To see the other types of publications on this topic, follow the link: Jammer.

Journal articles on the topic 'Jammer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Jammer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fan, Jianhua, Tao Liang, Tongxiang Wang, and Jianwei Liu. "Identification and Localization of the Jammer in Wireless Sensor Networks." Computer Journal 62, no. 10 (July 3, 2019): 1515–27. http://dx.doi.org/10.1093/comjnl/bxz055.

Full text
Abstract:
Abstract Wireless sensor network can be easily attacked by jammers for its shared character and open access to the wireless channel. Jamming attack could produce a significant threat to the network by interrupting the normal transmission of nodes. To this end, several anti-jamming countermeasures have been proposed to improve the quality of service of the wireless sensor network. As an important building block for anti-jamming countermeasures, the estimation of jammer’s location could provide us a possible way to eliminate jammers artificially. However, existing localization algorithms mainly pay attention to locate the jammers that are equipped with omnidirectional antennas, which usually fail to cope with directional jammers. In order to bridge this gap, an algorithm of antenna identification and localization of the jammer (AILJ) based on the topology information of jamming scenarios is put forward in this paper. At first, a collection protocol is designed to collect the information of boundary nodes and jammed nodes. Then, an identification method based on the classification of the boundary nodes is proposed to derive the type of jammer’s antenna. At last, a range-free method is put forward to locate the jammer without relying on the propagation parameters. The proposed AILJ only depends on the localization of jammed nodes and boundary nodes and employs their geometry knowledge. For the omnidirectional jammer, the mean center of two circumcircles is considered as the jammer’s position. For the directional jammer, the mean value of the intersections between the straight line that represents jammer’s direction and the circumcircles is considered as the directional jammer’s position. Finally, a series of experiments have been conducted to evaluate the identification and localization performance of AILJ.
APA, Harvard, Vancouver, ISO, and other styles
2

Aldosari, Waleed, and Mohamed Zohdy. "Tracking a Jammer in Wireless Sensor Networks and Selecting Boundary Nodes by Estimating Signal-to-Noise Ratios and Using an Extended Kalman Filter." Journal of Sensor and Actuator Networks 7, no. 4 (November 15, 2018): 48. http://dx.doi.org/10.3390/jsan7040048.

Full text
Abstract:
This work investigates boundary node selection when tracking a jammer. A technique to choose nodes to track jammers by estimating signal-to-noise Ratio (SNR), jammer-to-noise ratio (JNR), and jammer received signal strength (JRSS) are introduced in this paper. We proposed a boundary node selection threshold (BNST) algorithm. Every node can become a boundary node by comparing the SNR threshold, the average SNR estimated at the boundary node, and the received BNST value. The maximum sensing range, transmission range, and JRSS are the main parts of this algorithm. The algorithm is divided into three steps. In the first step, the maximum distance between two jammed nodes is found. Next, the maximum distance between the jammed node and its unjammed neighbors is computed. Finally, maximum BNST value is estimated. The extended Kalman filter (EKF) is utilized in this work to track the jammer and estimate its position in a different time step using selected boundary nodes. The experiment validates the benefits of selecting a boundary when tracking a jammer.
APA, Harvard, Vancouver, ISO, and other styles
3

Hermans, Mariette. "Jammer, jammer, jammer." Maatwerk 9, no. 2 (April 2008): 12–13. http://dx.doi.org/10.1007/bf03076793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Tongxiang, Xianglin Wei, Jianhua Fan, and Tao Liang. "Jammer Localization in Multihop Wireless Networks Based on Gravitational Search." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/7670939.

Full text
Abstract:
Multihop Wireless Networks (MHWNs) can be easily attacked by the jammer for their shared nature and open access to the wireless medium. The jamming attack may prevent the normal communication through occupying the same wireless channel of legal nodes. It is critical to locate the jammer accurately, which may provide necessary message for the implementation of antijamming mechanisms. However, current range-free methods are sensitive to the distribution of nodes and parameters of the jammer. In order to improve the localization accuracy, this article proposes a jammer localization method based on Gravitational Search Algorithm (GSA), which is a heuristic optimization evolutionary algorithm based on Newton’s law of universal gravitation and mass interactions. At first, the initial particles are selected randomly from the jammed area. Then, the fitness function is designed based on range-free method. At each iteration, the mass and position of the particles are updated. Finally, the position of particle with the maximum mass is considered as the estimated jammer’s position. A series of simulations are conducted to evaluate our proposed algorithms and the simulation results show that the GSA-based localization algorithm outperforms many state-of-the-art algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Langtao, Xin Zheng, and Chunsheng Chen. "Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection." Security and Communication Networks 2019 (November 16, 2019): 1–9. http://dx.doi.org/10.1155/2019/7869317.

Full text
Abstract:
The physical layer security of downlink nonorthogonal multiple access (NOMA) network is analyzed. In order to improve the secrecy probability, friendly jammers are jointed in the NOMA network. Two jammer schemes are proposed in the NOMA network. All the jammers transmit jamming signal without jammer selection in the first scheme (NO JS scheme). Jammers are selected to transmit jamming signal if their interfering power on scheduled users is below a threshold in the second scheme (JS scheme). A stochastic geometry approach is applied to analyze the outage probability and the secrecy probability. Compared with the NO JS scheme and traditional scheme (without jointing jammers), the jammer selection scheme provides a good balance between the user outage probability and secrecy probability. Numerical results demonstrate that the security performance of the two proposed schemes can be improved by jointing the jammers in the NOMA wireless network.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Hojun, Jongmin Ahn, Yongcheol Kim, and Jaehak Chung. "Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator." Applied Sciences 10, no. 5 (March 3, 2020): 1733. http://dx.doi.org/10.3390/app10051733.

