The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a communication-constrained and adversarial environment, it is an interesting and challenging problem for multiple vehicles to patrol the whole environment by sensing with their limited visibility. Early works based on deterministic paths are predictable to the adversary, and recent non-deterministic works are limited to only a circular environment and require synchronization. So, we propose a...
The evaluation of an IoMT system needs to include the assessment of LPI, LPE, or LPD. To provide a building block for these metrics, in this paper, we introduce the notion of the information-theoretic secrecy. In particular, we focus on the shadowing fading with the log-normal distribution. We extend a recent analysis for uncorrelated eavesdroppers to the case of correlated ones. Then we derive the...
The future of sensor systems is moving quickly to the realm of distributed multi-static RF Internet of Things (RIOTs). In this case, any single sensor is limited in its ability to generate useful information but the community of sensors, networked together, create the necessary information. Specifically, the ability to geolocate and track small Unmanned Aerial Systems (UASs) with a set of distributed...
Dynamic spectrum access (DSA) has seen a growing interest in recent years due to spectrum scarcity. Cognitive radio is a necessary component to enable DSA. One key requirement for cognitive radio is the ability to blindly detect the presence of signals in time and frequency. One popular method for blind detection is computing a power spectral density estimate using the Welch periodogram. The Welch...
The rapidly growing presence of Internet of Things (IoT) devices is becoming a continuously alluring playground for malicious actors who try to harness their vast numbers and diverse locations. One of their primary goals is to assemble botnets that can serve their nefarious purposes, ranging from Denial of Service (DoS) to spam and advertisement fraud. The most recent example that highlights the severity...
This paper introduces a framework for super-resolution of scalable video based on compressive sensing and sparse representation of residual frames in reconnaissance and surveillance applications. We exploit efficient compressive sampling and sparse reconstruction algorithms to super-resolve the video sequence with respect to different compression rates. We use the sparsity of residual information...
The Wideband Global SATCOM system (WGS) satellite has the unique means to set sub-channel (SC) gain for a specific link or bandwidth segment. Certain Ka-band antennas can switch to an orthogonal circular polarization (CP) to use the identical frequencies more than once in the same geographic location. This allows planners to boost total capacity in an area of operations (AOR) without adding assigned...
Malware infection activities need to be detected as early as possible to minimize the adverse impact of malware delivery, infection, exploitation, and spreading. Given that cybersecurity observations over a network are usually incomplete, noisy, uncertain, and need to be extracted from a big data size, it is a challenge to extract quality information for identifying vulnerable, infected, or exploited...
Cooperative spectrum sensing is often necessary in cognitive radios systems to localize a transmitter by fusing the measurements from multiple sensing radios. However, revealing spectrum sensing information also generally leaks information about the location of the radio that made those measurements. We propose a protocol for performing cooperative spectrum sensing while preserving the privacy of...
In this paper, we consider the problem of direction-of-arrival (DoA) estimation using electronically steerable parasitic array radiator (ESPAR) antenna based on compressive sensing. For an ESPAR antenna, the beampatterns and sparse model of DoA estimation problem in terms of overcomplete dictionary and sampling grid is presented. The DoA estimation problem is formulated as a mixed-norm ℓ2,1 minimization...
Abnormal activity sensing has attracted increasing research attention in military surveillance, patient monitoring, and health care of children and elderly, etc. Researchers have exploited the characteristics of wireless signals to sense “keystrokes” and “human talks”, relieving the privacy invasion concern caused by mounting the surveillance cameras or wearing the smart devices. However, existing...
NarrowBand Waveforms (NBWF) are often used in VHF or UHF tactical communications. For these kinds of waveforms, low latency and robust data rates result in short codeword lengths that are challenging in terms of channel coding. Usually, serially concatenated convolutional code and continuous phase modulation (CC-CPM) schemes are considered in the context of NBWF. When evaluating the achievable rates,...
In this paper, we present a generalized polyphase representation for Continuous Phase Modulation (CPM) signals suited to the detection over frequency-selective channels. We first develop two different equalizers based on this representation and relate them to the State of Art. We also derive a Least Squares (LS) channel estimation and an improved LS estimation using a priori on the channel. Simulation...
The enterprise and tactical domains have distinct properties and requirements, and have thus evolved independently in incompatible ways. Today the network infrastructure has emerged to, in theory, enable interconnectivity between these domains at a global scale. Unfortunately, even in the presence of these communication capabilities and despite the benefits that each operational domain can gain from...
New and unseen network attacks pose a great threat to the signature-based detection systems. Consequently, machine learning-based approaches are designed to detect attacks, which rely on features extracted from network data. The problem is caused by different distribution of features in the training and testing datasets, which affects the performance of the learned models. Moreover, generating labeled...
This paper presents system concept, calibration and example measurements of a novel ultra-wideband, real-time channel sounder. The sounder operates in the frequency range from 3 GHz to 18 GHz thus providing a Fourier delay resolution of 66.7 ps. The developed sounder measures overlapping sub-bands of 1 GHz bandwidth to cover the whole frequency range. This allows us to use a waveform generator and...
The High Performance Waveform (HPW) was developed before parallel concatenated codes (PCCC) and serial concatenated codes (SCCC) were in wide use and so it makes sense to take advantage of the advancements in communication theory and processor computation speed that have taken place since its inception. In its current form, HPW transmits a Raised-Cosine Continuous Phase Modulation (1RC CPM) modulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.