نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
different methods exists for jamming mitigation and we should choose a method based an the jammer type and other parameters. one of the jammers is narrow band fm jammer and we use subspace projection techniques for the suppression of this type of jammer. in subspace projection technique, we estimate the if of signals and construct the subspace vector that is orthogonal to jammer vector by incre...
This paper presents jamming and mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting the enhancement of civilian communications. Considering enormous possible applications this new technology, it is feasible use them ...
In this paper we consider blind interference mitigation in direct sequence spread spectrum communication system under intentional jamming. Recent work [1] presents a general framework in which blind source separation (BSS) techniques are utilized to enhance conventional detection. However, only second order statistics were utilized which makes the scheme vulnerable to temporally uncorrelated in...
Cognitive Radio (CR) is defined as a radio that is aware of its surroundings and adapts intelligently. While CR technology is mainly cited as the enabler for solving the spectrum scarcity problems by the means of Dynamic Spectrum Access (DSA), perspectives and potential applications of the CR technology far surpass the DSA alone. For example, cognitive capabilities and on-the-fly reconfiguratio...
Throughout the 1990s, Software Defined Radio (SDR) technology was viewed almost exclusively as a solution for interoperability problems between various military standards, waveforms and devices. In the meantime, Cognitive Radio (CR) – a novel communication paradigm which embodies SDR with intelligence and self-reconfigurability properties – has emerged. Intelligence and on-the-fly selfreconfigu...
Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...
Direct Sequence/Spread-Spectrum (DSSS) signals are characterized by a wide bandwidth and a low-power spectral density. These characteristics make them very robust with respect to the jamming. The Jamming represents one of the main concerns for secure communication and communication in a crowded spectrum. When the jamming to signal power ratio is greater than the Process Gain, even the use of DS...
The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...
In this paper, Independent Component Analysis is considered for blind suppression of interference caused by bit-pulsed jamming in a direct sequence spread spectrum communication system. A framework for applying blind techniques to the jammer mitigation problem was earlier introduced in [1]. However, the scheme proposed there is based on second-order statistics only, and has serious practical li...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید