军事通信技术最新文献

筛选
英文 中文
Simulation of computer communications networks using Network II.5-without programming 用Network ii .5模拟计算机通信网络,无需编程
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13513
W. J. Garrison
{"title":"Simulation of computer communications networks using Network II.5-without programming","authors":"W. J. Garrison","doi":"10.1109/MILCOM.1988.13513","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13513","url":null,"abstract":"In this tutorial, the author describes a powerful modeling tool which can dramatically reduce the amount of time it takes to simulate a computer system. The Network II.5 world view and the class of problems it addresses are discussed. A summary of Network II.5 capabilities is presented. To tie the tutorial concepts together, an example of using Network II.5 is included.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"29 1","pages":"1015-1019 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90056216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for network communication vulnerability analysis 网络通信漏洞分析方法
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13437
M.P. Ristenbatt
{"title":"Methodology for network communication vulnerability analysis","authors":"M.P. Ristenbatt","doi":"10.1109/MILCOM.1988.13437","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13437","url":null,"abstract":"A framework for a developing network vulnerability assessment methodology is described. An original network taxonomy is used to orient the analyst to the new network and to assess the potential vulnerability issues. Four network characteristics are used, as in data link vulnerability analysis susceptibility; interceptability; accessibility; and feasibility. Susceptibility issues are pursued in terms of three perspectives: topology; communication protocols; and management and control. The concept of layers, as in the open systems interconnection reference model, is used to deal with the protocol susceptibilities. Security of network control data, to deny spoofing, is included.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"35 1","pages":"493-499 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79615046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Throughput of single-hop unslotted CDMA networks with fixed packet lengths 固定分组长度的单跳无槽CDMA网络的吞吐量
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13469
M. Yin, Vu Li
{"title":"Throughput of single-hop unslotted CDMA networks with fixed packet lengths","authors":"M. Yin, Vu Li","doi":"10.1109/MILCOM.1988.13469","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13469","url":null,"abstract":"The authors present a recursive method to compute the joint distribution of bit errors for single-hop unslotted code-division multiple-access (CDMA) networks with deterministic packet lengths. The computational complexity of this method grows polynomially with M, the number of bits per packet, if the bit error probability equals 1 when the number of interferers exceeds a threshold. The complexity is O(M/sup 3/) for the L-channel model, which assumes that the probability of bit error is zero below the threshold L and 1 above the threshold. The throughput of the system can be improved by using a channel sensing protocol.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"40 1","pages":"715-720 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84710998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A frequency-hopped Ungerboeck-encoded 4-ary DPSK modem 一种跳频的ungerbook编码的4元DPSK调制解调器
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13381
S. V. Pizzi, P. J. Leary, J. deLellis
{"title":"A frequency-hopped Ungerboeck-encoded 4-ary DPSK modem","authors":"S. V. Pizzi, P. J. Leary, J. deLellis","doi":"10.1109/MILCOM.1988.13381","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13381","url":null,"abstract":"The authors discuss the design of a frequency-hopped Ungerboeck-encoded 4-ary DPSK HF modem. First, they present a general channel model. Next, they present channel simulation results for rate-2/3 encoding of 8-ary and 4-ary differentially coherent DPSK. Both additive Gaussian white noise and Rayleigh fading channels are examined. The basic structure of the frequency-hopped waveform is elucidated, and it is shown how the Ungerboeck encoding is combined with the waveform to produce the frequency-hopped encoded modulation.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"27 1","pages":"133-141 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the analytical representation of trellis codes 格子码的解析表示
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13380
E. Biglieri, Y. Liu
{"title":"On the analytical representation of trellis codes","authors":"E. Biglieri, Y. Liu","doi":"10.1109/MILCOM.1988.13380","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13380","url":null,"abstract":"The authors examine some of the features of an analytical representation for trellis-coded modulation (TCM), based on a single function f. They first consider the structure of the function, f, and observe that (i) it must be nonlinear, (ii) it can reflect certain phase-invariance properties of the code, and (iii) it can reflect the intrinsic parallel structure of the encoder. Then they provide a general parametric representation of f based on orthogonal Volterra series, and show some examples of code design for channels with intersymbol interference.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"66 1","pages":"127-131 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81723435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of a digital acquisition circuit for hybrid FH-DS spread spectrum systems 混合FH-DS扩频系统的数字采集电路性能
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13506
N. Benvenuto, G. Guidotti, S. Pupolin
{"title":"Performance of a digital acquisition circuit for hybrid FH-DS spread spectrum systems","authors":"N. Benvenuto, G. Guidotti, S. Pupolin","doi":"10.1109/MILCOM.1988.13506","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13506","url":null,"abstract":"A novel structure of an acquisition circuit which implements a digital noncoherent correlation scheme is presented. In addition, a novel control strategy based on the maximum time to perform the search is proposed. It is concluded that this technique is helpful in hybrid frequency-hopping-direct-sequence systems because it performs a multiple dwell serial search in different hops. As a consequence, the acquisition system is more robust against partial band jammers and/or channel impairments (e.g., multipath).<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"12 1","pages":"971-975 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80747235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recent technological advances in meteor burst communications 流星爆发通信的最新技术进展
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13450
Richard J. Fulthorp
{"title":"Recent technological advances in meteor burst communications","authors":"Richard J. Fulthorp","doi":"10.1109/MILCOM.1988.13450","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13450","url":null,"abstract":"The author tracks the evolution of meteor burst technology advances in system architectures of operational systems, from the first data acquisition system (1977), through the addition of communications capabilities in 1980, to the fully interoperable communications/data acquisition networks now becoming available. He shows how advances in computer technology have allowed more sophisticated capabilities, while avoiding specialized system designs, leading to generalized networks able to support a myriad of applications. He concludes that interoperability requirements will become more important and will eventually become mandatory for ensuring product compatibility between vendor supplied systems. A figure illustrating the evolution of interoperability is presented.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"30 3 1","pages":"593-597 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83320765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C/sup 3/ product quality and interoperability C/sup /产品质量和互操作性
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13393
S. Gubelmann, L. Edgar, J. Lane, B. Pawlowski, R. Otto
{"title":"C/sup 3/ product quality and interoperability","authors":"S. Gubelmann, L. Edgar, J. Lane, B. Pawlowski, R. Otto","doi":"10.1109/MILCOM.1988.13393","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13393","url":null,"abstract":"Within the military command, control, and communications (C/sup 3/) community interoperability has become a critical quality issue. A panel discussion is presented, providing a forum for: C/sup 3/ system users, C/sup 3/ system integrators, and C/sup 3/ hardware and software vendors to present their case so that a better understanding of the importance of interoperability in the development of quality C/sup 3/ products is reached.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"429 1","pages":"201-203 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78769983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coding for fast frequency hopped noncoherent MFSK spread spectrum communications under worst case jamming 最坏干扰下快速跳频非相干MFSK扩频通信编码
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13408
Q. Wang, T. Gulliver, V. Bhargava, E. Felstead
{"title":"Coding for fast frequency hopped noncoherent MFSK spread spectrum communications under worst case jamming","authors":"Q. Wang, T. Gulliver, V. Bhargava, E. Felstead","doi":"10.1109/MILCOM.1988.13408","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13408","url":null,"abstract":"The authors examine the performance of various types of error correcting codes under worst-case partial band noise jamming and worst-case multitone jamming using fast frequency-hopped, noncoherent M-ary frequency-shift-keying (NCMFSK) with optimum diversity. The bit-error-rate performance of some error correcting codes, which augments the results previously published on the subject, is given. New candidate codes with superior antijam performance are identified. It is concluded that, overall, the concatenated (255,241) Reed-Solomon outer code with the semiorthogonal convolutional inner code with 8-ary FSK has the best performance. If only nonconcatenated codes are considered, the rate 1/2 Trumpis code is best, and is only 0.89 dB worse than the best concatenated code.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"40 1","pages":"299-305 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89791528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A dedicated channel acknowledgement protocol for multihop CDMA packet radio networks 用于多跳CDMA分组无线网络的专用信道确认协议
军事通信技术 Pub Date : 1988-10-23 DOI: 10.1109/MILCOM.1988.13470
J. Dill, J. Silvester
{"title":"A dedicated channel acknowledgement protocol for multihop CDMA packet radio networks","authors":"J. Dill, J. Silvester","doi":"10.1109/MILCOM.1988.13470","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13470","url":null,"abstract":"The authors present an acknowledgement scheme for receiver-directed code-division multiple-access (CDMA) networks that takes advantage of the inherent CDMA capabilities of the radios to ensure the success of acknowledgement transmissions with very high probability. This is accomplished by placing acknowledgements on a dedicated code channel that is guaranteed to be contention free. This results in a large improvement over the performance of acknowledgements on the normal data transmission channel. Throughput expressions are developed for the cases of perfect acknowledgement, normal acknowledgement, and dedicated channel acknowledgement.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"33 1","pages":"721-725 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87975982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信