Research Article

Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

Figure 6

An example of range deceptive jamming: (a) RGPO; (b) RGPI.
(a)
(b)