By Topic

Military Communications Conference, 1994. MILCOM '94. Conference Record, 1994 IEEE

2-5 Oct. 1994

Filter Results

Displaying Results 1 - 25 of 215
  • Integration of DISN and commercial satellite communications system

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Summary form only given. Key issues regarding the seamless integration of commercial satellite communications system in the evolving Defense Information System Network (DISN) architectures are presented. Both the mid-term (year 2000) and the long-term (year 2005) DISN architectures are considered in the fixed and deployed/mobile environments. For the mid-term time frame, the interworking issues of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laboratory performance of spread spectrum detectors

    Publication Year: 1994, Page(s):785 - 790 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (742 KB)

    The laboratory performance of four spread-spectrum (SS) detectors (full-band and partial-band radiometers, chip-rate detector (CRD) and squaring carrier detector) was measured for direct sequence (DS) and frequency hop (FH) SS signals, FH/DS hybrids, and time hop (TH) DS signals. Probability of detection as a function of input SNR for a constant false-alarm rate was measured for numerous combinati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight generators for tactical electric power

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB)

    Summary form only given. Approximately 80 percent of the Army's generator inventory in 1988 rated less than 5000 watts ran on gasoline and were considered obsolete. These generator sets are heavy and are not considered manportable. In order to provide the Army with highly mobile sources of electric power in the 300-3000 watt range, integration of modified low-compression internal combustion engine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State-of-charge indicators [batteries]

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB)

    Summary form only given. Prediction of the capacity remaining in used batteries is important information to the user. Each year millions of dollars are spent on batteries for use in portable electronics equipment. In order to maintain readiness, users currently replace batteries on a conservative schedule. This practice results in the waste of millions of dollars in battery energy every year-appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable power sources for the special operations command

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (43 KB)

    Summary form only given. This report addresses the assessment of portable power needs for the USSOCOM and identifies low risk solutions attainable over the next few years. Power levels of 1, 10, 50, and 150 watts were initially considered. To ensure current requirements, an equipment need assessment was performed through visits to active USSOCOM users and material developers. The power technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Air Force aviation battery programs

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (49 KB)

    Summary form only given. The objective of the Air Force Wright Laboratories' battery program is to develop aviation battery systems which meet Air Force needs; this includes batteries for on-board aircraft, aircraft ground support equipment, life support/survival equipment, special operational forces equipment, and tactical weapons. The major thrust areas in the Wright Laboratories battery program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in battery usage in the Navy

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB)

    Summary form only given. Batteries are an important, often critical, part of almost every Navy system. Trends in the development and adoption of Navy batteries reflect the search for power sources which are readily available, meet increased performance requirements and have low life-cycle costs. Examples of these trends are briefly discussed. Several qualified batteries have become unavailable bec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Present status of Army battery technology

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (69 KB)

    Summary form only given. The Army Research Laboratory's (ARL) past battery R&D programs were guided by the need for higher power and energy from smaller, lighter-weight batteries. The safe storage, transportation, use and disposal of these batteries represented a much higher priority than the issue of battery cost. This earlier priority ranking was satisfied initially with the successful developme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of Army battery strategy

    Publication Year: 1994
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (58 KB)

    Summary form only given. The Army Material Command (AMC) is responsible for the design, procurement, production and fielding of the advanced batteries utilized by today's Army. These batteries are pervasive throughout the military. They are used in applications that range from computer memory batteries to supplying power to the majority of the Army's portable tactical and strategic communications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new jammer estimation method adapted to FH-PSK waveforms

    Publication Year: 1994, Page(s):1027 - 1031 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    It is well known that channel state information (CSI) can be used by the receiver to improve the BER performance of coded spread spectrum communications. Unfortunately, this information is generally not available, and has to be estimated by the receiver. The paper presents an efficient method for estimating jammer parameters, based on an iterative clustering technique. The approach presented is ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of an oversampled RAKE receiver

    Publication Year: 1994, Page(s):410 - 414 vol.2
    Cited by:  Papers (5)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB)

    The adaptive RAKE receiver can be used in spread spectrum systems to combine the separate signal energies received due to multipath propagation effects. This paper presents an analytical performance evaluation of the average BER of an over-sampled RAKE receiver on a Rayleigh fading channel, and a comparison with asynchronous architecture. It is shown that over-sampling achieves a significant BER p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of MILCOM '94

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Automatic modulation recognition with a hierarchical neural network

    Publication Year: 1994, Page(s):713 - 717 vol.3
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Introduces a methodology for building neural networks based on a hierarchical approach, and a priori knowledge incorporation to speed up the learning phase. Superiority over a single, large, fully connected neural network classifier is demonstrated in the area of the automatic modulation recognition. This approach reduces the complexity of the system in order to improve generalization reduced sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A close-form performance approximation for nonblocking ATM switches with channel grouping

