The construction steps regarding a computer simulator implementation for an extended naval target as viewed by an ISAR system is presented in this paper. The analysis involves the build up of the associated conceptual model, the explanation of the applied modelling approach and the depiction of the utilised data exchange standard. Finally the verification, validation and quality focus issues of the simulator are discussed.
A stimulating problem in the generation of coherent countermeasures for high range resolution radar systems is the inclusion of angular glint effects in the preparation of the false target mask. Since angular glint is representative of extended naval targets, this inclusion increases the credibility factor of the decoy playback signal at the adversary radar-operator station. In this paper, the ability of an interferometric inverse synthetic aperture radar (InISAR) simulator to provide a proof of concept towards the clarification of this challenging task is ascertained. The solution consists of three novel vector representations of the generated data, which are proven to behave according to the laws of physics governing the glint phenomenon. The first depiction is the angular glint injection at the target which is followed by the representation of the wavefront distortion at the radar. A value-added time procession integration of the target in pure roll motion provides an expected by ISAR theory side-view image of the naval extended false target. The effectiveness of the proposed approach through verification and validation of the results by using the method of pictorial evidence is established. A final argument is raised on the usage of this software tool for actual obfuscation and deception actions for air defence at sea applications.
The formation steps leading to the creation of a computer simulator for an extended naval target as viewed by an approaching Interferometric Inverse Synthetic Aperture Radar (IF-ISAR) seeker sensor is presented in this paper. The conceptual model development, the modelling approach, the implementation results and the project success details are outlined. The novelty of this effort is the valueadded ability of the simulator to further treat the generated data for rate of change processing leading to the assembly of height information about the target under scrutiny which can be used either for friend-orfoe identification decisions or intelligent expendable decoy programming.
+PVTQFWEVKQP ,Q WKH HLJKWK HSLVRGH RI VHDVRQ ILYH RI WKH VHULHV RI ´0LVVLRQ ,PSRVVLEOHµ KHDG RSHUDWLYH 3HWHU *UDYHV LQIODWHV D OLIHVL]HG SODVWLF GHFR\ GHWDLOLQJ KLPVHOI VR WR FRQIXVH LQ RUGHU WR HVFDSH KLV RSSRVLQJ FRXQWHUSDUWV ,W FRPHV DV QR VXUSULVH WKDW WKLV HSLVRGH LV GLVWLQFWLYHO\ WLWOHG ´'HFR\µ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www.intechopen.com #PIWNCT )NKPV 4GUWNVU +UUWGU HQT /KNKVCT[ 6CTIGVU ,Q RUGHU WR LQFUHDVH WKH YDOLGLW\ RI WKH VLPXODWRU RXWSXW WR WKH DGYHUVDU\ UDGDURSHUDWRU V\VWHP WKH SKHQRPHQRQ RI DQJXODU JOLQW LV LQWURGXFHG 7KH ILUVW ...
Modern air defense at sea doctrines need to consider the emerging technology of software-defined radar. In this manner the surveillance and tracking abilities of imaging radar are implemented in software. Concurrently there exists the need to forge the other side of the same coin. The Software-defined Radar Countermeasure System (S-dRCS) might be a solution for confusing adversary radar operators. In this spirit the current contribution is the proof of concept for a S-dRCS special case called the Simulator-defined Radar Countermeasure System (Sim-dRCS). The simulator approach for imaging radar countermeasures is preferred because it provides a bespoke generation of the required signals valid for a diverse set of adversary observers, which are considered to be Inverse Synthetic Aperture Radar systems. The simulator receives input from the sensors of the Sim-dRCS and then crafts false targets matched to the heading and velocity vectors of the threat. In this case the countermeasure output is a battleship-class false naval target. The achievement of verisimility enhancement is the main requirement in order to support this deceptive stratagem.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.