نتایج جستجو برای: mobile jammers

تعداد نتایج: 171927  

Journal: :Digital Signal Processing 1996
Tapan K. Sarkar Sheeyun Park Jinwah Koh Richard A. Schneible

Sarkar, T. K., Park, S., Koh, J., and Schneible, R. A., A Deterministic Least Squares Approach to Adaptive AntenConsider a linear array of uniformly spaced receivnas, Digital Signal Processing 6 (1996), 185–194. ing elements (isotropic) separated by a distance d as A direct data domain approach to adaptively receiving a shown in Fig. 1. We further assume that narrowband signal coming from a giv...

Journal: :IEICE Electronic Express 2011
Gang Lu Bin Tang Guan Gui

A pulse diversity-based jammer cancellation processor is designed in this paper to cancel the deception electronic counter measures (ECM) signals repeated by a digital radio frequency memory (DRFM) for radar systems. In order to remove the conventional stationary hypotheses and the rigorous application conditions, an orthogonal transmission block code set is achieved in one pulse repetition int...

2004
André P. des Rosiers Gregory N. Schoenig Lamine Mili

In this paper, projection statistics (PS) are applied to detect and mitigate outliers in adaptive processing algorithms. Outliers present in training data result in slow adaptive processor convergence. In radar, these outliers may arise from clutter discretes, desired targets, or jammers. PS provide a computationally tractable technique for identifying and mitigating outlier data samples prior ...

2015
S. Raja Ratna R. Ravi

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general o...

1997
John P. McDermott R. Gelinas S. Ornstein

This paper describes progress to date on three prototype tools for detecting storage jamming attacks. One prototype uses a replay defense; another uses logical replication, and the third can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, ...

2013
Alchekh Yasin A. R. Erfanian M. R. Mosavi A. Mohammadi W. L. Wolfe G. J. Zissis J. S. Accetta J. S. Oh K. S. Doo S. G. Jahng R. G. Driggers C. E. Halford H. K. Hong S. H. Han D. S. Seo

One of the important parts of the infrared seeker is the counter countermeasure part. Seeking in a field of view with the existence of jammers is not simple and needs effective algorithms. In this paper, several methods of the detection in a crossed array trachers (CAT) seeker will be designed, simulated and evaluated. These methods depend on detecting the appearance of the flare using analzing...

Journal: :Digital Signal Processing 1999
S. Park Tapan K. Sarkar Yingbo Hua

A computational scheme based on the singular value ecomposition (SVD) for a deterministic, data domain pproach to the adaptive processing problem is presented. n the direct data domain approach, a single snapshot is onsidered for an assumed direction of arrival with unnown amplitude. This unknown signal strength is estiated on a snapshot by snapshot basis. The new SVD ased method is compared wi...

2008
Cheng Y. Lu Yimin Zhang Jinsong Wu Paul Cook Xin Li Moeness Amin

In this paper, we propose the exploitation of array beamforming technology in high-speed aeronautical communication applications, e.g., the integrated Network Enhanced Telemetry (iNET) system. By flexible steering of beams and nulls, an array can enhance desired signals whereas the undesired signals such as interference and jammers are suppressed. The proposed adaptive beamforming technology is...

2010
Sudip Misra Ranjit Singh S. V. Rohith Mohan

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...

2004
Anil Kandangath

Spread spectrum (SS) communication systems are now commonly used in civilian applications such as cellular systems and GPS and are fast becoming one of the most commonly used systems. Very low power SS systems such as Global Positioning Systems are extremely vulnerable to high power jammers. A vast array of techniques are available to resolve this problem and this paper attempts to review some ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید

function paginate(evt) { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term pg=parseInt(evt.target.text) var data={ "year":filter_year, "term":term, "pgn":pg } filtered_res=post_and_fetch(data,url) window.scrollTo(0,0); } function update_search_meta(search_meta) { meta_place=document.getElementById("search_meta_data") term=search_meta.term active_pgn=search_meta.pgn num_res=search_meta.num_res num_pages=search_meta.num_pages year=search_meta.year meta_place.dataset.term=term meta_place.dataset.page=active_pgn meta_place.dataset.num_res=num_res meta_place.dataset.num_pages=num_pages meta_place.dataset.year=year document.getElementById("num_result_place").innerHTML=num_res if (year !== "unfilter"){ document.getElementById("year_filter_label").style="display:inline;" document.getElementById("year_filter_place").innerHTML=year }else { document.getElementById("year_filter_label").style="display:none;" document.getElementById("year_filter_place").innerHTML="" } } function update_pagination() { search_meta_place=document.getElementById('search_meta_data') num_pages=search_meta_place.dataset.num_pages; active_pgn=parseInt(search_meta_place.dataset.page); document.getElementById("pgn-ul").innerHTML=""; pgn_html=""; for (i = 1; i <= num_pages; i++){ if (i===active_pgn){ actv="active" }else {actv=""} pgn_li="
  • " +i+ "
  • "; pgn_html+=pgn_li; } document.getElementById("pgn-ul").innerHTML=pgn_html var pgn_links = document.querySelectorAll('.mypgn'); pgn_links.forEach(function(pgn_link) { pgn_link.addEventListener('click', paginate) }) } function post_and_fetch(data,url) { showLoading() xhr = new XMLHttpRequest(); xhr.open('POST', url, true); xhr.setRequestHeader('Content-Type', 'application/json; charset=UTF-8'); xhr.onreadystatechange = function() { if (xhr.readyState === 4 && xhr.status === 200) { var resp = xhr.responseText; resp_json=JSON.parse(resp) resp_place = document.getElementById("search_result_div") resp_place.innerHTML = resp_json['results'] search_meta = resp_json['meta'] update_search_meta(search_meta) update_pagination() hideLoading() } }; xhr.send(JSON.stringify(data)); } function unfilter() { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":"unfilter", "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } function deactivate_all_bars(){ var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(bar) { bar.dataset.active = false bar.style = "stroke:#71a3c5;" }) } year_chart.on("created", function() { var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(check) { check.addEventListener('click', checkIndex); }) }); function checkIndex(event) { var yrchart = document.querySelectorAll('.ct-bar'); var year_bar = event.target if (year_bar.dataset.active == "true") { unfilter_res = unfilter() year_bar.dataset.active = false year_bar.style = "stroke:#1d2b3699;" } else { deactivate_all_bars() year_bar.dataset.active = true year_bar.style = "stroke:#e56f6f;" filter_year = chart_data['labels'][Array.from(yrchart).indexOf(year_bar)] url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":filter_year, "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } } function showLoading() { document.getElementById("loading").style.display = "block"; setTimeout(hideLoading, 10000); // 10 seconds } function hideLoading() { document.getElementById("loading").style.display = "none"; } -->