    Publication Year: 1994, Page(s):77 - 81 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    We study the performance of an ATM switch which clusters a set of broadband packet channels as a transmission group. The exact analysis for the performance of systems employing this concept includes solving for the roots of equations involving transcendental functions and can only be carried out numerically. Thus, its performance has mainly been understood by the use of simulation. We derive a clo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust error resilient video compression algorithm

    Publication Year: 1994, Page(s):247 - 251 vol.1
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Compressed video data comes with a problem of sensitivity to channel errors. As a result, error resilience capability is very important for video expanders. We describe a variety of error concealment techniques which give a video compression algorithm the robustness it needs while operating in noisy channels. For the sake of simplicity, the principles of the video compression algorithm which we us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced CW jammer mitigation using partially coherent CPM reception

    Publication Year: 1994, Page(s):826 - 830 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    A partially coherent detector for continuous phase modulation with a cochannel CW jammer is analysed. Improved bit error rate performance of the partially coherent detector over the noncoherent detector in a CW jamming environment is shown. The investigation identifies the dependence of performance on the modulation index variation versus the interference power-to-signal power ratio. The selection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind deconvolution in spread spectrum communications over non minimum phase channels

    Publication Year: 1994, Page(s):463 - 467 vol.2
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Higher than second order statistics is a powerful signal processing tool and a lot of research effort has been made to find new and implementable cumulants based algorithms for system identification and deconvolution of non minimum phase systems for the application in cases of practical interest. In communications problems equalization in the presence of time dispersive channels (usually non minim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Narrowband waveform design for near-far resistant asynchronous CDMA communications

    Publication Year: 1994, Page(s):583 - 587 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    A technique to design narrowband signature waveforms for asynchronous code-division multiple-access (CDMA) systems is proposed. These waveforms are specifically tailored for a class of near-far resistant multiuser detectors, They are strictly time-limited, satisfy a root mean square (RMS) bandwidth constraint, and provide a prescribed worst-case near-far resistance. The optimization criterion is e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance of spatial smoothing techniques using the LMS algorithm

    Publication Year: 1994, Page(s):112 - 116 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The effects of correlated interference on narrowband adaptive arrays are reviewed. The performance of the spatial smoothing technique, used in a generalized sidelobe canceler with the least mean squares algorithm, is examined in terms of weight misadjustment, mean squared error, and signal-to-noise ratio. One method of combining the algorithm with spatial smoothing is shown to obey a set of nonhom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural network controller using reinforcement learning method for ATM traffic policing

    Publication Year: 1994, Page(s):718 - 722 vol.3
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    A neural network (NN) controller using the reinforcement learning method for ATM traffic policing is presented. The mechanism is based upon an accurate estimation of the probability density function (pdf) of the traffic via its count process and the design of a NN critic function capable of evaluating the system performance in terms of the pdf violation. The pdf-based policing is made possible onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using token allocations in a leaky bucket scheme

    Publication Year: 1994, Page(s):82 - 86 vol.1
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    In general, there are two categories of congestion control algorithms for ATM networks: the reactive and the preventive strategies. Leaky bucket is a common preventive bandwidth enforcement scheme to control the traffic smoothness that flows into the network. This paper investigates a simple modification of the leaky bucket method that can provide priority access to users by requiring different cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of video compression techniques and applications for the Soldier's Computer/Radio

    Publication Year: 1994, Page(s):252 - 256 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The paper discusses the emerging need for video on the battlefield and the Army's plans to incorporate a video reconnaissance feature as part of the Soldier's Computer/Radio, a subsystem of the Land Warrior system. An overview of current video compression techniques is presented. A detailed discussion of a practical implementation of video capture/compression in the Soldier's Computer/Radio is giv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation criteria for the assessment of AIN survivability

    Publication Year: 1994, Page(s):390 - 394 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    The Office of the Manager, National Communications System (OMNCS) is charged with developing an evolutionary architecture using the existing assets of the public switched network (PSN) to meet the changing national security and emergency preparedness (NS/EP) telecommunications requirements of its 23 NCS member organizations. The OMNCS explores options for integrating new PSN-based technology into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Limits of control in designing distributed C2 experiments under imperfect communications

    Publication Year: 1994, Page(s):831 - 837 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The paper evaluates the controllability of hierarchically organized C2 systems with distributed components under conditions of imperfect communications. Controllability in a C2 system depends on the number of levels of reporting in the C2 hierarchy and the amount of aggregation of events in the feedback to the command levels. Following the discrete event dynamic s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging technologies for the control of the Defense Red Switch Network (DRSN)

    Publication Year: 1994, Page(s):664 - 668 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    The evolution of the Defense Red Switch Network (DRSN) into a multi-node worldwide secure voice and data network has necessitated the requirement for centralized multilevel secure control and monitor capability. Centralized control would provide management of the BLACK Network routers, switches and multiplexers, as well as RED Switch control, status and database management. Centralized control wou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.