首页 > 最新文献

MILCOM 2012 - 2012 IEEE Military Communications Conference最新文献

英文 中文
Enhancing the classification accuracy of IP geolocation 提高IP地理定位的分类精度
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415842
Hellen Maziku, S. Shetty, Keesook J. Han, Tamara Rogers
The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. These approaches typically produce erroneous results due to measurement errors. In this paper, we propose an Enhanced Learning Classifier approach for estimating the geolocation of Internet hosts with increased accuracy. Our approach extends an exisiting machine learning based approach by extracting six features from network measurements and implementing a new landmark selection policy. These enhancements allow us to mitigate problems with measurement errors and reduces average error distance in estimating location of Internet hosts. To demonstrate the accuracy of our approach, we evaluate the performance on network routers using ping measurements from PlanetLab nodes with known geographic placement. Our results demonstrate that our approach improves average accuracy by geolocating internet hosts 100 miles closer to the true geographic location versus prior measurement-based approaches.
从在线广告到网络攻击本地化,互联网主机本地化的能力对一系列应用都很有吸引力。最近,人们提出了基于测量的方法来准确地识别互联网主机的位置。由于测量误差,这些方法通常会产生错误的结果。在本文中,我们提出了一种增强的学习分类器方法来估计互联网主机的地理位置,并提高了准确性。我们的方法扩展了现有的基于机器学习的方法,从网络测量中提取了六个特征,并实现了一个新的地标选择策略。这些增强使我们能够减轻测量误差的问题,并减少估计Internet主机位置的平均误差距离。为了证明我们方法的准确性,我们使用来自已知地理位置的PlanetLab节点的ping测量来评估网络路由器上的性能。我们的研究结果表明,与之前基于测量的方法相比,我们的方法通过将互联网主机定位到离真实地理位置更近100英里的位置来提高平均精度。
{"title":"Enhancing the classification accuracy of IP geolocation","authors":"Hellen Maziku, S. Shetty, Keesook J. Han, Tamara Rogers","doi":"10.1109/MILCOM.2012.6415842","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415842","url":null,"abstract":"The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. These approaches typically produce erroneous results due to measurement errors. In this paper, we propose an Enhanced Learning Classifier approach for estimating the geolocation of Internet hosts with increased accuracy. Our approach extends an exisiting machine learning based approach by extracting six features from network measurements and implementing a new landmark selection policy. These enhancements allow us to mitigate problems with measurement errors and reduces average error distance in estimating location of Internet hosts. To demonstrate the accuracy of our approach, we evaluate the performance on network routers using ping measurements from PlanetLab nodes with known geographic placement. Our results demonstrate that our approach improves average accuracy by geolocating internet hosts 100 miles closer to the true geographic location versus prior measurement-based approaches.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81946605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimal resource allocation in HARQ-based OFDMA wireless networks 基于harq的OFDMA无线网络资源优化分配
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415608
Sébastien Marcille, P. Ciblat, C. Martret
This paper deals with multiuser resource allocation (power, bandwidth, constellation size, and code rate) for an OFDMA system using HARQ in the context of Rayleigh distributed channel. We assume that the resource manager (base station or cluster head) only knows the channel statistics of the active links. Then, an optimal algorithm for minimizing the total transmitted power under per user goodput constraints is proposed. Extension to imperfect feedback on HARQ scheme is also performed. This algorithm can be especially applied to military ad hoc wireless networks.
本文研究了在瑞利分布式信道环境下使用HARQ的OFDMA系统的多用户资源分配(功率、带宽、星座大小和码率)问题。我们假设资源管理器(基站或集群头)只知道活动链路的通道统计信息。在此基础上,提出了一种在每用户good - put约束下最小化总传输功率的最优算法。并对HARQ方案的不完全反馈进行了推广。该算法特别适用于军用自组织无线网络。
{"title":"Optimal resource allocation in HARQ-based OFDMA wireless networks","authors":"Sébastien Marcille, P. Ciblat, C. Martret","doi":"10.1109/MILCOM.2012.6415608","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415608","url":null,"abstract":"This paper deals with multiuser resource allocation (power, bandwidth, constellation size, and code rate) for an OFDMA system using HARQ in the context of Rayleigh distributed channel. We assume that the resource manager (base station or cluster head) only knows the channel statistics of the active links. Then, an optimal algorithm for minimizing the total transmitted power under per user goodput constraints is proposed. Extension to imperfect feedback on HARQ scheme is also performed. This algorithm can be especially applied to military ad hoc wireless networks.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81995318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals 由移动终端组成的fm - tdma卫星通信网络对相邻卫星的干扰
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415586
V. Weerackody, E. Cuevas
Satellite Communications on-the-move (SOTM) networks are being deployed to provide various broadband communication services. Typically, an SOTM network consists of a large number of small aperture terminals deployed over a wide geographical area. These terminals are intended to operate over geostationary orbit satellites. To utilize network resources efficiently, these networks may employ time- and frequency-division multiple access methods. Also, SOTM terminals may operate using a range of antenna aperture sizes and may require different transmit power levels to meet various user's data rate needs. Additionally, antenna pointing errors of the terminals may contribute to a time-varying interference pattern from the SOTM network to a victim receiver in another satellite network. This paper provides a methodology to analyze the time-varying interference resulting from an MF-TDMA network consisting of such terminals. This methodology has been submitted for consideration by ITU-R Working Party 4A.
正在部署移动卫星通信(SOTM)网络,以提供各种宽带通信服务。通常,SOTM网络由大量部署在广泛地理区域的小孔径终端组成。这些终端将在地球静止轨道卫星上运行。为了有效地利用网络资源,这些网络可以采用时分和频分多址方式。此外,SOTM终端可以使用一系列的天线孔径尺寸,并可能需要不同的发射功率水平,以满足不同用户的数据速率需求。此外,终端的天线指向误差可能导致从SOTM网络到另一个卫星网络中的受害接收机的时变干扰图。本文提供了一种分析由此类终端组成的MF-TDMA网络时变干扰的方法。该方法已提交ITU-R 4A工作组审议。
{"title":"Adjacent satellite interference from a network Of MF-TDMA satellite communications on-the-move terminals","authors":"V. Weerackody, E. Cuevas","doi":"10.1109/MILCOM.2012.6415586","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415586","url":null,"abstract":"Satellite Communications on-the-move (SOTM) networks are being deployed to provide various broadband communication services. Typically, an SOTM network consists of a large number of small aperture terminals deployed over a wide geographical area. These terminals are intended to operate over geostationary orbit satellites. To utilize network resources efficiently, these networks may employ time- and frequency-division multiple access methods. Also, SOTM terminals may operate using a range of antenna aperture sizes and may require different transmit power levels to meet various user's data rate needs. Additionally, antenna pointing errors of the terminals may contribute to a time-varying interference pattern from the SOTM network to a victim receiver in another satellite network. This paper provides a methodology to analyze the time-varying interference resulting from an MF-TDMA network consisting of such terminals. This methodology has been submitted for consideration by ITU-R Working Party 4A.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"302 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78436709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Xenon separation VMM: Secure virtualization infrastructure for military clouds Xenon分离VMM:用于军事云的安全虚拟化基础设施
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415673
J. McDermott, B. Montrose, Margery Li, J. Kirby, Myong H. Kang
In conventional military computing, security separation is provided by cryptography, for data in motion and data at rest. Security separation for data under computation is provided by separate hardware. Cloud computing shares hardware for all data under computation, so a new approach to security separation is needed for military clouds. Cryptographic separation of data under computation is not practical with current technology, so the separation must be accomplished by software, i.e. the virtualization infrastructure. The strongest known means of software separation is the separation kernel. Separation kernels are special virtual machine monitors (VMMs) that are small enough and simple enough to be mathematically verified. Unfortunately, strict separation kernels cannot virtualize the complex modern commodity hardware and guest virtual machine (VM) operating systems that are essential to cloud computing. The best alternative to a strict separation kernel is a a separation VMM. A separation VMM relaxes the strict size and simplicity goals of a separation kernel just far enough to be able to support commodity hardware and guest operating systems. Because they address all of the features of commodity hardware, separation VMMs are too large for formal mathematical verification. However, separation VMMs are small enough and simple enough to be completely specified by semiformal means, i.e. they are smaller and simpler than conventional VMMs. A separation VMM has a complete systematic assurance argument that it isolates guest VMs from each other and strongly protects itself from tampering. A separation VMM provides the strongest separation of cloud VMs that is consistent with virtualizing complex commodity operating systems, on shared complex commodity hardware.
