By Topic

MILCOM 2002. Proceedings

7-10 Oct. 2002

Go

Filter Results

Displaying Results 1 - 25 of 142
  • Global Information Grid Enabling Transformation Through 21st Century Communications [front matter]

    Publication Year: 2002, Page(s):0_1 - xix
    Request permission for commercial reuse | PDF file iconPDF (972 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s):1509 - 1513
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Iterative decoding of serially concatenated space-time codes in WCDMA systems

    Publication Year: 2002, Page(s):911 - 916 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    In this paper, concatenated space-time codes applying iterative decoding topologies are investigated in wideband code division multiple access (WCDMA) communication systems. The coding operations are based on the concatenation of a convolutional encoder, an interleaver, and a space-time code employing multiple-transmitter/multiple-receiver diversity. As the decoding algorithm, an iterative (turbo)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of an FFH/BFSK receiver with product-combining in a fading channel under multitone interference

    Publication Year: 2002, Page(s):905 - 910 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    A bit error probability (BEP) expression is derived for the fast frequency-hopping binary frequency-shift-keying spread-spectrum communication system with product-combining receiver over a slowly Rician fading channel under worst-case multitone jamming (MTJ) and AWGN environment. Two types of MTJ models, n=1-band MTJ and independent MTJ, are considered. In our study, the close-form or a single fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the design and hardware demonstration of a robust, high-speed frequency-hopped radio for severe battlefield channels

    Publication Year: 2002, Page(s):900 - 904 vol.2
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    The paper describes a robust, high-speed, frequency-hopping digital communication system that was designed, tested and implemented in hardware. Extensive trade-off analysis and simulations were performed for selecting the coding and modulation schemes, as well the receiver algorithms, that can achieve "turbo"-like performance. The implemented receiver combines soft-input/soft-output (SISO) equaliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low density parity check codes in a frequency hopped communication system with partial-band interference

    Publication Year: 2002, Page(s):895 - 899 vol.2
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    In this paper the applicability of low density parity check (LDPC) codes to a frequency hopped communications system with partial-band jamming is investigated. We show an irregular LDPC code which exhibits good waterfall and error floor performance with a block length of 1560 bits using binary phase-shift keying. The performance of this code is investigated in a partial band jammed environment wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retransmission optimization in CDMA random access networks

    Publication Year: 2002, Page(s):799 - 803 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    A one-persistent steady state retransmission scheme for packet collision in CDMA random access networks is analyzed. Instead of having the conventional analysis of a composite packet arrival model, the paper investigates and analyzes the new traffic and retransmission traffic of packet arrivals in CDMA systems independently, with two separate models. During the retransmission cycle, unlike in conv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navy intrusion detection solution

    Publication Year: 2002, Page(s):1485 - 1490 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    The USA navy is funding the development of the navy intelligent agent security module (IASM) to supplement and enhance the performance of network security products deployed by the navy. IASM will collect and correlate data from assorted network security products, reduce the false alarm rate, detect anomalies not previously known, automate the process of analyzing the data and determining appropria... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Target recognition and classification using neural networks

    Publication Year: 2002, Page(s):1439 - 1442 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Intelligent systems such as neural networks and fuzzy logic or a combination thereof have been successfully applied to solving problems in the area of pattern recognition. Neural networks are modeled off the biological neurons in the body and their triggered responses to stimuli; while, fuzzy logic uses human linguistic and expert knowledge to make decisions. In many situations, there are multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and demonstration of live audio and video over multihop wireless ad hoc networks

    Publication Year: 2002, Page(s):1211 - 1216 vol.2
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB) | HTML iconHTML

    An ad hoc network is a collection of mobile nodes using wireless network interfaces to communicate among themselves, discovering and routing along possibly multihop routes to each other without the assistance of fixed infrastructure. In this paper we describe the design and demonstration of a set of simple routing protocol mechanisms that substantially improve the transmission of real-time multime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion-resistant ad hoc wireless networks

    Publication Year: 2002, Page(s):890 - 894 vol.2
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    The subversion of the routing function in ad hoc networks can lead to denial of network service. Ad hoc networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised wireless routers or "intruders". Current routing algorithms for such networks contain few, if any, mechanisms for providing robust network operation in the face of DoS attacks launched on the rou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing near-far resistance for linear CDMA detectors

    Publication Year: 2002, Page(s):794 - 798 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Near-far resistance is one of the most important performance measures in a CDMA multiuser communication system, especially when power control is difficult to implement, such as in an ad hoc wireless network. The optimum multiuser detector can achieve the optimum near-far resistance. But due to its high computational complexity, the optimum detector is impractical to implement. Cost-effective subop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based vulnerability assessment system intended for tactical digitized networks

    Publication Year: 2002, Page(s):1481 - 1484 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    (U) Preliminary results, progress to date, and plans to develop CyberSleuth for tactical digitized communications and information networks are reported in this paper. CyberSleuth is a conceptual prototype of an autonomously adaptive agent-based vulnerability assessment system, developed by the USA Army Research Laboratory and its partners, capable of providing continuous protection of resource-con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A more powerful space-time trellis-coded modulation scheme

    Publication Year: 2002, Page(s):1049 - 1052 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    The space-time trellis-coded modulation (STTCM) scheme proposed by Tarokh et al. (1998) provides a good trade-off between constellation size, data rate, diversity advantage and trellis complexity. In this paper, with two transmit antennas and one receive antenna, we found another STTCM scheme, which is concatenated by conventional TCM and Alamouti (1998) space-time code, is more powerful than the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The National Guard's Distributive Training Technology Project: standing ready to support the global information grid

    Publication Year: 2002, Page(s):1433 - 1438 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    To support its Distributive Training Technology Project (DTTP) - an advanced distributed learning (ADL), information-delivery, and communications system designed to enhance the National Guard's readiness capabilities and fulfill related missions - the National Guard built a nationwide terrestrial network to link sites in all 54 USA states and territories. This communications backbone, which consis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A load-sensitive QoS routing algorithm in best-effort environment

    Publication Year: 2002, Page(s):1206 - 1210 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The increase in real-time applications such as voice over IP, audio and video streaming in the public Internet has warranted QoS based routing. But today's Internet largely supports best effort traffic. Thus, a QoS routing in the best effort environment is required to support real-time applications. Flooding of some QoS attributes (e.g. available bandwidth) has been used for QoS routing. But we be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware-based approach for preventing distributed deny of service attacks

    Publication Year: 2002, Page(s):1124 - 1129 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    We extend our previous study on VPOE (virtual private operation environment) to provide DDOS (distributed denial of service) prevention in a distributed heterogeneous environment (Wei Yu et al., IEEE Trans. on Systems, Man, and Cybernetics, 2002). We introduce our integrated middleware-based defense system to support this service by studying two important components, middleware box and domain agen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of ground segment broadcast architectures for the Wideband Gapfiller Satellite (WGS)

    Publication Year: 2002, Page(s):1412 - 1416 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    The purpose of this paper is to summarize the findings of an assessment tasked by the joint staff regarding the broadcast ground segment architecture for the Wideband Gapfiller Satellite (WGS). WGS has the capability to permit Global Broadcast Service (GBS) injection at either Ka-band (30 GHz) or X-band (8-GHz), and be cross-banded and received by current GBS receive-only suites at 20-GHz. Origina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable security schemes for ad hoc networks

    Publication Year: 2002, Page(s):1089 - 1094 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Inherent characteristics of any ad hoc network such as dynamic topology and limited physical security poses severe security challenges to the network. Hence, these networks demand much stronger security mechanisms than the traditional networks. It is hard to achieve security and robustness in the routing protocols at the same time in such networks. Several issues have to be understood and addresse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The wireless networking engine with IP quality of service

    Publication Year: 2002, Page(s):884 - 889 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Rockwell Collins is developing a Joint Tactical Radio System (JTRS) compliant waveform to provide ad-hoc, dynamic wireless networking to mobile users on the battlefield. At the heart of this waveform is a flexible software system, the "Wireless Networking Engine" (WNE), which manages the transport of user data over multihop, dynamically changing radio links. The WNE allows Quality of Service (QoS)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SINR enhancement in an IS-95 downlink receiver

    Publication Year: 2002, Page(s):790 - 793 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    We examine the performance of methods that increase the accuracy of demodulating and reconstructing a strong base station signal such that it can be canceled prior to demodulating weaker base station signals. This successive interference cancellation (SIC) process is used to increase the signal-to-interference-plus-noise ratio (SINR) of a weaker base station being demodulated above the threshold n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network topology management for mobile ad hoc networks with directional links

    Publication Year: 2002, Page(s):1476 - 1480 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (717 KB) | HTML iconHTML

    This paper investigates efficient solutions for network topology management in mobile ad hoc networks that use directional phased array antennas (PAA). Aerial backbone nodes (ABN) that are equipped with PAA in the battlefield can provide high data rate wireless links with very long ranges (∼500 miles) to meet the needs of future network centric warfare systems. However, the directionality of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combined interference cancellation and ML decoding of orthogonal space-time block code over time-selective fading channels

    Publication Year: 2002, Page(s):1044 - 1048 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    We propose a novel simplified maximum-likelihood (ML) decoder of orthogonal space-time block code (OSTBC) for wireless communications over time-selective fading channels. When the channel varies from symbol to symbol, there exists inter-transmit-antenna interference (ITAI). The proposed decoder can recognize and completely cancel ITAI and provide excellent diversity advantage of the OSTBC. When th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unicast performance analysis of extended ODMRP in a wired-to-wireless ad-hoc network testbed

    Publication Year: 2002, Page(s):1228 - 1232 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    The on-demand multicast routing protocol (ODMRP) is an effective and efficient routing protocol designed for mobile wireless ad-hoc networks. One of the major strengths of ODMRP is its capability to operate both as a unicast and a multicast routing protocol. This versatility of ODMRP can increase network efficiency as the network can handle both unicast and multicast traffic with one protocol. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JTRS applications to DoD programs: technology and implementation

    Publication Year: 2002, Page(s):1427 - 1432 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    (U) This paper summarizes advancements and lessons learned in the application of the Joint Tactical Radio System (JTRS) Software Communications Architecture (SCA) to software radios, wireless networks and wideband waveforms. It provides a brief overview of the SCA and its application to emerging radio systems. It provides insight into implementation issues in the development of programmable radios... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.