scispace - formally typeset
Search or ask a question
Author

Guoyu Wang

Bio: Guoyu Wang is an academic researcher from National University of Defense Technology. The author has contributed to research in topics: Radar & Inverse synthetic aperture radar. The author has an hindex of 8, co-authored 26 publications receiving 230 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: It is demonstrated that deceptive false-target images will be induced by the under-sampled pulses which are retransmitted to a moving target and scattered by it under the principles of bistatic ISAR configuration.
Abstract: Bistatic inverse synthetic aperture radar (ISAR) operates with spatially separated transmitting and receiving antennas. This study presents a method capable of generating deceptive images from a series of intercepted bistatic ISAR chirp pulses. It is demonstrated that deceptive false-target images will be induced by the under-sampled pulses which are retransmitted to a moving target and scattered by it under the principles of bistatic ISAR configuration. Additionally, the jamming idea is proved to be applicable based on the characteristics of the false-target images and the requirement of jamming power. A scattering model of Yak-42 plane with 330 point scatterers is adopted to verify the effectiveness of the jamming idea.

72 citations

Journal ArticleDOI
TL;DR: An inverse omega-K algorithm is proposed and an accurate and an approximate implementation scheme of the algorithm are presented that can achieve full focus with no regard to the squint angle and synthetic aperture of radar.
Abstract: Deceptive jamming against synthetic aperture radar (SAR) receives intensive interests during the past decade. However, it is still a challenging task to design a jamming method that is competent both in focus capability and in computational efficiency, especially in the case where jammer is confronted with SAR with significant squint angle and long synthetic aperture. In this paper, we propose an inverse omega-K algorithm and present an accurate and an approximate implementation scheme of the algorithm. The accurate scheme can achieve full focus with no regard to the squint angle and synthetic aperture of radar. Its computations include fast Fourier transform (FFT), Stolt interpolation, and complex multiply. Advantage of computational efficiency can be achieved under assumption that the support region of radar can be crudely evaluated a priori so that the most time-consuming Stolt interpolation can be done offline. The support region is determined by carrier frequency and bandwidth of radar signal, pointing direction, and azimuth beam width of radar antenna. For the case in which the support region of radar is not available to jammer beforehand, the approximate scheme is a remedy. By substituting the Stolt interpolation with Chirp-Z transform (CZT), the approximate scheme is readily fit for parallel computation and hence appealing for its high efficiency. However, the focus criterion exerts a limitation on range scale of electromagnetic deception when the squint angle of SAR is large. Both implementation schemes are verified by simulation results.

41 citations

Journal ArticleDOI
TL;DR: The reconstruction of moving targets' HRRP through CS-based matched filtering algorithms shows that the sub-Nyquist sampled jamming signals, formed by the under-sampled radar signals in scatter-wave jamming configuration, provide a capability of deception jamming.
Abstract: As recently demonstrated, compressive sensing (CS) is potential in exact recovery of an unknown sparse signal from very limited samples. In this paper, sub-Nyquist sampling jamming against inverse synthetic aperture radar (ISAR) imaging is presented, where the CS-based algorithm is applied to the high-resolution range profile (HRRP) reconstruction other than the Doppler profile reconstruction. The reconstruction of moving targets’ HRRP through CS-based matched filtering algorithms shows that the sub-Nyquist sampled jamming signals, formed by the under-sampled radar signals in scatter-wave jamming configuration, provide a capability of deception jamming. The finally reconstructed ISAR images show that the deceptive false-target images retaining the real target information will be induced. Hence, the rational utilization of sub-Nyquist sampling jamming can generate vivid decoys in ISAR countermeasures. Experimental results of the scattering model of the Yak-42 plane are used to verify the correctness of the jamming idea.

27 citations

Journal ArticleDOI
TL;DR: The influence of intelligence gathering inaccuracy, especially the estimate error of radar kinematic parameter, on the performance of deceptive jamming against synthetic aperture radar (SAR) is studied, and an equivalence relationship between non-ideal jamming and ground moving target is derived and verified.
Abstract: The influence of intelligence gathering inaccuracy, especially the estimate error of radar kinematic parameter, on the performance of deceptive jamming against synthetic aperture radar (SAR) is studied in this paper, filling a knowledge vacancy in the field of SAR electronic countermeasures. For the first time, an equivalence relationship between non-ideal jamming and ground moving target is derived and verified in raw phase history data domain and radar image domain. A novel and elegant way to quantify the defocus and displacement of false target in radar image is proposed based on the equivalence relationship. Work presented in this paper can guide the design of jammer’s intelligence gathering subsystem and optimize jamming configuration, from the view of jammer. The results also avail electronic counter-countermeasures, from the view of radar.

20 citations

Journal ArticleDOI
TL;DR: This paper presents a three-point model for signature extraction availing the characteristics of the high resolution range profiles (HRRPs) of rotating targets with stepped-frequency signal (SFS) and demonstrates the accuracy and efficiency of the estimation.
Abstract: Motion or structure signatures, extracted from radar echoes, are of great potential in target identification. Traditional techniques for signature extraction rely primarily on the assumption that the time series of the signal contains at least one oscillation or more during the illumination time. However, as many applications involve short duration signals or long duration signals, they are only partially useful in real-world scenarios. The conventional signature extraction algorithms may suffer from degraded precision. This paper presents a three-point model for signature extraction availing the characteristics of the high resolution range profiles (HRRPs) of rotating targets with stepped-frequency signal (SFS). The frequency and the length of rotating targets can be estimated accurately from a fraction of the HRRPs in slow-time-range plane. The accuracy and efficiency of the estimation are demonstrated by simulated and experimental trials.

15 citations


Cited by
More filters
01 Jan 2016
TL;DR: In this paper, the authors present the principles of optics electromagnetic theory of propagation interference and diffraction of light, which can be used to find a good book with a cup of coffee in the afternoon, instead of facing with some infectious bugs inside their computer.
Abstract: Thank you for reading principles of optics electromagnetic theory of propagation interference and diffraction of light. As you may know, people have search hundreds times for their favorite novels like this principles of optics electromagnetic theory of propagation interference and diffraction of light, but end up in harmful downloads. Rather than enjoying a good book with a cup of coffee in the afternoon, instead they are facing with some infectious bugs inside their computer.

2,213 citations

Journal Article
TL;DR: The Micro-Doppler Effect in Radar by V. C. Chen as discussed by the authors is a book review of "The Micro Doppler effect in radar" by Chen et al. 2011. 290pp + diskette.
Abstract: This is a book review of 'The Micro-Doppler Effect in Radar' by V. C. Chen. Artech House, 16 Sussex Street, London, SW1V 4RW, UK. 2011. 290pp + diskette. Illustrated. £90. ISBN 978-1-60807-057-2.

439 citations

Journal ArticleDOI
TL;DR: The mathematic principles of ISRJ against LFM radars, which utilize matched-filter processing, stretch processing, and range-Doppler processing, are developed and the key jamming elements, which determine these false-target characteristics, are pointed out and analyzed in detail.
Abstract: Interrupted-sampling repeater jamming (ISRJ) provides a novel coherent-jamming mode against wideband radar. ISRJ allows the single-antenna jammer to periodically sample and repeat a fraction of the intercepted signal, which reduces the sampling rate and achieves transmit-receive isolation. The coherent-jamming signal generated by ISRJ can form multiple verisimilar false targets when received and processed by the victim radar receiver. Moreover, some false targets can precede the real target. This paper surveys the use of ISRJ in linear frequency modulated (LFM) radar jamming. The theory and application of ISRJ has been researched for more than one decade, but what is missing is a completed summary for the framework of this technique. In this paper, mathematic principles of ISRJ against LFM radars, which utilize matched-filter processing, stretch processing, and range-Doppler processing, are developed. The unique jamming effects in radar systems are focused on when the interrupted sampling frequency of the jammer is smaller than the bandwidth of the radar signal. Specifically, the false-target characteristics, including amplitude, space distribution, and phase, are discussed, respectively. On this basis, the key jamming elements, which determine these false-target characteristics, are pointed out and analyzed in detail. At last, simulation and real data are used to verify the correctness of the analyses. Experimental results highlight the potential application of the proposed jamming mode.

113 citations

Journal ArticleDOI
TL;DR: This article deals with the problem of adaptive target detection in the presence of homogeneous Gaussian interference with frequency diverse array multiple- input multiple-input multiple-output radar.
Abstract: This article deals with the problem of adaptive target detection in the presence of homogeneous Gaussian interference with frequency diverse array multiple-input multiple-output radar. Adaptive detectors are devised according to the generalized likelihood ratio test criterion, where the position of the target within each range cell is assumed unknown. To obtain the maximum likelihood estimate of the target incremental range under the $H_1$ hypothesis, three different optimization strategies are pursued. They are, respectively, based on semidefinite programming, discrete grid search, and Newton method. At the analysis stage, a detection performance comparison is carried on among the new proposed adaptive detectors, benchmark, and mismatched receivers. Numerical results corroborate the effectiveness of the developed receivers.

73 citations

Journal ArticleDOI
TL;DR: It is demonstrated that deceptive false-target images will be induced by the under-sampled pulses which are retransmitted to a moving target and scattered by it under the principles of bistatic ISAR configuration.
Abstract: Bistatic inverse synthetic aperture radar (ISAR) operates with spatially separated transmitting and receiving antennas. This study presents a method capable of generating deceptive images from a series of intercepted bistatic ISAR chirp pulses. It is demonstrated that deceptive false-target images will be induced by the under-sampled pulses which are retransmitted to a moving target and scattered by it under the principles of bistatic ISAR configuration. Additionally, the jamming idea is proved to be applicable based on the characteristics of the false-target images and the requirement of jamming power. A scattering model of Yak-42 plane with 330 point scatterers is adopted to verify the effectiveness of the jamming idea.

72 citations