By Topic

EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security. IEEE/AFCEA

Date 19-19 May 2000

Filter Results

Displaying Results 1 - 25 of 88
  • IEEE/AFCEA EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security (Cat. No.00EX405)

    Save to Project icon | Request Permissions | PDF file iconPDF (427 KB)  
    Freely Available from IEEE
  • Author index

    Page(s): 418 - 419
    Save to Project icon | Request Permissions | PDF file iconPDF (112 KB)  
    Freely Available from IEEE
  • Reliable data processing in an integrated GPS-based airborne navigational equipment

    Page(s): 91 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB)  

    This paper presents the structure and algorithms of fault-tolerant data processing in an integrated GPS-based airborne navigational equipment intended for enhancing the integrity of the whole navigational system. Failures and malfunctions of different sensors have been described by the additive Gauss-Markov models and by the outliers with the Markov properties. For such models sub-optimal algorithms have been developed using problem decomposition, Gauss approximation method and the generalized likelihood ratio (GLR) approach. It is shown that the system structure contains a GLR failure detector, a multichannel outliers screening procedure and a bias cancellation algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spread spectrum communications using chirp signals

    Page(s): 166 - 170
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB)  

    We report on the use of broadband chirp signals for spread spectrum systems in indoor applications. The presented system concepts make use of chirp transmission and pulse compression. Different modulation schemes for the chirp signals resulting in different system performance and complexity are compared in terms of bit error rate for the AWGN channel and for frequency selective indoor radio channels. We present simulations and measurement results from demonstrator systems which use surface acoustic wave (SAW) devices for the generation and matched altering of the chirp signals. The RF and IF frequency and transmission bandwidth of the presented systems are 2.4 GHz, 348.8 MHz, and 80 MHz, respectively. Due to the processing gain of 16 dB-made possible by the use of SAW devices-and the large transmission bandwidth the system is insensitive against frequency selective fading, CW interference and noise View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new secure electronic auction scheme

    Page(s): 54 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB)  

    A secure electronic auction scheme is designed based on an improved secure multiparty computation protocol and bit commitment protocol. The scheme is characterized by the fact that all bids of the losing bidders are secret except the winning bidder View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-centric warfare: impact on army operations

    Page(s): 288 - 295
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (576 KB)  

    The American military foresees five new concepts emerging to guide the future operations of joint military forces. The first four are dominant maneuver, precision engagement, focused logistics, and full-dimensional protection. The fifth is information superiority-which will enable the first four concepts. This paper outlines these concepts and explains how the power of the network, through network-centric computing, is used to achieve information superiority. The paper conceptualizes information superiority as being achieved through three ad hoc grids: sensors, information, and shooters. These grids will coalesce as needed from existing resources: sensor platforms, computational nodes, weapons platforms, and communications links. These resources are intentionally designed to be pulled together to serve the Joint commander's needs, for an entire campaign or a single battle. Commanders will use the power of their vast information resources to engage and overwhelm the enemy through the exercise of all five operational concepts. The paper concludes with examples from Army tests and experiments showing how the power of information is changing the way battles are fought-and won View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple adaptive up-link power control algorithm for DS/CDMA system

    Page(s): 16 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (260 KB)  

    Power control is a fundamental process in direct sequence coded-division multiple-access (DS/CDMA) system. A proper algorithm must be employed on both the transmitter and receiver to mitigate near-far problem and prevent fading while maintaining sufficient transmission quality. This paper presents a simple adaptive up-link power control algorithm with simple yet effective features implemented on mobile handsets as well as on base stations. Simulation results show the improved performance of the proposed algorithm over current fast feedback closed-loop power control (FPC) algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy modular arithmetic for cryptographic schemes with applications for mobile security

    Page(s): 263 - 265
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (244 KB)  

    Modular arithmetic is a key operation in modern cryptology. This paper presents a modified modular computation strategy to simplify processing of modular arithmetic for cryptographic applications. A novel technique called fuzzy modular arithmetic is presented. The impact of this technique on the implementation of modular computations is discussed in particular cases. The impact of the technique on system security for some cryptographic schemes is also shown. The technique could be employed in low complexity mobile security and electronic cash identification mechanisms. The proposed fuzzy arithmetic can be generalized to fit into many other real-world security applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of frequency and time domain coded OFDM over fast fading LEO channels

    Page(s): 179 - 183
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (368 KB)  

    The orthogonality loss described by intersymbol interference (ISI) and interchannel interference (ICI) when using an OFDM system over LEO satellite channels has been discussed. Major causes of the loss, such as significant Doppler frequency offset, fast fading distortions during OFDM symbols and multipath delays have been studied. The models put up for analyzing are based on their continuous waveforms, using the summation of sine and cosine series. The results obtained give a clear picture of how and to what degree these distortions could affect the useful OFDM symbols. A stochastic model has been developed for modeling the time-varying behavior of the received OFDM signal. Different frequency and time domain coding schemes as well as combined frequency-time domain coding (two-dimensional coding) scheme have been examined. Simulation results have shown that coding in the frequency domain gives a better performance in the slow multipath fading LEO channel, while coding in the time domain is more suitable in the fast fading LEO channel. Combined frequency-time domain coding which has the same complexity as the other two schemes is not suitable for the LEO channel View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of COFDM in a terrestrial multipath environment

    Page(s): 388 - 391
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (288 KB)  

    Coded orthogonal frequency division multiplexing (COFDM) has existed for many years but it was not until 1997 when the European Telecommunications Standards Institute proposed its use for the transmission of digital television through a terrestrial channel. Up to date, an assumption has been made concerning the resilience of COFDM in a multipath environment. This paper discusses this assumption, give results of a DVB-T compliant simulation and discuss the validity of this assumption based on the obtained results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The position location system using IS-95 CDMA networks

    Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (392 KB)  

    The position location systems have become a hot issue over the past few years in wireless communication. So far, many people have thought of the Global Positioning System (GPS) as position location system. However, we can use the code division multiple access (CDMA) networks of the position location system. Two systems considered for position location system in CDMA networks are direction finding and ranging. We have examined the position location system by considering the direction finding and ranging system and analyzed the performance of both systems. We also propose a position location system for mitigation of the non-line of site (NLOS) propagation error in IS-95 CDMA networks. We show that the proposed position location system improves the performance of the NLOS ranging error mitigation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Narrowband FM demodulation on multi purpose DSPs, according to ETS 300 086

    Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB)  

    In this paper we focus on an algorithm to demodulate narrowband FM signals. This algorithm is designed for a general purpose fixed point DSP with standard audio analog to digital converters View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the design of error detection and correction cryptography schemes

    Page(s): 266 - 268
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB)  

    The paper introduces the method of modifying cryptography encryption and decryption units, which includes circuitry of checks that operations have been performed without errors. This technique is based on addition to storage devices, error correction codes, and module check of arithmetic and logic units operations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient transmission and routing protocols for wireless multiple-hop networks and spread-spectrum radios

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (472 KB)  

    We describe link and network layer protocols that can conserve energy in store-and-forward packet radio networks. At the link layer, an adaptive-transmission protocol allows the radios to adjust the power in the transmitted signal and the information rate to respond to variations in interference and propagation loss. The network layer protocols are designed to account for the energy requirements of the alternative routes for each source-destination pair. Routing is accomplished using least-resistance routing (LRR) with a metric that includes a measure of the energy consumption View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low power silicon RF ICs

    Page(s): 404 - 407
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (284 KB)  

    We present low-power integrated circuits for RF and microwave applications manufactured in low-cost silicon bipolar technology. These circuits are a dual-modulus prescaler with a maximum operating frequency of more than 6 GHz and a power consumption of only 7.4 mW and a static frequency divider with a divide ratio of eight which operates up to 18 GHz with a power consumption of 40 mW View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monolithic integrated LNAs in silicon-based bipolar technologies

    Page(s): 400 - 403
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (288 KB)  

    Receiving of weak signals in wireless applications demands for low-noise amplifiers with low noise figure around the carrier frequency. The enhanced potential of advanced silicon technologies for integrated LNAs is investigated. Silicon (including Si/SiGe) technologies are shown to offer LNA function with noise figures of about 1 dB in the region up to about 2 GHz used for mobile communications. For frequencies around 10 GHz a 50 Ω noise figure of 2 dB is presented with gain of >20 dB in a 0.5 μm/80 GHz Si/SiGe bipolar technology. From these excellent results in gain and noise, it can be expected that silicon-based RF technologies will also fulfill the requirements of future systems at higher frequency bands (e.g. of WLANs at 17.2 GHz, radio links up to 23 GHz, eventually even LMDS at 28 GHz), enabling the realization of completely monolithically integrated receivers and transceivers in low-cost silicon production technologies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A NATO-interoperable, tactical command and control system for land forces

    Page(s): 278 - 282
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB)  

    This paper describes the initial steps in the development of a brigade-sized wireless internet system for the Army of the Czech Republic (ACR). In co-operation with the ACR and its Military Technical Institute of Electronics (VTUE), the US Army Communications-Electronics Command (CECOM) and the MITRE Corporation are providing advice on systems engineering and system architecture design for the ACR's Ground Forces Tactical Command and Control System (GF TCCS). The objective system will use a high proportion of commercial off-the-shelf networking software, and government off-the-shelf equipment, including military mobile radios and switches. The key constraints, mandated by VTUE, were as follows: the operating system (Windows NT), the net hardware (radios and switching systems), and NATO compatibility. The tasks on which the CECOM/MITRE team is advising are architectural consultation, systems design and engineering development, database design, user interface consultation, and interoperability analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiprovider, universal, e-mail service for the secure exchange of legally-binding multimedia documents

    Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB)  

    A universal service is proposed for the implementation of multimedia secure communications based on the use of the digital signatures and bearing the same legal value of the Post Office registered mail services. The technology proposed for its implementation is described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel assignment algorithms with capture effects in cellular digital packet data

    Page(s): 383 - 387
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB)  

    Performance evaluation of channel assignment algorithms with capture effects in cellular digital packet data (CDPD) networks is presented. Comparisons are made for two criteria namely, data throughput and average delay. The performance of the proposed algorithm is compared with dedicated and frequency hopping channel assignments without capture effects. A simulation program is used to analyze the proposed algorithm and the results are reported for different burst size and data traffic densities. Recommendations are made based on the merits of the algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource cost and QoS achievement in a contract-based resource manager for mobile communications systems

    Page(s): 392 - 397
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (700 KB)  

    The management of QoS in mobile communications networks has been a popular research topic for many academic and industrial organisations. Many techniques have been developed to route network traffic according to application specific requirements. Consequently, significant contributions have been proposed to improve network operator infrastructures. However, little has been done for the management of QoS from a service provider/application developer perspective. This paper presents an integrated QoS management scheme where management entities, possibly belonging to different administrative parties, can negotiate QoS contracts in a multi-vendor, multi-technology and multimedia environment. The traded commodity, the QoS contract, can be defined in many ways: as a service specific quality contract for the service provider/application developer, as a network specific performance contract for the network operator or as a generic QoS contract for negotiations. In this paper, simulation results show the benefits of link adaptation techniques in the maintenance of QoS contract requirements over lossy wireless links. For that purpose, the TETRA system has been used as an experimental platform View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The interconnection of third generation mobile systems (UMTS) with fixed and wireless access networks over VB5.2 interface

    Page(s): 6 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (496 KB)  

    This paper proposes the VB5.2 interface as a basis for the definition of the generic Iu interface. The architecture of the emerging network that incorporates a third generation mobile system (UMTS) service node (SN), and any kind of access network (AN) technology, fixed or wireless, over the proposed VB5.2 oriented generic interface, is presented. The mapping of the call/connection control (CC) related messages, needed for the manipulation of connections, with the involvement of the broadband bearer connection control protocol (B-BCCP), is formed in a generic approach. The paper concludes pointing out possible enhancements to the existing VB5.2 interface, and mainly to the B-BCCP, in order to play effectively the role as a candidate of the Iu generic interface View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile teleworking some solutions and information security aspects

    Page(s): 322 - 325
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB)  

    Mobile teleworking is carried out by secure access to a company's local area network (LAN) or to a server via public networks. It can be realized by using virtual private network (VPN) technology based on the Internet protocol (IP). Another possibility is the direct access to a LAN using the public networks GSM and Euro-ISDN. These two solutions are described. Security and operational aspects are also considered. It is pointed out that the solution based on hardware encryption devices, guarantees a very high level of security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phase interference extractor interference canceller in DS/SS code synchronization

    Page(s): 111 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (364 KB)  

    The interference mitigation capability of a relative simple transform domain interference cancellation scheme is considered during the code synchronization step. The method is the phase interference extractor (PIE). Its performance is simulated in partial band interference. In the simulations bandlimiting, which often occurs in practice, is taken into account. It is shown that the method performs remarkable better than the matched filter synchronizer and slightly better than the notch filter in the presence of narrowband partial band interference (PBI) and like the matched filter method in the presence of wideband interference. For these reasons and since the PIE method does not require any threshold setting, it might be a good candidate as an interference canceller in future direct sequence synchronizers and detectors View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure multi-round electronic auction scheme

    Page(s): 330 - 334
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (380 KB)  

    A new multi-round standard sealed bid auction scheme based on Shamir's threshold secret sharing scheme is proposed. The scheme guarantees that no information about the losing bidders is leaked, and that the seller can collect the digital money from the winning bidder. In addition, the scheme can be easily converted into a second-bid sealed auction View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security modeling of electronic commerce infrastructures

    Page(s): 340 - 344
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (388 KB)  

    In this paper, we develop models for analyzing the security-related behavior of computer systems and networks comprising electronic commerce infrastructures. The models allow the estimation of critical security parameters of the infrastructure components and the evaluation of security mechanisms. The security parameter estimation and the mechanism evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality characteristics of the electronic commerce services provided by the complex computing and communication infrastructures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.