did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781580533447

Introduction to Communication Electronic Warfare Systems

by
  • ISBN13:

    9781580533447

  • ISBN10:

    1580533442

  • Format: Hardcover
  • Copyright: 2002-03-01
  • Publisher: Artech House on Demand
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $178.00

Summary

This comprehensive engineering-level resource provides you with an excellent introduction to electronic warfare (EW) for communication systems. Extensively referenced with over 600 equations, it details the components, systems, and operations of electronic warfare systems dedicated to protecting and attacking military communications networks. You are provided with a complete understanding of how modern direction finders for communication signals work, along with their limitations.

Table of Contents

Preface xiii
Acknowledgments xv
Communication Electronic Warfare Systems
1(18)
Introduction
1(1)
Information Warfare
1(2)
Electronic Warfare
3(2)
Electronic Support
3(1)
Electronic Attack
4(1)
Electronic Protect
4(1)
Electronic Support
5(5)
Low Probability of Detection/Interception/Exploitation
7(1)
Future Communication Environments
8(1)
Wired Communications
9(1)
ES Summary
9(1)
Electronic Attack
10(1)
EA Summary
11(1)
Typical EW System Configuration
11(5)
System Control
11(1)
Antennas
12(1)
Signal Distribution
13(1)
Search Receiver
13(1)
Set-On Receiver
13(1)
Signal Processing
14(1)
Direction-Finding Signal Processing
14(1)
Exciter
14(1)
Power Amplifier
15(1)
Filters
15(1)
Communications
15(1)
Concluding Remarks
16(3)
References
16(3)
Electromagnetic Signal Propagation
19(36)
Introduction
19(1)
Signal Propagation
19(1)
RF Band Designations
20(2)
Polarization
22(1)
Power Density
22(2)
Free-Space Propagation
24(3)
Direct Wave
27(6)
Wave Diffraction
33(2)
Reflected Waves
35(5)
Surface Wave
40(1)
Ducting
41(1)
Meteor Burst
41(1)
Scattering
42(1)
Characteristics of the Mobile VHF Channel
43(3)
Propagation Via the Ionosphere
46(6)
Ionospheric Layers
46(2)
Refraction
48(2)
Near-Vertical Incidence Sky Wave
50(1)
HF Fading
50(1)
Maximum Usable Frequency and Lowest Usable Frequency
51(1)
Automatic Link Establishment
52(1)
Concluding Remarks
52(3)
References
53(2)
Noise and Interference
55(6)
Introduction
55(1)
Thermal Noise
56(1)
Internal Noise Sources
56(1)
External Noise Sources
57(2)
Cochannel and Multipath Interference
59(1)
Concluding Remarks
60(1)
References
60(1)
Radio Communication Technologies
61(90)
Introduction
61(2)
Modulation
63(47)
Amplitude Modulation
65(2)
Angle Modulation
67(4)
Orthogonal Signaling
71(2)
Access Methods
73(4)
Duplexing
77(1)
Digital Signaling
78(19)
Spread Spectrum
97(13)
Coding of Communication Signals
110(24)
Source Coding for Data Compression
110(5)
Channel Coding for Error Control
115(19)
Modems
134(6)
Facsimile
140(1)
Communication Security
140(8)
Data Encryption
141(1)
Public Key Encryption
141(1)
Digital Signatures
142(2)
Data Encryption Standard
144(1)
Pretty Good Privacy
145(1)
Fortezza Encryption System
146(1)
Escrow Encryption System
147(1)
Over-the-Air Rekeying
148(1)
Concluding Remarks
148(3)
References
149(2)
System Engineering
151(26)
Introduction
151(1)
System Engineering
151(24)
Performance Characteristics
155(1)
Environmental Characteristics
155(5)
Reliability and Availability
160(11)
Human-Factors Engineering
171(3)
System Cost
174(1)
Concluding Remarks
175(2)
References
176(1)
Electronic Support
177(12)
Introduction
177(1)
Intercept
177(2)
Internals Versus Externals
178(1)
Propagation Loss
178(1)
Geolocation
179(1)
Triangulation with Multiple Bearings
180(4)
Deployment Considerations
184(1)
Electronic Mapping
185(1)
Common Operational Picture
185(1)
Operational Integration with Other Disciplines
186(1)
Support to Targeting
187(1)
Concluding Remarks
187(2)
References
187(2)
Electronic Attack
189(18)
Introduction
189(1)
Communication Jamming
189(4)
Jammer Deployment
193(1)
Look-Through
194(1)
Analog Communications
195(1)
Digital Communications
196(1)
Narrowband/Partial-Band Jamming
197(1)
Barrage Jamming
198(3)
Jamming LPI Targets
201(1)
Follower Jammer
202(1)
Concluding Remarks
203(4)
References
203(4)
Antennas
207(24)
Introduction
207(2)
Isotropic Antenna
209(1)
Antenna Gain
210(1)
Wire Antennas
211(9)
Dipole
212(2)
Monopole
214(1)
Loop
215(1)
Biconical/Discone
215(1)
Yagi
216(1)
Log Periodic
216(2)
Helix Antennas
218(2)
Spiral Antennas
220(1)
Active Antennas
220(2)
Aperture Antennas
222(3)
Parabolic Dish
222(1)
Antenna Arrays
223(2)
Genetically Designed Antennas
225(1)
More on Antenna Gain
226(2)
Concluding Remarks
228(3)
References
228(3)
Receivers
231(34)
Introduction
231(1)
Receivers
232(14)
RF Amplification and Filtering
234(2)
Sensitivity
236(1)
Dynamic Range
237(3)
Mixing/Frequency Conversion
240(1)
Intermediate Frequency Filtering and Amplification
241(1)
Detection/Demodulation
242(4)
Types of Receivers
246(17)
Narrowband Receivers
246(4)
Wideband Receivers
250(13)
Concluding Remarks
263(2)
References
264(1)
Signal Processing
265(66)
Introduction
265(1)
Orthogonal Functions
266(1)
Transforms
267(19)
Trigonometric Transforms
268(6)
Haar Transform
274(2)
Wavelet Transforms
276(9)
Fast Transforms
285(1)
Cyclostationary Signal Processing
286(3)
Higher-Order Statistics
289(2)
Applications
291(37)
Signal Detection
291(11)
Signal Classification
302(15)
Recognition/Identification
317(11)
Concluding Remarks
328(3)
References
329(2)
Direction-Finding Position-Fixing Techniques
331(72)
Introduction
331(1)
Bearing Estimation
331(48)
Circular Antenna Array
332(1)
Interferometry
333(14)
Monopulse Direction Finder
347(5)
Amplitude Direction Finding
352(7)
Doppler Direction Finder
359(3)
Array-Processing Bearing Estimation
362(13)
Line-of-Bearing Optimization
375(4)
Position-Fixing Algorithms
379(12)
Eliminating Wild Bearings
380(1)
Stansfield Fix Algorithm
381(3)
Mean-Squared Distance Algorithm
384(4)
Combining Error Contours
388(3)
Single-Site Location Techniques
391(1)
Fix Accuracy
392(4)
Fix Coverage
396(3)
Concluding Remarks
399(4)
References
401(2)
Hyperbolic Position-Fixing Techniques
403(22)
Introduction
403(1)
Time Difference of Arrival
403(7)
Differential Doppler
410(4)
Cross Ambiquity Function Processing
414(4)
Position Fix Accuracy
416(2)
Time of Arrival
418(4)
Concluding Remarks
422(3)
References
422(3)
Exciters and Power Amplifiers
425(28)
Introduction
425(1)
Exciters
425(6)
Oscillators
426(2)
Synthesizer
428(1)
Modulator
429(2)
Power Amplifiers
431(20)
Amplifier Operating Characteristics
431(2)
Efficiency
433(1)
Push-Pull Architecture
434(1)
Classes of Amplifiers
435(3)
Switching Architectures
438(6)
Amplifier Linearization
444(1)
Basic Power Modules
445(3)
Combiners
448(1)
Output Filters
449(1)
Noise-Power Ratio
450(1)
Concluding Remarks
451(2)
References
451(2)
Early-Entry Organic Electronic Support
453(20)
Introduction
453(1)
Target Model
454(1)
Intercept System Model
455(4)
Simulation Results
459(10)
Performance Versus the Number of Target Nets
460(2)
Search Bandwidth
462(2)
Noise Factor
464(2)
Postprocessing Time
466(1)
Mission Duration
467(2)
Concluding Remarks
469(4)
References
471(2)
Detection and Geolocation of Frequency-Hopping Communication Emitters
473(14)
Introduction
473(1)
Analysis
473(3)
Simulation
476(10)
ES System Operation
478(3)
Results and Analysis
481(3)
Discussion
484(2)
Concluding Remarks
486(1)
References
486(1)
Signal Detection Range
487(18)
Introduction
487(3)
Noise Limits on Detection Range
490(1)
Targets
491(1)
Detection Range with the Reflection Propagation Model
491(10)
Airborne Configurations of ES Systems
492(5)
Ground-Based Detection Ranges
497(2)
Discussion
499(2)
Concluding Remarks
501(4)
References
503(2)
Electronic Attack: UAV and Ground-Based
505(12)
Introduction
505(1)
Signal Propagation at Long Ranges
506(1)
Jamming ERP
507(1)
Targets
508(1)
RLOS
508(1)
UAV Jammer
509(2)
Ground-Based Jammer
511(2)
Expendable Jammer
513(1)
Concluding Remarks
514(3)
References
516(1)
Appendix A Probability and Random Variables 517(12)
A.1 Introduction
517(1)
A.2 Means, Expected Values, and Moment Functions of Random Variables
517(3)
A.3 Probability
520(5)
A.3.1 Conditional Probability
521(1)
A.3.2 Random Variable Distribution and Density Functions
522(3)
A.4 Gaussian Density Function
525(1)
A.5 Kurtosis
525(2)
A.6 Skewness
527(1)
A.7 Useful Characteristics of Probabilities, Density Functions, and Distribution Functions
528(1)
A.8 Concluding Remarks
528(1)
Reference
528(1)
Appendix B Simulated Networks 529(10)
B.1 Introduction
529(10)
List of Acronyms 539(6)
About the Author 545(2)
Index 547

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program