This document describes a radar jamming circuit designed to jam an X-band radar. The circuit uses an ATmega16 microcontroller, Basic Stamp microcontroller, two X-band motion detector modules, and an LCD display. One motion detector acts as the radar and the other acts as a jammer, generating a 10.5 GHz frequency using the Doppler effect. Testing showed that when the jammer was active, it successfully denied the radar detection by reducing the number of detected pulses compared to when no jamming occurred. The results demonstrate that an active jamming technique can effectively deny the use of the radar spectrum within a certain distance between the radar and jammer.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The autonomous Test Bench is the growing field of
testing device. The Rapid production firms require rapid testing
infrastructure. Many firms till now use legacy system. The
Autonomous Test Bench is a Rapid Application Development tool
to accelerate the device testing rapid. To implementation ATB
(Autonomous Test Bench) the major requirement is to measure
the target object distance from robotic arm to trigger the device
(like push button, gripping something etc.) Not only Robotic
system, many fields of industry are required to capture ultrasonic
scan data. Sometimes it should be wireless system which may be
positioned anywhere. This paper describes a novel way to capture
surrounded ultrasonic scan data. The device is portable and
wireless and as well as cost effective. To measure object distance,
ultrasonic peripatetic scanner uses two servo motors to scan the
object horizontally and vertically. The main controller is a credit
card sized computer Raspberry pi with high processing capability
and portability. The programs are written using Python which is
an interpreted language.
Security in Wireless Sensor Networks Using BroadcastingIJMER
Wireless sensor networks as one of the growing technology in the coming decades has posed various unique challenges to researchers. A WSN typically consists of several base stations and thousands of sensor nodes, which are resource limited devices with low processing, energy, and storage capabilities.While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. As today’s world is growing more towards the Wireless technology, our aim must be towards providing the best security features to Wireless Sensor Network( WSN).We propose some of the security requirements for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications. We propose an efficient broadcast authentication scheme for wireless sensor networks in this paper.
Benefits of enhanced event analysis in datacenter otdr testingFangXuIEEE
Automatic detection and analysis algorithm of events in OTDR traces is very a challenging signal processing and analysis problem. It has too many tradeoffs to overcome: sensitivity vs. reliability, complexity vs. execution time. Traditional signal processing methods quickly reach performance limits. This is a place to demonstrate peoples creativity of finding exotic algorithm and method.
Are you looking for Maxtester 715 B Single-mode Handheld OTDR in India at affordable prices? Maxtester 715B is the best Single-mode handheld OTDR in India, The MAX-715B OTDR/iOLM is optimized for the point-to-point testing and troubleshooting of FTTx architectures, and is ideal for testing short fibers (e.g., inside a CO environment or at FTTA/DAS network installations). SPI is the best authorized distributor of EXFO maxtester 715b in India. If you want to buy now, so please contact more details- https://www.spiengineers.com/portfolio/maxtester-715b-last-mile-otdr/
Abstract—The work presented in this paper contributes to the research of UHF RFID systems especially on backscattering control logic. We present backscattering control logic concept, designing backscattering control logic component based on FPGA using VHDL, and simulate the component design in the form of behavioral simulation and post-route simulation.
The autonomous Test Bench is the growing field of
testing device. The Rapid production firms require rapid testing
infrastructure. Many firms till now use legacy system. The
Autonomous Test Bench is a Rapid Application Development tool
to accelerate the device testing rapid. To implementation ATB
(Autonomous Test Bench) the major requirement is to measure
the target object distance from robotic arm to trigger the device
(like push button, gripping something etc.) Not only Robotic
system, many fields of industry are required to capture ultrasonic
scan data. Sometimes it should be wireless system which may be
positioned anywhere. This paper describes a novel way to capture
surrounded ultrasonic scan data. The device is portable and
wireless and as well as cost effective. To measure object distance,
ultrasonic peripatetic scanner uses two servo motors to scan the
object horizontally and vertically. The main controller is a credit
card sized computer Raspberry pi with high processing capability
and portability. The programs are written using Python which is
an interpreted language.
Security in Wireless Sensor Networks Using BroadcastingIJMER
Wireless sensor networks as one of the growing technology in the coming decades has posed various unique challenges to researchers. A WSN typically consists of several base stations and thousands of sensor nodes, which are resource limited devices with low processing, energy, and storage capabilities.While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. As today’s world is growing more towards the Wireless technology, our aim must be towards providing the best security features to Wireless Sensor Network( WSN).We propose some of the security requirements for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications. We propose an efficient broadcast authentication scheme for wireless sensor networks in this paper.
Benefits of enhanced event analysis in datacenter otdr testingFangXuIEEE
Automatic detection and analysis algorithm of events in OTDR traces is very a challenging signal processing and analysis problem. It has too many tradeoffs to overcome: sensitivity vs. reliability, complexity vs. execution time. Traditional signal processing methods quickly reach performance limits. This is a place to demonstrate peoples creativity of finding exotic algorithm and method.
Are you looking for Maxtester 715 B Single-mode Handheld OTDR in India at affordable prices? Maxtester 715B is the best Single-mode handheld OTDR in India, The MAX-715B OTDR/iOLM is optimized for the point-to-point testing and troubleshooting of FTTx architectures, and is ideal for testing short fibers (e.g., inside a CO environment or at FTTA/DAS network installations). SPI is the best authorized distributor of EXFO maxtester 715b in India. If you want to buy now, so please contact more details- https://www.spiengineers.com/portfolio/maxtester-715b-last-mile-otdr/
Abstract—The work presented in this paper contributes to the research of UHF RFID systems especially on backscattering control logic. We present backscattering control logic concept, designing backscattering control logic component based on FPGA using VHDL, and simulate the component design in the form of behavioral simulation and post-route simulation.
A wearable UHF RFID tag antenna-based metamaterial for biomedical applicationsjournalBEEI
The development of miniature antennas for bio-medical applications has attracted the attention of many researchers in the last years. In this letter, we provide a miniature antenna for the RFID tag for identifying patients in African and European hospitals. The proposed antenna is designed on a flexible silicon substrate with a relative dielectric constant of 11.9 and a thickness of 1.6mm. An in-depth study of the proposed wearable antenna was made in free space and on human tissue. The achieved results showed good performance in terms of miniaturization, bandwidth, impedance matching and, reading distance. The presented tag antenna is designed and simulated by using CST-MWS solver and the results were validated by HFSS and both results are in good agreement.
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverIOSR Journals
Abstract: Monitoring Receivers form an important constituent of the Electronic support. In Monitoring
Receiver we can monitor, demodulate or scan the multiple channels.
In this project, the Implementation of algorithm for multi channel digital monitoring receiver. The
implementation will carry out the channelization by the way of Digital down Converters (DDCs) and Digital
Base band Demodulation. The Intermediate Frequency (IF) at 10.7 MHz will be digitalized using Analog to
Digital Converter (ADC) with sampling frequency 52.5 MHz and further converted to Base band using DDCs.
Virtually all the digital receivers perform channel access using a DDC. The Base band data will be streamed to
the appropriate demodulators. Matlab Simulink will be used to simulate the logic modules before the
implementation. This system will be prototyped on an FPGA based COTS (Commercial-off-the-shelf)
development board. Xilinx System Generator will be used for the implementation of the algorithms.
Keywords: DDC, ADC, Digital Base band demodulation, IF, Monitoring Receiver.
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEEng.Manfred Kibona
This paper presents a project-based final year project course on completion of Bachelor degree in Telecommunication engineering. The goal of this project was to provide engineering students a hands-on experience involving actual engineering design on communication circuits, printed circuit board (PCB) design, layout, fabrication, assembly, and testing.
The scope of the project was been projected in develop a RF remote control system that will be capable for controlling various electrical appliances in the vicinity of 100 meters. The control signals has to traverse wirelessly by means of modulation with radio frequency carrier signal ranging from frequency band of 385MHz to 480MHz.
