2002
DOI: 10.1109/tsp.2002.1011196
|View full text |Cite
|
Sign up to set email alerts
|

Direction finding in the presence of an intermittent interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…An attacker, which transmits a jamming signal from time to time for the sake of interfering with the legitimate communications, is referred to as an intermittent jammer [170]. The intermittent jammer transmits for a certain time and then sleeps for the remaining time.…”
Section: B Intermittent Jammermentioning
confidence: 99%
“…An attacker, which transmits a jamming signal from time to time for the sake of interfering with the legitimate communications, is referred to as an intermittent jammer [170]. The intermittent jammer transmits for a certain time and then sleeps for the remaining time.…”
Section: B Intermittent Jammermentioning
confidence: 99%
“…Here, the auxiliary signal is defined as independent from all the sources and noise. Thus, we define a new covariance matrix D on the basis of the array output covariance matrix R in (12):…”
Section: Joint Doa and Polarization Estimation Based On Ipns Tomentioning
confidence: 99%
“…From (12), (14), and (15), the noise powers (variance) evidently determine the noise subspace eigenvalues. According to (19) and (20), the auxiliary signal just affects the th element in the diagonal of R only and has no extra effect on the others.…”
Section: Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…Such interference may appear either as an endogenous characteristic of the underlying communication system, as for example in frequency-hopped spread-spectrum systems [27], or as an exogenous factor (e.g., jamming). In cases of such snapshot corruption, L2-PC-based methods are well known to suffer from significant performance degradation [28][29][30]. The reason is that, as squared error-fitting minimizers, L2-PCs respond strongly to corrupted snapshots that appear in the processed data matrix as points that lie far from the nominal signal subspace [29].…”
Section: Introductionmentioning
confidence: 99%