{"title":"A new algorithm for network probabilistic connectivity","authors":"Yubin Chen, Jiandong Li, Jiamo Chen","doi":"10.1109/MILCOM.1999.821337","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821337","url":null,"abstract":"A new algorithm for network probabilistic connectivity is presented. In this algorithm, the multi-step decomposition algorithm of the network states space is given. A new method to construct sub-graphs for the obtained events is proposed, which can greatly reduce the dimensions of network states space. An iterative computation is used to approximate lower bound of the value of the probabilistic connectivity. Compared with other algorithms, ours is characterized by its fast computing and converging speed, and is most suitable for approximating computation.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125676258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient use of the processing gain for coded hybrid SFH/DS-CDMA: analytical analysis","authors":"A. Jullian","doi":"10.1109/MILCOM.1999.822670","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822670","url":null,"abstract":"We consider a binary asynchronous hybrid SFH/DS-CDMA system with error-control coding on AWGN channels. We assume the case of transmitters of unequal powers and random time-varying signature sequences. Two systems are studied, one with the classical \"single user\" receiver, and one with a multiuser \"projection receiver\". For both, we analytically investigate the trade-off between channel coding and signature sequence spreading to optimise the use of the available processing gain.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pilot symbol assisted QAM with iterative filtering and turbo decoding over Rayleigh flat-fading channels","authors":"Yingjiu Xu, Hsuan-Jung Su, E. Geraniotis","doi":"10.1109/MILCOM.1999.822648","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822648","url":null,"abstract":"We investigate the application of iterative channel estimation and decoding for turbo coded M-QAM signals transmitted over slow Rayleigh fading channels. Pilot symbols are inserted periodically in the encoded data stream for the estimation of the time-variant channel state information (CSI). The decoder uses this estimated CSI, together with the received data sequence, to generate soft decisions for each data symbol. These soft decisions and the known pilot symbols are then filtered again to obtain improved estimation of the CSI. Two different algorithms, algorithm A and algorithm B, have been studied for the iterative filtering process and their performances are evaluated by simulation. At a BER of 10/sup -3/, both algorithms are within 1.3 dB of the ideal system with perfect CSI. Compared to the exponentially growing complexity of the optimal joint channel estimation and decoding system, the proposed system has a linear complexity when algorithm A is used and a polynomial complexity when algorithm B is used, thus providing low-complexity alternatives while maintaining an effective performance improvement.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for platform IO vulnerability assessment","authors":"R.L. zum Brunnen, P. Ciolek, F.T. Beale","doi":"10.1109/MILCOM.1999.822728","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822728","url":null,"abstract":"The Survivability/Lethality Analysis Directorate (SLAD), US Army Research Laboratory (ARL) has been tasked with the responsibility to develop a methodology and program for use in the assessment of the vulnerabilities made possible with the internal integration C4I systems on major weapons platforms e.g.: M1A2 Abrams Main Battle Tank, AH-64 Apache Attack Helicopter, etc. The ultimate goal of this program is to develop an integrated methodology and toolset that can be used to identify and assess vulnerabilities of integrated C4I systems. The information operations vulnerability/survivability assessment (IOVSA) is a process of analytical steps, which the SLAD of the ARL applies to networked automated information systems (INFOSYS) of military interest. The goal of SLAD's information system survivability tools, techniques, and methodology (TTM) development program is to generate predictive computer models that predict, as closely as is reasonably possible, the real world observed behavior of specific information processor properties caused by various real world stimuli using an agreed upon set of metrics. These stimuli range from normal network operations to the stressing stimuli caused by various software errors, hardware errors, and the multitude of the different forms of intentional or unintentional misuse and hostile attacks to which an information processor may be subjected.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132564621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MMSE based fully distributed power control algorithm","authors":"A. Almutairi, H. Latchman, T. Wong, S. Miller","doi":"10.1109/MILCOM.1999.822665","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822665","url":null,"abstract":"In this paper, a fully distributed power control algorithm (PCA) based on the minimum mean squared error (MMSE) receiver is introduced. We study the performance of a synchronous MMSE based DS-CDMA system in which the proposed PCA is implemented. The receiver filter coefficients are obtained using the Wiener solution or an adaptive algorithm. We also study the convergence of the SINR and the total transmitted power and we compare, in terms of the capacity, the performance of a system in which the proposed power control has been implemented with a system without power control.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Zbozny, J. Keenan, R. Menell, S. Turczyn, C. Lin
{"title":"Development and application of the 188-220 protocol test tool network analyzer (PTTNA) prototype","authors":"J. Zbozny, J. Keenan, R. Menell, S. Turczyn, C. Lin","doi":"10.1109/MILCOM.1999.821358","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821358","url":null,"abstract":"The 188-220 protocol test tool (PTT) suite was developed by the US Army CECOM Software Engineering Center. It combines software and hardware to monitor, decode, display, and analyze MIL-STD-188-220 traffic on the combat net radio (CNR) network. It operates under the Microsoft Windows NT operating system on a Pentium-class personal computer. This paper describes the entire suite of tools, but focuses on the development process, functionality, and application of the network analyzer, the suite's most recent addition. This tool was utilized extensively throughout the force battle command brigade and below (FBCB2) setup and connectivity testing and the FBCB2 limited user test (LUT) during the summer of 1998 to test and troubleshoot CNR networks.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"580 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-identification on Window environment by using the speech","authors":"Jong-Soon Jung, Jaeok Bae, K. Jang, M. Bae","doi":"10.1109/MILCOM.1999.821446","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821446","url":null,"abstract":"We implement an individual verification system for a multimedia environment such as Windows 95 by using DTW (dynamic time warping). The conventional method for speaker recognition uses a password through the keyboard. However, this paper uses speech. The major feature of this study is summarized as follows. (1) We make a complete reference pattern by updating the new speech pattern with the F/sub 1//F/sub 0/ ratio. This method has a high recognition rate compared with the other systems whose performance degrade rapidly as time goes on. (2) We use the F-ratio values as weighted values of the cepstral coefficients. We find that the weighted cepstrum reveals an effect on intensifying the difference between the customer and the imposter. Also the speaker recognition rate is improved by more than 5% than the conventional DTW pattern matching with cepstrum. This shows the possibility that the speech signal can be used as a means of individual verification on a Windows environment.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G.J. Graupmann, C. Usn, K. Ota, J. Isaacson, P. Thomas, K.A. Fiscko
{"title":"Potential use of commercial Ka-band to augment wideband MILSATCOM systems","authors":"G.J. Graupmann, C. Usn, K. Ota, J. Isaacson, P. Thomas, K.A. Fiscko","doi":"10.1109/MILCOM.1999.821448","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821448","url":null,"abstract":"A DoD study team is presently examining future commercial Ka-band satcom systems for their potential to meet DoD communication requirements. Substantial commercial capacity is expected to exist in 2010, offering significant potential to augment DoD-owned systems. Although a DoD Candidate Commercial Requirements Document has been published, more requirements definition and refinement is needed. Possible DoD courses of action range from anchor tenancy to \"wait and see.\" The DoD study team has recommended a course of action regarding commercial broadband systems to the senior DoD leadership.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate adaptive OFDM (RA-OFDM) spread spectrum system for LEO satellite communications","authors":"Zhong Ye, G. Saulnier, M. Medley","doi":"10.1109/MILCOM.1999.822758","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.822758","url":null,"abstract":"Wireless communications systems in a tactical environment must be able to function effectively in a channel characterized by multipath fading and interference. Additionally, current and future communications requirements will necessitate the transmission of many different types of information with a wide range of data rates over these wireless links. Rate adaptive signaling is a powerful way to design a robust system across such broad range of channel conditions because the system will not have to be designed for the worst case scenario and system resources can be utilized more efficiently. In this paper, we apply our previously proposed rate adaptive OFDM spread spectrum system concept to a LEO satellite (LEOS) communications application. We demonstrate the feasibility of rate adaptation by analyzing the link margin of a LEOS link characterized by free space loss, multipath fading and interference. A Doppler based rate adaptation algorithm is proposed to constantly measure and predict the mobile terminal received signal strength and to control the system processing gain accordingly. Desired system performance can be maintained across a large dynamic range of signal strength by the proper control of the processing gain.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"236 S725","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Narrowband jammer suppression in coded DS-CDMA channels","authors":"J. Thomas, E. Geraniotis","doi":"10.1109/MILCOM.1999.821319","DOIUrl":"https://doi.org/10.1109/MILCOM.1999.821319","url":null,"abstract":"Existing narrowband jammer suppressors for DS-CDMA, typically function independently of the multiuser interference cancellation strategy used. Besides, certain high-performance jammer suppression techniques, e.g., linear MMSE suppression, assume that the powers and frequencies of the interfering signals are known, or that they can be adaptively estimated. The former is never true in practice and the latter is not feasible when long spreading codes are used. The present work eliminates these restrictions, by applying the idea of iterative MMSE multiuser interference suppression, introduced earlier by the authors, to this context. The first iteration in this procedure is effectively MMSE multiuser interference cancellation; the parameters of the jammers are unknown at this stage. The outputs of all users' soft decoders (applied to the demodulator outputs of this iteration) are then fed back to subtract their (estimated) cumulative contribution from the received signal vector; the residue comprises the narrowband jammers embedded in wideband noise, so that the former can be piecewise interpolated over chip intervals of appropriate duration, and thence subtracted from the received signal for the succeeding iteration. The soft-decoded feedback estimates of the interfering signals are also used in each iteration to perform soft MMSE multiuser interference suppression, in conjunction with subtractive interference cancellation. The approach is extended to exploit the enhanced separation (in the spatial sense) that is afforded by employing multisensor receivers.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}