Academic literature on the topic 'Jammer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jammer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Jammer"

1

Fan, Jianhua, Tao Liang, Tongxiang Wang, and Jianwei Liu. "Identification and Localization of the Jammer in Wireless Sensor Networks." Computer Journal 62, no. 10 (July 3, 2019): 1515–27. http://dx.doi.org/10.1093/comjnl/bxz055.

Full text
Abstract:
Abstract Wireless sensor network can be easily attacked by jammers for its shared character and open access to the wireless channel. Jamming attack could produce a significant threat to the network by interrupting the normal transmission of nodes. To this end, several anti-jamming countermeasures have been proposed to improve the quality of service of the wireless sensor network. As an important building block for anti-jamming countermeasures, the estimation of jammer’s location could provide us a possible way to eliminate jammers artificially. However, existing localization algorithms mainly pay attention to locate the jammers that are equipped with omnidirectional antennas, which usually fail to cope with directional jammers. In order to bridge this gap, an algorithm of antenna identification and localization of the jammer (AILJ) based on the topology information of jamming scenarios is put forward in this paper. At first, a collection protocol is designed to collect the information of boundary nodes and jammed nodes. Then, an identification method based on the classification of the boundary nodes is proposed to derive the type of jammer’s antenna. At last, a range-free method is put forward to locate the jammer without relying on the propagation parameters. The proposed AILJ only depends on the localization of jammed nodes and boundary nodes and employs their geometry knowledge. For the omnidirectional jammer, the mean center of two circumcircles is considered as the jammer’s position. For the directional jammer, the mean value of the intersections between the straight line that represents jammer’s direction and the circumcircles is considered as the directional jammer’s position. Finally, a series of experiments have been conducted to evaluate the identification and localization performance of AILJ.
APA, Harvard, Vancouver, ISO, and other styles
2

Aldosari, Waleed, and Mohamed Zohdy. "Tracking a Jammer in Wireless Sensor Networks and Selecting Boundary Nodes by Estimating Signal-to-Noise Ratios and Using an Extended Kalman Filter." Journal of Sensor and Actuator Networks 7, no. 4 (November 15, 2018): 48. http://dx.doi.org/10.3390/jsan7040048.

Full text
Abstract:
This work investigates boundary node selection when tracking a jammer. A technique to choose nodes to track jammers by estimating signal-to-noise Ratio (SNR), jammer-to-noise ratio (JNR), and jammer received signal strength (JRSS) are introduced in this paper. We proposed a boundary node selection threshold (BNST) algorithm. Every node can become a boundary node by comparing the SNR threshold, the average SNR estimated at the boundary node, and the received BNST value. The maximum sensing range, transmission range, and JRSS are the main parts of this algorithm. The algorithm is divided into three steps. In the first step, the maximum distance between two jammed nodes is found. Next, the maximum distance between the jammed node and its unjammed neighbors is computed. Finally, maximum BNST value is estimated. The extended Kalman filter (EKF) is utilized in this work to track the jammer and estimate its position in a different time step using selected boundary nodes. The experiment validates the benefits of selecting a boundary when tracking a jammer.
APA, Harvard, Vancouver, ISO, and other styles
3

Hermans, Mariette. "Jammer, jammer, jammer." Maatwerk 9, no. 2 (April 2008): 12–13. http://dx.doi.org/10.1007/bf03076793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Tongxiang, Xianglin Wei, Jianhua Fan, and Tao Liang. "Jammer Localization in Multihop Wireless Networks Based on Gravitational Search." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/7670939.

Full text
Abstract:
Multihop Wireless Networks (MHWNs) can be easily attacked by the jammer for their shared nature and open access to the wireless medium. The jamming attack may prevent the normal communication through occupying the same wireless channel of legal nodes. It is critical to locate the jammer accurately, which may provide necessary message for the implementation of antijamming mechanisms. However, current range-free methods are sensitive to the distribution of nodes and parameters of the jammer. In order to improve the localization accuracy, this article proposes a jammer localization method based on Gravitational Search Algorithm (GSA), which is a heuristic optimization evolutionary algorithm based on Newton’s law of universal gravitation and mass interactions. At first, the initial particles are selected randomly from the jammed area. Then, the fitness function is designed based on range-free method. At each iteration, the mass and position of the particles are updated. Finally, the position of particle with the maximum mass is considered as the estimated jammer’s position. A series of simulations are conducted to evaluate our proposed algorithms and the simulation results show that the GSA-based localization algorithm outperforms many state-of-the-art algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Langtao, Xin Zheng, and Chunsheng Chen. "Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection." Security and Communication Networks 2019 (November 16, 2019): 1–9. http://dx.doi.org/10.1155/2019/7869317.

Full text
Abstract:
The physical layer security of downlink nonorthogonal multiple access (NOMA) network is analyzed. In order to improve the secrecy probability, friendly jammers are jointed in the NOMA network. Two jammer schemes are proposed in the NOMA network. All the jammers transmit jamming signal without jammer selection in the first scheme (NO JS scheme). Jammers are selected to transmit jamming signal if their interfering power on scheduled users is below a threshold in the second scheme (JS scheme). A stochastic geometry approach is applied to analyze the outage probability and the secrecy probability. Compared with the NO JS scheme and traditional scheme (without jointing jammers), the jammer selection scheme provides a good balance between the user outage probability and secrecy probability. Numerical results demonstrate that the security performance of the two proposed schemes can be improved by jointing the jammers in the NOMA wireless network.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Hojun, Jongmin Ahn, Yongcheol Kim, and Jaehak Chung. "Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator." Applied Sciences 10, no. 5 (March 3, 2020): 1733. http://dx.doi.org/10.3390/app10051733.

Full text
Abstract:
In frequency-hopping spread-spectrum (FHSS) systems, jammer detection and mitigation are important but difficult. Each slot of the FHSS experiences frequency-selective fading and unequal transceiver-frequency gains that hinder the detection of jammed slots and result in a poor bit-error rate (BER). To increase BER performance, we first propose a noise-jammer power estimator (NJPE) that estimates noise and jammer powers regardless of different channel gains, and derived its normalized Cramér–Rao bound (NCRB). Second, we developed a jammer detector based on gamma distribution, and designed a restoration method combining all nonjammed slots. Computer simulations verified the derived NCRB of the proposed NJPE by normalized mean squared error (NMSE), and showed that the jammer-detection probability of the proposed jammer detector was better than that of conventional detectors. The BER performance of the proposed method was also shown to be better than that of conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Morales Ferre, Ruben, Alberto de la Fuente, and Elena Simona Lohan. "Jammer Classification in GNSS Bands Via Machine Learning Algorithms." Sensors 19, no. 22 (November 6, 2019): 4841. http://dx.doi.org/10.3390/s19224841.

Full text
Abstract:
This paper proposes to treat the jammer classification problem in the Global Navigation Satellite System bands as a black-and-white image classification problem, based on a time-frequency analysis and image mapping of a jammed signal. The paper also proposes to apply machine learning approaches in order to sort the received signal into six classes, namely five classes when the jammer is present with different jammer types and one class where the jammer is absent. The algorithms based on support vector machines show up to 94 . 90 % accuracy in classification, and the algorithms based on convolutional neural networks show up to 91 . 36 % accuracy in classification. The training and test databases generated for these tests are also provided in open access.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Kang-in, Wonjune Kang, Young-Seek Chung, Hoon-Gee Yang, and Jong Mann Kim. "A New Jammer Suppression Method in MIMO Radar Using Matrix Pencil Method and Generalized Likelihood Ratio Test." International Journal of Antennas and Propagation 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/802471.

Full text
Abstract:
We propose a new algorithm to suppress the jammer signals and estimate the direction of arrival (DOA) of the signal of interest (SOI) for collocated MIMO radar by using the matrix pencil method (MPM) and the generalized likelihood ratio test (GLRT). The conventional GLRT divides the visible region into small angle samples, suppresses the jammer signals at each angle sample, and then estimates the DOA of the SOI. In the proposed algorithm, we extract the eigenvalues of received signals regardless of the SOI and jammer by using the MPM, which contain the information of the DOA of SOIs or jammers. Then, in order to suppress the jammers, we apply the GLRT to the extracted DOAs instead of to the entire visible region. By applying the MPM again to the received signals in which the jammer signals are suppressed, we can estimate the DOAs of the SOI. Since the proposed algorithm does not depend on the number of angle samples, it shows fast and accurate results regardless of the angle resolution. In order to verify the proposed algorithm, we compared the results with the results of the conventional GLRT and show the computing time.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Taimin, Xiaoyu Ji, Zhou Zhuang, and Wenyuan Xu. "JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid." Sensors 19, no. 4 (February 21, 2019): 909. http://dx.doi.org/10.3390/s19040909.

Full text
Abstract:
As the core component of the smart grid, advanced metering infrastructure (AMI) is responsible for automated billing, demand response, load forecasting, management, etc. The jamming attack poses a serious threat to the AMI communication networks, especially the neighborhood area network where wireless technologies are widely adopted to connect a tremendous amount of smart meters. An attacker can easily build a jammer using a software-defined radio and jam the wireless communications between smart meters and local controllers, causing failures of on-line monitoring and state estimation. Accurate jammer localization is the first step for defending AMIs against jamming attacks. In this paper, we propose JamCatcher, a mobile jammer localization scheme for defending the AMI. Unlike existing jammer localization schemes, which only consider stationary jammers and usually require a high density of anchor nodes, the proposed scheme utilizes a tracker and can localize a mobile jammer with sparse anchor nodes. The time delay of data transmission is also considered, and the jammer localization process is divided into two stages, i.e., far-field chasing stage and near-field capturing stage. Different localization algorithms are developed for each stage. The proposed method has been tested with data from both simulation and real-world experiment. The results demonstrate that JamCatcher outperforms existing jammer localization algorithms with a limited number of anchor nodes in the AMI scenario.
APA, Harvard, Vancouver, ISO, and other styles
10

Phaiboon, Supachai, and Arunee Chatwaranon. "Localizing Jammer for Indoor Mobile Communication Networks." Applied Mechanics and Materials 701-702 (December 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1063.

Full text
Abstract:
This paper proposes an experimental study for localizing radio jammers in a multi floors building. We performed signal strength measurement to find propagation path loss characteristics in the building. Then communication nodes around the existing jammers were classified in order to determine a set of boundary nodes. The propagation path losses between the real jammers and the boundary nodes are evaluated by a vector pointer namely, the evaluation feedback metric, ez, to find the real jammer location. The proposed algorithm was validated via an indirect measurement called hearing range. The results demonstrate that our approach provides an effective method for jamming localization.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Jammer"

1

Uysal, Halil. "Jammer Cancelation By Using Space-time Adaptive Processing." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613800/index.pdf.

Full text
Abstract:
Space-Time Adaptive Processing (STAP) has been widely used in spaceborne and airborne radar platforms in order to track ground moving targets. Jammer is an hostile electronic countermeasure that is being used to degrade radar detection and tracking performance. STAP adapts radar&rsquo
s antenna radiating pattern in order to reduce jamming effectiveness. Jamming power that enters the system is decreased with respect to the adapted radiation pattern. In this thesis, a generic STAP radar model is developed and implemented in simulation environment. The implemented radar model demonstrates that, STAP can be used in order to suppress wideband jammer effectiveness together with ground clutter effects.
APA, Harvard, Vancouver, ISO, and other styles
2

Shankar, Arun. "Optimal jammer placement to interdict wireless network services." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483583.

Full text
Abstract:
Thesis (M.S. in Operations Research and M.S. in Applied Mathematics)--Naval Postgraduate School, June 2008.
Thesis Advisor(s): Alderson, David ; Zhou, Hong. "June 2008." Description based on title screen as viewed on August 22, 2008. Includes bibliographical references (p. 39-40). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Vingson, Narciso A. Vaqar Muhammad. "Model to calculate the effectiveness of an airborne jammer on analog communications /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FVingson.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Jovan E. Lebaric, Richard W. Adler. Includes bibliographical references (p. 59-60). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Jammer, Tobias [Verfasser], and Josef [Akademischer Betreuer] Jochum. "Silicon Photomultipliers for UHECR Observation from Space / Tobias Jammer ; Betreuer: Josef Jochum." Tübingen : Universitätsbibliothek Tübingen, 2019. http://d-nb.info/1177790548/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Torres, Ascencio Kristiam Eduardo. "Desarrollo de un dispositivo Jammer para el bloqueo de señal móvil GSM." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2014. http://tesis.pucp.edu.pe/repositorio/handle/123456789/5941.

Full text
Abstract:
La presente tesis consiste en el desarrollo de un dispositivo electrónico capaz de interferir las señales de los operadores móviles en lugares donde no se tiene permitido el uso de teléfonos móviles que operan en la banda GSM. Después de presentar los conceptos teóricos concernientes a la radiofrecuencia, se presenta un análisis entre las diversas técnicas de jamming y los diferentes tipos de jammer con el fin de elegir la mejor opción para el desarrollo del dispositivo. Posteriormente, se realiza el diseño por etapas del dispositivo y su correspondiente simulación de operación. Además se explica brevemente el proceso del desarrollo de la aplicación y se exponen los resultados obtenidos. Con ello se abarcan la parte del generador de funciones y el área de cobertura efectiva del bloqueador. El dispositivo jammer desarrollado opera exitosamente de 0.5 a 1.7 metros a la redonda aproximadamente y toma de 30 a 35 segundos para bloquear completamente al teléfono móvil de cualquier interacción con la red celular GSM.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
6

Muhammad, Vaqar. "Model to calculate the effectiveness of an airborne jammer on analog communications." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1980.

Full text
Abstract:
The objective of this study is to develop a statistical model to calculate the effectiveness of an airborne jammer on analog communication and broadcast receivers, such as AM and FM Broadcast Radio and Television receivers. During the development the required power margin in dB, or equivalently, the required linear ratio, between the jammer power and the carrier power at the target receiver input was first determined. Subsequently, using probabilities that the jammer power will exceed the target signal's carrier power, the required power margin was calculated. This power margin was determined by statistical techniques to predict the propagation characteristics of communication and broadcast signals, such as Log-Normal Shadowing, and Small-Scale Fading. From the model, it was determined that it is difficult to achieve high probabilities of exceeding the required jamming margins with a single jammer. Hence, the use of spatial diversity jamming is recommended, that is, using two or more jammers spaced sufficiently far apart from each other, such that their jamming signals at the targeted area are de-correlated due to the differences in their respective angles of arrival.
APA, Harvard, Vancouver, ISO, and other styles
7

Diniz, Juana Ribeiro. "Culture jamming e seu potencial criativo no ciberespaço." Pontifícia Universidade Católica de São Paulo, 2010. https://tede2.pucsp.br/handle/handle/18052.

Full text
Abstract:
Made available in DSpace on 2016-04-29T14:22:49Z (GMT). No. of bitstreams: 1 Juana Ribeiro Diniz.pdf: 1256050 bytes, checksum: 71675c4524e8ec274f886cf92c419cc6 (MD5) Previous issue date: 2010-09-24
This work has as its study object the culture jamming, a form of contemporary activism which, through practices that blend various art techniques and a boyish trick spirit, subverts advertising messages and leads to situations that criticize media culture and the branding process that this culture helps to produce. The question more frequently discussed about jammer performances regards its revolutionary efficacy. Thus, this research intends to make an analysis of the possibilities that the cyberspace opens, as a new format, to the jammer creation. It begins delineating a panorama of jammer performance, using as major references the analyses of the following authors: Kalle Lasn, Mark Dery and Naomi Klein. The next chapter contextualizes the culture jamming in the cyberspace, using André Lemos', Lúcia Santaella's and Pierre Lévy's theories on such matter. Supported by studies about the aesthetics of technology, it was possible to draw a profile of the jammer aesthetic in the cyberspace and, in this way, to analyze some examples in order to compare their approach in the real space and the virtual one. For this topic, Derrick Kerckhove's, Lúcia Santaella's and Pierre Lévy's theories were used. The examples were chosen regarding the necessity to analyze both their diversity as their repercussion. So, the comparative analyses lead us to remark that the jammer creation in the cyberspace is still coy and not completely aware of the full possibilities offered by it. And because of the complex and dynamic aspects of the web environment, it is difficult to foresee or indicate the entire range of possibilities that the cyberspace has to offer to jammer creation. However, this research leads to believe that the better source to increase and explore the creativity inside the cyberspace is in the paths that have been opened by the cyberart. It is a longtime bet, but everything indicates that the more familiar the jammers get with the virtual space, more capable they will become to explore all the creative aspects granted by the cyberspace
O trabalho proposto aqui tem como objeto de pesquisa a culture jamming que pode ser compreendida como uma forma de ativismo contemporâneo que, através de práticas que misturam diversas técnicas artísticas e o espírito de molecagem, subvertem mensagens publicitárias e criam situações que resultam em uma crítica à cultura midiatizada e às imagens das marcas que esta ajuda a construir. A questão em debate mais recorrente sobre a atuação jammer se refere à sua eficiência revolucionária. Na busca por pistas que contribuam e, juntamente com outros estudos, indiquem uma resposta mais confiável para tal debate, este trabalho se propôs a realizar uma análise do potencial que o ciberespaço abre, como um novo formato, para a criação jammer. Com este objetivo, inicialmente foi traçado um panorama da atuação jammer, utilizando como principais referências as descrições dos seguintes autores: Kalle Lasn, Mark Dery e Naomi Klein. Em seguida, um capítulo foi dedicado à contextualização da culture jamming no ciberespaço, utilizando como embasamento teórico André Lemos, Lúcia Santaella e Pierre Lévy nas considerações referentes ao ciberespaço. Através dos estudos sobre a estética tecnológica, foi possível se traçar um perfil da estética jammer dentro do ciberespaço e assim analisar alguns exemplos de forma comparativa, confrontando a sua abordagem no espaço presencial e no virtual. Os pressupostos teóricos para tanto vieram principalmente das leituras de Derrick Kerckhove, Lúcia Santaella e Pierre Lévy. A escolha das amostras levou em consideração a necessidade de analisar exemplos diversificados tanto em formato, quanto em graus de repercussão. Com as observações encontradas nessa análise comparativa foi possível identificar que a criação jammer no ciberespaço ainda se mostra tímida e não totalmente familiarizada com as novas possibilidades estéticas oferecidas pelo mesmo. Pelo próprio caráter complexo e dinâmico dos caminhos rizomáticos do ambiente em questão fica difícil prever ou mapear toda a gama de possibilidades que o ciberespaço tem a oferecer para a criatividade jammer. No entanto, o observado nesta pesquisa leva a crer que a fonte mais indicada para ampliar e melhor explorar a criatividade dentro do ciberespaço está nos caminhos que estão sendo abertos pela ciberarte. A aposta deste trabalho está no decorrer do tempo. Quanto mais íntimos os jammers estiverem do espaço virtual, maior será a sua capacidade de explorar o aspecto criativo da prática dentro do ciberespaço
APA, Harvard, Vancouver, ISO, and other styles
8

Aras, Ersin. "Analysis of jammer resistant, spread spectrum, VSAT communication scheme for maritime platform using DSCDMA /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FAras.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Tri T. Ha, Herschel H. Loomis. Includes bibliographical references (p. 77-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Aras, Ersin. "Analysis of jammer resistant, spread spectrum, VSAT communication scheme for maritime platform using DS-CDMA." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5520.

Full text
Abstract:
Approved for public release; distribution is unlimited
In this thesis, a new VSAT (Very Small Aperture Terminal) communication system is developed using Direct Sequence Code Division Multiple Access (DS-CDMA) for multiple maritime mobile users in the footprint of national communication satellites. The Forward Error Correction (FEC) is implemented by applying convolution encoding with soft decision decoding. The worst-case scenario is always considered by placing VSAT system and different types of jammers on the footprint where the minimum signal-to-noise ratio is possible. Using this assumption, the performance of the system is analyzed for different convolution code rates, for a different number of users and for the different jammer powers. The Walsh codes are used to establish an orthogonal cover between CDMA channels in a VSAT. Additionally, spread spectrum is included by PN sequences to ensure as much orthogonal coverage as possible between the VSATs. Also, that spreading is the key to minimizing these hostile jammer effects. After analyzing VSAT system for possible scenario elements, optimum system parameters are introduced for military and civilian applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Burton, Ken. "Mission Analysis and Reporting System (MARS) - EW Analysis and Reporting On A Personal Computer." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608375.

Full text
Abstract:
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California
In response to the need to analyze and report upon Electronic Warfare (EW) test data results in a comprehensive and uniform manner, the Mission Analysis and Reporting System (MARS) has been developed. MARS is a government owned PC based Windows application designed for rapid analysis and reporting upon EW test mission data. MARS currently performs Jammer Effectiveness ( Reduction In Lethality, Increase In Survivability, Reduction In Shot, and Reduction In Hit), Radar Warning Receiver (RWR) System performance (Threat ID, Response Time/Ageout, and Direction Finding (DF) Accuracy), and Tracking Error Statistics. Additionally, MARS produces several graphical outputs including polar plotting, dynamic strip charting, Cumulative Distribution Functions (CDF), and RWR Simulated Scope. Continual development and maintenance of MARS at the Air Force Development Test Center, Eglin Air Force Base, Florida, has provided a proven product used by numerous DT&E and OT&E test projects over the last four years.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Jammer"

1

United States. General Accounting Office. National Security and International Affairs Division. Airborne Self-Protection Jammer. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. General Accounting Office. National Security and International Affairs Division. Airborne Self-Protection Jammer. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. General Accounting Office. National Security and International Affairs Division. Airborne Self-Protection Jammer. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Division, United States General Accounting Office National Security and International Affairs. Airborne Self-Protection Jammer. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The jammer: A five-stridin' valentine. New York: Dramatists Play Service, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Government Operations. Duplicative radar jammer programs waste millions: Fifty-second report. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Operations, United States Congress House Committee on Government. Duplicative radar jammer programs waste millions: Fifty-second report. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Government Operations. Duplicative radar jammer programs waste millions: Fifty-second report. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sanders, Frank H. Emission measurements of a cellular and PCS jammer at a prison facility. United States]: U.S. Dept. of Commerce, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rammer, jammer, yellow, hammer: A journey into the heart of fan mania. New York: Crown Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Jammer"

1

Weik, Martin H. "jammer modulation." In Computer Science and Communications Dictionary, 844. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_9659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grams, Timm. "Der Jammer mit der Statistik." In Klüger irren - Denkfallen vermeiden mit System, 103–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61103-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grams, Timm. "Der Jammer mit der Statistik." In Klüger irren - Denkfallen vermeiden mit System, 99–154. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-50280-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lineswala, Priyanka L., and Shweta N. Shah. "Designing of SDR Based Malicious Act: IRNSS Jammer." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 237–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73712-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Ma, Fei Liu, and Jian-jun Yang. "Quantity Requirement Analysis of Stratospheric Airship-Carried GPS Jammer." In Lecture Notes in Electrical Engineering, 155–62. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4793-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zaka, Imran, Habib ur Rehman, Muhammad Naeem, Syed Ismail Shah, and Jamil Ahmad. "Narrowband Jammer Excision in CDMA Using Particle Swarm Optimization." In Lecture Notes in Computer Science, 601–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-87442-3_75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Herrmann, Kay. "Brief 52: Max Jammer an Grete Henry-Hermann (3.3.1968)." In Frauen in Philosophie und Wissenschaft. Women Philosophers and Scientists, 599–600. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-16241-2_74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Henry-Hermann, G. "Brief 54: Grete Henry-Hermann an Max Jammer (11.4.1968)." In Frauen in Philosophie und Wissenschaft. Women Philosophers and Scientists, 605–10. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-16241-2_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herrmann, Kay. "Brief 53: Max Jammer an Grete Henry-Hermann (2.4.1968)." In Frauen in Philosophie und Wissenschaft. Women Philosophers and Scientists, 601–3. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-16241-2_75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

He, Kuan, and Bin Yu. "An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks." In Science of Cyber Security, 156–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Jammer"

1

Beg, Saira, Faraz Ahsan, and Sajjad Mohsin. "Engaging the jammer on the jammed channel in MANET." In 2010 International Conference on Emerging Technologies (ICET). IEEE, 2010. http://dx.doi.org/10.1109/icet.2010.5638503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aldosari, Waleed, Mohamed Zohdy, and Richard Olawoyin. "Jammer Localization Through Smart Estimation of Jammer’s Transmission Power." In NAECON 2019 - IEEE National Aerospace and Electronics Conference. IEEE, 2019. http://dx.doi.org/10.1109/naecon46414.2019.9058093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diaz, Jose, and Robert Pearson. "GPS Micro-Jammer." In 2008 U.S. Air Force T&E Days. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2008. http://dx.doi.org/10.2514/6.2008-1680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ashraf, Farhana, Yih-Chun Hu, and Robin H. Kravets. "Bankrupting the jammer." In 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). IEEE, 2011. http://dx.doi.org/10.1109/sahcn.2011.5984887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Syed Waqar, M. Inayatullah Babar, M. N. Arbab, K. M. Yahya, Gulzar Ahmad, Tariq Adnan, and Ammara Masood. "Cell phone jammer." In IEEE INMIC 2008. 12th IEEE International Multitopic Conference. IEEE, 2008. http://dx.doi.org/10.1109/inmic.2008.4777805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Perkovic, Toni, and Dino Siriscevic. "Low-Cost LoRaWAN Jammer." In 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech). IEEE, 2020. http://dx.doi.org/10.23919/splitech49282.2020.9243739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bodkhe, Apurva A., and Archana R. Raut. "Identifying Jammers in Wireless Sensor Network with an Approach to Defend Reactive Jammer." In 2014 International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2014. http://dx.doi.org/10.1109/csnt.2014.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Tairan, and Georgios B. Giannakis. "Mutual Information Jammer-Relay Games." In 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07. IEEE, 2007. http://dx.doi.org/10.1109/icassp.2007.366773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Allen, Wesley N., and Dimitrios Peroulis. "Fully autonomous multiple-jammer suppression." In 2017 IEEE/MTT-S International Microwave Symposium - IMS 2017. IEEE, 2017. http://dx.doi.org/10.1109/mwsym.2017.8059061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ashraf, Farhana, Yih-Chun Hu, and Robin H. Kravets. "Bankrupting the jammer in WSN." In 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2012. http://dx.doi.org/10.1109/mass.2012.6502531.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Jammer"

1

Jochemsen, Henk. Radio mastor jammer? : the role of religion in moral issues. Wageningen: Wageningen University & Research, 2018. http://dx.doi.org/10.18174/469023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xiangqian. Signal Detection and Jammer Localization in Multipath Channels for Frequency Hopping Communications. Fort Belvoir, VA: Defense Technical Information Center, October 2005. http://dx.doi.org/10.21236/ada440468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wood, Anthony D., John A. Stankovic, and Sang H. Son. JAM: A Jammed-Area Mapping Service for Sensor Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada446986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garvock, James. Test - James Garvock. Washington, DC: The MAA Mathematical Sciences Digital Library, February 2010. http://dx.doi.org/10.4169/loci003425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hussain, Shakeel. Jammu and Kashmir. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada404200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rivkin, P., Y. Zhang, and H. Wang. Spatial Adaptive Pre-Suppession of Wideband Jammers in Conjunction with Stap. Fort Belvoir, VA: Defense Technical Information Center, October 1998. http://dx.doi.org/10.21236/ada358180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnstone, R. M. Lower Hood - James River Project. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1992. http://dx.doi.org/10.4095/133308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Leena, and Margaret Graham. James Madison University Bioscience Building Landscape. Landscape Architecture Foundation, 2014. http://dx.doi.org/10.31353/cs0680.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Jamie. 11-21-2020 Jamie Test EDITED. Office of Scientific and Technical Information (OSTI), November 2020. http://dx.doi.org/10.2172/1721353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Campbell, Jamie. 11-21-2020 Jamie Test EDITED. Office of Scientific and Technical Information (OSTI), November 2020. http://dx.doi.org/10.2172/1721354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography