SlideShare a Scribd company logo
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 04, Issue 04 (April. 2014), ||V2|| PP 08-12
International organization of Scientific Research 8 | P a g e
Jamming on X- Band Radar
Mahmoud Yahia Hussein, AbdelrasoulJabar Alzubaidi
1, Department Of Electronics Engineering, 1SudanAcademy Of Sciences
2,Electronics Engineering School, Sudan University Of science And technology
Abstract: - Radar jamming is the intentional emission of radio frequency signals to interfere with the operation
of a radar by saturating its receiver with noise or false information. In this paper jamming technique is used to
jam x-band radar frequency. To accomplish this goal it's proposed to design circuit using Basic Stamp,
ATmega16 Microcontroller, two X-Band motion detector modules, LCD and Digi's X-CTU software. In this
design we considered one of x-band motion detector module as a radar and the second x-band motion detector
as jammer circuit which uses Doppler frequency principle and generates 10.5 GHZ frequency.
Keywords: - Radar, Jamming, Basic stamp2, X-band motion detector, Antenna, Doppler
I. INTRODUCTION
Electronic warfare (EW) is the art and science of denying enemy forces from use the electromagnetic spectrum
in our space. While preserving its use for friendly forces and it is a significant force multiplier because reduces
friendly losses by defeating or reducing the effectiveness of enemy weapons. As shown in Figure 1 EW is
commonly divided into three subfields:
a. Electronic Support (ES)
Involves receiving enemy signals to identify and locate threat emitters and to help determine the enemy's force
structure and deployment.
b. Electronic Attack (EA)
Involves measures taken to defeat enemy electronic assets. It includes jamming, chaff, directed energy weapons,
and anti radiation missiles.
c. Electronic Protection (EP)
Comprises countermeasures to enemy electronic attack. All of these concepts are applied at radar,
communication, infrared, and laser operating system.
In our study we concerned on electronic attack using jamming technique to denying enemy forces from
use the electromagnetic spectrum in our space. To accomplish this objective, both offensive electronic attack
(EA) and defensive electronic protection (EP) action are required. Electronic attack involves Defense forces and
platforms against hostile weapon, and C3 (command, control and communication) systems .Electronic attack is
a division of electronic warfare involving the use of electromagnetic energy, directed energy, or anti radiation
weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying
enemy combat capability and is considered a form of fires.
II. METHODOLOGY
Design of a Radar Jamming circuit consists of two parts:
A. Hardware components:
Microcontrollers AT mega (16)
Electronic
Warfare
Electronic
Protection
Electronic
Attack
Electronic
Support
Figure 1: Components of EW
Jamming on X- Band Radar
International organization of Scientific Research 9 | P a g e
The ATmega16A is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC
architecture. By executing powerful instructions in a single clock cycle, the ATmega16A achieves throughputs
approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing
speed. The ATmega16 AVR is supported with a full suite of program and system development tools including:
C compilers, macro assemblers, program debugger/simulators, in-circuit emulators, and evaluation kits a
microcontroller makes highly-accurate measurements of the frequency, which it displays on an LCD. The
microcontroller also has a serial (RS232) interface that allows connection to a PC.
X Band Motion Detector
The X Band Motion Detector is a common ingredient in security systems it’s a Doppler radar sensor
that operates in the X-band frequency at 10.525 GHz, and indicates movements with oscillations in its high/low
out put. The X Band Motion Sensor is constructed of two boards connected by posts: a control board, and the
antenna PCB with the Doppler sensor.
When the enable pin is either held high or left floating, the control board cycles the Doppler sensor’s power at 2
kHz, 4% duty cycle. The Doppler sensor’s 10.525 GHz oscillator signal is routed to the Tx antenna, and also to
a mixer diode. The mixer diode’s IF output contains signals with the sum and difference of the transmitted and
received frequencies along with components of the original signal and some harmonics.
Operation of x-band motion detector
