Skip to:Content
|
Bottom
Cover image for Foundations of communications electronic warfare
Title:
Foundations of communications electronic warfare
Personal Author:
Series:
Artech House electronic warfare library
Publication Information:
London : Artech House, 2008
Physical Description:
xvi, 444 p. : ill. ; 24 cm.
ISBN:
9781596933910

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010183219 UG590 P66 2008 Open Access Book Book
Searching...

On Order

Table of Contents

Prefacep. xv
Chapter 1 Introduction to Jammingp. 1
1.1 Introductionp. 1
1.1.1 Electronic Supportp. 1
1.1.2 Electronic Attackp. 2
1.1.3 Electronic Protectp. 2
1.2 Information Warfarep. 3
1.3 Communications and EWp. 4
1.3.1 Channel State Informationp. 5
1.4 Information Theoryp. 6
1.5 Game Theoryp. 6
1.6 EW Measures of Effectivenessp. 7
1.7 Concluding Remarksp. 7
Referencesp. 8
Chapter 2 Mathematical Preliminariesp. 11
2.1 Introductionp. 11
2.2 Mathematical Setsp. 11
2.3 The Algebra of Setsp. 16
2.3.1 Groupsp. 16
2.3.2 Ringsp. 17
2.3.3 Fieldsp. 18
2.3.4 Borel Fieldsp. 19
2.4 Mathematical Theory of Probabilityp. 20
2.4.1 Probability Spacep. 21
2.4.2 Binomial Distributionp. 28
2.4.3 Poisson Distributionp. 30
2.5 Random Variablesp. 30
2.5.1 Discrete and Continuous Random Variablesp. 31
2.5.2 Expectationp. 32
2.5.3 Mean Squared Valuep. 34
2.5.4 Variancep. 34
2.5.5 Law of Large Numbersp. 35
2.5.6 Multivariate Probabilitiesp. 37
2.5.7 Sums of Random Variablesp. 38
2.5.8 Characteristic Functionp. 39
2.5.9 Adding Probability Densitiesp. 40
2.5.10 Adding Gaussian Variablesp. 41
2.5.11 Properties of the Sum of a Large Number of Random Variablesp. 41
2.6 Concluding Remarksp. 43
Referencesp. 43
Chapter 3 Properties of Signals and Systemsp. 45
3.1 Introductionp. 45
3.2 Fourier Seriesp. 45
3.2.1 Fourier's Theoremp. 45
3.2.2 Power and Parseval's Theoremp. 47
3.2.3 Fourier Transformsp. 49
3.2.4 Finite Power, Infinite Duration Signalsp. 52
3.3 Transmission of Signals Through Linear Systemsp. 54
3.3.1 Linear Systemsp. 54
3.3.2 Impulse Response Functionp. 55
3.3.3 Convolutionp. 56
3.3.4 The Convolution Theoremp. 56
3.3.5 The Transfer Functionp. 57
3.3.6 Nyquist Sampling Theoremp. 58
3.3.7 Signal Reconstructionp. 62
3.3.8 Causalityp. 63
3.4 Intersymbol Interferencep. 63
3.5 The Autocorrelation Function and Power Spectrump. 68
3.5.1 Stationary Processesp. 68
3.5.2 Correlation Functionsp. 68
3.6 Detection and Estimation Theoryp. 71
3.6.1 Bayes' Decision Theoryp. 72
3.6.2 Neyman-Pearson Hypothesis Testingp. 79
3.7 Concluding Remarksp. 83
Referencesp. 83
Chapter 4 Digital Communication Systemsp. 85
4.1 Introductionp. 85
4.2 Digital Systemsp. 85
4.2.1 Performance Parametersp. 88
4.2.2 Source Encoder and Decoderp. 89
4.2.3 Channel Encoder and Decoderp. 95
4.2.4 Modulation and Demodulationp. 98
4.2.5 Symbol Transmissionp. 121
4.3 Encryptionp. 130
4.3.1 Cryptologic Architecturesp. 131
4.3.2 Pretty Good Privacyp. 132
4.3.3 Digital Signaturesp. 133
4.4 Concluding Remarksp. 135
Referencesp. 135
Chapter 5 Information Theory and Electronic Warfarep. 137
5.1 Introductionp. 137
5.2 Discrete Spacesp. 138
5.2.1 Data Sourcesp. 139
5.2.2 Informationp. 139
5.2.3 Mutual Informationp. 141
5.2.4 Entropyp. 143
5.2.5 Memoryless Versus Markovian Symbolsp. 147
5.2.6 Properties of Entropyp. 148
5.2.7 Information Ratep. 151
5.2.8 Communicating Via a Channel: The Channel Matrixp. 152
5.3 Continuous Spacesp. 152
5.3.1 Optimum Jamming Waveform with Fixed Jammer Powerp. 154
5.3.2 A Digressionp. 160
5.4 Data Processing Theoremp. 161
5.5 EW Channel Modelsp. 163
5.5.1 Introductionp. 163
5.5.2 Discrete Memoryless Channelsp. 164
5.5.3 Channel Capacityp. 165
5.5.4 Binary Channelp. 169
5.5.5 Compound Discrete Memoryless Channelsp. 174
5.5.6 Discrete Memoryless Arbitrary Varying Channelsp. 175
5.5.7 Hybrid Discrete Memoryless Channelsp. 176
5.5.8 Erasure Channelsp. 177
5.5.9 Continuous Channelsp. 178
5.5.10 Channels with Memoryp. 179
5.6 Rate Distortion Theoryp. 184
5.7 Concluding Remarksp. 188
Referencesp. 188
Appendix 5A Neyman-Pearson Test for the Binary Channelp. 190
Chapter 6 Source Codingp. 199
6.1 Introductionp. 199
6.2 Principles of Source Codingp. 199
6.2.1 Coding Ratep. 201
6.2.2 Compression Factorp. 201
6.2.3 Source Specific Versus Universal Codingp. 202
6.3 Codingp. 202
6.3.1 Efficiency and Redundancy of a Codep. 202
6.3.2 Gray Codingp. 203
6.3.3 Huffman Codingp. 204
6.3.4 Reducing Redundancy by Combining Symbolsp. 206
6.3.5 Shannon-Fano Codingp. 206
6.3.6 Lempel-Ziv Codingp. 208
6.4 Concluding Remarksp. 209
Referencesp. 210
Chapter 7 Channel Coding and Electronic Warfarep. 211
7.1 Introductionp. 211
7.2 The Digital Communication Channelp. 212
7.3 Encodingp. 214
7.3.1 The Sequential Encoderp. 215
7.3.2 Encoder and Decoder Architecturep. 217
7.4 Error Detection and Correctionp. 219
7.4.1 Error Controlp. 220
7.5 Linear Block Codesp. 223
7.5.1 Linear Codesp. 224
7.6 Convolutional Codesp. 228
7.6.1 Code Ratep. 229
7.6.2 Convolutionp. 229
7.6.3 Encoding Processp. 230
7.6.4 The Trellisp. 233
7.6.5 Decoding Process-Viterbi Algorithmp. 233
7.7 Hard Versus Soft Decisionsp. 239
7.8 Decision Metricsp. 241
7.8.1 Side Informationp. 243
7.8.2 Coded Bit Error Rate Boundp. 243
7.9 Punctured Convolutional Codingp. 246
7.10 Trellis-Coded Modulationp. 247
7.11 Communication Systems in Jammingp. 248
7.12 Concluding Remarksp. 252
Referencesp. 253
Chapter 8 Jammer Performance in Noisy, Fading Channelsp. 255
8.1 Introductionp. 255
8.2 Fading Channelsp. 256
8.2.1 Factors Affecting Fadingp. 258
8.2.2 Types of Fadingp. 262
8.3 Jamming Performance for Binary Modulations in Slowly Fading Channels and AWGNp. 268
8.3.1 Slow, Flat Fadingp. 268
8.3.2 Binary Phase Shift Keyingp. 270
8.3.3 Binary Frequency Shift Keyingp. 276
8.4 Jamming Effects on Channel Capacityp. 285
8.5 Higher-Order Phase Modulationsp. 287
8.5.1 QPSKp. 287
8.5.2 M-ary PSKp. 288
8.6 Concluding Remarksp. 290
Referencesp. 290
Chapter 9 Jamming Performance Evaluation Using Dynamic, Noncooperative Gamesp. 293
9.1 Introductionp. 293
9.2 Game Playingp. 293
9.3 Minimax Principlep. 295
9.3.1 Minimax Algorithmp. 298
9.4 Gamesp. 298
9.4.1 Game Taxonomyp. 298
9.4.2 Nash Equilibriump. 299
9.4.3 Prisoner's Dilemmap. 300
9.5 Strategiesp. 300
9.5.1 Jammer Performance Against On-Off Keyed Communication Systemsp. 305
9.5.2 Jamming Performance Against Coherent Binary Shift Keyp. 309
9.6 Jammer Performance with Thermal Energy Constraintsp. 311
9.6.1 Finite Horizon Gamep. 316
9.6.2 Infinite Horizon Gamep. 320
9.7 Minimax Detection of Frequency Hopping Targetsp. 327
9.8 Concluding Remarksp. 330
Referencesp. 331
Chapter 10 Noise Jammingp. 333
10.1 Introductionp. 333
10.2 Additive White Gaussian Noise Channelsp. 333
10.3 Gaussian Arbitrarily Varying Channelsp. 335
10.4 Power Constraintsp. 338
10.5 Jamming Performance Without Real-Time Electronic Supportp. 349
10.5.1 Arbitrary and Binary Channel Inputsp. 349
10.5.2 Other Objective Functionsp. 353
10.6 Jammer Performance with Electronic Support Informationp. 355
10.7 Convolutional Codingp. 362
10.8 Concluding Remarksp. 363
Referencesp. 365
Chapter 11 Pulsed Noise Jammingp. 367
11.1 Introductionp. 367
11.2 Hard Decision Receiversp. 368
11.2.1 Jamming of CBPSK, DBPSK, CBFSK, and NCBFSK Signalsp. 368
11.3 Soft Decision Receiver, CBPSK Signalsp. 380
11.3.1 Optimum Soft Decision Receiver, Known JSIp. 380
11.3.2 Jamming Performance against a Soft Decision Receiver and Unknown Jammer State Information and CBPSK Modulationp. 386
11.3.3 Discussionp. 389
11.4 Pulsed Noise Jamming of Coded CBPSK Signalsp. 390
11.4.1 Pulsed Noise Jamming of CBPSKp. 390
11.4.2 Pulsed Noise Jamming Performance Against CBPSK with Convolutional Codes-Soft Decisionp. 393
11.4.3 Jamming Performance Against R = 1/2, K = 7 Convolutionally Coded CBPSKp. 395
11.5 Mutual Information Objective Function-Hard Decisionp. 396
11.6 Concluding Remarksp. 397
Referencesp. 398
Chapter 12 Tone Jammingp. 401
12.1 Introductionp. 401
12.2 Continuous Tone Jammingp. 401
12.2.1 Hard Decision Receiversp. 403
12.2.2 Soft Decision Receiversp. 410
12.3 Pulsed Tone Jammingp. 413
12.3.1 Hard Decision Receiver and Pulsed Tone Jammerp. 413
12.3.2 Hard Decision Receiver, Tone Jamming, Frequency Mismatchp. 415
12.3.3 Soft Decision Receiver with Pulsed Tone Jammingp. 417
12.4 Concluding Remarksp. 420
Referencesp. 421
Appendix A Introduction to the Calculus of Variationsp. 423
A.1 The Euler Equationp. 423
A.2 Functions and Extreme Pointsp. 424
A.3 Applications of the Euler Equationp. 427
A.4 The Fundamental Lemma of the Calculus of Variationsp. 432
Referencesp. 432
List of Acronymsp. 433
About the Authorp. 437
Indexp. 439
Go to:Top of Page