IEEE Conference on Military Communications

Sept. 30 1990-Oct. 3 1990

Filter Results

Displaying Results 1 - 25 of 245
  • MILCOM 90. A New Era. 1990 IEEE Military Communications Conference. Conference Record (Cat. No.90CH2831-6)

    Publication Year: 1990
    Request permission for commercial reuse | PDF file iconPDF (447 KB)
    Freely Available from IEEE
  • Practical limitations in limiting the rate-line detectability of spread spectrum LPI signals

    Publication Year: 1990, Page(s):994 - 998 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Realizable filters (such as Butterworth, Chebyshev, and Bessel filters) were used to generate bandlimited symbol sequences so that practical limitations on symbol rate-line suppression could be investigated. The signal-to-noise ratio at the output of a square-law detector, with the input matched to the symbol shape, was used as the measure of performance. Analytical results were obtained for vario... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Response time calculation for VSAT networks

    Publication Year: 1990, Page(s):1184 - 1188 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The response time of a VSAT network, which consists of network access time from VSAT terminals to the hub station, query waiting and processing time, and response queueing and transmission delay, is calculated. In addition to mathematical derivations, numerical examples are presented, and computer simulations are provided that verify the validity of the derived results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional trellis coding for MPSK

    Publication Year: 1990, Page(s):369 - 374 vol.1
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The use of multidimensional M-ary phase-shift keying (MPSK) signaling is considered for bandwidth and power efficient communication. Trellis-coded modulation is used to code N successive symbols (N-dimensional coding) of MPSK at one time to form a more complex signal than symbol-by-symbol coding, with the expectation of improved performance. In the general case, it is fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The superchannel scheme for integrated services on multiple access broadcast networks

    Publication Year: 1990, Page(s):32 - 36 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    A scheme for integrated service on multiple-access broadcast networks (MABNs) based on the superchannel concept is proposed, and a protocol for voice/data integration is described. The superchannel is a logical channel which is established on existing MABNs, and each channel can carry a different type of traffic under a special control protocol. The scheme is fully compatible with existing MABNs. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transceiver design for a high information rate LPI network

    Publication Year: 1990, Page(s):990 - 993 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    A high-information-rate direct sequence, or hybrid spread spectrum, transmitter/receiver for use in a multiuser network is described. The system contains a circuit that facilitates the assignment of multiple. distinct Gold code cycles to each node. Since each user has exclusive use of multiple symbols (cycles), each symbol can represent multiple bits, increasing the information rate with no penalt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unintentional HPM exposure from satellite launch support systems

    Publication Year: 1990, Page(s):1179 - 1183 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Due to the vulnerability of sensitive electronics to HPM (high-power microwave) illumination, electronics located near high-power systems must be protected from unintentional HPM exposure. Such exposure can occur at satellite launch facilities, where support systems, such as tracking radars, use high-power RF designs and are close to satellite launch sites. The RF environment in a typical launch s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking techniques for inclined orbit satellites

    Publication Year: 1990, Page(s):364 - 368 vol.1
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Information pertinent to satellites maneuvering in the inclined orbit, along with various tracking techniques needed to access an inclined orbit satellite, are discussed. The benefits of leaving the satellite in the inclined orbit are discussed. A hybrid tracking system (HTS) for an inclined orbit satellite is suggested. The HTS technique is an adequate method to track a satellite operating in geo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • S-band multiple-access interference study for advanced tracking and data relay satellite systems

    Publication Year: 1990, Page(s):27 - 31 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast method for tracking multiple nonstationary tones

    Publication Year: 1990, Page(s):71 - 75 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A row action projection technique with adaptive frequency space partitioning is used. A sample-by-sample update strategy provides a dynamic block size and allows for superresolution in the frequency domain with little loss of time localization. Numerical results demonstrate the superresolving capability and fast tracking rate, as well as the stability in the presence of additive noise. This techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of frequency hopped MSK signals in multitone jamming and additive white Gaussian noise

    Publication Year: 1990, Page(s):415 - 419 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Because of advantageous spectral properties, coherent minimum shift keying (MSK) is attractive for electronic counter-counter measures (ECCM) systems where high data throughput is required. These high rate ECCM systems typically use frequency-hopped (FH) spread-spectrum techniques to enhance antijam capabilities. The performance of MSK signals combined with FH in simultaneous optimized partial-ban... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquisition of the QPSK demodulator in the presence of interference

    Publication Year: 1990, Page(s):985 - 989 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The acquisition behavior of the tracking and data relay satellite system (TDRSS) receiver (a quadrative phase-shift keying (QPSK) demodulator using a dither lock detector) in the presence of interference from another user has been analyzed using a simulation model. The demodulator is composed of an automatic gain control, a QPSK Costas loop, a frequency sweep unit, lock test units, and a control u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiclass routing

    Publication Year: 1990, Page(s):622 - 626 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    An alternative to minimum-cost routing control, called multiclass routing, is presented. Multiclass routing was developed as an extension to a suite of link and network protocols for a mobile-radio environment. These protocols were based on the design of a packet radio that uses spread spectrum whose parameters are controllable in real time. In particular, a link-control protocol takes advantage o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth effects of signal fading for the mid-latitude HF channels

    Publication Year: 1990, Page(s):1215 - 1222 vol.3
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    Wideband HF measurements made in August and September of 1989 over a midlatitude 2070-km path are discussed. The channel impulse response, is estimated by correlating the received probe signal with a direct-sequence pseudo-noise coded reference. The impulse response estimate allows concomitant analysis of both the received wideband power statistics as a function of signaling bandwidth and the dela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded sine engine for direct digital synthesis

    Publication Year: 1990, Page(s):1237 - 1240 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    An efficient quadraphase generation algorithm and associated hardware implementation for the creation of phase-modulated waveforms are presented. They result in spurious performance that is limited only by available digital-to-analog converter (DAC) widths. This architecture yields an efficient implementation of a direct digital synthesizer. The design technique and associated performance characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of low PIM, zero CTE mesh for deployable communications antennas

    Publication Year: 1990, Page(s):1175 - 1178 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The requirements that led to the development of the radio-frequency reflective fabric (RF 2) for use on wrap-rib mesh-type reflectors are discussed. The advantages of this mesh include low passive intermodulation (PIM) and a near-zero coefficient of thermal expansion (CTE). The composite mesh is composed of Kevlar and beryllium copper and accommodates all mesh requirements. Measured data for the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding secret information into a dithered multi-level image

    Publication Year: 1990, Page(s):216 - 220 vol.1
    Cited by:  Papers (60)  |  Patents (206)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    A coding scheme for secretly embedding character information into a dithered multilevel image is presented. This scheme inputs both a monotone image and secret information, which is converted to binary sequences, and it outputs a single dithered image. This image contains the character data of about 2 kByte in a dithered bilevel image 3 kByte in a dithered three-level image of 256×256 pixels... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI-based network management for the Defense Switched Network

    Publication Year: 1990, Page(s):1058 - 1061 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The development, features, and preliminary test results of artificial intelligence (AI) based network management support systems for the Defense Switched Network (DSN) are described. These systems use neural network and expert system technology packaged into workstations, each providing a user-friendly interface and graphical displays. The systems are designed to diagnose anomalies and network str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meteor burst in the post 2000 era

    Publication Year: 1990, Page(s):359 - 363 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    In recent years a renewed interest has been shown in the possibility of using meteor burst links in tactical communications, both for networking and covert operations. Some of the applications that recent performance improvements would permit are evaluated. In evaluating the feasibility of a meteor burst implementation, certain technical and physical limitations are addressed. For the success of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital coding of high-definition television (HDTV) signals

    Publication Year: 1990, Page(s):22 - 26 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    HDTV will typically have a bandwidth about five times that of conventional TV. The increased resolution will provide a significant improvement over conventional television in effectiveness for many military applications. The increased signal bandwidth requirement presents a considerable challenge for transmission, storage, and processing of the HDTV signal. A digital coding technique for HDTV, whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jamming optimization in fully-connected, spread-spectrum networks

    Publication Year: 1990, Page(s):65 - 70 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    A novel framework for the analysis of the throughput-delay behavior of fully connected monohop code-division random access (CDRA) networks in the presence of additive white Gaussian noise and temporally selective jamming with fixed average power, and no side information, is presented. Three different types of probabilistic jamming models are described, namely the long term, the two-state-Markovian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probability of error for a hybrid DS/SFH spread-spectrum system under tone jamming

    Publication Year: 1990, Page(s):410 - 414 vol.1
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    A hybrid direct-sequence slow-frequency-hopped (DS/SFH) spread-spectrum system is used to achieve a larger gain in some applications. The probability of error for a hybrid DS/SFH spread-spectrum system is calculated over a channel which suffers from multiple-tone jamming and additive white Gaussian noise (AWGN). Binary phase-shift keying (BPSK) is used for data modulation. The probability of error... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chip combining to migrate narrowband jamming of FH/DPSK systems

    Publication Year: 1990, Page(s):980 - 984 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    A practical chip-combining technique that mitigates narrowband jamming of frequency-hopped differential phase-shift keying (FH/DPSK) systems is presented. Since only two-level quantization is needed, this technique does not require side information, such as the jammer state. Numerical results demonstrates that eight-fold chip combining is sufficient to force narrowband noise jammers to spread thei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meteor trail footprint statistics

    Publication Year: 1990, Page(s):890 - 894 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    Footprint statistics derived from field test data are presented. The statistics are the probability that two receivers will lie in the same footprint. The dependence of the footprint statistics on the transmitter range, link orientation, and antenna polarization are examined. Empirical expressions for the footprint statistics are presented. The need to distinguish the instantaneous footprint, whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of rate-based congestion control algorithm for receiver-directed packet-radio networks

    Publication Year: 1990, Page(s):615 - 621 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    The performance of a congestion control algorithm developed for DARPA's Survivable Adaptive Networking (SURAN) packet radio network is discussed, focusing on throughput-delay characteristics, max-min fairness, speed of response, and algorithm robustness. It is shown, through analysis and simulation, that the algorithm effectively regulates source flows without severely limiting network throughput ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.