EW 102 : a second course in electronic warfare / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2004 |
Descrizione fisica | 1 online resource (290 p.) |
Disciplina | 623.043 |
Collana | Artech House radar library |
Soggetto topico |
Electronics in military engineering
Information warfare |
Soggetto genere / forma | Electronic books. |
ISBN |
1-5231-1715-X
1-58053-687-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of contents; Preface xv; 1 Introduction 1; 1.1 Generalities About EW 3; 1.2 Information Warfare 5; 1.3 How to Understand Electronic Warfare 6; 2 Threats 9; 2.1 Some Definitions 9; 2.2 Frequency Ranges 13; 2.3 Threat Guidance Approaches 15; 2.4 Scan Characteristics of Threat Radars 17; 2.5 Modulation Characteristics of Threat Radars 22; 2.6 Communication Signal Threats 26; 3 Radar Characteristics 33; 3.1 The Radar Function 33; 3.2 Radar Range Equation 36; 3.3 Detection Range Versus Detectability Range 42; 3.4 Radar Modulation 48; 3.5 Pulse Modulation 48.
3.6 CW and Pulse Doppler Radars 543.7 Moving Target Indicator Radars 58; 3.8 Synthetic Aperture Radars 63; 3.9 Low Probability of Intercept Radars 67; 4 Infrared and Electro-Optical Considerations in Electronic Warfare 77; 4.1 The Electromagnetic Spectrum 77; 4.2 IR Guided Missiles 82; 4.3 IR Line Scanners 87; 4.4 Infrared Imagery 90; 4.5 Night-Vision Devices 94; 4.6 Laser Target Designation 98; 4.7 Infrared Countermeasures 101; 5 EW. |
Record Nr. | UNINA-9910449844003321 |
Adamy David | ||
Boston : , : Artech House, , ©2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 102 : a second course in electronic warfare / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston : , : Artech House, , ©2004 |
Descrizione fisica | 1 online resource (290 p.) |
Disciplina | 623.043 |
Collana | Artech House radar library |
Soggetto topico |
Electronics in military engineering
Information warfare |
ISBN |
1-5231-1715-X
1-58053-687-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of contents; Preface xv; 1 Introduction 1; 1.1 Generalities About EW 3; 1.2 Information Warfare 5; 1.3 How to Understand Electronic Warfare 6; 2 Threats 9; 2.1 Some Definitions 9; 2.2 Frequency Ranges 13; 2.3 Threat Guidance Approaches 15; 2.4 Scan Characteristics of Threat Radars 17; 2.5 Modulation Characteristics of Threat Radars 22; 2.6 Communication Signal Threats 26; 3 Radar Characteristics 33; 3.1 The Radar Function 33; 3.2 Radar Range Equation 36; 3.3 Detection Range Versus Detectability Range 42; 3.4 Radar Modulation 48; 3.5 Pulse Modulation 48.
3.6 CW and Pulse Doppler Radars 543.7 Moving Target Indicator Radars 58; 3.8 Synthetic Aperture Radars 63; 3.9 Low Probability of Intercept Radars 67; 4 Infrared and Electro-Optical Considerations in Electronic Warfare 77; 4.1 The Electromagnetic Spectrum 77; 4.2 IR Guided Missiles 82; 4.3 IR Line Scanners 87; 4.4 Infrared Imagery 90; 4.5 Night-Vision Devices 94; 4.6 Laser Target Designation 98; 4.7 Infrared Countermeasures 101; 5 EW. |
Record Nr. | UNINA-9910783448203321 |
Adamy David | ||
Boston : , : Artech House, , ©2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 102 : a second course in electronic warfare / / David L. Adamy |
Autore | Adamy David |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boston, : Artech House, c2004 |
Descrizione fisica | 1 online resource (290 p.) |
Disciplina | 623.043 |
Collana | Artech House radar library |
Soggetto topico |
Electronics in military engineering
Information warfare |
ISBN |
1-5231-1715-X
1-58053-687-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Table of contents; Preface xv; 1 Introduction 1; 1.1 Generalities About EW 3; 1.2 Information Warfare 5; 1.3 How to Understand Electronic Warfare 6; 2 Threats 9; 2.1 Some Definitions 9; 2.2 Frequency Ranges 13; 2.3 Threat Guidance Approaches 15; 2.4 Scan Characteristics of Threat Radars 17; 2.5 Modulation Characteristics of Threat Radars 22; 2.6 Communication Signal Threats 26; 3 Radar Characteristics 33; 3.1 The Radar Function 33; 3.2 Radar Range Equation 36; 3.3 Detection Range Versus Detectability Range 42; 3.4 Radar Modulation 48; 3.5 Pulse Modulation 48.
3.6 CW and Pulse Doppler Radars 543.7 Moving Target Indicator Radars 58; 3.8 Synthetic Aperture Radars 63; 3.9 Low Probability of Intercept Radars 67; 4 Infrared and Electro-Optical Considerations in Electronic Warfare 77; 4.1 The Electromagnetic Spectrum 77; 4.2 IR Guided Missiles 82; 4.3 IR Line Scanners 87; 4.4 Infrared Imagery 90; 4.5 Night-Vision Devices 94; 4.6 Laser Target Designation 98; 4.7 Infrared Countermeasures 101; 5 EW. |
Altri titoli varianti | Electronic warfare 102 |
Record Nr. | UNINA-9910828702603321 |
Adamy David | ||
Boston, : Artech House, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 103 : tactical battlefield communications electronic warfare / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston ; , : Artech House, , ©2009 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina |
623.043
623.73 |
Collana | Artech House radar series |
Soggetto topico |
Communications, Military
Electronics in military engineering |
Soggetto genere / forma | Electronic books. |
ISBN |
1-5231-1716-8
1-59693-388-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Communication signals -- 3. Communication antennas -- 4. Communications receivers -- 5. Communications propagation -- 6. Search for communication emitters -- 7. Location of communications emitters -- 8. Intercept of communications signals -- 9. Communications jamming. |
Altri titoli varianti | Tactical battlefield communications electronic warfare |
Record Nr. | UNINA-9910455173303321 |
Adamy David | ||
Boston ; , : Artech House, , ©2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 103 : tactical battlefield communications electronic warfare / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston ; , : Artech House, , ©2009 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina |
623.043
623.73 |
Collana | Artech House radar series |
Soggetto topico |
Communications, Military
Electronics in military engineering |
ISBN |
1-5231-1716-8
1-59693-388-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Communication signals -- 3. Communication antennas -- 4. Communications receivers -- 5. Communications propagation -- 6. Search for communication emitters -- 7. Location of communications emitters -- 8. Intercept of communications signals -- 9. Communications jamming. |
Altri titoli varianti | Tactical battlefield communications electronic warfare |
Record Nr. | UNINA-9910778002103321 |
Adamy David | ||
Boston ; , : Artech House, , ©2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 103 : tactical battlefield communications electronic warfare / / David L. Adamy |
Autore | Adamy David |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boston, Mass. ; ; London, : Artech House, c2009 |
Descrizione fisica | 1 online resource (348 p.) |
Disciplina |
623.043
623.73 |
Collana | Artech House radar series |
Soggetto topico |
Communications, Military
Electronics in military engineering |
ISBN |
1-5231-1716-8
1-59693-388-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Communication signals -- 3. Communication antennas -- 4. Communications receivers -- 5. Communications propagation -- 6. Search for communication emitters -- 7. Location of communications emitters -- 8. Intercept of communications signals -- 9. Communications jamming. |
Record Nr. | UNINA-9910819673403321 |
Adamy David | ||
Boston, Mass. ; ; London, : Artech House, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 104 : EW against a new generation of threats / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston : , : Artech House, , [2015] |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 623/.043 |
Collana | The Artech House electronic warfare library |
Soggetto topico | Electronics in military engineering |
Soggetto genere / forma | Electronic books. |
ISBN |
1-5231-1717-6
1-60807-870-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission.
2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. |
Altri titoli varianti | EW against a new generation of threats |
Record Nr. | UNINA-9910460380103321 |
Adamy David | ||
Boston : , : Artech House, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 104 : EW against a new generation of threats / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston : , : Artech House, , [2015] |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 623/.043 |
Collana | The Artech House electronic warfare library |
Soggetto topico | Electronics in military engineering |
ISBN |
1-5231-1717-6
1-60807-870-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission.
2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. |
Altri titoli varianti | EW against a new generation of threats |
Record Nr. | UNINA-9910797934703321 |
Adamy David | ||
Boston : , : Artech House, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 104 : EW against a new generation of threats / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Boston : , : Artech House, , [2015] |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 623/.043 |
Collana | The Artech House electronic warfare library |
Soggetto topico | Electronics in military engineering |
ISBN |
1-5231-1717-6
1-60807-870-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EW 104: EW Against a New Generation of Threats; Contents; Preface; 1 Introduction; 2 Spectrum Warfare; 2.1#Changes in Warfare; 2.2#Some Specific Propagation Related Issues; 2.3#Connectivity; 2.3.1#The Most Basic Connectivity; 2.3.2#Connectivity Requirements; 2.3.3#Long-Range Information Transmission; 2.3.4#Information Fidelity; 2.4#Interference Rejection; 2.4.1#Spreading the Transmitted Spectrum; 2.4.2#Commercial FM Broadcast; 2.4.3#Military Spread Spectrum Signals; 2.5#Bandwidth Requirements for Information Transfer; 2.5.1#Data Transfer Without a Link; 2.5.2#Linked Data Transmission.
2.5.3#Software Location2.6#Distributed Military Capability; 2.6.1#Net-Centric Warfare; 2.7#Transmission Security Versus Message Security; 2.7.1#Transmission Security Versus Transmission Bandwidth; 2.7.2#Bandwidth Limitations; 2.8#Cyber Warfare Versus EW ; 2.8.1#Cyber Warfare; 2.8.2#Cyber Attacks; 2.8.3#Parallels Between Cyber Warfare and EW; 2.8.4#Difference Between Cyber Warfare and EW; 2.9#Bandwidth Trade-Offs ; 2.9.1#Bit-Error Critical Cases; 2.10#Error Correction Approaches; 2.10.1#Error Detection and Correction Codes; 2.10.2#Example of a Block Code. 2.10.3#Error Correction Versus Bandwidth2.11#EMS Warfare Practicalities; 2.11.1#Warfare Domains; 2.12#Steganography; 2.12.1#Steganography Versus Encryption; 2.12.2#Early Stenographic Techniques; 2.12.3#Digital Techniques; 2.12.4#How Does Steganography Relate to Spectrum Warfare?; 2.12.5#How Is Steganography Detected?; 2.13#Link Jamming ; 2.13.1#Communication Jamming; 2.13.2#Required J/S for Jamming Digital Signals; 2.13.3#Protections Against Link Jamming; 2.13.4#The Net Impact on Link Jamming ; 3 Legacy Radars; 3.1#Threat Parameters; 3.1.1#Typical Legacy Surface-to-Air Missile. 3.1.2#Typical Legacy Acquisition Radar3.1.3#Typical Anti-Aircraft Gun; 3.2#EW Techniques; 3.3#Radar Jamming ; 3.3.1#Jamming-to-Signal Ratio; 3.3.2#Self-Protection Jamming; 3.3.3#Remote Jamming; 3.3.4#Burn-Through Range; 3.4#Radar-Jamming Techniques; 3.4.1#Cover Jamming; 3.4.2#Barrage Jamming; 3.4.3#Spot Jamming; 3.4.4#Swept Spot Jamming; 3.4.5#Deceptive Jamming; 3.4.6#Range Deception Techniques; 3.4.7#Angle Deceptive Jamming; 3.4.8#Frequency Gate Pull Off; 3.4.9#Jamming Monopulse Radars; 3.4.10#Formation Jamming; 3.4.11#Formation Jamming with Range Denial; 3.4.12#Blinking. 3.4.13#Terrain Bounce3.4.14#Cross-Polarization Jamming; 3.4.15#Cross-Eye Jamming; References; 4 Next Generation Threat Radars; 4.1#Threat Radar Improvements; 4.2#Radar Electronic Protection Techniques; 4.2.1#Useful Resources; 4.2.2#Ultralow Side Lobes; 4.2.3#EW Impact of Reduced Side-Lobe Level; 4.2.4#Side-Lobe Cancellation; 4.2.5#Side-Lobe Blanking; 4.2.6#Monopulse Radar; 4.2.7#Cross-Polarization Jamming; 4.2.8#Anti-Cross-Polarization; 4.2.9#Chirped Radar; 4.2.10#Barker Code; 4.2.11#Range Gate Pull-Off; 4.2.12#AGC Jamming; 4.2.13#Noise-Jamming Quality. |
Altri titoli varianti | EW against a new generation of threats |
Record Nr. | UNINA-9910823927203321 |
Adamy David | ||
Boston : , : Artech House, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EW 105 : space electronic warfare / / David L. Adamy |
Autore | Adamy David |
Pubbl/distr/stampa | Norwood, Massachusetts : , : Artech House, , [2021] |
Descrizione fisica | 1 online resource (247 pages) |
Disciplina | 623.043 |
Collana | Artech House electronic warfare library |
Soggetto topico | Electronics in military engineering |
ISBN |
1-5231-4579-X
1-63081-835-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ; Machine generated contents note: ; 1. Introduction -- ; 1.1. Orbital Relationships -- ; 1.2. Book Flow -- ; 1.3. History of Signal Intelligence Satellite Programs -- ; 1.4. A Note about Orbital Calculations in This Book -- ; 2. Spherical Trigonometry -- ; 2.1. Plane Trigonometry -- ; 2.1.1. The Law of Sines -- ; 2.1.2. The Law of Cosines for Sides -- ; 2.1.3. The Law of Cosines for Angles -- ; 2.1.4. Right Plane Triangle -- ; 2.2. The Spherical Triangle -- ; 2.3. Trigonometric Relationships in Any Spherical Triangle -- ; 2.3.1. Law of Sines for Spherical Triangles -- ; 2.3.2. Law or Cosines tor Sides -- ; 2.3.3. Law of Cosines for Angles -- ; 2.3.4. The Right Spherical Triangle -- ; 2.3.5. Napier's Rules -- ; 2.4. Examples of Plane and Spherical Triangles Used in Problems -- ; 3. Orbit Mechanics -- ; 3.1. Elements of an Elliptical Orbit -- ; 3.2. Relationship Between the Size of an Orbit and Its Period -- ; 3.3. SVP -- ; 3.4. An Earth Surface Location -- ; 3.5. The Propagation Distance -- ; 3.6. Earth Traces -- ; 3.6.1. Satellite Earth Trace -- ; 3.6.2. Polar Orbit Earth Traces -- ; 3.6.3. Synchronous Satellite Earth Traces -- ; 3.7. Location of an EW Threat -- ; 3.7.1. Calculating the Look Angles -- ; 3.7.2. Calculating the Azimuth to the Threat -- ; 3.7.3. Calculating Range and Elevation to the Threat Location -- ; 3.8. Calculating the Distance to the Horizon -- ; 3.8.1. Horizon Distances for Circular Orbits -- ; 4. Radio Propagation -- ; 4.1. Introduction -- ; 4.2. One-Way Link -- ; 4.3. Propagation Loss Models -- ; 4.3.1. LOS Propagation -- ; 4.3.2. Two-Ray Propagation -- ; 4.3.3. Minimum Antenna Height for Two-Ray Propagation -- ; 4.3.4. A Note about Very Low Antennas -- ; 4.3.5. Fresnel Zone -- ; 4.3.6. Complex Reflection Environment -- ; 4.3.7. KED -- ; 4.3.8. Atmospheric Loss -- ; 4.3.9. Rain and Fog Attenuation -- ; 5. Radio Propagation In Space -- ; 5.1. LOS Loss -- ; 5.1.1. Atmospheric Loss -- ; 5.2. Antenna Misalignment -- ; 5.3. Polarization Loss -- ; 5.4. Rain Loss -- ; 6. Satellite Links -- ; 6.1. Link Geometry -- ; 6.1.1. Looking Down -- ; 6.1.2. Plug in Some Orbit Numbers -- ; 6.1.3. Looking Up -- ; 6.2. Uplinks -- ; 6.2.1. Command Links -- ; 6.2.2. Intercept Links -- ; 6.3. Downlinks -- ; 6.3.1. Telemetry Link -- ; 6.3.2. Data Link -- ; 6.3.3. Links to Data Users -- ; 6.3.4. Jamming Links -- ; 6.4. Hostile Links -- ; 7. Link Vulnerability To Ew -- ; 7.1. Satellite Vulnerability -- ; 7.1.1. Space-Related Link Losses -- ; 7.1.2. Intercept -- ; 7.1.3. Spoofing -- ; 7.1.4. Jamming -- ; 7.1.5. Problems Worked in This Chapter -- ; 7.2. Downlink Intercept -- ; 7.2.1. Geocentric Angle from the Satellite to the Intercept Site -- ; 7.2.2. Range from the Satellite to the Intercept Site -- ; 7.2.3. Is the Satellite Above the Horizon from the Intercept Site? -- ; 7.2.4. How Strong Is the Downlink Signal at the Intercept Site -- ; 7.2.5. Intercept with Directional Antennas -- ; 7.2.6. Angles Relative to the Ground Control Station -- ; 7.2.7. Angles Relative to the Hostile Intercept Site -- ; 7.2.8. Received Signal at the Intercept Site -- ; 7.2.9. What Is the Quality of the Intercepted Downlink Signal? -- ; 7.3. Intercepting Uplinks -- ; 7.4. Jamming Downlinks -- ; 7.4.1. The Satellite Downlink -- ; 7.4.2. The Jammer Link -- ; 7.4.3. The J/S Formula -- ; 7.5. Jamming Satellite Uplinks -- ; 7.5.1. The Jamming Link -- ; 7.5.2. Jamming Link Loss -- ; 7.5.3. Gain of 4-m Jamming Antenna at 5 GHz -- ; 7.5.4. Jammer ERP -- ; 7.5.5. The Satellite Uplink -- ; 7.5.6. Gain of 2-m Uplink Transmitter Antenna -- ; 7.5.7. Uplink ERP -- ; 7.5.8. Uplink Loss -- ; 7.5.9. Gain and Bandwidth of the Uplink Receiving Antenna on the Satellite -- ; 7.5.10. Antenna 3-dB Beamwidth -- ; 7.5.11. Offset of the Jammer from the Downlink Receiving Antenna -- ; 7.5.12. The J/S -- ; 7.6. Electronic Protection of Satellite Links -- ; 7.6.1. Attacks on Links -- ; 7.6.2. Protection Against Jamming -- ; 8. Duration And Frequency Of Observations -- ; 8.1. Calculating the Distance to the Horizon -- ; 8.2. Horizon Distances for Circular Orbits -- ; 8.3. Calculating the Duration of Target Availability from a Satellite -- ; 8.3.1. Geocentric Viewing Angle -- ; 8.3.2. Time During Which a Satellite Can See a Point on the Earth -- ; 8.3.3. The Impact of the Movement of the Earth -- ; 8.3.4. Viewing Time Formula -- ; 8.4. Doppler Shift in Satellite Link -- ; 8.4.1. Doppler Shift Formula -- ; 8.4.2. Receiving Site Velocity -- ; 8.4.3. Satellite Velocity -- ; 8.4.4. General Formula for Maximum Doppler Shift -- ; 8.4.5. General Formula for the Doppler Shift -- ; 9. Intercept From Space -- ; 9.1. Intercept of Radar Signal from Low-Earth Satellite -- ; 9.1.1. Link Loss -- ; 9.1.2. LOS Loss -- ; 9.1.3. Atmospheric and Rain Loss -- ; 9.1.4. Can the Satellite Payload Receive the Signal? -- ; 9.1.5. Receiver Sensitivity -- ; 9.1.6. Link Margin -- ; 9.1.7. Could the Satellite Receive the Signal from Its Horizon? -- ; 9.1.8. How Long Will the Satellite See the Signal? -- ; 9.2. Horizon Plot on the Earth -- ; 9.3. Intercept of the Earth Surface Target Using a Narrow-Beam Receiving Antenna -- ; 9.3.1. Antenna Pointing -- ; 9.3.2. Intercept Link Equation -- ; 9.3.3. Link Losses -- ; 9.3.4. Intercept from the Horizon -- ; 9.4. Intercept from the Synchronous Satellite -- ; 9.4.1. With the Satellite on the Horizon -- ; 9.4.2. With the Satellite Directly Overhead -- ; 10. Jamming From Space -- ; 10.1. Jamming of a Ground Signal from a Satellite -- ; 10.2. Jamming from a Satellite -- ; 10.3. Jamming of a Communications Network -- ; 10.3.1. The Network -- ; 10.3.2. Link Equations -- ; 10.3.3. J/S -- ; 10.4. Jamming a Microwave Digital Data Link -- ; 10.5. Jamming of a Ground Radar from Space -- ; 10.5.1. Radar Jamming from a Satellite -- ; 10.5.2. The Jammed Radar and Its Target -- ; 10.5.3. The Jammer -- ; 10.5.4. The Jamming Equation -- ; 10.5.5. The Jamming Adequacy -- ; 10.5.6. Protecting an Asset with Low Radar Cross-Section -- ; 10.5.7. Duration of Jamming -- ; A. FORMULAS FROM SIGNAL INTELLIGENCE AND EW -- ; A.1. Intercept Formulas -- ; A.1.1. Successful Intercept -- ; A.1.2. The Intercept Link Equation -- ; A.1.3. Received Signal Quality -- ; A.2. Communication Jamming -- ; A.2.1. Successful Communications Jamming -- ; A.2.2. Communications J/S -- ; A.2.3. Communications EP -- ; A.3. Radar Jamming -- ; A.3.1. Successful Radar Jamming -- ; A.3.2. Self-Protection Jamming -- ; A.3.3. Stand-Off Jamming -- ; A.3.4. Required J/S -- ; A.3.5. Radar EP -- ; B. Important Numbers For Space EW -- ; C. Decibel Math -- ; C.1. Decibel Numbers -- ; C.2. Conversion to Decibel Form -- ; C.3. Absolute Values in Decibel Form -- ; C.4. Decibel Forms of Equations -- ; C.5. Quick Conversions to Decibel Values. |
Record Nr. | UNINA-9910794686003321 |
Adamy David | ||
Norwood, Massachusetts : , : Artech House, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|