The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Military force structures are becoming increasingly complex and net-centric as new technologies are developed and deployed. As such, there is an ever increasing need to provide system-of-systems (SoS) analysis tools to assist in evaluating a military combat team's survivability, lethality, sustainment and logistics. Evaluation of networked communications as part of this analysis is often overlooked...
In this paper the experimental validation of a novel, modified double scroll chaotic attractor circuit, employed as a true random binary generator (TRBG) for cryptographic applications is presented. The double scroll attractor is modeled on Chua's circuit for nonlinear operation leading to chaotic behavior. The output from the chaotic circuit which is a partially correlated binary sequence is scrambled...
To support research in wireless mobile ad hoc networks, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) have worked jointly to establish an advanced emulation environment. A key component is a mobile ad-hoc network emulation testbed where algorithms and applications can be subjected to representative wireless network conditions. The testbed is based on a version of the...
We derive the Cramer-Rao Bound (CRB) on the performance of joint estimators for timing offset, carrier phase offset, and carrier frequency offset for use in a QPSK packet-based communication link. It is shown that the CRB is a function of the pilot or training sequence, the signal-to-noise ratio (SNR), and the pulse shape. We also compute QPSK training sequences of different lengths that minimize...
Three primary objectives of the Joint Program Executive Officer (JPEO) Joint Tactical Radio System (JTRS) are: (a) reduce time to field capability, (b) improve interoperability between services, and (c) decrease radio production costs. The Software Communications Architecture (SCA) specification is the architectural framework for all JTRS software artifacts that was created to maximize software application...
FPGAs have become a ubiquitous part of today's processing technology. Their use has grown from traditional glue logic interfaces of the past to the most advanced information processing systems used by core Internet routers and high-performance computing systems. What remains common throughout this evolution is the desire to integrate more functionality in less space while using less power and at a...
Physical layer simulations and analysis techniques were used to develop the error vector magnitude (EVM) metric specifying transmitter signal quality. These tools also proved to be very useful in specifying lower level hardware unit performance and predicting mobile user objective system (MUOS) satellite 8-PSK transmitter performance before the hardware was built. However, the verification of EVM...
This paper presents ViFiTM, a V-band wireless local area network (WLAN) that utilizes the unlicensed V-band spectrum while resolving the propagation challenges at V-band. ViFiTM allows for utilization of existing compatible waveforms, such 802.11g and ultra-wide band (UWB), and provides anti-shadowing capability to provide mobility throughout the network coverage area. In addition, three main applications...
Modern tactical networks play an important role in success on the battlefield. Unfortunately, performance evaluation of tactical networks is cumbersome because of the scale and complexity of the underlying systems involved and the cost of deploying large numbers of systems and personnel. Simulation of the tactical network system is sound in theory; but in practice it is extremely difficult to build...
In this work, we present SDR-ARI - a software defined radio (SDR) approach to an angle-of-arrival-assisted relative interferometric (ARI) RADAR transceiver. It has a number of desirable attributes including the ability to reduce the synchronization, network, and hardware requirements when operating as the sole RADAR modality and its ability to augment existing pulsed and CW RADAR algorithms. While,...
This paper describes the high bandwidth high throughput (HBHT) government reference architecture (GRA) effort and utilization of dependency structure matrix (DSM) tools to validate the architecture. This paper is intended to show how the development of GRA compliant modules advances both new and time-tested technologies through establishing a standard for above 2 GHz SATCOM terminal modules. The paper...
This purpose of this paper is to document an architectural validation approach for the Government Reference Architecture (GRA) for SATCOM terminals. The approach integrates the Virginia Tech OSSIE SCA Core Framework with a UML model of the GRA, coupled with low-fidelity models of the SATCOM components. This approach uses the Rhapsody tool to implement the GRA-based testbed from documentation through...
Upgradeability and interoperability are main concerns of Software Defined Radio (SDR). But in the case of military applications, security is also a relevant aspect of SDR. The Secure Software Communication Architecture (SSCA) is a standardized solution to secure SDR. This architecture needs a cryptographic processor for security purposes. However, currently available SSCA compliant ASIC-based cryptoprocessors...
The Network-Centric Exploitation and Tracking (N-CET) program is a research effort to enhance intelligence exploitation in a tactical environment by cross-cueing sensors and fusing data from on-board sources with processed information from off-board platforms and sharing the resulting products in a net-centric manner. At the core of N-CET are information management services that decouple data producers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.