Full text
Abstract:
In frequency-hopping spread-spectrum (FHSS) systems, jammer detection and mitigation are important but difficult. Each slot of the FHSS experiences frequency-selective fading and unequal transceiver-frequency gains that hinder the detection of jammed slots and result in a poor bit-error rate (BER). To increase BER performance, we first propose a noise-jammer power estimator (NJPE) that estimates noise and jammer powers regardless of different channel gains, and derived its normalized Cramér–Rao bound (NCRB). Second, we developed a jammer detector based on gamma distribution, and designed a restoration method combining all nonjammed slots. Computer simulations verified the derived NCRB of the proposed NJPE by normalized mean squared error (NMSE), and showed that the jammer-detection probability of the proposed jammer detector was better than that of conventional detectors. The BER performance of the proposed method was also shown to be better than that of conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Morales Ferre, Ruben, Alberto de la Fuente, and Elena Simona Lohan. "Jammer Classification in GNSS Bands Via Machine Learning Algorithms." Sensors 19, no. 22 (November 6, 2019): 4841. http://dx.doi.org/10.3390/s19224841.

Full text
Abstract:
This paper proposes to treat the jammer classification problem in the Global Navigation Satellite System bands as a black-and-white image classification problem, based on a time-frequency analysis and image mapping of a jammed signal. The paper also proposes to apply machine learning approaches in order to sort the received signal into six classes, namely five classes when the jammer is present with different jammer types and one class where the jammer is absent. The algorithms based on support vector machines show up to 94 . 90 % accuracy in classification, and the algorithms based on convolutional neural networks show up to 91 . 36 % accuracy in classification. The training and test databases generated for these tests are also provided in open access.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Kang-in, Wonjune Kang, Young-Seek Chung, Hoon-Gee Yang, and Jong Mann Kim. "A New Jammer Suppression Method in MIMO Radar Using Matrix Pencil Method and Generalized Likelihood Ratio Test." International Journal of Antennas and Propagation 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/802471.

Full text
Abstract:
We propose a new algorithm to suppress the jammer signals and estimate the direction of arrival (DOA) of the signal of interest (SOI) for collocated MIMO radar by using the matrix pencil method (MPM) and the generalized likelihood ratio test (GLRT). The conventional GLRT divides the visible region into small angle samples, suppresses the jammer signals at each angle sample, and then estimates the DOA of the SOI. In the proposed algorithm, we extract the eigenvalues of received signals regardless of the SOI and jammer by using the MPM, which contain the information of the DOA of SOIs or jammers. Then, in order to suppress the jammers, we apply the GLRT to the extracted DOAs instead of to the entire visible region. By applying the MPM again to the received signals in which the jammer signals are suppressed, we can estimate the DOAs of the SOI. Since the proposed algorithm does not depend on the number of angle samples, it shows fast and accurate results regardless of the angle resolution. In order to verify the proposed algorithm, we compared the results with the results of the conventional GLRT and show the computing time.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Taimin, Xiaoyu Ji, Zhou Zhuang, and Wenyuan Xu. "JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid." Sensors 19, no. 4 (February 21, 2019): 909. http://dx.doi.org/10.3390/s19040909.

Full text
Abstract:
As the core component of the smart grid, advanced metering infrastructure (AMI) is responsible for automated billing, demand response, load forecasting, management, etc. The jamming attack poses a serious threat to the AMI communication networks, especially the neighborhood area network where wireless technologies are widely adopted to connect a tremendous amount of smart meters. An attacker can easily build a jammer using a software-defined radio and jam the wireless communications between smart meters and local controllers, causing failures of on-line monitoring and state estimation. Accurate jammer localization is the first step for defending AMIs against jamming attacks. In this paper, we propose JamCatcher, a mobile jammer localization scheme for defending the AMI. Unlike existing jammer localization schemes, which only consider stationary jammers and usually require a high density of anchor nodes, the proposed scheme utilizes a tracker and can localize a mobile jammer with sparse anchor nodes. The time delay of data transmission is also considered, and the jammer localization process is divided into two stages, i.e., far-field chasing stage and near-field capturing stage. Different localization algorithms are developed for each stage. The proposed method has been tested with data from both simulation and real-world experiment. The results demonstrate that JamCatcher outperforms existing jammer localization algorithms with a limited number of anchor nodes in the AMI scenario.
APA, Harvard, Vancouver, ISO, and other styles
10

Phaiboon, Supachai, and Arunee Chatwaranon. "Localizing Jammer for Indoor Mobile Communication Networks." Applied Mechanics and Materials 701-702 (December 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.1063.

