MILCOM 2005 - 2005 IEEE Military Communications Conference最新文献

筛选
英文 中文
Policy-based frequency management 基于策略的频率管理
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605930
G. C. Wagner
{"title":"Policy-based frequency management","authors":"G. C. Wagner","doi":"10.1109/MILCOM.2005.1605930","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605930","url":null,"abstract":"The Department of Defense, over the next 3 years, is poised to roll out the first generation of future force communications networks. Examples of these networks include the US Army's warfighter information network-tactical (WIN-T), the US Navy's automated digital network system (ADNS), and the joint tactical radio system (JTRS) with its wideband networking waveform (WNW). These networks are characterized by highly mobile nodes that can join and leave ad hoc networks in accordance with the scheme of maneuver for the units involved. This type of network places new demands on the network operations (NetOps) architecture and functionality. Policy based network management (PBNM) offers a wide range of possibilities for solving some of the management challenges associated with these future force networks, and will likely feature in the network operations architectures of many of them. Yet, however sophisticated the network and its corresponding network operations architecture is, it is likely that spectrum availability will play a pivotal role in the total amount of information that can be transported across these networks. Today's spectrum & frequency management tools and techniques may fall short when applied to mobile ad hoc networks, particularly those where policy-based decisions are being applied locally to the mobile node. This paper describes how a policy-based approach to spectrum & frequency management could be used to assist in the management of the spectrum associated with a mobile ad hoc network","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced C2 functionality in urban and other complex terrain 在城市和其他复杂地形中增强了C2功能
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605695
S. Sokolowski, R.L. Fillter, N. Vo, P. Olson
{"title":"Enhanced C2 functionality in urban and other complex terrain","authors":"S. Sokolowski, R.L. Fillter, N. Vo, P. Olson","doi":"10.1109/MILCOM.2005.1605695","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605695","url":null,"abstract":"The army's network centric warfare concept is focused on enhancing the army's capabilities in information dominance. Network centric warfare is realized through command and control (C2) systems such as the army battle command systems (ABCS) supported by developing tenet technologies, such as networking, communications and positioning. Fundamental to successful C2 systems is the ability to maintain current situation awareness (SA) information through the tenet technologies. Maintaining current SA information, for enhanced C2 functionality, requires continuous and timely position information from all relevant platforms on the battlefield. The accuracy and availability of position information directly affects operational effectiveness. The traditional role of positioning was for \"own ship \" pilotage. That is, \"can I get from point A to point B? \" It is important to note that utilization of position information, as a shared resource is an evolving role from the traditional role of positioning systems, which increases the utility and importance on position information quality and availability derived. The predominate source of that position data is the NA VSTAR global positioning system (GPS). GPS provides a common consistent coordinate reference. GPS accuracy does not degrade with time or distance traveled as self-contained navigation units e.g. inertial navigation units (INU) or Doppler radar navigation sets. In addition, GPS receivers are significantly less expensive to integrate, operate and maintain than INU's or Doppler's. However, GPS has vulnerabilities to electromagnetic interference (EMI) and satellite signal blockage in urban and complex terrain. Technology initiatives are being concentrated to investigate sophisticated integration techniques of combining externally aided and self-contained navigation systems. This paper addresses urban navigation requirements, urban navigation challenges and recent/new technology initiatives to improve the robustness of position information for the dismounted warfighter","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of jamming on DS-UWB system DS-UWB系统的干扰分析
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605727
M. Hamalainen, J. Iinatti
{"title":"Analysis of jamming on DS-UWB system","authors":"M. Hamalainen, J. Iinatti","doi":"10.1109/MILCOM.2005.1605727","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605727","url":null,"abstract":"This paper presents ultra wideband (UWB) jamming studies in additive white Gaussian noise (AWGN) channel analytical approach for UWB system performance in the presence of partial band jamming (or interference), whose special case is tone jamming, is presented. In UWB case, most of the jamming (interference) could be seen as partial band jamming due to the extremely large inherent bandwidth of the desired signal. The given modifications for the existing formulas, which originally have applied for wideband system with narrowband interference, are verified with the corresponding simulated results in UWB context. The study has focused on direct sequence (DS) based single-band UWB system that uses binary pulse amplitude modulation (BPAM) as a data modulation scheme. Jamming (interference) is assumed to be bandlimited and Gaussian distributed, and the presented analytical expressions allow freely spacing and arbitrary bandwidth for the interfering signal. It has been noticed that the general bit error rate (BER) formulas for wideband systems can also be applied to UWB to calculate the upper bounds for the performances using real UWB system parameters in very simply way through spectral characteristics","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126695999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An adaptive grouped-subcarrier allocation algorithm using comparative superiority 一种利用比较优势的自适应分组子载波分配算法
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605804
Youngok Kim, Haewoon Nam, B. Womack
{"title":"An adaptive grouped-subcarrier allocation algorithm using comparative superiority","authors":"Youngok Kim, Haewoon Nam, B. Womack","doi":"10.1109/MILCOM.2005.1605804","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605804","url":null,"abstract":"In this paper, an adaptive grouped-subcarrier allocation algorithm using comparative superiority is proposed for the enhancement of system capacity and its simple implementation in a multiuser OFDM system. Since the computational complexity of the optimal subcarrier allocation algorithm based on the each subcarrier is extremely high, various sub-optimal algorithms have been developed for the realization of adaptive subcarrier allocation algorithm with the reduced complexity. Some of the promising sub-optimal algorithms are the blockwise and the decentralized allocation algorithms, which allocate subcarriers in groups instead of each subcarrier. The proposed algorithm is similar to the blockwise or the decentralized subcarrier allocation algorithm but all subcarriers are grouped according to the coherence bandwidth for the enhancement of system capacity. In addition, the proposed algorithm provides a simple solution for the conflict problem among users by reallocating only the conflicted groups and unassigned groups instead of reallocating entire groups. Furthermore, the comparative superiority concept, which swaps the groups between users if the system capacity is increased, is adopted in the re-allocation process for the enhancement of system performance. Simulation results demonstrate that the proposed algorithm increases the system capacity effectively over a static, an adaptive blockwise, and a decentralized subcarrier allocation algorithms","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The effect of terminal movement to the physical layer performance of the IEEE 802.11b wireless LAN systems in simulated UMTS vehicular channel 模拟UMTS车载信道中终端移动对IEEE 802.11b无线局域网系统物理层性能的影响
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605937
A. Silvennoinen, M. Hall, S. Häggman
{"title":"The effect of terminal movement to the physical layer performance of the IEEE 802.11b wireless LAN systems in simulated UMTS vehicular channel","authors":"A. Silvennoinen, M. Hall, S. Häggman","doi":"10.1109/MILCOM.2005.1605937","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605937","url":null,"abstract":"Wireless local area network (WLAN) systems are typically designed to provide fixed or nomadic access. Using WLAN systems for military purposes raises the question of how WLAN terminals can be utilized in a fully mobile outdoor environment. In these environments, there typically exists multipath propagation with a large delay spread in the radio channel. This paper investigates the effect of terminal movement on the physical layer performance and capacity of IEEE 802.11b WLAN systems in a realistic outdoor mobile environment. Several wireless network interface cards are measured in laboratory conditions using a simulated radio channel. The measurement results indicate that WLAN systems can operate in mobile outdoor environment up to a certain mobile speed, and there are significant differences between equipment from product vendors","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy minimization in wireless sensor networks through an adaptive connectionless scheduling protocol (adaptive CSP) 基于自适应无连接调度协议的无线传感器网络能量最小化
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606118
S. Evans, N. V. Stralen, J. Hershey, H. Tomlinson
{"title":"Energy minimization in wireless sensor networks through an adaptive connectionless scheduling protocol (adaptive CSP)","authors":"S. Evans, N. V. Stralen, J. Hershey, H. Tomlinson","doi":"10.1109/MILCOM.2005.1606118","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606118","url":null,"abstract":"We present an approach to minimizing energy costs in wireless sensor networks through a protocol that implements near perfect scheduling based on a near perfect clock, accurate synchronization, and some discriminating node feature such as a unique identifier. Our approach is highly flexible in that options for communicating in a one-to-one or many-to-one manner are made possible without messaging overhead to set up or tear down channels. Our pseudorandom scheduling paradigm provides flexibility to serve data rate requirements over a wide range of traffic scenarios and automatically adapts to load and latency requirements, providing a high performance scheduling protocol for sensor networks and homeland security applications.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic access methodology for satellite-based networks 基于卫星的网络动态接入方法
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606089
I. Corretjer, D. Minerath, R. Porada, M. Rupar
{"title":"Dynamic access methodology for satellite-based networks","authors":"I. Corretjer, D. Minerath, R. Porada, M. Rupar","doi":"10.1109/MILCOM.2005.1606089","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606089","url":null,"abstract":"Current naval satellite-based networks allocate physical layer resources to users based on predetermined requirements analyses. Once the requirements are determined and resources allocated, they cannot be easily changed to adapt as actual situations warrant. A dynamic allocation process allows satellite resources to be reallocated based on the current requirements of the network users. Proposals and designs for next generation satellite systems are beginning to incorporate dynamic resource allocation features into their architectures. In this paper we present a methodology that automatically directs the use of physical layer resources for a satellite-based network according to network demands. The proposed methodology utilizes an \"executive\" to optimize and control the overall system utilization by incorporating information from transponder load, user prioritization, and real-time network requirements. To demonstrate our methodology we have implemented a non-propriety test-bed based on COTS hardware and equipment currently being utilized by the fleet. We also present results from tests that show the benefits of a dynamic architecture over a traditional static architecture.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capture in wireless random-access networks with multiple destinations and a physical channel model 在具有多个目的地和物理信道模型的无线随机存取网络中捕获
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1605841
G. Nguyen, J. Wieselthier, A. Ephremides
{"title":"Capture in wireless random-access networks with multiple destinations and a physical channel model","authors":"G. Nguyen, J. Wieselthier, A. Ephremides","doi":"10.1109/MILCOM.2005.1605841","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1605841","url":null,"abstract":"The capture effect in wireless random-access networks has been widely studied in the literature. Under capture, a transmission is successfully received at the destination, even in the presence of other transmissions, if the received signal to interference ratio exceeds a threshold. However, most studies of capture are limited to single-destination networks (such as an isolated base station in a cellular network). In this paper, we study capture in wireless networks that have multiple destinations. We use simulation to evaluate throughput performance for different networks, and demonstrate the impact of the capture threshold as well as the impact of the user distribution. The novelty of our approach includes capture under a realistic physical layer model and under the multiple-destination architecture that creates interference among users who transmit to different destinations","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116271641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Directional networks for above 2 GHz software defined radios 用于2ghz以上软件无线电的定向网络
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606145
J. Boyd, J. Schlenzig
{"title":"Directional networks for above 2 GHz software defined radios","authors":"J. Boyd, J. Schlenzig","doi":"10.1109/MILCOM.2005.1606145","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606145","url":null,"abstract":"The demand for increased bandwidth, standardization on Internet protocol, and focus on network-centric operations in DoD communications have created a need for highspeed mesh networks. Effort is underway to address this need with JTRS CDL. In addition to JTRS compliance, JTRS CDL will provide new waveforms and networking capability to create RF networks with arbitrary topology that run at very high speed. This paper addresses the concept and the challenges that must be solved to define and implement it.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protecting information security availability via self-adapting intelligent agents 通过自适应智能代理保护信息安全可用性
MILCOM 2005 - 2005 IEEE Military Communications Conference Pub Date : 2005-10-17 DOI: 10.1109/MILCOM.2005.1606116
Robby Fussell
{"title":"Protecting information security availability via self-adapting intelligent agents","authors":"Robby Fussell","doi":"10.1109/MILCOM.2005.1606116","DOIUrl":"https://doi.org/10.1109/MILCOM.2005.1606116","url":null,"abstract":"The information security model is composed of confidentiality, integrity, and availability. Availability is the area of information security that requires services and components to be continuously available for the user community. If a service or component is unavailable, confidentiality and integrity are meaningless. Network availability is the underlining component that must be existent in order for services to be accessible for end users. Developers have used redundancy to assist in ensuring that an application or network is available; however, this is a costly solution if many network components and services are involved.","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信