DocumentCode
3257036
Title
ECM techniques generator
Author
McGrath, Mike ; Marshall, Pat
Author_Institution
AFRL/IFTA, Wright Patterson Air Force Base, USA
fYear
2005
fDate
7-10 Aug. 2005
Firstpage
1749
Abstract
The continuous implementation of new and improved electronic counter measure/electronic counter-counter measure (ECM/ECCM) techniques has always been an information technology battle ever since their inception during WWII. The outcomes of various information exploitation experiments are vital in protecting both manned and unmanned airborne platforms. The development of jamming waveforms and ECM techniques are based upon the exploitation data and circuit analysis of various threat hardware and firmware. Unfortunately these current manual methods are very time consuming and nontrivial. Vast resources are allocated just to the setup and investigation/evaluation of a particular system´s circuit design. Several very complex information technology exploitation tests must also be executed for the purpose of deriving basis waveforms from the resultant empirical data. Since the results are empirical and not optimized, additional problems may arise at a later date. Consequently, the use of genetic algorithms (GAs) executing inside special signal-processing platforms that are integrated into existing ECM/ECCM testing systems may offer an innovative computational approach/solution in the development of optimized jamming information technology waveforms and techniques. If successful, the time required for developing these techniques could possibly be reduced from years to days if not hours.
Keywords
electronic countermeasures; genetic algorithms; information theory; jamming; military computing; waveform generators; ECM techniques generator; ECM-ECCM; airborne platform; circuit analysis; circuit design; electronic counter measure; electronic counter-counter measure; genetic algorithms; information exploitation; jamming information technology waveforms; jamming waveforms; signal-processing platforms; testing system; threat firmware; threat hardware; Circuit analysis; Counting circuits; Electrochemical machining; Electronic countermeasures; Hardware; Information technology; Jamming; Microprogramming; Protection; Resource management;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuits and Systems, 2005. 48th Midwest Symposium on
Print_ISBN
0-7803-9197-7
Type
conf
DOI
10.1109/MWSCAS.2005.1594459
Filename
1594459
Link To Document