Communications, Radar and Electronic Warfare

A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author...

Full description

Saved in:
Bibliographic Details
Main Author: Graham, Adrian
Format: eBook Book
Language:English
Published: Chichester, N.J Wiley 2011
John Wiley & Sons, Incorporated
Wiley-Blackwell
John Wiley & Sons Ltd
Edition:1
Subjects:
ISBN:9780470688717, 0470688718, 9780470977170, 0470977175, 9780470977163, 0470977167, 0470977140, 9780470977149
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes systems working in the HF bands and SHF. Furthermore, the author examines the performance of these systems, and also the effects of noise, interference and deliberate jamming, as well as the performance of jamming, detection and intercept systems. Particular attention is paid to the problems caused by Radio Controlled Improvised Explosive Devices (RCIEDs). Key Features: A practical handbook on the topic of radio communications and propagation Written by an expert in both the civilian and military applications of the technology Focuses on methods such as radio and radar jamming, and radio-controlled improvised explosive devices (IEDs) Contains problems and solutions to clarify key topics
AbstractList A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes systems working in the HF bands and SHF. Furthermore, the author examines the performance of these systems, and also the effects of noise, interference and deliberate jamming, as well as the performance of jamming, detection and intercept systems. Particular attention is paid to the problems caused by Radio Controlled Improvised Explosive Devices (RCIEDs). Key Features: A practical handbook on the topic of radio communications and propagation Written by an expert in both the civilian and military applications of the technology Focuses on methods such as radio and radar jamming, and radio-controlled improvised explosive devices (IEDs) Contains problems and solutions to clarify key topics
Author Graham, Adrian
Author_xml – sequence: 1
  fullname: Graham, Adrian
BackLink https://cir.nii.ac.jp/crid/1130000797209424640$$DView record in CiNii
BookMark eNqNkEtLAzEQgCNasa09evDWgwhCq5NNNpMctdQHFAQRPS7ZNMG1241uturPN-2Kj5tzmGFmvnn2yE7lK0vIAYVTCpCcKZTAERQiRdgigz_-9rcvpIyBDuklEMtYKiTuki4CxBSg2iODEJ4hChcoWdolo4lfLldVYXRT-CqMhnd6ruuhrubDaWlNU_uYGz7q2una7pOO02Wwgy_bJw-X0_vJ9Xh2e3UzOZ-Ndcq4pGODBtGZOEKnIK1NnMuZo2ougCaWYy6Fpo4aDipVFI0BnJucKaMcEylNWZ8ct43DoijL4F2T5d4vQsI_MMsXdn0AKEojeNKCOizse3jyZROyt9Ju6OzXkwT7P8vVzwIvtX9d2dBkG8zYqql1mU0vJoJzJddNj1qwKorMFGsd11p_GBUmoHjCBYeIHbZYYa1tb8kksIgI9glBt4W_
ContentType eBook
Book
Copyright 2010 Wiley
Copyright_xml – notice: 2010 Wiley
DBID RYH
DEWEY 621.38411
DOI 10.1002/9780470977170
DatabaseName CiNii Complete
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9780470977170
0470977167
0470977140
9780470977163
9780470977149
0470977175
Edition 1
ExternalDocumentID bke00040911
9780470977163
9780470977149
EBC644983
BB05566906
8039726
Genre Electronic books
GroupedDBID 089
20A
38.
3W9
3X9
3XM
5VX
69Y
6IK
A4J
AABBV
AAJKE
AARDG
ABARN
ABBFG
ABIAV
ABQPW
ACGYG
ACIQC
ACLGV
ACNUM
ADVEM
AKQZE
ALMA_UNASSIGNED_HOLDINGS
ALTAS
AZZ
BBABE
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CZZ
ECNEQ
GEOUK
HF4
IETMW
IPJKO
IVK
IVR
JFSCD
JJU
KJBCJ
LQKAK
LWYJN
MYL
OCL
PLCCB
PQEST
PQQKQ
UZ6
W1A
WIIVT
WZG
YPLAZ
ZEEST
AHWGJ
RYH
ABAZT
IFKZM
LMJTD
ID FETCH-LOGICAL-a53481-c7c77fc678a508ee2ffb3f19d6012e47b86a1f1c4095917cc07dcb39c9f365153
ISBN 9780470688717
0470688718
9780470977170
0470977175
9780470977163
0470977167
0470977140
9780470977149
IngestDate Fri Sep 23 13:44:58 EDT 2022
Thu Oct 09 05:53:01 EDT 2025
Fri Nov 08 04:10:30 EST 2024
Wed Dec 10 08:59:28 EST 2025
Tue Dec 02 00:23:03 EST 2025
Mon Aug 28 20:39:16 EDT 2023
IsPeerReviewed false
IsScholarly false
Keywords wideband signals
narrowband signals
radio noise
IED radio control systems
Communications
IEDs
enemy communications electronic warfare
frequency hopping signals
radar jamming
groundwave
unmanned airborne vehicles
Radar and Electronic Warfare
electronic warfare
EW
improvised explosive devices
military electronic warfare
HF skywave
LCCN 2010035687
LCCallNum TK6553 .G697 2011eb
LCCallNum_Ident TK6553.G697 2011
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a53481-c7c77fc678a508ee2ffb3f19d6012e47b86a1f1c4095917cc07dcb39c9f365153
Notes Summary: "The book is structured systematically, enabling the reader to utilise the methods explained to improve radio spectrum exploitation in practice"-- Provided by publisher
Includes bibliographical references and index
Available also in a print ed.
Mode of access: Internet via World Wide Web.
Title from title screen.
OCLC 700706079
PQID EBC644983
PageCount 400
ParticipantIDs skillsoft_books24x7_bke00040911
askewsholts_vlebooks_9780470977163
askewsholts_vlebooks_9780470977149
proquest_ebookcentral_EBC644983
nii_cinii_1130000797209424640
ieee_books_8039726
PublicationCentury 2000
PublicationDate 2010
2011
2011-01-04
2010-12-07
PublicationDateYYYYMMDD 2010-01-01
2011-01-01
2011-01-04
2010-12-07
PublicationDate_xml – year: 2011
  text: 2011
PublicationDecade 2010
PublicationPlace Chichester, N.J
PublicationPlace_xml – name: Chichester, N.J
– name: Newark
– name: Chichester, West Sussex, U.K
PublicationYear 2010
2011
Publisher Wiley
John Wiley & Sons, Incorporated
Wiley-Blackwell
John Wiley & Sons Ltd
Publisher_xml – name: Wiley
– name: John Wiley & Sons, Incorporated
– name: Wiley-Blackwell
– name: John Wiley & Sons Ltd
SSID ssj0000467835
ssib013445636
ssib017675987
Score 2.077826
Snippet A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and...
SourceID skillsoft
askewsholts
proquest
nii
ieee
SourceType Aggregation Database
Publisher
SubjectTerms Aerospace
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Fields, Waves and Electromagnetics
Photonics and Electrooptics
Radio frequency
Radio wave propagation
Signal Processing and Analysis
TECHNOLOGY & ENGINEERING / Telecommunications bisacsh
Transportation
Wireless communication systems
SubjectTermsDisplay Electronic books.
Radio frequency.
Radio wave propagation.
Wireless communication systems.
TableOfContents Preface. Glossary. PART ONE – BASIC THEORY. 1 Introduction. 1.1 The Aim of this Book. 1.2 Current Radio Technology. 1.3 Factors Constraining Radio Communications. References and Further Reading. 2 Management of the Radio Spectrum. 2.1 Spectrum Management Fundamentals. 2.2 Civil Spectrum Management. 2.3 Military Spectrum Management. 2.4 Management of EWActivities. References and Further Reading. 3 The Radio Channel. 3.1 Frequency Aspects of the Radio Channel. 3.2 Narrowband Signals. 3.3 Frequency Hopping Signals. 3.4 Wideband Signals. 3.5 The Effect of Movement on the Radio Channel. References and Further Reading. 4 Radio Links in the Presence of Noise. 4.1 Sources of Radio Noise. 4.2 Effects of Noise. 4.3 The Radio Receiver. 4.4 Radio Link Budgets in the Presence of Noise. References and Further Reading. 5 Radio Links in the Presence of Interference. 5.1 Sources of Radio Interference. 5.2 Interference in the Spectral Domain. 5.3 Interference in the Time Domain. 5.4 Interference Mitigation Techniques. References and Further Reading. 6 Radio Links and Deliberate Jamming. 6.1 The Purpose of Jamming. 6.2 How Jamming Works. 6.3 Types of Communications Jammers. 6.4 Jamming Mitigation Techniques. References and Further Reading. 7 Radar and Radar Jamming. 7.1 Introduction to Radars. 7.2 The Radar Equation. 7.3 Types of Radar. 7.4 Radar Jamming Techniques. 7.5 Radar Jamming Mitigation Techniques. References and Further Reading. 8 Radio-Controlled Improvised Explosive Devices. 8.1 The Poor Man’s Weapon of Choice: IEDs. 8.2 Radio Control for IEDs. 8.3 Detection of IED Radio Control Systems. References and Further Reading. PART TWO – PRACTICAL. 9 Predicting HF Radio. 9.1 Propagation at HF. 9.2 HF Skywave Link Budgets. 9.3 Groundwave. References and Further Reading. 10 VHF to SHF Radio Prediction. 10.1 Propagation above HF. 10.2 Modelling Methods. 10.3 Deterministic Models. 10.4 Empirical Models. 10.5 Combined Models. 10.6 Link Budgets. References and Further Reading. 11 Data Requirements for Radio Prediction. 11.1 Why Consider Modelling Requirements? 11.2 Communications System Parameters. 11.3 ES Specific Parameters. 11.4 EA Specific Parameters. 11.5 Radar Specific Parameters. 11.6 Third-Party Characteristics. 11.7 General Antenna Characteristics. 11.8 Antenna Environment Considerations. 11.9 Terrain Data. 11.10 Ground and Radio Clutter Data. 11.11 Sunspots, Ionospheric and Atmospheric Data. References and Further Reading. 12 Planning and Optimising Radio Links. 12.1 Path Profile Prediction. 12.2 Optimising a Link. 12.3 Re-Broadcast Links. 12.4 Linked Networks. References and Further Reading. 13 Planning Radio Networks for Coverage. 13.1 Coverage Predictions. 13.2 Optimisation of Radio Networks. 13.3 Limiting Coverage. References and Further Reading. 14 Interference Analysis. 14.1 Introduction to Radio Interference Analysis. 14.2 Fading Considerations. 14.3 Interference from other Channels. 14.4 Different Ways of Representing Co-Existing Signals. References and Further Reading. 15 Management Techniques for Interference. 15.1 Preventing Interference. 15.2 Managing Interference. 15.3 Interference Reports. References and Further Reading. 16 Management of Interference at a Radio Site. 16.1 Special Features of Radio Sites with Multiple Systems. 16.2 Sources of Interference at a Radio Site. 16.3 Methods of Managing Interference at Radio Sites. References and Further Reading. 17 Communications Electronic Warfare. 17.1 Introduction. 17.2 Detection and Intercept Networks. 17.3 Direction Finding Networks. 17.4 Communications Jammers. 17.5 The Role of Unmanned Airborne Vehicles. 17.6 Countering Enemy Communications Electronic Warfare. References and Further Reading. 18 Non-Communications Electronic Warfare. 18.1 Non-Communications EW. 18.2 Radar Jamming Techniques. 18.3 Platform Self Protection Methods. 18.4 Parametric Information Collection Methods. References and Further Reading. 19 Countering Radio-Controlled IEDs. 19.1 Introduction to IEDs. 19.2 Radio Controlled IED. 19.3 Basic IED Counter Methods. 20 Summary and Conclusions. Appendix A: Working with Decibels. Appendix B: Common Conversion Formulae and Reference Tables. Index.
5.3.1 Time Slots, Frequency Hopping Systems and Activity Ratios -- 5.3.2 Non-Continuous Interference -- 5.4 Interference Mitigation Techniques -- References and Further Reading -- 6 Radio Links and Deliberate Jamming -- 6.1 The Purpose of Jamming -- 6.2 How Jamming Works -- 6.3 Types of Communications Jammers -- 6.4 Jamming Mitigation Techniques -- References and Further Reading -- 7 Radar and Radar Jamming -- 7.1 Introduction to Radars -- 7.2 The Radar Equation -- 7.3 Types of Radar -- 7.3.1 Basic Pulse Radar -- 7.3.2 Pulse Doppler Radar -- 7.3.3 Pulse Compression Radar -- 7.3.4 Chirped Radar -- 7.3.5 Digitally Modulated Pulses -- 7.3.6 Continuous Wave Radar -- 7.3.7 Moving Target Indicator Radar -- 7.3.8 Phase Array Radar -- 7.3.9 Synthetic Aperture Radar -- 7.3.10 Broadband (LPI) Radar -- 7.3.11 Secondary Radar -- 7.4 Radar Jamming Techniques -- 7.5 Radar Jamming Mitigation Techniques -- References and Further Reading -- 8 Radio-Controlled Improvised Explosive Devices -- 8.1 The Poor Man's Weapon of Choice: IEDs -- 8.2 Radio Control for IEDs -- 8.3 Detection of IED Radio Control Systems -- References and Further Reading -- Part Two: Practical -- 9 Predicting HF Radio -- 9.1 Propagation at HF -- 9.1.1 Skywave -- 9.2 HF Skywave Link Budgets -- 9.3 Groundwave -- References and Further Reading -- 10 VHF to SHF Radio Prediction -- 10.1 Propagation above HF -- 10.1.1 Introduction -- 10.1.2 Short-Range VHF and UHF Links -- 10.1.3 Long Range VHF and UHF Links -- 10.1.4 Variability at VHF and UHF -- 10.1.5 SHF and Above -- 10.2 Modelling Methods -- 10.3 Deterministic Models -- 10.3.1 Free Space Loss Model -- 10.3.2 Two-Ray Models -- 10.3.3 Common Deterministic Models -- 10.4 Empirical Models -- 10.4.1 Basic Form of Empirical Models -- 10.4.2 Okumura Hata and COST 231 Hata -- 10.4.3 ITU-R P.1546 -- 10.4.4 ITU-528 Aeronautical Model
10.4.5 Clutter and Absorption Modelling -- 10.4.6 Fading Characteristics -- 10.5 Combined Models -- 10.5.1 Combining Propagation Models -- 10.5.2 The ITM Model -- 10.5.3 Combination Checklist -- 10.6 Link Budgets -- 10.6.1 Generic Analog Link Budgets -- 10.6.2 Generic Digital Link Budgets -- 10.6.3 Spread-Spectrum Link Budgets -- 10.6.4 Radar Primary Radar Link Budgets -- 10.6.5 HF Link Budgets -- References and Further Reading -- 11 Data Requirements for Radio Prediction -- 11.1 Why Consider Modelling Requirements? -- 11.2 Communications System Parameters -- 11.3 ES Specific Parameters -- 11.4 EA Specific Parameters -- 11.5 Radar Specific Parameters -- 11.6 Third-Party Characteristics -- 11.7 General Antenna Characteristics -- 11.8 Antenna Environment Considerations -- 11.9 Terrain Data -- 11.9.1 Introduction to Terrain Data -- 11.9.2 Sources of Terrain Data -- 11.9.3 Geographic Projections and Datums -- 11.9.4 Terrain Data Resolution -- 11.9.5 Required Precision -- 11.10 Ground and Radio Clutter Data -- 11.10.1 Ground Conductivity and Permittivity -- 11.10.2 Radio Clutter -- 11.11 Sunspots, Ionospheric and Atmospheric Data -- 11.11.1 Sunspots -- 11.11.2 Ionospheric Conditions -- 11.11.3 Gaseous Absorption -- 11.11.4 Precipitation -- References and Further Reading -- 12 Planning and Optimising Radio Links -- 12.1 Path Profile Prediction -- 12.2 Optimising a Link -- 12.3 Re-Broadcast Links -- 12.4 Linked Networks -- References and Further Reading -- 13 Planning Radio Networks for Coverage -- 13.1 Coverage Predictions -- 13.2 Optimisation of Radio Networks -- 13.3 Limiting Coverage -- References and Further Reading -- 14 Interference Analysis -- 14.1 Introduction to Radio Interference Analysis -- 14.2 Fading Considerations -- 14.3 Interference from other Channels -- 14.4 Different Ways of Representing Co-existing Signals
COMMUNICATIONS, RADAR AND ELECTRONIC WARFARE -- Contents -- Preface -- Glossary -- Part One: Basic Theory -- 1 Introduction -- 1.1 The Aim of this Book -- 1.2 Current Radio Technology -- 1.2.1 Introduction -- 1.2.2 Military Communications -- 1.2.3 Quasi-Military Type Operations -- 1.2.4 Civilian Communications -- 1.2.5 Cross-Over Technologies -- 1.3 Factors Constraining Radio Communications -- 1.3.1 The Basic Radio Link -- 1.3.2 Useful Conversion Formulae -- 1.3.3 Environmental Factors -- 1.3.4 Fading in Radio Systems -- References and Further Reading -- 2 Management of the Radio Spectrum -- 2.1 Spectrum Management Fundamentals -- 2.2 Civil Spectrum Management -- 2.3 Military Spectrum Management -- 2.3.1 Introduction -- 2.3.2 Spectrum Demand Assessments -- 2.3.3 Spectrum Protection -- 2.3.4 Assignment and Allotment Process -- 2.3.5 The BSM Plan -- 2.3.6 BSM Plan Dissemination -- 2.3.7 Interference Management -- 2.4 Management of EW Activities -- References and Further Reading -- 3 The Radio Channel -- 3.1 Frequency Aspects of the Radio Channel -- 3.2 Narrowband Signals -- 3.2.1 Rayleigh Fading -- 3.2.2 Ricean Fading -- 3.3 Frequency Hopping Signals -- 3.4 Wideband Signals -- 3.5 The Effect of Movement on the Radio Channel -- References and Further Reading -- 4 Radio Links in the Presence of Noise -- 4.1 Sources of Radio Noise -- 4.2 Effects of Noise -- 4.3 The Radio Receiver -- 4.4 Radio Link Budgets in the Presence of Noise -- References and Further Reading -- 5 Radio Links in the Presence of Interference -- 5.1 Sources of Radio Interference -- 5.2 Interference in the Spectral Domain -- 5.2.1 Co-Channel Interference -- 5.2.2 Adjacent and Other Channel Offset Interference -- 5.2.3 Overlapping Bandwidth Calculations -- 5.2.4 Interference between Dissimilar Systems -- 5.2.5 Multiple Interferers -- 5.3 Interference in the Time Domain
References and Further Reading -- 15 Management Techniques for Interference -- 15.1 Preventing Interference -- 15.1.1 Spatial Methods -- 15.1.2 Spectral Methods -- 15.1.3 Time-Based Methods -- 15.2 Managing Interference -- 15.3 Interference Reports -- References and Further Reading -- 16 Management of Interference at a Radio Site -- 16.1 Special Features of Radio Sites with Multiple Systems -- 16.1.1 Introduction -- 16.1.2 EMC Issues -- 16.1.3 Co-Site Radio Layout -- 16.2 Sources of Interference at a Radio Site -- 16.2.1 Blocking -- 16.2.2 Harmonics -- 16.2.3 Intermediate Frequencies -- 16.2.4 Image Frequencies -- 16.2.5 Inter-Modulation Products -- 16.3 Methods of Managing Interference at Radio Sites -- 16.3.1 Prevention -- 16.3.2 Curing -- References and Further Reading -- 17 Communications Electronic Warfare -- 17.1 Introduction -- 17.2 Detection and Intercept Networks -- 17.2.1 Introduction -- 17.2.2 Detection Capability -- 17.2.3 Intercept Systems -- 17.2.4 Planning Detection and Interception Networks -- 17.3 Direction Finding Networks -- 17.3.1 Introduction -- 17.3.2 History of Direction Finding -- 17.3.3 Operational Uses of DF Systems -- 17.3.4 Basic Principles of DF -- 17.3.5 Types of Direction Finders -- 17.3.6 The DF Baseline -- 17.3.7 Optimisation of the DF Baseline -- 17.3.8 Airborne DF -- 17.3.9 DF Assets and Communications -- 17.4 Communications Jammers -- 17.4.1 Introduction -- 17.4.2 Legality of Jamming -- 17.4.3 Spot Jamming -- 17.4.4 Barrage Jamming -- 17.4.5 Responsive Jamming -- 17.4.6 Adaptive Jamming -- 17.4.7 Smart Jamming -- 17.5 The Role of Unmanned Airborne Vehicles -- 17.5.1 UAV Roles -- 17.5.2 UAV Advantages -- 17.5.3 UAV Disadvantages -- 17.5.4 UAV Communications and Spectrum Management -- 17.6 Countering Enemy Communications Electronic Warfare -- 17.6.1 Poacher-Gamekeeper Approach -- 17.6.2 EPM
17.6.3 Tactical Methods of Countering Enemy CEW -- References and Further Reading -- 18 Non-Communications Electronic Warfare -- 18.1 Non-Communications EW -- 18.1.1 Broadcast -- 18.1.2 Navigation Systems -- 18.1.3 Secondary Radar Systems -- 18.2 Radar Jamming Techniques -- 18.2.1 Cover Jamming -- 18.2.2 Range Gate Pull Off and Pull In -- 18.2.3 Velocity Gate Pull Off -- 18.2.4 Angle Stealing -- 18.2.5 Inverse Gain Jamming -- 18.2.6 Other Jamming Methods -- 18.3 Platform Self Protection Methods -- 18.3.1 Platform Types and Protection Required -- 18.3.2 Decoys -- 18.4 Parametric Information Collection Methods -- 18.4.1 Collection of Electronic Order of Battle Information -- 18.4.2 Management of EORBAT Information -- 18.4.3 Radar Threat Characteristics -- 18.4.4 Communications Parameters -- 18.4.5 Collection Methods -- 18.4.6 Collection versus Detection -- 18.4.7 Example Collection Activity -- References and Further Reading -- 19 Countering Radio-Controlled IEDs -- 19.1 Introduction to IEDs -- 19.1.1 Asymmetric Warfare -- 19.1.2 Types of IED -- 19.1.3 Threat Mix -- 19.2 Radio Controlled IED -- 19.3 Basic IED Counter Methods -- 19.3.1 Detection of Enemy Activities -- 19.3.2 Non-EW Methods -- 19.3.3 EW Methods -- 20 Summary and Conclusions -- Appendix A: Working with Decibels -- Appendix B: Common Conversion Formulae and Reference Tables -- Index
Title Communications, Radar and Electronic Warfare
URI https://ieeexplore.ieee.org/servlet/opac?bknumber=8039726
https://cir.nii.ac.jp/crid/1130000797209424640
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=644983
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780470977149
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780470977163&uid=none
http://www.books24x7.com/marc.asp?bookid=40911
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwEB5BWWnpCXYXUZ4R2iPR5uHa8ZGiAhIScGBX3CLHsaWoVUBJgf58xombBxx2OezFapNoRvnGsmcmnvkAfqaKhVSK0NXcUy5hY-VyT1I3GVMRaY17GKnJJtjNTfTwwO8sU1NZ0QmwPI-WS_70X02N19DYpnT2E-ZuhOIF_I1GxxHNjuM7j7j5axsNdGs9KvMUIhXN-cwO4c2rKLRoT7221dJnabGaLmmb2uxlAqplpBceeoQZThlWV0d-WCzr5qv2OfQD_ZrC413_6cnE9Nsx_YzXYZ1RDHA3Lqe3v6-bTBZG2CZ9VJX7W33RqrXRSr_tbooaf_X0DWEoyhku57jUL0rLcIPbfJ5lPZf_aznL5vMSd6bO7n-_BQNTEbINayr_BsNOB8fv4PZBP3UqyE8dBNxpAXcs4D_gz8X0_vzKtQwUrhibCmVXMsmYlviCAj1ZpQKtk1D7PMU4NlCEJREVvvYlMelUn0npsVQmIZdch4ZkPtyBQf6Yq11wEp6iaxRp5omUaO2bVoEGEJ1QT-kxHcFJB4r4ZV59LS_jDl6E_8NDNBzBtoExrm9FHrqcAYo_RFBjmZnRNx8x0TvEGxjeB4QSbwTHK7jjSqg9HBxPJ-foM_MIxR43VqhlB2TJ4mSmzBxAv9Pf-4uOfdhs5-0BDBbFszqEL_JlkZXFkZ1Xb5nsP8Y
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Communications%2C+radar%2C+and+electronic+warfare&rft.au=Graham%2C+Adrian&rft.date=2011-01-01&rft.pub=Wiley&rft.isbn=9780470688717&rft_id=info:doi/10.1002%2F9780470977170&rft.externalDocID=BB05566906
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804709%2F9780470977149.jpg
http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804709%2F9780470977163.jpg