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
Abstract
This work seeks to solve the problem that is being experienced in most existing remote monitoring systems by coming up with an enhanced monitoring system called Wireless Sensor Network. A Personal Area Network was evolved to increase the coverage area by spatially distributing Sensor nodes to capture and transmit physical parameters like temperature and Carbon monoxide in an indoor local cooking environment. Faulty node detection and localization was also realized, this was achieved by coming up with an algorithm that logically considers the receive signal strength value of -100 dbm as threshold, Result of data transmitted were viewed via a C-Sharp interface for Adaptive monitoring. The result from the Visual Basic plot shows that the Sensor nodes were able to capture temperature range of between 250C to 510C while the result of the CO emission shows an interval of 0.01g/m3 to 30.0 g/m3. A comparison between data transmitted at source and data received at the destination (sink) was carried out, a ranking test was used to validate the data received, a 0.9325 correlation value was obtained which shows a high level of integrity of 93.25% .
A novel fast time jamming analysis transmission selection technique for radar...IJECEIAES
The jamming analysis transmission selection (JATS) sub-system is used in radar systems to detect and avoid the jammed frequencies in the available operating bandwidth during signal transmission and reception. The available time to measure the desired frequency spectrum and select the non-jammed frequency for transmission is very limited. A novel fast time (FAT) technique that measures the channel spectrum, detects the jamming sub-band and selects the non-jammed frequency for radar system transmission in real time is proposed. A JATS sub-system has been designed, simulated, fabricated and implemented based on FAT technique to verify the idea. The novel FAT technique utilizes time-domain analysis instead of the wellknown fast Fourier transform (FFT) used in conventional JATS sub-systems. Therefore, the proposed fast time jamming analysis transmission selection (FAT-JATS) sub-system outperforms other reported JATS sub-systems as it uses less FPGA resources, avoids time-delay occurred due to complex FFT calculations and enhances the real time operation. This makes the proposed technique an excellent candidate for JATS sub-systems.
The most of the technical challenges for the society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way of finding a solution to the visually impaired. The navigation assistant technology using RFID Tag Grid minimizes the dependency. The reader used in this system is embedded in the mobile and shoes to avoid dependency on travel. The RFID reader matches with the information specified to that ID and a voice signal is generated. Wireless RF links is placed in the Bluetooth device/ headphone for voice guidance. The proximity sensing unit is an auxiliary unit is added as a solution to address unexpected and non-mapped obstacles in the user’s path. Basically it contains ultrasonic Sensor Unit interfaced with microcontroller which is inter-linked to a vibrator that would be activated when nearing obstacles. This system is technically and economically feasible and may offer a maximum benefit to the disabled.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Improved performance of scs based spectrum sensing in cognitive radio using d...eSAT Journals
Abstract
Tremendous growth in current wireless networks raises the demand of more frequency spectrum, over the finite availability of spectrum resource. Although, the research has specifies that the available primary users (i.e. licensed user) has not occupying the channel all the time. The most effective technology known as Cognitive radio giving promises for a solution of under utilization of available frequency spectrum in wireless communication. In cognitive radio network two types of wireless user can be define as primary user and secondary user. Primary users have highest priority to utilize the available band of frequency and secondary user can utilize these services only when the channel is vacant by primary user and there will be no any interference. The optimization of this may be implemented by a smart technique such as cognitive radio, which is fully automated intelligent wireless sensor tool having capability to sense, learn & adjust relevant operating parameters dynamically in radio atmosphere. This can be happen if we prefer the appropriate window technique to evaluate system parameter for sensing the availability of vacant band. We show that by comparing the different windows techniques, cognitive radios not only provide better spectrum opportunity but also provide the chance to huge number of wireless users.
Keywords: Primary user, Secondary user, Spectrum Sensing and Window technique etc.
Analysis and Construction of a Robot controlled by a Universal Remote ControlIJERD Editor
This paper aims at controlling a robot that is a tank like vehicle using a universal infrared remote
control. The infrared signal sent from the universal infrared remote control is received by IR receiver and
decoded by the microcontroller PIC16F873A using an algorithm embedded in the microcontroller. The output
from the microcontroller is fed to the motor driver which drives the left and right motors. The robot‟s motor
control can be speed controlled by using PWM/PDM (Pulse Width Modulation/ Pulse Duration Modulation)
technique
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
B04420812
1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 04, Issue 04 (April. 2014), ||V2|| PP 08-12
International organization of Scientific Research 8 | P a g e
Jamming on X- Band Radar
Mahmoud Yahia Hussein, AbdelrasoulJabar Alzubaidi
1, Department Of Electronics Engineering, 1SudanAcademy Of Sciences
2,Electronics Engineering School, Sudan University Of science And technology
Abstract: - Radar jamming is the intentional emission of radio frequency signals to interfere with the operation
of a radar by saturating its receiver with noise or false information. In this paper jamming technique is used to
jam x-band radar frequency. To accomplish this goal it's proposed to design circuit using Basic Stamp,
ATmega16 Microcontroller, two X-Band motion detector modules, LCD and Digi's X-CTU software. In this
design we considered one of x-band motion detector module as a radar and the second x-band motion detector
as jammer circuit which uses Doppler frequency principle and generates 10.5 GHZ frequency.
Keywords: - Radar, Jamming, Basic stamp2, X-band motion detector, Antenna, Doppler
I. INTRODUCTION
Electronic warfare (EW) is the art and science of denying enemy forces from use the electromagnetic spectrum
in our space. While preserving its use for friendly forces and it is a significant force multiplier because reduces
friendly losses by defeating or reducing the effectiveness of enemy weapons. As shown in Figure 1 EW is
commonly divided into three subfields:
a. Electronic Support (ES)
Involves receiving enemy signals to identify and locate threat emitters and to help determine the enemy's force
structure and deployment.
b. Electronic Attack (EA)
Involves measures taken to defeat enemy electronic assets. It includes jamming, chaff, directed energy weapons,
and anti radiation missiles.
c. Electronic Protection (EP)
Comprises countermeasures to enemy electronic attack. All of these concepts are applied at radar,
communication, infrared, and laser operating system.
In our study we concerned on electronic attack using jamming technique to denying enemy forces from
use the electromagnetic spectrum in our space. To accomplish this objective, both offensive electronic attack
(EA) and defensive electronic protection (EP) action are required. Electronic attack involves Defense forces and
platforms against hostile weapon, and C3 (command, control and communication) systems .Electronic attack is
a division of electronic warfare involving the use of electromagnetic energy, directed energy, or anti radiation
weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying
enemy combat capability and is considered a form of fires.
II. METHODOLOGY
Design of a Radar Jamming circuit consists of two parts:
A. Hardware components:
Microcontrollers AT mega (16)
Electronic
Warfare
Electronic
Protection
Electronic
Attack
Electronic
Support
Figure 1: Components of EW
2. Jamming on X- Band Radar
International organization of Scientific Research 9 | P a g e
The ATmega16A is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC
architecture. By executing powerful instructions in a single clock cycle, the ATmega16A achieves throughputs
approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing
speed. The ATmega16 AVR is supported with a full suite of program and system development tools including:
C compilers, macro assemblers, program debugger/simulators, in-circuit emulators, and evaluation kits a
microcontroller makes highly-accurate measurements of the frequency, which it displays on an LCD. The
microcontroller also has a serial (RS232) interface that allows connection to a PC.
X Band Motion Detector
The X Band Motion Detector is a common ingredient in security systems it’s a Doppler radar sensor
that operates in the X-band frequency at 10.525 GHz, and indicates movements with oscillations in its high/low
out put. The X Band Motion Sensor is constructed of two boards connected by posts: a control board, and the
antenna PCB with the Doppler sensor.
When the enable pin is either held high or left floating, the control board cycles the Doppler sensor’s power at 2
kHz, 4% duty cycle. The Doppler sensor’s 10.525 GHz oscillator signal is routed to the Tx antenna, and also to
a mixer diode. The mixer diode’s IF output contains signals with the sum and difference of the transmitted and
received frequencies along with components of the original signal and some harmonics.
Operation of x-band motion detector
The difference signal’s frequency that results from mixing the outgoing and returning signal
frequencies is the important component. It oscillates at a frequency corresponding to how much the returning
signal has been either compressed or stretched as a result of the Doppler Effect that an object has on the signal
as the object moves toward or away from the sensor .The difference signal’s frequency is related to the
component of the object’s speed toward or away from the sensor by this equation:
Where:
Fd = Difference frequency (sometimes referred to as Doppler frequency)
V = Velocity of the target,
Ft = Transmit frequency
c = Speed of light at 3 × 108 m/s,
θ = Motion direction angle
BASIC Stamp
The BASIC Stamp Home Work Board is ideal for learning circuits, electronics, and microcontroller
programming. The solder less breadboard makes it easy to connect 5 V compatible sensors, displays, LEDs, and
other electronic components to create the different inventions. Program in PBASIC, which is flexible to read
and learn. It is an ideal "first-time" programming language, with many built-in commands that simplify
interfacing to other devices. Microcontrollers are frequently used device in embedded computing in which the
application varies from computing, calculating, smart decision-making capabilities, and processes the data. Most
of the electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with
microcontrollers to automate a system structure. The microcontroller has a serial (RS232) interface that allows
connection to a PC. The microcontroller will stream the data a PC over the serial link. The PC will capture the
Figure 2: x-band motion detector
Fd = 2V Ft cos ɵ…........ (1)
c
3. Jamming on X- Band Radar
International organization of Scientific Research 10 | P a g e
software using terminal-emulation software. The microcontroller will stream the measured line frequency to the
PC over the serial link.
Circuit design
The radar jamming design concept for this research is divided into two parts as shown in Figure 3.
B. Software
It is assumed that the number of pulses represent the range to the target .The principle of algorithm in figure 5
is based on comparing the number of pulses received by x-band module .If the number of pulses detected
differs then expect it .if the same is detected jamming takes place.
Figure 3: Block diagram for radar jamming system
4. Jamming on X- Band Radar
International organization of Scientific Research 11 | P a g e
III. RESULT
According to the block diagram in figure 3, the jamming module affects on the operation
of the radar module (x-band motion detector).As illustrated in table 1 the number of pulses (values) differ when
the x-band module is jammed.
Table 1: Out put of x-band motion detector
Normal detected pulses (values) jamming detected pulses comments
5 3 Jamming occurred
11 6 Jamming occurred
17 9 Jamming occurred
0 0 No pulses
IV. CONCLUSION
From the results, use an active jammer technique is denying the use of the radar spectrum successfully.
It depends on many factors, including the distance between the radar and the jammer. The system also requires
evaluations that focus on the behavior of the operators of the victim systems. The specific RF output of the
technique should be measured to ensure that the frequency, timing, amplitude, and pulse characteristics are
consistent with the intended jamming technique.
REFERENCES
[1] Merrill I. Skolnik, “Introduction to Radar system”, second ed. UnitedState, McGraw-Hill, lnc, 980. P: 7,
19, 23, 47-56,152,226,227,460.
5. Jamming on X- Band Radar
International organization of Scientific Research 12 | P a g e
[2] Richard A.Poisel, “Introduction to Communication electronic warfare system”, Boston.London, Artech
House, 2002, P: 189,449,509.
[3] Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from
http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and
distributor of Basic Stamp 2 microcontroller .
[4] www.rambal.com/.../x-band.../32213-XBandMotionDetector-v1.0.pdf
[5] Mugu, “Electronic warfare and Radar systems Engineering Handbook”, Washington D.C, April 1999,
section 4-4.5, 4-7.5, 4-.1, 4-10.1.
[6] Martin Welch, “Electronic Warfare Technical Expert”, 771 TS/EWAP,30Hoglan Avenue Edwards AFB,
CA93524, USA,2012
[7] Mike Pywell, “Electronic Warfare Technologist”, Warton, PrestonPR4 1AX,UK,2012
[8] Mourad Barkal,”Signal Detection and Estimation”, Second edition, Boston/London,Artech House, 2005,
P: 99-105, 348.