By Topic

MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)

Oct. 31 1999-Nov. 3 1999

Go

Filter Results

Displaying Results 1 - 25 of 151
  • MILCOM 1999 IEEE Military Communications Conference Proceedings Vol 2 [front matter]

    Publication Year: 1999, Page(s):i - II
    Request permission for commercial reuse | PDF file iconPDF (1464 KB)
    Freely Available from IEEE
  • Authors index

    Publication Year: 1999, Page(s):1501 - 1505
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • On providing survivable QoS services in the next generation Internet

    Publication Year: 1999, Page(s):902 - 907 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    We present a comparative study of two schemes to provide survivability for guaranteed QoS connections in a possible next generation Internet network architecture. In the first scheme a QoS connection is provided by standby backup resources on a disjoint path by reserving resources on both the working and backup path. In order to reduce the amount of backup resources required a method for sharing b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-conservation for tactical robot networks

    Publication Year: 1999, Page(s):1429 - 1433 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Advancements in mechanical and sensor technologies promise a wealth of new and exciting robotic devices. However, in order for these systems to perform advanced collaborative problem solving, sophisticated communications capabilities must be available. The importance of energy-conservation for general mobile communications has been well established through practical and research experience. The ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of multicast and priority-based routing under a failure in differentiated-services Internet

    Publication Year: 1999, Page(s):897 - 901 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    We study the transient network behavior of multicast and unicast connections in a differentiated-services capable Internet architecture under a major link failure. This is done using the MoMaRS 2.5 simulation tool that we have developed where we have implemented a multicast routing component and priority-based scheduling/routing to emulate a differentiated-services environment. In our simulation r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering with power control

    Publication Year: 1999, Page(s):1424 - 1428 vol.2
    Cited by:  Papers (40)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    This paper proposes a stable, dynamic, distributed clustering for energy efficient networking. Via simulation, we evaluate the impacts of mobility and transmission power variation on network stability View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive and diversity arrays for frequency-hopping systems

    Publication Year: 1999, Page(s):929 - 933 vol.2
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    The performance of an adaptive array is compared with that of an ideal diversity array for frequency-hopping systems in a mobile peer-to-peer communication network. Both independent and completely correlated Rayleigh fading at the antennas are examined. The adaptive array uses the maximin algorithm, while the diversity array uses predetection equal-gain combining with perfect cophasing. Multiple-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A de-jittering scheme for the transport of MPEG-4 and MPEG-2 video over ATM

    Publication Year: 1999, Page(s):1211 - 1215 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    A de-jittering scheme which can be used in the transport of MPEG-4 and MPEG-2 video to absorb any introduced network jitter is proposed. The essence of the de-jittering scheme is based on the statistical approximation of the delay variation in the arrival times of video packets carrying encoded clock reference values and a filtering and re-stamping mechanism. In addition, an overview of the MPEG-4... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless quality of service assurance for network survivability

    Publication Year: 1999, Page(s):893 - 896 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This research paper investigates a wireless network reliability scheme that implements research on mobile agents and quality of service (QoS) techniques. Real-time measurements of network characteristics can serve as QoS parameters upon which to base a calculation of a least cost path for rented information on a network. It is described how mobile agents can gather these real-time QoS values from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A traffic control scheme to optimize the battery pulsed discharge

    Publication Year: 1999, Page(s):1419 - 1423 vol.2
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A model for battery behavior taking into account the recovery effect is presented. The recovery capability of the battery is represented as an exponential function of both the state of charge and the discharged capacity of the battery. Using the proposed model, the benefits of the pulsed battery discharge relative to the constant discharge are shown. Then, we introduce a new battery management tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Military communications satellite system multiplies UHF channel capacity for mobile users

    Publication Year: 1999, Page(s):1145 - 1152 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    The mobile user objective system (MUOS) will be the successor to the Navy's UFO satellite communications system. One MUOS proposal relies on a constellation of GEO spacecraft that uses non-processing repeaters and multiple spotbeams for worldwide Earth-coverage. UHF frequency reuse greatly increases the number of narrowband voice/data channels available to mobile units. A key design element is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cosite interference simulation

    Publication Year: 1999, Page(s):1267 - 1271 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Mutually destructive interference can occur among radios located at a common site. Fifty radios may be located in an Army tactical operations center (TOC). Identification and classification of cosite interference is difficult due to the extremely bursty nature of military transmissions. In support of the Army's First Digital Division we developed a simulation to model the performance of ultra high... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind adaptive space-time receiving and transmitting diversities for multiuser DS-CDMA systems

    Publication Year: 1999, Page(s):924 - 928 vol.2
    Cited by:  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Blind adaptive space-time processing techniques are developed for both uplink reception and downlink transmission in multiuser TDD DS-CDMA systems to overcome multipath fading effects and multiple access interference. The system consists of a space-time array, a decorrelator, and a weight-adapter. For uplink reception, a hybrid combination of the constant modulus algorithm and decision-directed al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application specific integrated circuit implementation of a multiple correlator for UWB radio applications

