2017
DOI: 10.1049/iet-rsn.2016.0277
|View full text |Cite
|
Sign up to set email alerts
|

Threat evaluation and jamming allocation

Abstract: Abstract:A threat evaluation and jamming allocation (TEJA) system is proposed and implemented in order to optimise the jamming strategy of a platform. This TEJA system accounts for the different effects of jamming techniques on threats and radar modes, the interaction between jamming techniques and channels, the relative frequency and bandwidth used by threats, the uncertainty of the threat environment, and models the progression of threats through various radar modes from initial search to final guidance. Per… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 8 publications
(13 reference statements)
0
19
0
Order By: Relevance
“…The states in the threat model can be associated with the danger values of threats for describing how dangerous it is for an aircraft to be in the state. This new threat evaluation with Markov chains (MTE) provides two combination methods, Max‐MTE (17) and Expected‐MTE (18), based on the original Threat Evaluation (TE) methods [9]. Given that the necessary intelligence of all ground threats that would engage the aircraft has been scanned and added to a known database, menaces come from ground air defence system can be converted to danger values byDn=Pn][WsSmaxfalse(pjfalse)+WaAn+Wtfalse(1Tnfalse) Dn=jpjPn][WsSj+WaAn+Wt)(1Tn In both threat evaluation equations, Dn denotes the danger value of the n th threat, Pn denotes the probability of aircraft encounter the n th threat in the current time interval.…”
Section: Threat Evaluation Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The states in the threat model can be associated with the danger values of threats for describing how dangerous it is for an aircraft to be in the state. This new threat evaluation with Markov chains (MTE) provides two combination methods, Max‐MTE (17) and Expected‐MTE (18), based on the original Threat Evaluation (TE) methods [9]. Given that the necessary intelligence of all ground threats that would engage the aircraft has been scanned and added to a known database, menaces come from ground air defence system can be converted to danger values byDn=Pn][WsSmaxfalse(pjfalse)+WaAn+Wtfalse(1Tnfalse) Dn=jpjPn][WsSj+WaAn+Wt)(1Tn In both threat evaluation equations, Dn denotes the danger value of the n th threat, Pn denotes the probability of aircraft encounter the n th threat in the current time interval.…”
Section: Threat Evaluation Modelmentioning
confidence: 99%
“…The states and danger values in the threat evaluation model are then used to evaluate the effectiveness of the jamming allocation (JA) process. In the process, each electronic countermeasure system (ECM) device in the aircraft contains several jamming channels and each channel can implement all the jamming techniques [9, 14]: random noise (RN), smart noise (SN), intensive false targets (IFTs), range‐gate pull off (RGPO) and velocity‐gate pull off (VGPO). It is also assumed that all threats in the known database have been divided into ten different levels by frequency‐band occupancy, i.e.…”
Section: Jamming Allocationmentioning
confidence: 99%
See 3 more Smart Citations