中形成一条或多条欺骗干扰轨迹,迫使敌方加强空情处置,达到欺骗目的。主要研究如何利用最小数目的无人机生成虚假目标轨迹,从而对组网雷达实施有效的干扰。运用禁忌搜索的方法,根据无人机的限定条件,建立最小化无人机数目模型,通过对坐标点的遍历,进而分析出无人机合理的运动轨迹,并且计算出无人机在运动过程中被雷达探测到的位置的坐标。最后得出至少可以用33架无人机生成给定虚假目标轨迹的结论。 Radar Network system has strong anti-jamming ability.How to implement effective jamming to radar network is a major problem in the field of electronic countermeasures.Cooperative jamming of multiple Unmanned Aerial Vehicles(UAVs)to radar network is a new radar jamming mode in recent years.By planning the trajectories of UAVs,one or more deceptive jamming trajectories can be formed in the enemy’s radar network system,which forces the enemy to strengthen the air situation disposal and achieve the purpose of deception.This paper mainly studies how to use the minimum number of UAVs to generate false target trajectory,so as to implement effective jamming to the radar network.Using the method of tabu search,according to the limited conditions of UAVs,the model of minimizing the number of UAVs is established.Through the traverse of coordinate points,the reasonable trajectories of UAVs are analyzed,and the coordinates of the position detected by radar during the movement of UAV are calculated.The results indicate that at least 33 UAVs can be used to generate the given false target trajectory.
作者 秦蓁 周昆 孙晓丽 李艾静 QIN Zhen;ZHOU Kun;SUN Xiao-li;LI Ai-jing(College of Communication Engineering,Army Engineering University of PLA,Nanjing Jiangsu 210007,China;College of Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200240,China)
出处 《通信技术》 2019年第12期2909-2914,共6页 Communications Technology
关键词 无人机 组网雷达 欺骗干扰 虚假目标轨迹 Unmanned Aerial Vehicles(UAVs) radar network deception jamming false target trajectory
  • 相关文献

参考文献5

二级参考文献30

  • 1孙龙祥,赵波,邱卫军,严华.一种具有航迹特征的雷达假目标产生技术[J].雷达科学与技术,2005,3(4):198-202. 被引量:30
  • 2赵艳丽,王雪松,王国玉,刘义和,罗佳.多假目标欺骗干扰下组网雷达跟踪技术[J].电子学报,2007,35(3):454-458. 被引量:72
  • 3Lee II-Hyoung, Bang Hyochoong. Optimal Phantom Track Generation for Multiple Electronic Combat Air Vehicles [C]//International Conference on Control Automation and Systems in COEX. Seoul, Korea, 2008:29-33.
  • 4Maithripala, D. H. A. , Jayasuriya S. , Mears, Mark J. Phantom Track Generation Through Cooperative Control of Multiple ECAVs Based on Feasibility Analysis [ J ]. Journal of Dynamic Systems, Measurement, and Control, 2007, 129 (5) :708-715.
  • 5Xu, Y. , Basset, G.. Virtual Motion Camouflage based Phantom Track Generation through Cooperative Electronic Combat Air Vehicles [ C ]//Accepted to American Control Conference in Marriott Waterfront. Baltimore, MD, USA, 2010:5656-5661.
  • 6Mears, M.J. Cooperative Electronic Attack using Un- manned Air Vehicle [ C ]//American Control Conference. Portland, OR, June 8-10,2005:3339-3347.
  • 7P.V. Reddy, E.W. Justh and P. S. Krishnaprasad. Motion camouflage in three dimensions [ C]//Proceedings of the 45th IEEE Conference on Decision & Control. Manchester.Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006 : 3327-3332.
  • 8Glendinning P. The mathematics ofmotion camouflage [J]. Proc. R. Soc, 2004, 271: 477-481.
  • 9Xu, Y. , Basset, G.. Pre and Post Optimality Checking of the Virtual Motion Camouflage based Nonlinear Constrained Subspace Optimal Control [ C ]//AIAA Guidance, Navigation and Control Conference. Chicago, IL, August 10,2009.
  • 10Xu,Y. ,Basset,G.. Bio-Inspired Virtual Motion Camou- flage based Subspace Optimal Trajectory Design [ J ]. Submit- ted to IEEE Transaction on Control System Technology, March, 2009.

共引文献72

同被引文献14

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部