The difference signal’s frequency that results from mixing the outgoing and returning signal
frequencies is the important component. It oscillates at a frequency corresponding to how much the returning
signal has been either compressed or stretched as a result of the Doppler Effect that an object has on the signal
as the object moves toward or away from the sensor .The difference signal’s frequency is related to the
component of the object’s speed toward or away from the sensor by this equation:
Where:
Fd = Difference frequency (sometimes referred to as Doppler frequency)
V = Velocity of the target,
Ft = Transmit frequency
c = Speed of light at 3 × 108 m/s,
θ = Motion direction angle
BASIC Stamp
The BASIC Stamp Home Work Board is ideal for learning circuits, electronics, and microcontroller
programming. The solder less breadboard makes it easy to connect 5 V compatible sensors, displays, LEDs, and
other electronic components to create the different inventions. Program in PBASIC, which is flexible to read
and learn. It is an ideal "first-time" programming language, with many built-in commands that simplify
interfacing to other devices. Microcontrollers are frequently used device in embedded computing in which the
application varies from computing, calculating, smart decision-making capabilities, and processes the data. Most
of the electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with
microcontrollers to automate a system structure. The microcontroller has a serial (RS232) interface that allows
connection to a PC. The microcontroller will stream the data a PC over the serial link. The PC will capture the
Figure 2: x-band motion detector
Fd = 2V Ft cos ɵ…........ (1)
c
Jamming on X- Band Radar
International organization of Scientific Research 10 | P a g e
software using terminal-emulation software. The microcontroller will stream the measured line frequency to the
PC over the serial link.
Circuit design
The radar jamming design concept for this research is divided into two parts as shown in Figure 3.
B. Software
It is assumed that the number of pulses represent the range to the target .The principle of algorithm in figure 5
is based on comparing the number of pulses received by x-band module .If the number of pulses detected
differs then expect it .if the same is detected jamming takes place.
Figure 3: Block diagram for radar jamming system
Jamming on X- Band Radar
International organization of Scientific Research 11 | P a g e
III. RESULT
According to the block diagram in figure 3, the jamming module affects on the operation
of the radar module (x-band motion detector).As illustrated in table 1 the number of pulses (values) differ when
the x-band module is jammed.
Table 1: Out put of x-band motion detector
Normal detected pulses (values) jamming detected pulses comments
5 3 Jamming occurred
11 6 Jamming occurred
17 9 Jamming occurred
0 0 No pulses
IV. CONCLUSION
From the results, use an active jammer technique is denying the use of the radar spectrum successfully.
It depends on many factors, including the distance between the radar and the jammer. The system also requires
evaluations that focus on the behavior of the operators of the victim systems. The specific RF output of the
technique should be measured to ensure that the frequency, timing, amplitude, and pulse characteristics are
consistent with the intended jamming technique.
REFERENCES
[1] Merrill I. Skolnik, “Introduction to Radar system”, second ed. UnitedState, McGraw-Hill, lnc, 980. P: 7,
19, 23, 47-56,152,226,227,460.
Jamming on X- Band Radar
International organization of Scientific Research 12 | P a g e
[2] Richard A.Poisel, “Introduction to Communication electronic warfare system”, Boston.London, Artech
House, 2002, P: 189,449,509.
[3] Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from
http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and
distributor of Basic Stamp 2 microcontroller .
[4] www.rambal.com/.../x-band.../32213-XBandMotionDetector-v1.0.pdf‎
[5] Mugu, “Electronic warfare and Radar systems Engineering Handbook”, Washington D.C, April 1999,
section 4-4.5, 4-7.5, 4-.1, 4-10.1.
[6] Martin Welch, “Electronic Warfare Technical Expert”, 771 TS/EWAP,30Hoglan Avenue Edwards AFB,
CA93524, USA,2012
[7] Mike Pywell, “Electronic Warfare Technologist”, Warton, PrestonPR4 1AX,UK,2012
[8] Mourad Barkal,”Signal Detection and Estimation”, Second edition, Boston/London,Artech House, 2005,
P: 99-105, 348.

More Related Content

What's hot

IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET Journal
 
Case study of wireless sensor network
Case study of wireless sensor networkCase study of wireless sensor network
Case study of wireless sensor network
Sushil Aggarwal
 
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY PiULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
International Journal of Technical Research & Application
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET Journal
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
Jahan Zeb Xebi
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET Journal
 
Benefits of enhanced event analysis in datacenter otdr testing
Benefits of enhanced event analysis in datacenter otdr testingBenefits of enhanced event analysis in datacenter otdr testing
Benefits of enhanced event analysis in datacenter otdr testing
FangXuIEEE
 
IRJET- IoT based Fault Finding of an Underground Cable
IRJET-  	  IoT based Fault Finding of an Underground CableIRJET-  	  IoT based Fault Finding of an Underground Cable
IRJET- IoT based Fault Finding of an Underground Cable
IRJET Journal
 
Precision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location SystemsPrecision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location Systems
Peter Batty
 
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio NetworksIRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET Journal
 
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI EngineersEXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
SPI Engineers
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Manoj BN
 
First introduction to wireless sensor networks
First introduction to wireless sensor networksFirst introduction to wireless sensor networks
First introduction to wireless sensor networks
PlusOrMinusZero
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
Filantropi Event Management
 
ppt on Smart antennas
ppt on Smart antennasppt on Smart antennas
ppt on Smart antennas
Ritesh Kumar
 
Testing and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesTesting and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesLiving Online
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 

What's hot (20)

IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
 
Ijetcas14 443
Ijetcas14 443Ijetcas14 443
Ijetcas14 443
 
Case study of wireless sensor network
Case study of wireless sensor networkCase study of wireless sensor network
Case study of wireless sensor network
 
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY PiULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
ULTRASONIC PERIPATETIC SCANNER FOR AUTONOMOUS TEST BENCH USING RASPBERRY Pi
 
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using AudioIRJET - Gesture based Robot with Victim Detection using Audio
IRJET - Gesture based Robot with Victim Detection using Audio
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Security issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networksSecurity issues and solution in wireless sensor networks
Security issues and solution in wireless sensor networks
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
 
Benefits of enhanced event analysis in datacenter otdr testing
Benefits of enhanced event analysis in datacenter otdr testingBenefits of enhanced event analysis in datacenter otdr testing
Benefits of enhanced event analysis in datacenter otdr testing
 
IRJET- IoT based Fault Finding of an Underground Cable
IRJET-  	  IoT based Fault Finding of an Underground CableIRJET-  	  IoT based Fault Finding of an Underground Cable
IRJET- IoT based Fault Finding of an Underground Cable
 
Precision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location SystemsPrecision (Indoor) Real Time Location Systems
Precision (Indoor) Real Time Location Systems
 
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio NetworksIRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
IRJET- A Novel Technique for Spectrum Sensing in Cognitive Radio Networks
 
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI EngineersEXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
EXFO Maxtester 715B Single-mode Handheld OTDR – SPI Engineers
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
First introduction to wireless sensor networks
First introduction to wireless sensor networksFirst introduction to wireless sensor networks
First introduction to wireless sensor networks
 
Backscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA DeviceBackscattering Control Logic Component using FPGA Device
Backscattering Control Logic Component using FPGA Device
 
ppt on Smart antennas
ppt on Smart antennasppt on Smart antennas
ppt on Smart antennas
 
Testing and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic CablesTesting and Troubleshooting Fiber Optic Cables
Testing and Troubleshooting Fiber Optic Cables
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to B04420812

J010234960
J010234960J010234960
J010234960
IOSR Journals
 
A Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
A Multistatic Microwave Radar Sensor for Short Range Anticollision WarningA Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
A Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
Luigi Giubbolini
 
A wearable UHF RFID tag antenna-based metamaterial for biomedical applications
A wearable UHF RFID tag antenna-based metamaterial for biomedical applicationsA wearable UHF RFID tag antenna-based metamaterial for biomedical applications
A wearable UHF RFID tag antenna-based metamaterial for biomedical applications
journalBEEI
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino Uno
IRJET Journal
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
IOSR Journals
 
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEWIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
Eng.Manfred Kibona
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
Iaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security systemIaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security system
Iaetsd Iaetsd
 
D09281524
D09281524D09281524
D09281524
eieiswe
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
IRJET Journal
 
