Next Article in Journal
ATDMNet: Multi-Head Agent Attention and Top-k Dynamic Mask for Camouflaged Object Detection
Previous Article in Journal
Custom-Designed Portable Potentiostat and Indirect Cyclic Voltammetry Index Analysis for Rapid Pesticide Detection Using Molecularly Imprinted Polymer Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Anti-Interrupted-Sampling Repeater Jamming Method Based on Simulated Annealing–2-Optimization Parallel Optimization of Waveforms and Fractional Domain Extraction

Xi’an Electronic Engineering Research Institute, Xi’an 710100, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(10), 3000; https://doi.org/10.3390/s25103000
Submission received: 25 March 2025 / Revised: 30 April 2025 / Accepted: 6 May 2025 / Published: 9 May 2025
(This article belongs to the Section Intelligent Sensors)

Abstract

:
Faced with increasingly complex electronic jamming environments, intra-pulse agility has become a primary method of anti-interrupted-sampling repeater jamming (ISRJ) for radar systems. However, existing intra-pulse agile signals suffer from high autocorrelation sidelobe levels and limited jamming suppression capabilities. These issues restrict the performance of intra-pulse agile signals in complex electromagnetic environments.This paper proposes an anti-interrupted-sampling repeater jamming method based on Simulated Annealing–2-optimization (SA-2opt) parallel optimization of waveforms and fractional domain extraction. Firstly, the proposed method employs the SA-2opt parallel optimization algorithm to optimize the joint frequency and chirp rate encoding waveform. Then, the received signal is subjected to the fractional Fourier transform (FrFT) and inverse transform to extract the target signal. Finally, jamming detection is conducted based on the multi-dimensional features of the pulse-compressed signal. After this detection, a time-domain filter is constructed to achieve jamming suppression. The optimized waveform exhibits the following advantages: the sub-pulses are orthogonal to each other, and autocorrelation sidelobe levels are as low as -20.7dB. The method proposed in this paper can achieve anti-ISRJ in the case of a high jamming-to-signal ratio (JSR). Simulation experiments validate both the effectiveness of the optimized waveform in achieving low autocorrelation sidelobes and the anti-ISRJ performance of the proposed method.

1. Introduction

As an important part of modern sensing system [1,2,3], radar ’s interference suppression ability determines the accurate acquisition of objects information in complex electromagnetic environment [4]. With the rapid development of electronic counter measure (ECM) technology, interrupted-sampling repeater jamming (ISRJ) has become one of the primary threats to the performance of modern radars due to its strong parameter adaptability, flexible jamming patterns, and high energy utilization [5,6]. The ECM jammer intercepts the radar’s transmitted signals, processes them with intermittent sampling, and uses a Digital Radio Frequency Memory (DRFM) to reconstruct and match the parameters of the jamming signals [7]. As a result, ISRJ can create highly realistic false objects or suppress real objects in the time–frequency domain [8,9,10,11]. In particular, in advanced radar systems such as phased-array radars and synthetic-aperture radars, ISRJ can effectively evade traditional anti-jamming measures through parameter optimization, leading to a significant increase in radar false alarm rates and a sharp decline in target detection probabilities, among other severe consequences [5,12,13,14]. Anti-ISRJ has become a core issue that urgently needs to be addressed in the field of radar jamming resistance [15,16]. In recent years, a series of advances have been made in the research on the mechanism and countermeasure strategy of ISRJ. Currently, there are two primary anti-ISRJ methods: the first involves anti-jamming measures solely at the receiver end, while the second employs joint anti-jamming strategies combining both transmitter and receiver. The first method focuses on extracting the target signal or suppressing the jamming signal at the receiving end through various transformations [17,18,19,20,21]. For instance, Liu et al. employed compressed sensing (CS) techniques to alter the sampling quantity of the received signal, reconstruct the target signal, and thereby suppress the jamming [17]. However, an anti-ISRJ method relying solely on the receiver often involves huge computation, making real-time jamming suppression challenging. The second method involves simultaneous suppression from both the transmitter and receiver. This is achieved by transmitting intra-pulse composite modulation signals, which divide a single pulse into multiple sub-pulses with different parameters. The mutual masking characteristics of these pulses are then utilized to detect and suppress jamming signals in the echo [12,22,23,24,25,26,27]. A notable example of this method is presented in [23], where Zhan et al. proposed orthogonal sub-pulse waveforms to create significant differences between the jamming and target signals in multiple dimensions, using the OTSU method for jamming suppression. However, changes in sub-pulse parameters can significantly affect the sidelobe peak of the entire pulse after pulse compression, leading to an increased signal-to-clutter ratio, which is detrimental to target detection. Additionally, multiple antennas can be used to transmit signals with different parameters. Chen et al. utilized the time–frequency differences in the received signals of distributed radars to reconstruct and suppress jamming signals by training a Minimum Variance Distortionless Response (MVDR) beamformer [28], but using multiple antennas can result in higher costs and limited application scenarios.
In response to above challenges, this paper adopts a joint suppression method at both the transmitter and receiver. The transmitted waveform uses a combined coding of sub-pulse carrier frequency and chirp rate, which confers some anti-interception characteristics. On this basis, the objective function is to minimize the sidelobe peak of the autocorrelation, and the Simulated Annealing–2-optimization (SA-2opt) parallel optimization method is used to optimize the transmitted waveform, achieving a sidelobe peak of −20.7 dB after waveform matching filtering, which is a reduction of approximately 10 dB compared to the unoptimized waveform, significantly enhancing the target detection performance. Furthermore, this paper employs the fractional Fourier transform (FrFT) to extract the target signal based on the different modulation rates of the transmitted waveform. The mean, variance, and histogram entropy of the segmented pulse compression results are then used as three-dimensional features and clustered using the K-means algorithm to construct a time-domain filter that further suppresses the jamming. The main contributions of this paper are summarized as follows:
1.
Optimizing the radar signal coding, which involves alternating positive and negative modulation rates of sub-pulses and joint coding of modulation rate and carrier frequency. The problem is abstracted into a two-dimensional Traveling Salesman Problem (TSP), and an SA-2opt parallel optimization algorithm is proposed to find an approximate solution, ensuring good detection capabilities of the radar even in the absence of jamming.
2.
Using segmented FrFT filtering and combining it with the K-means algorithm to complete ISRJ detection, achieving effective suppression of ISRJ in high-signal-to-clutter-ratio environments.
The rest of this article is organized as follows. Section 2 of this article establishes the ISRJ signal model and analyzes its countermeasures. Section 3 of this article provides a detailed exposition of the transmit waveform optimization method. Section 4 of this article proposes a joint jamming suppression algorithm. Section 5 of this article validates the effectiveness of the proposed scheme through simulations and real measurement data. Finally, Section 6 of this article summarizes the entire article.

2. Introduction of the Waveform Mathematical Model and Performance Analysis

2.1. Signal Model

Linear frequency-modulated (LFM) signals are used as sub-pulse waveforms, with different carrier frequencies and modulation rates set between sub-pulses. Specifically, if the transmitted signal consists of M sub-pulses, the i th sub-pulse s s u b ( t , i ) can be expressed as
s s u b ( t , i ) = u t i τ s u b exp j π γ s u b ( i ) t i τ s u b 2 exp j 2 π f s u b ( i ) t i τ s u b
where t is the fast time, τ s u b is the time width of the sub-pulse, γ s u b ( i ) is the modulation rate of the i th sub-pulse, and f sub ( i ) is the carrier frequency of the i th sub-pulse. u ( t ) is the window function and u ( t ) = 1 , 0 < t < τ sub 0 , other .
The transmitted signal can be expressed as
s ( t ) = i = 1 M s s u b ( t , i )
The impulse response of the sub-matched filter can be expressed as
h s u b ( t , i ) = s s u b * ( τ t , i )
The transmitted signal can be expressed as
s ( t ) = i = 1 M u t i τ sub exp j π γ sub S r ( i ) 1 ( i 1 ) t i τ sub 2 exp j 2 π f sub S f ( i ) t i τ sub exp j 2 π γ sub S r ( i ) τ sub t i τ sub / 2
where the frequency coding sequence of the sub-pulses is S f and the modulation coding sequence is S r . f s u b ( S r ( i ) ) is the frequency of the i th sub-pulse and γ s u b ( S r ( i ) ) is the chirp rate of the i th sub-pulse. In order to enhance the difference in the chirp rate of adjacent sub-pulses, the chirp rate of adjacent sub-pulses is interleaved, which is expressed as the chirp rate γ sub multiplied by ( 1 ) ( i 1 ) . In Equation (4), the adjacent sub-pulses are connected end to end, and the sub-pulse delay and width are expressed by the window function as u t . The time–frequency plot of the transmitted signal s ( t ) is shown in Figure 1.
Δ f is the minimum frequency hopping interval of sub-pulses, and the hopping interval of adjacent sub-pulses is an integer multiple of this value.

2.2. Analysis of the Necessity of Sub-Pulse Orthogonality

The waveform design in Section 2.1 implements varying carrier frequencies and chirp rates across sub-pulses. Parameter diversity not only strengthens sub-pulse orthogonality but also amplifies inter-pulse distinctiveness, creating conditions for anti-ISRJ. ISRJ involves sampling and retransmission processes due to its generation mechanism. Intermittent-sampling repeater jamming usually uses two transmit–receive isolated antennas to work simultaneously to achieve fast reception and forwarding of signals, and sampling is performed first, followed by retransmission [18]. To enhance the jamming effect, the jammer should ensure that the entire sampled signal is retransmitted. Therefore, the minimum time width of the transmitted jamming signal is equal to the time width of the sampled signal. The operational mode of ISRJ is shown in Figure 2.
Depending on the retransmission method, ISRJ can be divided into Interrupted-Sampling Direct Repeater Jamming (ISDRJ), Interrupted-Sampling Periodic Repeater Jamming (ISPRJ), and Interrupted-Sampling Cyclic Repeater Jamming (ISCRJ). In Figure 2, the signals A, B, and C are the signal slices formed by the jammer’s sampling and copying of the radar signal. A-i represents the i th forwarding of signal slice A, B-i represents the i th forwarding of signal slice B, and C-i represents the i th forwarding of signal slice C. For ISRJ, the jamming energy is distributed within the current pulse. Therefore, the suppression of ISRJ must be completed within the current pulse. The ISRJ suppression strategy using intra-pulse agile waveforms employs a segmented matched filtering architecture. As shown in Figure 3, each sub-pulse undergoes dedicated filtering through corresponding sub-matched filters, followed by (a) jamming detection threshold analysis per filter channel and (b) selective accumulation of verified clean outputs.
Figure 3 illustrates the operational workflow of ISRJ countermeasures using intra-pulse agile signals. The results of segmented pulse compression in Figure 3 show that some sub-pulses contain jamming, and the jamming signal appears as an irregular peak after matched filtering, forming a false target in the radar receiver. The temporal lag between ISRJ signals and sampled counterparts ensures that during segmented pulse compression, each sub-matched filter remains optimally matched to the current sub-pulse. Consequently, jammer-retransmitted prior sub-pulses experience significant gain suppression in the current filter channel due to waveform mismatch. However, residual high-energy jamming components may still generate false targets at specific sub-pulse positions. Supplementary suppression techniques are needed to eliminate these artifacts.
Following segmented pulse compression of sub-pulses, the system requires jamming energy to be confined within the current segment without affecting others. Additionally, because the jamming signal is a complete replica of the prior sub-pulse, the effectiveness of jamming suppression will depend on the orthogonality between the sub-pulses. The orthogonality between sub-pulses can be expressed as the result of the inner product of two signals, as given by Equation (5).
O ( i 1 , i 2 ) = s s u b t , i 1 · s s u b t , i 2 s s u b t , i 1 · s s u b t , i 2
The value of Equation (5) being closer to 0 indicates stronger orthogonality between the two sub-pulses. The orthogonality of sub-pulses can also be intuitively reflected through their correlation. The weaker the correlation, the stronger the orthogonality. The cross-correlation between sub-pulses i 1 and i 2 can be expressed as
R i 1 , i 2 ( τ ) = + s s u b t , i 1 s s u b t + τ , i 2 d t
When τ = 0 , Equation (6) degenerates into Equation (5). When the two sub-pulses are not consistent in both carrier frequency and modulation rate, their cross-correlation function will not exhibit a significant peak at the center but will be relatively flat. Therefore, the orthogonality of sub-pulses directly affects the suppression of ISRJ, and the better the orthogonality, the less residual ISRJ energy there will be after suppression, resulting in better ISRJ suppression performance.

2.3. Analysis of Signal Autocorrelation Sidelobes

According to Section 2.2, improving the orthogonality of sub-pulses can enhance the radar’s capability for anti-ISRJ. However, focusing only on the orthogonality of the sub-pulses will lead to an increase in the autocorrelation sidelobe of the whole pulse. Specifically, the sidelobe peaks of the autocorrelation function of the entire pulse might become difficult to control due to the abrupt changes in frequency and modulation rate.
Based on the principle of matched filtering, the radar signal passing through the filter can be viewed as an autocorrelation process, and the peak of the autocorrelation sidelobes will affect the signal-to-clutter ratio. The sidelobe peaks of conventional LFM signals are inherently determined by the sinc function’s characteristic sidelobe structure. In contrast, the intra-pulse coded signal is composed of multiple LFM signals with different parameters, and the sidelobe peak changes according to the sub-pulse parameters. The autocorrelation function of the entire pulse can be expressed as
R ( τ ) = + s ( t ) s ( t + τ ) d t = i = 1 M j = 1 M + s s u b ( t , i ) s s u b ( t + τ , j ) d t
From Equation (7), it can also be seen that when the solution space does not change nonlinearly and continuously, the autocorrelation results of the signal have no obvious rules, and it is difficult to use the conventional method to solve the extreme value of the multivariate function. If the jamming signal has a certain correlation with some of the sub-matched filters, it will result a high peak after matched filtering.
When the sub-pulses are frequency-coded and chirp-rate-coded, and the positive and negative frequency modulation rates are alternated, both the frequency modulation rate and the hop frequency interval will affect the sidelobe peak of the entire pulse after matched filtering. As the sequence changes, the sidelobe peak variations do not follow a clear pattern. Without calculating the sidelobe peak, it is impossible to determine whether the sidelobe function value of a new sequence formed by swapping two elements in the original sequence will increase or decrease compared to the original sequence. Therefore, it is difficult to find low-sidelobe encoding sequences by analyzing the autocorrelation function of the waveform.
To find the encoding sequence with the lowest sidelobes, it is necessary to complete a search through all permutations, which is a typical Nondeterministic Polynomial (NP) problem. For example, with m sub-pulses, the search for the chirp rates of the sub-pulses requires m! operations, and the searching for the carrier frequencies of the sub-pulses also requires m! operations. The above two searches are combined with each other, so the search of the whole solution space needs to calculate ( m ! ) 2 autocorrelation calculations. When m is large, the number of autocorrelation calculations will significantly increase, and the complexity of a single autocorrelation calculation is O N 2 , where N is the number of sampling points in the entire pulse. The process of finding the sidelobe peak involves traversing the entire autocorrelation result; the computational complexity for determining the sidelobe peak of a single autocorrelation result is O N 3 . When both m and N are large, traversing the entire solution space becomes extremely time-consuming, and a reasonable optimization algorithm should be used to complete the sequence search.

