Evaluation method of penetrating jamming effectiveness for cognitive communication protection
In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrat...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841540078941241344 |
---|---|
author | Zhiguo SUN Shuo XIAO Yijie WU Shiming LI Zhenduo WANG |
author_facet | Zhiguo SUN Shuo XIAO Yijie WU Shiming LI Zhenduo WANG |
author_sort | Zhiguo SUN |
collection | DOAJ |
description | In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability. |
format | Article |
id | doaj-art-dfc3e92cc65e4a27879430f9f0550355 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2023-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-dfc3e92cc65e4a27879430f9f05503552025-01-14T06:28:16ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-11-014416117259389698Evaluation method of penetrating jamming effectiveness for cognitive communication protectionZhiguo SUNShuo XIAOYijie WUShiming LIZhenduo WANGIn order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/penetrating effectiveness evaluationcombination weightinggame theoryTOPSIS, jamming effectiveness evaluation |
spellingShingle | Zhiguo SUN Shuo XIAO Yijie WU Shiming LI Zhenduo WANG Evaluation method of penetrating jamming effectiveness for cognitive communication protection Tongxin xuebao penetrating effectiveness evaluation combination weighting game theory TOPSIS, jamming effectiveness evaluation |
title | Evaluation method of penetrating jamming effectiveness for cognitive communication protection |
title_full | Evaluation method of penetrating jamming effectiveness for cognitive communication protection |
title_fullStr | Evaluation method of penetrating jamming effectiveness for cognitive communication protection |
title_full_unstemmed | Evaluation method of penetrating jamming effectiveness for cognitive communication protection |
title_short | Evaluation method of penetrating jamming effectiveness for cognitive communication protection |
title_sort | evaluation method of penetrating jamming effectiveness for cognitive communication protection |
topic | penetrating effectiveness evaluation combination weighting game theory TOPSIS, jamming effectiveness evaluation |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023195/ |
work_keys_str_mv | AT zhiguosun evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection AT shuoxiao evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection AT yijiewu evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection AT shimingli evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection AT zhenduowang evaluationmethodofpenetratingjammingeffectivenessforcognitivecommunicationprotection |