• Title/Summary/Keyword: Information Warfare

Search Result 372, Processing Time 0.019 seconds

Estimation of scan parameters for identification of the circular scanning radars (원형스캔 레이더 식별을 위한 스캔변수 추정기법)

  • Ryoo, Young-Jin;Ha, Hyoun-Joo;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.6 s.312
    • /
    • pp.105-112
    • /
    • 2006
  • To improve the performance of identification for radars in an ES(Electronic warfare Support) system, it is necessary to estimate scan characteristics as well as the basic identification parameters such as frequency, pulse repetition interval and pulse width of radars. This paper presents the method of estimating the scan period and the scan beam width of circular scanning radars. The proposed method estimates the scan period using the quality of the autocorrelation of a periodic signal. And, it estimates the scan beam width using the linear interpolation and the proposed method of estimating the scan period. Simulation results are presented to show the performance of the proposed method.

A Network QoS Model for Joint Integrated C4I Structure (합동지휘통제 통합망 구조 QoS 모델(안))

  • Park, Dongsuk;Oh, Donghan;Choi, Eunho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.106-114
    • /
    • 2020
  • NCW which is shaping favorable conditions with obtaining initiative through superiority in C2 and information sharing is critical to the result of the war in a modern warfare. An important requirement to attain superiority through an effective networking in a war-environment is to apply QoS to ensure priority in supporting critical mission and services. In order to obtain an effective NCOE through JCS-led QoS support, standard doucments have been reviewed and analyzed to understand the current level of technology and development. In addition, QoS-related policy documents which is currently being applied by the ROK armed forces have been analyzed to substantiated the JCS-led QoS model and propose the directions of development and enhancement required in the realm of technology, policy and system.

Performance Analysis of Efficient Subchannelization Algorithm against Partial Band Jamming (부채널화를 통한 효율적인 부분대역 재밍 회피 알고리즘과 성능분석)

  • Song, Yu Chan;Hwang, Yu Min;Park, Ji Ho;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.14-18
    • /
    • 2015
  • Electronic warfare recently has became the core of modern warfare and the importance of communication survivability is being considerable day by day. In this paper, we propose an effective jamming avoidance algorithm aginst widely used jamming environment such as GPS jamming. In order to simulate to show our system performance, we consider IEEE 802.16 WiMAX protocol and partial band jamming envoriment. Proposed algorithm can improve channel capacity through subchannelization and we show channel capacity corresponding to subchannel parameter.

Recognition of PRI modulation types of radar signals using the autocorrelation (자기상관관계를 이용한 레이더 신호의 PRI 변조형태 인식 기법)

  • Ryoo Young-Jin;Kim Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.3 s.309
    • /
    • pp.61-67
    • /
    • 2006
  • In electronic support systems, the analysis of PRI modulation characteristics for radar signals has attracted much interest because of the problem of the identification ambiguity in dense electronic warfare signal environments. A new method of recognizing the PRI modulation types of radar pulse signals is proposed for electronic support. The proposed method recognizes the PRI modulation types using the classifiers which are based on the property of the linear autocorrelation of the PRI sequences for each PRI modulation type. In addition, the proposed method estimates the PRI modulation period for the PRI modulation types with the periodicity. Simulation results are presented to show the performance of the proposed method.

An Algorithm for De-Interleaving of Wobble and Sinusoidal PRIs for Unidentified Radar Signals (미상 레이더의 Wobble 및 Sinusoidal PRI 식별 알고리즘)

  • Lee, Yongsik;Lim, Joongsoo;Lim, Jaesung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.12
    • /
    • pp.1100-1107
    • /
    • 2015
  • In this paper, we propose an algorithm to identify Wobble PRI and Sinusoidal PRI among Radar pulses. We applied not only the DTOA(Difference Time Of Arrival) concept of radar pulse signals incoming to antennas but also a rising and falling cub characteristic of those PRIs. After making a program by such algorithm, we input each 40 data to Wobble PRI's and Sinusoidal PRI's identification programs and in result, those programs fully processed the data the according to expectations. In the future, those programs can be applied to the ESM, ELINT system.

Development of VGPO/I Jamming Technique for Phase Sampled DRFM (위상 샘플방식 DRFM에 적용 가능한 VGPO/I 재밍기법 기술 구현)

  • Choi, Young-Ik;Hong, Sang-Guen;Lee, Wang-Yong;Park, Jin-tae;Lee, Chang-hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.12
    • /
    • pp.1105-1111
    • /
    • 2016
  • In modern warfare, various target tracking radars are used for target location tracking. So, the importance of EA radar jamming technique which disrupt enemy target tracking radar in oder to neutralize tararget location tracking has increased. VGPO/I jamming is a base technique of EA(Electronic Attack), it is possible to operate to pulse-Doppler radar. In this papar, we develop VGPO/I jamming technique that can apply to phase sampled DRFM by using phase information and verifiy through simulations.

Analysis of the ES detection loss related to the circular scan of radars (레이더의 원형 스캔에 따른 ES 탐지손실 분석)

  • Ryoo, Young-Jin;Kim, Whan-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.159-166
    • /
    • 2005
  • The pulse amplitude of a search radar signal received by an ES system is not constant pulse by pulse because of the radar's scan characteristics. The variation of the pulse amplitude causes the ES detection loss in the ES system. Therefore, the ES detection range equation should consider the ES detection loss caused by the search radar's scan characteristics. In this paper, we theoretically analyze the ES detection loss for the circular scar and propose the model to evaluate it quantitatively. The experiment results for the real search radar signals demonstrate that the proposed model is suitable for the evaluation model of the ES detection loss related to the circular scan of radars.

The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios (Legacy Radio 기반의 전술데이터 통신 효율성 향상 위한 데이터 압축 기법)

  • Sim, Dong-Sub;Shin, Ung-Hee;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.577-585
    • /
    • 2010
  • The Military Tactical Communication technology for effective network-centric warfare is developing. Targeting broadband wireless transmission, core technology for connection, and Transmission technology that secure survivability under High-speed Movement environment. On the one hand, Tactical data communication system that reflects military characteristic is developing on the base of Legacy communication equipment which is used in the field. Because almost every military units in the field have used voice to communicate which lower efficiency of operation, they have made effort to Substitute voice communication which delays military Operation Tempo to digital communication. The Communications environment of troops in Forward edge of battle field area is very poor. Especially in terms of limited frequency allocation and bandwidth. Therefore, improving the efficiency of frequency is essential for Military Tactical Communication. This paper is about The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios which are UHF, VHF, HF Radio. I proposed and proved the most efficient Data Compression Method that reflects military characteristic, after analyzing the experimentation, which simulate CAS(Close Air Support mission) data transmission between Pilot and TACP.

Radar identification by scan period validation (스캔주기 유효성 판별에 의한 레이더 식별)

  • Kim, Gwan-Tae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.17-22
    • /
    • 2021
  • Radar signal analysis of electronic warfare is a technique for identifying a radar type by signal parameters(direction, radion frequency, pulse repetition interval, pulse width, scan period..) extracted from a received radar pulse. However as the modern radar and new threat environments is advanced, radar identification ambiguity arises in the process of identifying the types of radars. In this paper, we analyze the problems of the existing method and propose a new method. This technique determines the validity of the scan period by the difference in the arrival time of the radar pulse and the minimum number of scan period discrimination. Experiments proved that the scan cycle results are derived regardless of the RMS((Root Mean Square) of the input amplitude.

Electronic Attack Signal Transmission System using Multiple Antennas (다중 안테나를 이용한 전자 공격 신호 전송 시스템)

  • Chang, Jaewon;Ryu, Jeong Ho;Park, Joo Rae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.41-49
    • /
    • 2021
  • In electronic warfare, beamforming using multiple antennas is applied for effective transmission of electronic attack signals. In order to perform an electronic attack against multiple threats using the same frequency resource, it is necessary to apply a multi-beam transmission algorithm that has been studied in wireless communication systems. For electronic attacks against multiple threats, this paper presents an MMSE(Minimum Mean-Squared Error) beam-forming technique based on the prior location information of threats and an optimization method for power allocation. In addition, the performance of the proposed method is evaluated and received signals of multiple threats are compared and analyzed.