Next Article in Journal
Mechanistic Modelling of Biomass Growth, Glucose Consumption and Ethanol Production by Kluyveromyces marxianus in Batch Fermentation
Next Article in Special Issue
Alternating Direction Method of Multipliers-Based Constant Modulus Waveform Design for Dual-Function Radar-Communication Systems
Previous Article in Journal
Fuzzy Synchronization of Chaotic Systems with Hidden Attractors
Previous Article in Special Issue
Efficient Massive MIMO Detection for M-QAM Symbols
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Wideband Waveform Design for Distributed Precision Jamming

1
College of Electronic Engineering, National University of Defense Technology, Hefei 230000, China
2
College of Computer, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(3), 496; https://doi.org/10.3390/e25030496
Submission received: 7 February 2023 / Revised: 7 March 2023 / Accepted: 9 March 2023 / Published: 13 March 2023
(This article belongs to the Special Issue Information Theory for MIMO Systems)

Abstract

:
Precision electronic warfare is a hot direction for future jamming technology development, and distributed precision jamming (DIPJ) is one of its typical application scenarios. The task objective of DIPJ is to design jamming waveforms so that the jamming energy generated by a set of ultra-sparse array transmitters can be focused in the jamming region of interest while being suppressed in other specific protected regions, which can be viewed as a distributed multiple-input and multiple-output system waveform design problem under a three-dimensional scenario. This paper extends the jamming signal model in DIPJ from narrowband to wideband based on previous work to address a broader range of jamming tasks. After extending the model to wideband signals, a method based on the traditional maximum total energy difference optimization objective is first given for comparison. A wideband jamming waveform design method based on the majorization minimization algorithm with the desired power spectrum matching as the optimization target is designed for the problem that the maximum energy difference method cannot focus energy well in the jamming region. The simulation results show that the presented method can make the jamming energy well concentrated in the target region and evenly distributed over the whole bandwidth, while the energy in the whole bandwidth is suppressed in the protected region.

1. Introduction

The development of military science and technology, especially electronic warfare technology, is closely related to the development of information technology [1]. At the same time, electronic warfare means are the only way to offset the technical superiority of the opponent in terms of information and technology [2], making it an area of widespread concern in the direction of information technology [3]. In order to overcome the characteristics of traditional oppressive jamming, such as low efficiency, ease to counteract, and the ease with which friendly targets can be accidentally injured [4], the Strategic Technology Office (STO) of the U.S. Defense Advanced Research Projects Agency (DARPA) proposed precision electronic warfare (PREW) in 2009 [5]. PREW aims to surgically perform precision jamming in scenarios as small as city streets by using a self-organizing, ultra-sparse array of low-cost, low-power, small and lightweight distributed airborne and ground-based nodes [6].

1.1. Related Work

With the increasing advancement of small Unmanned Aerial Vehicle (UAV) technology in terms of positioning [7], communication [8], and networking [9], it is possible to use multiple UAVs to cooperate in jamming tasks. In a typical application of PREW, multiple UAVs carry jamming transmitters to complete distributed precision jamming (DIPJ), the key technology of which is focused energy delivery (FED) [10]. Previous energy focusing methods based on beam-forming, such as the delay-and-sum (DAS)-based phased array [11,12], can only produce a cone-shaped high-energy field directed at a predetermined angle, leading to the jamming energy not necessarily accurately covering the preset jamming area, and the interference energy easily leaking into non-target areas, thus increasing the risk of electromagnetic damage to friendly devices [13].
Inspired by the need to focus emitter energy to kill tumor cells while not harming healthy tissues in breast cancer treatments [14], DIPJ precisely focuses energy within a given jamming region by forming an ultra-sparse array of multiple transmitters in space. This does not mean that DIPJ uses an energy level in the focus area that is higher than traditional techniques such as DAS 10, but it requires accurate coverage of the given target area. At the same time, because the transmitter usually adopts an ultra-sparse array arrangement, other high-energy regions will be generated in regions outside the jamming region due to the grating lobe effect [15]. This requires that DIPJ also minimize jamming energy at locations in which friendly or other detection devices may be present.
Subsequent research in the field of DIPJ has focused on how to suppress the grating lobe effect in other areas of the space besides the areas that require protection [16]. By adjusting the regularization factor from the l - l norm to the infinite norm, the highest grating lobe points in the space were further inhibited [13,15]. In order to increase the degree of freedom of the design signal, improved models for optimizing the transmitter position [17] and adding multiple transmitter array elements to each transmitter [18] have also been proposed. However, there are two major problems in the literature described above. One is that the signal designed by the method only considers a single moment. If the same signal is forwarded repeatedly, even if the energy focus can be realized in space, the working bandwidth of the interfered target may not be covered well in some cases. Secondly, the optimization criteria are based on the maximum total energy difference (MTED) between the jamming area and the protected area, which is closer to the traditional jamming method of roughly placed energy, resulting in some pre-defined jamming areas not possessing a good energy focus effect.
In order to overcome this problem, a jamming waveform method for DIPJ application scenarios was proposed [19]. In this method, the covariance matrix of the wide-sense stationary transmitted jamming signal is modeled as a semi-finite programming (SDP) problem [10], and the sequential cone programming (SOCP) algorithm [20] is used to design the jamming waveform using the time average instead of the statistical average in order to match the covariance matrix. At the same time, the autocorrelation function of the synthetic waveform emitted by each transmitter in the jamming area is constrained to be as close as possible to the delta function, so that the jamming energy is able to cover the working bandwidth of the target as much as possible. Another understanding that has been acquired is that the best oppressive jamming waveform is that with the greatest degree of uncertainty [21], and the highest degree of randomness with the jamming waveform autocorrelation function is demonstrated by the delta function.
However, all these DIPJ models address narrowband signals that assume that the baseband signal is delay-free in the far field because the baseband bandwidth is negligible relative to the carrier frequency. When the jamming target uses a wideband signal or the target operating bandwidth is uncertain, a wideband signal needs to be used to jam the possible operating bandwidth of the target, and the jamming effect must be reexamined on the basis of the wideband model.
Due to the sensitivity of its military application background, jamming waveform design has rarely been described, and is usually carried out aiming at a specific application system [22,23]. Another relatively new hot area is jamming waveform design in cognitive electronic warfare [24]. However, the background of this other form of jamming waveform design is different from in the case of DIPJ applications, leading to different optimization objectives.
The DIPJ application itself can be seen as a MIMO (Multiple-Input Multiple-Output) system [25,26] in a three-dimensional scenario with a distributed transmitter arrangement. The waveform design problem of the transmitted beampattern matching design in MIMO radar [27] is also concerned with the energy focusing problem of MIMO systems; in particular, its mathematical model on wideband signals [28,29] can serve as a useful reference for the DISP wideband jamming waveform design problem, but there are still some differences between them. For example, MIMO radar expects the energy focus to be in the spatial direction, and therefore does not take attenuation into account in its guidance vector, which is more like traditional oppressive jamming with rough energy projection in certain directions. MIMO radar transmitters usually use array structures with regular time delays, because the radar system is focusing on detection [30]. However, in the jamming task, it is not necessary to consider the problem of the receipt of echoes of the transmitted waveform. Combined with distributed application, the transmitter adopts an ultra-sparse array in DIPJ.

