Chapter 272 Controlling Electromagnetic Power
The idea proposed by Chang Haonan sounds quite unrestrained at first, but if you think about it carefully, it is not outrageous.
Because electromagnetic interference, at least injection and forwarding electromagnetic interference, is an interference mode that can only be dealt with after receiving radar waves. It is almost powerless against passive detection methods that do not emit electromagnetic signals themselves.
In fact, choosing the JH-7 as the platform is a no-brainer.
The poor maneuverability and large radar reflection area determine that it will become a relatively conspicuous target. If the opponent has an early warning aircraft to command it, it will be easy to detect and intercept this aircraft wandering on the battlefield in advance. The plane is outside and about to take off.
The power supply of 2*15kw is relatively insufficient and will also become a shortcoming when facing real high-intensity electromagnetic confrontation.
But now China has just begun to localize the Su-27, and as for the stealth aircraft, there is not even a shadow of it.
There is only one worthy heavy tactical platform.
It’s better than the Y8...
But on the other hand, the electromagnetic waves emitted by enemy early warning aircraft can also be used as passive detection methods, and if there is a counterattack with a far enough range, If you radiate air-to-air missiles...
It’s so funny, what kind of early warning aircraft? I’m shooting an early warning aircraft!
In short, although there is no perfect weapon in the world, a variety of imperfect weapons can still produce unexpected effects if they are combined properly.
“Actually, this model also has potential for the detection of low RCS targets, that is, stealth targets, that Guo Gong just mentioned.”
Chang Hao has been listening quietly just now Xu Yang, who was explaining by Nan, also added at this time:
“However, this requires some more unique technologies, such as the tracking before detection (TBD) algorithm, which uses rough data without parameter extraction or detection thresholds. The point measurement data obtained by processing the very low parameter extraction algorithm directly or indirectly accumulates the target likelihood ratio function, thereby improving the signal-to-noise ratio of the passive radar. ”
"Dr. Chang and I tried several ideas and found that the current iteration-based TBD algorithm can only process one frame of data at a time. It has basically no operational value in terms of data accumulation speed or calculation amount. After I return to the institute, I will focus on research in this field and strive to produce a feasible result within one to two years.”
Specifically, in the majors of control science and algorithm theory, Xu Yang was not even worse than Chang Haonan after he cheated. In addition, the latter's main business was aviation after all, so he accepted this task without hesitation.
Anti-stealth is an urgent issue for countries around the world.
Considering that China currently does not have the conditions to build a super-large radar station such as Donhe 2N that can overcome skill with force, it can only work harder in the aspect of making a big difference.
“Enough, enough.”
Guo Lin, who was shocked by the efficiency of Chang Haonan and Xu Yang, looked at the pile of paper on the table filled with dense formulas and charts. It was hard to imagine what kind of state they were in during the past few days. Work:
“It is enough to be able to do this at this stage...”
For those who originally just wanted to study the captured pod, at most they would do a wave of reverse engineering 14 All in all, this is definitely an unexpected surprise.
First, it created a tactical pod that is smaller in size and has more functions, and then directly made an earth-shaking update to passive detection technology and radiation tracking technology.
Even though the main achievers of these achievements may be from Beijing Hang University or the Institute of Computing Technology of the Chinese Academy of Sciences, the final implementation of product development and production can only be left to them, Electronic Technology Group. Finish.
"Anyway, with this thing, next time we meet EA6B, we will never repeat the mistakes of 1994!"
The engineer who just used submarine tactics to analog passive radar detection also once again Open your mouth.
Chang Haonan remembers that his name is Lin Boyuan.
The air traffic incident in 1994 was a long-lasting pain for the entire Chinese Air Force and the entire Electronic Technology Group.
Generally speaking, this kind of injury takes a long time to heal.
But there are exceptions. For example, it took Chang Haonan a week to cure it now.
But for now, it can only be treated as a temporary solution. If you want to cure the root cause... it is simple. When you have the opportunity, just use a similar method to teach the other party the same lesson.
Of course, no matter how sophisticated the algorithm developed by Chang Haonan and Xu Yang is, it still has to be implemented in equipment and programs.
So after the former confirmed that everyone basically understood what he just said, he began to assign tasks in an orderly manner:
"Then we will divide into three parts to jointly advance the progress of the project."
"Gong Guo, take a few people back to Jinling and add two sets of antennas and back-end software to the 1472 radar equipped on the J-8C , let it have passive detection capabilities and install it on the aircraft for testing. I will coordinate with Factory 112. You can directly take one from the finished product that has not been delivered to them and modify it, which will be faster. "
"Okay."
Guo Lin agreed neatly, then selected four from the other 14 people who came over, and said to Chang Haonan:
< br>"After all, Jinling is the base camp of our 14th institute. I can find other foreign aid after I go back. The rest of us can stay here."
"That's fine."
Chang Haonan looked at the staffing in the conference room and found that if the troops were to be divided into three groups, there would indeed be a shortage of people:
"Then the rest of the 14th Institute All comrades, you are responsible for modifying the hardware part of the No. 2 pod according to our previously planned plan. The improved PRI algorithm we proposed this time only requires rewriting the algorithm software of the pod. This part of the work was completed by Researcher Xu That’s it.”
Xu Yang didn’t answer, just nodded slightly.
“In the end, it’s me, and I will return to my old profession during this period.”
Chang Haonan deliberately put a hint of joking in his tone to ease the overly serious atmosphere in the conference room:
“The J-H-7 we are going to use as an electronic warfare platform is because it is There are a lot of trivial things to deal with when renovating an old machine. If I participate, the progress should be much faster."
"Is there anything else you want to ask?"
Follow me. With the improvement of management capabilities and experience, Chang Haonan's effectiveness in issuing instructions is gradually improving.
Everyone shook their heads and said no.
"That's it. This model is very important. It is an important link for our army to seize electromagnetic control power in possible future wars. If it can be put into service one day earlier, it will have a huge effect on the formation of comprehensive combat effectiveness."
As usual, Chang Haonan gave a brief summary and mobilization.
"Control electromagnetic power?"
This strange and novel expression immediately attracted the attention of many people.
But the good thing about Chinese is that even if you encounter a new word that you have never heard of, you can understand it just by relying on its literal meaning.
So everyone soon understood what it meant.
Just like air and sea control, so-called electromagnetic control is the ability to control electromagnetic wave signals within the entire battlefield.
In the past, China was dominated by others in this aspect and had almost no power to fight back.
But this time, this model, tentatively designated as the "J-Handian 7", will become the symbol of the counterattack!
(End of this chapter)