Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496563
K. Kosmowski, M. Suchanski, J. Pawelec, M. Kustra
The paper introduces an OFDM signal detector based on cyclic correlation function. The detector belongs to the class of blind SCD detectors. The paper presents the main relations connected with the idea of cyclostationarity and cyclostationary features of OFDM signals. Results of simulations are presented as well.
{"title":"A novel OFDM sensing method based on CAF-max for hybrid detectors architecture","authors":"K. Kosmowski, M. Suchanski, J. Pawelec, M. Kustra","doi":"10.1109/ICMCIS.2016.7496563","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496563","url":null,"abstract":"The paper introduces an OFDM signal detector based on cyclic correlation function. The detector belongs to the class of blind SCD detectors. The paper presents the main relations connected with the idea of cyclostationarity and cyclostationary features of OFDM signals. Results of simulations are presented as well.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115503307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496564
M. Malowidzki, T. Dalecki, P. Berezinski, M. Mazur, P. Skarżyński
Delay and disruption-tolerant networks (DTNs) pose a number of problems that are uncommon in the commercial, fast Internet, namely, lack of end-to-end connectivity and long delays. Thus, standard tactical applications, such as WWW, e-mail or Blue Force Tracking (BFT), are unable to work in DTNs and must be somehow adapted. In the paper we propose how this adaptation may be achieved, discussing our experience from the reference implementation we have made and preliminary tests we have carried out in a simulated DTN environment.
{"title":"Adapting standard tactical applications for a military disruption-tolerant network","authors":"M. Malowidzki, T. Dalecki, P. Berezinski, M. Mazur, P. Skarżyński","doi":"10.1109/ICMCIS.2016.7496564","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496564","url":null,"abstract":"Delay and disruption-tolerant networks (DTNs) pose a number of problems that are uncommon in the commercial, fast Internet, namely, lack of end-to-end connectivity and long delays. Thus, standard tactical applications, such as WWW, e-mail or Blue Force Tracking (BFT), are unable to work in DTNs and must be somehow adapted. In the paper we propose how this adaptation may be achieved, discussing our experience from the reference implementation we have made and preliminary tests we have carried out in a simulated DTN environment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496574
Niranjan Suri, M. Tortonesi, James R. Michaelis, Peter Budulas, G. Benincasa, S. Russell, C. Stefanelli, R. Winkler
As the Internet of Things (IoT) matures in commercial sectors, the promise of diverse new technologies such as data-driven applications, intelligent adaptive systems, and embedded optimized automation will be realized in every environment. An immediate research question is whether contemporary IoT concepts can be applied also to military battlefield environments and can realize benefits similar to those in industry. Military environments, especially those that depend on tactical communications, are much more challenging than commercial environments. Thus it is likely many commercial IoT architectures and technologies may not translate into the military domain and others will require additional research to enable deployment and efficient implementation. This paper investigates these issues and describes potential military operational activities that could benefit from commercial IoT technologies, including logistics, sensing/surveillance, and situation awareness. In addition, the paper lays out a roadmap for future research necessary to leverage IoT and apply it to the tactical battlefield environment.
{"title":"Analyzing the applicability of Internet of Things to the battlefield environment","authors":"Niranjan Suri, M. Tortonesi, James R. Michaelis, Peter Budulas, G. Benincasa, S. Russell, C. Stefanelli, R. Winkler","doi":"10.1109/ICMCIS.2016.7496574","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496574","url":null,"abstract":"As the Internet of Things (IoT) matures in commercial sectors, the promise of diverse new technologies such as data-driven applications, intelligent adaptive systems, and embedded optimized automation will be realized in every environment. An immediate research question is whether contemporary IoT concepts can be applied also to military battlefield environments and can realize benefits similar to those in industry. Military environments, especially those that depend on tactical communications, are much more challenging than commercial environments. Thus it is likely many commercial IoT architectures and technologies may not translate into the military domain and others will require additional research to enable deployment and efficient implementation. This paper investigates these issues and describes potential military operational activities that could benefit from commercial IoT technologies, including logistics, sensing/surveillance, and situation awareness. In addition, the paper lays out a roadmap for future research necessary to leverage IoT and apply it to the tactical battlefield environment.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496553
Ir Thi My Dung Tran, T. Gilles
In this paper we first examine by simulations and measurements the electromagnetic influence of a ballistic protection structure surrounding an armored infantry vehicle. In particular the performances of a rooftop jamming antenna are analysed, in absence or in presence of the ballistic protection. After assessing the reliability and level of accuracy of the simulations, some jamming performance improvements are proposed and investigated by simulations only.
{"title":"Electromagnetic influence of a ballistic protection structure around an armored infantry vehicle on its jamming performance","authors":"Ir Thi My Dung Tran, T. Gilles","doi":"10.1109/ICMCIS.2016.7496553","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496553","url":null,"abstract":"In this paper we first examine by simulations and measurements the electromagnetic influence of a ballistic protection structure surrounding an armored infantry vehicle. In particular the performances of a rooftop jamming antenna are analysed, in absence or in presence of the ballistic protection. After assessing the reliability and level of accuracy of the simulations, some jamming performance improvements are proposed and investigated by simulations only.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496573
M. Adrat, M. Tschauner, N. Bebawi, M. Antweiler, B. Eschbach, P. Vary
Modern digital communication systems can benefit from soft-decision algorithms in receiver implementations. Such algorithms require reliability information about every data bit which is typically given in terms of Log-Likelihood Ratios (LLRs) or short L-Values. Several efficient receiver implementations based on L-Values have already been proposed in the literature. Many of them exploit the famous Box-Plus operation. Its inverse has also been introduced in terms of the Box-Minus operation. In this letter, at first the specific characteristics of both operations, the Box-Plus as well as the Box-Minus operation, will briefly be reviewed. Secondly, as a novelty we will define two more operators, the Box-Multiply and the Box-Divide operation. An illustrative example will demonstrate the necessity for these two new operators. Finally, we will propose a practical solution for eliminating a critical side constraint of the Box-Minus operation which was known to be a limiting factor so far.
{"title":"On box-operations for L-Values and their applicability to soft-decision algorithms","authors":"M. Adrat, M. Tschauner, N. Bebawi, M. Antweiler, B. Eschbach, P. Vary","doi":"10.1109/ICMCIS.2016.7496573","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496573","url":null,"abstract":"Modern digital communication systems can benefit from soft-decision algorithms in receiver implementations. Such algorithms require reliability information about every data bit which is typically given in terms of Log-Likelihood Ratios (LLRs) or short L-Values. Several efficient receiver implementations based on L-Values have already been proposed in the literature. Many of them exploit the famous Box-Plus operation. Its inverse has also been introduced in terms of the Box-Minus operation. In this letter, at first the specific characteristics of both operations, the Box-Plus as well as the Box-Minus operation, will briefly be reviewed. Secondly, as a novelty we will define two more operators, the Box-Multiply and the Box-Divide operation. An illustrative example will demonstrate the necessity for these two new operators. Finally, we will propose a practical solution for eliminating a critical side constraint of the Box-Minus operation which was known to be a limiting factor so far.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132266840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496586
Xiaoyi Pan, Qi-xiang Fu, Zhaoyu Gu, Yongcai Liu, Wei Wang
Radar micro-Doppler (m-D) signatures for target recognition have received increasing attention among the radar community. Since warheads, decoys and debris have unique m-D signatures, m-D parameter estimation has great potential in ballistic missile defense (BMD) applications. In the case of ballistic targets (BTs) with rapid precession, the conventionally sinusoidal modulation of m-D effect is disturbed by the sliding-type scattering. Thus, extraction of micro-motion signatures based on the sinusoidal form of time-frequency representation (TFR) may become difficult. In this paper, the circular average magnitude difference (CAMD) coefficients are employed to provide an estimation of the precession period due to the periodicity of TFR. Effectiveness of the proposed estimation method is demonstrated by the simulation data.
{"title":"Micro-Doppler period estimation from ballistic targets with precession","authors":"Xiaoyi Pan, Qi-xiang Fu, Zhaoyu Gu, Yongcai Liu, Wei Wang","doi":"10.1109/ICMCIS.2016.7496586","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496586","url":null,"abstract":"Radar micro-Doppler (m-D) signatures for target recognition have received increasing attention among the radar community. Since warheads, decoys and debris have unique m-D signatures, m-D parameter estimation has great potential in ballistic missile defense (BMD) applications. In the case of ballistic targets (BTs) with rapid precession, the conventionally sinusoidal modulation of m-D effect is disturbed by the sliding-type scattering. Thus, extraction of micro-motion signatures based on the sinusoidal form of time-frequency representation (TFR) may become difficult. In this paper, the circular average magnitude difference (CAMD) coefficients are employed to provide an estimation of the precession period due to the periodicity of TFR. Effectiveness of the proposed estimation method is demonstrated by the simulation data.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496559
H. Saarnisaari, V. Hovinen, Hannu Tuomivaara, J. Yli-Kaakinen
High frequency (HF) radio channel is diverse since it could be a single path channel or a multipath channel. However, there is lack of information about what is the ratio between these. Herein, results from a measurement campaign in Finland for ground wave and near vertical incidence skywave (NVIS) paths are reported. It was observed that one path channels are rather widely available and in ground waves they dominate. This means that channels for high modulation orders (high data rate HF) are available and should be searched for during the link establishment process. Unfortunately, the current link establishment processes do not support that such that maybe it is time for improvements. Another observation was that if channels are available at all, then usually there are multiple channels available. This means that recently introduced wideband (up to 24 kHz) and multiband (several 3 kHz bands) HF communications have room.
{"title":"Short range HF radio channel measurements: Search for one path channels","authors":"H. Saarnisaari, V. Hovinen, Hannu Tuomivaara, J. Yli-Kaakinen","doi":"10.1109/ICMCIS.2016.7496559","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496559","url":null,"abstract":"High frequency (HF) radio channel is diverse since it could be a single path channel or a multipath channel. However, there is lack of information about what is the ratio between these. Herein, results from a measurement campaign in Finland for ground wave and near vertical incidence skywave (NVIS) paths are reported. It was observed that one path channels are rather widely available and in ground waves they dominate. This means that channels for high modulation orders (high data rate HF) are available and should be searched for during the link establishment process. Unfortunately, the current link establishment processes do not support that such that maybe it is time for improvements. Another observation was that if channels are available at all, then usually there are multiple channels available. This means that recently introduced wideband (up to 24 kHz) and multiband (several 3 kHz bands) HF communications have room.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122075384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496552
Jon Spencer, O. Worthington, R. Hancock, E. Hepworth
Tactical military networks present a challenging environment for the delivery of information services. A tactical network must support a dynamically changing force in the face of physical and electronic threats and where bandwidth is scarce. The network manager faces an almost impossible task to deliver vital information with the required quality of service in the face of changing operational priorities. This paper describes a structured methodology to assess emerging technologies such as Software Defined Networks (SDN) which can deliver increased agility and reduce the operator burden in tactical networks. It presents initial results from the application of this methodology.
{"title":"Towards a tactical software defined network","authors":"Jon Spencer, O. Worthington, R. Hancock, E. Hepworth","doi":"10.1109/ICMCIS.2016.7496552","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496552","url":null,"abstract":"Tactical military networks present a challenging environment for the delivery of information services. A tactical network must support a dynamically changing force in the face of physical and electronic threats and where bandwidth is scarce. The network manager faces an almost impossible task to deliver vital information with the required quality of service in the face of changing operational priorities. This paper describes a structured methodology to assess emerging technologies such as Software Defined Networks (SDN) which can deliver increased agility and reduce the operator burden in tactical networks. It presents initial results from the application of this methodology.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496548
M. H. Chaudhary, B. Scheers
For search and rescue (SAR) missions in emergency and disaster scenarios, unmanned robotic technologies offer an opportunity to save human lives and speed up the rescue process. Communication among the unmanned devices and with the command and control station plays a key role in detecting, locating, and rescuing affected persons. To establish this communication network, ease of deployment provided by the wireless communication paradigm makes it a suitable technology in any SAR mission. Lack of any infrastructure support in a disaster hit area means that the wireless network needs to be a self-organizing network of mobile devices that embodies cognitive features enabling it to adapt to the dynamics of the operational environment. To this end, we develop a framework for cognitive management and control of the WiFi mesh-networks for use in SAR operations. We propose dynamic channel and transmitpower adaptation algorithms that do not require any modification of the underlying device driver or firmware. For control signaling we can use either in-band signaling essentially using the WiFi network, or a dedicated robust narrow-band radio network. Where the latter option may be preferred in harsh propagation environments like in SAR scenarios. Effectiveness of the proposed scheme is illustrated with results from implementation with commercial of the shelf components.
{"title":"Dynamic channel and transmit-power adaptation of WiFi mesh-networks in search and rescue operations","authors":"M. H. Chaudhary, B. Scheers","doi":"10.1109/ICMCIS.2016.7496548","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496548","url":null,"abstract":"For search and rescue (SAR) missions in emergency and disaster scenarios, unmanned robotic technologies offer an opportunity to save human lives and speed up the rescue process. Communication among the unmanned devices and with the command and control station plays a key role in detecting, locating, and rescuing affected persons. To establish this communication network, ease of deployment provided by the wireless communication paradigm makes it a suitable technology in any SAR mission. Lack of any infrastructure support in a disaster hit area means that the wireless network needs to be a self-organizing network of mobile devices that embodies cognitive features enabling it to adapt to the dynamics of the operational environment. To this end, we develop a framework for cognitive management and control of the WiFi mesh-networks for use in SAR operations. We propose dynamic channel and transmitpower adaptation algorithms that do not require any modification of the underlying device driver or firmware. For control signaling we can use either in-band signaling essentially using the WiFi network, or a dedicated robust narrow-band radio network. Where the latter option may be preferred in harsh propagation environments like in SAR scenarios. Effectiveness of the proposed scheme is illustrated with results from implementation with commercial of the shelf components.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-23DOI: 10.1109/ICMCIS.2016.7496557
Riku Luostarinen, R. Jarvinen, J. Maatta, J. Manner
Remote software usability testing has been studied for over two decades. Yet, many of the existing testing methods are not ideal for field testing in challenging environments typical to military and emergency operations and contexts. In this paper we introduce a model and a messaging framework that allow remote usability tests to be run easily in the real work context of the users. We also introduce a proof-of-concept implementation of the model and show how the model can be integrated to an existing user interface of a military communication system. To verify our model, we pilot the test set-up on real end users of the system.
{"title":"A model for usability testing in challenging environments","authors":"Riku Luostarinen, R. Jarvinen, J. Maatta, J. Manner","doi":"10.1109/ICMCIS.2016.7496557","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496557","url":null,"abstract":"Remote software usability testing has been studied for over two decades. Yet, many of the existing testing methods are not ideal for field testing in challenging environments typical to military and emergency operations and contexts. In this paper we introduce a model and a messaging framework that allow remote usability tests to be run easily in the real work context of the users. We also introduce a proof-of-concept implementation of the model and show how the model can be integrated to an existing user interface of a military communication system. To verify our model, we pilot the test set-up on real end users of the system.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"28 Suppl 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115637820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}