Ew 101: A First Course in Electronic Warfare

Introduction. Basic Mathematical Concepts - dB Values and Equations. The Link Equation for ALL EW Functions. Link Issues in Practical EW Applications. Relations in Sherical Triangles. EW Applications of Spherical Trigonometry. Antennas - Antenna Parameters and Definitions. Types of Antennas. Parameter Tradeoffs in Parabolic Antennas. Phased Array Antennas. Receivers - Crystal Video Receiver. IFM Receiver. Tuned Radio Frequency Receiver. Superheterodyne Receiver. Fixed Tuned Receiver. Channelized Receiver. Bragg Cell Receiver. Compressive Receiver. Digital Recievers. Receiver Systems. Receiver Sensitivity. FM Sensitivity. Digital Sensitivity. EW Processing - Processing Tasks. Determining Values of Parameters. Deinterleaving. Operator Interface. Modern Aircraft Operator Interface. Operator Interface in Tactical ESM Systems. Search - Definitions and Parametric Constraints. Narrowband Frequency Search Strategies. The Signal Environment. Look-Through. LPI Signals - Low-Probability-of Intercept Signals. Frequency-Hopping Signals. Chirp Signals. Direct-Sequence Spread-Spectrum Signals. Some Real-World Considerations. Emitter Location - The Role of Emitter Location. Emitter Location Geometry. Emitter Location Accuracy. Amplitude-Based Emitter Location. Interferometer Direction Finding. Interferometric DF Implementation. Direction Finding Using the Doppler Principle. Time of Arrival Emitter Location. Jamming - Classifications of Jamming. Jamming-to-Signal Ratio. Burn-Through. Cover Jamming. Range Deceptive Jamming. Inverse Gain Jamming. AGC Jamming. Velocity Gate Pull-Off. Deceptive Techniques Against Monopulse Radars. Decoys - Types of Decoys. RCS and Reflected Power. Passive Decoys. Active Decoys. Saturation Decoys. Seduction Decoys. Effective RCS Through an Engagement. Simulation - Definitions. Computer Simulation. Engagement Scenario Model. Operation Interface Simulation. Practical Considerations in Operator Interface Simulation. Emulation. Antenna Emulation. Receiver Emulation. Threat Emulation. Threat Antenna-Pattern Emulation. Multiple-Signal Emulation. Appendix A. About the Author. Index.