نتایج جستجو برای: mobile jammer

تعداد نتایج: 172187  

2016
A. Kuhestani A. Mohammadi M. J. Emadi

93 AIJ Electrical & Electronics Engineering, Vol 48, No. 2, Fall 2016 Please cite this article using: Kuhestani, A., Mohammadi, A., and Emadi, M. J., 2016. “Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer”. Amirkabir International Journal of Electrical and Electronics Engineering, 48(2), pp. 93–99. DOI: 10.22060/eej.2016.820 URL: http://eej.aut.ac.ir/article_820.html *...

Journal: :EURASIP J. Adv. Sig. Proc. 2008
Jing Wang Moeness G. Amin

This paper examines the interference cancellation performance in global positioning system (GPS) receivers equipped with dualpolarized antenna arrays. In dense jamming environment, different types of interferers can be mitigated by the dual-polarized antennas, either acting individually or in conjunction with other receiver antennas. We apply minimum variance distorntionless response (MVDR) met...

2001
Ryo Mukai Shoko Araki Shoji Makino

In this paper, we investigate the separation and dereverberation performance of frequency domain Blind Source Separation (BSS) based on Independent Component Analysis (ICA) by measuring impulse responses of a system. Since ICA is a statistical method, i.e., it only attempts to make outputs independent, it is not easy to predict what is going on in a BSS system physically. We therefore investiga...

2013
S. Y. Alchekh Yasin M. R. Mosavi

IR active jammers or the directed infrared countermeasures(DIRCM)generate IR signals which attack the guidance signals passed to the sensors in IR-guided weapons. They provide IR signals with appropriate frequency, phase and intensity which will be superposed on those produced by the IR energy of the target passing through the reticle. When both the jamming signal and the modulated target energ...

1999
Monika Agrawal Surendra Prasad

The problem of providing robustness to the conventional narrow-band uniform linear array configuration so as to handle wide-band and moving jammers is addressed here. This robustness is achieved via the use of derivative constraints in jammer directions. However, since the jammer directions are not known a priori, these constraints are incorporated with a maximum likelihood characterization of ...

Journal: :CoRR 2014
Adil H. M. Aldlawie Ghassan A. QasMarrogy

Network jammers can uncover the reliability of the wireless networks, where the position of the jammer node permit the network to cope with jamming leveraging varieties of defence strategies. Wireless Bluetooth network is a short range network, where the Bluetooth transceiver is operating in the 2.4 GHz ISM (industrial, scientific and medical) radio band, and a special type of frequency hopping...

2007
M. R. Mosavi M. Asadpour H. A. Ameri

Design and Simulation of an Infrared Jammer Source for an Infrared Seeker M. R. Mosavi; M. Asadpour; H. A. Ameri Department of Electrical and Computer Engineering, Behshahr University of Science and Technology ABSTRACT Infrared jammer source is intended for active protection of helicopters against guided missiles with IR homing devices. The majority of such known stations are intended for suppr...

Journal: :EURASIP J. Adv. Sig. Proc. 2006
Dan Madurasinghe Andrew P. Shaw

An algorithm based on a space fast-time adaptive processor is presented for nulling the mainlobe jammer when the jammer and the target of interest share the same bearing. The computational load involved in the conventional processor, which blindly looks for the terrain-scattered interference (TSI), is required to stack a large number of consecutive range cell returns to form the space fast-time...

2010
Zhenhua Liu Hongbo Liu Wenyuan Xu Yingying Chen

Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wide range of defense strategies. Thus, in this paper, we focus on developing mechanisms to localize a jammer. We first conduct jamming effect analysis to examine how a hearing range, e.g., the area from which a node can...

Journal: :IEEE open journal of the Communications Society 2021

In this paper, an uplink pairwise Non-Orthogonal Multiple Access (NOMA) scenario using a mobile access point (AP) or unmanned aerial vehicle in the presence of jamming attack is considered. To mitigate influence attack, joint power allocation and AP placement design proposed. Accordingly, closed-form expressions overall outage probability (OOP) individual (IOP) considering imperfect channel sta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید