000 06350nam a2200517 i 4500
001 8039726
003 IEEE
005 20191218152129.0
006 m o d
007 cr |n|||||||||
008 171024s2008 mauab ob 001 eng d
010 _z 2010035687 (print)
020 _a9780470977170
_qelectronic
020 _z9780470688717
_qhardback
024 7 _a10.1002/9780470977170
_2doi
035 _a(CaBNVSL)mat08039726
035 _a(IDAMS)0b00006485f0d962
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK6553
_b.G697 2011eb
082 0 0 _a621.384
_222
100 1 _aGraham, Adrian W.,
_eauthor.
245 1 0 _aCommunications, radar, and electronic warfare /
_cAdrian Graham.
264 1 _aHoboken, New Jersey :
_bWiley,
_c2011.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2010]
300 _a1 PDF (xix, 378 pages) :
_billustrations, maps.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
500 _aIncludes index.
505 0 _aPreface -- Glossary -- PART ONE / BASIC THEORY -- 1 Introduction -- 1.1 The Aim of this Book -- 1.2 Current Radio Technology -- 1.3 Factors Constraining Radio Communications -- References and Further Reading -- 2 Management of the Radio Spectrum -- 2.1 Spectrum Management Fundamentals -- 2.2 Civil Spectrum Management -- 2.3 Military Spectrum Management -- 2.4 Management of EWActivities -- References and Further Reading -- 3 The Radio Channel -- 3.1 Frequency Aspects of the Radio Channel -- 3.2 Narrowband Signals -- 3.3 Frequency Hopping Signals -- 3.4 Wideband Signals -- 3.5 The Effect of Movement on the Radio Channel -- References and Further Reading -- 4 Radio Links in the Presence of Noise -- 4.1 Sources of Radio Noise -- 4.2 Effects of Noise -- 4.3 The Radio Receiver -- 4.4 Radio Link Budgets in the Presence of Noise -- References and Further Reading -- 5 Radio Links in the Presence of Interference -- 5.1 Sources of Radio Interference -- 5.2 Interference in the Spectral Domain -- 5.3 Interference in the Time Domain -- 5.4 Interference Mitigation Techniques -- References and Further Reading -- 6 Radio Links and Deliberate Jamming -- 6.1 The Purpose of Jamming -- 6.2 How Jamming Works -- 6.3 Types of Communications Jammers -- 6.4 Jamming Mitigation Techniques -- References and Further Reading -- 7 Radar and Radar Jamming -- 7.1 Introduction to Radars -- 7.2 The Radar Equation -- 7.3 Types of Radar -- 7.4 Radar Jamming Techniques -- 7.5 Radar Jamming Mitigation Techniques -- References and Further Reading -- 8 Radio-Controlled Improvised Explosive Devices -- 8.1 The Poor Man's Weapon of Choice: IEDs -- 8.2 Radio Control for IEDs -- 8.3 Detection of IED Radio Control Systems -- References and Further Reading -- PART TWO / PRACTICAL -- 9 Predicting HF Radio -- 9.1 Propagation at HF -- 9.2 HF Skywave Link Budgets -- 9.3 Groundwave -- References and Further Reading -- 10 VHF to SHF Radio Prediction -- 10.1 Propagation above HF -- 10.2 Modelling Methods -- 10.3 Deterministic Models.
505 8 _a10.4 Empirical Models -- 10.5 Combined Models -- 10.6 Link Budgets -- References and Further Reading -- 11 Data Requirements for Radio Prediction -- 11.1 Why Consider Modelling Requirements? -- 11.2 Communications System Parameters -- 11.3 ES Specific Parameters -- 11.4 EA Specific Parameters -- 11.5 Radar Specific Parameters -- 11.6 Third-Party Characteristics -- 11.7 General Antenna Characteristics -- 11.8 Antenna Environment Considerations -- 11.9 Terrain Data -- 11.10 Ground and Radio Clutter Data -- 11.11 Sunspots, Ionospheric and Atmospheric Data -- References and Further Reading -- 12 Planning and Optimising Radio Links -- 12.1 Path Profile Prediction -- 12.2 Optimising a Link -- 12.3 Re-Broadcast Links -- 12.4 Linked Networks -- References and Further Reading -- 13 Planning Radio Networks for Coverage -- 13.1 Coverage Predictions -- 13.2 Optimisation of Radio Networks -- 13.3 Limiting Coverage -- References and Further Reading -- 14 Interference Analysis -- 14.1 Introduction to Radio Interference Analysis -- 14.2 Fading Considerations -- 14.3 Interference from other Channels -- 14.4 Different Ways of Representing Co-Existing Signals -- References and Further Reading -- 15 Management Techniques for Interference -- 15.1 Preventing Interference -- 15.2 Managing Interference -- 15.3 Interference Reports -- References and Further Reading -- 16 Management of Interference at a Radio Site -- 16.1 Special Features of Radio Sites with Multiple Systems -- 16.2 Sources of Interference at a Radio Site -- 16.3 Methods of Managing Interference at Radio Sites -- References and Further Reading -- 17 Communications Electronic Warfare -- 17.1 Introduction -- 17.2 Detection and Intercept Networks -- 17.3 Direction Finding Networks -- 17.4 Communications Jammers -- 17.5 The Role of Unmanned Airborne Vehicles -- 17.6 Countering Enemy Communications Electronic Warfare -- References and Further Reading -- 18 Non-Communications Electronic Warfare -- 18.1 Non-Communications EW -- 18.2 Radar Jamming Techniques.
505 8 _a18.3 Platform Self Protection Methods -- 18.4 Parametric Information Collection Methods -- References and Further Reading -- 19 Countering Radio-Controlled IEDs -- 19.1 Introduction to IEDs -- 19.2 Radio Controlled IED -- 19.3 Basic IED Counter Methods -- 20 Summary and Conclusions -- Appendix A: Working with Decibels -- Appendix B: Common Conversion Formulae and Reference Tables -- Index.
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"The book is structured systematically, enabling the reader to utilise the methods explained to improve radio spectrum exploitation in practice"--
_cProvided by publisher.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 10/24/2017.
650 0 _aRadio wave propagation.
650 0 _aRadio frequency.
650 0 _aWireless communication systems.
655 0 _aElectronic books.
710 2 _aIEEE Xplore (Online Service),
_edistributor.
710 2 _aWiley,
_epublisher.
776 0 8 _iPrint version:
_z9780470688717
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=8039726
999 _c42760
_d42760