2018
DOI: 10.1109/jsen.2017.2778259
|View full text |Cite
|
Sign up to set email alerts
|

Sub-Nyquist Sampling Jamming Against Chirp-ISAR With CS-D Range Compression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…where superscript H denotes conjugate transpose. As frequency off-grid error and chirp rate off-grid error should be real, ( 17) is modified to [δf (n) , δβ (n) ] = Re ((P (n) ) H P (n) ) −1 (P (n) ) H y (n) (18) where Re denotes taking the real part. Thus, the solution to the main problem (11) can be written as…”
Section: Off-grid Cs Imaging Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…where superscript H denotes conjugate transpose. As frequency off-grid error and chirp rate off-grid error should be real, ( 17) is modified to [δf (n) , δβ (n) ] = Re ((P (n) ) H P (n) ) −1 (P (n) ) H y (n) (18) where Re denotes taking the real part. Thus, the solution to the main problem (11) can be written as…”
Section: Off-grid Cs Imaging Algorithmmentioning
confidence: 99%
“…This is the off-grid problem, which has attracted considerable attention [10]- [16]. The off-grid problem can also be observed in many other application areas such as target localization, beamforming or deception jamming [17], [18].…”
Section: Introductionmentioning
confidence: 99%
“…Equation (20) shows that the x-coordinate of point A can be correctly formed by ISAR after the azimuth processing.…”
Section: B 2-d Isar Imagementioning
confidence: 99%
“…The modulation method directly determines the fidelity of the false target and the jamming effect. Various methods, such as scatter-wave jamming [20]- [22], digital image synthesizer (DIS) method [23], [24], and convolution method [25], are proposed to deal with this problem. The scatter-wave method transmits the jamming signal to the protected target instead of the radar.…”
Section: Introductionmentioning
confidence: 99%
“…In order to protect the important goals and regions of detection and observation, a variety of jamming techniques are designed against the ISAR system. Sub-Nyquist sampling jamming against the ISAR system is studied in [1][2][3][4]. In [1], sub-Nyquist jamming is used to the bistatic ISAR; by undersampling the intercepted signal of ISAR, multiple deceptive false targets will be induced and the real targets will be emerged in false targets.…”
Section: Introductionmentioning
confidence: 99%