For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Introduction to Electronic Warfare Modeling and Simulation — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Electronic warfare (EW) simulation is a serious game of make-believe. A situation is artificially created so that equipment can be tested and operators can be trained under realistic conditions - without both the expense and danger associated with training in the real world. EW engagements are typically complex, with many threat emitters seen in constantly changing relationships as either the threat platforms or the EW-protected platform maneuver. The operation of equipment and the performance required of operators cannot be adequately tested under static conditions with only one threat emitter present. This has led to the development of simulators that can simulate many threats grouped and maneuvered in realistic ways.

Chapter Contents:

  • 1.1 Simulation
  • 1.1.1 Simulation in the EW Field
  • 1.1.2 Modeling
  • 1.2 EW Simulation Approaches
  • 1.2.1 Modeling
  • 1.2.2 Simulation
  • 1.2.3 Emulation
  • 1.3 Simulation for Training
  • 1.4 Simulation for T&E
  • 1.5 Electronic Point of View
  • 1.6 Fidelity in EW Simulation
  • 1.7 The Tactical Big Picture
  • 1.8 Simulation Versus Life Cycle

Inspec keywords: military computing; electronic warfare; digital simulation

Other keywords: static conditions; EW-protected platform maneuver; electronic warfare simulation; electronic warfare modeling; EW engagements; threat emitters

Subjects: Electronic warfare; Military engineering computing

Preview this chapter:
Zoom in

Introduction, Page 1 of 2

| /docserver/preview/fulltext/books/ra/sbra011e/SBRA011E_ch1-1.gif /docserver/preview/fulltext/books/ra/sbra011e/SBRA011E_ch1-2.gif

Related content

This is a required field
Please enter a valid email address