在传统的军事计算中,加密技术为运动数据和静止数据提供了安全隔离。计算数据的安全分离由单独的硬件提供。云计算为计算中的所有数据共享硬件,因此军事云需要一种新的安全分离方法。在当前的技术条件下,对计算下的数据进行加密分离是不现实的,因此这种分离必须通过软件,即虚拟化基础设施来完成。已知最强大的软件分离方法是分离内核。分离内核是一种特殊的虚拟机监视器(vmm),它足够小,足够简单,可以进行数学验证。不幸的是,严格的分离内核不能虚拟化复杂的现代商用硬件和对云计算至关重要的来宾虚拟机(VM)操作系统。严格分离内核的最佳替代方案是一个分离VMM。分离VMM放宽了分离内核严格的大小和简单性目标,使其能够支持商用硬件和客户机操作系统。因为它们解决了商用硬件的所有特性,分离vmm对于正式的数学验证来说太大了。然而,分离vmm足够小,足够简单,可以用半正式的方法完全指定,即它们比传统的vmm更小,更简单。分离VMM具有完整的系统保证,它将来宾vm彼此隔离,并强烈保护自己不受篡改。分离VMM提供最强大的云虚拟机分离,这与在共享的复杂商用硬件上虚拟化复杂商用操作系统是一致的。
{"title":"The Xenon separation VMM: Secure virtualization infrastructure for military clouds","authors":"J. McDermott, B. Montrose, Margery Li, J. Kirby, Myong H. Kang","doi":"10.1109/MILCOM.2012.6415673","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415673","url":null,"abstract":"In conventional military computing, security separation is provided by cryptography, for data in motion and data at rest. Security separation for data under computation is provided by separate hardware. Cloud computing shares hardware for all data under computation, so a new approach to security separation is needed for military clouds. Cryptographic separation of data under computation is not practical with current technology, so the separation must be accomplished by software, i.e. the virtualization infrastructure. The strongest known means of software separation is the separation kernel. Separation kernels are special virtual machine monitors (VMMs) that are small enough and simple enough to be mathematically verified. Unfortunately, strict separation kernels cannot virtualize the complex modern commodity hardware and guest virtual machine (VM) operating systems that are essential to cloud computing. The best alternative to a strict separation kernel is a a separation VMM. A separation VMM relaxes the strict size and simplicity goals of a separation kernel just far enough to be able to support commodity hardware and guest operating systems. Because they address all of the features of commodity hardware, separation VMMs are too large for formal mathematical verification. However, separation VMMs are small enough and simple enough to be completely specified by semiformal means, i.e. they are smaller and simpler than conventional VMMs. A separation VMM has a complete systematic assurance argument that it isolates guest VMs from each other and strongly protects itself from tampering. A separation VMM provides the strongest separation of cloud VMs that is consistent with virtualizing complex commodity operating systems, on shared complex commodity hardware.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76061332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource allocation for cooperative relay-assisted OFDMA networks with imperfect CSI 不完全CSI下中继辅助OFDMA网络的资源分配
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415882
Zheng Chang, T. Ristaniemi
This work addresses the radio resource allocation (RRA) problem for cooperative relay assisted OFDMA wireless networks. The relays adopt the decode-and-forward protocol and can cooperatively assist the transmission from source to destination. The RRA scheme addresses practical implementation issues of resource allocation in OFDMA networks: the inaccuracy of channel-state information (CSI) available to the source. Instead, the source only knows estimated channel status and distributions of related estimation errors. The objective is to maximize the system throughput of the source-to-destination link under various constraints. Since the optimization problem is known as NP-hard, we divide the original problem to three subproblems including relay selection, subcarrier and power allocations. We derive theoretical expressions for the solutions and illustrate them through simulations. Results validate clearly that our proposed RRA algorithm can enhance the performance of system with imperfect CSI compared to the other newly proposed resource allocation schemes.
