The Use of Electronic Warfare and Information Signaling in Network-based Warfare
Subject Areas : Majlesi Journal of Telecommunication DevicesMohammad Reza Hassani Ahangar 1 , Saeed Talati 2 , Ali Rahmati 3 , Hamid Heidari 4
1 - Department of Electronic Engineering, Imam Hussein University, Tehran, Iran.
2 - Department of Electronic Engineering, Shahid Sattari University of aeronautical Science and Technology, Tehran, Iran.
3 - Department of Electronic Engineering, Shahid Sattari University of aeronautical Science and Technology, Tehran, Iran.
4 - Department of Electronic Engineering, Shahid Sattari University of aeronautical Science and Technology, Tehran, Iran.
Keywords: training and upgrading of electronic collection systems, information warfare, Electronic Warfare, Network- based warfare,
Abstract :
Network- based warfare is known as the symbolic element of the Age Information War. The network-based approach has been built around information sharing, and this information sharing in the battle is possible through the networking of all elements on the battlefield. A coherent networking force improves the quality of information sharing and, as a result, survival and command speed, improves the efficiency of battlefield elements, saves time and resources, and adds value for combat capability. There are various levels, including the lowest level, that is, an infantry soldier, which ultimately results in an amazing increase in the effectiveness of combat operations. Recent developments in microelectronics, mechanics, and ergonomics, as well as the movement and return, the importance and emphasis from tanks and missiles to soldiers, have examined future soldier projects. Electronic science has led to the integration of small individuals with advanced technology equipment and infantry soldiers with advanced communication, command and control (C3) systems, or communications, command, control, computer and information (C4I). All this was to try to see the infantry soldier as a complete unit instead of a small part of the great force. Each country has its own special soldier project. Considering the importance of the subject, identifying the opportunities and threats facing the Iranian warrior is necessary. In this study, we will study the future soldier project in advanced and sensitive countries and focus on communication and Network- based systems.
[1] GuoSui Liu, Hong Gu, WeiMin Su, HongBO Sun, “The Analysis and Design of Modern Low Probability of Intercept Radar”, 2001 CIE International Conference, Page(s): 120-124, 2001.
Hashemi, Seyed Mohammad, Shahrokh Barati, Saeed Talati and Heshmat Noori. “A GENETIC ALGORITHM APPROACH TO OPTIMAL PLACEMENT OF SWITCHING AND PROTECTIVE EQUIPMENT ON A DISTRIBUTION NETWORK.” VOL. 11, NO. 3, FEBRUARY 2016.
[2] O. Sharifi-Tehrani and S. Talati, “PPU Adaptive LMS Algorithm, a Hardware-Efficient Approach; a Review on”, Majlesi Journal of Mechatronic Systems, vol. 6, no. 1, Jun. 2017.
[3] Hashemi. Seyed Mohammad, Abyari. Mohammad, Barati. Shahrokh, Tahmasebi Sanaz, Talati, Saeed. “A PROPOSED METHOD TO CONTROLLER PARAMETER SOFT TUNING AS ACCOMMODATION FTC AFTER UNKNOWN INPUT OBSERVER.” ARPN Journal of Engineering and Applied Sciences VOL. 11, NO. 5, MARCH 2016.
[4] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, May 2019.
[5] Saeed. Talati, Behzad. Ebadi, Houman. Akbarzade “Determining pf the fault location in distribution systems in presence of distributed generation resources using the original post phasors“QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellin-Colombia. April 2017.
[6] Saeed Talati, Mohamadreza HasaniAhangar, “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, Jan. 2020.
[7] Saeed Talati, Pouriya Etezadifar, “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, Feb. 2020.