基于生成对抗网络的伪码调相脉冲多普勒引信引导式干扰方法

Translated title of the contribution: Guided Jamming Method for Pseudo-code Phase-modulated Pulse Doppler Fuze Based on Generative Adversarial Nets

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

For the pseudo-code phase-modulated pulse Doppler fuzes, conventional guided jamming methods have low interference efficiency due to the difficulty of accurately estimating the compound modulation signal parameters in low SNR environments. A guided jamming method for the pseudo-code phase-modulated pulse Doppler fuze based on the generative adversarial nets (GAN) is presented to solve this problem, which can effectively interfere with the pseudo-code phase-modulated pulse Doppler fuze at low SNR. First, the intermediate frequency signal obtained by down-conversion of the pseudo-code phase-modulated pulse Doppler fuze is preprocessed. Then, the denoised information such as time-frequency distribution and phase is obtained. Second, the GAN model is used with the time-frequency distribution data to generate highly correlated data with the fuze intermediate frequency signal without having to estimate the fuze parameters in a low SNR environment. Finally, the fuze interference signal is reconstructed using the time-domain waveform generated by the inverse transformation of the newly generated data. Simulation and experiment results show that the guided jamming method based on GAN can achieve a better jamming effect on the pseudo-code phase-modulated pulse Doppler fuze in low SNR environments.

Translated title of the contributionGuided Jamming Method for Pseudo-code Phase-modulated Pulse Doppler Fuze Based on Generative Adversarial Nets
Original languageChinese (Traditional)
Pages (from-to)2534-2544
Number of pages11
JournalBinggong Xuebao/Acta Armamentarii
Volume43
Issue number10
DOIs
Publication statusPublished - Oct 2022

Fingerprint

Dive into the research topics of 'Guided Jamming Method for Pseudo-code Phase-modulated Pulse Doppler Fuze Based on Generative Adversarial Nets'. Together they form a unique fingerprint.

Cite this