The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applications such as situational awareness are becoming more prevalent in highly dynamic tactical mesh networks and are placing high demand on existing RF network capacity. These applications require high aggregate data capacity but have some flexibility in packet by packet latency. Combined radio frequency and free space optical communication within a heavily scintillated atmospheric path behaves...
Based on Universal Mobile Telecommunications System (UMTS) wideband code division multiple access (WCDMA) technology, the mobile user objective system (MUOS) provides a wide range of wireless telecommunications services to the war fighter over geosynchronous satellites. As MUOS is a multiple beam system, it is of paramount importance for the user entry (UE) to select the best beam, which in turn requires...
Military applications often require traffic to be multicast to a group of receivers. It has previously been shown that linear network coding is useful in conjunction with physical-layer multicasting for reliable multicast delivery over fading channels. Superposition coding is an effective way to deliver information to a single receiver over a fading channel. However, we have shown in previous work...
In modern warfare, tactical mobility and environment uncertainty place critical decisions at battalion and below levels. However, the introduction of digital systems (vehicles, soldiers, UAV) enables optimised or new capabilities by taking advantage of informational services. The Phoenix Concept Development and Experimentation (CD&E) lifecycle explores new operational concepts using rapid system...
This paper concerns stability analysis for the packet reservation multiple access (PRMA) protocol extendable for mobile satellite systems (MSSs). This protocol has been widely considered for providing speech and data communications in a terrestrial microcell system. Recently modified versions of the PRMA protocol have been subject of extensive research, with goal of application to low earth orbit...
Multiband tactical communication modems must employ different waveforms to meet various demands in quality and nature of data. Range maximization, high data throughput and power conservation requirements are usually not fulfilled by a single waveform. To effectively deliver tactical multimedia data including coded audio, text, video, map and navigation information using radio, multiple choice of frequency...
We propose a game-theoretic framework for quality-of-service (QoS) aware resource competition among coexisting wireless links in mobile wireless networks. The senders of wireless links use the constant transmit power and then the wireless resources of interest is characterized by time-slot length. Multiple wireless links will use the limited wireless resources through a time-slot competition game...
A basis function expansion to reduce the demodulation complexity of continuous phase modulation (CPM) signals applicable for either coherent or non-coherent reception in tactical networks is presented. Results show that a signal space receiver based on B-splines approximates a wide variety of CPM signal sets with only a small number of basis functions and is particularly useful for spectrally efficient...
The desirable features of future optical high-capacity networks include higher stability, reconfigurability and security. In order to enable robust and self-managed automated operation, the network itself should be able to monitor the physical state of the network, automatically diagnose and repair the network, dynamically allocate resources, and redirect traffic. Optical performance monitoring can...
A critical aspect of spectrum sensing involves determining the number and type of transmitters in the band of interest. We present a technique that exploits a combination of temporal and frequency-based analysis to enable significantly more accurate frequency offset measurements than would be possible with frequency domain measurements alone, thus enabling improved RF fingerprinting for frequency...
We describe the architecture of PHAROS (Petabit Highly-Agile Robust Optical System), developed under the DARPA CORONET program. PHAROS provides traffic engineering, resource management and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology facilitates rapid configuration of network resources to address dynamic traffic needs in future global military and commercial...
Cognitive Radio (CR) networks present a difficult set of challenges due to the fluctuating nature of the available spectrum and wide ranging number of applications, each having different Quality of Service (QoS) requirements. This paper studies the key enabling technologies of Cognitive Radio and makes contributions in two key areas: sensing and learning. We shall first present the software testbed...
This paper describes a field demonstration and presents the network performance of an 802.11 ground-UAV network composed of 11 ground stations, a mobile vehicle and two fixed wing UAVs, connected by two routing gateways to a legacy wired network. The network effects demonstrated include mobility, network partitions and merges, and gateway failovers. The paper presents experimental results for recorded...
In this paper, we propose a novel sidelobe suppression approach for cognitive radio systems employing orthogonal frequency division multiplexing (OFDM) transmission. OFDM is a promising solution for future overlay wireless access due to its high data rate and flexibility. However, OFDM and its variants employ sinc-type pulses in representing the symbols transmitted over all subcarriers during one...
This paper presents a novel approach towards cooperation between conglomerates of sensors for compiling an enhanced operational picture. It uses the benefits of distributed processing via multi-agent systems for intelligent scheduling of multi-functional radars and their flexible interconnection via mobile ad-hoc networking technology. These dynamically reconfigurable networks facilitate the cooperation...
Determination of appropriate response to information system attack is jointly determined by confidence of classification, nature (type) of attack, and confidence in effectiveness of response. In this paper we present a technique to rapidly assess similarity of observed behavior to attack or normal models: displaying the similarity of observed data to learned minimum description length models for normal...
This research explores the feasibility of performing passive information capture on voice data in order to analyze and classify the contents of interpersonal communication. The general form of this problem is very difficult as fully automated speech understanding technology does not exist. This is further complicated by battlefield realities including: noise, jargon and unstructured speech. However,...
Frequency-hopping (FH) spread-spectrum anti-jam systems are susceptible to degraded performance by follower jammers, which intercept the transmitted signal, attempt to determine in which of a number of bins the hop is located, and then jam in that bin only. Three factors are addressed that provide some protection against follower jammers. One is the differential time delay between the direct intended...
Network science has recently received a considerable amount of attention from the military and research communities. In this paper we analyze two military scenarios from a network science perspective. We discuss the pros and cons of problem solving for these scenarios using the current fragmented approach versus applying a unified view across three domains: social/cognitive, information, and communication...
We describe a framework for capturing data provenance information to support Information assurance attributes like availability, authentication, confidentiality, integrity and non-repudiation. Our approach is applicable to multi-level secure systems where it is not always possible to directly provide data source and data transformation information. We achieve this by combining the subjective and objective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.