IDEAS home Printed from https://ideas.repec.org/a/taf/tewaxx/v27y2013i1p66-76.html
   My bibliography  Save this article

A novel method for waveform jamming based on millimeter-wave alternating current radiometer

Author

Listed:
  • X. Chen
  • J.-Z. Xu

Abstract

On the basis of the working principle and circuit response characteristics of the millimeter-wave (MMW) alternating current radiometer, a novel method for waveform jamming is proposed. In this method, a MMW jamming source is used to transmit the narrowband signal as the heat source and then a wide-time signal is obtained through a broadband reception and detection of the radiometer. Next, the wide-time signal excites differential response of low-frequency circuit of the video amplifier to yield the splitting waveform, which is similar to the negative pulse waveform in metal-target detection, therefore achieving detection effect of cold-target from the angle of waveform simulation. Simulation results show that the average similarity of the simulation waveform and the actual waveform is 79.21%, and the processing results of experimental data demonstrate validity and feasibility of the proposed method.

Suggested Citation

  • X. Chen & J.-Z. Xu, 2013. "A novel method for waveform jamming based on millimeter-wave alternating current radiometer," Journal of Electromagnetic Waves and Applications, Taylor & Francis Journals, vol. 27(1), pages 66-76, January.
  • Handle: RePEc:taf:tewaxx:v:27:y:2013:i:1:p:66-76
    DOI: 10.1080/09205071.2013.738465
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/09205071.2013.738465
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/09205071.2013.738465?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    2. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    3. Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
    4. Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
    5. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    6. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    7. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    8. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    9. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    10. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    11. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    12. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    14. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    15. Xiao, Hui & Lin, Chen & Kou, Gang & Peng, Rui, 2020. "Optimal resource allocation for defending k-out-of-n systems against sequential intentional and unintentional impacts," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    16. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    17. Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
    18. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
    19. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    20. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:tewaxx:v:27:y:2013:i:1:p:66-76. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/tewa .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.