MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

筛选
英文 中文
Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset 载波频偏OFDMA系统中交错和局部映射方案的干扰分析
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415778
B. Ranjha, M. I. Chowdhury, M. Kavehrad
{"title":"Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset","authors":"B. Ranjha, M. I. Chowdhury, M. Kavehrad","doi":"10.1109/MILCOM.2012.6415778","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415778","url":null,"abstract":"In this paper, we analyze the effect of Carrier Frequency Offset (CFO) of multiple users on the SINR of a single user in OFDMA based uplink communication receiver. We have computed an explicit SINR expression for two types of mapping strategies used in uplink OFDMA systems namely Interleaved Frequency Division Multiple Access (IFDMA) and Localized Frequency Division Multiple Access (LFDMA). SINR expressions in case of carrier frequency offset correction are also computed. Using simulations, we have compared the total average interference due to different values of CFO's of multiple users for both mapping schemes. Simulation results also show that the average value of Inter-Carrier Interference (ICI) for localized mapping is higher than interleaved mapping while the average value of Multiuser Interference (MUI) is higher for interleaved mapping. Moreover, the average MUI for localized mapping is minimum at the center of the band and it increases as we move towards the band edges. We also observe a flat response for ICI and MUI for interleaved mapping.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82499217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A cyber-physical approach to a wide-area actionable system for the power grid 电网广域可操作系统的网络物理方法
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415666
Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan
{"title":"A cyber-physical approach to a wide-area actionable system for the power grid","authors":"Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan","doi":"10.1109/MILCOM.2012.6415666","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415666","url":null,"abstract":"Unexpected occurrences of large-area cascading failures due to small disturbances in worldwide electricity grids serve as evidence of their intrinsic instability. As the grid is the most fundamental critical infrastructure in any modern society, detection and mitigation of such cascading failures due to accidental failures or malicious attacks are of vital importance to both civilian and military applications. However, due to the unique physical properties of electricity, such as its travel speed, systems must be able to react within a fraction of second in order to detect and prevent occurrences of cascading failures. In this paper, by modeling the grid as a cyber-physical system, we propose a decentralized, hierarchical framework to develop and implement a wide-area actionable system, capable of detecting and mitigating potential cascading failures. The states of the grid and physical constraints are modeled as manifolds, and evolution of the grid becomes a path on the manifold. By decomposing the grid into resilience zones with minimal power flow between them, we utilize precomputed scenarios in each resilience zone to develop a parametrized model. During deployment, online phasor measurements will be used to estimate the stability within each zone and interactions among them. The detection of cascading failures will be based on the detection of cascading failing paths among the K hop trees built for each zone. We illustrate the effectiveness of the proposed approach using the 2003 Italy blackout scenarios, and we discuss practical requirements in order to deploy such a system.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83446151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative applications at the Tactical Edge through resilient group dissemination in DTN DTN中弹性群体传播在战术边缘的协同应用
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415786
Jacob Green, John L. Schultz
{"title":"Collaborative applications at the Tactical Edge through resilient group dissemination in DTN","authors":"Jacob Green, John L. Schultz","doi":"10.1109/MILCOM.2012.6415786","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415786","url":null,"abstract":"Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"67 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89392004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Games applied to jam resistant DSA radios 游戏应用于抗干扰DSA无线电
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415633
Gregory Rucker, R. Cole, D. Cansever, A. Mishra
{"title":"Games applied to jam resistant DSA radios","authors":"Gregory Rucker, R. Cole, D. Cansever, A. Mishra","doi":"10.1109/MILCOM.2012.6415633","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415633","url":null,"abstract":"In this paper, we apply Game Theory to the exploration into the development of Medium Access Protocols (MACs) for Dynamic Spectrum Access (DSA) software-define Secondary Radios (SRs) in the presence of Adversarial Jammers (AJs). We develop the Static Game representation of a hierarchical game involving the Primary Users (PUs) and the SRs and AJs. We then define a Dynamic, Repetitive Game to test the effectiveness of different SR and AJ agent strategies. These strategies are defined in terms of how aggressive the agents modify their future play based upon observations related to previous play outcomes. The observations are defined in the context of incomplete information, as it is not likely that a radio transceiver is capable of discerning all possible plays of competitors across all channels while also potentially transmitting on a given channel. We develop the Agent-Based Simulation (ABS) to investigate and analyze various versions of these games and agent strategies. We report on the results of the ABS investigations and our mathematical analysis.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87862629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs 自主移动网络节点分布的容错仿生拓扑控制机制
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415743
S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin
{"title":"Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs","authors":"S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin","doi":"10.1109/MILCOM.2012.6415743","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415743","url":null,"abstract":"We introduce a fault tolerant bio-inspired topolog-ical control mechanism (TCM-Y) for the evolutionary decision making process of autonomous mobile nodes that adaptively adjust their spatial configuration in MANETs. TCM-Y is based on differential evolution and maintains a user-defined minimum connectivity for each node with its near neighbors. TCM-Y, therefore, provides a topology control mechanism which is fault tolerant with regards to network connectivity that each mobile node is required to maintain. In its fitness calculations, TCM-Y uses the Yao graph structure to enforce a user-defined minimum number of neighbors while obtaining uniform network topology. The effectiveness of TCM-Y is evaluated by comparing it with our differential evolution based topology mechanism (TCM-DE) that uses virtual forces from neighbors in its fitness function. Experimental results obtained from simulation software show that TCM-Y performs well with respect to normalized area coverage, the average connectivity, and the minimum connectivity achieved by mobile nodes. Simulation experiments demonstrate that TCM-Y generates encouraging results for uniform distribution of mobile nodes over unknown terrains while maintaining a user-defined minimum connectivity between neighboring nodes.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87408093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids 在不利网格中基于标准的发布/订阅的带宽优化
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415635
E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen
{"title":"Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids","authors":"E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen","doi":"10.1109/MILCOM.2012.6415635","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415635","url":null,"abstract":"NATO has identified Web services as a key enabler for its network enabled capability. Web services facilitate interoperability, easy integration and use of commercial off-the-shelf components, and while request/response-based schemes have hitherto been predominant, publish/subscribe-based services are gaining ground. SOAP-based Web services, however, introduce considerable communication overhead, and optimization must be done to enable use on the tactical level. Data compression is one such optimization, and it works well for large messages. We claim that the inherent characteristics of publish/subscribe-based Web services are such that using difference-based compression will allow effective compression also for small messages. In this paper we present the design and implementation of a proof-of-concept mechanism called ZDiff, which we have tested on several types of military data formats. Together with our SOAP-based proxy system it can be used together with commercial off-the-shelf Web services software. The results show that difference-based compression outperforms traditional compression for small messages, at the same time as it never performs worse than traditional compression for larger messages.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"54 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87422098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A NNEC-compliant approach for a Future Mission Network 面向未来任务网络的nnec兼容方法
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415626
Alberto Domingo, H. Wietgrefe
{"title":"A NNEC-compliant approach for a Future Mission Network","authors":"Alberto Domingo, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415626","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415626","url":null,"abstract":"The NATO Network-Enabled Capabilities concept (NNEC) enables NATO to maximize the sharing of information and services in a wide variety of missions, characterized by a a-priori uncertainty about the mission service requirements, partner composition and command and control structures. NNEC guidance and principles are well documented in the NNEC framework and the NNEC Body of Knowledge (BoK). Experience and lessons learnt from mission support in Afghanistan's International Security Assistance Force (ISAF) and Libya (Operation Unified Protector OUP) have shown that deploying NNEC capabilities from scratch is complex and time consuming. Therefore, NATO and the Nations have decided to formalize the implementation of NNEC into a flexible, tailor-able and scalable capability known as the Future Mission Network (FMN). The FMN seeks to implement a NNEC-aligned set of network, systems and services, along with the necessary doctrine and processes, to facilitate federation of mission information and supporting capabilities in future operations. This paper will introduce the NATO NNEC framework and Body of Knowledge, its persistent requirements and the associated NNEC operational and technical achievements. Then, the NATO requirements for a Future Mission Network (FMN) are derived, taking into account experience from recent operations and also the NATO transformational vision and political guidance. Finally, the NNEC compliant approach for a NATO Future Mission Network is described, along with the high-level material and non-material solutions to facilitate information sharing in federated environments.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Anti-jamming defense mechanism in cognitive radios networks 认知无线电网络的抗干扰防御机制
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415653
Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles
{"title":"Anti-jamming defense mechanism in cognitive radios networks","authors":"Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles","doi":"10.1109/MILCOM.2012.6415653","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415653","url":null,"abstract":"Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80043477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fault tolerance requirements of tactical Information Management systems 战术信息管理系统的容错要求
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415721
J. Cleveland, J. Loyall, J. Hanna
{"title":"Fault tolerance requirements of tactical Information Management systems","authors":"J. Cleveland, J. Loyall, J. Hanna","doi":"10.1109/MILCOM.2012.6415721","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415721","url":null,"abstract":"Information Management (IM) services provide a powerful capability for military operations, enabling managed information exchange based on the characteristics of the information that is needed and the information that is available, rather than on explicit knowledge of the information consumers, producers, and repositories. To be usable in tactical environments and mission critical operations, IM services need to be resilient to faults and failures, which can be due to many factors, including design or implementation flaws, misconfiguration, corruption, hardware or infrastructure failure, resource intermittency or contention, or hostile actions. This paper presents a reference model for representing the performance and fault tolerance requirements of IM services in tactical operations. A Joint Close Air Support operation is described using this representation and the viability of canonical fault tolerance techniques are examined for a given deployment.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"506 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77064386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining diverse opinions 挖掘不同的意见
MILCOM 2012 - 2012 IEEE Military Communications Conference Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415602
M. Srivatsa, Sihyung Lee, T. Abdelzaher
{"title":"Mining diverse opinions","authors":"M. Srivatsa, Sihyung Lee, T. Abdelzaher","doi":"10.1109/MILCOM.2012.6415602","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415602","url":null,"abstract":"Network operations that support tactical missions are often characterized by evolving information that needs to be delivered over bandwidth constrained communication networks and presented to a social/cognitive network with limited human attention span and high stress. Most past research efforts on data dissemination examined syntactic redundancy between data items (e.g., common bit strings, entropy coding and compression, etc.), but only limited work has examined the problem of reducing semantic redundancy with the goal of providing higher quality information to end users. In this paper we propose to measure semantic redundancy in large volume text streams using online topic models and opinion analysis (e.g., topic = Location X and opinion = possible_hazard+, safe_zone-). By suppressing semantically redundant content one can better utilize bottleneck resources such as bandwidth on a resource constrained network or attention time of a human user. However, unlike syntactic redundancy (e.g., lossless compression, lossy compression with small reconstruction errors), a semantic redundancy based approach is faced with the challenge of having to deal with larger inaccuracies (e.g., false positive and false negative probabilities in an opinion classifier). This paper seeks to quantify the effectiveness of a semantic redundancy based approach (over its syntactic counterparts) as a function of such inaccuracies and present a detailed experimental evaluation using realistic information flows collected from an enterprise network with about 1500 users1.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"284 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77073333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信