• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption

    2023-11-11 04:07:52JinfengLiJinDiXinhongHoXiopengYnXinweiWng
    Defence Technology 2023年10期

    Jin-feng Li , Jin Di ,*, Xin-hong Ho ,b, Xio-peng Yn ,b, Xin-wei Wng

    a Science and Technology on Electromechanical Dynamic Control Laboratory, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing,100081, China

    b BIT Tangshan Research Institute, Beijing,100081, China

    Keywords:Interrupted-sampling repeater jamming(ISRJ)Radio frequency proximity sensors (RFPS)Chaotic stream encryption Air target recognition Identity (ID) decryption

    ABSTRACT The interrupted-sampling repeater jamming (ISRJ) can cause false targets to the radio-frequency proximity sensors (RFPSs), resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity (ID) to each RFPS, and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part, a high-resolution range profile (HRRP) can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise, the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes, which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio (PSLR) and bit error rate (BER) indicates that the proposed method performs well within a 70-kHz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs).

    1.Introduction

    A radio-frequency proximity sensor (RFPS) works in an ultrashort range with low power.However,its air target detection ability is severely threatened by interrupted-sampling repeater jamming(ISRJ).Fig.1 shows an air target detection and jamming scenario of an RFPS.The function of the jamming pod is to jam and cause the false target to the RFPS before it can detect and track the target.Once the signal transmitted by the RFPS is perceived by the target,the jamming pod in the target can generate the jamming signal for protecting the target from being detected and attacked [1], and thus the jamming area is usually between the RFPS and the target area.

    ISRJ is a kind of instantaneous deceptive jamming approach that is highly coherent with the target echo.The jamming pod samples a short piece of the signal produced by the RFPS and immediately transmits it back with frequency or delay modulation.The processing gain of the pulse compression system of an RFPS is not sufficient to eliminate ISRJ; thus, the range profile peak of ISRJ exceeds the target detection threshold and finally causes a false target [2-6].Due to its high coherence with real target echoes, a jamming pod can generate different kinds of false targets while using relatively little power.These characteristics of ISRJ pose great challenges for target detection with RFPSs.In addition, since ISRJ can jam an RFPS during the current pulse period through immediate retransmission, it is difficult to effectively suppress ISRJ with typical anti-jamming designs,such as frequency agility and binary phase-coded pulse compression [7-9].Therefore, an effective air target recognition method against ISRJ is urgently needed for RFPSs to identify real targets and false targets caused by ISRJ.

    Fig.1.The air target detection and the jamming scene in the self-defense of the target.

    Zhang et al.[10]proposed an ISRJ recognition method based on phase-coded signal processing, the simulation has verified its applicability for recognizing and suppressing direct forwarding ISRJ,but the selection of phase-encoded signals has a great impact on the recognition performance.Ref.[11]suppressed ISRJ using the singular spectrum entropy function, the results showed that the proposed method can increase the target detection probability,but the embedded matrix which is designed based on the simulation data may not work well in the real target detection scenario.The statistical features of the HRRP of radar were applied for jamming and target recognition [13], which improved the recognition accuracy.Ref.[14] extracted frequency entropies and peak-to-peak ratios for target recognition.Ref.[15] proposed an anti-jamming method for airborne radar based on moving target detection and feature extraction.Numerical results had been provided to verify the efficiency of the proposed algorithms.Ref.[16] presented an adaptive anti-jamming method based on a game model, the antijamming strategies are dynamically adopted according to their payoffs, but its anti-jamming performance against ISRJ is not discussed.Ref.[17] proposed a specific feature extraction method for characterizing radar systems, and it can be used for recognizing jamming signals and target echoes.Refs.[18,19]use empirical mode decomposition (EMD) and quadratic time-frequency analysis methods to extract fingerprint characteristics in waveforms, and the simulations verified its high efficiency.Wu et al.[20] used variance values to classify ISRJ signals and target echoes, and numerical experiments verified the promising performance of this approach.Wen et al.[21]utilized a time-space domain information fusion method for radar signal identification; this approach could deal with uncertain information when processing a radar signal.However,their recognition accuracy was sensitive to noise,limiting the applicability of their approach at low SNR.

    In addition, convolutional neural networks [22,23] were increasingly applied to perform target and jamming signal recognition for radar sensors.The results yielded a high recognition accuracy for targets and jamming signals,but the computational complexity is still a major issue limiting their applications on RFPSs.Besides,some aperiodic waveforms had been designed against jamming.Refs.[24,25]proposed chaotic modulated waveforms to suppress the ISRJ effectively.A frequency-hopping waveform had been designed in Ref.[26] for target recognition, and the jamming could be identified through the frequency-hopping pattern presented in the article, but it only discussed its application on a multiple-input multiple-output radar system.Hanbal et al.[27] proposed a waveform agility method against the ISRJ with frequency shifting.Although the simulation has proved its effectiveness, the lack of experimental verification makes it difficult to verify the performance of the algorithm in real jamming scenarios.

    Motivated by the gaps in the existing literature mentioned above,a new method using chaotic stream encryption is proposed in this article to improve the air target recognition performance against the ISRJ, especially when the JSRs and SNRs deteriorate.Innovation and contribution in this work can be summarized as follows:

    1) We designed a unique ID for each RFPS based on the analysis of the influence of the ISRJ on the RFPS.The RFPS ID is encrypted intentionally in the transmitted signal with the binary chaotic sequence, which enables the RFPS to contain unique information in its transmitted signal.

    2) The HRRPs of typical multi-scattering air targets are obtained,and the resolution of the designed waveform is analyzed and verified by pulse compression with the designed binary chaotic sequence.In addition,the SVD method is applied to suppress the noise of the HRRP,and it is also helpful for the following target recognition.

    3) We proposed an air target recognition method using chaotic stream encryption.Once the target echo or jamming is received,the ID contained in the target echo can be decrypted by the reference decryption chaotic sequence, and thus the target can be identified.Although the ISRJ also contains repeated segments of the RFPS signal,the ID and encryption sequences are partially lost and messed up due to the retransmission mode of the ISRJ.Therefore, the target and false targets caused by ISRJ are recognized.The Monte Carlo simulations show that the target recognition accuracy of the proposed method maintains a high level greater than 90% at different SNRs and JSRs.

    The rest of the paper is organized as follows.Section 2 introduces the transmitted signal design with chaotic encryption.In Section 3, the HRRP is introduced, and the air target recognition process using chaotic stream encryption is analyzed.The adaptability analysis is analyzed in Section 4.Experimental and Simulation results are illustrated in Section 5.The conclusions and extensions of future work are illustrated in Section 6.

    2.Waveform design of a transmitted signal with chaotic encryption

    The unique subtle features possessed by the transmitted signal of an emitter can be used to identify the echo and jamming signals.However, the subtle features of waveforms are unstable and difficult to extract, especially at low SNRs.Therefore, a unique ID that consists of 7-bit ASCII codes is designed for every RFPS, and there are 27kinds of RFPS IDs.

    The RFPS ID is expressed as

    where PτMrefers to a unit pulse,of which width is τMand yn?{0,1}is the binary code of the given RFPS ID.Fig.2 shows the pulse code modulation (PCM) process of the RFPS ID.

    To ensure the confidentiality of the ID,it should be encrypted in the waveform of the RFPS.The available encryption methods can be divided into block encryption and stream encryption [28,29].The confidentiality of block encryption is high, but its avalanche characteristics and high computational complexity limit its application in RFPSs.Stream encryption continuously encrypts the given data bit by bit and thus has the advantages of a simple structure and low computational complexity.High randomness and diversity are required for encryption sequences so that the cipher text can be effectively protected.Chaotic systems are widely used in encryption because of their good randomness and initial value sensitivity,which guarantee the feasibility of generating a large number of different chaotic sequences[30,31].The Henon map[32]is a typical chaotic map that can be expressed as

    Fig.2.PCM process of the RFPS ID, e.g.ID = ”R”.

    where a?[0,1.4] and β?[0.1,0.3] refer to the bifurcation parameters of the Henon map.Then, a binary chaotic sequence can be obtained through the conversion in Eq.(3).

    where Zk(t)is the binary chaotic sequence,k is the random key that can control the generation of the binary chaotic sequence(which is determined by the values of a and β), N and τZare the length and width of Zk(t),respectively,and τZ=τM/N.zn(k)is the binary code of Zk(t),and zn(k)?{0,1}.

    Then, the RFPS ID will be encrypted with Zk(t), and the encrypted sequence can be expressed as

    where Ekis the encryption algorithm with the key k, ⊕is the exclusive-OR operator, Ciis the encrypted ID and Ci?{0,1}.

    The final RFPS signal that has been chaotically encrypted is

    where Utand Tmare the amplitude and pulse width of St(t),respectively,and Tm=7NτZ.ω0is the carrier frequency.The period of the RFPS ID is Tr, and K = 0,±1,±2,….

    The encrypted chaotic sequences Zk(t) are aperiodic as the key changes in every ID period.The processes of modulation and encryption are shown in Fig.3.

    3.Ranging and air target recognition against ISRJ with chaotic sequence and id decryption

    The process of obtaining the received signal can be divided into two parts: ranging and ID decryption, as shown in Fig.4.In the ranging part, the HRRP is obtained through pulse compression.In the ID decryption part,the ID of the RFPS is obtained via the chaotic decryption process.

    3.1.High-resolution ranging by pulse compression with the encrypted binary chaotic sequence

    An ambiguity function is an effective tool for measuring the detection performance of a signal.The complex envelope of a transmitted signal St(t) is

    The single-period ambiguity function of the waveform based on chaotic stream encryption can be deduced as

    Fig.3.Modulation and encryption processes of the encrypted RFPS signal.

    Fig.4.Block diagram of the ranging and ID decryption processes for the RFPS.

    Fig.5.The 3D map and contour of the ambiguity function for the proposed signal: (a) 3D map of the ambiguity function; (b) The contour of the ambiguity function.

    where τ and ξ refer to the time delay and frequency offset,respectively.Fig.5 shows the 3D map and contour of the ambiguity function for the proposed signal, and the thumbtack ambiguity map shows the high resolution of the waveform encrypted with the chaotic sequence.

    To verify the ranging performance of the proposed sequence,the multi-scattering target echoes are collected.The demodulated signal from a multi-scattering target consisting of Kr scatters is expressed as

    where τxand Uxare the delay and amplitude of the echo of the xth scatter, respectively.ωdand φrrepresent the Doppler angular frequency and the initial phase of Srm(t).

    The range profiles can be obtained by pulse compression with the encrypted binary chaotic sequence, as shown in Eq.(9).

    where Amis the amplitude of the reference signal,τpis the preset delay time for the local reference signal,p =1,2,…,P,and P is the number of range gates.

    To test the ranging performance of the designed signal, the multi-scattering models of two typical air targets are built using the physical optics (PO) method.Fig.6(a) and 6(c) are the scattering models of different targets,and Fig.6(b)and 6(d)are the HRRPs of targets obtained by conducting pulse compression on the proposed signal.The results show that the proposed signal can achieve highrange resolution for typical air targets through pulse compression with the chaotic sequence.

    Fig.6.The HRRPs of two targets obtained by pulse compression with the encrypted binary chaotic sequence:(a)The multi-scattering model of a helicopter;(b)The multi-scattering model of a fighter; (c) The HRRP of the helicopter target; (d) The HRRP of the fighter target.