1.2. Major Contributions

In this paper, we propose a method for solving the jamming waveform design problem for wideband DISP. The main contributions are as follows:
  • Previous research on DIPJ based on a mathematical model of the narrowband signal is extended to a wideband signal to adapt it to a wider range of applications.
  • A majorization minimization (MM) algorithm [31] is given for wideband jamming signal design based on the MTED objective. This type of optimization objective, based on the MTED between the jamming region and the protected region, has been widely used in previous studies of DIPJ [13,16,17,18]. However, it has the disadvantage of not being able to precisely control the jamming energy to remain high throughout in the target operating bandwidth, and we mainly use it for comparison with the desired power spectrum matching (DPSM) method.
  • In order to better achieve precision jamming, we propose a jamming waveform design method based on DPSM. It firstly determines an approximate expected value of the power density to be matched on the basis of a simple semi-definite programming (SDP) problem. Then, a complete derivation and algorithmic complexity analysis are given for solving a nonconvex problem containing quartic terms using the MM algorithm, including a fast approximation for solving the maximum eigenvalue of the matrix.
  • The results of the above algorithm are analyzed by simulating a typical DIPJ scenario. The quantitative results show that, compared with the method based on MTED, the DPSM method is able to design a wideband jamming waveform that is able to more accurately form a high-power focus in the jamming region over the entire bandwidth while suppressing power over the entire bandwidth of the protected region. However, compared with the previously inapplicable narrowband-based method, the MTED method can still be used for the wideband jamming waveform design of DIPJ, and it offers lower computational complexity than DPSM.

2. Wideband DIPJ Problem Formulation

A schematic diagram of the DIPJ application scenario is presented in Figure 1. W m ( m = 1 ,   2 ,   , M ) represents the total of M transmitters carried by the UAVs. It is necessary for the electromagnetic power of the transmitter to be focused in the jamming area ΩJ and limited to L in the protected areas Ω P = Ω P 1 Ω P 2 Ω P L . To facilitate the computational simulation, the scene is discretized into grid cells, and the geometric centroids of the grid cells are used to represent the locations of regions. The jamming area ΩJ and the protected area ΩP consist of the grids I and J, which can be constructed using sets represented as U = { σ i Ω J , i = 1 , 2 , , I } and V = { σ j Ω P , j = 1 , 2 , , J } , respectively.
Similar to previous research, we assume that all positioning information is accurate and there is no positioning error, and that the transmitter timing is unified and there are no problems with signal delay between transmitters.
The far-field signal at any point σ in the region is
s σ ( t ) = m = 1 M x m ( t τ m ( σ ) ) e j 2 π f 0 ( t τ m ( σ ) ) | l m σ | .
Here, lm is the location of the m-th transmitter, so that | l m σ | is the transmission distance; dividing by this indicates the attenuation of amplitude. xm is the baseband signal, τ m ( σ ) = | l m σ | / c is the time delay, and f0 is the carrier frequency. Because the baseband delay is small compared to the carrier in the narrowband model, and can therefore be directly ignored, the synthetic power at the grid cell σ can be expressed as follows [10]:
P σ = a ( σ ) H R a ( σ ) , a ( σ ) = [ e j 2 π f 0 τ 1 ( σ ) | l 1 σ | , , e j 2 π f 0 τ M ( σ ) | l M σ | ] T .
Here, R is the covariance matrix of the baseband signal. The symbols (.)T and (.)H denote the transposition and the conjugate transposition, respectively. However, when the delay of the baseband signal is not negligible (i.e., when the baseband bandwidth of the wideband signal is not less than 10% of the carrier frequency), Equation (2) does not hold, and analysis needs to be performed from the frequency domain.
The inverse Fourier transform of the baseband signal by the m-th transmitter can be written as
x m ( t ) = B / 2 B / 2 y m ( f ) e j 2 π f t d f ,
where B is the baseband bandwidth and y m ( f ) is the Fourier transform of the baseband signal by the m-th transmitter. Combined with Equation (1), this yields [28]
s σ ( t ) = B / 2 B / 2 m = 1 M 1 | l m σ | y m ( f ) e j 2 π ( f 0 + f ) τ m ( σ ) e j 2 π ( f + f 0 ) t d f .
The power spectrum at grid cell σ and frequency f is
P σ ( f ) = | a ( σ , f ) H y ( f ) | 2 ,
where
y ( f ) = [ y 1 ( f ) , y 2 ( f )   y m ( f ) ] T
and
a ( σ , f ) = = [ e j 2 π ( f + f 0 ) τ 1 ( σ ) l 1 σ , e j 2 π ( f + f 0 ) τ 2 ( σ ) l 2 σ , , e j 2 π ( f + f 0 ) τ m ( σ ) l m σ ] T .
If the baseband is a digitally sampled discrete signal with a total sequence length of N, then using the discrete Fourier transform (DFT) [32], the following can be obtained:
y ( p ) = X k p ,   p = - N / 2 , 1 , N / 2 - 1
and
X = [ x ( 1 )   x ( n ) x ( N ) ] .
In Equation (9), x(n) is an M × 1-dimensional vector representing the sampling of M transmitters at moment n. Additionally,
k p = [ 1 , e j 2 π ( p 1 ) / N , , e j 2 π ( N 1 ) ( p 1 ) / N ] T / N ,   p = - N / 2 , 1 , N / 2 - 1 ,
is used with to denote the DFT. Here, it is considered that the number of samples in the frequency domain is also N, which is the same as in the time domain. The discrete form of Equation (7) can be written as
a ( σ , f p ) , f p = p / ( N T s ) ,
where Ts = 1/B is the sampled period of the baseband. The power spectrum at grid cell σ with frequency point fp can be expressed as
P σ , f p = | a ( σ , f p ) H X k p | 2 .
Unlike the narrowband signal model, which requires consideration of the frequency domain characteristics after optimizing the space domain energy distribution [26], the power spectral density obtained in Equation (12) is the result of a joint optimization in the space and frequency domains. This is very much in line with the need for the jamming task to cover the target operating bandwidth, and in the next section, we will describe the method for designing the jamming waveform.

3. Jamming Waveform Design Optimization Algorithm

In this section, we will give the method for solving the jamming waveform using the MM algorithm for two optimization objectives. The first uses the MTED between the jamming region and the protected region as the optimization objective. This optimization criterion has been widely used in previous narrowband models, but it does not distribute the energy in each frequency band well when employing wideband models. The second uses DPSM as the optimization objective, which is more suitable for wideband signal models.

3.1. Jamming Waveform Design with MTED

The DIPJ problem with MTED as the optimization objective can be written in the following form [16]:
max X σ U p = N / 2 N 1 | a ( σ , f p ) H X k p | 2 σ V p = N / 2 N 1 | a ( σ , f p ) H X k p | 2 .
In order to improve the energy utilization efficiency of the transmitter power amplifier, a constant-modulus constraint is applied to the transmitted signal. Without a loss of generality, we set the waveform modulus constant to 1; then, we can use the MM algorithm to solve it. First, Equation (13) can be rewritten as
max x v σ U p = N / 2 N 1 | x v H A ( σ , f p ) k * p | 2 σ V p = N / 2 N 1 | x v H A ( σ , f p ) k * p | 2 s . t . | x v ( t ) | = 1 ,   t = 1 , , M N ,
where
A ( σ , f p ) = I N a ( σ , f p ) x v = vec ( X )
and is the Kronecker product, (.)* denotes the conjugate, IN is the N-dimensional unit matrix, and vec(.) denotes the vectorization of the matrix by columns. Expanding Equation (14), we have
max x v x v H ( σ U p = N / 2 N 1 F ( σ , f p ) σ V p = N / 2 N 1 F ( σ , f p ) ) x v s . t . | x v ( t ) | = 1 ,   t = 1 , , M N ,
where
F ( σ , f p ) = A ( σ , f p ) k p * k p T A ( σ , f p ) H .
Considering σ U p = N / 2 N 1 F ( σ , f p ) σ V p = N / 2 N 1 F ( σ , f p ) as a matrix R, the Equation (16) is equivalent to the following equation:
min x v x v H ( β I M N R ) x v s . t . | x v ( t ) | = 1 ,   t = 1 , , M N ,
where β is a given constant, and to ensure ( β I M N R ) = R _ 0 , β should take a value greater than the maximum eigenvalue of R .
The MM algorithm refers to a class of iterative methods dealing with hard optimization problems. Equation (18) is a quadratic minimization problem, which can be solved iteratively using the MM algorithm. Based on the majorant of the quadratic form derived in previous studies [31], the MM algorithm solves Equation (18) for the z + 1-th iteration by solving the following problem:
min x v x v H λ I M N x v + 2 Re ( x v H ( R λ I M N ) x v ( z ) ) + ( x v ( z ) ) H ( λ I M N R ) x v ( z ) s . t . | x v ( t ) | = 1 ,   t = 1 , , M N ,
where x v ( z ) is the result of the z-th iteration and λ is the maximum eigenvalue of R . Because the modulus of the signal is constant, the quadratic terms in Equation (19) with respect to both x v and x v ( z ) are constants. Then, Equation (19) can be further rewritten as
min x v Re ( x v H ( R λ I M N ) x v ( z ) ) s . t . | x v ( t ) | = 1 ,   t = 1 , , M N ,
where the Re(.) denotes the real part. Equation (20) is thus essentially equivalent to
min x v x v + ( R λ I M N ) x v ( z ) 2 s . t . | x v ( t ) | = 1 ,   t = 1 , , M N .
The closed solution of Equation (21) is
x v ( z + 1 ) = e j arg ( ( R λ I M N ) x v ( z ) ) ,
where arg(.) denotes the extraction phase operation. Because the convergence [32] of the MM algorithm is demonstrated, we can set a random constant-modulus waveform as the initial value and solving Equation (22) iteratively until the convergence threshold ε is reached, which yields the jamming waveform. However, following our tests (which will be shown in the next part of the simulation), this algorithm can be used to design a jamming waveform that is capable of creating the spatial energy effect needed by DIPJ, while concentrating the energy in the frequency domain at one frequency point, since the algorithm only cares about the difference in total energy at all frequency points. This is a new problem encountered in the wideband model that does not exist in the narrowband model.
In order to improve the effect of the design jamming waveform, we first optimize N jamming waveforms by targeting the MTED at a single frequency point p.
x p is used to denote the jamming waveform obtained by optimizing the MTED target at the frequency p; then, the optimization objective in Equation (14) is replaced as follows:
min x p   x p H ( β I M N R ) x p s . t . | x p ( t ) | = 1 ,   t = 1 , , M N ,
where R = σ U F ( σ , p ) σ V F ( σ , p ) and β is a value greater than the maximum eigenvalue of R . The MM algorithm is the same as that used to solve the problem. The N obtained waveforms are processed as follows to synthesize a final jamming waveform.
Algorithm 1: MTED method
Input:   a ( σ , f p ) , k p , ε , M , N
For p = −N/2 to N/2 − 1
Initialize:   x p ( 0 ) , z = 0
1: Calculate R according to a ( σ , f p ) , k p
2: Calculate β according to R .
3: Calculate λ according to ( β I M N R ) .
While converges threshold ε is not reached do
4: Calculate x p ( z + 1 ) according to Equation (22).
5: z = z+1.
End while
End for
6: Calculate x v according to Equation (24)
x v = e j   arg ( p = N / 2 N / 2 1 x p )
The overall algorithm flow is shown in Algorithm 1. For the sake of description, we will call this the MTED method. According to the computational complexity of matrix multiplication, computing R requires O ( 2 ( I + J ) M N 2 ) , and calculating the maximum eigenvalues of β   and   λ requires O ( 2 M N ) . The computational complexity of each iterative O ( M 2 N 2 ) is linear with the number of iterations T ˜ . There are N waveforms that need to be computed, so the total algorithm complexity of the MTED method is O ( 2 ( I + J ) M N 3 + 2 M N 2 + T ˜ M 2 N 3 ) .
The waveforms obtained by the MTED method greatly improves the energy distribution in the frequency domain, as will be shown in detail in the simulation part. However, in order to further improve the energy distribution in the frequency domain of the jamming waveform, we propose an optimization target method based on DPSM.