3. Introduction of Optimization Algorithm

3.1. Signal Sidelobe Optimization Model

The sidelobe peak of the radar echo signal after passing through the matched filter may degrade the SCR when spatially overlapped with clutter returns in the range–Doppler domain, whereas non-overlapping sidelobes primarily introduce ambiguities in multi-target scenarios rather than directly elevating the clutter floor. An excessively high sidelobe peak can even cause the radar to generate false targets. Minimizing the autocorrelation sidelobe peak is chosen as the objective function, with the constraint that the frequency modulation signs of adjacent sub-pulses in the time domain are opposite, and each element in the sequence appears only once. The optimization problem can be expressed as
min max R ( τ ) = s ( t ) s ( t + τ ) d t s . t . τ { Excluding the main lobe area } S f ( i ) , S r ( i ) { 1 , 2 , , m } , i = 1 , 2 , , m
After sampling, the autocorrelation function in the discrete state can be expressed as x = x 1 , x 2 , , x N T , and its corresponding matched filter is h = h 1 , h 2 , , h N T . Here, N is the length of the waveform and the corresponding matched filter after discretization. The radar pulse compression output R ( k ) can be represented as the cross-correlation of the two sequences.
R ( k ) = n = k + 1 N x ( n ) h * ( n k ) , k = 0 , 1 , , N 1
For convenience in representation, the process is described using matrix notation. Let the discrete signal matrix be X.
X = x 1 x 2 x N 0 0 0 x 1 x N 1 x N 0 0 0 0 0 x 1 x N T
In Equation (10), the matched filtering result can be expressed as R ( k ) = X h .
To minimize the sidelobe peak during computation, the value at the main lobe position in the autocorrelation result can be set to zero, and then the maximum value in the sequence can be found as the sidelobe peak. This zero-setting operation can be achieved by multiplying by a weighted matrix W, i.e., W = diag { 1 , , 1 , 0 , , 0 , 1 , , 1 } , where W is a diagonal matrix with the number of zeros in the middle equal to the width of the main lobe in the discrete autocorrelation function. Therefore, the radar signal sidelobe optimization problem can be abstracted as follows:
P S f , S r = min max X h W s . t . S f ( i ) , S r ( i ) { 1 , 2 , , m } , i = 1 , 2 , , m

3.2. Analysis of the SA-2opt Parallel Optimization Algorithm

From Section 2.3, the search for the entire sequence will result in significant time consumption, and a reasonable optimization algorithm needs to be adopted for the search. The SA algorithm is a heuristic global search algorithm that simulates the thermodynamic process of metal forging to obtain an approximate solution that tends toward the global optimum. The SA algorithm is widely used in both convex and non-convex optimization problems. The TSP is a classic NP-hard combinatorial optimization task that seeks the shortest closed tour visiting each given city exactly once and returning to the origin. The sub-pulse sequence optimization addressed in this paper, where each sub-pulse possesses distinct modulation parameters, can be formulated as a full permutation search across the parameter space. This problem is analogous to the TSP, where the complete route length (equivalent to the composite waveform’s peak sidelobe level, PSLL) can only be evaluated after finalizing the entire configuration. Therefore, the SA algorithm demonstrates superior applicability to sub-pulse sequencing problems. Alternative optimization methods, including Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and Genetic Algorithms (GAs), exhibit limitations when addressing this specific optimization challenge.
When using the SA algorithm to solve the optimization coding problem, the objective function is to minimize the sidelobe level. On this basis, new solutions are generated by randomly producing new sequences. New solutions are accepted with a high probability if they are better, and the probability of accepting worse solutions is determined by the current temperature. The process continues to loop after accepting the new solution. The entire process of solving the optimization coding problem using the SA algorithm is shown in Figure 4.
Since the SA algorithm is primarily used to search for a one-dimensional optimal sequence, and the signal model in Section 2.1 involves a joint coding of two sequences, the problem to be addressed in this section is a two-dimensional optimal sequence search problem. Both the frequency coding and the chirp rate coding sequences simultaneously affect the objective function value. Therefore, when generating new solutions, two different sequences need to be generated simultaneously, and the methods for generating new solutions for these two sequences should differ to minimize the coupling phenomenon caused by the limitations of the solution generation methods, ensuring that the search can cover the entire solution space.
Moreover, to improve the search accuracy near the extremum points and to avoid potential coupling phenomena, the 2-opt algorithm is used to perform local searches based on the results of each SA iteration. When using the 2-opt algorithm for searching, the carrier frequency coding remains unchanged, while a one-dimensional search is performed on the chirp rate coding sequence to verify if there is a better chirp rate coding sequence under the same carrier frequency coding. The use of the 2-opt algorithm further reduces the coupling probability between the two coding sequences and avoids the optimization results falling into local optimum.
The 2-opt algorithm is a path improvement algorithm, which involves randomly generating two points and reversing the path segment between these two points, and then reinserting it into the original path to create a new path. If the objective function value decreases, the sequence is updated; otherwise, the process continues to loop until the maximum number of iterations is reached. The flowchart of the 2-opt algorithm is shown in Figure 5.
To avoid the randomness introduced by the SA algorithm, multiple SA search processes are started in parallel, and the best solution among the parallel results is taken as the global approximate optimal solution. The algorithm structure and flow are shown in Figure 6.
In summary, this paper adopts a combination of the SA algorithm and the 2-opt algorithm, and performs multiple parallel Monte Carlo processes. The best solution from each process is selected. The specific steps are as follows:
Step 1: Initialize the algorithm parameters: initial temperature T 0 for the simulated annealing (SA) algorithm, cooling coefficient a, and the number of cooling repetitions N 1 ; the maximum number of iterations N 2 opt - max for the 2-opt algorithm; and the number of parallel processes N p a r .
Step 2: Randomly generate N p a r initial sequence combinations S f 1 , S m r 1
S f 2 , S m r 2 L S f N p a r , S m r N p a r , each corresponding to one of the N p a r SA-2opt processes. For the k-th SA-2opt process, the steps are as follows:
(1) Calculate the objective function value P S f , S r at this point.
(2) Randomly generate two integers k 1 and k 2 between 1 and 8, and swap the elements of sequence S f k at positions k 1 and k 2 to generate a new solution S f k 1 . Similarly, randomly generate two integers k 3 and k 4 between 1 and 8, and swap the elements of sequence S m r k at positions k 3 and k 4 to generate a new solution S r k 1 .
(3) Set the carrier frequency f 1 , f 2 , , f m to increment by Δ f to obtain the carrier frequency vector f. Set the modulation frequency r 1 , r 2 , , r m to increment by Δ r to obtain the modulation frequency vector r.
(4) Sort f and r using sequences S f k 1 and S r k 1 , and then compute the dot product of the sorted modulation frequency sequence r with ( 1 ) m to finally calculate the objective function value P S f k 1 , S r k 1 .
(5) When P S f k 1 , S r k 1 < P S f , S r , the current solution is updated to S f k 1 , S r k 1 . When P S f k 1 , S r k 1 > P S f , S r , accept S f k 1 , S r k 1 as the new solution with probability exp P S f k 1 , S r k 1 P S f , S r T 0 · a l , where l is the current loop count.
(6) Denote the new solution as S f , S r , and repeat steps (1) to (5) until l > N 1 , at which point the loop terminates and S f , S r is output.
Step 3: The optimization results of Step 2 need to be further optimized by the 2-opt algorithm. The specific steps are as follows:
(1) Generate an array ( i , j ) and select 1 i < j m .
(2) Reverse the elements between positions i and j in the output of Step 2 to generate S r 2 , and calculate the objective function value P S f , S r 2 . Compare P S f , S r 2 with P S f , S r obtained from Step 2. If P S f , S r 2 < P S f , S r , then update the solution to S f , S r 2 ; otherwise, do not update.
(3) Repeat Step 3 (1) and (2) until the number of iterations exceeds N 2 o p t max , and output the current solution denoted as S f , S r k , with the objective function value denoted as P S f , S r k .
Step 4: Select the solution S f , S r min corresponding to the minimum objective function value P S f , S r 1 to P S f , S r N p a r from the entire process of 1 to N p a r as the final solution.

4. Anti-ISRJ Method

4.1. Echo Signal Model

After being affected by the ISRJ, the echo S R ( t ) will contain the target reflection signal S T ( t ) , the jamming signal J ( t ) , and the noise N ( t ) , i.e.,
S R ( t ) = S T ( t ) + J ( t ) + N ( t )
Taking direct forwarding jamming as an example, in Equation (12), S T ( t ) = A 1 S ( t τ ) , J ( t ) = A 2 j = 0 M / 2 1 u t τ ( 2 j + 1 ) τ sub τ sub S ( t τ ) , A 1 is the amplitude of the target signal, A 2 is the amplitude of the jamming signal at the radar receiver, and τ is the delay caused by the target distance.

