• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming

    2023-07-04 08:02:34ZhengjieLiJunweiXieHoweiZhngJihoXie
    Defence Technology 2023年6期

    Zhengjie Li , Junwei Xie , Howei Zhng , Jiho Xie

    a Airand Missile Defense College,AirForce Engineering University,Xi'an 710051, China

    b Space Engineering UniversityofStrategic SupportForce,Beijing101416,China

    Keywords:Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming

    ABSTRACT

    1. Introduction

    Owing to exploiting uncorrelated or orthogonal signals, the multiple input multiple output (MIMO) radar shows more significant advantages than conventional phased array radar [1,2], e.g.,waveform diversity[3—7],virtual aperture[8,9],and higher system degrees of freedom [10]. As the most promising MIMO radar, the collocated MIMO(C-MIMO)radar has gained research traction and gradually entered the practical realm [2—7]. However, in modern electronic warfare(EW),the working environment of radar systems can be interfered by enemy targets, thus reducing the combat capability of radars [10,11]. In this case, even if the C-MIMO radar has superior performance, its monostatic property can not ensure that the radar system has strong anti-jamming ability. On the whole, anti-jamming is a crucial advantage for the netted radar system(NRS)over the monostatic radar system[12,13].As a typical type of the NRS,due to the application of simultaneous multi-beam(SM) scheme [14], the netted C-MIMO radar is capable of tracking multi-targets at once in its region of interest (ROI). Thus, the analysis of multiple target tracking (MTT) in the netted C-MIMO radar under EW environment is of great significance. In practice,such systems require efficient strategies of resource management to provide better tracking performance.

    Regarding the problem of resource management in the NRS,some significant works have been performed over the years[10,13—29].Generally,these works can be grouped into three parts,namely, setting up system structure [15,16], allocating beam parameters [10,13,17—20], and integration of the two parts[14,21—29]. In the first part, to solve the antenna subset selection problem, Ref. [15] proposes two operational policies based on the MIMO radar with distributed antennas for target localization.Ref. [16] derives the Cramer-Rao lower bound (CRLB) in terms of velocity estimation and then studies the problem of antenna placement to improve velocity estimation accuracy.As for the beam parameters allocation problem,Ref.[10]derives the posterior CRLB(PCRLB) for moving target state estimation and proposes a cooperative scheme for power allocation(PA)scheme in the MIMO radar with distributed antennas.Aims to improve system ability with low probability of intercept (LPI), Ref. [13] proposes a resource-aware scheme for tracking maneuvering target in the NRS. Ref. [17]further develops a standard PA scheme for MTT in clutter environment.In Ref. [18],a receive-beam assignment strategy for MTT is proposed based on the defocused transmit focused receive(DTFR) operation mode in distributed MIMO network. The collaborative power and bandwidth allocation problems in distributed radar networks are studied in Refs. [19,20] based on the LPI principle. To maximize the resource utilization of the netted C-MIMO radar [14], develops a joint scheme of beam and power allocation for MTT under the framework of centralized data fusion. On the basis of Refs. [14,21—23] carry out the studies for joint resource scheduling and parameter allocation in the distributed tracking system. To enhance the ability of maneuvering tracking in the netted C-MIMO radar system, Ref. [24] proposes a joint waveform control and resource allocation strategy. In order to improve the radar abilities of tracking and LPI in the NRS with phased arrays,according to the time division multiplexing (TDM) principle,Ref. [25] studies the joint scheduling scheme of target assignment and waveform parameter allocation. Aiming at improving system performance of localization and tracking,Refs.[26,27]develop the joint antenna selection and power allocation schemes in the distributed MIMO network. Based on the netted C-MIMO radar system, Ref. [28] proposes a joint radar scheduling and beampattern design strategy for tracking multi-targets. Ref. [29] considers sensors mounted on moving platforms, which has the characteristics of sensor location uncertainties, and further studies a joint power allocation and measurement selection strategy for MTT.

    The above literatures appear to be fruitful in providing some guidance for addressing the resource management problem in the NRS.In fact,the previous works are mainly based on ideal detection scenarios or clutter scenarios, and the resource management problems in the NRS under EW environment are not studied.Moreover, the studies on MTT in C-MIMO radar network are limited,only shown in Refs.[14,21,24,28].Technically,a strong antijamming capability of the NRS can be attributed to its spatial diversity and abundant system resources. In particular, the data fusion task and the suitable tracking performance criterion are both crucial in ensuring the effectiveness of resource allocation in the NRS [30]. As a new type of the NRS, the C-MIMO radar network system can have more flexible task scheduling freedom and LPI ability than traditional NRS,thus it has a great potential in dealing with active jamming. To be specific, each node in the network transmits orthogonal beams to perform multiple tasks simultaneously. In this case, the netted C-MIMO radar system can flexibly schedule system nodes and optimally allocate transmit parameters to fight against enemy interference according to the real-time situation in EW.As far as we know,the resource allocation scheme in the netted C-MIMO radar under EW background has not been studied yet. Specifically, electronic counter measurement (ECM)under EW environment is mainly divided into blanket jamming and deception jamming, and the active blanket jamming is the most common interference method in modern battlefield.In fact,due to the jamming signals can affect the radar measurement accuracy and may lead to low signal to noise ratio(SNR),the relative position between the radar node with the target and the radar transmit power will inevitably affect the overall tracking accuracy.

    To solve this problem,we propose a joint target assignment and power allocation (JTAPA) strategy for MTT application in the presence of self-defense blanket jamming using the netted C-MIMO radar. The main idea of this work is to optimize target assignment and power allocation to maximize the worst tracking accuracy of multiple targets carrying with self-defense jammers while meeting the real-time demand. To be specific, the resource management problems that we want to address are:(1)How many nodes should be selected as active nodes for tracking targets at every instant;(2)Which nodes are to be selected to track those targets; (3) How assigned targets can be allocated the limited power resource from active nodes.

    In this paper, the following contributions are summarized as

    (1) The JTAPA strategy is proposed for C-MIMO radar network when tracking multiple targets in the presence of selfdefense blanket jamming. At first, the network system model in the presence of self-defense blanket jamming is formulated. After that, we derive the predicted conditional CRLB (PC-CRLB) as an optimization criterion for JTAPA. As a result,the limited node resource and power resource can be optimally allocated by minimizing the worst case of PC-CRLB.

    (2) We propose a two-step solution strategy to address the JTAPA problem efficiently. Mathematically, the JTAPA problem is considered as NP-hard due to its mixed-integer optimization form Ref. [27]. In this situation, our two-step solution strategy can provide a real-time suboptimal solution by solving the formulated optimization model separately. For the target assignment part, this algorithm uses a sequential relaxation-based method to improve solution efficiency. As for the power allocation part, the local searchbased gradient project (GP) algorithm is employed to ensure a certain solution accuracy.

    (3) A closed-loop cognitive framework in the decentralized radar network is built for MTT.To ensure tracking accuracy,the decentralized particle filter track-before-detect(DPF-TBD)is used to obtain the global posterior distribution for tracked targets.The PC-CRLB are calculated based on the estimation results,which provides guidance in optimization process.In the last, the solving results are sent back to the system operate units for guiding MTT in the next cycle.

    The remaining sections are listed below.In Section 2,we present the network system model. The decentralized MTT scheme is proposed in Section 3. We establish the optimization model and then solve it in Section 4.Section 5 presents the simulation results.This paper is concluded in Section 6.

    2. System model

    Consider that a C-MIMO radar network consisting ofN≥2 widely separated radars in the 2-D space.Assuming all the radars in this network operate in decentralized manner and thenth radar is located at (xn,yn), ?n∈{1,˙˙˙,N}. There areQ≥3 far-field targets moving within the surveillance region. To simplify the analysis process, we make the following assumptions:

    (1) All targets are space-separated in the ROI,and the number of targetsQis known as priori knowledge.

    (2) All nodes are located far away from each other, so their mutual interference is not considered in this paper. Each node transmits defocused beams to illuminate its ROI and receives focused beams to extract target information,which is shown in Fig.1.

    Fig.1. Illustration of the SM mode in the C-MIMO radar.

    (3) The airborne self-defense jammer equips with the multibeam jamming system and transmits a series of narrow beams with uniform transmit power to the intercepted nodes.

    (4) Each jammer operates in the same working mode and can intercept all the radars that are illuminating its carrier, i.e.,the interception probability is set as 1.

    We introduce a binary variableun,k,qwhich denotes for target assignment result as follows:

    With the assumptions above, an intuitive illustration of the described target assignment scheme for MTT in the netted C-MIMO radar system can be seen in Fig. 2.

    Fig. 2. Work-flow of target assignment in the established model.

    2.1. Jamming signal model

    To perform jamming signal coverage to the ground-based radars, the noise frequency modulation (FM) jamming signal is generated by the self-defense jammer.The blanket jamming signal is expressed as Ref. [31].

    In this case, the baseband representation of the active blanket jamming signal received by thenth radar is given by

    where τn,k,q=Rn,k,q/cdenotes the time delay. Herein,candRn,k,qare the speed of light and the radial distance, respectively.represents the jamming power and can be expressed as [32]

    whereGJ,λJand γJrepresent the transmit antenna gain of jammer,the carrier wavelength of jamming signal and polarization mismatch loss, respectively.

    2.2. Radar signal model under blanket jamming

    Considering that the number of transmit subarrays isM,and all the subarray independently transmit orthogonal frequency-division multiplexing pulse signal, given bywherefcis the carrier frequency,Tpis the pulse width, rect(?)denotes the basic rectangular pulse envelope,φmis the initial phase of the subcarrier,and Δfis the frequency interval between adjacent subcarriers.

    In addition,the effective bandwidth and effective time width ofcan be calculated by

    wherehn,k,qdenotes the complex gain of target reflectivity,denotes the Doppler frequency,and τn,k,q=2Rn,k,q/crepresents the time delay.is the echo signal power [33].

    wherePn,k,qis the transmit power,is the antenna gain,and λnis the carrier wavelength. Herein,gn,k,q(t) represents the complex Gaussian noise, which satisfies thatgn,k,q(t)~CN(0,

    2.3. Motion model

    It is assumed that target motion follows the constant velocity(CV) model [34], with

    where I2denotes the second order identity matrix,Tsrepresents sample interval. The term of ?represents the Kronecker product operator. wk-1,q~N(0,Qk-1,q) with [35]

    Herein,κfis the noise intensity associated with motion process.

    2.4. Measurement model

    The signal to noise and jamming ratios(SNJR)in radar receivers may be low when jamming signals are present. In this case, to obtain more target information, the coherent pulse accumulation(CPA) technique [36] and the maximum likelihood (ML) [18] estimate method are adopted during the whole processes.

    Therefore, with the combination of the target assignment resultsun,k,q, the nonlinear measurement model is denoted by

    where Zn,k,qdenotes the corresponding measurement sets ofqth target from thenth node and is given by

    whereMn,k,qrepresents the number of measurements.is the single measurement information generated by real target or false alarm, given by

    wherehn(?)=denotes the nonlinear transform function for distance and azimuth and can be expressed as

    Herein,vn,k,q~denotes the measurement noisevector with the covariance

    where ρndenotes the antenna aperture. SNJRn,k,qrepresents the SNJR in thenth radar for theqth target,which is computed by[32]

    wherePg,n,kis the intensity of internal noise in receive end.Combining with Eqs.(10),(19)and(20),it can be noted that there is an inverse linear relationship between all the elements in Eq. (19)withPn,k,q. In this case, we can rewrite the measurement covariance matrix asTherefore, by increasing the transmit power to a target,the measurement error variance can be reduced to achieve higher tracking accuracy. Moreover, in the validation gate volume Wn,k,q, the false alarms are assumed to be independent and uniformly distributed, with the probability density functionp(wn,k,q) = 1/Wn,k,q.

    3. Decentralized multiple target tracking

    In this section, we develop the MTT algorithm in a distributed network as demonstrated in Fig. 3. Herein, each node provides its local estimate, and other nodes share their estimates. In this case,each node plays three roles, i.e., calculate local estimate, transmit local estimate information to other nodes, and obtain fusion estimate.

    Fig. 3. The distributed dynamic network topology with M nodes.

    Fig. 4. The C-MIMO radar network configuration.

    Fig. 5. The second target reflectivity model.

    Fig. 6. Tracking performance under scenario 1: (a) PC-CRLB; (b) RMSE.

    Fig. 7. The JTAPT results in scenario 1: (a) Target 1; (b) Target 2; (c) Target 3; (d) Target 4.

    Fig. 8. The number of nodes selected for each target in scenario 1.

    Since the particle filter(PF)performs well in nonlinear and non-Gaussian tracking systems [37], to tackle the problem of target parameter estimation under the condition of potentially low SNJR caused by jamming signals,an optimal fusion technique is used to generate the global posterior distribution based on the distributed dynamic network. After that, a weight update equation can be obtained by adopting the decentralized PF track-before-detect(DPF-TBD).

    We define a target presence variablegn,k,q∈{0,1}, 0 and 1 denote no target present and target present with respect to nodenat sample intervalk. Moreover, consider thatgn,k,qfollows the Markov process, with the state transition matrix.

    Hence, Eq. (16) is rewritten as

    3.1. Optimal fusion

    Assuming the global measurement vector can be expressed asBased on the Bayesian rule, the local likelihood functionis [38]

    Moreover, the global posterior distributioncan be computed by

    Combining with Eqs.(24)—(26),the final expression for optimal fusion can be obtained, given by

    Therefore, for the posterior PF-based target tracking algorithm,the local node only needs to transmit the posterior density function and prediction function to data fusion center, so that a global posterior likelihood function (PLF) can be solved.

    3.2. DPF-TBD algorithm

    According to the Bayesian theory, the estimation of the target state and the target presence state can be separated.Then,the joint probability density function can be decomposed into

    and

    Moreover,the rest two elements in Eq.(29)can be expressed as

    and

    where

    In addition,Cgis the normalization constant, given by

    According to the above derivation,the summary of the proposed DPF-TBD algorithm is demonstrated in Algorithm 1.

    Algorithm 1DPF-TBD Procedure.

    4. JTAPA strategy for multi-target tracking

    4.1. Derivation of tracking performance criterion

    Due to the high utilization of observation data in the derivation processes of the PC-CRLB[6,23,39],in order to satisfy the dynamic requirements in tracking process and obtain an accurate lower bound on the accuracy of the target state estimates,we set the PCCRLB as the optimization criterion [40].

    4.2. Optimization formulation

    From the mathematical perspective, the JTAPA is an optimization problem constrained by predetermined node resources and power budgets.Since the PC-CRLB can be predicted and is close to the state estimation error,we adopt the PC-CRLB as an optimization criterion. Further,when tracking multiple targets,we are trying to ensure that every target is tracked accurately.For this purpose,we use the worst case of the PC-CRLB as the objective function.

    Take into account that location and speed are measured in different units, we normalize the PC-CRLB as

    where tr(?)denotes the trace operator,Λ =?2?(1,Ts).The target assignment matrix Ukand the power allocation matrix Pkare defined as

    In practice, the NRS rarely assign all radars to track a single target due to the limited data transmission rate and bandwidth limitation [14,46]. Also, for a given NRS, due to its degrees of freedom are fixed,the maximum quantity of orthogonal beams can be synthesized at the same time is fixed irrespective of its demand[4,6,7].Hence,we set at mostL(2 ≤L≤N)nodes can be assigned to track a single target at one tracking period. Moreover, considering each node generatesM(2 ≤M≤Q)beams simultaneously to track targets.Hence,to ensure each target can be tracked,for the binary variableun,k,q, the requirement should be satisfied.

    The power budget of thenth node is given and defined asWhen the target assignment variableun,k,q=1,the corresponding powerPn,k,qshould be reasonably allocated to ensure adequate SNR for target tracking. Moreover, the transmit antennas in each node must maintain a certain level of activity.In this case,the constraints onPn,k,qmust satisfy thatAccording to the above analysis and assumptions, the optimization model can be formulated as follows:

    4.3. Solution strategy

    It can be seen that Eq. (45) shows a non-convex problem that combines the binary and the continuous variables [14,25].Although the best performance can be available by using the exhaustive search method, the solving process is more timeconsuming [23]. To solve Eq. (45) with lower complexity for computation, we develop a two-step solution strategy.

    Step 1.Target assignment with uniformly allocated power. To simplify the calculation, we assume that each active node evenly distributes power resource to their assigned targets. This enables Eq. (45) can be rewritten as

    Moreover, due to the existence of the binary variableun,k,q, Eq.(46) is considered as a NP-hard problem [15,47]. To tackle this problem,we introduce a relaxation technique[26],by replacing the binary constraintun,k,q∈{0,1} with the continuous constraintun,k,q∈[0,1]to obtain the relaxation form of the target assignment problem [48]. Thus, Eq. (46) can be obtained

    where uk,qdenotes theqth column of the matrix Uk, and the functionis expressed as

    It should be noted that the functionis monotonic decreasing with uk,q, which proof is shown in Appendix A. In this case,to solve Eq.(47)with lower computation complexity,we first relax its constraint as

    Then, the optimal solution to Eq. (49) can be obtained by[49]

    forq= 1,2,˙˙˙,Q, which yields to the inverse function

    At this point,the optimal solution vectors(forq=1,2,…Q)of the relaxed problem Eq.(49)has been obtained.In addition,the optimal target assignment resultsfor Eq.(47)can be obtained by utilizing these lemmas:

    Lemma 1.

    Lemma 2.If≤min funqand thus the solutionis optimal(?q∈{1,2,…,Q}).

    Lemma 3.If>funq(argminwhere ?q∈{1,2,…,Q},then,the qth row inThe proofs of the three lemmas are given in Appendix B.

    Based on the three lemmas, the optimal solutioncan be calculated by repeatedly solving Eq.(49)and directly settingargminThe details of the whole proposed solving process are shown in Algorithm 2.

    Algorithm 2The proposed target assignment strategy

    Step 2.Power optimization allocation under the given target assignment results. After the target assignment solutionis obtained,we then allocate the limited power budget in each active node to its assigned targets.Since the power resources in the nodes are treated separately,the node index “n”is omitted for simplicity in the next analysis. In this case, the remaining optimization formulation is expressed as

    The proposed target assignment algorithm has a complexity of O (N Q),while the exhaustive search method needs the complexity of O (2N(N Q)3).In addition,the power allocation solving algorithm has a complexity of O ((N Q)3), and the PC-CRLB calculation also has the complexity of O ((N Q)3) [50]. Hence, the operation of the proposed JTAPA strategy is with the complexity of O ((N Q)4).

    5. Simulation results

    5.1. Simulation settings

    To demonstrate the correctness of the JTAPA scheme, some numerical results are presented in this section. Assuming the netted C-MIMO radar system is consisted withN=10 nodes with a diverse geography.For briefness,the operating mode of each node is assumed to be the same.In this case,the total power budget and the effective bandwidth in thenth node are given asPn,total=30 kW and βn= 1 MHz, respectively. Moreover, the carrier frequency is set as 2 GHz, and thus the carrier wavelength is λn=0˙15 m.The total power of each self-defense jammer is set as= 90 W. There areQ=4 moving targets in the ROI, and all targets follow with the CV model.The initial motion parameters of each target are given in Table 1,and the joint configuration of radars and moving targets is shown in Fig.4,respectively.A sequence of 30 frames with sample intervalTs=5 s is utilized during each Monte Carlo trail, while the number of Monte Carlo trialNsim= 100. The number of particles satisfiesNb=Nc=400,and the value range of transmit power is[Pn,min,Pn,max] =[0˙05Pn,total,0˙8Pn,total],forn=1,2,˙˙˙,N. The number of targets simultaneously tracked by each node is set asM= 3, and the maximum quantity of active nodes assigned to track each target isL= 9. To demonstrate the effectiveness of the proposed resource-aware strategy, the worst location root mean square error(RMSE) at thekth interval is given by

    Table 1Target initial motion parameters.

    Herein,we consider two different target reflectivity models.The first reflectivity model is constant radar cross section(RCS),that is,hn,k,q= 1m2(?n,q,k). This scenario explores the effectiveness of the proposed strategy when the target reflectivity is factored out.In this case, the resource allocation results are only related to the system geometry and the jamming signals that timely associated with target assignment results. Moreover, in order to reveal the influence of the target RCS on the resource allocation results, the second target reflectivity model is established as time-varying,and the time-varying part is depicted in Fig.5,while the other RCSs stay the same as the first reflectivity model.

    In addition, three benchmarks are utilized to show the effectiveness of the proposed JTAPA strategy.

    (1) Random assignment with uniform power allocation(RAUPA). This method randomly assigns the nodes in the network to track targets, and the transmit power of each node is uniformly allocated;

    (2) Multi-start local search (MSLS) [15] assignment with uniform power allocation(MSLS-AUPA).This algorithm uses the multi-start local search to select active nodes to track targets and uniformly allocate the system transmit power.

    (3) Two-step SDP-based strategy [23]. In this algorithm, by ignoring the information reduction factor in Eq. (41), the target assignment and power allocation is formulated as a series of SDP problems and then solved by the standard optimization solver CVX [51].

    5.2. Simulation scenario 1

    In this scenario, we mainly consider the effects of the relative position of the netted C-MIMO radar system with respect with multiple targets on the resource allocation (RA) results. Thus, the first target reflectivity model is adopted.

    Figs. 6(a) and 6(b) separately show the tracking performance among the four methods with respect to the worst case of PC-CRLB and the worst case of RMSE. Obviously, the RMSE approaches the PC-CRLB as the frame increases,which justifies the effectiveness of the established resource-aware feedback system. In addition, the proposed JTAPA strategy performs best among all the benchmarks.The subfigure in Fig.6(a)demonstrates that the predicted PC-CRLB is very close to the actual PC-CRLB,which verifies the correctness of the proposed JTAPA strategy.

    The results of target assignment and power allocation for each target achieved by the proposed JTAPA strategy are shown in Fig.7.Different colors indicate the corresponding power allocated ratio,which is definedThe dark blue color denotes thatun,k,q= 0, while other areas denote thatun,k,q= 1.Fewer transmit resources are allocated to targets closer to radars,which is consistent with previous literatures [7,18,21]. This phenomenon occurs because the“MinMax”objective function tends to allocate more resources to the target when its tracking accuracy is the worst. Hence, in scenario 1, the targets which are closer to radars obtain less transmit resources, e.g., target 1 obtains the least resources from radar 1 and radar 2, and target 2 obtains the least resources from radar 10. In addition, although target 4 is far from radar 8 and radar 9, the transmit resources obtained are still quite limited. The reasons can be physically given as other assigned nodes have better angular spread condition than node 8 and node 9.

    Fig.8 depicts the number of nodesselected for each target in scenario 1. The results show that a large number of nodes are allocated to target 2,while target 4 obtains the least node resource.This phenomenon can be intuitively explained as target 2 is closer to the edge of ROI and relatively far from the other radars,while target 4 is closer to the center of ROI and relatively even to all radars.

    5.3. Simulation scenario 2

    To further supports the influence of RCS on the RA results, the second target reflectivity model is adopted in this scenario.Hence,the RA results can be simultaneously affected by the target-node distance, angular spread,and target reflectivity.

    Fig. 9 demonstrates the tracking performance in scenario 2.According to Fig.9,it can be noted that the proposed JTAPA strategy still performs better in the four RA strategies in scenario 2. Due to the weaker reflectivity in target 4,the worst tracking performance in scenario 2 has declined somewhat. In the second target reflectivity model, the tracking performance also fluctuates compared with the constant target reflectivity model in scenario 1.In Fig.9(a),it should be noted that the predicted PC-CRLB is still close to the actual PC-CRLB.

    Fig. 9. Tracking performance under scenario 2: (a) PC-CRLB; (b) RMSE.

    Fig.10 shows the JTAPA results.In contrast to scenario 1,target 4 receives more transmit resources due to reduced reflectivity. In addition, due to the higher reflectivity of target 2, the transmit resources obtained by target 2 are reduced compared to scenario 1.These results also imply the adaptive capability of JTAPA strategy.

    Fig.10. The JTAPT results in scenario 2: (a) Target 1; (b) Target 2; (c) Target 3; (d) Target 4.

    The number of nodes selected for each target is given in Fig.11 for scenario 2.As the RCSs of target 4 weaken,the nodes allocated to target 1 increase subsequently.Meanwhile,the number of nodes allocated to target 2 decreases as its contribution to the worst tracking accuracy decreases. As can be seen, target 1 and target 4 are tracked most imprecise.

    Fig.11. The number of nodes selected for each target in scenario 2.

    5.4. Discussions and analysis

    In this subsection,we further explore the timeliness of the JTAPA strategy.In our experiments,we used the MATLAB 2020b driven by the host with 3.7 GHz CPU and 16 GB RAM. The comparison of average CPU time by adopting the three optimal RA algorithms are shown in Fig.12.

    Fig.12. CPU time comparison.

    Combining the results of two simulation scenarios, we can conclude the following:

    (1) The proposed JTAPA strategy tends to assign nodes to track targets with further distance and weaker target reflectivity.Similarly, tracking errors are compensated for by allocating more transmit power to the worst-performing targets.

    (2) The results of JTAPA can be affected by the reflectivity of moving targets and their relative position relationship with each node.

    (3) In the above simulation scenarios,the predicted PC-CRLB and the actual PC-CRLB in the worst tracking case are very close,which proves the correctness and robustness of the proposed JTAPA strategy.

    (4) The proposed JTAPA possesses a better performance in realtime, and thus is more suitable in practice.

    6. Conclusions

    In this paper, based on C-MIMO radar network, a joint target assignment and power allocation strategy was put forward when tracking multiple targets in the presence of self-defense blanket jamming. The DPF-TBD algorithm is adopted to estimate target state. The PC-CRLB is derived and utilized as the optimization criterion. Moreover, an effective two-step solver is proposed and adopted for solving the optimization model. Finally, simulation results verify the effectiveness and timeliness of the proposed method.

    In the future work, more complex active blanket jamming modes will be considered, e.g., optimal assignment of jamming beam and optimal allocation of jamming power resource.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Acknowledgements

    The authors would like to acknowledge National Natural Science Foundation of China (Grant No. 62001506) to provide fund for conducting experiments.

    Appendix A

    Due to its linear constraints,Eq.(47)could be convex only if the objective function is convex.To facilitate later derivation,according to Eqs. (39) and (40), the PC-FIM can be rewritten as

    where Wk,qdenotes the prior information,represents the measurement information.Obviously,Wk,qand Yn,k,qare symmetric positive definite.Hence, Eq. (48) is reformulated as

    Appendix B

    B1. Proof of Lemma 1

    According to optimization theory [52], since ^Dkis the function value corresponding to the optimal solution of Eq. (49), Lemma 1 holds instantly.

    B2. Proof of Lemma 2

    午夜免费男女啪啪视频观看| 精品一区二区三区人妻视频| 国内揄拍国产精品人妻在线| 视频中文字幕在线观看| 热99re8久久精品国产| 久久久a久久爽久久v久久| 国产成人一区二区在线| 哪个播放器可以免费观看大片| 变态另类丝袜制服| 老司机影院成人| 午夜久久久久精精品| 看十八女毛片水多多多| 国产不卡一卡二| 一级二级三级毛片免费看| 简卡轻食公司| 99久久精品一区二区三区| 免费观看在线日韩| 我的女老师完整版在线观看| 久久国内精品自在自线图片| 国产在视频线在精品| 网址你懂的国产日韩在线| 国产 一区精品| 99九九线精品视频在线观看视频| 99热全是精品| 久久久久免费精品人妻一区二区| 欧美日本亚洲视频在线播放| 免费大片18禁| 国产精品一区www在线观看| 午夜精品国产一区二区电影 | 美女xxoo啪啪120秒动态图| 久99久视频精品免费| 天堂网av新在线| 人体艺术视频欧美日本| 亚洲国产欧洲综合997久久,| 国产精品一区www在线观看| 啦啦啦观看免费观看视频高清| 精品熟女少妇av免费看| 欧美精品国产亚洲| 51国产日韩欧美| 可以在线观看毛片的网站| 寂寞人妻少妇视频99o| 国产伦精品一区二区三区视频9| 岛国在线免费视频观看| 久久久久久久久久久丰满| 久久久久国产网址| 久久精品国产自在天天线| av在线播放精品| 久久草成人影院| 内射极品少妇av片p| 国产午夜精品久久久久久一区二区三区| 欧美性猛交黑人性爽| 国产精品一区www在线观看| 成人欧美大片| 2021天堂中文幕一二区在线观| 乱人视频在线观看| 亚洲av不卡在线观看| 成人高潮视频无遮挡免费网站| 亚洲国产精品sss在线观看| 青青草视频在线视频观看| 国产视频内射| 精品少妇黑人巨大在线播放 | 别揉我奶头 嗯啊视频| 看十八女毛片水多多多| 日韩欧美三级三区| 国产片特级美女逼逼视频| 国产日韩欧美在线精品| 国产午夜福利久久久久久| 黑人高潮一二区| 国产精品熟女久久久久浪| 真实男女啪啪啪动态图| 国产乱人视频| 日本免费a在线| 又爽又黄无遮挡网站| 久久久久免费精品人妻一区二区| 久久精品夜夜夜夜夜久久蜜豆| 毛片一级片免费看久久久久| 欧美一级a爱片免费观看看| 国产极品精品免费视频能看的| 黑人高潮一二区| 1024手机看黄色片| 欧美日本视频| 91aial.com中文字幕在线观看| 免费看美女性在线毛片视频| 亚洲国产精品久久男人天堂| 你懂的网址亚洲精品在线观看 | 小蜜桃在线观看免费完整版高清| 91av网一区二区| 69人妻影院| 晚上一个人看的免费电影| 亚洲国产精品合色在线| 最近最新中文字幕免费大全7| 午夜福利视频1000在线观看| 黄色欧美视频在线观看| 久久久久久久亚洲中文字幕| 精品国产三级普通话版| 2022亚洲国产成人精品| 哪个播放器可以免费观看大片| 99久久精品热视频| 成人国产麻豆网| 欧美一区二区国产精品久久精品| 久久精品久久精品一区二区三区| 国产美女午夜福利| 国产精品国产三级国产专区5o | 日日啪夜夜撸| av又黄又爽大尺度在线免费看 | av线在线观看网站| 亚洲,欧美,日韩| 日本免费一区二区三区高清不卡| 国产精品久久久久久精品电影| 亚洲av一区综合| 麻豆成人午夜福利视频| 亚洲不卡免费看| 久久久久免费精品人妻一区二区| av在线蜜桃| 亚洲怡红院男人天堂| 日韩强制内射视频| 最近的中文字幕免费完整| 99久久成人亚洲精品观看| 欧美激情国产日韩精品一区| 午夜福利高清视频| 欧美精品国产亚洲| 日韩欧美精品免费久久| 女的被弄到高潮叫床怎么办| 亚洲精华国产精华液的使用体验| 国产伦理片在线播放av一区| 国产伦一二天堂av在线观看| 三级经典国产精品| 日日啪夜夜撸| 97超视频在线观看视频| 国产黄片视频在线免费观看| 久久久国产成人免费| 国产精品久久电影中文字幕| 国产成人午夜福利电影在线观看| 亚洲国产高清在线一区二区三| 国产一区二区三区av在线| 麻豆国产97在线/欧美| 91精品伊人久久大香线蕉| 国产黄色视频一区二区在线观看 | 日本午夜av视频| 激情 狠狠 欧美| 亚洲国产色片| 老师上课跳d突然被开到最大视频| 免费观看在线日韩| 久久99热这里只频精品6学生 | 国产 一区精品| 有码 亚洲区| 熟女人妻精品中文字幕| 国产毛片a区久久久久| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 搡女人真爽免费视频火全软件| 最近手机中文字幕大全| av在线亚洲专区| eeuss影院久久| 禁无遮挡网站| 国产成人午夜福利电影在线观看| 亚洲综合色惰| 久久精品国产亚洲网站| 在线a可以看的网站| 又粗又硬又长又爽又黄的视频| 精品一区二区三区视频在线| 欧美日韩国产亚洲二区| 我的女老师完整版在线观看| 免费看日本二区| 最近中文字幕2019免费版| 高清av免费在线| 99热6这里只有精品| 精品酒店卫生间| 国产精品人妻久久久影院| 水蜜桃什么品种好| 欧美最新免费一区二区三区| 色哟哟·www| 91精品国产九色| 你懂的网址亚洲精品在线观看 | 久久精品熟女亚洲av麻豆精品 | 欧美激情国产日韩精品一区| 大话2 男鬼变身卡| 夜夜看夜夜爽夜夜摸| 日产精品乱码卡一卡2卡三| 亚洲怡红院男人天堂| 欧美成人a在线观看| 久久精品久久久久久久性| 亚洲丝袜综合中文字幕| 夜夜看夜夜爽夜夜摸| 亚洲av成人av| 国产黄色小视频在线观看| 日韩 亚洲 欧美在线| 欧美潮喷喷水| 亚洲av二区三区四区| 色噜噜av男人的天堂激情| 我的女老师完整版在线观看| 青青草视频在线视频观看| 少妇人妻精品综合一区二区| 联通29元200g的流量卡| 欧美区成人在线视频| 久久这里只有精品中国| av在线播放精品| 蜜桃亚洲精品一区二区三区| 欧美高清成人免费视频www| 永久免费av网站大全| 亚洲精品色激情综合| 18禁裸乳无遮挡免费网站照片| 成年av动漫网址| 少妇熟女aⅴ在线视频| 97人妻精品一区二区三区麻豆| 欧美xxxx黑人xx丫x性爽| 国产欧美日韩精品一区二区| 久久精品国产自在天天线| 1024手机看黄色片| 九草在线视频观看| 淫秽高清视频在线观看| 99热这里只有是精品50| 男人舔女人下体高潮全视频| 国产精品一二三区在线看| 欧美最新免费一区二区三区| 成人漫画全彩无遮挡| 国产色爽女视频免费观看| 国产精品无大码| 国产精品熟女久久久久浪| 国产伦在线观看视频一区| 亚洲精品色激情综合| 极品教师在线视频| 亚洲精品亚洲一区二区| 毛片女人毛片| 一级黄色大片毛片| 69人妻影院| 99热精品在线国产| 在线观看一区二区三区| 亚洲人与动物交配视频| 欧美三级亚洲精品| av卡一久久| 免费一级毛片在线播放高清视频| 亚洲av男天堂| 少妇熟女欧美另类| 欧美三级亚洲精品| 国产精品久久视频播放| 色5月婷婷丁香| 高清日韩中文字幕在线| 国产单亲对白刺激| 日韩av不卡免费在线播放| 免费搜索国产男女视频| 欧美日韩国产亚洲二区| 亚洲av福利一区| 精品久久久久久成人av| 久久国产乱子免费精品| 国产黄色视频一区二区在线观看 | 大香蕉97超碰在线| 亚洲av二区三区四区| 最近视频中文字幕2019在线8| 老师上课跳d突然被开到最大视频| 亚洲真实伦在线观看| 国产亚洲精品久久久com| 亚洲最大成人中文| 美女xxoo啪啪120秒动态图| 国产免费又黄又爽又色| 日韩大片免费观看网站 | 日韩av不卡免费在线播放| 能在线免费看毛片的网站| 国产精品99久久久久久久久| 欧美精品国产亚洲| 真实男女啪啪啪动态图| 美女国产视频在线观看| 中文字幕免费在线视频6| 午夜日本视频在线| 精品一区二区三区视频在线| 国产极品精品免费视频能看的| 日日摸夜夜添夜夜爱| 久久久久久久久中文| 色综合亚洲欧美另类图片| 成人鲁丝片一二三区免费| 边亲边吃奶的免费视频| 日本欧美国产在线视频| 国产白丝娇喘喷水9色精品| 欧美性感艳星| 亚洲人成网站在线观看播放| 听说在线观看完整版免费高清| 高清毛片免费看| 国产午夜精品久久久久久一区二区三区| 国产真实乱freesex| 波野结衣二区三区在线| 岛国在线免费视频观看| 亚洲国产日韩欧美精品在线观看| 久久久久久久午夜电影| 成人综合一区亚洲| 精品久久久久久久久亚洲| 国产人妻一区二区三区在| 精品不卡国产一区二区三区| 免费搜索国产男女视频| 少妇高潮的动态图| 国产黄片视频在线免费观看| 亚洲欧美成人精品一区二区| 综合色av麻豆| 人人妻人人看人人澡| 亚洲自偷自拍三级| 亚洲在线自拍视频| 免费播放大片免费观看视频在线观看 | 麻豆成人午夜福利视频| 三级男女做爰猛烈吃奶摸视频| 国产精品爽爽va在线观看网站| 亚洲在线自拍视频| 爱豆传媒免费全集在线观看| 老女人水多毛片| 久久精品久久久久久噜噜老黄 | 久久精品夜夜夜夜夜久久蜜豆| 国产乱来视频区| 国产一级毛片七仙女欲春2| 国产精品久久视频播放| 夫妻性生交免费视频一级片| 美女内射精品一级片tv| 免费看光身美女| 国产一区二区亚洲精品在线观看| 国产色婷婷99| 亚洲精品色激情综合| av黄色大香蕉| 亚洲综合色惰| 中文在线观看免费www的网站| 久久精品国产自在天天线| 欧美3d第一页| 欧美又色又爽又黄视频| 国产黄色视频一区二区在线观看 | 青春草国产在线视频| 边亲边吃奶的免费视频| 亚洲av免费高清在线观看| 亚洲色图av天堂| 搡老妇女老女人老熟妇| 亚洲最大成人中文| 女人十人毛片免费观看3o分钟| 国产成人一区二区在线| 欧美一区二区亚洲| 成人综合一区亚洲| 人人妻人人澡欧美一区二区| 国产高清国产精品国产三级 | 国产精品国产三级国产av玫瑰| 18禁在线无遮挡免费观看视频| 色尼玛亚洲综合影院| 成人毛片60女人毛片免费| 少妇裸体淫交视频免费看高清| 在线播放国产精品三级| 国内少妇人妻偷人精品xxx网站| 中国国产av一级| 久久精品国产99精品国产亚洲性色| 日韩国内少妇激情av| 国产精品国产三级国产av玫瑰| 中文字幕精品亚洲无线码一区| 九草在线视频观看| 草草在线视频免费看| 亚洲av免费高清在线观看| 大又大粗又爽又黄少妇毛片口| 2021天堂中文幕一二区在线观| 久久午夜福利片| 国产又色又爽无遮挡免| 少妇丰满av| 国产淫片久久久久久久久| 人妻制服诱惑在线中文字幕| 国产欧美另类精品又又久久亚洲欧美| 亚洲一区高清亚洲精品| 高清午夜精品一区二区三区| 国产亚洲最大av| 在线播放国产精品三级| 日韩精品青青久久久久久| 成人无遮挡网站| 久久久久免费精品人妻一区二区| 国产成人免费观看mmmm| 99热全是精品| 永久网站在线| 精品免费久久久久久久清纯| 黄色欧美视频在线观看| 丰满人妻一区二区三区视频av| 国产综合懂色| 亚洲国产欧美在线一区| 啦啦啦韩国在线观看视频| 床上黄色一级片| 国产欧美日韩精品一区二区| 噜噜噜噜噜久久久久久91| 午夜免费男女啪啪视频观看| 超碰av人人做人人爽久久| 亚洲,欧美,日韩| 免费观看人在逋| 久久精品国产亚洲av涩爱| 国产黄色小视频在线观看| 日本熟妇午夜| 免费搜索国产男女视频| 精品国产露脸久久av麻豆 | 97热精品久久久久久| 国产精品国产高清国产av| 国产精品久久久久久av不卡| 熟女电影av网| 好男人在线观看高清免费视频| 天堂中文最新版在线下载 | 又粗又硬又长又爽又黄的视频| 国产免费又黄又爽又色| 国产精品日韩av在线免费观看| 免费一级毛片在线播放高清视频| 精品久久久久久久久av| 国产成人午夜福利电影在线观看| 观看美女的网站| 少妇熟女aⅴ在线视频| 丝袜美腿在线中文| 插逼视频在线观看| 欧美色视频一区免费| 久久久久久九九精品二区国产| 日韩 亚洲 欧美在线| 久久久午夜欧美精品| 国产视频内射| 在线观看一区二区三区| 国产亚洲av片在线观看秒播厂 | 最近视频中文字幕2019在线8| 欧美日韩国产亚洲二区| 色播亚洲综合网| av福利片在线观看| 