期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Cognitive Jammers Assisted Covert Communication in Cognitive Radio Networks
1
作者 Liu Changjun Shi Jia +1 位作者 Tie Zhuangzhuang Wang Yongchao 《China Communications》 SCIE CSCD 2024年第9期75-89,共15页
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r... In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance. 展开更多
关键词 cognitive jammer cognitive radio covert communication performance analysis
下载PDF
Effects of long-term exposure to radiofrequency radiations emitted by mobile Jammers on reproduction parameters in rats 被引量:1
2
作者 Maryam Owjfard Manzarbanoo Shojaei Fard 《Asian pacific Journal of Reproduction》 2017年第4期164-171,共8页
Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), im... Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), immature group (n=30) and mature group (n=30). Neonatal rats were randomly divided into two subgroups. Immature and mature rats were randomly divided into three subgroups. Experimental rats were fixed in the restraining tube and were exposed to radiofrequency radiations emitted from mobile jammers at a distance of 100 cm, for 30 d (7 h/d). Sham group rats were also fixed in restraining tube but without radiations. The control group was allowed to move freely without being exposed to radiation. At the end of the experiment, weight of testes, sperm quality, histological testicular sections and serum testosterone levels were evaluated.Results: Long-term exposure to radiofrequency from mobile jammers could adversely affect neonatal rat fertility, but it did not have significant effects on male mature and immature rat's reproduction parameters. However, restraint stress induced by immobilizing them for a long-period could adversely affect male mature rat's reproductive parameters, but it had no significant effect on male immature rat's reproduction parameters.Conclusion:The effects of EMF exposure to be various based on the life stage. 展开更多
关键词 RADIO frequency MOBILE jammers TESTICULAR REPRODUCTION RATS
下载PDF
A Coincered Node Based Localization of Jammers in Wireless Sensor Networks
3
作者 Balamurugan Perumal Sharmila Vadivel Mummoorthy Arulappan 《Circuits and Systems》 2016年第9期2613-2621,共9页
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ... Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes. 展开更多
关键词 Wireless Sensor Network Jamming Jammer Localization Jammer Signal Strength Coincered Node
下载PDF
Supermodular interference suppression game for multistatic MIMO radar networks and multiple jammers with multiple targets 被引量:1
4
作者 Bin HE Hongtao SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第4期617-629,共13页
To deal with the threat of the new generation of electronic warfare,we establish a non-cooperative countermeasure game model to analyze power allocation and interference suppression between multistatic multipleinput m... To deal with the threat of the new generation of electronic warfare,we establish a non-cooperative countermeasure game model to analyze power allocation and interference suppression between multistatic multipleinput multiple-output(MIMO)radars and multiple jammers in this study.First,according to the power allocation strategy,a supermodular power allocation game framework with a fixed weight(FW)vector is constructed.At the same time,a constrained optimization model for maximizing the radar utility function is established.Based on the utility function,the best power allocation strategies for the radars and jammers are obtained.The existence and uniqueness of the Nash equilibrium(NE)of the supermodular game are proved.A supermodular game algorithm with FW is proposed which converges to the NE.In addition,we use adaptive beamforming methods to suppress cross-channel interference that occurs as direct wave interferences between the radars and jammers.A supermodular game algorithm for joint power allocation and beamforming is also proposed.The algorithm can ensure the best power allocation,and also improves the interference suppression ability of the MIMO radar.Finally,the effectiveness and convergence of two algorithms are verified by numerical results. 展开更多
关键词 Supermodular game Power allocation BEAMFORMING MIMO radar Multiple jammers
原文传递
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
5
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
Covert LEO Satellite Communication Aided by Generative Adversarial Network Based Cooperative UAV Jamming
6
作者 Shi Jia Li Xiaomeng +2 位作者 Liao Xiaomin Tie Zhuangzhuang Hu Junfan 《China Communications》 SCIE CSCD 2024年第9期27-39,共13页
