摘要:
A device and method for estimating the operational effectiveness, status, and protection range of an electronic countermeasures system in real time or near real time are provided. The device and method calculate a predicted ECM power at a given location using a propagation and scenario model. Then a measured ECM power at the given location is used to determine a correction value equal to the difference between the calculated and measured ECM powers. The correction value and the propagation model are then used with a heuristic method to refine estimates of propagation and scenario parameters. The refined parameter set is used to produce a refined prediction of ECM power, which is used to create a refined correction factor. The refined correction factor is used to determine predicted ECM powers at a plurality of locations in an area around the device to determine a boundary of protection.
摘要:
The invention relates to a method and system for controlling and analysing cellular radio communications exchanged between mobile terminals and base stations BTS. The invention is characterised in that a dummy mobile telephone network RRTM_F comprising a dummy base station BTS_F and a dummy mobile terminal MS_F are inserted into the real network RRTM_R, said dummy network being responsible for the decoding and transparent synchronous relaying of messages exchanged between the real network and the real mobile as well as real mobile access control from the real network or the dummy network.
摘要:
The invention relates to a method and system for controlling and analysing cellular radio communications exchanged between mobile terminals and base stations BTS. The invention is characterised in that a dummy mobile telephone network RRTM_F comprising a dummy base station BTS_F and a dummy mobile terminal MS_F are inserted into the real network RRTM_R, said dummy network being responsible for the decoding and transparent synchronous relaying of messages exchanged between the real network and the real mobile as well as real mobile access control from the real network or the dummy network.
摘要:
A system includes a generator and at least one device. The generator includes a waveform oscillator and a blanking pulse generator. Each device includes a transmit antenna, a receive antenna, an antenna unit, a mixer and a detector. The antenna unit includes a receiver coupled to the receive antenna, an amplifier coupled to the receiver and a transmitter coupled to the transmit antenna and the blanking pulse generator. The mixer has inputs coupled to the amplifier and the waveform oscillator. The detector is coupled to the mixer.
摘要:
The invention concerns a method for verifying anti-scrambling efficiency of a communication system comprising several sensors or adaptive antennae characterized in that it includes at least the following steps: estimating the average power of the communication system output, estimating the respective powers of a station u, Pu, or P'u, of antenna noise Pa, or P'a, of thermal noise PT or P'T, estimating at least the following ratios: (A), (B), (C), comparing at least one of the three relationships to a threshold value.
摘要:
A model sound index value calculating means (123) calculates, according to a prescribed calculation formula, a model sound index value which is an index value of the maximum value of power for each frequency band of the model sound which is a model of a target sound. A source sound index value calculating means (124) calculates, according to a prescribed calculation formula, a source sound index value which is an index value of power for each frequency band with respect to each of frames extracted by a predetermined time length from a source sound signal used for generating a masker sound signal. A masking performance calculating means (125) calculates a performance index value which is an index value of performance of masking the model sound by a sound represented by a block formed of a predetermined number of consecutive frames extracted from the source sound signal, by using the model sound index value and the source sound index value. A frame selecting means (126) determines a block to be used for generating the masker sound based on the performance index value.
摘要:
Methods for monitoring for unauthorised wireless access to computer networks are described. One method includes monitoring wireless communications within a selected geographic region using one or more sniffer devices to at least detect an active wireless access point device that transmits wireless signals within the selected geographic region, the one or more sniffer devices being positioned within the selected geographic region. One or more marker packets are transferred into the computer network, the one or more marker packets being adapted to be transferred to wireless medium from the computer network through the one or more wireless access point devices which are connected to the computer network. The marker packet(s) have a predetermined format and at least a subset of the one or more sniffer devices is configured to be able to identify at least a portion of the predetermined format. The transferring step includes actively transferring at least for a process of detection of unauthorized wireless access to the computer network. The method further includes processing using at least one of the at least the subset of the one or more sniffer devices at least a portion of the monitored wireless communications within the selected geographic region. The processing is directed to at least identifying at least one of the one or more marker packets being transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device, and includes identifying the at least the portion of the predetermined format within one or more packets included in the at least the portion of the monitored wireless communications. The method further includes determining that the active wireless access point device provides unauthorised wireless access to the computer network based at least upon the at least one of the one or more marker packets being identified as transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device.
摘要:
Methods for monitoring for unauthorised wireless access to computer networks are described. One method includes monitoring wireless communications within a selected geographic region using one or more sniffer devices to at least detect an active wireless access point device that transmits wireless signals within the selected geographic region, the one or more sniffer devices being positioned within the selected geographic region. One or more marker packets are transferred into the computer network, the one or more marker packets being adapted to be transferred to wireless medium from the computer network through the one or more wireless access point devices which are connected to the computer network. The marker packet(s) have a predetermined format and at least a subset of the one or more sniffer devices is configured to be able to identify at least a portion of the predetermined format. The transferring step includes actively transferring at least for a process of detection of unauthorized wireless access to the computer network. The method further includes processing using at least one of the at least the subset of the one or more sniffer devices at least a portion of the monitored wireless communications within the selected geographic region. The processing is directed to at least identifying at least one of the one or more marker packets being transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device, and includes identifying the at least the portion of the predetermined format within one or more packets included in the at least the portion of the monitored wireless communications. The method further includes determining that the active wireless access point device provides unauthorised wireless access to the computer network based at least upon the at least one of the one or more marker packets being identified as transferred from the computer network to the wireless medium within the selected geographic region through the active wireless access point device.