本文研究了协作中继辅助OFDMA无线网络的无线电资源分配问题。中继采用译码转发协议,可以协同辅助从源到目的的传输。RRA方案解决了OFDMA网络中资源分配的实际实现问题:源可用的信道状态信息(CSI)的不准确性。相反,源只知道估计的信道状态和相关估计误差的分布。目标是在各种约束条件下使源到目的链路的系统吞吐量最大化。由于优化问题被称为np困难,我们将原问题分为三个子问题,包括中继选择、子载波和功率分配。我们推导了解的理论表达式,并通过仿真加以说明。结果表明,与其他新提出的资源分配方案相比,我们提出的RRA算法可以提高不完全CSI系统的性能。
{"title":"Resource allocation for cooperative relay-assisted OFDMA networks with imperfect CSI","authors":"Zheng Chang, T. Ristaniemi","doi":"10.1109/MILCOM.2012.6415882","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415882","url":null,"abstract":"This work addresses the radio resource allocation (RRA) problem for cooperative relay assisted OFDMA wireless networks. The relays adopt the decode-and-forward protocol and can cooperatively assist the transmission from source to destination. The RRA scheme addresses practical implementation issues of resource allocation in OFDMA networks: the inaccuracy of channel-state information (CSI) available to the source. Instead, the source only knows estimated channel status and distributions of related estimation errors. The objective is to maximize the system throughput of the source-to-destination link under various constraints. Since the optimization problem is known as NP-hard, we divide the original problem to three subproblems including relay selection, subcarrier and power allocations. We derive theoretical expressions for the solutions and illustrate them through simulations. Results validate clearly that our proposed RRA algorithm can enhance the performance of system with imperfect CSI compared to the other newly proposed resource allocation schemes.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"272 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76403576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cooperative jammer design in cellular network with internal eavesdroppers 内置窃听器蜂窝网络协同干扰设计
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415636
Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, B. Koo
In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helper's cooperation can achieve the positive secrecy rate by the proposed scheme.
为了提高蜂窝下行网络无线传输的保密性,本文提出了一种协同干扰器。为单个用户准备的私人消息应与被视为内部窃听者的其他用户隔离。为了提高目标用户的保密性,我们提出了使用多天线辅助器,并设计了其最佳发射波束形成矢量。辅助节点对内部窃听器产生人工干扰,通过增加窃听器处的模糊度来提高安全性。基于[1]中的功率增益域框架,我们优化了助手的传输策略,使目标用户的保密能力最大化。分析和仿真结果表明,该方案提高了系统的保密能力。此外,在没有助手配合的情况下,所有保密率为零的用户都可以实现正保密率。
{"title":"Cooperative jammer design in cellular network with internal eavesdroppers","authors":"Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, B. Koo","doi":"10.1109/MILCOM.2012.6415636","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415636","url":null,"abstract":"In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helper's cooperation can achieve the positive secrecy rate by the proposed scheme.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79171678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Comparison of TSVCIS voice at 8000 and 12000 bps VERSUS CVSD at 16000 bps TSVCIS语音在8000和12000 bps与CVSD在16000 bps的比较
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415564
P. Shahan, D. Heide, Aaron E. Cohen
In this paper a novel technique for implementing heavily bit error protected 8 and 12 kilobits per second (kbps) voice coder (vocoder) based on a 2.4 kbps vocoder specified in Tactical Secure Voice Cryptographic Interoperability Specification (TSVCIS) is compared to the current 16 kbps Continuously Variable Slope Delta Modulation (CVSD) used in several legacy military radios and the Single Channel Ground and Airborne Radio System (SINCGARS). TSVCIS voice significantly outscored CVSD in terms of quality, using the Mean Opinion Score (MOS) and Diagnostic Acceptability Measure (DAM), and intelligibility, from the Diagnostic Rhyme Test (DRT). These tests show that TSVCIS voice delivers significantly higher quality and intelligibility than CVSD when transmitted over noisy communication channels.
在本文中,基于战术安全语音加密互操作性规范(TSVCIS)中规定的2.4 kbps声码器,一种实现严重误码保护的8和12千比特每秒(kbps)语音编码器(声码器)的新技术与目前用于几种传统军用无线电和单通道地面和机载无线电系统(SINCGARS)的16 kbps连续变斜率增量调制(CVSD)进行了比较。TSVCIS语音在质量方面明显优于CVSD,使用平均意见评分(MOS)和诊断可接受性测量(DAM),以及诊断押韵测试(DRT)的可理解性。这些测试表明,在有噪声的通信信道上传输时,TSVCIS语音的质量和清晰度明显高于CVSD。
{"title":"Comparison of TSVCIS voice at 8000 and 12000 bps VERSUS CVSD at 16000 bps","authors":"P. Shahan, D. Heide, Aaron E. Cohen","doi":"10.1109/MILCOM.2012.6415564","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415564","url":null,"abstract":"In this paper a novel technique for implementing heavily bit error protected 8 and 12 kilobits per second (kbps) voice coder (vocoder) based on a 2.4 kbps vocoder specified in Tactical Secure Voice Cryptographic Interoperability Specification (TSVCIS) is compared to the current 16 kbps Continuously Variable Slope Delta Modulation (CVSD) used in several legacy military radios and the Single Channel Ground and Airborne Radio System (SINCGARS). TSVCIS voice significantly outscored CVSD in terms of quality, using the Mean Opinion Score (MOS) and Diagnostic Acceptability Measure (DAM), and intelligibility, from the Diagnostic Rhyme Test (DRT). These tests show that TSVCIS voice delivers significantly higher quality and intelligibility than CVSD when transmitted over noisy communication channels.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"24 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75163635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On optimum relay deployment in a multi-hop linear network with cooperation 基于合作的多跳线性网络中继优化部署研究
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415793
Hao Feng, L. Cimini
There has been a growing interest in designing relay deployment strategies for cooperative wireless networks. In this paper, we focus on multi-hop, cluster-based, linear networks. Several relay selection strategies are applied to achieve the cooperative diversity benefits. We derive the number of hops that minimizes the end-to-end outage probability. On the other hand, if the required overhead for cooperation is considered, increasing the number of relays in each cluster can degrade the performance. Using an information-theoretic approach, we also investigate the number of relays that maximizes the throughput. Simulation results are presented to verify the analysis.
人们对设计协作无线网络的中继部署策略越来越感兴趣。在本文中,我们关注多跳、基于集群的线性网络。采用多种中继选择策略来实现协同分集效益。我们推导出使端到端中断概率最小化的跳数。另一方面,如果考虑到协作所需的开销,则增加每个集群中的中继数量可能会降低性能。使用信息论方法,我们还研究了使吞吐量最大化的中继数量。仿真结果验证了分析的正确性。
{"title":"On optimum relay deployment in a multi-hop linear network with cooperation","authors":"Hao Feng, L. Cimini","doi":"10.1109/MILCOM.2012.6415793","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415793","url":null,"abstract":"There has been a growing interest in designing relay deployment strategies for cooperative wireless networks. In this paper, we focus on multi-hop, cluster-based, linear networks. Several relay selection strategies are applied to achieve the cooperative diversity benefits. We derive the number of hops that minimizes the end-to-end outage probability. On the other hand, if the required overhead for cooperation is considered, increasing the number of relays in each cluster can degrade the performance. Using an information-theoretic approach, we also investigate the number of relays that maximizes the throughput. Simulation results are presented to verify the analysis.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76475403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Online learning in decentralized multi-user spectrum access with synchronized explorations 同步探索的分散多用户频谱访问中的在线学习
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415693
Cem Tekin, M. Liu
In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.
