September 1995 | NTIA Technical Report TR-95-322
Abstract: This engineering manual describes a user–friendly and menu–driven computer program called the Jammer Effectiveness Model (JEM). The models used in JEM to analyze the effectiveness of a jammer in jamming a receiver/transmitter pair or network of receivers and transmitters are described. The JEM runs on a personal computer in a Windows environment. The extensive design and analysis capabilities of this program have been previously limited to mainframe computers. This computer model is highly structured and modular in design, which allows for flexibility and expandability for future modifications.
Keywords: propagation; jammer; jamming; electronic warfare; communication systems models; electronic countermeasures
To request a reprint of this report, contact:
For technical information concerning this report, contact:
Institute for Telecommunication Sciences
Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.