Results 91 to 100 of about 2,644,425 (233)

Guest Editorial: Electronic attack and protection for modern radar systems and radar networks

open access: yesIET Radar, Sonar &Navigation, Volume 18, Issue 11, Page 2077-2080, November 2024.
Abstract It is our great pleasure to present you with this IET Radar, Sonar and Navigation special issue on “Electronic Attack and Protection for Modern Radar Systems and Radar Networks”. The recent development of fast digital to analogue converters (DACs) and analogue to digital converters (ADCs), field programmable gate arrays (FPGAs) and parallel ...
Alessio Balleri   +3 more
wiley   +1 more source

BlueFMCW: Random Frequency Hopping Radar for Mitigation of Interference and Spoofing [PDF]

open access: yesarXiv, 2020
Traffic safety is the foremost value that automotive radar systems aim to pursue. Unlike in mobile communication systems, the literature for radar systems did not adequately address inter-radar interference and security threats such as jamming and spoofing, which in turn threatens the traffic safety.
arxiv  

Dynamic jamming of iceberg-choked fjords [PDF]

open access: yes, 2014
We investigate the dynamics of ice m\'elange by analyzing rapid motion recorded by a time-lapse camera and terrestrial radar during several calving events that occurred at Jakobshavn Isbr\ae, Greenland. During calving events (1) the kinetic energy of the ice m\'elange is two orders of magnitude smaller than the total energy released during the events, (
arxiv   +1 more source

Radar Jamming Recognition: Models, Methods, and Prospects

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
In modern warfare with complex and changeable electromagnetic environments, radar jamming is getting more complex and realistic, which poses a serious threat to radar; jamming recognition has become a hot topic in the field of electronic countermeasures.
Zan Wang   +3 more
doaj   +1 more source

OFDM-based JCAS under Attack: The Dual Threat of Spoofing and Jamming in WLAN Sensing [PDF]

open access: yes
This study reveals the vulnerabilities of Wireless Local Area Networks (WLAN) sensing, under the scope of joint communication and sensing (JCAS), focusing on target spoofing and deceptive jamming techniques. We use orthogonal frequency-division multiplexing (OFDM) to explore how adversaries can exploit WLAN's sensing capabilities to inject false ...
arxiv   +1 more source

Constrained Online Learning to Mitigate Distortion Effects in Pulse-Agile Cognitive Radar [PDF]

open access: yesarXiv, 2020
Pulse-agile radar systems have demonstrated favorable performance in dynamic electromagnetic scenarios. However, the use of non-identical waveforms within a radar's coherent processing interval may lead to harmful distortion effects when pulse-Doppler processing is used. This paper presents an online learning framework to optimize detection performance
arxiv  

Smart binary phase‐coding for pulse‐compression radar: An electronic protection technique against repeater jamming

open access: yesIET Wireless Sensor Systems
Nowadays, modern radar systems increase their target detection capabilities by processing pulses coherently. On the other hand, digital radio frequency memory‐based modern jammers have the ability to work coherently and can deceive radars even with a ...
Alper Yıldırım, Serkan Kiranyaz
doaj   +1 more source

Multipath effect analysis and pre-distortion processing for jamming on wideband ground radar through antenna sidelobe

open access: yesThe Journal of Engineering, 2019
The multipath transmission has a serious effect on jamming efficiency in a short distance ECM task for wideband ground radars. After the sidelobe gain model for a large antenna is introduced, the characteristics of multipath channel in time and frequency
Rong Shi, Jiantao Xu
doaj   +1 more source

Deceptive Jamming in WLAN Sensing [PDF]

open access: yesarXiv
Joint Communication and Sensing (JCAS) is taking its first shape in WLAN sensing under IEEE 802.11bf, where standardized WLAN signals and protocols are exploited to enable radar-like sensing. However, an overlooked problem in JCAS, and specifically in WLAN Sensing, is the sensitivity of the system to a deceptive jammer, which introduces phantom targets
arxiv  

Home - About - Disclaimer - Privacy