Full text
Abstract:
This paper proposes an experimental study for localizing radio jammers in a multi floors building. We performed signal strength measurement to find propagation path loss characteristics in the building. Then communication nodes around the existing jammers were classified in order to determine a set of boundary nodes. The propagation path losses between the real jammers and the boundary nodes are evaluated by a vector pointer namely, the evaluation feedback metric, ez, to find the real jammer location. The proposed algorithm was validated via an indirect measurement called hearing range. The results demonstrate that our approach provides an effective method for jamming localization.
APA, Harvard, Vancouver, ISO, and other styles
11

Ke, Mingxing, Shiwei Tian, Lu Lu, and Chuang Wang. "Robust Power Allocation for Cooperative Localization in Jammed Wireless Sensor Networks." Wireless Communications and Mobile Computing 2019 (June 10, 2019): 1–9. http://dx.doi.org/10.1155/2019/6904687.

Full text
Abstract:
In this paper, we propose robust power allocation strategies to improve the localization performance in cooperative wireless sensor localization systems when suffering interference of jammer nodes. In wireless sensor localization systems, transmitting power strategies will affect the localization accuracy and determine the lifetime of wireless sensor networks. At the same time, the power allocation problem will be evolution to a new challenge when there are jammed nodes. So in this paper, we first present the optimization framework in jammed cooperative localization systems. Moreover, the imperfect parameter estimations of agent and jammer nodes are considered to develop robust power allocation strategies. In particular, this problem can be transformed into second-order cone programs (SOCPs) to obtain the end solution. Numerical results show the proposed power allocation strategies can achieve better performance than uniform power allocation and the robust schemes can ensure lower localization error than nonrobust power control when systems are subject to uncertainty.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Xin Yu, Jun He, Zhen Biao Hu, and Kai Wang. "A New Method to Deploy and Control the Distributed Jamming against Phased-Array Radar." Applied Mechanics and Materials 416-417 (September 2013): 817–21. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.817.

Full text
Abstract:
Reasonable deployment and effective control can help the distributed jammers to function better. According to the counter-jamming theory of PAR, a new method is presented to deploy the distributed jammers which can provide the azimuth and distance of each jammer to enhance its jamming effects. After the jammers are located, computers are adopted to control the distributed jammers which should be turned on/off properly for suitable duration. The target detection probability under jamming condition is selected to evaluate the jamming effects, and the experiment results show that this method has steady jamming effects against PAR.
APA, Harvard, Vancouver, ISO, and other styles
13

Peltzer, Ulrich, and Kathrin Roggia. "jammer/lappen." Figurationen 3, no. 1 (June 2002): 95–100. http://dx.doi.org/10.7788/figurationen.2002.3.1.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Stix, Gary. "Signal Jammer." Scientific American 289, no. 1 (July 2003): 29–31. http://dx.doi.org/10.1038/scientificamerican0703-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hummers-Pradier, E. "Ein Jammer." ZFA - Zeitschrift für Allgemeinmedizin 84, no. 4 (April 2008): 141. http://dx.doi.org/10.1055/s-2008-1073144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Baher Safa Hanbali, S., and Radwan Kastantin. "Countering a Self-protection Frequency-shifting Jamming against LFM Pulse Compression Radars." International Journal of Electronics and Telecommunications 63, no. 2 (June 27, 2017): 145–50. http://dx.doi.org/10.1515/eletel-2017-0019.

Full text
Abstract:
Abstract the well-known range-Doppler coupling property of the LFM (Linear Frequency Modulation) pulse compression radar makes it more vulnerable to repeater jammer that shifts radar signal in the frequency domain before retransmitting it back to the radar. The repeater jammer, in this case, benefits from the pulse compression processing gain of the radar receiver, and generates many false targets that appear before and after the true target. Therefore, the radar cannot distinguish between the true target and the false ones. In this paper, we present a new technique to counter frequency shifting repeater jammers. The proposed technique is based on introducing a small change in the sweep bandwidth of LFM waveform. The effectiveness of the proposed technique is justified by mathematical analysis and demonstrated by simulation.
APA, Harvard, Vancouver, ISO, and other styles
17

Feng, Zhibin, Guochun Ren, Jin Chen, Chaohui Chen, Xiaoqin Yang, Yijie Luo, and Kun Xu. "An Anti-Jamming Hierarchical Optimization Approach in Relay Communication System via Stackelberg Game." Applied Sciences 9, no. 16 (August 14, 2019): 3348. http://dx.doi.org/10.3390/app9163348.

Full text
Abstract:
In this paper, we study joint relay selection and the power control optimization problem in an anti-jamming relay communication system. Considering the hierarchical competitive relationship between a user and jammer, we formulate the anti-jamming problem as a Stackelberg game. From the perspective of game, the user selects relay and power strategy firstly which acts as the leader, while the jammer chooses power strategy then that acts as follower. Moreover, we prove the existence of Stackelberg equilibrium. Based on the Q-learning algorithm and multi-armed bandit method, a hierarchical joint optimization algorithm is proposed. Simulation results show the user’s strategy selection probability and the jammer’s regret. We compare the user’s and jammer’s utility under the proposed algorithm with a random selection algorithm to verify the algorithm’s superiority. Moreover, the influence of feedback error and eavesdropping error on utility is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
18

Fante, R. L., and J. J. Vacarro. "Cancellation of jammers and jammer multipath in a GPS receiver." IEEE Aerospace and Electronic Systems Magazine 13, no. 11 (1998): 25–28. http://dx.doi.org/10.1109/62.730617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sciancalepore, Savio, Gabriele Oligeri, and Roberto Di Pietro. "Strength of Crowd (SOC)—Defeating a Reactive Jammer in IoT with Decoy Messages." Sensors 18, no. 10 (October 16, 2018): 3492. http://dx.doi.org/10.3390/s18103492.

