XII Conference on Reconnaissance and Electronic Warfare Systems 2019
DOI: 10.1117/12.2525026
|View full text |Cite
|
Sign up to set email alerts
|

Method of synthesis of signal-code constructions for secretive noise-proof data transmission radio systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…There are well-known approaches to partially solve the problems stated above. They consist of using radio signals with complex types of modulation [1][2][3][4][5][6], or combining single measurements from different radars [1], [7][8] in order to obtain a desired effect in a multi-position radar system (MPRS).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are well-known approaches to partially solve the problems stated above. They consist of using radio signals with complex types of modulation [1][2][3][4][5][6], or combining single measurements from different radars [1], [7][8] in order to obtain a desired effect in a multi-position radar system (MPRS).…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, an approach to solve the above contradiction is proposed. It involves using modular code binary sequences (CBSs) in radars with structures optimized by the criteria of secrecy and noise immunity [1], [4][5][6], but with ambiguous estimation of the radar-target distance. Additionally, the approach involves the joint processing of ambiguous measurements of each of the radars, and on this basis, getting unambiguous estimates of the target coordinates.…”
Section: Introductionmentioning
confidence: 99%
“…A number of publications have been devoted to the search for compromises and appropriate methods and algorithms [9,10,13,15,16,[18][19][20][21][22][23]. Among them, the paper [10] proposes an approach that is based on the analysis of the structure of BS set using the theory of groups and algorithms such as "branch and bound".…”
Section: Introductionmentioning
confidence: 99%