4.2. Target Energy Extraction Based on the FrFT

According to Section 3.1, due to the use of carrier frequency and modulation rate coding, the carrier frequency and modulation rate of the target echo and the repeater jamming signal are different within the same sub-pulse width τ sub . Transforming the received signal into the fractional domain can effectively distinguish the target signal from the jamming signal. The FrFT is an extension of the traditional Fourier transform, where the basis functions are expanded from single-frequency sinusoidal signals of the original Fourier transform to linear frequency modulation signals. The FrFT of the signal x ( t ) at angle α is given by
X ( u ) = + x ( t ) B ( t , u ) d t
where B ( t , u ) is the basis function of the transformation, and
B ( t , u ) = ( 1 j cot α ) exp j π t 2 cot α 2 u t csc α + u 2 cot α , α n π δ ( t u ) , α = 2 n π δ ( t + u ) , α = ( 2 n ± 1 ) π
p = π α 2
where p is the order of transformation.
The essence of rotating the time–frequency plane in the FrFT is to observe the time–frequency characteristics of the signal at different angles, providing a more flexible perspective for non-stationary signals such as LFM. The FrFT focuses on different positions based on the different chirp rates of LFM signals, projecting signals that are difficult to separate in the time domain or frequency domain onto different fractional domains to achieve separation. As shown in Figure 7, the time–frequency plot of the signal changes with the projection angle, resulting in different degrees and positions of concentration in the fractional domain.
By rotating the time–frequency plane, i.e., changing the value of α , the optimal projection angle for the LFM signals can be found, where the LFM signals show significant concentration. Therefore, to extract the LFM signal at this angle and minimize the mixing of other signals and jamming, it is necessary to find the rotation angle α that provides the best accumulation effect for the LFM signal. First, solve for the normalized chirp rate.
k = B s u b f s
Then, α = arccot ( k ) and p = π 2 arccot ( k ) .
At this angle, the peak that appears is formed by the corresponding chirp rate signal. Since the transmitted signal in each sub-pulse has a clear difference in carrier frequency and chirp rate, the FrFT can be used to extract the target echo. The specific steps for target echo extraction are as follows:
Step 1: Divide the echo signal into M segments according to the number of sub-pulses, denoted as S R 1 , S R 2 , , S R M .
Step 2: Use the corresponding FrFT angle based on the prior information of the signal parameters to transform the current segment of the signal into the fractional domain.
Step 3: Perform the fractional Fourier transform on the corresponding segments of the transmitted signal. For the k-th sub-pulse, construct a window function u extract k ( x ) = 1 , mainlobe 0 , others , where the main lobe region has a value of 1 and all other positions have a value of 0.
Step 4: Compute the inner product of S R k and u extract k ( x ) , which extracts the signal with the corresponding chirp rate, denoted as S extract k = S R k · u extract k ( x ) . The jamming, due to its different chirp rate within the sub-pulse slice, cannot be effectively extracted.
Step 5: Perform an inverse transform on the retained main lobe to obtain the extracted target echo signal. The inverse transform is also a fractional Fourier transform, with the rotation angle being the reciprocal of the previous transformation angle, α . Perform pulse compression on S extract k to obtain s R ( t ) , which is the pulse compression result after extracting the target echo.
Through the above steps, the target echo within the signal slice can be partially extracted. However, during the target signal extraction process, some jamming signals still mix into the outputs. And the energy of the target signal outside the main lobe will be lost.

4.3. Segmented Pulse Compression and Jamming Suppression

The signal S extract 1 , S extract 2 , , S extract M extracted in Section 4.2 is passed through sub-matching filters to obtain S o 1 ( t ) , S o 2 ( t ) , , S o M ( t ) . S extract 1 , S extract 2 , , S extract M contain target information, residual jamming, and noise. The outputs of each sub-matching filter are then accumulated. The residual jamming can still form multiple peaks near the accumulated target, so time-domain weighted filtering is required. To further suppress the jamming using time-domain weighted filtering, it is necessary to determine whether the post-slice signal contains jamming. Judging whether the echo signal is interfered with is difficult to achieve by setting a threshold for a single parameter. In interference detection, mean, variance, and entropy are multi-dimensional statistical features, which represent the concentration, discreteness, and randomness of signal energy distribution, respectively, and can jointly capture the non-stationary characteristics and statistical differences in interference signals in the time–frequency domain. By quantifying the statistical separability of interference and background noise, these features provide a robust criterion for various clustering methods, especially for blind detection and pattern recognition of non-cooperative interference in complex electromagnetic environments [29,30,31].
The mean value mean S O k ( t ) of the signal after matching filtering can reflect the intensity of the jamming. Since the matching filtering process produces significant peaks only at the positions of the target echo and jamming signals (including retransmitted jamming and strong noise jamming), the existence of the jamming signal significantly increases the mean value of the signal. The variance var S O κ ( t ) is also an important indicator for distinguishing whether the signal is jammed. Due to the presence of jamming, the matching filter output will form spikes at positions different from the real target, which will result in differences in the variance between the jammed and non-jammed signal slices after matching filtering. Additionally, information entropy can be used as a significant basis for determining whether the signal is interfered with. Information entropy is a fundamental concept in information theory and can effectively characterize the amount of information and the complexity of the signal. Some sub-pulses still contain jamming after segmented pulse compression, and the jamming signals can form spikes at corresponding positions after matching filtering, increasing the information content of the signal. Therefore, information entropy can be chosen as a feature for sub-pulse classification. Information entropy can be expressed as follows:
H ( X ) = i = 1 n p x i log p x i
where p x i is the probability of event x i occurring.
As a statistical measurement method, information entropy can be quantified by converting the signal into a histogram. In this paper, the output results of each matching filter are divided into 10 intervals based on their amplitude, and the ratio of the number of signal samples falling into each interval to the total number of samples is used as the probability in the histogram, thereby quantifying the signal to obtain the information entropy H S o k ( t ) of each slice.
Therefore, this paper combines multiple features of the echo signal for determination, specifically the mean value, variance, and information entropy of the signal after matching filtering. The mean value, variance, and information entropy of the output results from each matching filter are arranged into a three-dimensional array L 1 , L 2 , , L M , where L k = mean S o k ( t ) , var S o k ( t ) , H S o k ( t ) . Since there is no prior information about whether the signal slice S R k ( t ) is jammed, an unsupervised learning clustering method should be used to cluster L k .
The K-means algorithm is one of the most widely used clustering algorithms today. It optimizes the within-cluster sum of squares iteratively to achieve data clustering. The core idea of K-means is to find the centroid of each cluster and assign data to the nearest cluster, continuously iterating to change the centroid positions so that the similarity between data points within the same cluster is maximized and the similarity between data points in different clusters is minimized. Using the K-means algorithm can fully leverage the information of the received signal across multiple dimensions, thus enabling jamming detection of sub-pulses.
In summary, the process of constructing the time-domain weighted filter can be divided into the following steps:
Step 1: Calculate the mean mean S o k ( t ) , variance var S o k ( t ) , and histogram information entropy H S o κ ( t ) of each echo signal slice from Section 3.2, and map each slice to a three-dimensional point plot using these values as coordinates. The mean and variance calculations are not repeated here; the steps for calculating information entropy are as follows:
(1) Find the maximum value of S o k ( t ) and normalize S o k ( t ) to obtain S o k ^ ( t ) = S o k ( t ) max S o k ( t )
(2) Divide the range 0 1 into 10 intervals with a step of 0.1, and count the number of sample points of S o k ( t ) falling into each interval, denoted as D 1 , D 2 , , D 10 .
(3) Calculate the histogram information entropy H S o ( t ) = i = 1 10 D i n s u b log D i n s u b , where n sub is the number of sample points in S o k ( t ) .
Step 2: Use the K-means algorithm to classify the segment-mapped points obtained above, setting K = 2 , i.e., dividing them into two classes. The specific steps are as follows:
(1) Obtain the three-dimensional array L 1 , L 2 , , L M from Step 1, where L k = ( mean { S O k ( t ) } ) ,
  • var S o k ( t ) } , H S o k ( t ) is given initial centroids c 1 and c 2 .
(2) For each point L i , calculate its distance to the two centroids d L i , c 1 and d L i , c 2 , and assign it to the cluster, F 1 or F 2 , that contains the nearest centroid.
(3) Calculate the new centroid for each cluster: c 1 = 1 F 1 x i F 1 x i and c 2 = 1 F 2 x i F 2 x i .
(4) If the update distance of all centroids is less than the threshold ϵ , stop the iteration; otherwise, repeat Step 2 (1) to (3).
Step 3: Generally, it is believed that a slice is sampled and relayed in the next slice. Therefore, the first slice S R 1 ( t ) is considered an uninterfered signal. The class containing S R 1 ( t ) is defined as the uninterfered signal slice G 1 , and the rest are defined as the interfered signal slices G 2 .
Step 4: Pass the uninterfered slices through the matching filters constructed by the corresponding sub-pulses, and normalize the results to obtain the time-domain filter H T ( t ) and
H T ( t ) = i G 1 S o k ( t )
Use the constructed time-domain weighted filter to weight s R ( t ) . The target echo signal after jamming suppression is s o ( t ) = s R ( t ) · H T ( t ) . The overall jamming suppression process is shown in Figure 8.

5. Simulation Experiments and Analysis

In this section, four simulation experiments are established. Section 5.1 verifies the effectiveness of the optimized sequence sub-pulse coding waveform described in Section 3.2. Section 5.2 validates the stability and global performance of the method by comparing the results of traditional simulated annealing and 2-opt algorithms. Section 5.3 shows the performance of the optimized waveform when the target has radial velocity. Section 5.4 verifies the rationality of the algorithm parameter settings by changing the number of iterations. Section 5.5 validates the effectiveness of the optimized waveform and the jamming suppression measures described in Section 4.3 by comparing other jamming suppression methods. Section 5.6 discusses the influence of delay on jamming suppression.

5.1. Comparison of Sidelobe Peak Levels Before and After Optimization

The waveform parameters are set as shown in Table 1. Sequence optimization is performed under these parameters. The time–frequency plot of the optimized waveform is shown in Figure 9. Figure 10a shows the autocorrelation function plot of the waveform before optimization using a random sequence coding, while Figure 10b shows the autocorrelation function plot of the waveform after optimization using the optimized coding.
In Table 1, the minimum jump interval of the waveform is 3 MHz, and the jump interval of each adjacent sub-pulse is an integer multiple of this minimum interval. The absolute value of the frequency modulation of the waveform is selected as 8 × 10 13 × [ 0.2 , 0.3 , 0.4 , 0.5 , 0.6 , 0.7 , 0.8 , 0.9 ] Hz/s. On this basis, coding and frequency modulation positive and negative interleaving are performed. Since different coding will affect the synthesis bandwidth of sub-pulses, the maximum synthesis bandwidth of each sub-pulse is 50.6 MHz. According to the Nyquist sampling principle, the sampling rate needs to reach twice the bandwidth. At the same time, in order to avoid the influence of Doppler frequency caused by the target speed, the sampling rate is set to 160 MHz, which is higher than twice the maximum synthetic bandwidth.
From Figure 10a, it can be seen that when using a random sequence coding without optimization, the sidelobes of the waveform’s autocorrelation are relatively prominent, and in severe cases, they are only 7.8 dB below the mainlobe peak. In Figure 10b, after optimization using the SA-2opt parallel optimization algorithm, the autocorrelation sidelobes of the waveform are significantly suppressed, with the sidelobe peak reaching −20.7 dB. The sidelobe peak of the coding-modulated waveform after optimization is reduced by 12.9 dB compared to before optimization, which significantly suppresses the sidelobes and improves the signal-to-clutter ratio after radar matched filtering.
To more intuitively demonstrate the effectiveness of the optimized waveform, 100 Monte Carlo simulation experiments were conducted. The sidelobe peaks before and after optimization were calculated for each of the 100 simulations, as shown in Figure 11.
From Figure 11, it can be seen that the results of 100 Monte Carlo experiments and their statistical analysis indicate that the average sidelobe peaks before and after optimization are −10.2 dB and −20.6 dB, respectively. Before optimization, with random coding, the sidelobe peak fluctuates around −10.3 dB and can be as poor as −4.1 dB in some cases. Even under better conditions, it only reaches around −17.1 dB, making it difficult to directly apply for target detection. After optimization, the sidelobe peak is more stable, typically ranging from −20.3 dB to −20.9 dB, which significantly enhances the target detection performance.

5.2. Comparison with Traditional Optimization Algorithms

Since this paper introduces the 2-opt algorithm and parallel Monte Carlo algorithm on the basis of the simulated annealing algorithm to enhance local search and global discovery performance, this will improve the stability of the search results. Figure 12 shows the comparison of search results between the proposed algorithm and traditional optimization algorithms (such as the simulated annealing algorithm and the 2-opt algorithm).
From Figure 12, it can be seen that the proposed algorithm outperforms the 2-opt algorithm and the simulated annealing algorithm in terms of result stability and optimization effectiveness. Due to the simultaneous and independent execution of multiple search processes in the proposed algorithm, it can search the entire solution space more effectively, leading to more stable results.
From Figure 12, it is evident that the search results of the simulated annealing algorithm fluctuate between −16.6 dB and −20.4 dB, while the sidelobe peak of the 2-opt algorithm ranges from −10.5 dB to −18.0 dB after optimization. In contrast, the sidelobe peak of the proposed SA-2opt parallel optimization algorithm is consistently between −20.5 dB and −20.7 dB. The above results indicate that the proposed algorithm outperforms the 2-opt algorithm and the simulated annealing algorithm in result stability and optimization effectiveness. The results show that the proposed algorithm outperforms the 2-opt algorithm and the simulated annealing algorithm in terms of stability and optimization effectiveness.
The reason is that the simulated annealing algorithm has a high degree of uncertainty in its search results and is prone to converging to local optimal solutions. Once it gets trapped in a local optimal solution, it struggles to escape, even with an increased number of subsequent iterations, leading to the waste of computational power and time. The 2-opt algorithm, on the other hand, is a local search algorithm and is generally used to find better solutions in the neighborhood of a feasible solution. It is not well suited for large-scale searches. The proposed algorithm can search the entire solution space more effectively, resulting in more stable and reliable results.
In addition to the comparison with the SA algorithm and the 2-opt algorithm, comparison with other algorithms is also necessary. In this paper, the Ant Colony Optimization (ACO) algorithm, Genetic Algorithms (GAs), and Particle Swarm Optimization (PSO) algorithm are compared. The performance of the proposed algorithm and the above algorithms on the Section 3.1 optimization problem is compared, including the comparison of the Monte Carlo optimization results (Figure 13) and the convergence curve (Figure 14).
It can be seen from Figure 13 that the parallel optimization method used in this paper is more stable in the results and tends to the global optimal solution. It can be seen from Figure 14 that the convergence speed of the optimization algorithm in this paper is close to that of the PSO algorithm, which is better than that of the ACO algorithm and GA.

5.3. Performance of the Optimized Waveform When the Target Has Radial Velocity

We further study the influence of Doppler frequency shift caused by target motion on the waveform in 5.1. Taking Ku band as an example, it is assumed that the carrier frequency is 10 GHz. According to the Doppler frequency shift formula of a radar system, when the target radial velocity is 100 m/s, the waveform in the XX section is adopted, and the sub-pulse frequency changes between 10.000 GHz and 10.041 GHz due to the joint agility of frequency and the frequency modulation slope. The Doppler frequency shift caused by the change in signal frequency and target velocity in the pulse will change between 0.00299 m/s and 0.00300 m/s, and the waveform detection performance will not decrease significantly. An ambiguity function is an effective tool for analyzing waveform performance. Figure 15 is the ambiguity function of the Section 5.1 waveform at the target speed of [−1500, 1500]. Table 2 shows the effect of target velocity on waveform pulse compression performance.
It can be seen from Table 2 that when the target velocity is within the range of ( 500 , 500 ) m/s, the waveform designed in this paper has Doppler tolerance, and the pulse pressure loss is less than or equal to 1.04 dB. When the target speed is in the range of ( 1500 , 500 ) ( 500 , 1500 ) m/s, the pulse compression loss is less than or equal to 12.62 dB; when the target velocity is less than −1500 m/s or greater than 1500 m/s, the pulse compression loss is greater than 12.62 dB, which seriously deteriorates the signal-to-noise ratio of the target echo pulse compression.
In addition, the Doppler frequency shift will also affect the sub-pulse orthogonality of the target echo. Taking the speed of 100 m/s as an example, the carrier frequency of the whole pulse is 10.00 GHz, the maximum frequency interval of the sub-pulse is 24.00 MHz, and the maximum sub-pulse bandwidth is 16.20 MHz. The Doppler frequency shifts caused by the above factors are 6.67 × 10 4 Hz, 16.00 Hz, and 10.80 Hz, respectively. It can be seen that the Doppler frequency shift of the target is reflected in the echo signal, which is more reflected in the frequency synchronization offset of the whole pulse. The frequency offset caused by the frequency jump of the sub-pulse and the target speed is not only far less than the frequency offset of the whole pulse, but also far less than the jump interval and bandwidth of the sub-pulse, which has little effect on the orthogonality of the sub-pulse.

5.4. Analysis of the Impact of Various Parameters on Optimization Results and Computation Time

For the proposed algorithm, the results and computation time are determined by two factors: the number of parallel Monte Carlo computations and the number of iterations in the simulated annealing algorithm. The hardware platform used in the simulation experiments of this section is configured with an Intel i5-13400F CPU, an NVIDIA GTX 1080Ti GPU, and 16G * 2 DDR5 4800 MHz memory. The software platform used is Matlab 2023a. Table 3 provides the runtime and optimized sidelobe peak values under different parameters:
From Table 3, it can be seen that the algorithm runtime increases almost linearly with the increase in the maximum number of iterations and the number of parallel computations. When the number of iterations is set to 2000 and the number of parallel computations is set to 30, a low sidelobe peak and a short runtime can be achieved, indicating that this state can already search for approximate solutions close to the optimal. The SA-2opt parallel optimization algorithm has low requirements for hardware platforms. Because of its parallel characteristics, the parallel processing ability of the hardware platform will directly determine the operation speed. The optimized waveform parameters can be written into the radar RF module, avoiding the time consumption of real-time calculations and making it feasible for engineering applications.

5.5. Waveform Anti-Jamming Performance

To reduce the waveform’s autocorrelation sidelobe peak, the coding sequence of the signal model described in Section 2.1 can be optimized using the SA-2opt parallel optimization algorithm. This optimization results in a transmitted waveform with a sidelobe peak of −20.7 dB, as shown in Figure 9.
The reception signal parameters are shown in Table 4. The following waveform anti-jamming experiments will be conducted based on these parameters. It is assumed that the jammer directly forwards the sampled signal without any delay, and the forwarded signal is identical to the sampled signal with no additional noise. The suppression effects of three types of jamming—ISDRJ, ISPRJ, and ISCRJ—are shown in Figure 16a–c. From left to right in the figure, the jamming types are ISDRJ, ISPRJ, and ISCRJ, respectively.
As shown in Figure 16a–c, in ISDRJ, the jamming signal is forwarded once at the start of the next sub-pulse after sampling the current sub-pulse. In ISPRJ, the jamming signal is forwarded three times at the start of the next sub-pulse after sampling the current sub-pulse. In ISCRJ, the jamming signal is forwarded in a cyclic manner, starting with the current sampled pulse, then the previous sampled pulse, and so on. The higher intensity stripes in the figure represent the jamming, i.e., ISRJ, while the darker stripes represent the target echoes.
Following the general signal processing flow of a radar system (down conversion, pulse compression, and target detection), the range information of the target can be obtained after pulse compression. In the simulation experiment, the target is placed at the 2560th sampling point. The pulse compression results before and after applying the jamming suppression algorithm described in Section 4 of this paper are shown in Figure 17. Specifically, Figure 17a–c represent the pulse compression results under ISDRJ, ISPRJ, and ISCRJ, respectively.
In Figure 17, the amplitude of the false targets formed after pulse compression of the jamming signals is normalized based on the noise power. The ratio of the false target intensity to the true target intensity increases sequentially in Figure 17a–c. It can be observed that the number of false targets is determined by the number of times the sub-pulses are sampled and forwarded. Given a fixed jamming-to-signal ratio (JSR), the number of sampled sub-pulses determines the amplitude of the false targets. Before applying the jamming suppression measures, the true target is overwhelmed by the false targets, and in Figure 17a–c, the amplitude of the jamming signals’ sidelobes is even higher than the main lobe peak of the true target. After applying the jamming suppression measures described in Section 3.2, the false targets are largely suppressed, making the true target clearer. Additionally, the residual jamming can be suppressed using the time-domain filter.
To validate the environmental adaptability of the proposed method, we evaluate its anti-jamming performance between low-SNR (−10 dB) and high-SNR (10 dB) regimes. Figure 18 is the result of the interference suppression method in this paper at SNRs of 5, 0, −5, and −10.
It can be seen from Figure 17 and Figure 18 that the interference suppression method in this paper effectively suppresses the interference between −10 and 10 dB, which shows the robustness of the interference suppression method in a complex electromagnetic environment.
Figure 19a–c show the comparison of the jamming suppression methods described in Section 4.3 with other methods, such as only removing sub-pulses affected by jamming or no time-domain filtering after pulse compression. From Figure 19a–c, it can be seen that directly discarding jammed sub-pulses would cause an amplitude loss in target signals after pulse compression. If applying pulse compression directly to FrFT-extracted target echoes, residual jamming persists, degrading subsequent detection performance. In contrast, the proposed method extracts target signals and integrates time-domain filtering post-compression, suppressing the residual jamming.
Since the entire pulse is divided into M sub-pulses, M segmented matching filters are required to process the target echo. Taking eight sub-pulses as an example, the running time of this process on MATLAB 2023 is 0.116412 s. The running time on Code Composer Studio 5.0 is 0.86 s. The above MATLAB 2023 operation results are based on a hardware platform with CPU i5-13400F and memory DDR5 4800 MHz. The running time result of Code Composer Studio 5.0 is based on a DSP TMS320C6678 chip. In addition, the interference suppression measures will also consume hardware resources equivalent to segmented pulse compression. Therefore, in practical engineering applications, signal processing chips with sufficient computing power are needed to ensure real-time performance.

5.6. Effect of Delay on Jamming Suppression

In Section 5.5, we assume that the repeater of the jammer is not delayed, but this is different from the actual electronic warfare environment. In this section, we further evaluate the interference suppression effect of the proposed method after the interference signal is delayed by 0 to 3 ns (other simulation parameters remain consistent with Section 5.5) to simulate the radar signal forwarding by the conventional DRFM jammer. Normalization is based on the interference suppression effect when the delay is 0. The false target suppression effect corresponding to the interference delay is shown in Figure 20.
It can be seen from Figure 20 that the jamming forwarding delay of 0 to 3 ns basically does not affect the jamming suppression effect, and the proposed method can effectively achieve interference suppression. The performance change within 0.3 dB in Figure 20 also includes the performance loss caused by sampling, and the actual interference suppression effect should be less affected by the interference delay. As a comparison, the false target suppression effect is more than 40 dB when the delay is 0. Because the Doppler frequency shift caused by the target has little effect on the waveform performance, the combined effect of the interference delay and the target speed is also within the acceptable range within the interference delay of 0 to 3 ns. In addition, when the interference forwarding delay exceeds 400 ns, that is, 0.4 times the sub-pulse width, the accuracy of the K-means clustering algorithm will show obvious irregular changes. This is because the energy distribution of the interference signal is similar on the two adjacent sub-pulses of the target echo, so it is difficult to judge whether the sub-pulse is interfered. The correct judgment of whether the sub-pulse is disturbed will directly affect the interference suppression effect.

6. Summary

This paper focuses on intermittent-sampling forwarding jamming and optimizes the jointly coded intra-pulse frequency and chirp rate waveform to achieve the lowest autocorrelation sidelobe peak. The optimized waveform has the following advantages:
(a) The high degree of sub-pulse orthogonality effectively utilizes the mutual masking properties between sub-pulses, thereby establishing a clear discriminative boundary between the target echo and jamming signals.
(b) The low autocorrelation sidelobes, reaching −20.7 dB, enhance the signal-to-clutter ratio (SCR) after pulse compression, thereby improving target detection performance.
Additionally, this paper employs the FrFT to extract the target signal from receive signal and uses multi-dimensional features for interference detection based on the K-means algorithm. A time-domain filter is then constructed to suppress the jamming. Simulation experiments not only verify the low autocorrelation sidelobe characteristics of the optimized waveform, but also demonstrate the effectiveness of the proposed method in anti-ISRJ.
Adding detection probability (Pd) and false alarm probability (Pfa) is helpful for evaluating anti-jamming performance, but it is unreasonable to apply the above evaluation criteria to this article, because this article has used the pulse compression results after interference suppression to evaluate anti-jamming performance. In the future research, we will try to introduce pd and pfa to evaluate the anti-jamming performance. On the other hand, this paper has verified the effectiveness and robustness of the proposed method through parameter simulation experiments. In the future, the proposed method will be applied in engineering.

Author Contributions

Conceptualization, Z.Y. and P.G.; methodology, Z.Y.; software, Z.Y.; validation, Y.W. and S.G.; formal analysis, Z.Y.; investigation, Z.Y.; resources, Z.Y.; data curation, Z.Y. and K.W.; writing—original draft preparation, Z.Y.; writing—review and editing, Z.Y., Y.W., and J.W.; visualization, Z.Y.; supervision, P.G. and A.X.; project administration, P.G.; funding acquisition, P.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Foundation of National Key Laboratory of Radar Signal Processing under Grant (JKW202306).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are available to readers by contacting the corresponding author.

