Results 191 to 200 of about 264,857 (253)
Some of the next articles are maybe not open access.

Active Deception Jamming Recognition in the Presence of Extended Target

IEEE Geoscience and Remote Sensing Letters, 2022
Accurate sensing of the mainlobe active deception jamming is critical for radar antijamming and extended target detection in a complex electromagnetic environment.
Yukai Kong   +4 more
semanticscholar   +1 more source

Anti-Deception Jamming Power Optimization Strategy for Multi-Target Tracking Tasks in Multi-Radar Systems

IEEE International Conference on Acoustics, Speech, and Signal Processing
In this paper, a power optimization (PO) strategy is proposed to combat deception jamming in multi-radar systems (MRSs) performing multi-target tracking (MTT).
Jun Sun   +4 more
semanticscholar   +1 more source

An Intelligent Discrimination Method for Track Deception Jamming

2023 7th Asian Conference on Artificial Intelligence Technology (ACAIT), 2023
For radar active deceptive jamming, a deep learning method for radar signal track discrimination is proposed based on end-to-end data processing mode, which can fuse target track information detected by multiple radar architecture.
Yongkang Wang   +5 more
semanticscholar   +1 more source

Research on deceptive jamming technologies against SAR

2009 2nd Asian-Pacific Conference on Synthetic Aperture Radar, 2009
Synthetic aperture radar (SAR) has its own special features different from conventional radar. It has high processing gain, so jamming to SAR is more difficult than that to conventional radar. Jamming to SAR finds its important usage in some military scene.
Zhang Hong-rong   +3 more
openaire   +2 more sources

Micro-Doppler Deception Jamming for Tracked Vehicles

IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
As tracked vehicles play significant roles in a battlefield, effective jamming measures is necessary to protect them from being perceived by hostile radar. Moving tracked vehicles exhibit strong Doppler and micro-Doppler signatures. Therefore, the jamming signal should include micro-Doppler modulation generated by metallic caterpillars for successful ...
Feng Zhou, Lei Liu, Xiaoran Shi
openaire   +2 more sources

Main Lobe Deception Jamming Suppression Approach via SVD and FrFT for LFM Radars

IEEE Transactions on Aerospace and Electronic Systems
To solve the problem that radar performance is seriously affected by main lobe deception jamming, a jamming suppression approach using singular value decomposition (SVD) and the fractional Fourier transform (FrFT) is proposed.
Zhenshou Lei   +5 more
semanticscholar   +1 more source

Research on Deception Jamming Methods of Radar Netting

2020
The difficulty of reconnaissance and jamming have been greatly increased as the result of the extensive use of Radar Netting system. So how to put effective jamming on the Radar Netting system becomes an important problem in electronic countermeasures realm recently.
Wenwen Gao   +3 more
openaire   +2 more sources

Primary exploration on ISAR image deception jamming

2007 1st Asian and Pacific Conference on Synthetic Aperture Radar, 2007
This article puts forward theoretical model on ISAR deception jamming by theoretical analysis, including space model and jamming signal model. Space model includes location relation and movement relation between radar, target and jamming platform, jamming signal model based on the relation between jamming signal and radar signal, distance migration of ...
Liu YuLing, Gan Rongbing, Yi Zhenghong
openaire   +2 more sources

Radar Deception Jamming Recognition Based on GCN and Transformer

2024 IEEE International Conference on Signal, Information and Data Processing (ICSIDP)
As the variety of radar jamming increases, there is a significant threat to radar systems. Anti-jamming techniques are crucial for addressing this major threat, with jamming recognition being the initial step.
Chunjie Zhu   +4 more
semanticscholar   +1 more source

The Effect of Jamming/Deception on Decision Making

1984
Abstract : The present experiment examined the capability of developing a simulation methodology for assessing the effects of Command, Control, and Communications CounterMeasures (C3CM) on a human operator. Primarily, the effects on human information jamming and deception were applied against a key decision maker in a simulated, air defense, C3 system ...
D. L. Monk, M. A. Felkey, L. J. Stec
openaire   +2 more sources

Home - About - Disclaimer - Privacy