MILCOM 2008 - 2008 IEEE Military Communications Conference 2008
DOI: 10.1109/milcom.2008.4753273
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis and simulation of cyclic code-shift keying

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 7 publications
0
11
0
1
Order By: Relevance
“…In this paper, the    which is a tight upper bound of the channel symbol error probability from the analytical results is used to analyze the performance of JTIDS [15] . The probability of channel symbol error according to the presence of jamming is given by (9).…”
Section: Performance Analysis Of Pbn Jammingmentioning
confidence: 99%
“…In this paper, the    which is a tight upper bound of the channel symbol error probability from the analytical results is used to analyze the performance of JTIDS [15] . The probability of channel symbol error according to the presence of jamming is given by (9).…”
Section: Performance Analysis Of Pbn Jammingmentioning
confidence: 99%
“…Between adjacent pulses, the interval of the selected frequency is greater than or equal to 30 MHz [6]. In practice, JTIDS hopping points are distributed in the three bands, namely 969 MHz to 1008 MHz (14 frequency points), 1053 MHz to 1065 MHz (5 frequency points), and 1113 MHz to 206 MHz (32 frequency points) [2].…”
Section: Direct Sequence Spread Spectrum and Frequency-mentioning
confidence: 99%
“…The single-pulse architecture sacrifices security and jam resistance for an increased data rate. JTIDS uses Reed Solomon (RS) coding, providing secure, jam resistant, digital data communication [5]. The modulation technique used in JTIDS is cyclical code-shift keying (CCSK).…”
Section: Introductionmentioning
confidence: 99%