3.2. Jamming Waveform Design with DPSM

3.2.1. Estimated Desired Power Spectrum

The idea of DPSM is to let each point on the power spectrum match a desired value so that it can be more accurately controlled in the frequency domain. In DIPJ applications, the operating band of the target device is equal to the bandwidth of the wideband jamming waveform or lies in an unknown segment of the jamming waveform bandwidth. On the basis of this assumption, we want to design the jamming waveform with the highest possible total energy of the power spectrum at each grid cell of the jamming region, and the shape of the power spectrum resembles a gate function uniformly distributed over the entire bandwidth. In two-dimensional MIMO systems such as MIMO radar waveforms, similar effects are usually determined by beam pattern matching [27], because there are only two types of regions: the main lobe region, which needs to focus energy, and the side lobe region, which inhibits energy. However, because there are other regions (the green area in Figure 1) besides the jamming and protected regions, we cannot match them according to the desired beam pattern, as is possible in the MIMO radar waveform design. Note that Equation (12) can be written as
P σ , f p = a ( σ , f p ) H y ( p ) y ( p ) H a ( σ , f p ) = a ( σ , f p ) H S p a ( σ , f p ) ,
where Sp is the cross-spectral density matrix [33] of the baseband and y(p) is the frequency domain signal transformed by Fourier transform. A reasonable desired power spectrum target can be obtained by optimizing Sp. The following optimization problem is given:
max S p   min μ μ s . t .   a ( σ , f p ) H S p a ( σ , f p ) μ S p _ 0 d i a g ( S p ) m m = 1 m = 1 , , M ,   σ U .
a ( σ , f p ) H S p a ( σ , f p ) μ indicates that the minimum power at points in the jamming region at frequency p is greater than μ (μ is also the quantity to be optimized).   S p _ 0 constrains this to be a semi-positive definite matrix. d i a g ( S p ) m m = 1   indicates that the diagonal elements are all 1, which is equivalent to dividing the total NM energy of the constant-mode signal evenly into N parts, and the total energy at each frequency point is M. This simultaneously ensures that the total energy emitted by each UAV is equal. Equation (26) is a convex problem that can be solved directly using the CVX toolbox [34]. Notice that y(p)y(p)H has rank one, and the Sp optimized by Equation (26) is full rank, so the idea of continuing optimization after Sp to obtain y(p) to obtain the jamming waveform is not achievable [28].
Then, Sp is used to find the grid cell σ i with the greatest power spectrum value in the jamming region at each frequency point p.
E J ( p ) = max ( a ( σ i , f p ) H S p a ( σ i , f p ) ,   σ i U )
The desired power spectrum obtained by Equation (27) is a highly suitable matching target. This is because, in Equation (26), the power spectrum of each grid cell in the entire jamming region is optimized to be as large as possible after fixing a certain frequency point p. When we then design the jamming waveform using the same optimization target for the entire frequency band, the power spectrum of the jamming waveform can be close to the desired power spectrum, but cannot exceed it, as will be verified in the simulation section.

3.2.2. Mathematical Derivation of Algorithm

The new optimization objective is to make the power spectrum of the designed jamming waveform as close as possible to the desired power spectrum in the jamming region, and as low as possible in the protected region. Based on the principle of least squares, the new optimization function is
min x v w 1 σ U p = N / 2 N 1 ( | x v H A ( σ , f p ) k * p | 2 E J ( p ) ) 2 + w 2 σ V p = N / 2 N 1 | x v H A ( σ , f p ) k * p | 2 s . t . | x v ( t ) | = 1 ,   t = 1 , , M N .
Equation (28) is a multi-objective optimization problem, where w1, w2 are scaling factors used to adjust the weights of the two optimization objectives. Equation (28) contains a non-convex quartic term, and we need to vary the form in order to iterate the solution using the MM algorithm. Expanding Equation (28) for the quartic term, we obtain the following:
w 1 σ = U p = N / 2 N / 2 1 | ( x v ) H F ( σ , f p ) x v | 4 = vec H ( x v x v H ) ( w 1 σ = U p = N / 2 N / 2 1 vec ( F ( σ , f p ) ) vec H ( F ( σ , f p ) ) ) vec ( x v x v H ) .
Here, we apply the formula tr ( A H B ) = vec H ( A ) vec ( B ) , where tr(.) takes the trace of the matrix.
Let P = w 1 σ = U p = N / 2 N / 2 1 vec ( F ( σ , f p ) ) vec H ( F ( σ , f p ) ) ; then, the majorant of the quadratic form is applied and the constant term is omitted. The MM algorithm solves the quartic terms contained in Equation (29) in the z + 1th iteration by solving the following problem:
min x v 2 Re ( vec H ( x v x v H ) ( P λ 1 I M N ) vec H ( x v ( z ) ( x v ( z ) ) H ) ) s . t .   | x v ( t ) | = 1 ,   t = 1 , , M N ,
where λ 1 is the maximum eigenvalue of P. The dimensionality of the P matrix is large, and solving its eigenvalues is slow (in our simulation scenario below, the dimensionality of the P matrix exceeds the upper limit of memory that can be stored); here, we give a fast approximate solving method. According to the trigonometric inequality, we have
λ max ( P ) σ i = 1 I λ max ( P σ i ) ,
where λ max ( . ) denotes the maximum eigenvalue and P σ i = w 1 p = N / 2 N / 2 1 vec ( F ( σ i , f p ) ) vec H ( F ( σ i , f p ) ) . According to the definition of eigenvalues, when p is a finite number, for any k j [ N / 2 , , N / 2 1 ] , we have [35]
P σ i vec ( F ( σ i , f k j ) ) = p = N / 2 N / 2 1 vec ( F ( σ i , f p ) ) vec H ( F ( σ i , f p ) ) vec ( F ( σ i , f k j ) ) = p = N / 2 N / 2 1 t r ( k p * k p T a ( σ i , f p ) H a ( σ i , f p ) k p * k p T a ( σ i , f p ) H a ( σ i , f p ) ) vec ( F ( σ i , f k j ) ) N max ( a ( σ i , f p ) H a ( σ i , f p ) , p [ N / 2 , , N / 2 1 ] ) 2 vec ( F ( σ , f k j ) ) .
The following inequation is obtained:
λ 1 = λ max ( P ) σ i = 1 I λ max ( P σ i ) σ i = 1 I N max ( a ( σ i , f p ) H a ( σ i , f p ) , p [ N / 2 , , N / 2 1 ] ) 2 .
Since applying the majorant of the quadratic form requires a semi-positive definite matrix larger than P, using a number larger than the maximum eigenvalue naturally satisfies the requirement. This allows λ 1 to be obtained by quick calculation with the modal value of a ( σ , f p ) .
By expanding Equation (30), we obtain
2 Re ( vec H ( x v x v H ) ( P λ 1 I M N ) vec ( x v ( z ) ( x v ( z ) ) H ) ) = 2 Re ( w 1 σ = U p = N / 2 N / 2 1 tr ( x v H F ( σ , f p ) x v ) tr ( ( x v ( z ) ) H F ( σ , f p ) H x v ( z ) ) ) 2 λ 1 x v H x v ( z ) ( x v ( z ) ) H x v = x v H ( 2 w 1 σ = U p = N / 2 N / 2 1 ( ( x v ( z ) ) H F ( σ , f p ) H x v ( z ) F ( σ , f p ) ) 2 λ 1 x v ( z ) ( x v ( z ) ) H ) x v .
Algorithm 2: DPSM method
Input:   w 1 , w 2 , a ( σ , f p ) , k p , ε , M , N .
Initialize:   x v ( 0 ) , z = 0
1: Calculate E J ( p ) according to Equations (26) and (27).
2: Calculate λ 1 according to Equation (33).
3: While converges threshold ε is not reached do
4: Calculate Q 1   and   Q 2 according to Equation (37).
6: Calculate λ 2   and   λ 3 according to Equation Q 1   and   Q 2 .
7: Calculate x v ( z + 1 ) according to Equation (36).
8: z = z+1.
9: End while
After omitting the constant term, applying the MM algorithm to solve the z + 1-th iteration of Equation (28) is equivalent to solving the following problem:
min x v x v H ( 2 w 1 σ = U p = N / 2 N / 2 1 ( ( ( x v ( z ) ) H F ( σ , f p ) H x v ( z ) E J ( p ) ) F ( σ , f p ) ) 2 λ 1 x v ( z ) ( x v ( z ) ) H ) x v + w 2 σ V p = N / 2 N / 2 1 | x v H A ( σ , f p ) k * p | 2 s . t .   | x v ( t ) | = 1 ,   t = 1 , , M N .
Note that the above equation is still quadratic with respect to x v and a majorant can be used again. As in the corollary presented in Section 3.1, the closed-form solution of Equation (35) is
x v ( z + 1 ) = e j arg ( 2 ( Q 1 λ 2 I M N + Q 2 λ 3 I M N ) x v ( z ) ) ,
where λ2 and λ3 are the maximum eigenvalue of Q1 and Q2, respectively. Q1 and Q2 are
Q 1 = w 1 σ = U p = N / 2 N / 2 1 ( ( ( x v ( z ) ) H F ( σ , f p ) H x v ( z ) E J ( p ) ) F ( σ , f p ) ) λ 1 x v ( z ) ( x v ( z ) ) H Q 2 = w 2 σ = V p = N / 2 N / 2 1 F ( σ , f p ) .
Algorithm 3: MM Acceleration Strategy
Initialize: x v ( 0 ) , s ( 0 ) = x v ( 0 ) , k = 1 , z = 0 .
While MM algorithm does not achieve converges threshold do
1:   Take   s ( k 1 ) as the initial value and use DPSM algorithm for one iteration, and take the calculated result as s ( k ) .
2: k = k+ 1.
if k < 3 go bank to step1
else
3: r = s ( 1 ) s ( 0 ) .
4: g = s ( 2 ) s ( 1 ) r .
5: α = r / g .
6: s s = e j arg ( s ( 0 ) 2 α r α 2 g )
While use s s to calculate the value of the objective function in Equation (28), if it is greater than the value of the function calculated by s ( 0 ) do
7: α = ( α 1 ) / 2 .
8: s s = exp j   arg ( s ( 0 ) 2 α r α 2 g )
End while
9: k = 0, z = z+ 1.
10: s ( 0 ) = s s .
11: x v ( z ) = s s .
End while
The overall algorithm flow is shown in the Algorithm 2. For the sake of description, we will call this the DPSM method. Obtaining E J ( p ) requires solving N SDP problems, and the computational complexity is O ( N ( M + I ) 3 ) . The complexity of computing λ 1 is O ( I M 2 N ) . The complexity of computing Q 1   and   Q 2 is O ( 2 I ( M 2 N 3 + M N 3 ) + 2 J M N 3 + M 2 N 2 ) . The complexity of computing λ 2   , λ 3   and   x v ( z + 1 ) is O ( 2 M N + M 2 N 2 ) .
By combining the number of iterations T ˜ , the total computational complexity of the DPSM method corresponds to O ( N ( M + I ) 3 + I M 2 N + 2 T ˜ ( I ( M 2 N 3 + M N 3 ) + J M N 3 + M 2 N 2 + M N ) ) .

