September 1995 | Technical Report TR-95-322

Engineering manual for the Jammer effectiveness model

Cite This Publication

Nicholas DeMinco ORCID logoGoogle Scholar logoScopus logoWeb of Science logo

Abstract: This engineering manual describes a user–friendly and menu–driven computer program called the Jammer Effectiveness Model (JEM). The models used in JEM to analyze the effectiveness of a jammer in jamming a receiver/transmitter pair or network of receivers and transmitters are described. The JEM runs on a personal computer in a Windows environment. The extensive design and analysis capabilities of this program have been previously limited to mainframe computers. This computer model is highly structured and modular in design, which allows for flexibility and expandability for future modifications.

Keywords: propagation; jammer; jamming; electronic warfare; communication systems models; electronic countermeasures

For technical information concerning this report, contact:

Nicholas DeMinco
Institute for Telecommunication Sciences
(303) 497-3660
ndeminco@ntia.doc.gov

Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.

For questions or information on this or any other NTIA scientific publication, contact the ITS Publications Office at ITSinfo@ntia.gov or 303-497-3572.

Back to Search Results