Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack
Subject Areas : Majlesi Journal of Telecommunication DevicesPouria Etezadifar 1 , Saeed Talati 2
1 - Department of Electrical Engineering, Imam Hussein University (IHU), Tehran, Iran.
2 - Department of Electrical Engineering, Imam Hussein University (IHU), Tehran, Iran.
Keywords: Information, Electronic Attack, Electronic Support,
Abstract :
With the end of World War II and the rapid advent of war technology, wars have shifted to electronic warfare, and today a nation can win wars that are more powerful in the field of telecommunications and electronic warfare. The purpose of this article is to promote new content in the field of electronic warfare and we try to introduce and introduce new techniques of electronic attacks on victim radar systems. With the exception of false targets created by point or sweep jams, most false targets are created with automatic responders or repeaters. An automatic response generator for producing false targets includes a receiver, a variable delay circuit, a signal generator, a power amplifier, and an antenna. Upon receiving a pulse from the threatening radar, the transponder waits for the time corresponding to the target man's distance to the false target, and then sends a similar echo signal to the radar. . As soon as the pulse is received from the threatening radar, the transponder delays it sufficiently to cause the difference in distance to create a false target. Then, a pulse similar to the RF echo pulse of the radar is returned to it.
[1] Merrill I. Skolnik, “Introduction to Radar Systems’, Third Edition, McGraw-Hill Higher Education, 2001.
[2] GuoSui Liu, Hong Gu, WeiMin Su, HongBO Sun, “The Analysis and Design of Modern Low Probability of Intercept Radar”, 2001 CIE International Conference, Page(s): 120-124, 2001.
[3] Filippo Neri, “Introduction to Electronic Defense Systems", Second Edition, Artech House Publishers, 2001.
[4] Wayne Tomasi, “Electronic Communications Systems”, Forth Edition, Prentice Hall, Inc., 2001.
[5] Hashemi, Seyed Mohammad, Shahrokh Barati, Saeed Talati and Heshmat Noori. “A GENETIC ALGORITHM APPROACH TO OPTIMAL PLACEMENT OF SWITCHING AND PROTECTIVE EQUIPMENT ON A DISTRIBUTION NETWORK.” VOL. 11, NO. 3, FEBRUARY 2016.
[6] O. Sharifi-Tehrani and S. Talati, “PPU Adaptive LMS Algorithm, a Hardware-Efficient Approach; a Review on”, Majlesi Journal of Mechatronic Systems, vol. 6, no. 1, Jun. 2017.
[7] Hashemi. Seyed Mohammad, Abyari. Mohammad, Barati. Shahrokh, Tahmasebi Sanaz, Talati, Saeed. “A PROPOSED METHOD TO CONTROLLER PARAMETER SOFT TUNING AS ACCOMMODATION FTC AFTER UNKNOWN INPUT OBSERVER.” ARPN Journal of Engineering and Applied Sciences VOL. 11, NO. 5, MARCH 2016.
[8] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, May 2019.
[9] Saeed. Talati, Behzad. Ebadi, Houman. Akbarzade “Determining pf the fault location in distribution systems in presence of distributed generation resources using the original post phasors“QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellin-Colombia. April 2017
[10] Saeed Talati, Mohamadreza HasaniAhangar, “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, Jan. 2020.
[11] Saeed Talati, Pouriya Etezadifar, “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, Feb. 2020.