3.2.3. Acceleration Strategy

The use of the majorant twice in Equations (30) and (36) may lead to a slow decline in the objective function with iteration of the MM algorithm. Since a large part of the computational complexity of the DPSM method is related to the number of iterations, we use squared iterative methods [36] to speed up the process. Here, only the operation flow is given in Algorithm 3, and interested readers should read the original reference. In the later part of the simulation, results will be given verifying that the squared iterative methods greatly speed up the convergence of the iterations.

4. Simulation Verification and Results Discussion

4.1. Experimental Scenarios and Parameter Settings

We verify the performance of the designed wideband jamming waveform by means of a typical DIPJ scenario, as illustrated in Figure 2. The simulation region is a 100 m × 100 m square area set in the XOY plane. The ultra-sparse array is composed of M = 10 transmitters randomly positioned within the circular regions with radii of 30 m at a distance d = 2000 m from the XOY plane. The carrier frequency was f0 = 1.0 GHz, the baseband and bandwidth were B = 100 MHz and N = 100. The grid size in the target and protected areas was 1 m × 1 m. ΩJ was a circular region with a radius of 5 m centered at the (x, y, z) coordinates (0 m, 0 m, 0 m), and ΩP consisted of four circular regions with a radius of 2 m centered at (−25 m, 25 m, 0 m), (10 m, −25 m, 0 m), (20 m, 25 m, 0 m), and (27 m, 0 m, 0 m). The simulations were conducted using MATLAB 2019a.

4.2. Comparison of Different Algorithm Effects

Firstly, the effectiveness of the jamming waveforms designed using the different algorithms is compared. Similar to in the previous studies [10,16,17,18,19,20], we normalize all the power spectrum values calculated using Equation (12) by d2 and convert them into a dB representation. The normalized power spectra are summed over the frequency domain by
E σ = p = N / 2 N / 2 1 P σ , f p ,
and their spatial energy distributions are shown in Figure 3. The blue circles in the figure mark the locations of the jamming region, and the four white circles correspond to the four protected areas.
In Figure 3a, a random set of constant-modulus waveforms whose energy is presented as uniformly distributed in space is used to perform a comparison. In Figure 3b, the MFED algorithm [16] is actually solved using Equation (22). Both the MFED algorithm and the MTED method can be seen in Figure 3c to be capable of achieving energy focus in the jamming region. Since the optimization target of the DPSM method in Figure 3d is to minimize the energy in the protected region instead of maximizing the energy difference with the jamming region, it has a better energy suppression effect in the protected area than MFED or MTED, and it can also concentrate energy in the jamming area.
As discussed in Section 3, for jamming tasks, we are not only concerned with the distribution of the jamming waveform in terms of spatial energy, but also with its power spectrum. The normalized power spectra of the jamming waveforms obtained using different methods in each of the grid cells in the jamming and protected regions are given in Figure 4, where the vertical axis indicates the frequency and the horizontal axis is labeled with the grid cell of the jamming region and each protected region.
The random constant-modulus waveform shown in Figure 4a is completely random in terms of its power spectrum distribution. Because the MFED algorithm only targets total energy without considering its frequency distribution, even though its spatial energy achieves a focusing effect, as shown in Figure 3b, it can be seen from Figure 4b that the energy of its jamming waveform is mainly concentrated on only one frequency point of the power spectrum. This obviously cannot be used as a jamming waveform to cover the working bandwidth of the target to achieve a suppressed jamming effect. With our improvements, the MTED algorithm avoids concentrating the energy in a single frequency point of the power spectrum. However, as can be seen in Figure 4c, since it is optimized for a single frequency band, some amplitude information is discarded when synthesizing the constant-modulus waveform using Equation (24). This causes the power of the jamming region in some bands to not be sufficiently high, while the power in the protected region in some bands will be too high.
With respect to the DPSM algorithm, it can be seen in Figure 4d that the jamming energy is focused throughout the frequency band, while there are no particularly high-energy points in the protected region. Note the relatively high energy in protected region 1, which is related to the grating lobe effect of the ultra-sparse array mentioned previously, and the current waveform may form a higher grating lobe precisely in protected region 1 in order to focus in the jamming region. Adjusting the randomly generated UAV position (by fixing the random number seed, several algorithms can be compared using the same UAV positions) may improve this, but our algorithm does not involve the optimization of the UAV position, which is a possible future research direction [18]. Additionally, if the weight of the scaling factor w 2 in Equation (28) is adjusted, the energy in this region could be further suppressed at the expense of partial focusing performance, as will be shown in Section 4.3.
In particular, the effect of a set of broadband jamming waveforms is also shown in Figure 5; these were designed using the SCP (Sequential Cone Programming) algorithm [37] under the narrowband model. Here, the optimization of the SCP algorithm refers entirely to the approximate narrowband model presented in Equation (2). It can be seen from Figure 5a that the spatial energy of the jamming area is still able to produce a certain focusing effect (the quantitative results show that the spatial energy of the jamming area is about 1.5 dB lower than that obtained using the MTED algorithm, on average), but the inhibition effect on the protected area is not obvious. From the power spectrum presented in Figure 5b, it is more obviously apparent that, because the approximate model only considers the case of the central carrier frequency 1 GHz, the jamming energy periodically appears at high and low points, with 1 GHz as the center, which leads to its focus possessing low total energy. The four protected areas also have high power spectrum points in some frequency bands for the same reason.

4.3. Comparison of DSPM Method under Different Parameters

We verified the effectiveness of the DSPM algorithm relative to other algorithms, and in the next step we will focus on comparing the effect of jamming waveforms designed with the DSPM algorithm using different parameter settings. In Section 4.2, w1 and w2 were set to w1 = 1 − w2 and w2 = 10−4, respectively. In this section, we will modify w2 to 0 and 10−3, representing conditions under which the protected region energy is not considered to be limited, and in which the weight of the protected region is increased by a factor of 10, respectively.
It can be seen in Figure 6a and Figure 7a that with the setting w2 = 0, the energy and power spectrum of the designed jamming waveform generated in the protected region increases significantly due to the absence of suppression compared to the previous w2 = 10−4. As will be shown later, the average energy level in the protected region at this time is close to that of the random constant-modulus waveform. When setting w2 = 10−3, the energy and power spectrum of the jamming waveform in the protected region in Figure 6b and Figure 7b are very significantly suppressed compared to the previous setting of w2 = 10−4, but this results in a considerable sacrifice of focusing performance of the jamming region.
In order to more clearly represent the magnitude of the power at different frequencies, we use
J P f p = σ U P σ , f p / I   ,   P P f p = σ V P σ , f p / J
to take the average power spectrum of all the grids in the jamming area and the protected area, respectively.
Setting w2 = 0 indicates the presence of no restrictions on the protected region, reflecting the best focusing effect of the DSPM method in the jamming region. As shown in Figure 8a, the average power spectrum of the jamming waveform designed under this condition lies at around 19 dB in the jamming region. This is close to but does not exceed the desired power spectrum calculated using Equation (27), which verifies the reasonableness of the desired power spectrum setting. As shown in Figure 8b, if the energy level of the protected region is not suppressed, the designed jamming waveform power spectrum will lie at around 10 dB, which is similar to the effect produced by using a random constant-modulus signal as the jamming waveform. When setting w2 = 10−4, the jamming waveform average power in the protected area in Figure 8b is reduced to around 5 dB, while the jamming waveform average power spectrum in the jamming area in Figure 8a only has a small reduction of less than 0.5 dB. After the value of w2 is expanded by a factor of 10 to 10−3, the average power spectrum of the jamming waveform in the protected region is reduced to below 0 dB in Figure 8b. The corresponding average power spectrum of the jamming waveform in the jamming region is reduced by 2 dB, and then concentrated at around 17 dB in Figure 8a. In summary, the focus of the jamming waveform design in the jamming region energy concentration and protected area suppression can be adjusted by the weight of the scaling factor, which should be decided according to the actual task requirements.
Figure 9 shows the effect of the acceleration strategy of the MM algorithm in Section 3.2.3. Since the MM algorithm is deterministically convergent, we set the threshold for stopping the iterations ε to be equal to the difference between the objective functions of two iterations less divided by the initial objective function less than 10−5. The convergence condition is reached after about fifty iterations of the DSPM method with the acceleration strategy (note that, as shown in Algorithm 3, the MM algorithm is executed twice for each iteration with the acceleration strategy), while the corresponding DSPM method without the acceleration strategy is executed 1000 times and is still far from reaching the stopping condition. As discussed in Section 3.2, the computational complexity of the DSPM method is related to the number of iterations, and the acceleration strategy greatly reduces the computational complexity of the MEDP algorithm.
Figure 10 shows the change in the values of the designed jamming waveform after fixing w2 = 10−4 but increasing the number of UAVs to 15 and 20 (note: the range of energy values shown in the graph is different from that in the previous figures due to the increase in overall launch energy). One point of interest is that the total energy emitted at M = 20 is only 3 dB higher than that at M = 10, as evidenced by the increase in the average power spectrum of the random constant-mode waveform shown in Figure 10e from about 9.5 dB to about 12.5 dB. However, the average power spectrum of the jamming waveform in the jamming region is increased by about 5 dB, which indicates directly that the effect of energy focusing increases significantly when the number of UAVs is increased. In the future, if large-scale UAV clusters are to be used for jamming missions, the significance in the implementation of DIPJ studied in this paper will be more prominent when the jamming suppression effect needs to be enhanced as much as possible because of the limited emission energy of individual UAVs. Another interesting phenomenon is that, despite increasing the number of UAVs is increased, the designed jamming waveform nevertheless does not significantly increase the energy or average power spectrum in the protected area. This may be due to the increase in the number of UAVs in the fixed area attenuating the sparsity of the transmitter arrangement, and thus reducing the grating lobe effect, which is worthy of further study in the future.
Finally, we give the calculation time of a single iteration of the MTED and DSPM algorithms under the condition of the number of UAVs M and the length of waveform N under different parameters in Table 1. Please note that one iteration time of the MTED algorithm here refers to the total operation time of all N frequency points. The computational complexity of the two algorithms is related to N3 and M2, so when N increases, the impact on the calculation time is significantly greater than when M increases, which is consistent with our computational complexity analysis. Although the optimization effect of the previous MTED algorithm is weaker than that of the DSPM algorithm, its lower computation time is its advantage, which is also in line with the computational complexity analysis results of our previous algorithm.