日韩亚洲欧美综合| 神马国产精品三级电影在线观看| 国产一级毛片在线| 亚洲伊人久久精品综合 | www日本黄色视频网| 午夜福利成人在线免费观看| 亚洲av.av天堂| 丝袜喷水一区| 精品久久国产蜜桃| 中国美白少妇内射xxxbb| 日本av手机在线免费观看| 看免费成人av毛片| 97热精品久久久久久| 亚洲第一区二区三区不卡| 亚洲欧美日韩高清专用| 国产极品天堂在线| 特大巨黑吊av在线直播| 我的女老师完整版在线观看| av专区在线播放| 亚洲av电影在线观看一区二区三区 | 日本一二三区视频观看| 久久精品人妻少妇| 成人鲁丝片一二三区免费| 男女下面进入的视频免费午夜| 精品久久久久久久久久久久久| 久久久久久久午夜电影| 国产免费男女视频| av国产久精品久网站免费入址| 国产极品精品免费视频能看的| 精品人妻熟女av久视频| 村上凉子中文字幕在线| 国产在线一区二区三区精 | 亚洲人成网站在线播| 亚洲伊人久久精品综合 | 亚洲av成人精品一区久久| 有码 亚洲区| 久久久久免费精品人妻一区二区| 亚洲av福利一区| 欧美高清性xxxxhd video| 亚洲美女视频黄频| 国产成人a区在线观看| 国产成人福利小说| 国产免费男女视频| 国语对白做爰xxxⅹ性视频网站| 成人毛片60女人毛片免费| 久久精品国产亚洲网站| 亚洲欧美成人综合另类久久久 | 成人特级av手机在线观看| 熟妇人妻久久中文字幕3abv| 午夜福利在线观看吧| 人体艺术视频欧美日本| 欧美xxxx性猛交bbbb| 美女大奶头视频| 国产乱人偷精品视频| 亚洲av福利一区| 欧美高清成人免费视频www| 岛国在线免费视频观看| 日本-黄色视频高清免费观看| 成人性生交大片免费视频hd| 成人三级黄色视频| 真实男女啪啪啪动态图| 我要看日韩黄色一级片| 成年版毛片免费区| 亚洲国产精品成人久久小说| 久久国产乱子免费精品| 丝袜喷水一区| 亚洲av电影在线观看一区二区三区 | 久久精品国产99精品国产亚洲性色| 国产伦精品一区二区三区视频9| 国产免费又黄又爽又色| 午夜亚洲福利在线播放| 美女脱内裤让男人舔精品视频| 午夜爱爱视频在线播放| eeuss影院久久| 国产高清三级在线| av在线天堂中文字幕| .国产精品久久| av女优亚洲男人天堂| 人人妻人人澡欧美一区二区| 国产乱人偷精品视频| 成年女人永久免费观看视频| 久久久久国产网址| 日韩亚洲欧美综合| 亚洲精品日韩av片在线观看| 国产精品麻豆人妻色哟哟久久 | 国产69精品久久久久777片| 亚洲精品成人久久久久久| 男女那种视频在线观看| 国产精品精品国产色婷婷| 免费无遮挡裸体视频| 国产淫片久久久久久久久| 日韩欧美精品v在线| 在线播放国产精品三级| 综合色av麻豆| .国产精品久久| 水蜜桃什么品种好| 国内揄拍国产精品人妻在线| 可以在线观看毛片的网站| 免费观看性生交大片5| 永久网站在线| 久久精品国产99精品国产亚洲性色| 色吧在线观看| 日韩在线高清观看一区二区三区| 久久午夜福利片| 日韩av在线免费看完整版不卡| 99热这里只有精品一区| 国产伦精品一区二区三区视频9| 久久精品国产亚洲av天美| 亚洲怡红院男人天堂| 99久国产av精品国产电影| 热99re8久久精品国产| 深夜a级毛片| 一卡2卡三卡四卡精品乱码亚洲| 黄片wwwwww| 国产精品蜜桃在线观看| 成人国产麻豆网| videos熟女内射| 长腿黑丝高跟| 黄色欧美视频在线观看| 亚洲国产欧洲综合997久久,| 中文字幕久久专区| 国产成人精品婷婷| 精品国内亚洲2022精品成人| 中文精品一卡2卡3卡4更新| 精品久久久噜噜| 99在线人妻在线中文字幕| 波多野结衣巨乳人妻| 深爱激情五月婷婷| 欧美激情久久久久久爽电影| 亚洲国产精品成人综合色| 人人妻人人澡人人爽人人夜夜 | 成人毛片a级毛片在线播放| 久久国内精品自在自线图片| 精品熟女少妇av免费看| 一本一本综合久久| 三级国产精品欧美在线观看| 国产人妻一区二区三区在| 久久欧美精品欧美久久欧美| 欧美丝袜亚洲另类| av在线观看视频网站免费| 免费看日本二区| 午夜a级毛片| 高清在线视频一区二区三区 | 午夜老司机福利剧场| 欧美日韩一区二区视频在线观看视频在线 | 久热久热在线精品观看| 久久久久精品久久久久真实原创| 中文字幕人妻熟人妻熟丝袜美| av免费在线看不卡| 国产精品不卡视频一区二区| 性色avwww在线观看| 中文欧美无线码| 天堂网av新在线| 久久6这里有精品| 日韩人妻高清精品专区| 高清在线视频一区二区三区 | 亚洲丝袜综合中文字幕| 久久韩国三级中文字幕| 中文字幕av成人在线电影| 色尼玛亚洲综合影院| 青春草亚洲视频在线观看| 欧美三级亚洲精品| 晚上一个人看的免费电影| 男女边吃奶边做爰视频| 小说图片视频综合网站| 国产成人aa在线观看| 亚洲国产精品sss在线观看| 国产久久久一区二区三区| 亚洲18禁久久av| 国产午夜精品一二区理论片| 亚洲欧美日韩卡通动漫| 欧美三级亚洲精品| 麻豆乱淫一区二区| 久久精品久久久久久噜噜老黄 | 国产成人免费观看mmmm| 99热这里只有是精品50| 国产亚洲午夜精品一区二区久久 | 亚洲va在线va天堂va国产| 日韩欧美 国产精品| 麻豆精品久久久久久蜜桃| 看非洲黑人一级黄片| 国产色爽女视频免费观看| 国产一区二区在线av高清观看| kizo精华| 亚洲aⅴ乱码一区二区在线播放| 国产老妇女一区| 午夜爱爱视频在线播放| 亚洲自拍偷在线| 国产精品久久电影中文字幕| 久久久久久久久久黄片| 国产在线男女| 一级二级三级毛片免费看| 黄色日韩在线| 成人性生交大片免费视频hd| av播播在线观看一区| 国产在线一区二区三区精 | 国产精品电影一区二区三区| 午夜福利在线观看吧| 成人三级黄色视频| 国产在线男女| 2021少妇久久久久久久久久久| 最新中文字幕久久久久| 18+在线观看网站| 久久久色成人| 久久99热这里只有精品18| 久久精品国产亚洲av涩爱|