A novel fast time jamming analysis transmission selection technique for radar...
A novel fast time jamming analysis transmission selection technique for radar...A novel fast time jamming analysis transmission selection technique for radar...
A novel fast time jamming analysis transmission selection technique for radar...
IJECEIAES
 
IOT ASSET TRACKING SYSTEM
IOT ASSET TRACKING SYSTEMIOT ASSET TRACKING SYSTEM
IOT ASSET TRACKING SYSTEM
IRJET Journal
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
Nilgiri publicity
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
IAEME Publication
 
Iaetsd real time implementation of railway
Iaetsd real time implementation of railwayIaetsd real time implementation of railway
Iaetsd real time implementation of railway
Iaetsd Iaetsd
 
IRJET- Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
IRJET-  	  Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)IRJET-  	  Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
IRJET- Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...
eSAT Journals
 
Analysis and Construction of a Robot controlled by a Universal Remote Control
Analysis and Construction of a Robot controlled by a Universal Remote ControlAnalysis and Construction of a Robot controlled by a Universal Remote Control
Analysis and Construction of a Robot controlled by a Universal Remote Control
IJERD Editor
 

Similar to B04420812 (20)

J010234960
J010234960J010234960
J010234960
 
A Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
A Multistatic Microwave Radar Sensor for Short Range Anticollision WarningA Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
A Multistatic Microwave Radar Sensor for Short Range Anticollision Warning
 
A wearable UHF RFID tag antenna-based metamaterial for biomedical applications
A wearable UHF RFID tag antenna-based metamaterial for biomedical applicationsA wearable UHF RFID tag antenna-based metamaterial for biomedical applications
A wearable UHF RFID tag antenna-based metamaterial for biomedical applications
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino Uno
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
 
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEWIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Iaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security systemIaetsd ethernet based intelligent security system
Iaetsd ethernet based intelligent security system
 
D09281524
D09281524D09281524
D09281524
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
A novel fast time jamming analysis transmission selection technique for radar...
A novel fast time jamming analysis transmission selection technique for radar...A novel fast time jamming analysis transmission selection technique for radar...
A novel fast time jamming analysis transmission selection technique for radar...
 
IOT ASSET TRACKING SYSTEM
IOT ASSET TRACKING SYSTEMIOT ASSET TRACKING SYSTEM
IOT ASSET TRACKING SYSTEM
 
robotics and embedded system ppt
robotics and embedded system pptrobotics and embedded system ppt
robotics and embedded system ppt
 
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLEPROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
PROMINENT NAVIGATION FOR VISUALLY IMPAIRED PEOPLE
 
Iaetsd real time implementation of railway
Iaetsd real time implementation of railwayIaetsd real time implementation of railway
Iaetsd real time implementation of railway
 
IRJET- Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
IRJET-  	  Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)IRJET-  	  Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
IRJET- Obstacle Detection using Ultrasonic Sensor in MAV (Micro Air Vehicle)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...Improved performance of scs based spectrum sensing in cognitive radio using d...
Improved performance of scs based spectrum sensing in cognitive radio using d...
 
Analysis and Construction of a Robot controlled by a Universal Remote Control
Analysis and Construction of a Robot controlled by a Universal Remote ControlAnalysis and Construction of a Robot controlled by a Universal Remote Control
Analysis and Construction of a Robot controlled by a Universal Remote Control
 

More from IOSR-JEN

C05921721
C05921721C05921721
C05921721
IOSR-JEN
 
B05921016
B05921016B05921016
B05921016
IOSR-JEN
 
A05920109
A05920109A05920109
A05920109
IOSR-JEN
 
J05915457
J05915457J05915457
J05915457
IOSR-JEN
 
I05914153
I05914153I05914153
I05914153
IOSR-JEN
 
H05913540
H05913540H05913540
H05913540
IOSR-JEN
 
G05913234
G05913234G05913234
G05913234
IOSR-JEN
 
F05912731
F05912731F05912731
F05912731
IOSR-JEN
 
E05912226
E05912226E05912226
E05912226
IOSR-JEN
 
D05911621
D05911621D05911621
D05911621
IOSR-JEN
 
C05911315
C05911315C05911315
C05911315
IOSR-JEN
 
B05910712
B05910712B05910712
B05910712
IOSR-JEN
 
A05910106
A05910106A05910106
A05910106
IOSR-JEN
 
B05840510
B05840510B05840510
B05840510
IOSR-JEN
 
I05844759
I05844759I05844759
I05844759
IOSR-JEN
 
H05844346
H05844346H05844346
H05844346
IOSR-JEN
 
G05843942
G05843942G05843942
G05843942
IOSR-JEN
 
F05843238
F05843238F05843238
F05843238
IOSR-JEN
 
E05842831
E05842831E05842831
E05842831
IOSR-JEN
 
D05842227
D05842227D05842227
D05842227
IOSR-JEN
 

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

B04420812

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 04 (April. 2014), ||V2|| PP 08-12 International organization of Scientific Research 8 | P a g e Jamming on X- Band Radar Mahmoud Yahia Hussein, AbdelrasoulJabar Alzubaidi 1, Department Of Electronics Engineering, 1SudanAcademy Of Sciences 2,Electronics Engineering School, Sudan University Of science And technology Abstract: - Radar jamming is the intentional emission of radio frequency signals to interfere with the operation of a radar by saturating its receiver with noise or false information. In this paper jamming technique is used to jam x-band radar frequency. To accomplish this goal it's proposed to design circuit using Basic Stamp, ATmega16 Microcontroller, two X-Band motion detector modules, LCD and Digi's X-CTU software. In this design we considered one of x-band motion detector module as a radar and the second x-band motion detector as jammer circuit which uses Doppler frequency principle and generates 10.5 GHZ frequency. Keywords: - Radar, Jamming, Basic stamp2, X-band motion detector, Antenna, Doppler I. INTRODUCTION Electronic warfare (EW) is the art and science of denying enemy forces from use the electromagnetic spectrum in our space. While preserving its use for friendly forces and it is a significant force multiplier because reduces friendly losses by defeating or reducing the effectiveness of enemy weapons. As shown in Figure 1 EW is commonly divided into three subfields: a. Electronic Support (ES) Involves receiving enemy signals to identify and locate threat emitters and to help determine the enemy's force structure and deployment. b. Electronic Attack (EA) Involves measures taken to defeat enemy electronic assets. It includes jamming, chaff, directed energy weapons, and anti radiation missiles. c. Electronic Protection (EP) Comprises countermeasures to enemy electronic attack. All of these concepts are applied at radar, communication, infrared, and laser operating system. In our study we concerned on electronic attack using jamming technique to denying enemy forces from use the electromagnetic spectrum in our space. To accomplish this objective, both offensive electronic attack (EA) and defensive electronic protection (EP) action are required. Electronic attack involves Defense forces and platforms against hostile weapon, and C3 (command, control and communication) systems .Electronic attack is a division of electronic warfare involving the use of electromagnetic energy, directed energy, or anti radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires. II. METHODOLOGY Design of a Radar Jamming circuit consists of two parts: A. Hardware components: Microcontrollers AT mega (16) Electronic Warfare Electronic Protection Electronic Attack Electronic Support Figure 1: Components of EW
  • 2. Jamming on X- Band Radar International organization of Scientific Research 9 | P a g e The ATmega16A is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega16A achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The ATmega16 AVR is supported with a full suite of program and system development tools including: C compilers, macro assemblers, program debugger/simulators, in-circuit emulators, and evaluation kits a microcontroller makes highly-accurate measurements of the frequency, which it displays on an LCD. The microcontroller also has a serial (RS232) interface that allows connection to a PC. X Band Motion Detector The X Band Motion Detector is a common ingredient in security systems it’s a Doppler radar sensor that operates in the X-band frequency at 10.525 GHz, and indicates movements with oscillations in its high/low out put. The X Band Motion Sensor is constructed of two boards connected by posts: a control board, and the antenna PCB with the Doppler sensor. When the enable pin is either held high or left floating, the control board cycles the Doppler sensor’s power at 2 kHz, 4% duty cycle. The Doppler sensor’s 10.525 GHz oscillator signal is routed to the Tx antenna, and also to a mixer diode. The mixer diode’s IF output contains signals with the sum and difference of the transmitted and received frequencies along with components of the original signal and some harmonics. Operation of x-band motion detector The difference signal’s frequency that results from mixing the outgoing and returning signal frequencies is the important component. It oscillates at a frequency corresponding to how much the returning signal has been either compressed or stretched as a result of the Doppler Effect that an object has on the signal as the object moves toward or away from the sensor .The difference signal’s frequency is related to the component of the object’s speed toward or away from the sensor by this equation: Where: Fd = Difference frequency (sometimes referred to as Doppler frequency) V = Velocity of the target, Ft = Transmit frequency c = Speed of light at 3 × 108 m/s, θ = Motion direction angle BASIC Stamp The BASIC Stamp Home Work Board is ideal for learning circuits, electronics, and microcontroller programming. The solder less breadboard makes it easy to connect 5 V compatible sensors, displays, LEDs, and other electronic components to create the different inventions. Program in PBASIC, which is flexible to read and learn. It is an ideal "first-time" programming language, with many built-in commands that simplify interfacing to other devices. Microcontrollers are frequently used device in embedded computing in which the application varies from computing, calculating, smart decision-making capabilities, and processes the data. Most of the electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with microcontrollers to automate a system structure. The microcontroller has a serial (RS232) interface that allows connection to a PC. The microcontroller will stream the data a PC over the serial link. The PC will capture the Figure 2: x-band motion detector Fd = 2V Ft cos ɵ…........ (1) c
  • 3. Jamming on X- Band Radar International organization of Scientific Research 10 | P a g e software using terminal-emulation software. The microcontroller will stream the measured line frequency to the PC over the serial link. Circuit design The radar jamming design concept for this research is divided into two parts as shown in Figure 3. B. Software It is assumed that the number of pulses represent the range to the target .The principle of algorithm in figure 5 is based on comparing the number of pulses received by x-band module .If the number of pulses detected differs then expect it .if the same is detected jamming takes place. Figure 3: Block diagram for radar jamming system
  • 4. Jamming on X- Band Radar International organization of Scientific Research 11 | P a g e III. RESULT According to the block diagram in figure 3, the jamming module affects on the operation of the radar module (x-band motion detector).As illustrated in table 1 the number of pulses (values) differ when the x-band module is jammed. Table 1: Out put of x-band motion detector Normal detected pulses (values) jamming detected pulses comments 5 3 Jamming occurred 11 6 Jamming occurred 17 9 Jamming occurred 0 0 No pulses IV. CONCLUSION From the results, use an active jammer technique is denying the use of the radar spectrum successfully. It depends on many factors, including the distance between the radar and the jammer. The system also requires evaluations that focus on the behavior of the operators of the victim systems. The specific RF output of the technique should be measured to ensure that the frequency, timing, amplitude, and pulse characteristics are consistent with the intended jamming technique. REFERENCES [1] Merrill I. Skolnik, “Introduction to Radar system”, second ed. UnitedState, McGraw-Hill, lnc, 980. P: 7, 19, 23, 47-56,152,226,227,460.
  • 5. Jamming on X- Band Radar International organization of Scientific Research 12 | P a g e [2] Richard A.Poisel, “Introduction to Communication electronic warfare system”, Boston.London, Artech House, 2002, P: 189,449,509. [3] Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and distributor of Basic Stamp 2 microcontroller . [4] www.rambal.com/.../x-band.../32213-XBandMotionDetector-v1.0.pdf‎ [5] Mugu, “Electronic warfare and Radar systems Engineering Handbook”, Washington D.C, April 1999, section 4-4.5, 4-7.5, 4-.1, 4-10.1. [6] Martin Welch, “Electronic Warfare Technical Expert”, 771 TS/EWAP,30Hoglan Avenue Edwards AFB, CA93524, USA,2012 [7] Mike Pywell, “Electronic Warfare Technologist”, Warton, PrestonPR4 1AX,UK,2012 [8] Mourad Barkal,”Signal Detection and Estimation”, Second edition, Boston/London,Artech House, 2005, P: 99-105, 348.