5. Conclusions

In this paper, we tried to solve the DIPJ jamming waveform design problem by means of a wideband signal model. First, the previous mathematical model based on narrowband signals was extended in order to consider wideband situations. Following the simple improvement of the previous algorithm, the MTED method was determined, which is applicable to the broadband model and has low computational complexity. In order to obtain a jamming waveform with better effect, we proposed the DSPM method and provided a detailed derivation. To address the lack of matching targets when using the DSPM method, a design method was developed for the desired power spectrum, while an approximate solution method for the maximum eigenvalue and an iterative acceleration strategy were developed in order to reduce the computational complexity of the DSPM method in the iterative process of the MM algorithm. A typical DIPJ scenario was used to verify the effectiveness of the algorithm. The quantitative results showed that the jamming waveform designed using the DPSM and MTED method was able to solve wideband DIPJ tasks that could not be handled by the jamming waveforms designed using the previous narrowband algorithm. Compared with the MTED method, DPSM has better performance and the parameters can be flexibly adjusted. The disadvantage of DPSM is that the computational complexity is greater, even when using the acceleration algorithm. Our next research direction will be to design a lower-complexity method on the premise of ensuring the performance of jamming waveform. At the same time, the experiment shows that an improved DIPJ effect can be obtained by increasing the number of UAVs, but the problem of collaborative management prompted by the increase in the number of UAVs needs to be studied and is also a problem worth discussing at the next research stage.

Author Contributions

Conceptualization, K.Z.; data curation, K.Z.; formal analysis, K.Z. and Q.Z.; funding acquisition, J.Z.; investigation, K.Z.; methodology, K.Z. and C.H.; project administration, Q.Z.; resources, K.Z.; software, K.Z.; supervision, Q.Z. and J.Z.; validation, K.Z.; visualization, K.Z.; writing—original draft, K.Z.; writing—review and editing, J.W. and Z.Y. All authors have read and agreed to the published version of the manuscript.

