7,172 resources related to Jamming
- Topics related to Jamming
- IEEE Organizations related to Jamming
- Conferences related to Jamming
- Periodicals related to Jamming
- Most published Xplore authors for Jamming
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
IECON is focusing on industrial and manufacturing theory and applications of electronics, controls, communications, instrumentation and computational intelligence.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
IEEE Spectrum, 1990
Voyager 2's flyby past the planet Neptune in August 1989 is recounted, focusing on its engineering achievements. The failure of its prime receiver only seven months after launch was followed by the failure of a tracking-loop capacitor in its backup receiver. Through clever engineering, that outage proved no more than an inconvenience. Its cameras were meant to work only in ...
IEE Colloquium on Advanced Transmission Waveforms, 1995
Communications, Radar and Electronic Warfare, None
EUSAR 2012; 9th European Conference on Synthetic Aperture Radar, 2012
A CDTD-DIMO-SAR system is proposed for anti-repeat jammer in this paper. System model is illuminated firstly. Timing diagram of CDTD-DIMO-SAR is analyzed, and then the signal model is deduced in detail. The proposed method with the simulation parameters is tested. Finally the experimental results for the system are shown in the paper. The experiment results verify the ECCM performance of ...
EUSAR 2012; 9th European Conference on Synthetic Aperture Radar, 2012
High resolution and wide swath synthetic aperture radar (HRWS SAR) can easily satisfy high resolution and wide swath at the same time and it had been widely researched. An algorithm based on null steering was proposed to reduction the range ambiguity or manmade jamming energy in this paper. The range ambiguity or jamming energy can be converted into minimizing power ...
Voyager 2's flyby past the planet Neptune in August 1989 is recounted, focusing on its engineering achievements. The failure of its prime receiver only seven months after launch was followed by the failure of a tracking-loop capacitor in its backup receiver. Through clever engineering, that outage proved no more than an inconvenience. Its cameras were meant to work only in certain modes; en route Voyager's computers were reprogrammed with entirely new manoeuvers to stabilize an image and allow much longer exposures, so that resolution remained as good as in the images of its earlier, better-lit encounters.<<ETX>>
A CDTD-DIMO-SAR system is proposed for anti-repeat jammer in this paper. System model is illuminated firstly. Timing diagram of CDTD-DIMO-SAR is analyzed, and then the signal model is deduced in detail. The proposed method with the simulation parameters is tested. Finally the experimental results for the system are shown in the paper. The experiment results verify the ECCM performance of the proposed CDTD-DIMO-SAR configuration.
High resolution and wide swath synthetic aperture radar (HRWS SAR) can easily satisfy high resolution and wide swath at the same time and it had been widely researched. An algorithm based on null steering was proposed to reduction the range ambiguity or manmade jamming energy in this paper. The range ambiguity or jamming energy can be converted into minimizing power in given directions by using null steering techniques, which is equivalent to least-square null power constrained optimization problem. The optimal weight coefficient of the antenna elements is obtained and with special iterations, the null's depth and width can be effectively controlled. All simulations proved that the range ambiguity or jamming energy can be suppressed successfully.
H. A. Knoener: A mechanical motion could be arranged which would help out matters in connection with sticking or jammed seats on large valves. For instance, the valve stem could be so arranged that it would have a lost motion when opening or closing the valve. This would allow the motor to get up to full speed before being called upon do do the work required to release a jam. This is particularly applicable to gate valves.
The convergence rate of the power inversion (PI) algorithm is quite sensitive to the power of the interference with the used fixed parameters in the PI algorithm leading to degradation of its ability to handle interference. This paper presents a normalized PI algorithm that traces the stochastic characteristics of the interference. The algorithm adaptively adjusts the recursive step size to determine the constrained optimized parameters for the lowpass filter. Simulations show that the normalized PI algorithm achieves faster convergence and produces deeper nulls. The algorithm makes GPS receivers more robust in environments with large variations in the interference strength.
Aggregation of multicast feedback in time is evaluated herein with respect to physical layer rate adaptation in OFDM based WLANs. An opportunistic scheduler with perfect channel knowledge is used as an upper limit for multicast throughput. We find that feedback aggregation multicast performs close to this limit. In realistic fading scenarios, delay constrained audio-visual streaming performance of a hybrid overlay FEC prototype implementation - including feedback aggregation and rate adaptation - is evaluated by simulation. In this context, a popular unicast rate adaptation mechanism is extended to multicast streaming, and its residual error performance is improved significantly by simple means. Index Terms - OFDM; 802.11; MBMS; wireless multicast; feedback aggregation; rate adaptation
Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of the Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This chapter proposes a watermark‐based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized the outage probability of secrecy capacity for assessing the secure communication.
No standards are currently tagged "Jamming"