September 1995 | NTIA Technical Report TR-95-322
Engineering manual for the Jammer effectiveness model
Abstract: This engineering manual describes a user–friendly and menu–driven computer program called the Jammer Effectiveness Model (JEM). The models used in JEM to analyze the effectiveness of a jammer in jamming a receiver/transmitter pair or network of receivers and transmitters are described. The JEM runs on a personal computer in a Windows environment. The extensive design and analysis capabilities of this program have been previously limited to mainframe computers. This computer model is highly structured and modular in design, which allows for flexibility and expandability for future modifications.
Keywords: propagation; jammer; jamming; electronic warfare; communication systems models; electronic countermeasures
For technical information concerning this report, contact:
Nicholas DeMinco
Institute for Telecommunication Sciences
(303) 497-3660
ndeminco@ntia.doc.gov
To request a reprint of this report, contact:
Lilli Segre, Publications Officer
Institute for Telecommunication Sciences
(303) 497-3572
LSegre@ntia.gov
Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.