Funding

Natural Science Foundation of Anhui Province, Grant/Award Number: 2108085QF257; Research Programme of National University of Defence Technology, Grant/Award Number: ZK19-10.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data sharing not applicable due to institutional limitations.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. You, S.; Diao, M.; Gao, L. Deep reinforcement learning for target searching in cognitive electronic warfare. IEEE Access 2019, 7, 37432–37447. [Google Scholar] [CrossRef]
  2. Lazarov, L. Perspectives and trends for the development of electronic warfare systems. In 2019 International Conference on Creative Business for Smart and Sustainable Growth (CREBUS), Sandanski, Bulgaria, 18–21 March 2019; IEEE: New York, NY, USA, 2019; pp. 1–3. [Google Scholar]
  3. Sharma, P.; Sarma, K.K.; Mastorakis, N.E. Artificial intelligence aided electronic warfare systems-recent trends and evolving applications. IEEE Access 2020, 8, 224761–224780. [Google Scholar] [CrossRef]
  4. Song, D.; Wang, W.; Xiong, Z.Y.; Xu, Z.H. Waveform diversity based regional energy focusing under ultra-sparse array. J. Electron. Inf. Technol. 2014, 36, 1082–1087. [Google Scholar]
  5. Strategic Technology Office (STO). Precision Electronic Warfare (PREW), DARPA-BAA 09-65; Strategic Technology Office (STO) of the US Defense Advanced Research Projects Agency: Arlington, VA, USA, 2009. [Google Scholar]
  6. Jiang, P. Study of development of precision EW technologies. Commun. Countermeas. 2010, 112, 3–6. [Google Scholar]
  7. Arafat, M.Y.; Moh, S. Localization and clustering based on swarm intelligence in UAV networks for emergency communications. IEEE Internet Things J. 2019, 6, 8958–8976. [Google Scholar] [CrossRef]
  8. Bai, L.; Chen, Q.; Bai, T.; Wang, J. UAV-Enabled Secure Multiuser Backscatter Communications With Planar Array. IEEE J. Sel. Areas Commun. 2022, 40, 2946–2961. [Google Scholar] [CrossRef]
  9. Bai, L.; Han, R.; Liu, J.; Yu, Q.; Choi, J.; Zhang, W. Air-to-ground wireless links for high-speed UAVs. IEEE J. Sel. Areas Commun. 2020, 38, 2918–2930. [Google Scholar] [CrossRef]
  10. Song, D.; Wang, W.; Xu, Z.; Xiong, Z.; Kirubarajan, T. Focused energy delivery with protection for precision electronic warfare. IEEE Trans. Aerosp. Electron. Syst. 2016, 52, 3053–3064. [Google Scholar] [CrossRef]
  11. Xia, X.; Zhu, P.; Li, J.; Wang, D.; Xin, Y.; You, X. Joint sparse beamforming and power control for a large-scale DAS with network-assisted full duplex. IEEE Trans. Veh. Technol. 2020, 69, 7569–7582. [Google Scholar] [CrossRef]
  12. Yan, J.; Li, J.; Zhao, L.; Chen, R. Robust joint transmit beamforming with QoS guarantees in time-asynchronous DAS. IEEE Trans. Veh. Technol. 2014, 64, 1506–1518. [Google Scholar] [CrossRef]
  13. Yang, Z.; Zhou, Q.; Li, Z.; Zhang, J.; Yang, S. Grating lobe suppression in focussed energy delivery for precision electronic warfare. IET Radar Sonar Navig. 2021, 15, 1420–1432. [Google Scholar] [CrossRef]
  14. Ozmen, N.; Dapp, R.; Zapf, M.; Gemmeke, H.; Ruiter, N.V.; van Dongen, K.W.A. Comparing different ultrasound imaging methods for breast cancer detection. IEEE Trans. Ultrason. Ferroelectr. Freq. Control. 2015, 62, 637–646. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Yang, Z.-P.; Yang, S.-N.; Zhou, Q.-S.; Zhang, J.-Y. Regional Focusing Irradiation of Low Sidelobe Array Based on ADMM. Acta Electonica Sin. 2021, 49, 1370. [Google Scholar]
  16. Chen, S.; Xu, C.; Zhang, J. Efficient focused energy delivery with grating lobe mitigation for precision electronic warfare. Signal Process. 2020, 169, 107409. [Google Scholar] [CrossRef]
  17. Yang, Z.-P.; Yang, S.-N.; Zhou, Q.-S.; Zhang, J.-Y.; Li, Z.-H.; Huang, Z.-R. A joint optimization algorithm for focused energy delivery in precision electronic warfare. Def. Technol. 2022, 18, 709–721. [Google Scholar] [CrossRef]
  18. Yang, Z.; Zhang, J.; Li, Z.; Zhou, Q.; Yang, S. Focused energy delivery with low grating lobes for precision electronic warfare via BCD framework. Electron. Lett. 2021, 57, 672–674. [Google Scholar] [CrossRef]
  19. Zhang, K.; Zhou, Q.; Wang, J.; Zhang, J.; Li, Z. A method for jamming waveform design in precision electronic warfare scenarios. IET Signal Process. 2022, 16, 562–574. [Google Scholar] [CrossRef]
  20. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  21. Zhu, S.; Yang, R.; Li, X.; Zuo, J.; Li, D.; Ding, Y. An optimizing method of OFDM radar communication and jamming shared waveform based on improved greedy algorithm. IEEE Access 2020, 8, 186462–186473. [Google Scholar] [CrossRef]
  22. Shi, C.G.; Wang, F.; Salous, S.; Zhou, J.J. Adaptive jamming waveform design for distributed multiple-radar architectures based on low probability of intercept. Radio Sci. 2019, 54, 72–90. [Google Scholar] [CrossRef]
  23. Gao, J.; Wu, R.; Zhang, J. An adaptive multi-target jamming waveform design based on power minimization. Entropy 2020, 22, 508. [Google Scholar] [CrossRef]
  24. Xu, Y.; Wang, C.; Liang, J.; Yue, K.; Li, W.; Zheng, S.; Zhao, Z. Deep Reinforcement Learning Based Decision Making for Complex Jamming Waveforms. Entropy 2022, 24, 1441. [Google Scholar] [CrossRef]
  25. Li, Z.; Shi, J.; Liu, W.; Pan, J.; Li, B. Robust joint design of transmit waveform and receive filter for MIMO-STAP radar under target and clutter uncertainties. IEEE Trans. Veh. Technol. 2021, 71, 1156–1171. [Google Scholar] [CrossRef]
  26. Zheng, K.; Zhao, L.; Mei, J.; Shao, B.; Xiang, W.; Hanzo, L. Survey of large-scale MIMO systems. IEEE Commun. Surv. Tutor. 2015, 17, 1738–1760. [Google Scholar] [CrossRef] [Green Version]
  27. Gemechu, A.Y.; Cui, G.; Yu, X. Spectral-compatible transmit beampattern design with minimum peak sidelobe for narrowband MIMO radar. IEEE Trans. Veh. Technol. 2022, 71, 11900–11910. [Google Scholar] [CrossRef]
  28. He, H.; Stoica, P.; Li, J. Wideband MIMO systems: Signal design for transmit beampattern synthesis. IEEE Trans. Signal Process. 2010, 59, 618–628. [Google Scholar] [CrossRef]
  29. Yu, X.; Cui, G.; Yang, J.; Kong, L.; Li, J. Wideband MIMO radar waveform design. IEEE Trans. Signal Process. 2019, 67, 3487–3501. [Google Scholar] [CrossRef]
  30. Yu, X.; Cui, G.; Yang, J.; Kong, L. MIMO radar transmit–receive design for moving target detection in signal-dependent clutter. IEEE Trans. Veh. Technol. 2019, 69, 522–536. [Google Scholar] [CrossRef]
  31. Sun, Y.; Babu, P.; Palomar, D.P. Majorization-minimization algorithms in signal processing, communications, and machine learning. IEEE Trans. Signal Process. 2016, 65, 794–816. [Google Scholar] [CrossRef]
  32. Tang, B.; Liang, J. Efficient algorithms for synthesizing probing waveforms with desired spectral shapes. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 1174–1189. [Google Scholar] [CrossRef]
  33. Tang, Y.; Zhang, Y.D.; Amin, M.G.; Sheng, W. Wideband multiple-input multiple-output radar waveform design with low peak-to-average ratio constraint. IET Radar Sonar Navig. 2016, 10, 325–332. [Google Scholar] [CrossRef]
  34. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, version 2.1; CVX Research, Inc.: Austin, TX, USA, 2014. [Google Scholar]
  35. Song, J.; Babu, P.; Palomar, D.P. Sequence design to minimize the weighted integrated and peak sidelobe levels. IEEE Trans. Signal Process. 2015, 64, 2051–2064. [Google Scholar] [CrossRef] [Green Version]
  36. Varadhan, R.; Roland, C. Simple and globally convergent methods for accelerating the convergence of any EM algorithm. Scand. J. Stat. 2008, 35, 335–353. [Google Scholar] [CrossRef]
  37. Zhang, K.; Wang, J.; Zhou, Q.; Zhang, J. Jamming Waveform Designed in Focused Energy Delivery for Precision Electronic Warfare Scenario. In 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 15–17 April 2022; IEEE: New York, NY, USA, 2022; pp. 1382–1386. [Google Scholar]
Figure 1. Typical DIPJ application scenario.
Figure 1. Typical DIPJ application scenario.
Entropy 25 00496 g001
Figure 2. Typical DIPJ application scenario.
Figure 2. Typical DIPJ application scenario.
Entropy 25 00496 g002
Figure 3. Spatial energy distribution comparison.
Figure 3. Spatial energy distribution comparison.
Entropy 25 00496 g003
Figure 4. Waveform power spectrum comparison. (a) Random constant-modulus waveform. (b) MFED method in [16]. (c) MTED method. (d) DPSM method.
Figure 4. Waveform power spectrum comparison. (a) Random constant-modulus waveform. (b) MFED method in [16]. (c) MTED method. (d) DPSM method.
Entropy 25 00496 g004aEntropy 25 00496 g004b
Figure 5. The effect of the wideband jamming waveform designed using the narrowband model method.
Figure 5. The effect of the wideband jamming waveform designed using the narrowband model method.
Entropy 25 00496 g005
Figure 6. Spatial energy distribution with different w2 using the DSPM method.
Figure 6. Spatial energy distribution with different w2 using the DSPM method.
Entropy 25 00496 g006
Figure 7. Waveform power spectrum with different w2 using the DSPM method.
Figure 7. Waveform power spectrum with different w2 using the DSPM method.
Entropy 25 00496 g007
Figure 8. Waveform average power spectrum with different values of w2 using the DSPM method.
Figure 8. Waveform average power spectrum with different values of w2 using the DSPM method.
Entropy 25 00496 g008
Figure 9. MM algorithm acceleration strategy impact.
Figure 9. MM algorithm acceleration strategy impact.
Entropy 25 00496 g009
Figure 10. Comparison of the effect of the DSPM method with different numbers of UAVs.
Figure 10. Comparison of the effect of the DSPM method with different numbers of UAVs.
Entropy 25 00496 g010
Table 1. Comparison of computation time for a single iteration between proposed algorithms.
Table 1. Comparison of computation time for a single iteration between proposed algorithms.
MNMTEDDPSM
10500.3 s0.8 s
1001.7 s4.3 s
1504.7 s9.4 s
20010.1 s23.2 s
51000.7 s1.1 s
153.1 s6.4 s
204.9 s10.8 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, K.; Zhou, Q.; Wang, J.; Huang, C.; Yang, Z.; Zhang, J. Wideband Waveform Design for Distributed Precision Jamming. Entropy 2023, 25, 496. https://doi.org/10.3390/e25030496

AMA Style

Zhang K, Zhou Q, Wang J, Huang C, Yang Z, Zhang J. Wideband Waveform Design for Distributed Precision Jamming. Entropy. 2023; 25(3):496. https://doi.org/10.3390/e25030496

Chicago/Turabian Style

Zhang, Kedi, Qingsong Zhou, Jing Wang, Chao Huang, Zhongping Yang, and Jianyun Zhang. 2023. "Wideband Waveform Design for Distributed Precision Jamming" Entropy 25, no. 3: 496. https://doi.org/10.3390/e25030496

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop