Browse > Article
http://dx.doi.org/10.9766/KIMST.2019.22.2.278

Prediction of Jamming Techniques by Using LSTM  

Lee, Gyeong-Hoon (Department of Computer Science and Engineering, Chungnam National University)
Jo, Jeil (The 2nd Research and Development Institute, Agency for Defense Development)
Park, Cheong Hee (Department of Computer Science and Engineering, Chungnam National University)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.22, no.2, 2019 , pp. 278-286 More about this Journal
Abstract
Conventional methods for selecting jamming techniques in electronic warfare are based on libraries in which a list of jamming techniques for radar signals is recorded. However, the choice of jamming techniques by the library is limited when modified signals are received. In this paper, we propose a method to predict the jamming technique for radar signals by using deep learning methods. Long short-term memory(LSTM) is a deep running method which is effective for learning the time dependent relationship in sequential data. In order to determine the optimal LSTM model structure for jamming technique prediction, we test the learning parameter values that should be selected, such as the number of LSTM layers, the number of fully-connected layers, optimization methods, the size of the mini batch, and dropout ratio. Experimental results demonstrate the competent performance of the LSTM model in predicting the jamming technique for radar signals.
Keywords
Jamming; Radar Signal; Deep Learning; LSTM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. N. Lothes, M. B. Szymanski, and R. G. Wiley, "Radar Vulnerability to Jamming," Artech House, 685 Canton Street, Norwood, MA, pp. 29-134, 1990.
2 L. Jian-xun, S. Qi. and Y. Hai, "Signal Feature Analysis and Experimental Verification of Radar Deception Jamming," IEEE CIE International Conference on Radar, Vol. 1, pp. 230-233, 2011.
3 A. Mendoza, "Classification of Radar Jammer FM Signals Using a Neural Network Approach," PhD Thesis, The University of Texas at El Paso, 2017.
4 Y. J. Ryoo and W. W. Kim, “Recognition of PRI Modulation Types of Radar Signals Using the Autocorrelation,” The Institute of Electronics Engineers of Korea, Vol. 43, No. 3, pp. 61-68, 2006.
5 G. P. Noone, "A Neural Approach to Automatic Pulse Repetition Interval Modulation Recognition," Information, Decision and Control, pp. 213-218, 1999.
6 J. P. Kauppi and K. S. Martikainen, "An Efficient Set of Features for Pulse Repetition Interval Modulation Recognition," 2007 IET International Conference on Radar Systems, pp. 1-5, 2007.
7 J. W. Han and J. H. Jin, “A Novel Method of Recognizing PRI Modulation Type of Radar Signal based on Support Vector Machine,” The Institute of Electronics and Information Engineers, Vol. 2017, No. 6, pp. 679-682, 2017.
8 Z. Wu, Y. Zhao, Z. Yin and H. Luo, "Jamming Signals Classification Using Convolutional Neural Network," IEEE International Symposium on Signal Processing and Information Technology(ISSPIT), pp. 062-067, 2017.
9 S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural Computationm, Vol. 9, No. 8, pp. 1735-1780, 1997.   DOI
10 N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever and R. Salakhutdinov, “Dropout: A Simple Way to Prevent Neural Networks from Over-Fitting,” The Journal of Machine Learning Research, Vol. 15, No. 1, pp. 1929-1958, 2014.