نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

Journal: :the modares journal of electrical engineering 2006
mostafa yargholi mojtaba lotfizad

different methods exists for jamming mitigation and we should choose a method based an the jammer type and other parameters. one of the jammers is narrow band fm jammer and we use subspace projection techniques for the suppression of this type of jammer. in subspace projection technique, we estimate the if of signals and construct the subspace vector that is orthogonal to jammer vector by incre...

Journal: :Procedia Computer Science 2022

This paper presents jamming and mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting the enhancement of civilian communications. Considering enormous possible applications this new technology, it is feasible use them ...

2002
Tapani Ristaniemi Karthikesh Raju Juha Karhunen

In this paper we consider blind interference mitigation in direct sequence spread spectrum communication system under intentional jamming. Recent work [1] presents a general framework in which blind source separation (BSS) techniques are utilized to enhance conventional detection. However, only second order statistics were utilized which makes the scheme vulnerable to temporally uncorrelated in...

2014
Kresimir Dabcevic Muhammad Ozair Mughal Lucio Marcenaro Carlo S. Regazzoni

Cognitive Radio (CR) is defined as a radio that is aware of its surroundings and adapts intelligently. While CR technology is mainly cited as the enabler for solving the spectrum scarcity problems by the means of Dynamic Spectrum Access (DSA), perspectives and potential applications of the CR technology far surpass the DSA alone. For example, cognitive capabilities and on-the-fly reconfiguratio...

Journal: :Signal Processing Systems 2016
Kresimir Dabcevic Muhammad Ozair Mughal Lucio Marcenaro Carlo S. Regazzoni

Throughout the 1990s, Software Defined Radio (SDR) technology was viewed almost exclusively as a solution for interoperability problems between various military standards, waveforms and devices. In the meantime, Cognitive Radio (CR) – a novel communication paradigm which embodies SDR with intelligence and self-reconfigurability properties – has emerged. Intelligence and on-the-fly selfreconfigu...

2012
Justin Raj D. Thilagavathy

Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams an area in a multichannel wireless sensor network. The ja...

2017
LORENZO SIMONE

Direct Sequence/Spread-Spectrum (DSSS) signals are characterized by a wide bandwidth and a low-power spectral density. These characteristics make them very robust with respect to the jamming. The Jamming represents one of the main concerns for secure communication and communication in a crowded spectrum. When the jamming to signal power ratio is greater than the Process Gain, even the use of DS...

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

Journal: :Japanese Journal of Animal Psychology 2019

2002
Karthikesh Raju Tapani Ristaniemi Juha Karhunen A. Oja

In this paper, Independent Component Analysis is considered for blind suppression of interference caused by bit-pulsed jamming in a direct sequence spread spectrum communication system. A framework for applying blind techniques to the jammer mitigation problem was earlier introduced in [1]. However, the scheme proposed there is based on second-order statistics only, and has serious practical li...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید