dc.contributor.author |
Osner, Nicholas R.
|
|
dc.contributor.author |
Du Plessis, W.P. (Warren Paul)
|
|
dc.date.accessioned |
2017-05-12T09:50:41Z |
|
dc.date.available |
2017-05-12T09:50:41Z |
|
dc.date.issued |
2017-03 |
|
dc.description.abstract |
A threat evaluation and jamming allocation (TEJA) system is proposed and implemented in order to optimise the jamming strategy of a platform. This TEJA system accounts for the different effects of jamming techniques on threats and radar modes, the interaction between jamming techniques and channels, the relative frequency and bandwidth used by threats, the uncertainty of the threat environment, and models the progression of threats through various radar modes from initial search to final guidance. Performance of the TEJA system is evaluated for a complex mission which considers a platform with two jammers penetrating an area with ten threats. The TEJA system is shown to be computationally efficient by using an exhaustive search to determine the optimum jamming strategy. The developed jamming strategy allows the platform to survive a mission despite its complexity. |
en_ZA |
dc.description.department |
Electrical, Electronic and Computer Engineering |
en_ZA |
dc.description.librarian |
hb2017 |
en_ZA |
dc.description.uri |
http://digital-library.theiet.org/content/journals/iet-rsn |
en_ZA |
dc.identifier.citation |
Osner, NR & Du Plessis, WP 2017, 'Threat evaluation and jamming allocation', IET Radar, Sonar and Navigation, vol. 11, no. 3, pp. 459-465. |
en_ZA |
dc.identifier.issn |
1751-8784 (print) |
|
dc.identifier.issn |
1751-8792 (online) |
|
dc.identifier.other |
10.1049/iet-rsn.2016.0277 |
|
dc.identifier.uri |
http://hdl.handle.net/2263/60341 |
|
dc.language.iso |
en |
en_ZA |
dc.publisher |
Institution of Engineering and Technology |
en_ZA |
dc.rights |
© The Institution of Engineering and Technology 2016. This paper is a postprint of a paper submitted to and accepted for publication in IET Control Theory and Applications and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library. |
en_ZA |
dc.subject |
Threat evaluation and jamming allocation (TEJA) |
en_ZA |
dc.subject |
Jamming techniques |
en_ZA |
dc.title |
Threat evaluation and jamming allocation |
en_ZA |
dc.type |
Postprint Article |
en_ZA |