A study of ECCM techniques and their performance

Ahmed Abdalla, Zhao Yuan, Sowah Nii Longdon, Joyce Chelangate Bore, Tang Bin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

In this paper, Electronic counter countermeasure (ECCM) techniques that are utilized against active deception jamming Electronic countermeasure (ECM) are studied. Firstly, these schemes are classified into two groups according to the ECM threat: techniques which are used to counter the range false targets and techniques to counter the range-velocity Gate Stealers deception jamming. Secondly, the pros and cons of these schemes are highlighted and compared under different viewpoints. Thirdly, we analyze the performance of these schemes, and we propose new directions based on the insightful analysis of the existing work. This paper can greatly enhance understanding of the basic concepts of ECCM electronic welfare (EW) to counter active deception jamming.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479989188
DOIs
Publication statusPublished - 25 Nov 2015
Externally publishedYes
Event5th IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2015 - Ningbo, Zhejiang
Duration: 19 Sep 201522 Sep 2015

Publication series

Name2015 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2015

Conference

Conference5th IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2015
Country/TerritoryChina
CityNingbo, Zhejiang
Period19/09/1522/09/15

Keywords

  • Active Deception Jamming (ADJ)
  • Digital Radio Frequency Memory (DRFM)
  • Electronic counter countermeasure (ECCM)

Fingerprint

Dive into the research topics of 'A study of ECCM techniques and their performance'. Together they form a unique fingerprint.

Cite this