Technique Generators

The Astor IV Technique Generator (TG)

Electronic Attack (EA) & Electronic Support (ES)


System attributes:

Frequency coverage (one TG per band):S-band (E/F), C-band (G), X-band (H/I/J) and Ku-band (J)
Output power>+10 dBm
Sensitivity:Typically better than -65 dBm
Minimum delay:<100 ns
Prime power:28 VDC
Power consumption:<170 W
RF connectorSMA

System capabilities:

The Astor IV TG contains a receiver and three parallel jamming channels: two wideband DRFMs and one wideband SOR. This creates the ability to combine obscuration jamming and deception jamming. The techniques, that are fully user programmable, are:

  • Barrage noise
  • Spot noise
  • Spot noise with frequency memory
  • Pulsed noise 
  • RGPO/I, VGPO/I
  • Cover pulse with or without accelerating edges
  • False targets
  • DRFM CW
  • Multiple false targets
  • Pattern projection (project a picture in the radar)
  • TETRIS (special high density false target technique)
  • Asynchronous pulse train

In addition, amplitude modulation (AM) can be applied to any technique and phase/frequency modulation can be applied to any DRFM technique.

The AM techniques are:

  • Constant gain
  • Constant gain with delay
  • Inverse gain
  • Square wave/swept square wave
  • Sawtooth/swept sawtooth
  • Sine/random sine
  • Count down

The phase/frequency modulations are:

  • Frequency sweep
  • Random frequency modulation
  • Coordinated doppler (coordinated with false target range motion)
  • Phase noise and binary phase noise
  • Binary phase shift keying
  • XRN (special alternating sideband modulation)
  • Chirp

Jamming techniques can be scheduled in time to create jamming sequences.

The System contains a PRI tracker that can identify fix and dwell & switch, stagger, sliding and jitter PRI. The primary purpose of the tracker is to support the generation of up-range false targets even if the radar uses agile PRI.

All user data (jamming techniques and log files) are stored on a USB key and the system contains no user data after power down.

The System can also perform threat emitter simulation (TES) with a pre-programmed arbitrary waveform.


HMI:

The HMI have an extensive mode editor with animations of the programmed technique. The receiver data are presented in a waterfall display. In addition there is an oscilloscope showing detector signal, frequency signal and transmitted signal and PRI waterfall.