    3.2.Preprocessing using SVD

    The clutter and noise are harmful to target detection, and it is necessary to suppress the clutter and noise for target detection.SVD is an important matrix factorization in linear algebra,and has been applied in denoising.The SVD method decomposes signals according to the value of the signal components.The clutter and noise will be significantly suppressed by setting the small and useless signal components to 0.The primary step of SVD is to construct the Hankel matrix A,α is the discrete signal sequences.

    The singular value of matrix A is the arithmetic square root of q non-negative eigenvalues of AAHor AHA, as shown in Eq.(13).

    The value of σiis related to the energy of the signal component it represents.Generally, the target signal has a big singular value while the clutter and noise have a small singular value, thus they can be suppressed by setting small singular values to 0.Assume that A(k)=UΣkVH≈A , Σk=Σki=1σicontains k largest singular values, and others are set to 0.The value of k can be obtained through the following steps:

    Step 3.break and return the value of k,where T is a threshold which is close to 1.In Fig.7(b)-(d), we reserve different biggest singular values of the Hankel matrix(k=7,5,and 3).As shown in Fig.7,the smaller the value of k is,the better the noise suppression performance,but the target profile will also be affected.Therefore,the value of k needs to be determined according to specific requirements.

    3.3.Air target recognition through chaotic RFPS ID decryption

    Generally,there are three typical kinds of retransmission modes for ISRJ signals, including the repeated retransmission mode, the direct retransmission mode,and the periodic retransmission mode,as shown in Fig.8.

    In the repeated retransmission mode,the jamming pod samples a piece of the signal of the RFPS and repeats it until reaching the next sample.In the direct retransmission mode, the jamming pod retransmits the last samples of the signal directly without repetition.In the periodic retransmission mode, all previous samples of the signal are retransmitted during each sampling interval.The jamming signal pieces provided by the three retransmission modes are repeated and arranged in different patterns,forming a different false target distribution in the range profiles through pulse compression, as shown in Fig.9.

    Fig.8.The three typical retransmission modes for ISRJ signals.

    Fig.9 shows that the ISRJ signals can generate densities and variable false targets through different retransmission modes with frequency and delay modulation.In addition, the amplitude of a false target may exceed that of the real target while the ISRJ signals are transmitted with high power.Therefore, the RFPS is unable to recognize the target and ISRJ through the amplitude of the range profile alone.

    To distinguish the real target from the false target caused by ISRJ,this article designed a method using chaotic stream encryption and decryption.The complete recognition flow is shown in Fig.10,Once the target echo or ISRJ is received by the RFPS,the target echo or jamming signal will be decrypted by the reference chaotic decryption sequence in the binary maximum likelihood detector.Next, the decoder will transfer the binary code to the ASCII code(which is the decrypted ID).Finally, the decrypted ID is compared with the ID of the RFPS.The target echo is recognized only if the decrypted ID is equal to the ID of the RFPS, otherwise will be recognized as jamming.Herein, the ID of the RFPS is set as “R” for example.

    To obtain the RFPS ID from the target echo, the demodulated signal Srm(t) need to be decrypted by the reference chaotic decryption sequence Zk

    (t-τp

    ).The decrypted ID sequence through the binary maximum likelihood detection is

    where Ajand ωjrefer to the amplitude and carrier wave frequency of ISRJ,Δτjis the modulated delay of the ISRJ,Tjrepresents the ISRJ retransmit period.Once the RFPS receives an ISRJ signal, the downconversion output in a single retransmission period can be expressed as

    where Ajmandωjmare the amplitude and carrier frequency of the ISRJ signal generated by the jamming pod,respectively.Δτjmrefers to the transmission delay, CJ(t-Δτjm) denotes the encrypted sequences intercepted and repeated by the jamming pom, the original phase of the jamming signal is φjm,and φjmcan be set to 0 for the convenience of analysis.Next, Sjm(t) is decrypted by the local binary chaotic decryption sequences,and the decrypted sequences are

    The decryption result is shown in Fig.11 for the verification of the decryption process.The ASCII code“R”is assigned to the RFPS,and the transmitted ID is shown in Fig.11(a).Once the echoes of air targets are received by the RFPS, they are decrypted with the reference chaotic decryption sequence Zk

    (t-τp

    Fig.10.The identification flow of target and ISRJ based on ID decryption and recognition.

    ).The decrypted IDs obtained from the echoes of the two targets shown in Fig.11(b)and 11(c) are the same as the transmitted ID of the RFPS, which means that the received signal is derived from the target,and thus the target echoes are recognized.Fig.11(d)is the decrypted ID from the ISRJ,which shows that the decrypted ID is not“R”.The reason is that even if the ISRJ contains repeated segments of the RFPS signal,the ID and encryption sequences are partially lost and messed up because of the retransmission mode of the ISRJ.Therefore, the target and false targets caused by ISRJ can be recognized through the decrypted ID.

    4.Adaptability analysis

    4.1.BER analysis

    The recognition accuracy is mainly affected by the bit error rate(BER) that can be obtained by the complementary error function[33].Fig.12 shows the BERs yielded at different processing gains(G)and SNRs,and G =This shows that the BER is relatively low and that the proposed method can achieve high ID recognition accuracy when G ≥10 and SNR ≥- 10 dB.

    According to Eqs.(9) and (13), the pulse compression and ID decryption processes are affected by the Doppler frequency.For the pulse compression process, the processing gain and the PSLR deteriorate if the Doppler shift is relatively high.For the ID decryption process,a high Doppler shift leads to a false result being produced by the correlation detector, and thus, the BER also rises.Therefore,it is necessary to study the influence of the Doppler shift on pulse compression and the ID decryption process.Herein, we adopt the PSLR and BER to measure the performance of pulse compression and ID decryption.

