ORPP logo
Image from Google Jackets

EW 104 : Electronic Warfare Against a New Generation of Threats.

By: Material type: TextTextPublisher: Norwood : Artech House, 2015Copyright date: ©2015Edition: 1st edDescription: 1 online resource (465 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781608078707
Subject(s): Genre/Form: Additional physical formats: Print version:: EW 104: Electronic Warfare Against a New Generation of ThreatsDDC classification:
  • 623.043
LOC classification:
  • UG485 .A336 2015
Online resources:
Contents:
Intro -- EW 104: EW Against a New Generation of Threats -- Contents -- Preface -- 1 Introduction -- 2 Spectrum Warfare -- 2.1 Changes in Warfare -- 2.2 Some Specific Propagation Related Issues -- 2.3 Connectivity -- 2.3.1 The Most Basic Connectivity -- 2.3.2 Connectivity Requirements -- 2.3.3 Long-Range Information Transmission -- 2.3.4 Information Fidelity -- 2.4 Interference Rejection -- 2.4.1 Spreading the Transmitted Spectrum -- 2.4.2 Commercial FM Broadcast -- 2.4.3 Military Spread Spectrum Signals -- 2.5 Bandwidth Requirements for Information Transfer -- 2.5.1 Data Transfer Without a Link -- 2.5.2 Linked Data Transmission -- 2.5.3 Software Location -- 2.6 Distributed Military Capability -- 2.6.1 Net-Centric Warfare -- 2.7 Transmission Security Versus Message Security -- 2.7.1 Transmission Security Versus Transmission Bandwidth -- 2.7.2 Bandwidth Limitations -- 2.8 Cyber Warfare Versus EW -- 2.8.1 Cyber Warfare -- 2.8.2 Cyber Attacks -- 2.8.3 Parallels Between Cyber Warfare and EW -- 2.8.4 Difference Between Cyber Warfare and EW -- 2.9 Bandwidth Trade-Offs -- 2.9.1 Bit-Error Critical Cases -- 2.10 Error Correction Approaches -- 2.10.1 Error Detection and Correction Codes -- 2.10.2 Example of a Block Code -- 2.10.3 Error Correction Versus Bandwidth -- 2.11 EMS Warfare Practicalities -- 2.11.1 Warfare Domains -- 2.12 Steganography -- 2.12.1 Steganography Versus Encryption -- 2.12.2 Early Stenographic Techniques -- 2.12.3 Digital Techniques -- 2.12.4 How Does Steganography Relate to Spectrum Warfare? -- 2.12.5 How Is Steganography Detected? -- 2.13 Link Jamming -- 2.13.1 Communication Jamming -- 2.13.2 Required J/S for Jamming Digital Signals -- 2.13.3 Protections Against Link Jamming -- 2.13.4 The Net Impact on Link Jamming -- 3 Legacy Radars -- 3.1 Threat Parameters -- 3.1.1 Typical Legacy Surface-to-Air Missile.