    Publication Year: 1999, Page(s):1207 - 1210 vol.2
    Cited by:  Papers (11)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The Time Domain Corporation (TDC) has advanced their development of ultra wideband (UWB) technology to the point of having designed and produced an application specific integrated circuit (ASIC) solution for the correlator function in their UWB radio architecture. This paper describes the implementation of an ASIC multiple correlator for UWB radio applications up to 3.0 GHz. The topics covered inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WIN-T-the Army's new tactical intranet

    Publication Year: 1999, Page(s):1383 - 1387 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    This paper describes the Warfighter Information Network Tactical (WIN-T), the US Army's objective replacement for the legacy tri-service tactical communications (TRI-TAC) system and the mobile subscriber equipment (MSE). These systems, known collectively as the area common user system (ACUS) are now nearing the end of their planned life cycle. Their replacement, WIN-T, will provide an advanced sea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demand re-registration for PCS database restoration

    Publication Year: 1999, Page(s):887 - 892 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    In this paper, we propose a new visitor location register (VLR) failure recovery scheme called demand re-registration for personal communications services (PCS). In this scheme, the VLR broadcasts a re-registration request to all mobile stations (MSs) after the VLR failure. When an MS receives the re-registration request, it sends a registration message to the VLR to recover the location record. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Satellite payload architectures for wideband communications systems

    Publication Year: 1999, Page(s):865 - 869 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Future communications satellites will employ broadband communications techniques. In order to provide for a planning of their development and conceptual design, various satellite payload architectures need to be investigated. Of particular interest, the architectures discussed in this paper include no-processing, partial-processing, and full-processing satellite payloads. Functional characteristic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of turbo codes over magnetic recording channels

    Publication Year: 1999, Page(s):806 - 810 vol.2
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    We study the performance of turbo codes for magnetic recording channels using realistic channel models. The main objective is to provide a benchmark for the future studies on the subject. We examine a variety of schemes including the use of parallel concatenated turbo codes with and without turbo equalization and convolutional codes with an interleaver (can be regarded as a serial concatenation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for energy-efficient multicasting in ad hoc wireless networks

    Publication Year: 1999, Page(s):1414 - 1418 vol.2
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    We address the problem of multicasting in military ad hoc networks from the viewpoint of energy efficiency. We discuss the impact of the wireless medium on the multicasting problem and the fundamental trade-offs that arise, and we propose and evaluate several algorithms for defining multicast trees when transceiver resources are limited. The algorithms select the relay nodes and their transmission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference on UHF SATCOM channels

    Publication Year: 1999, Page(s):1141 - 1144 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    This document describes testing performed to characterize the uplink and downlink ultra high frequency (UHF) satellite communications interference environment and allow analysis of potential mobile user objective system (MUOS) interference mitigation techniques View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic access controls in the Defense Message System (DMS)

    Publication Year: 1999, Page(s):1262 - 1266 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Access controls in legacy messaging systems such as AUTODIN rely heavily on human intervention. DMS provides an organizational and individual messaging capability with automatic access control based on a message security label and the authorizations of the originator and recipient as conveyed in their respective International Standards Organization (ISO) X.509 Certificates and Extensions. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti multipath cellular radio location for DS/CDMA systems using a novel EKF subchip RAKE tracking loop

    Publication Year: 1999, Page(s):1328 - 1332 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    This paper discusses an improved method for localization in a DS-CDMA based cellular-phone communication link. This method suggests an optimization for code synchronization, which allows for TDOA (time difference of arrival) estimations to be solved for the position of a mobile phone. It is known that the time delay of a received DS signal, derived from the classical DLL, may express severe timing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new algorithm for network probabilistic connectivity

    Publication Year: 1999, Page(s):920 - 923 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    A new algorithm for network probabilistic connectivity is presented. In this algorithm, the multi-step decomposition algorithm of the network states space is given. A new method to construct sub-graphs for the obtained events is proposed, which can greatly reduce the dimensions of network states space. An iterative computation is used to approximate lower bound of the value of the probabilistic co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast adaptive receiver for interference suppression in DS-CDMA systems

    Publication Year: 1999, Page(s):821 - 825 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We consider an asynchronous direct-sequence code-division multiple-access system in the near-far situation with additive white Gaussian noise. To suppress multiple access interference, we propose an adaptive receiver scheme that has a faster convergence rate than the conventional N-tap adaptive receiver (NAR). An NAR is decomposed into D<N subfilters and a D-tap adaptive combining filter is add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithmic approach to preamble sequence optimization

    Publication Year: 1999, Page(s):993 - 997 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    When using coherent demodulation techniques, it is often necessary to include sequences of known symbols within the transmission in order to facilitate synchronization and, when advanced equalization algorithms are employed, channel estimation. In many cases it is possible to employ well-known sequences with desirable properties for use in synchronization. In some cases, however, to remove the ove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.