    4.2.Doppler tolerance analysis

    The PSLR is typically used to measure the quality of pulse compression properties, and the PLSR of the binary chaotic sequence C(t) is expressed as Eq.(20).Large PSLR values indicate better pulse compression properties.

    where σ and u refer to the standard deviation and mean of the correlation-side lobe region of C(t), respectively.In the pulse compression process, the PSLRs of C(t) at different Doppler frequencies and sequence lengths N are shown in Figs.13 and 14.

    As shown in Fig.14, the Doppler tolerance decreases as the sequence length increases.When N = 100, the PSLR rapidly decreases when the Doppler shift is higher than 70 kHz,and the HRRP obtained through pulse compression is severely affected.

    Moreover, the BERs of the ID decryption process at different Doppler shifts and sequence lengths are shown in Fig.15.The BER increases rapidly when the Doppler shift exceeds 70 kHz,which is consistent with the PSLR in Fig.14.Therefore,the proposed method can perform well within a 70-kHz Doppler shift.

    4.3.Complexity analysis

    The bit-wise-exclusive-OR in the encryption and decryption process can be regarded as an addition modulo 2 operation, the N chips modulo 2 operations include N times addition operations.If the complexity of an addition operation is defined as,and then the algorithm complexity of the N chips modulo 2 operations can be defined as Therefore,the complexity of an encryption or decryption process is.The durationof thetarget signal iscorrelated withthe chip widthτZ, thatisDur=, herein,τZis setto 20 ns,v =1000 m/s,and thus the Duris 6 ms.Then,the Tris set to 10 μs,thus the number of periods within the duration of the target signal is 100.Therefore, the time complexity within the duration of the target signal can be expressed as

    Fig.13.The PSLRs of the binary chaotic sequence C(t):(a)N=50,Doppler shift=50,60,70,80 kHz;(b)N=75,Doppler shift=50,60,70,80 kHz;(c)N=100,Doppler shift=50,60, 70, 80 kHz.

    Fig.14.The PSLRs of ur(t).

    Fig.15.The BERs of the ID decryption process with Doppler frequencies ranging from 10 to 100 kHz and N = 50, 75,100.

    The space complexity mainly depends on the number of chaotic sequences and sample rate fswithin the Dur, and the space complexity can be expressed as

    If the signal processing chip system clock is 100 MHz, fs= 109Hz and N = 20, it will only take about 0.14 ms and 280 K bits of storage space to complete the encryption and decryption operation within the Dur,and it can fully meet the real-time and storage space requirements of the RFPS.

    5.Experiment and simulation results

    In the simulation,200 sets of ISRJ samples and 200 sets of target scattering samples are generated by a jamming pod and a target scattering model,respectively.Considering a practical scenario,the velocity v of the RFPS is set from 150 to 1200 m/s;thus,the Doppler frequency range from 10 to 80 kHz.The SNR is usually not too low because the RFPS works in a relatively short range.Herein, we set the SNR from-10 to 0 dB.The simulation parameters are shown in Table 1.

    Table 1Simulation parameters.

    To test the stability of ranging with the proposed method, the simulation obtains the HRRPs of the two targets at different SNRs.According to the practical situation,the SNR is set from-10 to 0 dB,and the HRRPs are obtained by pulse compression with chaotic sequences.As shown in Fig.16, the proposed method obtains the HRRPs of the target at different SNRs.

    For the verification of the target and ISRJ recognition performance of the proposed method, a countermeasure experiment is carried out in an anechoic chamber.In this anechoic chamber, the prototype of the proposed RFPS is placed opposite the jammer, as shown in Fig.17(b) and 17(c).80 sets of immediate data obtained under the action of ISRJ and targets are collected for the subsequent analysis.

    The results of the countermeasure experiment are shown in Table 2.The recognition accuracy is defined as

    where NTPmeans the number of target samples classified as target,NTNmeans the number of jamming samples classified as jamming,Nsis the number of the test samples.The results show that the target and ISRJ can be identified via ID recognition, and thus, the feasibility of the proposed air target recognition method is verified.

    To further evaluate the recognition performance of the proposed method at different SNRs, several typical anti-jamming methods and new anti-jamming methods are compared through 500 times Monte Carlo simulations; these approaches include pulse compression methods that utilize Barker codes and m sequences(Barker-based and m sequence-based, respectively), the ISRJ recognition method based on phase-coded signal processing (PCbased) in Ref.[10], the singular spectrum entropy method (SPEbased) in Ref.[11], the waveform agility method against ISRJ in Ref.[12], and the ISRJ recognition method based on integration decomposition(FTRID-based)in Ref.[26].The results are shown in Fig.18.

    As shown in Fig.18, the air target recognition accuracy of the proposed method remains stable,while those of the other methods decrease rapidly as the SNR deteriorates, which means that the proposed method can adapt to low-SNR scenarios.

    Fig.16.The HRRPs of the two targets at different SNRs obtained by using the proposed method: (a) The HRRPs of the helicopter at different SNRs; (b) The HRRPs of the fighter at different SNRs.

    Fig.17.The scene of the countermeasure experiment: (a) The prototype of the RFPS and its signal processing module; (b) The target simulator; (c) Experiment in the anechoic chamber; (d) The jammer and its antenna.

    Table 2The target and ISRJ recognition results of the countermeasure experiment.

    Fig.18.The air target recognition accuracy comparison at different SNRs.

    Fig.19.The air target recognition accuracy comparison at different JSRs.

    In addition,JSR represents the instantaneous power of jamming with respect to the target echo.It is flexibly controlled by the jamming pod via a power amplifier.Generally, the jamming pod amplifies the power of the retransmission signal to achieve better jamming performance.The false target peak caused by ISRJ can be higher than the target echo peak.Therefore, the recognition accuracies of these methods at different JSRs are compared,as shown in Fig.19.Considering the practical scenario, the JSR is set from 0 to 40 dB.

    In Fig.19,as the JSR increases from 0 dB to 40 dB,the recognition accuracy of the proposed method remains at a high level, while those of other methods decrease rapidly.The reason for this is that the amplitude of jamming does not influence the polarity of the decrypted ID sequence Mjm(t) shown in Eq.(18), and thus, the decryption result of the proposed method is independent of the signal or jamming power.Therefore, the decrypted ID remains stable so that the RFPS can identify air target echoes and ISRJ.

    6.Conclusions

    In this article, an air target recognition method against ISRJ is proposed.Each RFPS is assigned a unique ID that is chaotically encrypted in every transmission period.To verify the ranging performance,multi-scattering model are established using PO method,and a pulse compression process that uses encrypted binary chaotic sequences to obtain the HRRPs of targets is introduced.To suppress the clutter and noise, the SVD method is applied in the preprocessing.The ID recognition process of air target recognition is analyzed.The encryption and decryption chaotic sequences in every ID period,which are controlled by the random key,guarantee the recognition of the air target and ISRJ in a highly efficient manner.The Doppler tolerance of the proposed method is also analyzed by using the PSLRs and BERs obtained at different Doppler frequencies and sequence lengths.A simulation and an experiment involving a jamming pod and a prototype RFPS are carried out,and the air target recognition accuracies of different methods are compared.The experimental results verify the high-range resolution and strong stability of the proposed method at different SNRs and JSRs.

    It should be noted that the proposed ID decryption and target recognition method is only applicable to phase-coded wave, other waveforms and modulation types, such as frequency-modulated continuous wave and pulse Doppler RFPS, are not applicable.Furthermore,the correlation side lobes are related to the selection of the chaotic sequences.To select the optimal chaotic sequences with the smallest correlation side lobes, future work will focus on the optimization of chaotic sequences.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Acknowledgements

    This work was supported by the National Natural Science Foundation of China (Grant No.61973037) and (Grant No.61871414) and Postdoctoral Fundation of China (Grant No.2022M720419).

    久久国产精品男人的天堂亚洲| 亚洲avbb在线观看| 久久久久精品国产欧美久久久| 国产精品野战在线观看 | 视频区欧美日本亚洲| 麻豆av在线久日| 亚洲一区高清亚洲精品| 午夜日韩欧美国产| 久久人人97超碰香蕉20202| 午夜福利,免费看| 精品福利永久在线观看| 国产97色在线日韩免费| 欧美国产精品va在线观看不卡| 99国产极品粉嫩在线观看| 天堂√8在线中文| 中国美女看黄片| www.精华液| 国产成+人综合+亚洲专区| 麻豆久久精品国产亚洲av | 一级毛片高清免费大全| 久久久久亚洲av毛片大全| 国产一区二区三区综合在线观看| 黄片大片在线免费观看| 夜夜躁狠狠躁天天躁| 亚洲人成网站在线播放欧美日韩| 国产av一区二区精品久久| 满18在线观看网站| 色尼玛亚洲综合影院| 亚洲av五月六月丁香网| 1024香蕉在线观看| 成人三级黄色视频| 视频区欧美日本亚洲| 久9热在线精品视频| 人人澡人人妻人| 欧美成人午夜精品| 五月开心婷婷网| 一级,二级,三级黄色视频| 久久久国产一区二区| 两性午夜刺激爽爽歪歪视频在线观看 | 深夜精品福利| 久久久国产成人免费| 亚洲情色 制服丝袜| 国产精品亚洲一级av第二区| 岛国视频午夜一区免费看| 国产成人影院久久av| 久久久久久亚洲精品国产蜜桃av| 大型av网站在线播放| 老司机靠b影院| 欧美日本亚洲视频在线播放| 欧美在线黄色| 十八禁网站免费在线| 中文字幕另类日韩欧美亚洲嫩草| 色精品久久人妻99蜜桃| 18禁黄网站禁片午夜丰满| 久久久久国产一级毛片高清牌| 国产高清videossex| 精品卡一卡二卡四卡免费| 麻豆成人av在线观看| 日韩精品青青久久久久久| 亚洲第一青青草原| 日本一区二区免费在线视频| 成人永久免费在线观看视频| avwww免费| 母亲3免费完整高清在线观看| 老司机福利观看| 色婷婷久久久亚洲欧美| 免费av毛片视频| 在线观看午夜福利视频| 日日夜夜操网爽| 欧美一区二区精品小视频在线| 久久香蕉国产精品| 久久这里只有精品19| 美女福利国产在线| 丁香欧美五月| 在线观看午夜福利视频| 国产成人免费无遮挡视频| 午夜精品国产一区二区电影| 日韩欧美免费精品| 免费不卡黄色视频| 欧美国产精品va在线观看不卡| 美女午夜性视频免费| 久久久久久久精品吃奶| 黑人欧美特级aaaaaa片| 99久久久亚洲精品蜜臀av| 久久久水蜜桃国产精品网| 国产av又大| 人人妻人人添人人爽欧美一区卜| 黑人巨大精品欧美一区二区蜜桃| 日本a在线网址| 99精品久久久久人妻精品| 性少妇av在线| 亚洲片人在线观看| 国产三级黄色录像| 狠狠狠狠99中文字幕| 亚洲性夜色夜夜综合| 亚洲国产精品一区二区三区在线| 一夜夜www| 欧美日韩亚洲高清精品| 国产熟女xx| 热re99久久精品国产66热6| 国产成人系列免费观看| 午夜免费观看网址| 日韩欧美一区视频在线观看| 视频在线观看一区二区三区| 丁香六月欧美| 美女大奶头视频| 国产成人精品久久二区二区91| 日本三级黄在线观看| 亚洲欧美激情在线| 午夜福利免费观看在线| 成人亚洲精品av一区二区 | 久久久久久久精品吃奶| 50天的宝宝边吃奶边哭怎么回事| 97碰自拍视频| 高清黄色对白视频在线免费看| 国内久久婷婷六月综合欲色啪| 久久精品91蜜桃| 日韩三级视频一区二区三区| 国产麻豆69| 午夜福利影视在线免费观看| 在线永久观看黄色视频| 欧美日韩福利视频一区二区| 在线十欧美十亚洲十日本专区| av欧美777| 亚洲五月婷婷丁香| 午夜91福利影院| 亚洲第一av免费看| www.www免费av| 亚洲色图综合在线观看| 国产精华一区二区三区| 国产人伦9x9x在线观看| 国产深夜福利视频在线观看| 亚洲国产欧美一区二区综合| 黄片播放在线免费| 午夜影院日韩av| 久久亚洲真实| 亚洲精品av麻豆狂野| 国产亚洲精品第一综合不卡| 久久久久国内视频| 精品久久久精品久久久| 亚洲激情在线av| 一区在线观看完整版| netflix在线观看网站| 欧美在线黄色| 欧美日韩福利视频一区二区| 国产成+人综合+亚洲专区| 欧美黑人精品巨大| 18禁黄网站禁片午夜丰满| 国产免费男女视频| 两个人免费观看高清视频| 日韩大码丰满熟妇| 亚洲欧美一区二区三区久久| 久久天堂一区二区三区四区| 国产麻豆69| 曰老女人黄片| 91精品三级在线观看| 99久久精品国产亚洲精品| 欧美激情久久久久久爽电影 | 中国美女看黄片| 日日夜夜操网爽| 亚洲欧美日韩无卡精品| 成年人黄色毛片网站| 色综合婷婷激情| 亚洲第一av免费看| 久久九九热精品免费| 看黄色毛片网站| 亚洲国产看品久久| 一区在线观看完整版| 好看av亚洲va欧美ⅴa在| av欧美777| 成人黄色视频免费在线看| 好看av亚洲va欧美ⅴa在| 80岁老熟妇乱子伦牲交| 亚洲欧美激情综合另类| 热re99久久精品国产66热6| 国产av精品麻豆| 日本三级黄在线观看| 午夜视频精品福利| 日韩人妻精品一区2区三区| 黄色a级毛片大全视频| 91成人精品电影| 亚洲精华国产精华精| 99精品在免费线老司机午夜| 两个人免费观看高清视频| 在线观看免费午夜福利视频| 亚洲色图综合在线观看| 丝袜在线中文字幕| 日本三级黄在线观看| 热99re8久久精品国产| 久久午夜综合久久蜜桃| 一边摸一边做爽爽视频免费| 搡老岳熟女国产| 亚洲av美国av| 天堂中文最新版在线下载| 18禁黄网站禁片午夜丰满| 精品午夜福利视频在线观看一区| 国产精品99久久99久久久不卡| 午夜福利欧美成人| 亚洲性夜色夜夜综合| 十分钟在线观看高清视频www| 亚洲av成人一区二区三| 搡老岳熟女国产| 欧美激情高清一区二区三区| e午夜精品久久久久久久| 麻豆一二三区av精品| 黄色成人免费大全| 巨乳人妻的诱惑在线观看| 99精国产麻豆久久婷婷| 两人在一起打扑克的视频| 最近最新中文字幕大全免费视频| 在线永久观看黄色视频| 国产精品爽爽va在线观看网站 | 欧美乱妇无乱码| 免费在线观看日本一区| 纯流量卡能插随身wifi吗| 国产欧美日韩一区二区三| 一二三四社区在线视频社区8| 高清黄色对白视频在线免费看| 制服诱惑二区| 夫妻午夜视频| 亚洲中文日韩欧美视频| 国产成人欧美| 91精品三级在线观看| 久久久国产成人免费| 麻豆一二三区av精品| 亚洲精品在线观看二区| 淫秽高清视频在线观看| 国产精品秋霞免费鲁丝片| 一区二区三区国产精品乱码| 好男人电影高清在线观看| 亚洲性夜色夜夜综合| 最新在线观看一区二区三区| 午夜福利影视在线免费观看| 无遮挡黄片免费观看| а√天堂www在线а√下载| 国内久久婷婷六月综合欲色啪| 好男人电影高清在线观看| 国产精品久久视频播放| 亚洲午夜理论影院| 国产一区二区三区综合在线观看| 久久人妻av系列| 亚洲第一av免费看| e午夜精品久久久久久久| 妹子高潮喷水视频| 电影成人av| 国产亚洲精品一区二区www| 亚洲成av片中文字幕在线观看| 狂野欧美激情性xxxx| 99久久久亚洲精品蜜臀av| 国产精品 国内视频| 精品卡一卡二卡四卡免费| 免费在线观看完整版高清| www国产在线视频色| 老司机靠b影院| 亚洲aⅴ乱码一区二区在线播放 | 一边摸一边抽搐一进一小说| 一边摸一边抽搐一进一出视频| 淫秽高清视频在线观看| 亚洲精品av麻豆狂野| 他把我摸到了高潮在线观看| 精品午夜福利视频在线观看一区| 国产野战对白在线观看| bbb黄色大片| 在线观看免费视频日本深夜| 亚洲aⅴ乱码一区二区在线播放 | tocl精华| 午夜两性在线视频| 电影成人av| 久久精品亚洲精品国产色婷小说| 免费高清在线观看日韩| 久久热在线av| 久久中文看片网| 免费久久久久久久精品成人欧美视频| 国产又爽黄色视频| 精品一区二区三区四区五区乱码| 一进一出抽搐gif免费好疼 | 波多野结衣高清无吗| 香蕉国产在线看| 老熟妇乱子伦视频在线观看| 亚洲一码二码三码区别大吗| 久久精品亚洲精品国产色婷小说| av在线天堂中文字幕 | 精品国产美女av久久久久小说| 中文字幕色久视频| 村上凉子中文字幕在线| 精品无人区乱码1区二区| 在线观看www视频免费| av网站免费在线观看视频| 视频在线观看一区二区三区| 亚洲va日本ⅴa欧美va伊人久久| 女生性感内裤真人,穿戴方法视频| 亚洲精品国产色婷婷电影| 久久国产乱子伦精品免费另类| 别揉我奶头~嗯~啊~动态视频| 国产精品亚洲一级av第二区| 视频在线观看一区二区三区| 国产精品免费视频内射| 中亚洲国语对白在线视频| 无限看片的www在线观看| 国产免费现黄频在线看| 精品高清国产在线一区| 午夜福利免费观看在线| 午夜日韩欧美国产| 精品久久久久久久毛片微露脸| 人人妻人人添人人爽欧美一区卜| 岛国视频午夜一区免费看| 国产精品 欧美亚洲| 在线观看一区二区三区激情| www国产在线视频色| 亚洲精品在线观看二区| aaaaa片日本免费| 每晚都被弄得嗷嗷叫到高潮| 国产精品成人在线| 超碰97精品在线观看| 亚洲一区二区三区欧美精品| 一级a爱视频在线免费观看| 一夜夜www| 91九色精品人成在线观看| 国产一区二区激情短视频| 50天的宝宝边吃奶边哭怎么回事| 亚洲成av片中文字幕在线观看| 国产人伦9x9x在线观看| 宅男免费午夜| 亚洲情色 制服丝袜| 亚洲激情在线av| 成人18禁在线播放| 国产高清激情床上av| 欧美成人免费av一区二区三区| 国产野战对白在线观看| 少妇的丰满在线观看| 涩涩av久久男人的天堂| 操美女的视频在线观看| 亚洲精品一区av在线观看| 日韩有码中文字幕| 亚洲专区中文字幕在线| 黄色片一级片一级黄色片| 欧美一区二区精品小视频在线| 国产av又大| 亚洲 欧美 日韩 在线 免费| 青草久久国产| 妹子高潮喷水视频| 午夜精品久久久久久毛片777| 精品一区二区三区视频在线观看免费 | 一级片'在线观看视频| 国产野战对白在线观看| 老司机午夜福利在线观看视频| 村上凉子中文字幕在线| 精品欧美一区二区三区在线| 在线观看一区二区三区激情| 久久久国产一区二区| 国产xxxxx性猛交| 可以免费在线观看a视频的电影网站| 女人高潮潮喷娇喘18禁视频| 国产区一区二久久| 美女大奶头视频| www国产在线视频色| 波多野结衣av一区二区av| 欧美黄色淫秽网站| 美女午夜性视频免费| 人妻久久中文字幕网| 天天躁狠狠躁夜夜躁狠狠躁| 久久草成人影院| 国产又爽黄色视频| 多毛熟女@视频| 男女做爰动态图高潮gif福利片 | 精品国产国语对白av| 90打野战视频偷拍视频| 日韩免费高清中文字幕av| 香蕉丝袜av| 国产精品久久久久成人av| 丝袜美腿诱惑在线| 欧美日韩瑟瑟在线播放| av网站免费在线观看视频| 成年版毛片免费区| www.www免费av| 黄网站色视频无遮挡免费观看| 在线观看免费日韩欧美大片| 99久久久亚洲精品蜜臀av| 欧美日韩福利视频一区二区| 人人妻,人人澡人人爽秒播| 日本撒尿小便嘘嘘汇集6| 波多野结衣高清无吗| aaaaa片日本免费| 国产三级在线视频| 欧美中文日本在线观看视频| 美女午夜性视频免费| 亚洲avbb在线观看| 久热这里只有精品99| www.熟女人妻精品国产| 中文字幕人妻丝袜一区二区| 美女福利国产在线| 黑丝袜美女国产一区| 美国免费a级毛片| 欧美激情高清一区二区三区| 9热在线视频观看99| 电影成人av| 国产亚洲av高清不卡| 久久久久九九精品影院| 99久久久亚洲精品蜜臀av| bbb黄色大片| 精品人妻1区二区| 夜夜夜夜夜久久久久| 亚洲成人免费av在线播放| 大码成人一级视频| 婷婷六月久久综合丁香| 丰满迷人的少妇在线观看| 十八禁网站免费在线| 亚洲精品av麻豆狂野| 国产精品爽爽va在线观看网站 | 精品欧美一区二区三区在线| 日韩欧美一区二区三区在线观看| 欧美久久黑人一区二区| 视频区欧美日本亚洲| 搡老熟女国产l中国老女人| 日韩欧美免费精品| 九色亚洲精品在线播放| 欧美乱妇无乱码| 999久久久国产精品视频| aaaaa片日本免费| 丁香欧美五月| 伦理电影免费视频| 天堂√8在线中文| 丝袜美足系列| 亚洲一码二码三码区别大吗| 亚洲中文字幕日韩| 国产成人av教育| 亚洲精品一区av在线观看| 99久久综合精品五月天人人| 国产av一区二区精品久久| 国产精品一区二区免费欧美| 美女高潮到喷水免费观看| 欧美日韩国产mv在线观看视频| 久久精品国产亚洲av高清一级| a级毛片黄视频| 日韩高清综合在线| 亚洲全国av大片| 99久久精品国产亚洲精品| 国产真人三级小视频在线观看| 国产精品 欧美亚洲| 美女高潮喷水抽搐中文字幕| 精品卡一卡二卡四卡免费| а√天堂www在线а√下载| 一级a爱视频在线免费观看| 成年人黄色毛片网站| 97碰自拍视频| 熟女少妇亚洲综合色aaa.| 18禁国产床啪视频网站| 麻豆一二三区av精品| 欧美日韩乱码在线| 9热在线视频观看99| 国产精华一区二区三区| 神马国产精品三级电影在线观看 | 一二三四社区在线视频社区8| 看黄色毛片网站| а√天堂www在线а√下载| 久久国产精品影院| 99热国产这里只有精品6| 午夜影院日韩av| 亚洲国产中文字幕在线视频| 老汉色av国产亚洲站长工具| 久久精品亚洲精品国产色婷小说| 视频在线观看一区二区三区| 久久久国产成人精品二区 | 国产亚洲精品一区二区www| 女生性感内裤真人,穿戴方法视频| 一级毛片精品| 老汉色av国产亚洲站长工具| 成人18禁在线播放| 大型黄色视频在线免费观看| 亚洲精品在线观看二区| 国产av又大| 日本黄色视频三级网站网址| 国产精品久久视频播放| 国产精品98久久久久久宅男小说| 色精品久久人妻99蜜桃| 欧美精品亚洲一区二区| 亚洲黑人精品在线| 9191精品国产免费久久| 国产午夜精品久久久久久| 黄色怎么调成土黄色| 深夜精品福利| 精品一区二区三区av网在线观看| 在线免费观看的www视频| 91大片在线观看| 欧美午夜高清在线| www.精华液| 国产高清激情床上av| 精品久久久久久成人av| 亚洲片人在线观看| 精品久久久久久成人av| 99re在线观看精品视频| 女人被狂操c到高潮| 18禁观看日本| 99热国产这里只有精品6| 女人被躁到高潮嗷嗷叫费观| 亚洲五月婷婷丁香| 水蜜桃什么品种好| 一级,二级,三级黄色视频| 亚洲五月色婷婷综合| 在线观看午夜福利视频| 国产视频一区二区在线看| 1024视频免费在线观看| 一边摸一边做爽爽视频免费| x7x7x7水蜜桃| 他把我摸到了高潮在线观看| 亚洲国产欧美网| 亚洲五月天丁香| 天天躁夜夜躁狠狠躁躁| www.精华液| 国产三级黄色录像| 欧美日韩精品网址| 18禁黄网站禁片午夜丰满| av在线播放免费不卡| 国产99久久九九免费精品| 18禁美女被吸乳视频| 热re99久久精品国产66热6| 国产区一区二久久| 亚洲第一青青草原| 日韩免费高清中文字幕av| 超色免费av| 日本五十路高清| 级片在线观看| 俄罗斯特黄特色一大片| 亚洲 欧美 日韩 在线 免费| 国产单亲对白刺激| 国产欧美日韩精品亚洲av| 欧美精品啪啪一区二区三区| 99在线视频只有这里精品首页| 亚洲欧美日韩无卡精品| 人人妻人人添人人爽欧美一区卜| 一夜夜www| 久久婷婷成人综合色麻豆| 久久久久久亚洲精品国产蜜桃av| 岛国视频午夜一区免费看| 中文字幕精品免费在线观看视频| 嫁个100分男人电影在线观看| 最好的美女福利视频网| 黑人欧美特级aaaaaa片| 日本a在线网址| 少妇粗大呻吟视频| 国产成人啪精品午夜网站| 久久香蕉国产精品| 九色亚洲精品在线播放| 嫁个100分男人电影在线观看| 亚洲精品国产区一区二| 欧美日韩中文字幕国产精品一区二区三区 | 久久影院123| 天堂√8在线中文| 午夜91福利影院| 黄频高清免费视频| 老司机亚洲免费影院| 黄频高清免费视频| 精品福利观看| 国产精品久久久久久人妻精品电影| 亚洲国产精品合色在线| 免费女性裸体啪啪无遮挡网站| 欧美人与性动交α欧美软件| 18禁美女被吸乳视频| 日韩精品中文字幕看吧| 国产精品 国内视频| 女同久久另类99精品国产91| 久久久久国内视频| 精品国产超薄肉色丝袜足j| 国产欧美日韩一区二区精品| 丝袜在线中文字幕| 亚洲色图 男人天堂 中文字幕| 12—13女人毛片做爰片一| 99精品久久久久人妻精品| 999久久久国产精品视频| 极品人妻少妇av视频| 亚洲国产毛片av蜜桃av| 老司机福利观看| 日韩欧美一区二区三区在线观看| 久久午夜综合久久蜜桃| 午夜免费观看网址| 国产成人av激情在线播放| 亚洲精品美女久久久久99蜜臀| 91精品国产国语对白视频| 俄罗斯特黄特色一大片| 国产精品99久久99久久久不卡| 亚洲精品一二三| 亚洲成国产人片在线观看| 国产精品乱码一区二三区的特点 | 国产精品国产av在线观看| 中文字幕最新亚洲高清| 国产精品九九99| 亚洲欧美一区二区三区久久| 日韩欧美免费精品| 国产精品1区2区在线观看.| 制服诱惑二区| 国产精品影院久久| 成熟少妇高潮喷水视频| 亚洲久久久国产精品| 一本综合久久免费| 久久精品成人免费网站| 亚洲全国av大片| 色综合欧美亚洲国产小说| 18禁国产床啪视频网站| 欧美最黄视频在线播放免费 | 午夜精品久久久久久毛片777| 亚洲 国产 在线| 午夜成年电影在线免费观看| 国产三级黄色录像| 久久久久国产精品人妻aⅴ院| 亚洲人成电影观看| 亚洲全国av大片| 中文字幕色久视频| 日韩欧美一区视频在线观看| 人人妻人人添人人爽欧美一区卜| 久久精品人人爽人人爽视色| 国产伦一二天堂av在线观看| 老鸭窝网址在线观看| 国产99白浆流出| 日本vs欧美在线观看视频| 亚洲片人在线观看|