Results 261 to 270 of about 4,570 (279)
Some of the next articles are maybe not open access.
Deceptive jamming suppression with frequency diverse MIMO radar
Signal Processing, 2015Simulated false targets cannot be easily discriminated and suppressed with traditional radar systems, especially for the mainbeam deceptive jamming. In this work, we explore the multiple-input multiple-output (MIMO) radar with frequency diverse array (FDA) as the transmit array and study its ability to suppress the deceptive jamming in joint transmit ...
Jingwei Xu +3 more
openaire +1 more source
A deceptive jamming method against MMW monopulse radar
2009 International Conference on Microwave Technology and Computational Electromagnetics (ICMTCE 2009), 2009This article focuses on MMW monopulse radar seeker and its deceptive jamming technique. Based on the principle of stepped-frequency high range profile monopulse seeker, a method of jamming against stepped-frequency high range profile monopulse seeker is proposed.
null Cao Yuan +3 more
openaire +1 more source
Research on Deception Jamming Methods of Radar Netting
2020The difficulty of reconnaissance and jamming have been greatly increased as the result of the extensive use of Radar Netting system. So how to put effective jamming on the Radar Netting system becomes an important problem in electronic countermeasures realm recently.
Xiaoqian Lu +3 more
openaire +1 more source
Target Reconstruction in Deceptively Jammed SAR via ADMM
IEEE Sensors Journal, 2019This paper formulates an alternating direction method of multipliers (ADMM) approach to reconstruct true and false targets in a deceptively jammed synthetic aperture radar imagery based on characteristics extracted by dynamic synthetic apertures (DSAs).
Bo Zhao, Lei Huang, Weize Sun
openaire +1 more source
SAR deception jamming identification via differential feature enhancement
2016 CIE International Conference on Radar (RADAR), 2016This paper proposes a new scheme for SAR deception jamming identification using single channel data. The time-frequency distributions of the real echoes and the deception jamming are modeled according to their formatting mechanisms. By filtering in the Doppler frequency domain, the differential features of the real and the false targets are retained ...
Bo Zhao +5 more
openaire +1 more source
A Scattered Deception Jamming Against TOPSAR
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), 2022Bingjie Gao, Wenhui Lang
openaire +1 more source
SAR counter deception jamming based on radiometric calibration
IET Conference Publications, 2009This paper presents a method of SAR counter deception jamming method based on radiometric calibration. At first, the concept and principle of SAR deception jamming is introduced. Secondly, the principle and method of radiometric calibration is presented. Finally, the method of counter deception jamming with radiometric calibration is researched.
null Guang Yang +2 more
openaire +1 more source
Target Reconstruction From Deceptively Jammed Single-Channel SAR
IEEE Transactions on Geoscience and Remote Sensing, 2018This paper considers the problem of reconstructing true targets in a single-channel synthetic aperture radar (SAR) imaging system, which has been disturbed by deceptive jammings. Since the deceptive jammings are usually confined to the main lobe of an SAR antenna, their time–frequency distributions are different from those of the true echoes.
Bo Zhao +3 more
openaire +1 more source
Single Receiver Against Repeater Deception Jamming Technology Research
2017Intentional deception jamming brings great threat to satellite navigation receiver and seriously influence GNSS application security. For repeater deception jamming, an anti-spoofing algorithm based on a single receiver is proposed. Using the adjacent two times measurement pseudo-range does double differences, and Taylor expansion is applied to the ...
Ke Liu +4 more
openaire +1 more source
The Effect of Jamming/Deception on Decision Making
1984Abstract : The present experiment examined the capability of developing a simulation methodology for assessing the effects of Command, Control, and Communications CounterMeasures (C3CM) on a human operator. Primarily, the effects on human information jamming and deception were applied against a key decision maker in a simulated, air defense, C3 system ...
L. J. Stec, D. L. Monk, M. A. Felkey
openaire +1 more source

