MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)最新文献

筛选
英文 中文
Turbo detection of coded continuous-phase modulations 编码连续相位调制的Turbo检测
L. Thomas, R. Mickelson
{"title":"Turbo detection of coded continuous-phase modulations","authors":"L. Thomas, R. Mickelson","doi":"10.1109/MILCOM.1999.822739","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822739","url":null,"abstract":"Iterative (turbo) decoding of a coded, interleaved continuous-phase modulated (CPM) waveform is presented. The transmitter consists of a rate-2/3 convolutional encoder followed by an interleaver, and an 8-ary continuous phase modulator. At the receiver, soft output a posteriori probability algorithms for the convolutional code and the CPM waveform iteratively refine their probability estimates. Current simulation results show a 2.5 dB SNR improvement (at 10/sup -5/ bit-error rate) over trellis-coded CPM (TCCPM) with a 99% bandwidth efficiency of 1.24 bps/Hz. The detector has a complexity of approximately 4.5 times that of the TCCPM system.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"59 44","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance analysis of non-coherent BFSK using first, second, and third order selection combining in a Nakagami fading channel 基于一、二、三阶选择组合的非相干BFSK中川衰落信道性能分析
T. Polychronos, R. Hippenstiel, T. Ha
{"title":"Performance analysis of non-coherent BFSK using first, second, and third order selection combining in a Nakagami fading channel","authors":"T. Polychronos, R. Hippenstiel, T. Ha","doi":"10.1109/MILCOM.1999.822644","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822644","url":null,"abstract":"The performance of a non-coherent binary frequency shift keying (BFSK) receiver using first, second, and third order selection combining methods over a frequency non-selective and slowly Nakagami-m fading channel is investigated. Analytical and numerical results for first order selection combining are compared to second and third order selection combining. Probability of error plots are provided for a range of the Nakagami-m variable.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131949646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enterprise network control and management: traffic flow models 企业网络控制与管理:流量模型
W. Maruyama, M. George, E. Hernandez, K. LoPresto, Y. Uang
{"title":"Enterprise network control and management: traffic flow models","authors":"W. Maruyama, M. George, E. Hernandez, K. LoPresto, Y. Uang","doi":"10.1109/MILCOM.1999.821384","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821384","url":null,"abstract":"The exponential growth and dramatic increase in demand for network bandwidth is expanding the market for broadband satellite networks. It is critical to rapidly deliver ubiquitous satellite communication networks that are differentiated by lower cost and increased quality of service (QoS). There is a need to develop new network architectures, control and management systems to meet the future commercial and military traffic requirements, services and applications. The next generation communication networks must support legacy and emerging network traffic while providing user negotiated levels of QoS. Network resources control algorithms must be designed to provide the guaranteed performance levels for voice, video and data having different service requirements. To evaluate network architectures and performance, it is essential to understand the network traffic characteristics.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiplexing VBR video and training sequences on wireless fading channels 在无线衰落信道上复用VBR视频和训练序列
F. Freiha, K. Chandra, V. Mehta, C. Thompson
{"title":"Multiplexing VBR video and training sequences on wireless fading channels","authors":"F. Freiha, K. Chandra, V. Mehta, C. Thompson","doi":"10.1109/MILCOM.1999.822650","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822650","url":null,"abstract":"A time slotted multiple access scheme that shares bandwidth between source and training signals is proposed for the transmission of variable bit rate (VBR) video signals over non-ideal channels. The error performance is examined using finite state Markov chains that model both the VBR source traffic and the time variation of fading channels. The characteristic time-scale of the fade duration, the step-size parameter of the LMS equalizer training algorithm, and the number of training sequences allocated per time slot jointly influence the error performance. The consideration of the physical layer characteristics in the design of higher layer protocols enhances the performance of conventional application layer based preventive and reactive error control schemes. Simulation results for fast and slow fading channels show that the proposed channel access scheme can lead to an order of magnitude decrease in the bit error ratio if the combination of training overhead and step-size parameter are chosen judiciously with respect to the fading time-scale. In addition, the multiplexing efficiency of VBR encoded video is shown to be useful for limiting the channel access delays when training overhead is increased.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile agents for active network management 用于主动网络管理的移动代理
R. Kazi, Patricia Morreale
{"title":"Mobile agents for active network management","authors":"R. Kazi, Patricia Morreale","doi":"10.1109/MILCOM.1999.822661","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822661","url":null,"abstract":"Traditionally, network management systems have been based on client/server technologies comprised of distributed static agents (servers) and a centralized manager (client). The behavior of such systems has proven to be difficult to modify and/or extend. The use of mobile software agents has been introduced as an alternative to traditional centralized network management techniques. Mobile software agents provide a decentralized approach to network management issues because of the distributive nature of the agents themselves. Mobile software agents can be defined as autonomous software components operating within a network. They perform specialized tasks by traversing the network and working independently or in conjunction with other software components. The problem of bottlenecking or network congestion associated with a centralized manager has been shown to be non-existent with the use of mobile software agents. Mobile agents in a broad sense are programs that represent a user in a computer network, and are capable of migrating autonomously from node to node, to perform some computations on behalf of the user. In this paper, they have been introduced in an active network environment to dynamically make required changes in the network and also make dynamic network service innovation attainable.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"34 127","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application of mobile components for robust network management 应用移动组件进行稳健的网络管理
M. Konety, R. Dev, I. Chen, S. Gupta
{"title":"Application of mobile components for robust network management","authors":"M. Konety, R. Dev, I. Chen, S. Gupta","doi":"10.1109/MILCOM.1999.822662","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822662","url":null,"abstract":"The dependence on networking for communication and information exchange in real-time conditions is extensive and very important. Ensuring the operability and availability of these networks is a challenge for most network managers. We address the growing demands from network management systems as the complexity of network services increase with the arrival of new technologies. This work illustrates a novel scheme where management systems can be built from a set of independent components to address specific functional areas. These functional components can be distributed and also migrated to address management needs in adverse conditions.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-calibrating hybrid analog CMOS co-site interference canceller 自校准混合模拟CMOS共址干扰消除器
F. Kub, E. Justh, B. Lippard
{"title":"Self-calibrating hybrid analog CMOS co-site interference canceller","authors":"F. Kub, E. Justh, B. Lippard","doi":"10.1109/MILCOM.1999.821363","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821363","url":null,"abstract":"A continuous-time analog CMOS adaptive processor circuit is combined with high-power linear attenuators to implement a self-calibrating co-site interference canceller that achieves >40 dB cancellation for a +14 dBm interference level over a 30-88 MHz band. The analog CMOS adaptive processor implements the least mean square (LMS) error learning algorithm. A CMOS interference canceller is also demonstrated that is capable of cancelling multiple interfering signals simultaneously. The multiple interference CMOS co-site canceller demonstrated a frequency of operation of 80 MHz, an adaptivity of 60 dB, a minimum notch width of 25 kHz, a minimum adapt time constant of 25 /spl mu/s, and the simultaneous cancellation of two CW interferers.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of multicarrier modulations using 4th-order cumulants 利用四阶累积量检测多载波调制
W. Akmouche
{"title":"Detection of multicarrier modulations using 4th-order cumulants","authors":"W. Akmouche","doi":"10.1109/MILCOM.1999.822720","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822720","url":null,"abstract":"This paper deals with modulation classification. Our goal is to discriminate single-carrier (SC) modulations from multicarrier (MC) modulations of OFDM type. Because MC modulations are asymptotically Gaussian, we propose here a detector using the statistical test of Giannakis and Tsatsanis (1990) based on fourth-order cumulants. This test is here adapted to the specific case of digital modulations which allows one to reduce the algorithm complexity. Simulations are provided and show that in the worst case (filtered 256-QAM versus 32-OFDM) the detector achieves a probability of detection Pd=0.99 for a probability of false alarm Pfa=10/sup -2/.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127933951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Using enterprise management to provide infrastructure assurance 利用企业管理提供基础设施保障
J. Johnston, M. Martone
{"title":"Using enterprise management to provide infrastructure assurance","authors":"J. Johnston, M. Martone","doi":"10.1109/MILCOM.1999.822726","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822726","url":null,"abstract":"Managing and securing information and assets are key elements to operations and business in the next decade. Infrastructure assurance (IA) and enterprise management (EM) have become a big part of the information technology (IT) industry focus. This article explains how enterprise management processes and systems can be leveraged to enforce and act upon IA policies. We describe the intersection of these two technologies and how enterprise management can be used to improve information assurance of the enterprise. We provide lists of EM capabilities and how they match up to government requirements for IA. We discuss the benefits of using EM to support IA as well as the importance of planning the definition and deployment of these two capabilities in a coherent manner. Finally, the paper presents ideas on developing a strategy to integrate these two areas and the steps involved within an organization.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing the ability of speech recognizers to measure the effectiveness of encoding algorithms for digital speech transmission 测试语音识别器的能力,以衡量数字语音传输编码算法的有效性
C. Chernick, S. Leigh, K. L. Mills, R. Toense
{"title":"Testing the ability of speech recognizers to measure the effectiveness of encoding algorithms for digital speech transmission","authors":"C. Chernick, S. Leigh, K. L. Mills, R. Toense","doi":"10.1109/MILCOM.1999.821447","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821447","url":null,"abstract":"Modern communication channels, such as digital cellular telephony, often convey human speech in a highly encoded form. Methods that rely on human subjects to evaluate the quality of such channels are too costly to deploy on a large scale; thus, automated methods are often used to model quality as perceived by humans. Traditional automated methods that use signal to noise ratios (SNR) to judge the quality of channels do not model human perception well when applied to highly encoded speech. For this reason, researchers investigate alternative means to objectively measure the quality of such channels. We explore the feasibility and applicability of using automated speech recognition technology to model human perception of the quality of communication channels that carry highly encoded (compressed) human speech.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信