DURC Statement

Current research is limited to the interference suppression in complex electromagnetic environment, which is beneficial for improving anti-jamming capabilities in radar systems (e.g., meteorological monitoring and navigation safety) and does not pose a threat to public health or national security. Authors acknowledge the dual use potential of the research involving waveform parameter optimization and confirm that all necessary precautions have been taken to prevent potential misuse. As an ethical responsibility, authors strictly adhere to relevant national and international laws about DURC. Authors advocate for responsible deployment, ethical considerations, regulatory compliance, and transparent reporting to mitigate misuse risks and foster beneficial outcomes.

Acknowledgments

The author would like to thank the Xi’an Electronic Engineering Research Institute.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ECMElectronic counter measure
DRFMDigital Radio Frequency Memory
ISRJInterrupted-sampling repeater jamming
ISDRJInterrupted-Sampling Direct Repeater Jamming
ISPRJInterrupted-Sampling Periodic Repeater Jamming
ISCRJInterrupted-Sampling Cyclic Repeater Jamming
SASimulated annealing
2-opt2-optimization
FrFTFractional Fourier transform
LFMLinear frequency modulation
JSRJamming-to-signal ratio
SNRSignal-to-noise ratio

References

  1. Joshi, S.K.; Baumgartner, S.V.; Krieger, G. Tracking and Track Management of Extended Targets in Range-Doppler Using Range-Compressed Airborne Radar Data. IEEE Trans. Geosci. Remote Sens. 2022, 60, 1–20. [Google Scholar] [CrossRef]
  2. Wu, S.; Zhao, C.; Chen, Z.; Wang, X.; Zhang, C.; Wei, Y. A New Doppler Model for Shipboard Coherent Microwave Ocean Radar. IEEE Trans. Geosci. Remote Sens. 2023, 61, 1–13. [Google Scholar] [CrossRef]
  3. Sørensen, K.A.; Kusk, A.; Heiselberg, P.; Heiselberg, H. Finding Ground-Based Radars in SAR Images: Localizing Radio Frequency Interference Using Unsupervised Deep Learning. IEEE Trans. Geosci. Remote Sens. 2023, 61, 1–15. [Google Scholar] [CrossRef]
  4. Liu, Y.X.; Zhang, Q.; Xiong, S.C.; Wang, H.B.; Yuan, H.; Luo, Y. A Multiple-False-Target ISAR Shape Deception Jamming Method Based on Improved Template Multiplication Modulated Time-Delay Algorithm and Sub-Nyquist Sampling. Remote Sens. 2023, 15, 5015. [Google Scholar] [CrossRef]
  5. Duan, J.; Zhang, L.; Wu, Y.; Li, Y. Interrupted-sampling repeater jamming suppression with one-dimensional semi-parametric signal decomposition. Digit. Signal Process. 2022, 127, 103546. [Google Scholar] [CrossRef]
  6. Zheng, H.; Jiu, B.; Liu, H. Waveform design based ECCM scheme against interrupted sampling repeater jamming for wideband MIMO radar in multiple targets scenario. IEEE Sensors J. 2021, 22, 1652–1669. [Google Scholar] [CrossRef]
  7. Fan, Y.; Jiu, B.; Pu, W.; Li, Z.; Li, K.; Liu, H. Sensing Jamming Strategy From Limited Observations: An Imitation Learning Perspective. IEEE Trans. Signal Process. 2024, 72, 4098–4114. [Google Scholar] [CrossRef]
  8. Zhou, C.; Liu, Q.; Chen, X. Parameter estimation and suppression for DRFM-based interrupted sampling repeater jammer. IET Radar, Sonar Navig. 2018, 12, 56–63. [Google Scholar] [CrossRef]
  9. Lan, L.; Zhang, Y.; Liao, R.; Liao, G.; Xu, J.; So, H.C. Mainlobe Deceptive Jammer Mitigation with Multipath in EPC-MIMO Radar Exploiting Matrix Decomposition. IEEE Trans. Veh. Technol. 2024, 73, 14674–14688. [Google Scholar] [CrossRef]
  10. Zhai, W.; Wang, R.; Wang, X.; Shi, F.; Pang, X.; Gao, Y.; Cui, W. Wideband Photonic Radar Target Simulator Based on All-Optical IQ Upconverter. IEEE Trans. Microw. Theory Tech. 2024, 73, 1203–1214. [Google Scholar] [CrossRef]
  11. Wang, Y.; Li, Y.; Zhou, Z.; Yu, G.; Li, Y. An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression. Remote Sens. 2024, 16, 1989. [Google Scholar] [CrossRef]
  12. Sun, Z.; Quan, Y.; Liu, Z. A non-uniform interrupted-sampling repeater jamming method for intra-pulse frequency agile radar. Remote Sens. 2023, 15, 1851. [Google Scholar] [CrossRef]
  13. Qi, J.; Li, S.; Chen, J.; Li, H. Optimization Method of Interrupted Sampling Frequency Shift Repeater Jamming Based on Group Teaching Optimization Algorithm. Electronics 2024, 13, 2622. [Google Scholar] [CrossRef]
  14. Xiao, J.; Wei, X.; Sun, J. Interrupted-sampling multi-strategy forwarding jamming with amplitude constraints based on simultaneous transmission and reception technology. Digit. Signal Process. 2024, 147, 104416. [Google Scholar] [CrossRef]
  15. Benvenuti, D.; Addabbo, P.; Giunta, G.; Foglia, G.; Orlando, D. ECCM Strategies for Radar Systems Against Smart Noise-Like Jammers. IEEE Trans. Signal Process. 2024, 72, 3912–3926. [Google Scholar] [CrossRef]
  16. Huang, T.; Shlezinger, N.; Xu, X.; Ma, D.; Liu, Y.; Eldar, Y.C. Multi-Carrier Agile Phased Array Radar. IEEE Trans. Signal Process. 2020, 68, 5706–5721. [Google Scholar] [CrossRef]
  17. Liu, Y.; Zhang, Q.; Liu, Z.; Li, G.; Xiong, S.; Luo, Y. An anti-jamming method against interrupted sampling repeater jamming based on compressed sensing. Sensors 2022, 22, 2239. [Google Scholar] [CrossRef]
  18. Lv, Q.; Quan, Y.; Sha, M.; Feng, W.; Xing, M. Deep neural network-based interrupted sampling deceptive jamming countermeasure method. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 2022, 15, 9073–9085. [Google Scholar] [CrossRef]
  19. Wu, M.; Li, M.; Shi, H.; Cheng, X.; Rao, B.; Wang, W. Using range-Doppler spectrum-based deep learning method to detect radar target in interrupted sampling repeater jamming. IEEE Sensors J. 2023, 23, 29084–29096. [Google Scholar] [CrossRef]
  20. Wu, Y.; Yang, L.; Duan, L.; Liu, Z.; Xing, M.; Quan, Y. Fine-grained Recognition and Suppression of ISRJ Based on UNet-A. IEEE Geosci. Remote Sens. Lett. 2024, 21, 3508805. [Google Scholar] [CrossRef]
  21. Huan, S.; Dai, G.; Luo, G.; Ai, S. Bayesian compress sensing based countermeasure scheme against the interrupted sampling repeater jamming. Sensors 2019, 19, 3279. [Google Scholar] [CrossRef] [PubMed]
  22. Li, M.; Li, W.; Cheng, X.; Wu, M.; Rao, B.; Wang, W. The transmit and receive optimization for polarimetric radars against interrupted sampling repeater jamming. IEEE Sens. J. 2023, 24, 3927–3943. [Google Scholar] [CrossRef]
  23. Zhan, H.; Wang, T.; Guo, T.; Su, X. An Anti-Intermittent Sampling Jamming Technique Utilizing the OTSU Algorithm of Random Orthogonal Sub-Pulses. Remote Sens. 2023, 15, 3080. [Google Scholar] [CrossRef]
  24. Wang, F.; Li, N.; Pang, C.; Li, C.; Li, Y.; Wang, X. Complementary sequences and receiving filters design for suppressing interrupted sampling repeater jamming. IEEE Geosci. Remote Sens. Lett. 2022, 19, 1–5. [Google Scholar] [CrossRef]
  25. Wang, X.; Li, B.; Liu, W.; Chen, H.; Zhu, Y.; Ni, M. Anti-interrupted sampling repeater jamming based on intra-pulse frequency modulation slope agile radar waveform joint FrFT. Digit. Signal Process. 2024, 147, 104418. [Google Scholar] [CrossRef]
  26. Wang, Y.; Yu, X.; Fan, T.; Cui, G. Design of Cognitive Radar Orthogonal Subpulse Width against Multiple Jamming. In Proceedings of the 2024 32nd European Signal Processing Conference (EUSIPCO), Lyon, France, 26–30 August 2024; pp. 2392–2396. [Google Scholar]
  27. Li, Y.; Wang, J.; Wang, Y.; Zhang, P.; Zuo, L. Random-frequency-Coded waveform optimization and signal coherent accumulation against compound deception jamming. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 4434–4449. [Google Scholar] [CrossRef]
  28. Chen, J.; Chen, X.; Zhang, H.; Zhang, K.; Liu, Q. Suppression method for main-lobe interrupted sampling repeater jamming in distributed radar. IEEE Access 2020, 8, 139255–139265. [Google Scholar] [CrossRef]
  29. Zhang, J.; Mu, H.; Wen, S.; Liao, S.; Sha, M. Anti-intermittent sampling jamming method based on intra-pulse LFM-Costas frequency stepping. Syst. Eng. Electron. 2019, 41, 2170. [Google Scholar] [CrossRef]
  30. Dong, S.; Quan, Y.; Sha, M.; Fang, W.; Xing, M.D. Frequency agile radar combined with intra-pulse frequency coding to resist intermittent sampling jamming. Syst. Eng. Electron. 2022, 44, 3371. [Google Scholar] [CrossRef]
  31. Lu, L.Y.; Li, M.; Chen, H.; Zuo, L.; Zhang, P. CFAR detection of DRFM deception jamming based on entropy feature. Syst. Eng. Electron. 2016, 38, 732. [Google Scholar]
Figure 1. Time –frequency plot of the transmitted signal.
Figure 1. Time –frequency plot of the transmitted signal.
Sensors 25 03000 g001
Figure 2. The operational mode of ISRJ.
Figure 2. The operational mode of ISRJ.
Sensors 25 03000 g002
Figure 3. Jamming suppression process.
Figure 3. Jamming suppression process.
Sensors 25 03000 g003
Figure 4. The SA algorithm flow.
Figure 4. The SA algorithm flow.
Sensors 25 03000 g004
Figure 5. The 2-opt algorithm flow.
Figure 5. The 2-opt algorithm flow.
Sensors 25 03000 g005
Figure 6. Flowchart of the SA-2opt parallel optimization algorithm.
Figure 6. Flowchart of the SA-2opt parallel optimization algorithm.
Sensors 25 03000 g006
Figure 7. The FrFT schematic diagram.
Figure 7. The FrFT schematic diagram.
Sensors 25 03000 g007
Figure 8. The interference suppression method in this paper.
Figure 8. The interference suppression method in this paper.
Sensors 25 03000 g008
Figure 9. The time–frequency plot of the optimized waveform.
Figure 9. The time–frequency plot of the optimized waveform.
Sensors 25 03000 g009
Figure 10. The autocorrelation function plot of the waveform.
Figure 10. The autocorrelation function plot of the waveform.
Sensors 25 03000 g010
Figure 11. Monte Carlo experiment of sidelobe peak before and after optimization.
Figure 11. Monte Carlo experiment of sidelobe peak before and after optimization.
Sensors 25 03000 g011
Figure 12. Comparison with traditional optimization algorithms.
Figure 12. Comparison with traditional optimization algorithms.
Sensors 25 03000 g012
Figure 13. The comparison of the Monte Carlo optimization results.
Figure 13. The comparison of the Monte Carlo optimization results.
Sensors 25 03000 g013
Figure 14. The comparison of the convergence curve.
Figure 14. The comparison of the convergence curve.
Sensors 25 03000 g014
Figure 15. A part of the ambiguity function.
Figure 15. A part of the ambiguity function.
Sensors 25 03000 g015
Figure 16. Time–frequency plots of three types of jamming.
Figure 16. Time–frequency plots of three types of jamming.
Sensors 25 03000 g016
Figure 17. Comparison before and after jamming suppression for three types of jamming.
Figure 17. Comparison before and after jamming suppression for three types of jamming.
Sensors 25 03000 g017
Figure 18. Anti-jamming performance under different signal-to-noise ratios.
Figure 18. Anti-jamming performance under different signal-to-noise ratios.
Sensors 25 03000 g018
Figure 19. Comparison of jamming suppression results for ISDRJ, ISPRI, and ISCRJ.
Figure 19. Comparison of jamming suppression results for ISDRJ, ISPRI, and ISCRJ.
Sensors 25 03000 g019
Figure 20. Anti-jamming performance under different delays.
Figure 20. Anti-jamming performance under different delays.
Sensors 25 03000 g020
Table 1. The waveform parameters.
Table 1. The waveform parameters.
ParametersValues
Sub-pulse chirp rate ( Hz / s ) 1.26 × 10 13 , 1.62 × 10 13 , 5.4 × 10 12 , 7.2 × 10 12 , 3.6 × 10 12 , 9.0 × 10 12 , 1.08 × 10 13 , 1.44 × 10 13
Sub-pulse frequency hopping interval ( MHz ) 3
Sampling rate ( MHz ) 160
Sub-pulse width ( μ s ) 1
Number of sub-pulses M8
Table 2. The influence of target velocity on waveform performance.
Table 2. The influence of target velocity on waveform performance.
Target Radial VelocityPulse Pressure Loss
00
± 10 m/s8.69 × 10 4 dB
± 100 m/s4.00 × 10 2 dB
± 300 m/s0.37 dB
± 500 m/s1.04 dB
± 1000 m/s4.55 dB
± 1500 m/s12.62 dB
Table 3. Runtime and optimized sidelobe peak values under different parameters.
Table 3. Runtime and optimized sidelobe peak values under different parameters.
Maximum Number
of Iterations
Number of
Parallel Computing
Running TimeSidelobe Peak
500050160 min0.09
50001032 min0.10
20003015 min0.09
150010040 min0.09
1000308 min0.11
100010060 min0.10
Table 4. Received signal parameters.
Table 4. Received signal parameters.
ParametersValues
Sub-pulse width (us)1
Frequency hopping interval Δ f   ( MHz ) 3
Maximum bandwidth of sub-pulses ( MHz ) 16.2
Minimum bandwidth of sub-pulse ( MHz ) 3.6
Jamming-to-signal ratio JSR ( dB ) 20
Signal-to-noise ratio SNR ( dB ) 10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yin, Z.; Guo, P.; Wei, Y.; Gao, S.; Wang, J.; Xue, A.; Wang, K. An Anti-Interrupted-Sampling Repeater Jamming Method Based on Simulated Annealing–2-Optimization Parallel Optimization of Waveforms and Fractional Domain Extraction. Sensors 2025, 25, 3000. https://doi.org/10.3390/s25103000

AMA Style

Yin Z, Guo P, Wei Y, Gao S, Wang J, Xue A, Wang K. An Anti-Interrupted-Sampling Repeater Jamming Method Based on Simulated Annealing–2-Optimization Parallel Optimization of Waveforms and Fractional Domain Extraction. Sensors. 2025; 25(10):3000. https://doi.org/10.3390/s25103000

Chicago/Turabian Style

Yin, Ziming, Pengcheng Guo, Yunyu Wei, Sizhe Gao, Jingjing Wang, Anxiang Xue, and Kuo Wang. 2025. "An Anti-Interrupted-Sampling Repeater Jamming Method Based on Simulated Annealing–2-Optimization Parallel Optimization of Waveforms and Fractional Domain Extraction" Sensors 25, no. 10: 3000. https://doi.org/10.3390/s25103000

APA Style

Yin, Z., Guo, P., Wei, Y., Gao, S., Wang, J., Xue, A., & Wang, K. (2025). An Anti-Interrupted-Sampling Repeater Jamming Method Based on Simulated Annealing–2-Optimization Parallel Optimization of Waveforms and Fractional Domain Extraction. Sensors, 25(10), 3000. https://doi.org/10.3390/s25103000

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop