By Topic

IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201)

19-21 Oct. 1998

Go

Filter Results

Displaying Results 1 - 25 of 76
  • IEEE Military Communications Conference Proceedings Volume 3 [front matter]

    Publication Year: 1998, Page(s):i - xxi
    Request permission for commercial reuse | PDF file iconPDF (1663 KB)
    Freely Available from IEEE
  • Conference Author Index

    Publication Year: 1998, Page(s):0_2 - 0_4
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Conference Author Index

    Publication Year: 1998, Page(s):0_5 - 0_7
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • An adaptive neural network receiver for CDMA multi-user interference cancellation in multipath environments

    Publication Year: 1998, Page(s):767 - 771 vol.3
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The capacity of direct-sequence code-division multiple-access systems is severely limited by multiple access interference produced by the other co-channel users. To improve the capacity, joint-detection receivers and multi-access interference cancellation techniques have been proposed. Frequency-selective multi-path fading, however, has a significant effect on the performance of these types of rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feasibility study of erasure correction for multicast file distribution using the network simulator ns-2

    Publication Year: 1998, Page(s):1060 - 1066 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    Reliable multicast protocols on top of the MBone are presently subject to intensive research. One major field of interest is the transmission of files to large sets of receivers. We introduce a Multicast File Transfer Protocol (MFTP), which is gaining increased popularity in the commercial sector and present an enhanced version of the latter, called Multicast File Transfer Protocol with Erasure Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct-sequence spread-spectrum with multiuser detection for peer to peer packet radio

    Publication Year: 1998, Page(s):762 - 766 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The performance of direct-sequence spread-spectrum (DS/SS) in packet radio networks suffers from the near-far problem. This can be mitigated by the use of multiuser receivers. This paper introduces a model for peer to peer communications using a simple parallel interference cancellation (PIC) technique, which requires cancellation of only a few dominant interferers. The system performance is evalu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind interference suppression for DS-CDMA

    Publication Year: 1998, Page(s):741 - 745 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    The use of a blind scheme for suppressing interference in direct-sequence code-division multiple-access (DS/CDMA) communication systems is investigated. In particular, we use a blind version of the partial-bit DS-CDMA receiver to successfully suppress narrow-band and near-far multiple-access interference without requiring knowledge of other users' spreading codes, timing or phase information. Perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some suboptimal turbo decoders and their sensitivity to SNR estimation using DPSK modulation

    Publication Year: 1998, Page(s):1008 - 1012 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    In this paper the performances of some APP algorithms applied to the turbo code decoding in systems using DPSK modulation are investigated for the AWGN channel. The sensitivities of the algorithms to the Eb/No estimation errors is also examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Saturation routing for asynchronous transfer mode (ATM) networks

    Publication Year: 1998, Page(s):804 - 807 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The objective of this paper is to show that saturation routing, often in the past considered inefficient, can in fact be a viable approach to use in many important applications and services over an ATM network. This is demonstrated by showing that the ratio, defined as f, of routing overhead cells over information cells is small even for large networks. f is calculated using typical network parame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance under a failure of wide-area datagram networks with unicast and multicast traffic routing

    Publication Year: 1998, Page(s):939 - 945 vol.3
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    A major link or node failure in a network can severely affect services offered by the network. In this paper we address network performance, especially, in the event of a link failure in the presence of both unicast and multicast routing in wide-area datagram networks, such as the Internet. Since various services can exert different workloads (per connection/session), we have developed workloads t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping commercial ATM to the tactical radio environment

    Publication Year: 1998, Page(s):1055 - 1059 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    ATM technology offers the same technical advantages to the military user as to the civil user. ATM offers the additional advantage to the military user in that the considerable research and development investment in ATM is shared with the large non-military marketplace. The use of ATM in the tactical arena presents some unique challenges. These include the performance issues associated with error ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power vs. performance tradeoffs for reduced resolution adaptive equalizers

    Publication Year: 1998, Page(s):718 - 722 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Adaptive channel equalization algorithms are commonly used in wireless communications receivers to counter intersymbol interference, multipath dispersion, and other time varying channel degradations. We obtain approximate expressions for the increase in mean square error of the LMS adaptive algorithm when the total processing power is decreased by reducing the number of data and filter coefficient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A computer simulator of a tactical communication system

    Publication Year: 1998, Page(s):893 - 897 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1356 KB)

    A computer simulator of a tactical communication system is presented. The simulated system is a circuit-switched digital system with nodes connected by line-of-sight (LOS) links or by wire links. The node of the system is moveable. It means, that during the simulation process, they can move according to the trajectory given by the user. It is possible, that the network resources can decrease becau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of MC-DS-CDMA systems in doubly spread channels

    Publication Year: 1998, Page(s):757 - 761 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    Kondo and Milstein introduced and analyzed the performance of a system that combined multicarrier modulation (MCM) with direct-sequence spread spectrum (DSSS) in late 1993. Their system and similar systems are called MC-DS-CDMA systems. The dramatic performance improvement of this system (as compared to a single carrier system operating in a flat fading channel) is due, in part, to the use of cohe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOF tactical data networks using commercially available packet equipment

    Publication Year: 1998, Page(s):818 - 820 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    This paper presents an interim solution for the development of tactical data networks (TDN) for use by special operation forces (SOF) engaged in operations other than war (OOTW) and similar missions. Missions typified by OOTW generally require messages of greater length than typically handled by SOF communication systems. Additionally, the frequency of these messages may be hourly or less. Often t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive interference suppression in CDMA systems with large processing gains

    Publication Year: 1998, Page(s):736 - 740 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    In this paper we consider a single-user adaptive receiver for interference suppression in asynchronous direct sequence code division multiple access (DS-CDMA) communication systems with large processing gains. We propose an decomposed adaptive filter structure for which each decomposed filter can be updated either in coupled way or in uncoupled way with its previous filters. Performance results fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic performance of a coded communication system with orthogonal signaling in partial band jamming

    Publication Year: 1998, Page(s):1003 - 1007 vol.3
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    It is well known that a communication system using M-ary orthogonal signaling in additive white Gaussian noise can achieve capacity. However, in a worst case partial band jamming channel, orthogonal signaling fails to achieve capacity. In this paper, we show that a M-ary orthogonal system using coding and side information provides reliable communications in partial band jamming. In particular, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile peer-to-peer frequency-hopping communications

    Publication Year: 1998, Page(s):857 - 861 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    The potential performance of mobile peer-to-peer frequency-hopping communication systems in multiple-access networks is studied. Through analysis and simulation, the effects of Rayleigh fading, shadowing, spectral splatter, the number of frequency channels, spatial diversity, and thermal noise are examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor link protocol: linking sensor systems to the digital battlefield

    Publication Year: 1998, Page(s):919 - 923 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    The continued emphasis on battlefield digitization and communications has created a means to disseminate accurate and timely information among a variety of battlefield computer systems. These efforts now require the digital interfacing of reconnaissance, surveillance and target acquisition (RSTA) sensor systems to these battlefield computer systems. This paper describes the sensor link protocol, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for analyzing the complexity and performance of a restoration strategy based on PNNI routing in ATM networks

    Publication Year: 1998, Page(s):798 - 803 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    A methodology is presented which can be used to analyze the complexity and performance of a restoration strategy based on PNNI routing for ATM networks. The restoration strategy is built on top of the PNNI routing capabilities of ATM switches and takes advantage of unused network capacities to redirect traffic from the problem area. The proposed methodology tries to minimize a revenue-loss index d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating data for the warfighter

    Publication Year: 1998, Page(s):1048 - 1054 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    A methodology for efficiently integrating geosynchronous satellite links into communications networks by employing modern digital technology, in particular the asynchronous transfer mode (ATM), is explained. The concept of seamless interoperability is examined, and a vital C4I US Army network (the Warfighter Information Network) which will employ ATM is described. ATM cell structure is explained, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient timing synchronization technique for FFT based multi-carrier direct sequence spread spectrum transceiver

    Publication Year: 1998, Page(s):713 - 717 vol.3
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    An efficient timing synchronization technique for a low complexity FFT based multi-carrier direct sequence spread spectrum IF/baseband transceiver is presented. The timing synchronization control loop consists of a robust acquisition loop and a tracking loop that eliminates the timing phase offset caused by the transmission delay, sampling error, and channel noise. The acquisition loop reduces the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queue length performance of some non-exhaustive polling models with Bernoulli feedback

    Publication Year: 1998, Page(s):888 - 892 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We study the queue length performance in non-exhaustive asymmetric polling systems with Bernoulli feedback. We obtain the PGF (probability generating functions) and the mean values of the queue lengths. For the gated polling model we define two new service policies: departure-gated policy and service-gated policy, and we demonstrate their difference in queueing performance. In an asymmetric system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance of turbo codes

    Publication Year: 1998, Page(s):987 - 992 vol.3
    Cited by:  Papers (14)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The performance of the turbo code is sensitive to its code structure, which is made up of code rate, constraint length, tap connection, block size, interleaving pattern and number of decoding iterations. In this paper, mitigation techniques that can lower the error floor are adopted in both encoder and decoder. Optimum tap connections are listed for codes with constraint lengths 3, 4, and 5. Perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hop-by-hop, ER-based algorithm applied in ABR switches

    Publication Year: 1998, Page(s):777 - 781 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    A new ER-based switch algorithm for flow regulation of the ABR traffic in an ATM network, using a hop by hop strategy, is derived and discussed. Using this scheme, the network determines the load factor and the available capacity in each link. The scheme takes into account both the queue length and the growth rate of the queue length. As a result it explicitly acknowledges the sources about the ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.