Electronic Warfare

Simulation of Radar Modulation Estimation Using Curvelet Transform for EW Applications

Abstract:

State-of-the-art distributed system development with low power specifications is especially required for different applications. Ultra-wideband radar (UWB), Multi Input Multi Output radar (MIMO), and cognitive-based radar technology are the current trends in modern radar systems. Current EW systems are developed with digital receiver technology using Nyquist Sampling. Radar modulation recognition and correct radar identification are essential requirements for EW receiver systems. The radar signal acquisition through compressed sensing and reducing the number of samples using sub-Nyquist sampling play a vital role in EW systems. Random Modulator pre-integrator (RMPI) is a current concept for extracting waveforms with dominant base vectors. RMPI explores the structural and geometrical properties of the signal apart from traditional time and frequency domain analysis for improved identification. The Curvelet transform-based RMPI methodology is an inverse problem with exceptionally fewer measurements.

Information Warfare and Critical Infrastructure: The Combined Power of Information Warfare Threats

Abstract:

Critical Infrastructure (CI) is an area that has historically been rife with vulnerabilities, open to foreign and domestic threats. Recent events such as the Colonial Pipeline and JBS Foods provider ransomware attacks highlight the need for better security and resiliency from cyber threats. However, within the Information Warfare (IW) constructs that have become increasingly refined by peer adversaries like China and Russia, the areas of Electromagnetic Warfare (EW), Intelligence, Surveillance, and Reconnaissance (ISR), and Information Operations (IO) have become equally important to consider in the panoply of IW. This raises the important question regarding whether CI assets are adequately protected from the full complement of IW threats. Each IW area will be discussed from a threat perspective and examples will be presented to show how these threats can be combined to disrupt, deny, and destroy CI and CI assets with special attention given to peer and non-peer adversaries and the asymmetric advantages of each.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com