Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "jamming" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Policies for Transmit Power Control in the Conditions of Jamming in Clustered Wireless System
Autorzy:
Michalak, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/1844445.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
clustered network
transmit power control
jamming
wireless system
Opis:
This article presents a consistent solution of Transmit Power Control in centralized (clustered) wireless network with and without jamming. Depending on the policy assumed, appropriate solutions are applied to minimize the power used in a system or to satisfy expected Quality of Service. Because of specific nature of the system there is no optimal solution which can be applied in practice. Correctness and effectiveness of four proposed Transmit Power Control algorithms was presented in the form of computer simulation results in which the system capacity, mean power used and the number of successful links were described.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 679-685
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Study of the GNSS Jamming in Real Environment
Autorzy:
Morong, Tomáš
Puričer, Pavel
Kovář, Pavel
Powiązania:
https://bibliotekanauki.pl/articles/963941.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
GNSS
GPS
jamming
test method
signal propagation
interference immunity
Opis:
GNSS systems are susceptible to radio interference despite then operating in a spread spectrum. The commerce jammers power up to 2 watts that can block the receiver function at a distance of up to 15 kilometers in free space. Two original methods for GNSS receiver testing were developed. The first method is based on the usage of a GNSS simulator for generation of the satellite signals and a vector signal RF generator for generating different types of interference signals. The second software radio method is based on a software GNSS simulator and a signal processing in Matlab. The receivers were tested for narrowband CW interference, FM modulated signal and chirp jamming signals, and scenarios. The signal to noise ratio usually drops down to 27 dBc-Hz while the jamming to signal ratio is different for different types of interference. The chirp signal is very effective. The jammer signal is well propagated in free space while in the real mobile urban and suburban environment it is usually strongly attenuated.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 1; 65-70
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparing Gausian and exact models of malicious interference in VLC systems
Autorzy:
Blinowski, Grzegorz
Mościcki, Adam
Powiązania:
https://bibliotekanauki.pl/articles/225996.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
visible light communication networks
network security
physical layer security
transmission jamming
Opis:
Visible Light Communication (VLC) is a technique for high-speed, low-cost wireless data transmission based on LED luminaries. Wireless LAN environments are a major application of VLC. In these environments, VLC is used in place of traditional systems such as Wi-Fi. Because of the physical characteristics of visible light, VLC is considered to be superior to traditional radio-based communication in terms of security. However, as in all wireless systems, the security of VLC with respect to eavesdropping, signal jamming and modification must be analyzed. This paper focuses on the aspect of jamming in VLC networks. In environments where multiple VLC transmitters are used, there is the possibility that one or more transmitters will be hostile (or "rogue"). This leads to communication disruption, and in some cases, the hijacking of the legitimate data stream. In this paper we present the theoretical system model that is used in simulations to evaluate various rogue transmission scenarios in a typical indoor enviro.The typical approach used so far in jamming analysis assumes that all disruptive transmissions may be modeled as Gaussian noise, but this assumption may be too simplistic. We analyze and compare two models of VLC jamming: the simplified Gaussian and the exact model, where the full characteristics of the interfering signal are taken into account. Our aim is to determine which methodology is adequate for studying signal jamming in VLC systems.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 277-286
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering a Self-protection Frequency-shifting Jamming against LFM Pulse Compression Radars
Autorzy:
Baher Safa Hanbali, S.
Kastantin, R.
Powiązania:
https://bibliotekanauki.pl/articles/226354.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
anti-jamming
LFM
range-Doppler coupling
frequency-shifting jammer
repeater jammer
Opis:
The well-known range-Doppler coupling property of the LFM (Linear Frequency Modulation) pulse compression radar makes it more vulnerable to repeater jammer that shifts radar signal in the frequency domain before retransmitting it back to the radar. The repeater jammer, in this case, benefits from the pulse compression processing gain of the radar receiver, and generates many false targets that appear before and after the true target. Therefore, the radar cannot distinguish between the true target and the false ones. In this paper, we present a new technique to counter frequency shifting repeater jammers. The proposed technique is based on introducing a small change in the sweep bandwidth of LFM waveform. The effectiveness of the proposed technique is justified by mathematical analysis and demonstrated by simulation.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 145-150
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies