首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
High throughput Ku-band satellites for aeronautical applications 航空用高通量ku波段卫星
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415863
C. McLain, Sunil Panthi, M. Sturza, J. Hetrick
Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.
ku波段高通量卫星(HTS)的最新进展将使商用ku波段航空移动卫星系统(AMSS)在成本和性能上等于或超过商用ka波段AMSS系统。AMSS市场目前由ku波段解决方案主导,包括商业部门(eXConnect、Row44、Yonder)和政府部门(Tachyon、波音宽带卫星网络(原Connexion)、各种无人机和ISR系统)。所有这些系统都使用从国际通信卫星组织(Intelsat)和欧洲通信卫星组织(Eutelsat)等固定卫星服务(FSS)提供商租用的传统大陆级宽波束。在接下来的几年里,ku波段AMSS的主导地位将受到ka波段系统的挑战,例如Inmarsat-5,它使用多个点波束来提供增强的性能。先前的工作表明,这些系统可能比传统的ku波段系统提供更好的性能和更好的经济效益。本文的关键观点是,点波束ka波段系统的性能优势来自于它们更小的波束尺寸,而不是它们的工作频率,这意味着ku波段点波束卫星也可以用与ka波段系统相似大小的点波束来建造,并且与ka波段点波束系统相比,可以实现具有竞争力的成本和性能。高通量点波束ku波段系统,如国际通信卫星组织的EpicNG系统,目前正在开发中,并将在与Inmarsat-5相同的时间框架内部署。这一结果对AMSS系统的现有用户和运营商具有重要意义:-当高吞吐量ku波段可用时,目前安装的ku波段终端将能够利用性能的显着改善-目前的ku波段无需进行昂贵的ka波段改造以保持具有竞争力的性能-运营商今天可以继续投资ku波段终端,而不必担心在不久的将来会过时- AMSS市场将在未来几年继续多样化和竞争。
{"title":"High throughput Ku-band satellites for aeronautical applications","authors":"C. McLain, Sunil Panthi, M. Sturza, J. Hetrick","doi":"10.1109/MILCOM.2012.6415863","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415863","url":null,"abstract":"Recent advancements in Ku-band high throughput satellites (HTS) will allow commercial Ku-band aeronautical mobile satellite systems (AMSS) to equal or exceed commercial Ka-band AMSS systems on cost and performance. The AMSS market is currently dominated by Ku-band solutions, both in the commercial sector (eXConnect, Row44, Yonder) and the government sector (Tachyon, Boeing Broadband Satellite Network (formerly Connexion), various UAV and ISR systems). All of these systems use conventional continental-scale wide beams that are leased from Fixed Satellite Service (FSS) providers such as Intelsat and Eutelsat. In the next several years the dominance of Ku-band AMSS will be challenged by Ka-band systems such as Inmarsat-5, which use multiple spot beams to offer enhanced performance. Previous work has suggested that these systems may offer better performance and better economics than conventional Ku-band systems [1]. The key insight of this paper is that the performance advantage of spot beam Ka-band systems comes from their smaller beam size rather than their frequency of operation, meaning that a Ku-band spot beam satellite can also be built with similar sized spot beams to Ka-band systems and can achieve competitive cost and performance as compared to a Ka-band spot beam systems. High throughput spot beam Ku-band systems, such as Intelsat's EpicNG system, are now in development and will be fielded in the same timeframe as Inmarsat-5. This result has critical implications for existing users and operators of AMSS systems: - Currently installed Ku-band terminals will be able to take advantage of dramatic improvements in performance when high throughput Ku-band becomes available - Current Ku-band will not have to undergo costly Ka-band retrofits to maintain competitive performance - Operators can continue to invest in Ku-band terminals today without fear of obsolescence in the near future - The AMSS market will continue to be diverse and competitive for years to come.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"36 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81081107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Enhancing the classification accuracy of IP geolocation 提高IP地理定位的分类精度
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415842
Hellen Maziku, S. Shetty, Keesook J. Han, Tamara Rogers
The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. These approaches typically produce erroneous results due to measurement errors. In this paper, we propose an Enhanced Learning Classifier approach for estimating the geolocation of Internet hosts with increased accuracy. Our approach extends an exisiting machine learning based approach by extracting six features from network measurements and implementing a new landmark selection policy. These enhancements allow us to mitigate problems with measurement errors and reduces average error distance in estimating location of Internet hosts. To demonstrate the accuracy of our approach, we evaluate the performance on network routers using ping measurements from PlanetLab nodes with known geographic placement. Our results demonstrate that our approach improves average accuracy by geolocating internet hosts 100 miles closer to the true geographic location versus prior measurement-based approaches.
从在线广告到网络攻击本地化,互联网主机本地化的能力对一系列应用都很有吸引力。最近,人们提出了基于测量的方法来准确地识别互联网主机的位置。由于测量误差,这些方法通常会产生错误的结果。在本文中,我们提出了一种增强的学习分类器方法来估计互联网主机的地理位置,并提高了准确性。我们的方法扩展了现有的基于机器学习的方法,从网络测量中提取了六个特征,并实现了一个新的地标选择策略。这些增强使我们能够减轻测量误差的问题,并减少估计Internet主机位置的平均误差距离。为了证明我们方法的准确性,我们使用来自已知地理位置的PlanetLab节点的ping测量来评估网络路由器上的性能。我们的研究结果表明,与之前基于测量的方法相比,我们的方法通过将互联网主机定位到离真实地理位置更近100英里的位置来提高平均精度。
{"title":"Enhancing the classification accuracy of IP geolocation","authors":"Hellen Maziku, S. Shetty, Keesook J. Han, Tamara Rogers","doi":"10.1109/MILCOM.2012.6415842","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415842","url":null,"abstract":"The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. These approaches typically produce erroneous results due to measurement errors. In this paper, we propose an Enhanced Learning Classifier approach for estimating the geolocation of Internet hosts with increased accuracy. Our approach extends an exisiting machine learning based approach by extracting six features from network measurements and implementing a new landmark selection policy. These enhancements allow us to mitigate problems with measurement errors and reduces average error distance in estimating location of Internet hosts. To demonstrate the accuracy of our approach, we evaluate the performance on network routers using ping measurements from PlanetLab nodes with known geographic placement. Our results demonstrate that our approach improves average accuracy by geolocating internet hosts 100 miles closer to the true geographic location versus prior measurement-based approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81946605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimal resource allocation in HARQ-based OFDMA wireless networks 基于harq的OFDMA无线网络资源优化分配
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415608
Sébastien Marcille, P. Ciblat, C. Martret
This paper deals with multiuser resource allocation (power, bandwidth, constellation size, and code rate) for an OFDMA system using HARQ in the context of Rayleigh distributed channel. We assume that the resource manager (base station or cluster head) only knows the channel statistics of the active links. Then, an optimal algorithm for minimizing the total transmitted power under per user goodput constraints is proposed. Extension to imperfect feedback on HARQ scheme is also performed. This algorithm can be especially applied to military ad hoc wireless networks.
本文研究了在瑞利分布式信道环境下使用HARQ的OFDMA系统的多用户资源分配(功率、带宽、星座大小和码率)问题。我们假设资源管理器(基站或集群头)只知道活动链路的通道统计信息。在此基础上,提出了一种在每用户good - put约束下最小化总传输功率的最优算法。并对HARQ方案的不完全反馈进行了推广。该算法特别适用于军用自组织无线网络。
{"title":"Optimal resource allocation in HARQ-based OFDMA wireless networks","authors":"Sébastien Marcille, P. Ciblat, C. Martret","doi":"10.1109/MILCOM.2012.6415608","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415608","url":null,"abstract":"This paper deals with multiuser resource allocation (power, bandwidth, constellation size, and code rate) for an OFDMA system using HARQ in the context of Rayleigh distributed channel. We assume that the resource manager (base station or cluster head) only knows the channel statistics of the active links. Then, an optimal algorithm for minimizing the total transmitted power under per user goodput constraints is proposed. Extension to imperfect feedback on HARQ scheme is also performed. This algorithm can be especially applied to military ad hoc wireless networks.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81995318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals 由移动终端组成的fm - tdma卫星通信网络对相邻卫星的干扰
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415586
V. Weerackody, E. Cuevas
Satellite Communications on-the-move (SOTM) networks are being deployed to provide various broadband communication services. Typically, an SOTM network consists of a large number of small aperture terminals deployed over a wide geographical area. These terminals are intended to operate over geostationary orbit satellites. To utilize network resources efficiently, these networks may employ time- and frequency-division multiple access methods. Also, SOTM terminals may operate using a range of antenna aperture sizes and may require different transmit power levels to meet various user's data rate needs. Additionally, antenna pointing errors of the terminals may contribute to a time-varying interference pattern from the SOTM network to a victim receiver in another satellite network. This paper provides a methodology to analyze the time-varying interference resulting from an MF-TDMA network consisting of such terminals. This methodology has been submitted for consideration by ITU-R Working Party 4A.
正在部署移动卫星通信(SOTM)网络,以提供各种宽带通信服务。通常,SOTM网络由大量部署在广泛地理区域的小孔径终端组成。这些终端将在地球静止轨道卫星上运行。为了有效地利用网络资源,这些网络可以采用时分和频分多址方式。此外,SOTM终端可以使用一系列的天线孔径尺寸,并可能需要不同的发射功率水平,以满足不同用户的数据速率需求。此外,终端的天线指向误差可能导致从SOTM网络到另一个卫星网络中的受害接收机的时变干扰图。本文提供了一种分析由此类终端组成的MF-TDMA网络时变干扰的方法。该方法已提交ITU-R 4A工作组审议。
{"title":"Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals","authors":"V. Weerackody, E. Cuevas","doi":"10.1109/MILCOM.2012.6415586","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415586","url":null,"abstract":"Satellite Communications on-the-move (SOTM) networks are being deployed to provide various broadband communication services. Typically, an SOTM network consists of a large number of small aperture terminals deployed over a wide geographical area. These terminals are intended to operate over geostationary orbit satellites. To utilize network resources efficiently, these networks may employ time- and frequency-division multiple access methods. Also, SOTM terminals may operate using a range of antenna aperture sizes and may require different transmit power levels to meet various user's data rate needs. Additionally, antenna pointing errors of the terminals may contribute to a time-varying interference pattern from the SOTM network to a victim receiver in another satellite network. This paper provides a methodology to analyze the time-varying interference resulting from an MF-TDMA network consisting of such terminals. This methodology has been submitted for consideration by ITU-R Working Party 4A.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"302 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78436709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative jammer design in cellular network with internal eavesdroppers 内置窃听器蜂窝网络协同干扰设计
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415636
Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, B. Koo
In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helper's cooperation can achieve the positive secrecy rate by the proposed scheme.
为了提高蜂窝下行网络无线传输的保密性,本文提出了一种协同干扰器。为单个用户准备的私人消息应与被视为内部窃听者的其他用户隔离。为了提高目标用户的保密性,我们提出了使用多天线辅助器,并设计了其最佳发射波束形成矢量。辅助节点对内部窃听器产生人工干扰,通过增加窃听器处的模糊度来提高安全性。基于[1]中的功率增益域框架,我们优化了助手的传输策略,使目标用户的保密能力最大化。分析和仿真结果表明,该方案提高了系统的保密能力。此外,在没有助手配合的情况下,所有保密率为零的用户都可以实现正保密率。
{"title":"Cooperative jammer design in cellular network with internal eavesdroppers","authors":"Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, B. Koo","doi":"10.1109/MILCOM.2012.6415636","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415636","url":null,"abstract":"In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helper's cooperation can achieve the positive secrecy rate by the proposed scheme.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79171678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks 战术移动自组织网络中作战士兵健康监测的节能传输方案
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415827
E. Egbogah, A. Fapojuwo, Liqi Shi
In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.
在本文中,我们提出了一种在战术移动自组织网络(T-MANET)中监测士兵健康的节能传输方案。该方案采用约束路由发现算法确定源节点和汇聚节点之间可行的路由路径。然后使用跨层优化方法来确定军用UHF频段传输数据所需的最佳路由和最小功率,从而满足端到端分组传输比(PDR)和端到端延迟目标。然而,最优解需要指数复杂度,不适合在资源受限的传感器模式下实现。因此,我们提出了一种启发式算法,称为联合链路节点功率分配(JPA),该算法基于联合链路节点的存在来分配功率。从分析和数值结果中,我们发现JPA实现的能耗在最优值的24%以内,但是通过使用比最优解决方案少6倍的迭代来收敛到最小能量解决方案,从而显着降低了解决方案的复杂性,从指数到多项式。
{"title":"An energy-efficient transmission scheme for monitoring of combat soldier health in tactical mobile ad hoc networks","authors":"E. Egbogah, A. Fapojuwo, Liqi Shi","doi":"10.1109/MILCOM.2012.6415827","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415827","url":null,"abstract":"In this paper, we propose an energy-efficient transmission scheme for monitoring soldier health in tactical mobile ad hoc networks (T-MANET). In the proposed scheme, a constrained route discovery algorithm is used to determine feasible routing paths between the source nodes and sink node. A cross-layer optimization approach is then used to determine the optimal routes and minimum power required to transmit data in the military UHF band such that the end-to-end packet delivery ratio (PDR) and end-to-end delay objectives are met. However, the optimal solution requires exponential complexity and is not suitable for implementation in resource constrained sensor motes. Therefore, we propose a heuristic algorithm called joint link node power allocation (JPA) that allocates power based on the presence of joint link nodes. From the analysis and numerical results, we find that JPA achieves energy consumption that is within 24% of the optimal value, but significantly reduces the solution complexity from exponential to polynomial by utilizing 6 times fewer iterations than the optimal solution to converge to a minimum energy solution.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"174 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91422718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Properization of second-order cyclostationary random processes and its application to signal presence detection 二阶循环平稳随机过程的属性化及其在信号存在检测中的应用
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415748
Jeong Ho Yeo, Joon Ho Cho
In this paper, we show that a second-order cyclo-stationary (SOCS) random process, whether it is proper or improper, can be always converted to an equivalent proper-complex SOCS random process with twice the cycle period. A simple linear-conjugate linear periodically time-varying operator called a FREquency SHift (FRESH) properizer is proposed to perform this conversion. As an application, we consider the presence detection of an improper-complex SOCS random process, which well models the complex envelopes of digitally modulated signals such as pulse amplitude modulation (PAM), staggered quaternary phase-shift keying (SQPSK), Gaussian minimum shift keying (GMSK), etc. In particular, the optimal presence detector that utilizes the FRESH properizer is derived for improper-complex SOCS Gaussian random processes, which provides the lower bound on the detection error probabilities. The derived optimal detector, which has the structural advantage in that it consists of a FRESH properizer followed by a single linear filter, achieves the same performance as the conventional detector that consists of parallel-connected linear and conjugate-linear filters. Numerical results are also provided.
本文证明了二阶循环平稳(SOCS)随机过程,无论它是合适的还是不合适的,都可以转化为具有两倍周期的等价的正复SOCS随机过程。提出了一种简单的线性-共轭线性周期性时变算子,称为频移(FRESH)属性器来完成这种转换。作为一个应用,我们考虑了一个不适当复杂的SOCS随机过程的存在检测,它很好地模拟了数字调制信号的复杂包络,如脉冲幅度调制(PAM)、交错四元相移键控(SQPSK)、高斯最小移键控(GMSK)等。特别是,针对非复杂SOCS高斯随机过程,推导了利用FRESH属性器的最优存在检测器,该检测器提供了检测误差概率的下界。推导出的最优检测器在结构上具有优势,它由一个FRESH properizer和一个线性滤波器组成,与传统的由平行连接的线性和共轭线性滤波器组成的检测器具有相同的性能。并给出了数值结果。
{"title":"Properization of second-order cyclostationary random processes and its application to signal presence detection","authors":"Jeong Ho Yeo, Joon Ho Cho","doi":"10.1109/MILCOM.2012.6415748","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415748","url":null,"abstract":"In this paper, we show that a second-order cyclo-stationary (SOCS) random process, whether it is proper or improper, can be always converted to an equivalent proper-complex SOCS random process with twice the cycle period. A simple linear-conjugate linear periodically time-varying operator called a FREquency SHift (FRESH) properizer is proposed to perform this conversion. As an application, we consider the presence detection of an improper-complex SOCS random process, which well models the complex envelopes of digitally modulated signals such as pulse amplitude modulation (PAM), staggered quaternary phase-shift keying (SQPSK), Gaussian minimum shift keying (GMSK), etc. In particular, the optimal presence detector that utilizes the FRESH properizer is derived for improper-complex SOCS Gaussian random processes, which provides the lower bound on the detection error probabilities. The derived optimal detector, which has the structural advantage in that it consists of a FRESH properizer followed by a single linear filter, achieves the same performance as the conventional detector that consists of parallel-connected linear and conjugate-linear filters. Numerical results are also provided.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90599647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Xenon separation VMM: Secure virtualization infrastructure for military clouds Xenon分离VMM:用于军事云的安全虚拟化基础设施
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415673
J. McDermott, B. Montrose, Margery Li, J. Kirby, Myong H. Kang
In conventional military computing, security separation is provided by cryptography, for data in motion and data at rest. Security separation for data under computation is provided by separate hardware. Cloud computing shares hardware for all data under computation, so a new approach to security separation is needed for military clouds. Cryptographic separation of data under computation is not practical with current technology, so the separation must be accomplished by software, i.e. the virtualization infrastructure. The strongest known means of software separation is the separation kernel. Separation kernels are special virtual machine monitors (VMMs) that are small enough and simple enough to be mathematically verified. Unfortunately, strict separation kernels cannot virtualize the complex modern commodity hardware and guest virtual machine (VM) operating systems that are essential to cloud computing. The best alternative to a strict separation kernel is a a separation VMM. A separation VMM relaxes the strict size and simplicity goals of a separation kernel just far enough to be able to support commodity hardware and guest operating systems. Because they address all of the features of commodity hardware, separation VMMs are too large for formal mathematical verification. However, separation VMMs are small enough and simple enough to be completely specified by semiformal means, i.e. they are smaller and simpler than conventional VMMs. A separation VMM has a complete systematic assurance argument that it isolates guest VMs from each other and strongly protects itself from tampering. A separation VMM provides the strongest separation of cloud VMs that is consistent with virtualizing complex commodity operating systems, on shared complex commodity hardware.
在传统的军事计算中,加密技术为运动数据和静止数据提供了安全隔离。计算数据的安全分离由单独的硬件提供。云计算为计算中的所有数据共享硬件,因此军事云需要一种新的安全分离方法。在当前的技术条件下,对计算下的数据进行加密分离是不现实的,因此这种分离必须通过软件,即虚拟化基础设施来完成。已知最强大的软件分离方法是分离内核。分离内核是一种特殊的虚拟机监视器(vmm),它足够小,足够简单,可以进行数学验证。不幸的是,严格的分离内核不能虚拟化复杂的现代商用硬件和对云计算至关重要的来宾虚拟机(VM)操作系统。严格分离内核的最佳替代方案是一个分离VMM。分离VMM放宽了分离内核严格的大小和简单性目标,使其能够支持商用硬件和客户机操作系统。因为它们解决了商用硬件的所有特性,分离vmm对于正式的数学验证来说太大了。然而,分离vmm足够小,足够简单,可以用半正式的方法完全指定,即它们比传统的vmm更小,更简单。分离VMM具有完整的系统保证,它将来宾vm彼此隔离,并强烈保护自己不受篡改。分离VMM提供最强大的云虚拟机分离,这与在共享的复杂商用硬件上虚拟化复杂商用操作系统是一致的。
{"title":"The Xenon separation VMM: Secure virtualization infrastructure for military clouds","authors":"J. McDermott, B. Montrose, Margery Li, J. Kirby, Myong H. Kang","doi":"10.1109/MILCOM.2012.6415673","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415673","url":null,"abstract":"In conventional military computing, security separation is provided by cryptography, for data in motion and data at rest. Security separation for data under computation is provided by separate hardware. Cloud computing shares hardware for all data under computation, so a new approach to security separation is needed for military clouds. Cryptographic separation of data under computation is not practical with current technology, so the separation must be accomplished by software, i.e. the virtualization infrastructure. The strongest known means of software separation is the separation kernel. Separation kernels are special virtual machine monitors (VMMs) that are small enough and simple enough to be mathematically verified. Unfortunately, strict separation kernels cannot virtualize the complex modern commodity hardware and guest virtual machine (VM) operating systems that are essential to cloud computing. The best alternative to a strict separation kernel is a a separation VMM. A separation VMM relaxes the strict size and simplicity goals of a separation kernel just far enough to be able to support commodity hardware and guest operating systems. Because they address all of the features of commodity hardware, separation VMMs are too large for formal mathematical verification. However, separation VMMs are small enough and simple enough to be completely specified by semiformal means, i.e. they are smaller and simpler than conventional VMMs. A separation VMM has a complete systematic assurance argument that it isolates guest VMs from each other and strongly protects itself from tampering. A separation VMM provides the strongest separation of cloud VMs that is consistent with virtualizing complex commodity operating systems, on shared complex commodity hardware.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76061332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Quadrifilar Helix Antenna combining GNSS, Iridium, and a UHF communications monopole 结合GNSS、铱和超高频通信单极的新型四线螺旋天线
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415689
P. Elliot, E. Rosario, R. Davis
A multi-use antenna system for integrated communications and navigation capability was developed. A GPS/GNSS/Iridium antenna is co-located with a UHF communications monopole on a handset. The GPS/GNSS/Iridium antenna is a folded Quadrifilar Helix Antenna (QHA) with novel features to improve frequency coverage compared to existing QHA designs. This QHA antenna is co-located concentrically (co-axially) around the UHF monopole which increases the gain of the UHF monopole by several dB over most of the UHF 225-512 MHz band. Co-locating the QHA and monopole also reduces the area needed on the transceiver. The GNSS frequencies covered include modernized GPS (L1, L2, L5), GLONASS, Galileo, and Beidou (Compass), spanning from 1164 to 1300 MHz and 1559 to 1611 MHz. The Iridium communications transmit and receive band (1611-1626 MHz) is also covered, and UHF.
研制了具有综合通信和导航能力的多用途天线系统。GPS/GNSS/铱星天线与手机上的UHF通信单极杆位于同一位置。GPS/GNSS/铱星天线是一种折叠的四线螺旋天线(QHA),与现有的QHA设计相比,具有新颖的功能,可以提高频率覆盖范围。该QHA天线同心(同轴)地位于UHF单极子周围,在UHF 225-512 MHz频段的大部分时间内,UHF单极子的增益增加了几个dB。同时定位QHA和单极子也减少了收发器所需的面积。覆盖的GNSS频率包括现代化的GPS (L1、L2、L5)、GLONASS、Galileo和北斗(Compass),范围从1164到1300 MHz和1559到1611 MHz。铱星通信发射和接收波段(1611-1626兆赫)也被覆盖,还有超高频。
{"title":"Novel Quadrifilar Helix Antenna combining GNSS, Iridium, and a UHF communications monopole","authors":"P. Elliot, E. Rosario, R. Davis","doi":"10.1109/MILCOM.2012.6415689","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415689","url":null,"abstract":"A multi-use antenna system for integrated communications and navigation capability was developed. A GPS/GNSS/Iridium antenna is co-located with a UHF communications monopole on a handset. The GPS/GNSS/Iridium antenna is a folded Quadrifilar Helix Antenna (QHA) with novel features to improve frequency coverage compared to existing QHA designs. This QHA antenna is co-located concentrically (co-axially) around the UHF monopole which increases the gain of the UHF monopole by several dB over most of the UHF 225-512 MHz band. Co-locating the QHA and monopole also reduces the area needed on the transceiver. The GNSS frequencies covered include modernized GPS (L1, L2, L5), GLONASS, Galileo, and Beidou (Compass), spanning from 1164 to 1300 MHz and 1559 to 1611 MHz. The Iridium communications transmit and receive band (1611-1626 MHz) is also covered, and UHF.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85356956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Some remarks on the Dirac delta function approximation for ASER analysis of digital modulations over fading channels 关于衰落信道上数字调制激光激光分析中狄拉克函数近似的几点评述
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415874
E. Adebola, O. Olabiyi, A. Annamalai
In this article, we apply two distinct methods to obtain simple closed-form approximations for the average symbol error rate (ASER) performance metric of a broad class of coherent digital modulations in a myriad of fading environments (with/without diversity), which are known to be analytically involved as they require evaluation of the expectation of the Gaussian Q-function and/or its integer powers. In the first approach, we exploit the shifting property of Dirac delta approximations of the Q-function to circumvent the need for integration. In the second approach, we introduce tight exponential-type approximations for the Q-function that directly lead to the development of closed-form expressions for the ASER in terms of only the moment generating function (MGF) of the received signal-to-noise ratio (SNR) random variable. Numerical results reveal that our proposed solutions based on the MGF method are much more versatile and can yield better accuracy compared to our approximations derived via the Dirac delta approximation technique.
在本文中,我们应用两种不同的方法来获得在无数衰落环境(有/没有分集)中广泛类别的相干数字调制的平均符号误码率(ASER)性能指标的简单封闭形式近似值,这些环境已知是解析性的,因为它们需要评估高斯q函数的期望和/或其整数幂。在第一种方法中,我们利用q函数的狄拉克δ近似的移位特性来规避积分的需要。在第二种方法中,我们引入q函数的紧密指数型近似,直接导致ASER仅根据接收的信噪比(SNR)随机变量的矩生成函数(MGF)开发封闭形式表达式。数值结果表明,我们提出的基于MGF方法的解比通过Dirac近似技术得到的近似更通用,并且可以产生更好的精度。
{"title":"Some remarks on the Dirac delta function approximation for ASER analysis of digital modulations over fading channels","authors":"E. Adebola, O. Olabiyi, A. Annamalai","doi":"10.1109/MILCOM.2012.6415874","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415874","url":null,"abstract":"In this article, we apply two distinct methods to obtain simple closed-form approximations for the average symbol error rate (ASER) performance metric of a broad class of coherent digital modulations in a myriad of fading environments (with/without diversity), which are known to be analytically involved as they require evaluation of the expectation of the Gaussian Q-function and/or its integer powers. In the first approach, we exploit the shifting property of Dirac delta approximations of the Q-function to circumvent the need for integration. In the second approach, we introduce tight exponential-type approximations for the Q-function that directly lead to the development of closed-form expressions for the ASER in terms of only the moment generating function (MGF) of the received signal-to-noise ratio (SNR) random variable. Numerical results reveal that our proposed solutions based on the MGF method are much more versatile and can yield better accuracy compared to our approximations derived via the Dirac delta approximation technique.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"135 7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88647509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1