31 research outputs found

    De-interleaving of Radar Pulses for EW Receivers with an ELINT Application

    Get PDF
    De-interleaving is a critical function in Electronic Warfare (EW) that has not received much attention in the literature regarding on-line Electronic Intelligence (ELINT) application. In ELINT, on-line analysis is important in order to allow for efficient data collection and for support of operational decisions. This dissertation proposed a de-interleaving solution for use with ELINT/Electronic-Support-Measures (ESM) receivers for purposes of ELINT with on-line application. The proposed solution does not require complex integration with existing EW systems or modifications to their sub-systems. Before proposing the solution, on-line de-interleaving algorithms were surveyed. Density-based spatial clustering of applications with noise (DBSCAN) is a clustering algorithm that has not been used before in de-interleaving; in this dissertation, it has proved to be effective. DBSCAN was thus selected as a component of the proposed de-interleaving solution due to its advantages over other surveyed algorithms. The proposed solution relies primarily on the parameters of Angle of Arrival (AOA), Radio Frequency (RF), and Time of Arrival (TOA). The time parameter was utilized in resolving RF agility. The solution is a system that is composed of different building blocks. The solution handles complex radar environments that include agility in RF, Pulse Width (PW), and Pulse Repetition Interval (PRI)

    Realistic chipless RFID: identification and localization

    Get PDF
    Für die weitere Massenverbreitung von RFID Systemen ist ein günstiges und genaues Verfahren zur Objektlokalisierung und –verfolgung zwingend erforderlich. Chiplose RFID Systeme erlauben im Gegensatz zu herkömmlichen chipbehafteten RFID Systemen den Einsatz von einfachen, druckbaren RFID Tags, eine Möglichkeit zum Einstieg in die Ära von extrem billigen RFID Tags. Diese Dissertation konzentriert sich auf die Lösung von drei Herausforderungen bei der Erkennung von chiplosen RFID Tags innerhalb geschlossener Räume. Der erste in der vorliegenden Arbeit diskutierte Aspekt beschäftigt sich mit Methoden zum Eliminieren des Störechos der Umgebung (clutter removal techniques). Im chiplosen RFID System ist das Umgebungsstörecho definiert durch das von der Umgebung reflektierte Signal, das nicht mit dem RFID Tag interagiert. Die Stärke dieses Signals ist in jedem Fall größer als die des vom RFID Tag zurückgestrahlten (backscattered) Signals, was die Signaturerkennung des RFID Tags unmöglich macht. Zur Lösung dieses Problems schlage ich zwei Algorithmen vor. Der erste ist die Leerraum-Kalibrierung (empty room calibration). Bei diesem Algorithmus werden die Messungen mit RFID Tag von denen ohne RFID Tags abgezogen. Der zweite Algorithmus basiert auf dem Rake-Receiver unter Nutzung einer Zufallsfolge (PN sequence), er erfordert keine zusätzliche Kalibrierung. Der zweite Aspekt betrifft die Notch Erkennung und Identifikation, ein sehr wichtiger Bereich des chiplosen RFID Systems. Er ist dafür verantwortlich, die Notchs in Bits umzuwandeln. Für eine effektive Detektion werden Windowing (Fenster) Verfahren vorgeschlagen, wobei jedes Fenster einen oder auch keinen Notch beinhalten kann. Insgesamt drei neue Verfahren zur Notch Erkennung wurden implementiert. Als erstes ein Matched Filter (MF), in dem der einkommende Notch mit einem Referenz Notch verglichen wird. Das zweite Verfahren basiert auf einer gefensterten Singulärwertzerlegung, damit kann sowohl der Notch erkannt werden, als auch seine Bandbreite bestimmt werden. Als drittes Verfahren wird das dynamische Frequency Warping vorgestellt. Diese Technik nutzt nichtlineare um die Notche unddie Frequenzverschiebungen, die an den Notches auftreten, zu erkennen. Als dritter Aspekt wird die Lokalisierung der RFID Tags in dieser Dissertation diskutiert. Dazu werden zwei Algorithmen erklärt und implementiert. Der erste Algorithmus beruht auf der Triangulation durch drei getrennte RFID Lesegeräte, während sich der zweite die Position des RFID Tags aus der Signalstärke und dem Winkel des vom RFID Tag kommenden Signals berechnet. Alle genannten Algorithmen und Verfahren wurden in einer realen Innenraum Testumgebung mit RFID Tags und einer Software Defined Radio (SDR) Plattform vermessen, um die Zuverlässigkeit der Algorithmen unter normalen Bedingungen zu überprüfen.For mass deployment of RFID systems, cheap and accurate item level identification and tracking are profoundly needed. Fortunately, unlike conventional chip-based RFID, chipless RFID systems offers low-cost printable tags holding a better chance to enter the era of penny-cost tags. This dissertation concentrated on solving three challenges in the detection of the chipless tag inside an indoor environment. The first aspect discussed in the thesis are the chipless RFID clutter removal techniques. In chipless RFID the environmental clutter response is defined as the signal reflected from the environment, that does not interact with the tag. This signal has higher power than the backscattered signal from the tag, rendering the tag signature undetectable. Two algorithms to overcome this problem was used, the first is empty room calibration. The first algorithm is based on subtracting the measurement with the tag from the one without. The second algorithm is Rake receiver using PN sequence; this algorithm requires no pre-measurement calibration. The second aspect is notch detection and identification which is a critical part of the chipless system. This part is responsible for converting the notches into bits. For effective detection, a windowing operation is proposed, where each window may contain a notch or not. Three novel techniques are implemented to detect the notch. The first is matched filter were a reference notch is compared with the incoming signal. The second is window based singular value decomposition, where a constellation is created to detect not only the existence of a notch but also the bandwidth of the notch. The third notch detection technique is dynamic frequency warping. This technique utilizes non-linear warping to detect the notch and the frequency shifts that occurs on the notch. The third aspect discussed in the thesis is tag localization. In this aspect, two algorithms are implemented and explained. The first is trilateration which requires three different readers. The second localization algorithm exploits received signal strength and angle of arrival to detect the location of the tag accurately. All the algorithms were tested using a real testbed to validate the reliability of the techniques. The measurements were done using fabricated tags in an indoor environment using Software Defines Radio (SDR)

    System design and validation of multi-band OFDM wireless communications with multiple antennas

    Get PDF
    [no abstract

    Abstracts on Radio Direction Finding (1899 - 1995)

    Get PDF
    The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography). Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM. The contents of these files are: 1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format]; 2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format]; 3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion

    Recent Advances in Indoor Localization Systems and Technologies

    Get PDF
    Despite the enormous technical progress seen in the past few years, the maturity of indoor localization technologies has not yet reached the level of GNSS solutions. The 23 selected papers in this book present the recent advances and new developments in indoor localization systems and technologies, propose novel or improved methods with increased performance, provide insight into various aspects of quality control, and also introduce some unorthodox positioning methods

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    The Efficient Design of Time-to-Digital Converters

    Get PDF

    Modeling EMI Resulting from a Signal Via Transition Through Power/Ground Layers

    Get PDF
    Signal transitioning through layers on vias are very common in multi-layer printed circuit board (PCB) design. For a signal via transitioning through the internal power and ground planes, the return current must switch from one reference plane to another reference plane. The discontinuity of the return current at the via excites the power and ground planes, and results in noise on the power bus that can lead to signal integrity, as well as EMI problems. Numerical methods, such as the finite-difference time-domain (FDTD), Moment of Methods (MoM), and partial element equivalent circuit (PEEC) method, were employed herein to study this problem. The modeled results are supported by measurements. In addition, a common EMI mitigation approach of adding a decoupling capacitor was investigated with the FDTD method

    Electronic warfare self-protection of battlefield helicopters : a holistic view

    Get PDF
    The dissertation seeks to increase understanding of electronic warfare (EW) self-protection (EWSP) of battlefield helicopters by taking a holistic (systems) view on EWSP. It also evaluates the methodologies used in the research and their suitability as descriptive tools in communication between various EWSP stakeholders. The interpretation of the term "holistic view" is a central theme to the dissertation. The research methodology is bottom-up – which is necessary since no previous work exists that could guide the study – and progresses from analysis to synthesis. Initially several methods are evaluated for presenting findings on EWSP, including high-level system simulation such as Forrester system dynamics (FSD). The analysis is conducted by a comprehensive literature review on EW and other areas that are believed to be of importance to the holistic view. Combat scenarios, intelligence, EW support, validation, training, and delays have major influence on the effectiveness of the EWSP suite; while the initial procurement decision on the EWSP suite sets limits to what can be achieved later. The need for a vast support structure for EWSP means that countries with limited intelligence and other resources become dependent on allies for support; that is, the question of EWSP effectiveness becomes political. The synthesis shows that a holistic view on EWSP of battlefield helicopters cannot be bounded in the temporal or hierarchical (organizational) senses. FSD is found to be helpful as a quality assurance tool, but refinements are needed if FSD is to be useful as a general discussion tool. The area of survivability is found to be the best match for the holistic view – for an EWSP suprasystem. A global survivability paradigm is defined as the ultimate holistic view on EWSP. It is suggested that future research should be top-down and aiming at promoting the global survivability paradigm. The survivability paradigm would give EWSP a natural framework in which its merits can be assessed objectively.reviewe
    corecore