Conferences related to Jamming

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2005 IEEE Symposium on Security and Privacy (SRSP)

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2022 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2023 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.


IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society

IECON is focusing on industrial and manufacturing theory and applications of electronics, controls, communications, instrumentation and computational intelligence.



Periodicals related to Jamming

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...



Most published Xplore authors for Jamming

Back to Top

Xplore Articles related to Jamming

Back to Top

Technology '90: the main event (Voyager 2 project)

IEEE Spectrum, 1990

Voyager 2's flyby past the planet Neptune in August 1989 is recounted, focusing on its engineering achievements. The failure of its prime receiver only seven months after launch was followed by the failure of a tracking-loop capacitor in its backup receiver. Through clever engineering, that outage proved no more than an inconvenience. Its cameras were meant to work only in ...


IEE Colloquium 'Advanced Transmission Waveforms' (Digest No.1995/118)

IEE Colloquium on Advanced Transmission Waveforms, 1995

None


Radio‐Controlled Improvised Explosive Devices

Communications, Radar and Electronic Warfare, None

None


Investigation of CDTD-MIMO-SAR for ECCM

EUSAR 2012; 9th European Conference on Synthetic Aperture Radar, 2012

A CDTD-DIMO-SAR system is proposed for anti-repeat jammer in this paper. System model is illuminated firstly. Timing diagram of CDTD-DIMO-SAR is analyzed, and then the signal model is deduced in detail. The proposed method with the simulation parameters is tested. Finally the experimental results for the system are shown in the paper. The experiment results verify the ECCM performance of ...


HRWS synthetic aperture radar ambiguity reduction with widened null steering digital beam forming

EUSAR 2012; 9th European Conference on Synthetic Aperture Radar, 2012

High resolution and wide swath synthetic aperture radar (HRWS SAR) can easily satisfy high resolution and wide swath at the same time and it had been widely researched. An algorithm based on null steering was proposed to reduction the range ambiguity or manmade jamming energy in this paper. The range ambiguity or jamming energy can be converted into minimizing power ...



Educational Resources on Jamming

Back to Top

IEEE-USA E-Books

  • Technology '90: the main event (Voyager 2 project)

    Voyager 2's flyby past the planet Neptune in August 1989 is recounted, focusing on its engineering achievements. The failure of its prime receiver only seven months after launch was followed by the failure of a tracking-loop capacitor in its backup receiver. Through clever engineering, that outage proved no more than an inconvenience. Its cameras were meant to work only in certain modes; en route Voyager's computers were reprogrammed with entirely new manoeuvers to stabilize an image and allow much longer exposures, so that resolution remained as good as in the images of its earlier, better-lit encounters.<<ETX>>

  • IEE Colloquium 'Advanced Transmission Waveforms' (Digest No.1995/118)

    None

  • Radio‐Controlled Improvised Explosive Devices

    None

  • Investigation of CDTD-MIMO-SAR for ECCM

    A CDTD-DIMO-SAR system is proposed for anti-repeat jammer in this paper. System model is illuminated firstly. Timing diagram of CDTD-DIMO-SAR is analyzed, and then the signal model is deduced in detail. The proposed method with the simulation parameters is tested. Finally the experimental results for the system are shown in the paper. The experiment results verify the ECCM performance of the proposed CDTD-DIMO-SAR configuration.

  • HRWS synthetic aperture radar ambiguity reduction with widened null steering digital beam forming

    High resolution and wide swath synthetic aperture radar (HRWS SAR) can easily satisfy high resolution and wide swath at the same time and it had been widely researched. An algorithm based on null steering was proposed to reduction the range ambiguity or manmade jamming energy in this paper. The range ambiguity or jamming energy can be converted into minimizing power in given directions by using null steering techniques, which is equivalent to least-square null power constrained optimization problem. The optimal weight coefficient of the antenna elements is obtained and with special iterations, the null's depth and width can be effectively controlled. All simulations proved that the range ambiguity or jamming energy can be suppressed successfully.

  • Discussion on “motor and control equipment of electrically operated valves” (Gassman), Pittsburgh, Pa., April 25, 1912. (see proceedings for May, 1912)

    H. A. Knoener: A mechanical motion could be arranged which would help out matters in connection with sticking or jammed seats on large valves. For instance, the valve stem could be so arranged that it would have a lost motion when opening or closing the valve. This would allow the motor to get up to full speed before being called upon do do the work required to release a jam. This is particularly applicable to gate valves.

  • Author's reply

    None

  • Anti-jamming with adaptive arrays utilizing power inversion algorithm

    The convergence rate of the power inversion (PI) algorithm is quite sensitive to the power of the interference with the used fixed parameters in the PI algorithm leading to degradation of its ability to handle interference. This paper presents a normalized PI algorithm that traces the stochastic characteristics of the interference. The algorithm adaptively adjusts the recursive step size to determine the constrained optimized parameters for the lowpass filter. Simulations show that the normalized PI algorithm achieves faster convergence and produces deeper nulls. The algorithm makes GPS receivers more robust in environments with large variations in the interference strength.

  • An OFDM WLAN Multicast Hybrid Erasure Correction Prototype with Feedback Aggregation and Rate Adaptation

    Aggregation of multicast feedback in time is evaluated herein with respect to physical layer rate adaptation in OFDM based WLANs. An opportunistic scheduler with perfect channel knowledge is used as an upper limit for multicast throughput. We find that feedback aggregation multicast performs close to this limit. In realistic fading scenarios, delay constrained audio-visual streaming performance of a hybrid overlay FEC prototype implementation - including feedback aggregation and rate adaptation - is evaluated by simulation. In this context, a popular unicast rate adaptation mechanism is extended to multicast streaming, and its residual error performance is improved significantly by simple means. Index Terms - OFDM; 802.11; MBMS; wireless multicast; feedback aggregation; rate adaptation

  • Physical Layer Security

    Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of the Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This chapter proposes a watermark‐based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized the outage probability of secrecy capacity for assessing the secure communication.



Standards related to Jamming

Back to Top

No standards are currently tagged "Jamming"