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE... In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained. 展开更多
关键词 covert communication generative adversarial network LEO satellite UAV jammer
下载PDF
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA 被引量:2
7
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
下载PDF
Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar 被引量:1
8
作者 T.Jagadesh B.Sheela Rani 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期449-463,共15页
Interference is a key factor in radar return misdetection.Strong interference might make it difficult to detect the signal or targets.When interference occurs in the sidelobes of the antenna pattern,Sidelobe Cancellat... Interference is a key factor in radar return misdetection.Strong interference might make it difficult to detect the signal or targets.When interference occurs in the sidelobes of the antenna pattern,Sidelobe Cancellation(SLC)and Sidelobe Blanking are two unique solutions to solve this problem(SLB).Aside from this approach,the probability of false alert and likelihood of detection are the most essential parameters in radar.The chance of a false alarm for any radar system should be minimal,and as a result,the probability of detection should be high.There are several interference cancellation strategies in the literature that are used to sustain consistent false alarms regardless of the clutter environment.With the necessity for interference cancellation methods and the constant false alarm rate(CFAR),the Maisel SLC algorithm has been modified to create a new algorithm for recognizing targets in the presence of severe interference.The received radar returns and interference are simulated as non-stationary in this approach,and side-lobe interference is cancelled using an adaptive algorithm.By comparing the performance of adaptive algorithms,simulation results are shown.In a severe clutter situation,the simulation results demonstrate a considerable increase in target recognition and signal to noise ratio when compared to the previous technique. 展开更多
关键词 Sidelobe canceller sidelobe blanking constant false alarm rate CLUTTER jammer cancellation ratio probability of detection
下载PDF
Generative Adversarial Networks for Secure Data Transmission in Wireless Network
9
作者 E.Jayabalan R.Pugazendi 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3757-3784,共28页
In this paper,a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios.It is designed further to make their transmission decision th... In this paper,a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios.It is designed further to make their transmission decision that automati-cally adapts to the transmission dynamics to mitigate the launched jamming attacks.The generative adversarial learning neural network(GALNN)or genera-tive dynamic neural network(GDNN)automatically learns with the synthesized training data(training)with a generator and discriminator type neural networks that encompass minimax game theory.The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an increased detection rate in the generative adversarial network(GAN).The GDNN with game theory is designed to validate the channel condition with the cross entropy loss function and back-propagation algorithm,which improves the communica-tion reliability in the network.The simulation is conducted in NS2.34 tool against several performance metrics to reduce the misdetection rate and false alarm rates.The results show that the GDNN obtains an increased rate of successful transmis-sion by taking optimal actions to act as a defense mechanism to mislead the jam-mer,where the jammer makes high misclassification errors on transmission dynamics. 展开更多
关键词 Generative adversarial learning neural network JAMMER Minimax game theory ATTACKS
下载PDF
Method of Jamming C/A Code GPS Receiver 被引量:1
10
作者 韩力 谢征 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期276-279,共4页
The schemes and effects of electronically jamming GPS’s C/A code receivers are studied by using CW as the narrow band jamming signal and BPSK signal modulated by Gold code which is incoherent to that adopted by GPS ... The schemes and effects of electronically jamming GPS’s C/A code receivers are studied by using CW as the narrow band jamming signal and BPSK signal modulated by Gold code which is incoherent to that adopted by GPS as the wide band one. By simulating with Monte Carlo method and programming in Matlab language, the various jamming results in terms of bit error rate under several jamming scenarios are obtained. Through analyzing the simulation results and quantitative dependences of jamming effects on the distance from jammer to GPS receiver and the jammer’s height over ground, it is concluded that jamming with wide band jammer is much more effective than that with narrow band one. 展开更多
关键词 GPS C/A code receiver narrow band jammer wide band jammer Monte Carlo simulation
下载PDF
Game Theoretical Secure Wireless Communication for UAV-assisted Vehicular Internet of Things 被引量:4
11
作者 Bo Liu Zhou Su Qichao Xu 《China Communications》 SCIE CSCD 2021年第7期147-157,共11页
With the ever-expanding applications of vehicles and the development of wireless communication technology,the burgeoning unmanned aerial vehicle(UAV)assisted vehicular internet of things(UVIoTs)has emerged,where the g... With the ever-expanding applications of vehicles and the development of wireless communication technology,the burgeoning unmanned aerial vehicle(UAV)assisted vehicular internet of things(UVIoTs)has emerged,where the ground vehicles can experience more efficient wireless services by employing UAVs as a temporary mobile base station.However,due to the diversity of UAVs,there exist UAVs such as jammers to degenerate the performance of wireless communication between the normal UAVs and vehicles.To solve above the problem,in this paper,we propose a game based secure data transmission scheme in UVIoTs.Specifically,we exploit the offensive and defensive game to model the interactions between the normal UAVs and jammers.Here,the strategy of the normal UAV is to determine whether to transmit data,while that of the jammer is whether to interfere.We then formulate two optimization problems,i.e.,maximizing the both utilities of UAVs and jammers.Afterwards,we exploit the backward induction method to analyze the proposed countermeasures and finally solve the optimal solution.Lastly,the simulation results show that the proposed scheme can improve the wireless communication performance under the attacks of jammers compared with conventional schemes. 展开更多
关键词 UAV-assisted vehicular internet of things(UVIoTs) jammers offensive and defensive game wireless transmission
下载PDF
基于绿色时域与全双工的SWIPT的信息安全资源分配算法 被引量:1
12
作者 郭丹丹 李保罡 +1 位作者 姚源斌 吕亚波 《电视技术》 北大核心 2017年第9期65-70,共6页
对于SWIPT(无线携能通信)系统能量与安全受限问题,本文构建了基于全双工的多时隙双链路SWIPT系统模型,把可再生能源与传统电网融合后为系统供能,实现绿色无线传输;并设置了基于能量收集的全双工JAMMER(干扰节点)用于干扰窃听节点以降低... 对于SWIPT(无线携能通信)系统能量与安全受限问题,本文构建了基于全双工的多时隙双链路SWIPT系统模型,把可再生能源与传统电网融合后为系统供能,实现绿色无线传输;并设置了基于能量收集的全双工JAMMER(干扰节点)用于干扰窃听节点以降低窃听信噪比。最后给出了基于二维搜索的极限注水算法,该算法利用梯度自适应性原理对源节点无线传输给JAMMER的功率占比和功率收集系数进行参数自适应极值搜索,根据反馈增益参数确定其最优值以及每时隙源节点发送的总功率,再利用本文提出的极限注水算法对随机到达的可再生能源进行动态的优化配置。仿真结果表明,当储能电池容量一定时,该算法实现了最大限度利用可再生能源以降低电网消耗。适当的功率占比和收集系数可以降低发射总功率,全双工JAMMER与资源分配算法的结合使用可以有效提高信息的保密速率。 展开更多
关键词 可再生能源 保密速率 全双工JAMMER SWIPT 多时隙 资源分配
下载PDF
System Design and Signal Processing for Frequency Diverse Array Radar 被引量:3
13
作者 Jingwei Xu Lan Lan +4 位作者 Xiongpeng He Shengqi Zhu Cao Zeng Guisheng Liao Yuhong Zhang 《Journal of Beijing Institute of Technology》 EI CAS 2021年第1期1-19,共19页
Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA i... Frequency diverse array(FDA)radar has been studied for more than 15 years and has attracted a lot of attention due to its potential advantages over the well-known phased array radar.The representative feature of FDA is range-angle-time-dependent transmit beampattern and its underlying properties are continuously revealed in the research.The formulation and exploitation of the transmit diversity with a frequency increment is the fundamental principle,which brings extra degrees-of-freedom(DOFs)in the transmit dimension.As the FDA radar carries additional information in range,it provides more flexibility in signal processing and also brings in new technical issues.This article overviews the state-of-the-art in FDA radar area and its applications,mainly based on the progress in our group.There are two main catalogs in FDA radar area,namely coherent FDA and FDA-MIMO(multiple-input multiple-output)radars.Potential applications including target parameter estimation,ambiguous clutter suppression,and deceptive jammer suppression are discussed. 展开更多
关键词 frequency diverse array(FDA) range-angle-time-dependent transmit beampattern parameter estimation ambiguous clutter suppression deceptive jammer suppression
下载PDF
Put Others Before Itself:A Multi-Leader One-Follower Anti-Jamming Stackelberg Game Against Tracking Jammer 被引量:2
14
作者 Xiaobo Zhang Hai Wang +2 位作者 Yifan Xu Zhibin Feng Yunpeng Zhang 《China Communications》 SCIE CSCD 2021年第11期168-181,共14页
This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving pow... This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving power.To cope with the challenges brought by the tracking jammer,a multi-leader onefollower anti-jamming Stackelberg(MOAS)game is formulated,which is able to model the complex interactions between users and the tracking jammer.In the proposed game,users act as leaders,chose their channel access strategies and transmit firstly.The tracking jammer acts as the follower,whose objective is to find the optimal jamming strategy at each time slot.Besides,the existence of Stackelberg equilibriums(SEs)is proved,which means users reach Nash Equilibriums(NEs)for each jamming strategy while the jammer finds its best response jamming strategy for the current network access case.An active attraction based anti-jamming channel access(3ACA)algorithm is designed to reach SEs,where jammed users keep their channel access strategies unchanged to create access chances for other users.To enhance the fairness of the system,users will adjust their strategies and relearn after certain time slots to provide access chances for those users who sacrifice themselves to attract the tracking jammer. 展开更多
关键词 coordinated anti-jamming channel access Stackelberg game tracking jammer active attraction
下载PDF
Lightweight jammer localization algorithm in wireless sensor networks
15
作者 成天桢 栗苹 朱森存 《Journal of Beijing Institute of Technology》 EI CAS 2013年第2期143-148,共6页
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr... In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions. 展开更多
关键词 jammer localization jamming attacks wireless sensor networks
下载PDF
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
16
作者 Van Nhan Vo Hung Tran Chakchai So-In 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1786-1799,共14页
In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The co... In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The communication protocol is divided into two phases.In the first phase,a UAV relay(UR)cooperates with a friendly UAV jammer(UJ)to detect the UE,and the UR and UJ harvest energy from a power beacon(PB).In the second phase,a ground base station(GBS)sends a confidential signal to the UR using non-orthogonal multiple access(NOMA);the UR then uses its harvested energy to forward this confidential signal to IoT destinations(IDs)using the decode-and-forward(DF)technique.Simultaneously,the UJ uses its harvested energy to emit an artificial signal to combat the detected UE.A closed-form expression for the probability of detecting the UE(the detection probability,DP)is derived to analyze the detection performance.Furthermore,the intercept probability(IP)and throughput of the considered IoT architecture are determined.Accordingly,we identify the optimal altitudes for the UR and UJ to enhance the system and secrecy performance.Monte Carlo simulations are employed to verify our approach. 展开更多
关键词 Detection probability(DP) energy harvesting(EH) friendly UAV jammer Internet of Things(IoT) system performance UAV detection
下载PDF
Energy-Efficient Jammer Selection Approach for QoS Provisioning in Distributed Wireless Cooperative Networks
17
作者 Ma Yue Wang Li +3 位作者 Ke Tenghui Zhang Yong Song Mei Wang Xiaojun 《China Communications》 SCIE CSCD 2012年第7期90-98,共9页
Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secre... Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secrecy Capacity (SC) to charac terize the security of transmission. In order to ac curately describe the timevarying characteristic, related channels are modeled as FiniteState M ark ov Channels (FSMCs). The remaining energy of candidate node is considered in a similar way. 展开更多
关键词 wireless cooperative network jammer selection secrecy capacity energy balance
下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
18
《电子测量技术》 2009年第2期178-178,共1页
2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市... 2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市速度。 展开更多
关键词 EXPRESS 安捷伦科技公司 JAMMER PCI 注入 误码 在线 协议测试
下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
19
《国外电子测量技术》 2009年第3期80-80,共1页
关键词 EXPRESS 安捷伦科技公司 JAMMER PCI 误码 在线 协议测试 测试工具
下载PDF
Teledyne力科公司宣布40G原生注入技术(InFusion)40Gb以太网单端口对的协议分析和加扰
20
《国外电子测量技术》 2014年第4期89-89,共1页
近日,Teledyne力科公司,宣布其新的40Gb以太网注入方案。该SierraNet“M408支持40G数据注入及提供了40G以太网环境的加扰器(“Jammer”)。该SierraNetM408的错误注入及数据流修改工具,允许用户验证实际以太网系统容错性能。注入器... 近日,Teledyne力科公司,宣布其新的40Gb以太网注入方案。该SierraNet“M408支持40G数据注入及提供了40G以太网环境的加扰器(“Jammer”)。该SierraNetM408的错误注入及数据流修改工具,允许用户验证实际以太网系统容错性能。注入器(InFusion)能在实际的网络环境中可控地修改数据或引入错误。 展开更多
关键词 以太网系统 力科公司 加扰器 协议分析 注入技术 单端口 JAMMER 修改工具
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部