“…A new type of network using a dual-controller generation policy was proposed. Rahmes Mark et al designed a multi-UAV countermeasure system and used Q-Learning algorithm to generate radar transmitting frequency [18]. Cevik Polat et al reduced the resource allocation problem in electronic countermeasures to an optimal allocation problem, and proposed a resource allocation algorithm based on particle swarm optimization theory [19].…”
Section: Related Workmentioning
confidence: 99%
“…That is to say, 100m of y-axis and 1m of x-axis have the same length in Figure 7. [2,18], [4,18], [6,18], [8,18], [10,18], [12,18] [x (1 m),y (100 m)]…”
Section: Map Griddingmentioning
confidence: 99%
“…The width of both mainlobe is 50 • . The relay position is always at [6,18]. The scanning mode of beam pointing is from right to left, and then from left to right.…”
The networked unmanned aerial vehicle (UAV) radar system may exploit inter-UAV cooperation for enhancing information acquisition capabilities, meanwhile its inter-UAV communications may be interfered with by external jammers. This paper is devoted to quantifying and optimizing the anti-jamming performance of networked UAV radar systems in adversarial electromagnetic environments. Firstly, instead of using the conventional metric of signal-to-interference ratio (SIR), this paper explores use of the theory of radar information representation as the basis of evaluating the information acquisition capabilities of the networked UAV radar systems. Secondly, this paper proposes a modified Q-Learning method based on double greedy algorithm to optimize the anti-jamming performance of the networked UAV radar systems, through joint programming in the frequency-motion-antenna domain. Simulation results prove the effectiveness of the algorithm in two different networking scenarios.
“…A new type of network using a dual-controller generation policy was proposed. Rahmes Mark et al designed a multi-UAV countermeasure system and used Q-Learning algorithm to generate radar transmitting frequency [18]. Cevik Polat et al reduced the resource allocation problem in electronic countermeasures to an optimal allocation problem, and proposed a resource allocation algorithm based on particle swarm optimization theory [19].…”
Section: Related Workmentioning
confidence: 99%
“…That is to say, 100m of y-axis and 1m of x-axis have the same length in Figure 7. [2,18], [4,18], [6,18], [8,18], [10,18], [12,18] [x (1 m),y (100 m)]…”
Section: Map Griddingmentioning
confidence: 99%
“…The width of both mainlobe is 50 • . The relay position is always at [6,18]. The scanning mode of beam pointing is from right to left, and then from left to right.…”
The networked unmanned aerial vehicle (UAV) radar system may exploit inter-UAV cooperation for enhancing information acquisition capabilities, meanwhile its inter-UAV communications may be interfered with by external jammers. This paper is devoted to quantifying and optimizing the anti-jamming performance of networked UAV radar systems in adversarial electromagnetic environments. Firstly, instead of using the conventional metric of signal-to-interference ratio (SIR), this paper explores use of the theory of radar information representation as the basis of evaluating the information acquisition capabilities of the networked UAV radar systems. Secondly, this paper proposes a modified Q-Learning method based on double greedy algorithm to optimize the anti-jamming performance of the networked UAV radar systems, through joint programming in the frequency-motion-antenna domain. Simulation results prove the effectiveness of the algorithm in two different networking scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.