3.1.2 Typical Legacy Acquisition Radar -- 3.1.3 Typical Anti-Aircraft Gun -- 3.2 EW Techniques -- 3.3 Radar Jamming -- 3.3.1 Jamming-to-Signal Ratio -- 3.3.2 Self-Protection Jamming -- 3.3.3 Remote Jamming -- 3.3.4 Burn-Through Range -- 3.4 Radar-Jamming Techniques -- 3.4.1 Cover Jamming -- 3.4.2 Barrage Jamming -- 3.4.3 Spot Jamming -- 3.4.4 Swept Spot Jamming -- 3.4.5 Deceptive Jamming -- 3.4.6 Range Deception Techniques -- 3.4.7 Angle Deceptive Jamming -- 3.4.8 Frequency Gate Pull Off -- 3.4.9 Jamming Monopulse Radars -- 3.4.10 Formation Jamming -- 3.4.11 Formation Jamming with Range Denial -- 3.4.12 Blinking -- 3.4.13 Terrain Bounce -- 3.4.14 Cross-Polarization Jamming -- 3.4.15 Cross-Eye Jamming -- References -- 4 Next Generation Threat Radars -- 4.1 Threat Radar Improvements -- 4.2 Radar Electronic Protection Techniques -- 4.2.1 Useful Resources -- 4.2.2 Ultralow Side Lobes -- 4.2.3 EW Impact of Reduced Side-Lobe Level -- 4.2.4 Side-Lobe Cancellation -- 4.2.5 Side-Lobe Blanking -- 4.2.6 Monopulse Radar -- 4.2.7 Cross-Polarization Jamming -- 4.2.8 Anti-Cross-Polarization -- 4.2.9 Chirped Radar -- 4.2.10 Barker Code -- 4.2.11 Range Gate Pull-Off -- 4.2.12 AGC Jamming -- 4.2.13 Noise-Jamming Quality -- 4.2.14 Electronic Protection Features of Pulse Doppler Radars -- 4.2.15 Configuration of Pulse Doppler Radar -- 4.2.16 Separating Targets -- 4.2.17 Coherent Jamming -- 4.2.18 Ambiguities in PD Radars -- 4.2.19 Low, High, and Medium PRF PD Radar -- 4.2.20 Detection of Jamming -- 4.2.21 Frequency Diversity -- 4.2.22 PRF Jitter -- 4.2.23 Home on Jam -- 4.3 Surface-to-Air Missile Upgrades -- 4.3.1 S-300 Series -- 4.3.2 SA-10 and Upgrades -- 4.3.3 SA-12 and Upgrades -- 4.3.4 SA-6 Upgrades -- 4.3.5 SA-8 Upgrades -- 4.3.6 MANPADS Upgrades -- 4.4 SAM Acquisition Radar Upgrade -- 4.5 AAA Upgrades -- 4.6 EW Implications of Capabilities Described.
4.6.1 Increased Lethal Range -- 4.6.2 Ultralow Side Lobes -- 4.6.3 Coherent Side-Lobe Cancelling -- 4.6.4 Side-Lobe Blanking -- 4.6.5 Anti-Cross-Polarization -- 4.6.6 Pulse Compression -- 4.6.7 Monopulse Radar -- 4.6.8 Pulse-Doppler Radar -- 4.6.9 Leading-Edge Tracking -- 4.6.10 Dicke-Fix -- 4.6.11 Burn-Through Modes -- 4.6.12 Frequency Agility -- 4.6.13 PRF Jitter -- 4.6.14 Home-on-Jam Capability -- 4.6.15 Improved MANPADS -- 4.6.16 Improved AAA -- References -- 5 Digital Communication -- 5.1 Introduction -- 5.2 The Transmitted Bit Stream -- 5.2.1 Transmitted Bit Rate Versus Information Bit Rate -- 5.2.2 Synchronization -- 5.2.3 Required Bandwidth -- 5.2.4 Parity and EDC -- 5.3 Protecting Content Fidelity -- 5.3.1 Basic Fidelity Techniques -- 5.3.2 Parity Bits -- 5.3.3 EDC -- 5.3.4 Interleaving -- 5.3.5 Protecting Content Fidelity -- 5.4 Digital Signal Modulations -- 5.4.1 Single Bit per Baud Moduatlions -- 5.4.2 Bit Error Rates -- 5.4.3 m-ary PSK -- 5.4.4 I&amp -- Q Modulations -- 5.4.5 BER Versus Eb/N0 for Various Modulations -- 5.4.6 Efficient Bit Transition Modulation -- 5.5 Digital Link Specifications -- 5.5.1 Link Specifications -- 5.5.2 Link Margin -- 5.5.3 Sensitivity -- 5.5.4 Eb/N0 Versus RFSNR -- 5.5.5 Maximum Range -- 5.5.6 Minimum Link Range -- 5.5.7 Data Rate -- 5.5.8 Bit Error Rate -- 5.5.9 Angular Tracking Rate -- 5.5.10 Tracking Rate Versus Link Bandwidth and Antenna Types -- 5.5.11 Weather Considerations -- 5.5.12 Antispoof Protection -- 5.6 Antijam Margin -- 5.7 Link Margin Specifics -- 5.8 Antenna Alignment Loss -- 5.9 Digitizing Imagery -- 5.9.1 Video Compression -- 5.9.2 Forward Error Correction -- 5.10 Codes -- References -- 6 Legacy Communication Threats -- 6.1 Introduction -- 6.2 Communications Electronic Warfare -- 6.3 One-Way Link -- 6.4 Propagation Loss Models -- 6.4.1 Line-of-Sight Propagation.
6.4.2 Two-Ray Propagation -- 6.4.3 Minimum Antenna Height for Two-Ray Propagation -- 6.4.4 A Note About Very Low Antennas -- 6.4.5 Fresnel Zone -- 6.4.6 Complex Reflection Environment -- 6.4.7 Knife-Edge Diffraction -- 6.4.8 Calculation of KED -- 6.5 Intercept of Enemy Communication Signals -- 6.5.1 Intercept of a Directional Transmission -- 6.5.2 Intercept of a Nondirectional Transmission -- 6.5.3 Airborne Intercept System -- 6.5.4 Non-LOS Intercept -- 6.5.5 Intercept of Weak Signal in Strong Signal Environment -- 6.5.6 Search for Communications Emitters -- 6.5.7 About the Battlefield Communications Environment -- 6.5.8 A Useful Search Tool -- 6.5.9 Technology Issues -- 6.5.10 Digitally Tuned Receiver -- 6.5.11 Practical Considerations Effecting Search -- 6.5.12 A Narrowband Search Example -- 6.5.13 Increase the Receiver Bandwidth -- 6.5.14 Add a Direction Finder -- 6.5.15 Search with a Digital Receiver -- 6.6 Location of Communications Emitters -- 6.6.1 Triangulation -- 6.6.2 Single Site Location -- 6.6.3 Other Location Approaches -- 6.6.4 RMS Error -- 6.6.5 Calibration -- 6.6.6 CEP -- 6.6.7 EEP -- 6.6.8 Site Location and North Reference -- 6.6.9 Moderate Accuracy Techniques -- 6.6.10 Watson-Watt Direction Finding Technique -- 6.6.11 Doppler Direction Finding Technique -- 6.6.12 Location Accuracy -- 6.6.13 High-Accuracy Techniques -- 6.6.14 Single Baseline Interferometer -- 6.6.15 Multiple Baseline Precision Interferometer -- 6.6.16 Correlative Interferometer -- 6.6.17 Precision Emitter Location Techniques -- 6.6.18 TDOA -- 6.6.19 Isochrones -- 6.6.20 FDOA -- 6.6.21 Frequency Difference Measurement -- 6.6.22 TDOA and FDOA -- 6.6.23 Calculation of CEP for TDOA and FDOA Emitter Location Systems -- 6.6.24 References That Give Closed Form Formulas for TDOA and FDOA Accuracy -- 6.6.25 Scatter Plots -- 6.6.26 Precision Location of LPI Emitters.
6.7 Communication Jamming -- 6.7.1 Jam the Receiver -- 6.7.2 Jamming a Net -- 6.7.3 Jamming-to-Signal Ratio -- 6.7.4 Propagation Models -- 6.7.5 Ground-Based Communication Jamming -- 6.7.6 Formula Simplification -- 6.7.7 Airborne Communications Jamming -- 6.7.8 High Altitude Communication Jammer -- 6.7.9 Stand-In Jamming -- 6.7.10 Jam Microwave UAV Link -- References -- 7 Modern Communications Threats -- 7.1 Introduction -- 7.2 LPI Communication Signals -- 7.2.1 Processing Gain -- 7.2.2 Antijam Advantage -- 7.2.3 LPI Signals Must Be Digital -- 7.3 Frequency-Hopping Signals -- 7.3.1 Slow and Fast Hoppers -- 7.3.2 Slow Hopper -- 7.3.3 Fast Hopper -- 7.3.4 Antijam Advantage -- 7.3.5 Barrage Jamming -- 7.3.6 Partial-Band Jamming -- 7.3.7 Swept Spot Jamming -- 7.3.8 Follower Jammer -- 7.3.9 FFT Timing -- 7.3.10 Propagation Delays in Follower Jamming -- 7.3.11 Jamming Time Available -- 7.3.12 Slow Hop Versus Fast Hop -- 7.4 Chirp Signals -- 7.4.1 Wide Linear Sweep -- 7.4.2 Chirp on Each Bit -- 7.4.3 Parallel Binary Channels -- 7.4.4 Single Channel with Pulse Position Diversity -- 7.5 Direct Sequence Spread Spectrum Signals -- 7.5.1 Jamming DSSS Receivers -- 7.5.2 Barrage Jamming -- 7.5.3 Pulse Jamming -- 7.5.4 Stand-In Jamming -- 7.6 DSSS and Frequency Hop -- 7.7 Fratricide -- 7.7.1 Fratricide Links -- 7.7.2 Minimizing Fratricide -- 7.8 Precision Emitter Location of LPI Transmitters -- 7.9 Jamming Cell Phones -- 7.9.1 Cell Phone Systems -- 7.9.2 Analog Systems -- 7.9.3 GSM Systems -- 7.9.4 CDMA Systems -- 7.9.5 Cell Phone Jamming -- 7.9.6 Uplink Jamming from the Ground -- 7.9.7 Uplink Jamming from the Air -- 7.9.8 Downlink Jamming from the Ground -- 7.9.9 Downlink Jamming from the Air -- Reference -- 8 Digital RF Memories -- 8.1 DRFM Block Diagram -- 8.2 Wideband DRFM -- 8.3 Narrowband DRFM -- 8.4 DRFM Functions -- 8.5 Coherent Jamming.
8.5.1 Increased Effective J/S.
Summary: The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together.This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are provided with details of threats in three major areas -Communications, Radars, and IR Threats.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- EW 104: EW Against a New Generation of Threats -- Contents -- Preface -- 1 Introduction -- 2 Spectrum Warfare -- 2.1 Changes in Warfare -- 2.2 Some Specific Propagation Related Issues -- 2.3 Connectivity -- 2.3.1 The Most Basic Connectivity -- 2.3.2 Connectivity Requirements -- 2.3.3 Long-Range Information Transmission -- 2.3.4 Information Fidelity -- 2.4 Interference Rejection -- 2.4.1 Spreading the Transmitted Spectrum -- 2.4.2 Commercial FM Broadcast -- 2.4.3 Military Spread Spectrum Signals -- 2.5 Bandwidth Requirements for Information Transfer -- 2.5.1 Data Transfer Without a Link -- 2.5.2 Linked Data Transmission -- 2.5.3 Software Location -- 2.6 Distributed Military Capability -- 2.6.1 Net-Centric Warfare -- 2.7 Transmission Security Versus Message Security -- 2.7.1 Transmission Security Versus Transmission Bandwidth -- 2.7.2 Bandwidth Limitations -- 2.8 Cyber Warfare Versus EW -- 2.8.1 Cyber Warfare -- 2.8.2 Cyber Attacks -- 2.8.3 Parallels Between Cyber Warfare and EW -- 2.8.4 Difference Between Cyber Warfare and EW -- 2.9 Bandwidth Trade-Offs -- 2.9.1 Bit-Error Critical Cases -- 2.10 Error Correction Approaches -- 2.10.1 Error Detection and Correction Codes -- 2.10.2 Example of a Block Code -- 2.10.3 Error Correction Versus Bandwidth -- 2.11 EMS Warfare Practicalities -- 2.11.1 Warfare Domains -- 2.12 Steganography -- 2.12.1 Steganography Versus Encryption -- 2.12.2 Early Stenographic Techniques -- 2.12.3 Digital Techniques -- 2.12.4 How Does Steganography Relate to Spectrum Warfare? -- 2.12.5 How Is Steganography Detected? -- 2.13 Link Jamming -- 2.13.1 Communication Jamming -- 2.13.2 Required J/S for Jamming Digital Signals -- 2.13.3 Protections Against Link Jamming -- 2.13.4 The Net Impact on Link Jamming -- 3 Legacy Radars -- 3.1 Threat Parameters -- 3.1.1 Typical Legacy Surface-to-Air Missile.

3.1.2 Typical Legacy Acquisition Radar -- 3.1.3 Typical Anti-Aircraft Gun -- 3.2 EW Techniques -- 3.3 Radar Jamming -- 3.3.1 Jamming-to-Signal Ratio -- 3.3.2 Self-Protection Jamming -- 3.3.3 Remote Jamming -- 3.3.4 Burn-Through Range -- 3.4 Radar-Jamming Techniques -- 3.4.1 Cover Jamming -- 3.4.2 Barrage Jamming -- 3.4.3 Spot Jamming -- 3.4.4 Swept Spot Jamming -- 3.4.5 Deceptive Jamming -- 3.4.6 Range Deception Techniques -- 3.4.7 Angle Deceptive Jamming -- 3.4.8 Frequency Gate Pull Off -- 3.4.9 Jamming Monopulse Radars -- 3.4.10 Formation Jamming -- 3.4.11 Formation Jamming with Range Denial -- 3.4.12 Blinking -- 3.4.13 Terrain Bounce -- 3.4.14 Cross-Polarization Jamming -- 3.4.15 Cross-Eye Jamming -- References -- 4 Next Generation Threat Radars -- 4.1 Threat Radar Improvements -- 4.2 Radar Electronic Protection Techniques -- 4.2.1 Useful Resources -- 4.2.2 Ultralow Side Lobes -- 4.2.3 EW Impact of Reduced Side-Lobe Level -- 4.2.4 Side-Lobe Cancellation -- 4.2.5 Side-Lobe Blanking -- 4.2.6 Monopulse Radar -- 4.2.7 Cross-Polarization Jamming -- 4.2.8 Anti-Cross-Polarization -- 4.2.9 Chirped Radar -- 4.2.10 Barker Code -- 4.2.11 Range Gate Pull-Off -- 4.2.12 AGC Jamming -- 4.2.13 Noise-Jamming Quality -- 4.2.14 Electronic Protection Features of Pulse Doppler Radars -- 4.2.15 Configuration of Pulse Doppler Radar -- 4.2.16 Separating Targets -- 4.2.17 Coherent Jamming -- 4.2.18 Ambiguities in PD Radars -- 4.2.19 Low, High, and Medium PRF PD Radar -- 4.2.20 Detection of Jamming -- 4.2.21 Frequency Diversity -- 4.2.22 PRF Jitter -- 4.2.23 Home on Jam -- 4.3 Surface-to-Air Missile Upgrades -- 4.3.1 S-300 Series -- 4.3.2 SA-10 and Upgrades -- 4.3.3 SA-12 and Upgrades -- 4.3.4 SA-6 Upgrades -- 4.3.5 SA-8 Upgrades -- 4.3.6 MANPADS Upgrades -- 4.4 SAM Acquisition Radar Upgrade -- 4.5 AAA Upgrades -- 4.6 EW Implications of Capabilities Described.

4.6.1 Increased Lethal Range -- 4.6.2 Ultralow Side Lobes -- 4.6.3 Coherent Side-Lobe Cancelling -- 4.6.4 Side-Lobe Blanking -- 4.6.5 Anti-Cross-Polarization -- 4.6.6 Pulse Compression -- 4.6.7 Monopulse Radar -- 4.6.8 Pulse-Doppler Radar -- 4.6.9 Leading-Edge Tracking -- 4.6.10 Dicke-Fix -- 4.6.11 Burn-Through Modes -- 4.6.12 Frequency Agility -- 4.6.13 PRF Jitter -- 4.6.14 Home-on-Jam Capability -- 4.6.15 Improved MANPADS -- 4.6.16 Improved AAA -- References -- 5 Digital Communication -- 5.1 Introduction -- 5.2 The Transmitted Bit Stream -- 5.2.1 Transmitted Bit Rate Versus Information Bit Rate -- 5.2.2 Synchronization -- 5.2.3 Required Bandwidth -- 5.2.4 Parity and EDC -- 5.3 Protecting Content Fidelity -- 5.3.1 Basic Fidelity Techniques -- 5.3.2 Parity Bits -- 5.3.3 EDC -- 5.3.4 Interleaving -- 5.3.5 Protecting Content Fidelity -- 5.4 Digital Signal Modulations -- 5.4.1 Single Bit per Baud Moduatlions -- 5.4.2 Bit Error Rates -- 5.4.3 m-ary PSK -- 5.4.4 I&amp -- Q Modulations -- 5.4.5 BER Versus Eb/N0 for Various Modulations -- 5.4.6 Efficient Bit Transition Modulation -- 5.5 Digital Link Specifications -- 5.5.1 Link Specifications -- 5.5.2 Link Margin -- 5.5.3 Sensitivity -- 5.5.4 Eb/N0 Versus RFSNR -- 5.5.5 Maximum Range -- 5.5.6 Minimum Link Range -- 5.5.7 Data Rate -- 5.5.8 Bit Error Rate -- 5.5.9 Angular Tracking Rate -- 5.5.10 Tracking Rate Versus Link Bandwidth and Antenna Types -- 5.5.11 Weather Considerations -- 5.5.12 Antispoof Protection -- 5.6 Antijam Margin -- 5.7 Link Margin Specifics -- 5.8 Antenna Alignment Loss -- 5.9 Digitizing Imagery -- 5.9.1 Video Compression -- 5.9.2 Forward Error Correction -- 5.10 Codes -- References -- 6 Legacy Communication Threats -- 6.1 Introduction -- 6.2 Communications Electronic Warfare -- 6.3 One-Way Link -- 6.4 Propagation Loss Models -- 6.4.1 Line-of-Sight Propagation.

6.4.2 Two-Ray Propagation -- 6.4.3 Minimum Antenna Height for Two-Ray Propagation -- 6.4.4 A Note About Very Low Antennas -- 6.4.5 Fresnel Zone -- 6.4.6 Complex Reflection Environment -- 6.4.7 Knife-Edge Diffraction -- 6.4.8 Calculation of KED -- 6.5 Intercept of Enemy Communication Signals -- 6.5.1 Intercept of a Directional Transmission -- 6.5.2 Intercept of a Nondirectional Transmission -- 6.5.3 Airborne Intercept System -- 6.5.4 Non-LOS Intercept -- 6.5.5 Intercept of Weak Signal in Strong Signal Environment -- 6.5.6 Search for Communications Emitters -- 6.5.7 About the Battlefield Communications Environment -- 6.5.8 A Useful Search Tool -- 6.5.9 Technology Issues -- 6.5.10 Digitally Tuned Receiver -- 6.5.11 Practical Considerations Effecting Search -- 6.5.12 A Narrowband Search Example -- 6.5.13 Increase the Receiver Bandwidth -- 6.5.14 Add a Direction Finder -- 6.5.15 Search with a Digital Receiver -- 6.6 Location of Communications Emitters -- 6.6.1 Triangulation -- 6.6.2 Single Site Location -- 6.6.3 Other Location Approaches -- 6.6.4 RMS Error -- 6.6.5 Calibration -- 6.6.6 CEP -- 6.6.7 EEP -- 6.6.8 Site Location and North Reference -- 6.6.9 Moderate Accuracy Techniques -- 6.6.10 Watson-Watt Direction Finding Technique -- 6.6.11 Doppler Direction Finding Technique -- 6.6.12 Location Accuracy -- 6.6.13 High-Accuracy Techniques -- 6.6.14 Single Baseline Interferometer -- 6.6.15 Multiple Baseline Precision Interferometer -- 6.6.16 Correlative Interferometer -- 6.6.17 Precision Emitter Location Techniques -- 6.6.18 TDOA -- 6.6.19 Isochrones -- 6.6.20 FDOA -- 6.6.21 Frequency Difference Measurement -- 6.6.22 TDOA and FDOA -- 6.6.23 Calculation of CEP for TDOA and FDOA Emitter Location Systems -- 6.6.24 References That Give Closed Form Formulas for TDOA and FDOA Accuracy -- 6.6.25 Scatter Plots -- 6.6.26 Precision Location of LPI Emitters.

6.7 Communication Jamming -- 6.7.1 Jam the Receiver -- 6.7.2 Jamming a Net -- 6.7.3 Jamming-to-Signal Ratio -- 6.7.4 Propagation Models -- 6.7.5 Ground-Based Communication Jamming -- 6.7.6 Formula Simplification -- 6.7.7 Airborne Communications Jamming -- 6.7.8 High Altitude Communication Jammer -- 6.7.9 Stand-In Jamming -- 6.7.10 Jam Microwave UAV Link -- References -- 7 Modern Communications Threats -- 7.1 Introduction -- 7.2 LPI Communication Signals -- 7.2.1 Processing Gain -- 7.2.2 Antijam Advantage -- 7.2.3 LPI Signals Must Be Digital -- 7.3 Frequency-Hopping Signals -- 7.3.1 Slow and Fast Hoppers -- 7.3.2 Slow Hopper -- 7.3.3 Fast Hopper -- 7.3.4 Antijam Advantage -- 7.3.5 Barrage Jamming -- 7.3.6 Partial-Band Jamming -- 7.3.7 Swept Spot Jamming -- 7.3.8 Follower Jammer -- 7.3.9 FFT Timing -- 7.3.10 Propagation Delays in Follower Jamming -- 7.3.11 Jamming Time Available -- 7.3.12 Slow Hop Versus Fast Hop -- 7.4 Chirp Signals -- 7.4.1 Wide Linear Sweep -- 7.4.2 Chirp on Each Bit -- 7.4.3 Parallel Binary Channels -- 7.4.4 Single Channel with Pulse Position Diversity -- 7.5 Direct Sequence Spread Spectrum Signals -- 7.5.1 Jamming DSSS Receivers -- 7.5.2 Barrage Jamming -- 7.5.3 Pulse Jamming -- 7.5.4 Stand-In Jamming -- 7.6 DSSS and Frequency Hop -- 7.7 Fratricide -- 7.7.1 Fratricide Links -- 7.7.2 Minimizing Fratricide -- 7.8 Precision Emitter Location of LPI Transmitters -- 7.9 Jamming Cell Phones -- 7.9.1 Cell Phone Systems -- 7.9.2 Analog Systems -- 7.9.3 GSM Systems -- 7.9.4 CDMA Systems -- 7.9.5 Cell Phone Jamming -- 7.9.6 Uplink Jamming from the Ground -- 7.9.7 Uplink Jamming from the Air -- 7.9.8 Downlink Jamming from the Ground -- 7.9.9 Downlink Jamming from the Air -- Reference -- 8 Digital RF Memories -- 8.1 DRFM Block Diagram -- 8.2 Wideband DRFM -- 8.3 Narrowband DRFM -- 8.4 DRFM Functions -- 8.5 Coherent Jamming.

8.5.1 Increased Effective J/S.

The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together.This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are provided with details of threats in three major areas -Communications, Radars, and IR Threats.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.