Threat evaluation and jamming allocation

A threat evaluation and jamming allocation (TEJA) system is proposed and implemented to optimise the jamming strategy of a platform. This TEJA system accounts for the different effects of jamming techniques on threats and radar modes, the interaction between jamming techniques and channels, the relative frequency and bandwidth used by threats, the uncertainty of the threat environment, and models the progression of threats through various radar modes from initial search to final guidance. Performance of the TEJA system is evaluated for a complex mission which considers a platform with two jammers penetrating an area with ten threats. The TEJA system is shown to be computationally efficient by using an exhaustive search to determine the optimum jamming strategy. The developed jamming strategy allows the platform to survive a mission despite its complexity.

[1]  Sanguk Noh,et al.  Intelligent command and control agent in electronic warfare settings , 2010 .

[2]  Fredrik Johansson,et al.  Performance Evaluation of TEWA Systems for Improved Decision Support , 2009, MDAI.

[3]  Jasbir S. Arora,et al.  Introduction to Optimum Design , 1988 .

[4]  Pan Wei,et al.  Research on force assignment for ground-to-air radar jamming system based on chaos genetic algorithms , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[5]  Orhan Karasakal,et al.  Air defense missile-target allocation models for a naval task group , 2008, Comput. Oper. Res..

[6]  Zhuang Yi,et al.  IIGA based algorithm for cooperative jamming resource allocation , 2009, 2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia).

[7]  Qi Chen,et al.  Radar jamming resources assignment algorithm for EW real-time decision support system of multi-platforms , 2010, 2010 International Conference on Intelligent Control and Information Processing.

[8]  Robert N. Lothes,et al.  Radar Vulnerability To Jamming , 1990 .

[9]  Sanguk Noh,et al.  Autonomously Deciding Countermeasures against Threats in Electronic Warfare Settings , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[10]  Filippo Neri Introduction to electronic defense systems , 1991 .