Full text
Abstract:
We propose Strength of Crowd (SoC), a distributed Internet of Things (IoT) protocol that guarantees message broadcast from an initiator to all network nodes in the presence of either a reactive or a proactive jammer, that targets a variable portion of the radio spectrum. SoC exploits a simple, yet innovative and effective idea: nodes not (currently) involved in the broadcast process transmit decoy messages that cannot be distinguished (by the jammer) from the real ones. Therefore, the jammer has to implement a best-effort strategy to jam all the concurrent communications up to its frequency/energy budget. SoC exploits the inherent parallelism that stems from the massive deployments of IoT nodes to guarantee a high number of concurrent communications, exhausting the jammer capabilities and hence leaving a subset of the communications not jammed. It is worth noting that SoC could be adopted in several wireless scenarios; however, we focus on its application to the Wireless Sensor Networks (WSN) domain, including IoT, Machine-to-Machine (M2M), Device-to-Device (D2D), to name a few. In this framework, we provide several contributions: firstly, we show the details of the SoC protocol, as well as its integration with the IEEE 802.15.4-2015 MAC protocol; secondly, we study the broadcast delay to deliver the message to all the nodes in the network; and finally, we run an extensive simulation and experimental campaign to test our solution. We consider the state-of-the-art OpenMote-B experimental platform, adopting the OpenWSN open-source protocol stack. Experimental results confirm the quality and viability of our solution.
APA, Harvard, Vancouver, ISO, and other styles
20

Czerwinski, Dariusz, Slawomir Przylucki, and Jaroslaw Nowak. "Jammers signal power modelling in the Wi-Fi band." MATEC Web of Conferences 252 (2019): 03016. http://dx.doi.org/10.1051/matecconf/201925203016.

Full text
Abstract:
The distribution of the signal coming from jamming sources is an issue of critical importance to the security and jammer localisation. The paper presents the results of simulations of signal power distribution in the Wi-Fi band conducted for two commercially available jammers, CRJ4000 and CKJ-1502A12. Calculated distributions of signal power were compared with the results from the measurements. The comparison made it possible to assess the correctness of the designed models and out of the simulations. The paper presents the results of simulations and measurements for different scenarios of jammers settings.
APA, Harvard, Vancouver, ISO, and other styles
21

Yozevitch, Roi, Revital Marbel, Nir Flysher, and Boaz Ben-Moshe. "Save Our Roads from GNSS Jamming: A Crowdsource Framework for Threat Evaluation." Sensors 21, no. 14 (July 15, 2021): 4840. http://dx.doi.org/10.3390/s21144840.

Full text
Abstract:
Global Navigation Satellite Systems (GNSS) jamming is an acute problem in the world of modern navigation. As more and more applications rely on GNSS for both position and timing, jamming ramifications are becoming more severe. In this paper we suggest a novel framework to cope with these threats. First, a Bayesian jamming detection algorithm is introduced. The algorithm can both detect and track several jammers in a pre-defined region of interest. Then, a jamming coverage map algorithm is offered. Similar to cellular 3G/4G coverage maps, such a map can detect “weak” GNSS reception spots and handle them. Since jamming interference can be a dynamic phenomenon (e.g., a vehicle equipped with a jammer), the coverage map changes with time. Thus, interference patterns can be detected more easily. Utilizing the offered algorithm, both on simulation and field experiments, we have succeeded to localize an arbitrary jammer(s) within the region of interest. Thus, the results validate the viability of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
22

Prijono, Wahyu Adi. "PERFORMANSI JARINGAN CODE DIVISION MULTIPLE ACCESS (CDMA) MENGGUNAKAN MOBILE PHONE JAMMER." SISTEM Jurnal Ilmu Ilmu Teknik 16, no. 1 (April 10, 2020): 42–51. http://dx.doi.org/10.37303/sistem.v16i1.191.

Full text
Abstract:
The use of communication tools in some places can be disturb to many people, for example in place of worship and a meeting room. It can be prevented by using a device called a mobile phone jammer. Use of Mobile Phone Jammer can jamming the mobile station signals (CDMA and GSM) both uplink and downlink with the workings of the mobile phone jammer issuing signal with a frequency that is similar to the mobile station, however the power emitted is greater. The research will be discussed on the placement of the mobile phone jammer in the room. With two is the parameter is repeater and without repeater. In primary data capture method does is method of spectrum analyzer and method of walktest. On walktest software used is tems investigation 8.0.3 for retrieval of data with the parameter of quality a signal ( Ec / Io , FFER , RSSI , TxPo , and TxGa ) and MapInfo as logfile processing results of TEMS Investigation which can show the maximum range where the mobile station can be jamming. Based on measurements with the method of spectrum analyzer, power mobile phone jammer has power – 74,6 dB and by using mathematical calculations obtained range 43 m. On measurement method using walktest, the first parameter is the chosen location without repeaters the maximum range the jammer by 17 metres and with power jammer effective registration -62.9 dB. Whereas, in the location parameter contained repeater the maximum range jammer obtained is 10 meters and power jammer effective 60,2 dB.
APA, Harvard, Vancouver, ISO, and other styles
23

Devyatyarov, I. O., and V. A. Dobrozhanskiy. "Algorithm for calculating the covariance matrix of the noise jammer estimated position." Journal of «Almaz – Antey» Air and Space Defence Corporation, no. 4 (December 30, 2019): 43–49. http://dx.doi.org/10.38013/2542-0542-2019-4-43-49.

