دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Chi-Hao Cheng. James Tsui
سری:
ISBN (شابک) : 8770224358, 9788770224352
ناشر: River Publishers
سال نشر: 2021
تعداد صفحات: 190
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 136 مگابایت
در صورت تبدیل فایل کتاب An Introduction to Electronic Warfare from the First Jamming to Machine Learning Techniques (River Publishers Series in Signal, Image and Speech Processing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مقدمهای بر جنگ الکترونیک از اولین تکنیکهای پارازیت تا تکنیکهای یادگیری ماشین (سریهای River Publishers در پردازش سیگنال، تصویر و گفتار) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Front Cover An Introduction to Electronic Warfare; from the First Jamming to Machine Learning Techniques Contents Preface List of Figures List of Abbreviations 1 Introduction: From the First Jamming to the Battle of Beams 1.1 The First Jamming 1.2 Radio for Navigation and Battle of the Beams 1.3 The Scope of this Book References 2 Radar Fundamentals and Their Early Development 2.1 Introduction 2.2 The Difficulty of Estimating Distance 2.3 Bat and Radar 2.4 The Early Development of Radar 2.5 Principle of Radars and the Radar Equation 2.6 Requirement of High Frequency Source 2.7 Requirement of Very Short Pulse 2.8 High Power Microwave Source: Cavity Magnetron 2.9 A Diversion: From Radar to Microwave Oven 2.10 A Basic Radar System 2.11 Frequency Modulation Radar 2.12 Searching Radar 2.13 Conical Scan Radar 2.14 Monopulse Radar 2.15 Doppler Radar 2.16 Continuous-wave Radar 2.17 Moving Target Indicator 2.18 Look-down/Shoot-down Radar 2.19 Weapon Guidance Signal 2.20 Radar Modes 2.21 Conclusion References 3 Overall View of Electronic Warfare 3.1 Introduction 3.2 Second Layer Operations: The Radar Signal Intercepts Performed on the Aircraft 3.3 Second Layer of Operations: Signal Classification and Identification Performed at the Aircraft 3.4 Third Layer of Operation: Electronic Countermeasures (ECM) 3.5 Third Layer of Operation: Aircraft Tracked by a Radar Can Send a Missile to Destroy the Radar 3.6 General Discussion on Second and Third Layer Operation 3.7 Electronic Warfare Aircraft 3.8 Fourth Layer of Electronic Warfare Operation: Radar Counter-Countermeasure 3.9 An Electronic Warfare Case Study: Black Cat Squadron 3.10 Conclusion References 4 Intercept Receivers and Electronic Warfare Processors 4.1 Introduction 4.2 Intercept Receiver Requirements 4.3 Parameters Measured by Intercept Receivers 4.4 Crystal Radio Receiver 4.5 Electronic Warfare Crystal Video Receivers 4.6 Superheterodyne (Superhet) Receivers 4.7 Channelized Receivers 4.8 Some Common Problems of Intercept Receivers 4.9 Human Electronic Warfare Processor and “SAM-Song” 4.10 Goals of an Electronic Warfare Processor 4.11 Signal Sorting 4.12 Pattern Recognition of Radar Pulses 4.13 Table Looking to Identify the Type of Radar 4.14 Trackers in Electronic Warfare Processor 4.15 Revisit a Signal Being Jammed 4.16 Prediction of Pulse Arrival Time 4.17 Calculate Radar Crystal Frequency 4.18 Performance Evaluation of Electronic Warfare Processors 4.19 Summary References 5 Jamming and Counter-Countermeasures 5.1 Introduction 5.2 Traveling Wave Tube (TWT) 5.3 Noise Jamming 5.4 Advantages/Disadvantages of Noise Jamming and Burning Through Techniques 5.5 Deceptive Jamming and Cover Pulse Operation 5.6 Range and Velocity Deception: Range Gate Pull-off and Velocity Gate Pull-off 5.7 Electronic Counter-Countermeasure: Frequency Agile and Pulse Agile Radars 5.8 Angle Deception: Sidelobe Jammer and Sidelobe Cancelation Scheme 5.9 Angle Deception: Inverse Gain Jamming 5.10 Angle Deception: Cross-eye Jamming 5.11 Digital Radio Frequency Memory (DRFM) 5.12 Electronic Warfare Aircraft 5.13 Dangers of Jamming 5.14 Battle Examples: EW in the Yom Kippur War and the 1982 Lebanon War 5.15 Conclusions References 6 Missile Detection Schemes and Defense 6.1 Introduction 6.2 Basic Concept of Infrared Receivers 6.3 False Alarm Problems and Other Issues of the IR-Based Missile Approach Warning System 6.4 Tail Warning Radar 6.5 Proximity Fuze and Jamming 6.6 Missile Guidance Systems 6.7 Jamming Infrared Tracking System 6.8 Conclusion References 7 Chaff, Flare, and Decoys 7.1 Introduction 7.2 Chaff and its Countermeasures 7.3 Battle Example: Bombing of Hamburg on July 24, 1943 7.4 Flare and its Countermeasures 7.5 Decoy 7.6 Conclusion References 8 Stealth Aircraft 8.1 Introduction 8.2 Stealth Technologies 8.3 Passive Radar for Stealth Aircraft? 8.4 Battle Example: 1999 F-117A Shootdown 8.5 Conclusion References 9 Low Probability of Intercept Radar 9.1 Introduction 9.2 Review of Radar Concepts 9.3 Overview of LPI Radar Technologies 9.4 LPI Radar Example 1: Phase Coded Radar 9.5 LPI Radar Example 2: FMCW Radar 9.6 Countermeasures of LPI Radars 9.7 Conclusion References 10 Machine Learning and its Potential in Electronic Warfare 10.1 Introduction 10.2 Machine Learning for Signal Classification 10.3 Machine Learning for Predicting a Multifunction Radar’s Next Signal 10.4 Reinforcement Learning for EW Actions 10.5 Possible Issues of Applying Machine Learning for EW 10.6 Conclusion References 11 Conclusion Index About the Authors Back Cover