本文将未使用频段的分散多用户在线学习作为机会频谱接入(OSA)问题来考虑。有一组M个二级用户利用K个频道的频谱机会。我们为次要用户开发了一种分布式算法,该算法将学习具有对数遗憾的最优分配。因此,我们的算法对最优分配的收敛速度最快。在更一般的框架下,我们的算法给出了具有一般奖励函数的分散多人多手强盗问题的有序最优解。
{"title":"Online learning in decentralized multi-user spectrum access with synchronized explorations","authors":"Cem Tekin, M. Liu","doi":"10.1109/MILCOM.2012.6415693","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415693","url":null,"abstract":"In this paper we consider decentralized multi-user online learning of unused spectrum bands as an opportunistic spectrum access (OSA) problem. There is a set of M secondary users exploiting the spectrum opportunities in K channels. We develop a distributed algorithm for the secondary users that will learn the optimal allocation with logarithmic regret. Thus, our algorithm achieves the fastest convergence rate to the optimal allocation. In a more general framework, our algorithm gives an order optimal solution to the decentralized multi-player multi-armed bandit problem with general reward functions.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"79 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83798067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance of Combatant Command satellite (COCOMSat) communications in contested environments 战斗指挥卫星(COCOMSat)在竞争环境中的通信性能
Pub Date : 2012-10-01 DOI: 10.1109/MILCOM.2012.6415768
K. Y. Jo, D. M. Cascio
This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.
本文提出了一种卫星加载方法,用于在遇到干扰的竞争环境中对商用ka波段卫星加载卫星通信(SATCOM)需求。未来的高容量ka波段商业卫星将依靠地面集中节点(GCNs)和自适应编码和调制(ACM)技术,通过卫星(DVB/RCS)服务为转发和返回链路提供数字视频广播/返回信道,以实现高吞吐量。用户波束之间的流量通过GCNs进行协调,因此点对点流量需要双跳,而回传流量需要依赖地面网络的单跳。类似蜂窝的用户波束被组装成阵列,旨在增强用户覆盖和可支持性。在存在上行链路干扰的情况下,导出了以最小化卫星和终端功率和最大化支持的数据速率为目标的最优卫星负载。当应答器开始以接近饱和的非线性模式工作时,在竞争环境中会导致吞吐量下降。
{"title":"Performance of Combatant Command satellite (COCOMSat) communications in contested environments","authors":"K. Y. Jo, D. M. Cascio","doi":"10.1109/MILCOM.2012.6415768","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415768","url":null,"abstract":"This paper presents satellite loading methodologies for loading satellite communications (SATCOM) requirements on commercial Ka-band satellites in contested environments experiencing jamming. Future high-capacity Ka-band commercial satellites will rely on ground concentration nodes (GCNs) and adaptive coding and modulation (ACM) techniques to provide digital video broadcasting/return channel via satellite (DVB/RCS) services for forward and return links to achieve high throughput. Traffic flows between user beams are coordinated through GCNs thus requiring double hops for peer-to-peer traffic while reachback traffic requires single hops relying on terrestrial networks. Cell-like user beams are assembled in arrays designed to enhance user coverage and supportability. Optimal satellite loading in the presence of uplink jamming is derived to minimize satellite and terminals powers and to maximize the supported data rates. Throughput degradation in contested environments results when the transponders begin to operate in a non-linear mode approaching saturation.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83810626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
MILCOM 2012 - 2012 IEEE Military Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1