Full text
Abstract:
The study considers an algorithm for identifying the noise jammers tracks and estimates the coordinates of the assumed position of such a jammer as a linear estimate of the true position with minimal dispersion. An algorithm for calculating the covariance matrix of the resulting estimate is proposed. Findings of the research can be used to modify and develop algorithms which ensure the operation of a promising anti-aircraft missile system for noise jamming.
APA, Harvard, Vancouver, ISO, and other styles
24

Hartgers, Rob. "Jammer voor tante." Lucide 4, no. 1 (March 2015): 30–32. http://dx.doi.org/10.1007/s40408-015-0011-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gao, Jing, Rihan Wu, Xin Guan, Hao Yu, and Xishi Wang. "Power-Minimization-Based Jamming Spectral Design for Finite-Duration Random Target in Clutter." Mobile Information Systems 2021 (May 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/5523791.

Full text
Abstract:
An approach to optimize the transmitted waveform of a smart jammer was developed. This study aims to improve power-saving performance by minimizing the total jamming power and allowing the values of signal-to-interference-plus-noise ratio (SINR) and mutual information (MI) between the radar return and target impulse response to be below specific thresholds. First, the model of a finite-duration random target was proposed, and the power-minimization-based optimal jamming waveform design methods in clutter with SINR and MI limitations were investigated. Subsequently, considering the impossibility of obtaining precise prior information for estimation in practice, the spectra are assumed to lie within an uncertainty class where the upper and lower bounds of each frequency point sample are known. Consequently, power-minimization-based single- and double-robust jamming waveform design methods were researched, which bound the worst power-saving performance of the jammer. Finally, we provided several numerical examples to demonstrate that the power-saving performance of smart jammers can be enhanced by employing power-minimization-based optimization algorithms.
APA, Harvard, Vancouver, ISO, and other styles
26

Kostromitski, S. M., A. P. Shumski, and I. N. Davydzenka. "Structure and mathematical model of gradient jammer cancellers." Doklady of the National Academy of Sciences of Belarus 62, no. 6 (January 13, 2019): 763–68. http://dx.doi.org/10.29235/1561-8323-2018-62-6-763-768.

Full text
Abstract:
In the article, using subsequent transformations of the structure and mathematical model of a classic gradient jammer canceller, the mathematical model and the structure of a gradient jammer canceller with a pre-processor are obtained. A new structure provides that the adaptation speed of a canceller does not depend on the spread of the eigenvalues of the input signal correlation matrix. An intermediate model provides the analysis of weight misadjustment of the classic gradient jammer canceller. The aim of the new mathematical model is a subsequent analysis of weight misadjustment of the jammer canceller with a stable adaptation speed.
APA, Harvard, Vancouver, ISO, and other styles
27

Tan, Q. Jeanette O., and Ric A. Romero. "Jammer-Nulling Transmit-Adaptive Radar Against Knowledge-Based Jammers in Electronic Warfare." IEEE Access 7 (2019): 181899–915. http://dx.doi.org/10.1109/access.2019.2960012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Aziz, Farhan M., Jeff S. Shamma, and Gordon L. Stuber. "Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game." IEEE Transactions on Vehicular Technology 66, no. 8 (August 2017): 7422–31. http://dx.doi.org/10.1109/tvt.2017.2672682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ou, Jian Jun, An Zhang, and Zhong Qi Chen. "Cooperative Path Planning of Jammer Formation in Penetration Attack." Advanced Materials Research 981 (July 2014): 735–42. http://dx.doi.org/10.4028/www.scientific.net/amr.981.735.

Full text
Abstract:
The study of cooperative fighting between jammer and fighter aircraft is helpful to improve the ability of penetration attack. Firstly, the conception of path point threat assessment is given, based on the jamming troop model. Secondly, the jammer free fly region conception, relative theorem and the resolving strategy are given, and as a result, the dynamic searching space can be got. Thirdly, by improving Sparse A* Search (SAS) algorithm and applying it in cooperative path planning of jammer formation, the realizing process is designed. At last, simulation is made. The results show that the strategy can quickly get the best cooperative path of jammer formation whatever fighter aircraft’s penetration attack task.
APA, Harvard, Vancouver, ISO, and other styles
30

Tuan, Van Phu, and Ic-Pyo Hong. "Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming." Sensors 20, no. 4 (February 14, 2020): 1047. http://dx.doi.org/10.3390/s20041047.

Full text
Abstract:
This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay. The relay extracts a part of its received signal strength using a power-splitting (PS) policy then harvests energy using a non-linear EH (NLEH) circuit. A friendly jammer sends jamming signals to help secure communication. The jammer is exploited as an additional energy source. A store-and-transmit (SaT) scheme which allows the EH relay to perform energy storing and information transmitting is proposed. For performance evaluation, the closed-form expressions for three metrics, secrecy outage probability (SOP), average achievable secrecy rate (AASR) and average stored energy (ASE) are derived. These results enable studies on the effects of various system parameters, such as NOMA power-allocation factors, target secrecy rates, jammer’s location, and relay’s power levels, on the system performance.
APA, Harvard, Vancouver, ISO, and other styles
31

Umratkar, Priti Y., Harshali Chalfe, and S. K. Totade. "DESIGN AND PERFORMANCE OF MOBILE PHONE JAMMER." International Journal of Engineering Technologies and Management Research 6, no. 12 (April 2, 2020): 1–5. http://dx.doi.org/10.29121/ijetmr.v6.i12.2019.467.

Full text
Abstract:
The continuously use of mobile phone can be attributed to it can use in any places and thus have become one of the most widely used devices in mobile communication which makes it so important in our lives. The convenience and portability of cellphones has made it possible to be carried everywhere. e.g Churches, lecture halls, medical centers etc. Its benefit can create disturbance in some places when there is continuous beeping or ringtones of cell phones which becomes annoying when such noise is disturbance in areas where silence is required or the use or of mobile phone is restricted or prohibited like Libraries and Study rooms A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base station. It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. The mobile phone jammer unit is intended for blocking all mobile phone types within designated indoor areas. The mobile Phone Jammer is a 'plug and play' unit, its installation is quick and its operation is easy. Once the mobile Phone Jammer is operating, all mobile phones present within the jamming coverage area are blocked, and cellular activity in the immediate surroundings (including incoming and outgoing calls, SMS, pictures sending, etc.) is jammer. This paper focuses on the design of a cell phone jammer to prevent the usage of mobile communication in restricted areas without interfering with the communication channels outside its range.
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Bin, Xu Chen, Fengming Xin, and Xin Song. "MI-Based Robust Waveform Design in Radar and Jammer Games." Complexity 2019 (March 26, 2019): 1–14. http://dx.doi.org/10.1155/2019/4057849.

Full text
Abstract:
Due to the uncertainties of the radar target prior information in the actual scene, the waveform designed based on the radar target prior information cannot meet the needs of parameter estimation. To improve the performance of parameter estimation, a novel transmitted waveform design method under the hierarchical game model of radar and jammer, which maximizes the mutual information (MI) between the radar target echo and the random target spectrum response, is proposed. In the hierarchical game model of radar and jammer, the radar is in a leading position while the jammer is in a following position. The strategy of the jammer is optimized based on the radar transmitted waveform of previous moment, then the radar selects its own strategy based on the strategy of the jammer. It is generally assumed that the radar and the jammer have intercepted the real target spectrum and then the optimal jamming and the optimal transmitted waveform spectrum are obtained. However, the exact characteristic of the real target spectrum is hard to capture accurately in actual scenes. To simulate this, the real target spectrum is considered to be within an uncertainty range which is confined by known upper and lower bounds. Then, the minimax robust jamming and the maximin robust transmitted waveform are designed successively based on the MI criteria, which optimizes the performance under the most unfavorable condition of the radar and the jammer, respectively. Simulation results demonstrate that the robust transmitted waveform design method guarantees the parameter estimation performance effectively and provides useful guidance for waveform energy allocation.
APA, Harvard, Vancouver, ISO, and other styles
33

Delmas, J. P. "Adaptive harmonic jammer canceler." IEEE Transactions on Signal Processing 43, no. 10 (1995): 2323–31. http://dx.doi.org/10.1109/78.469857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

., Sujith M. "MOBILE SNIFFER AND JAMMER." International Journal of Research in Engineering and Technology 03, no. 13 (March 25, 2014): 115–18. http://dx.doi.org/10.15623/ijret.2014.0313022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tulp, Edith. "Jammer van de ophef." Zorgvisie 49, no. 7 (November 2019): 18–23. http://dx.doi.org/10.1007/s41187-019-0109-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bažec, Matej, Franc Dimc, and Polona Pavlovčič-Prešeren. "Evaluating the Vulnerability of Several Geodetic GNSS Receivers under Chirp Signal L1/E1 Jamming." Sensors 20, no. 3 (February 3, 2020): 814. http://dx.doi.org/10.3390/s20030814.

Full text
Abstract:
Understanding the factors that might intentionally influence the reception of global navigation satellite system (GNSS) signals can be a challenging topic today. The focus of this research is to evaluate the vulnerability of geodetic GNSS receivers under the use of a low-cost L1/E1 frequency jammer. A suitable area for testing was established in Slovenia. Nine receivers from different manufacturers were under consideration in this study. While positioning, intentional 3-minute jammings were performed by a jammer that was located statically at different distances from receivers. Furthermore, kinematic disturbances were performed using a jammer placed in a vehicle that passed the testing area at various speeds. An analysis of different scenarios indicated that despite the use of an L1/E1 jammer, the GLONASS (Russian: Globalnaya Navigatsionnaya Sputnikovaya Sistema) and Galileo signals were also affected, either due to the increased carrier-to-noise-ratio (C/N0) or, in the worst cases, by a loss-of-signal. A jammer could substantially affect the position, either with a lack of any practical solution or even with a wrong position. Maximal errors in the carrier-phase positions, which should be considered a concern for geodesy, differed by a few metres from the exact solution. The factor that completely disabled the signal reception was the proximity of a jammer, regardless of its static or kinematic mode.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yu, and Lisheng Yang. "Triangle and GA Methods for UAVs Jamming." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/713430.

Full text
Abstract:
We focus on how to jam UAVs network efficiently. The system model is described and the problem is formulated. Based on two properties and a theorem which helps to decide good location for a jammer, we present the Triangle method to find good locations for jammers. The Triangle method is easy to understand and has overall computational complexity ofON2. We also present a genetic algorithm- (GA-) based jamming method, which has computational complex ofOLMN2. New chromosome, mutation, and crossover operations are redefined for the GA method. The simulation shows that Triangle and GA methods perform better than Random method. If the ratio of jammers’ number to UAVs’ number is low (lower than 1/5 in this paper), GA method does better than Triangle method. Otherwise, Triangle method performs better.
APA, Harvard, Vancouver, ISO, and other styles
38

Men, Jin Zhu, Qun E, and Hong Jun Wang. "Study on the Blanket Effective Area Model of Active Jammer Fixed in the Missile Aimed to Shipborne Radar." Advanced Materials Research 588-589 (November 2012): 2097–100. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.2097.

Full text
Abstract:
According to the characteristics of anti-ship missile penetration with active jammer fixed in the missile, maths models, which reflect the blanket effective area of active jammer fixed in the missile to shipborne radars, are built based on logical model index. Furthermore, the rationality of the method are proved by calculating and analyzing under the condition of reasonable assumed tactics and parameters. The study provides theoretic reference value to evaluate the operational efficiency of active jammer fixed in the missile and improve the anti-ship missile penetration capability.
APA, Harvard, Vancouver, ISO, and other styles
39

Borovikov, S. G., and A. A. Ivensky. "Special Aspects of Fixing Interfering Source Located in Close Proximity to Radio-Electronic Equipment with Multi-Channel Receiver and Estimate of Accuracy." Journal of the Russian Universities. Radioelectronics, no. 3 (July 19, 2018): 63–70. http://dx.doi.org/10.32603/1993-8985-2018-21-3-63-70.

Full text
Abstract:
One of the fundamental properties of modern radio electronic equipment (REE) is jammer-induced performance in particular when located near REE, when they significantly affect the parameters of electromagnetic field generated and/or received by REE. One of the ways of antijamming is its rapid detection by REE for elimination purpose. In solving this problem, both the minimum detection time and the accuracy of the noise source location are equally important. In this article, the problem is considered using the example of radar detection with a multi-channel receiving device and thrown noise transmitter located close to its antenna field. The schemes displaying the problem geometry for phase and difference-distance-measuring methods for determining of jammer position are presented. Expressions are formed that determine the area of uncertainty zone when jammer detecting and connection of this value with radar parameters – ranging and azimuth accuracy. The necessity of using expressions free of far zones assumptions with respect to the radar and jammer relative position is explained. Ranging based on the signal received by radar in the mode of circular or sector review is considered. The results obtained confirm the necessity to take into account the distance between the jammer and REE when implementing the basic methods for determining radiation source location.
APA, Harvard, Vancouver, ISO, and other styles
40

Tairan Wang and G. B. Giannakis. "Mutual Information Jammer-Relay Games." IEEE Transactions on Information Forensics and Security 3, no. 2 (June 2008): 290–303. http://dx.doi.org/10.1109/tifs.2008.920730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lichtman, Marc, T. Charles Clancy, and Jeffrey H. Reed. "FSK-Based Reactive Jammer Piggybacking." IEEE Communications Letters 21, no. 1 (January 2017): 68–71. http://dx.doi.org/10.1109/lcomm.2016.2615900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Guizzo, E. "Zone of silence [cellphone jammer]." IEEE Spectrum 42, no. 5 (May 2005): 17–18. http://dx.doi.org/10.1109/mspec.2005.1426962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Xiong, Wenhui, Yinfeng Yao, Xiaoyu Fu, and Shaoqian Li. "Covert Communication With Cognitive Jammer." IEEE Wireless Communications Letters 9, no. 10 (October 2020): 1753–57. http://dx.doi.org/10.1109/lwc.2020.3003472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pavlovčič-Prešeren, Polona, Franc Dimc, and Matej Bažec. "A Comparative Analysis of the Response of GNSS Receivers under Vertical and Horizontal L1/E1 Chirp Jamming." Sensors 21, no. 4 (February 19, 2021): 1446. http://dx.doi.org/10.3390/s21041446.

Full text
Abstract:
Jamming is becoming a serious threat to various users of global navigation satellite systems (GNSS). Therefore, live monitoring tests are required to estimate the sensitivity range of GNSS receivers under jamming. This study analyses the response of some mass-market and professional-grade receivers to intentional interferences based on different 3D jammer positions. First, the vertical jamming was investigated, followed by a horizontal experiment where the receivers were placed at three locations while the jammer was moving within a triangular area. The aim was to determine a fingerprint of the influence of the L1/E1 chirp jammer on receivers used in the research. The results show that low-cost receivers are much more susceptible to interference, while the latest generation of GNSS geodetic receivers are much more resilient. It is encouraging that positioning in the presence of jamming could be achieved on a larger scale, especially by using professional receivers. An attempt to position the jammer will be left for trials when a more frequency stable device is applied.
APA, Harvard, Vancouver, ISO, and other styles
45

Gao, Jing, Rihan Wu, and Jinde Zhang. "An Adaptive Multi-Target Jamming Waveform Design Based on Power Minimization." Entropy 22, no. 5 (April 29, 2020): 508. http://dx.doi.org/10.3390/e22050508.

Full text
Abstract:
With increasing complexity of electronic warfare environments, smart jammers are beginning to play an important role. This study investigates a method of power minimization-based jamming waveform design in the presence of multiple targets, in which the performance of a radar system can be degraded according to the jammers’ different tasks. By establishing an optimization model, the power consumption of the designed jamming spectrum is minimized. The jamming spectrum with power control is constrained by a specified signal-to-interference-plus-noise ratio (SINR) or mutual information (MI) requirement. Considering that precise characterizations of the radar-transmitted spectrum are rare in practice, a single-robust jamming waveform design method is proposed. Furthermore, recognizing that the ground jammer is not integrated with the target, a double-robust jamming waveform design method is studied. Simulation results show that power minimization-based single-robust jamming spectra can maximize the power-saving performance of smart jammers in the local worst-case scenario. Moreover, double-robust jamming spectra can minimize the power consumption in the global worst-case scenario and provide useful guidance for the waveform design of ground jammers.
APA, Harvard, Vancouver, ISO, and other styles
46

Miao, Kang Le, Ri Jie Yang, Xiong Xiong, and Jian Hui Han. "The Influence of Positional Parameters on the Effect of a Noise-Jammer Based on Broadband Acoustic Propagation Model." Advanced Materials Research 791-793 (September 2013): 2043–47. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2043.

Full text
Abstract:
In a long time, the specialists in underwater acoustic countermeasure field were used to get an approximate evaluation of the transmission loss of noise signals by spreading loss equation of spherical wave, which led to results with a low accurateness. Based on normal mode theories and discrete Fourier transformation (DFT), derived the composition and process of the broadband acoustic propagation model. Then the transmission loss could be calculated via this propagation model, which could get a relatively more accurate result. The influence of three key positional parameters, the orientation, distance and depth of the noise-jammer were studied in this paper. The method and conclusions in this paper can provide a reliable foundation for tactical research on noise-jammers.
APA, Harvard, Vancouver, ISO, and other styles
47

Abdullah, Abdulqadir Ismail, and Adil Hussein Al-Dalawie. "Evaluation of the Effect of Follower Jammer on the Mobile Bluetooth Network." Cihan University-Erbil Scientific Journal 3, no. 2 (August 20, 2019): 1–4. http://dx.doi.org/10.24086/cuesj.v3n2y2019.pp1-4.

Full text
Abstract:
Bluetooth wireless communication technology has spread rapidly in the past 20 years. It has made life much easier with all the devices that use Bluetooth technology around us such as mobile phones, laptops, and watches. With all the good and useful applications of Bluetooth technology, it has been used in harmful and bad ways such as cheating in an examination. In this article, parameter design considerations have been discussed for a follower jammer to interrupt a Bluetooth network, especially when it is used in unauthorized way. The effects of the follower jammer were studied and tested. The effects were calculated for time and jamming-over-signal ratio for three different distances (1, 5, and 10 m). The testing showed that the follower jammer designed was successful in disrupting the Bluetooth signal.
APA, Harvard, Vancouver, ISO, and other styles
48

Lee, Jung Hoon, and Wan Choi. "Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law." IEEE Transactions on Signal Processing 62, no. 4 (February 2014): 828–39. http://dx.doi.org/10.1109/tsp.2013.2293979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chang, Xin, Chunxi Dong, Gao Weichen, and Yan Zhao. "An Interrupted Sampling Scattered Wave Deception Jamming Method against Three-Channel SAR GMTI." Mathematical Problems in Engineering 2020 (July 27, 2020): 1–13. http://dx.doi.org/10.1155/2020/1760573.

Full text
Abstract:
An important problem is how to generate false moving targets, whose relocated azimuth position is similar to that of real moving targets. To solve this problem, an interrupted sampling scattered wave deception jamming method against three-channel synthetic aperture radar ground moving target indication (SAR GMTI) is proposed. A stationary jammer uses a controllable jammer antenna to generate verisimilar moving targets by controlling velocity and initial position of jammer beam footprint. The antenna sampled moves along the different tracks. For each track, the slant history of jamming signal is changed varying with different pulse recurrence intervals (PRI), and the movement of the footprint will introduce a Doppler frequency in jamming the signal. By analyzing parameters’ difference between echoes and jamming signal, the velocity and the initial position of the footprint will be calculated, and then the verisimilar false targets are generated. The effectiveness of the method is verified by simulation experiments.
APA, Harvard, Vancouver, ISO, and other styles
50

Parulekar, Waman R., and Damini D. Bhingarde. "Study of Mobile Phone Jammer Technique." International Journal of Computer Sciences and Engineering 6, no. 7 (July 31, 2018): 1176–79. http://dx.doi.org/10.26438/ijcse/v6i7.11761179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography