• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 13
  • 2
  • 1
  • Tagged with
  • 52
  • 52
  • 20
  • 18
  • 14
  • 11
  • 10
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Electronic warfare self-protection of battlefield helicopters : a holistic view /

Heikell, Johnny. January 2005 (has links) (PDF)
Thesis (Ph. D.)--Helsinki University of Technology, Applied Electronics Laboratory, 20-05. / Includes bibliographical references (p. 167-190). Also available online.
12

"Reclaiming lost ground : the future of electronic warfare in the USAF" /

Dobbs, William F. January 2008 (has links)
Thesis (M.S.)--School of Advanced Air and Space Studies, 2008. / "June 2008." Vita. Includes bibliographical references (p. 102-108). Also available via the Internet.
13

Electronic warfare self-protection of battlefield helicopters : a holistic view /

Heikell, Johnny. Unknown Date (has links) (PDF)
Thesis (Ph. D.)--Helsinki University of Technology, Applied Electronics Laboratory, 20-05. / Also available online.
14

Elektronický boj: Přístup velmocí a implikace pro AČR / Electronic Warfare: Great Powers Perspective and the Implications for the Czech Armed Forces

Feryna, Jan January 2021 (has links)
Electronic Warfare has, in recent years, become a key field in modern armed forces. After wars in Afghanistan, Iraq, and experience from conflicts in Ukraine and Syria, Western armed forces turned their attention to the field of Electronic Warfare. The most powerful armed forces of the world are being modernized under the Network-Centric Warfare and Multi-Domain Operations concepts based on real-time data-sharing and communications in the Electromagnetic spectrum. This master thesis deals with Great Powers perspectives (the US, Russia, and Israel), lessons learned from the conflicts mentioned above in Ukraine and Syria, compares it with doctrinal documents of the Czech Armed Forces, and identifies lessons for Czech Armed Forces. The main goal of this thesis is to identify lessons learned for the Czech Armed Forces and key priorities in modernization for the Czech Armed forces to be prepared for future threats and battlefield. Based on the discussed approaches and conflicts, the author identifies the following implications. There is a need to update Czech doctrinal documents. Czech Armed Forces should not focus only on the modernization of special Electronic Warfare units but to introduce the field of Electronic Warfare across the Armed forces. Czech Air Force needs to be equipped with offensive...
15

Asset allocation in frequency and in 3 spatial dimensions for electronic warfare application

Crespo, Jonah Greenfield 04 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This paper describes two research areas applied to Particle Swarm Optimization (PSO) in an electronic warfare asset scenario. First, a three spatial dimension solution utilizing topographical data is implemented and tested against a two dimensional solution. A three dimensional (3D) optimization increases solution space for optimization of asset location. Topography from NASA's Digital Elevation Model is also added to the solution to provide a realistic scenario. The optimization is tested for run time, average distances between receivers, average distance between receivers and paired transmitters, and transmission power. Due to load times of maps and increased iterations, the average run times were increased from 123ms to 178ms, which remains below the 1 second target for convergence speeds. The spread distance between receivers was able to increase from 86km to 89km. The distance between receiver and its paired transmitters as well as the total received power did not change signi cannily. In the second research contribution, a user input is created and placed into an unconstrained 2D active swarm. This \human in the swarm" scenario allows a user to change keep-away boundaries during optimization. The blended human and swarm solution successfully implemented human input into a running optimization with a time delay. The results of this research show that a electronic warfare solutions with real 3D topography can be simulated with minimal computational costs over two dimensional solutions and that electronic warfare solutions can successfully optimize using human input data.
16

Cognitive Electronic Warfare System

McWhorter, Tanner Maxwell 27 July 2020 (has links)
No description available.
17

Dual TOA and Signal Type Prediction for Electronic Warfare Applications

Egolf, Brian R. 17 January 2023 (has links)
No description available.
18

IMPROVED THRESHOLDING TECHNIQUE FOR THE MONOBIT RECEIVER

Buck, Jonathan Gordon 30 July 2007 (has links)
No description available.
19

Antifragile Communications

Lichtman, Marc Louis 16 August 2016 (has links)
Jamming is an ongoing threat that plagues wireless communications in contested areas. Unfortunately, jamming complexity and sophistication will continue to increase over time. The traditional approach to addressing the jamming threat is to harden radios, such that they sacrifice communications performance for more advanced jamming protection. To provide an escape from this trend, we investigate the previously unexplored area of jammer exploitation. This dissertation develops the concept of antifragile communications, defined as the capability for a communications system to improve in performance due to a system stressor or harsh condition. Antifragility refers to systems that increase in capability, resilience, or robustness as a result of disorder (e.g., chaos, uncertainty, stress). An antifragile system is fundamentally different from one that is resilient (i.e., able to recover from failure) and robust (i.e., able to resist failure). We apply the concept of antifragility to wireless communications through several novel strategies that all involve exploiting a communications jammer. These strategies can provide an increase in throughput, efficiency, connectivity, or covertness, as a result of the jamming attack itself. Through analysis and simulation, we show that an antifragile gain is possible under a wide array of electronic warfare scenarios. Throughout this dissertation we provide guidelines for realizing these antifragile waveforms. Other major contributions of this dissertation include the development of a communications jamming taxonomy, feasibility study of reactive jamming in a SATCOM-type scenario, and a reinforcement learning-based reactive jamming mitigation strategy, for times when an antifragile approach is not practical. Most of the jammer exploitation strategies described in this dissertation fall under the category of jammer piggybacking, meaning the communications system turns the jammer into an unwitting relay. We study this jammer piggybacking approach under a variety of reactive jamming behaviors, with emphasis on the sense-and-transmit type. One piggybacking approach involves transmitting using a specialized FSK waveform, tailored to exploit a jammer that channelizes a block of spectrum and selectively jams active subchannels. To aid in analysis, we introduce a generalized model for reactive jamming, applicable to both repeater-based and sensing-based jamming behaviors. Despite being limited to electronic warfare scenarios, we hope that this work can pave the way for further research into antifragile communications. / Ph. D.
20

User Interface Design for Analysis of Sensor Systems

Jonsson, Lisa, Sallhammar, Karin January 2003 (has links)
<p>In the future network-based Swedish Defence (NBD), attaining information superiority will be of great importance. This will be achieved by a network of networks where decision-makers, information- and weapon-systems are linked together. As a part of the development of NBD, we have performed a study of user interface design for a future network-based tool package for analysis of sensor systems, referred to as the C2SR-system. </p><p>This thesis was performed at Ericsson Microwave Systems AB, Sensor and Information Networks, during the autumn 2002. A pre-study concerning the requirements of usability, trustworthiness and functionality of a userinterface for the C2SR-system was performed. Officers representing the future users in the NBD played an important role when gathering these requirements. Another important part of the pre-study was the evaluation of software that contains parts of the functionality necessary for the C2SR-system. </p><p>On the basis of the results from the pre-study, we have designed a user interface to the future C2SR-system. To demonstrate the most important conclusions, a prototype was implemented.</p>

Page generated in 0.052 seconds