نتایج جستجو برای: mobile jammer

تعداد نتایج: 172187  

2012

In describing the testing of the AN/ALQ-131 jammer, under the heading “Band 3 Ineffective Against Some Threats”, GAO Report /NSIAD-1995-47, said: “Developmental testing conducted after the Band 3 entered production has shown that the system has serious performance problems. New, but preliminary, test results compiled after the draft of this report was prepared indicate some improvement in perfo...

2006
Luke Rosenberg Doug Gray

Forming a Synthetic Aperture Radar (SAR) image while suppressing an airborne broadband jammer can potentially destroy large regions of the image. In addition to this, multipath reflections from the ground, known as hotclutter (HC) or terrain scattered interference will add a nonstationary interference component to the image. Using multiple antennas on a SAR provides spatial degrees of freedom a...

2004
Masanori Tsujikawa Ken-ichi Iso

This paper proposes hands-free speech recognition using blind source separation (BSS) post-processed by two-stage spectral subtraction (2S-SS). The BSS using independent component analysis (ICA) estimates a target signal and jammer signals. The 2S-SS removes its residual crosstalk components and suppresses spatially-distributed noise not separated by BSS. In large vocabulary continuous speech r...

2004
Jang-Wook Moon John M. Shea Tan F. Wong

Partial-time jamming or interference can severely affect the performance of communication systems. Error-control coding can reduce the effect of the jamming, but accurate knowledge of which received symbols are jammed is essential for best performance. In this paper we model the jammer using a finite-state Markov model and apply the BCJR algorithm to estimate which symbols are jammed, as well a...

2013
Xiaofan He Huaiyu Dai Peng Ning

In this work, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer’s action is crucial. In our study, antijamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of one intelligent mobile jammer which ca...

Journal: :IEEE Transactions on Communications 2023

Covert transmission is investigated for a cooperative deception strategy, where jammer (Jammer) tries to attract multi-antenna adversary (Willie) and degrade the adversary’s reception ability signal from transmitter (Alice). For this we formulate an optimization problem maximize covert rate when three different types of channel state information (CSI) are available. The total power optimally al...

1998
E. Barry Felstead

In this paper design considerations to be used to account for follower jamming of J-equency hopping (FH) spread spectrum systems are presented. A follower jammer attempts to determine the hop frequency with a “determinator” circuit, and then generates jamming in a range about that jiequency. Geometrical considerations show the spatial limit at which follower jamming becomes impossible. The mini...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2023

Underwater-wireless sensor network (WSN) are prone to the jamming attacks; mainly in case of reactive jamming. Reactive has emerged as one critical security threat for underwater-WSN; this occurs due jammer capabilities controlling and regulating duration. Further possesses low detection probability high vulnerability; moreover existing model been designed consideration with terrestrial-WSN. He...

Journal: :IEEE Transactions on Wireless Communications 2021

In this paper, we introduce DeepFake, a novel deep reinforcement learning-based deception strategy to deal with reactive jamming attacks. particular, for smart and attack, the jammer is able sense channel attack if it detects communications from legitimate transmitter. To such attacks, propose an intelligent which allows transmitter transmit “fake” signals attract jammer. Then, attacks channel,...

Journal: :IEEE Transactions on Wireless Communications 2021

In this paper, we study covert communications between a pair of legitimate transmitter-receiver against watchful warden over slow fading channels. There coexist multiple friendly helper nodes who are willing to protect the communication from being detected by warden. We propose an uncoordinated jammer selection scheme where those helpers whose instantaneous channel gains receiver fall below pre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید