Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415778
B. Ranjha, M. I. Chowdhury, M. Kavehrad
In this paper, we analyze the effect of Carrier Frequency Offset (CFO) of multiple users on the SINR of a single user in OFDMA based uplink communication receiver. We have computed an explicit SINR expression for two types of mapping strategies used in uplink OFDMA systems namely Interleaved Frequency Division Multiple Access (IFDMA) and Localized Frequency Division Multiple Access (LFDMA). SINR expressions in case of carrier frequency offset correction are also computed. Using simulations, we have compared the total average interference due to different values of CFO's of multiple users for both mapping schemes. Simulation results also show that the average value of Inter-Carrier Interference (ICI) for localized mapping is higher than interleaved mapping while the average value of Multiuser Interference (MUI) is higher for interleaved mapping. Moreover, the average MUI for localized mapping is minimum at the center of the band and it increases as we move towards the band edges. We also observe a flat response for ICI and MUI for interleaved mapping.
{"title":"Interference analysis of interleaved and localized mapping schemes in OFDMA system with Carrier Frequency Offset","authors":"B. Ranjha, M. I. Chowdhury, M. Kavehrad","doi":"10.1109/MILCOM.2012.6415778","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415778","url":null,"abstract":"In this paper, we analyze the effect of Carrier Frequency Offset (CFO) of multiple users on the SINR of a single user in OFDMA based uplink communication receiver. We have computed an explicit SINR expression for two types of mapping strategies used in uplink OFDMA systems namely Interleaved Frequency Division Multiple Access (IFDMA) and Localized Frequency Division Multiple Access (LFDMA). SINR expressions in case of carrier frequency offset correction are also computed. Using simulations, we have compared the total average interference due to different values of CFO's of multiple users for both mapping schemes. Simulation results also show that the average value of Inter-Carrier Interference (ICI) for localized mapping is higher than interleaved mapping while the average value of Multiuser Interference (MUI) is higher for interleaved mapping. Moreover, the average MUI for localized mapping is minimum at the center of the band and it increases as we move towards the band edges. We also observe a flat response for ICI and MUI for interleaved mapping.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82499217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415666
Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan
Unexpected occurrences of large-area cascading failures due to small disturbances in worldwide electricity grids serve as evidence of their intrinsic instability. As the grid is the most fundamental critical infrastructure in any modern society, detection and mitigation of such cascading failures due to accidental failures or malicious attacks are of vital importance to both civilian and military applications. However, due to the unique physical properties of electricity, such as its travel speed, systems must be able to react within a fraction of second in order to detect and prevent occurrences of cascading failures. In this paper, by modeling the grid as a cyber-physical system, we propose a decentralized, hierarchical framework to develop and implement a wide-area actionable system, capable of detecting and mitigating potential cascading failures. The states of the grid and physical constraints are modeled as manifolds, and evolution of the grid becomes a path on the manifold. By decomposing the grid into resilience zones with minimal power flow between them, we utilize precomputed scenarios in each resilience zone to develop a parametrized model. During deployment, online phasor measurements will be used to estimate the stability within each zone and interactions among them. The detection of cascading failures will be based on the detection of cascading failing paths among the K hop trees built for each zone. We illustrate the effectiveness of the proposed approach using the 2003 Italy blackout scenarios, and we discuss practical requirements in order to deploy such a system.
{"title":"A cyber-physical approach to a wide-area actionable system for the power grid","authors":"Josef D. Allen, Xiuwen Liu, Ivan Lozano, Xin Yuan","doi":"10.1109/MILCOM.2012.6415666","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415666","url":null,"abstract":"Unexpected occurrences of large-area cascading failures due to small disturbances in worldwide electricity grids serve as evidence of their intrinsic instability. As the grid is the most fundamental critical infrastructure in any modern society, detection and mitigation of such cascading failures due to accidental failures or malicious attacks are of vital importance to both civilian and military applications. However, due to the unique physical properties of electricity, such as its travel speed, systems must be able to react within a fraction of second in order to detect and prevent occurrences of cascading failures. In this paper, by modeling the grid as a cyber-physical system, we propose a decentralized, hierarchical framework to develop and implement a wide-area actionable system, capable of detecting and mitigating potential cascading failures. The states of the grid and physical constraints are modeled as manifolds, and evolution of the grid becomes a path on the manifold. By decomposing the grid into resilience zones with minimal power flow between them, we utilize precomputed scenarios in each resilience zone to develop a parametrized model. During deployment, online phasor measurements will be used to estimate the stability within each zone and interactions among them. The detection of cascading failures will be based on the detection of cascading failing paths among the K hop trees built for each zone. We illustrate the effectiveness of the proposed approach using the 2003 Italy blackout scenarios, and we discuss practical requirements in order to deploy such a system.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83446151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415786
Jacob Green, John L. Schultz
Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.
{"title":"Collaborative applications at the Tactical Edge through resilient group dissemination in DTN","authors":"Jacob Green, John L. Schultz","doi":"10.1109/MILCOM.2012.6415786","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415786","url":null,"abstract":"Civilian and wired military networks possess a rich ecosystem of applications that depend upon communication across a relatively stable and clean network. Conversely, the extremely harsh communication environment of the Tactical Edge Network (TEN) precludes all but a few highly customized network applications from working well there. Consequently, there is a severe lack of applications for information sharing and exchange in the TEN, which often leaves war-fighters without timely access to relevant information. To expand the capabilities and applications available at the tactical edge, this paper presents a group dissemination middleware service and one possible realization of it using the Bundle Protocol (DTN). We discuss how this middleware can function as the enabling technology around which many collaborative applications can work well at the tactical edge, while capitalizing on the reuse of an immense body of COTS technology.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"67 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89392004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415633
Gregory Rucker, R. Cole, D. Cansever, A. Mishra
In this paper, we apply Game Theory to the exploration into the development of Medium Access Protocols (MACs) for Dynamic Spectrum Access (DSA) software-define Secondary Radios (SRs) in the presence of Adversarial Jammers (AJs). We develop the Static Game representation of a hierarchical game involving the Primary Users (PUs) and the SRs and AJs. We then define a Dynamic, Repetitive Game to test the effectiveness of different SR and AJ agent strategies. These strategies are defined in terms of how aggressive the agents modify their future play based upon observations related to previous play outcomes. The observations are defined in the context of incomplete information, as it is not likely that a radio transceiver is capable of discerning all possible plays of competitors across all channels while also potentially transmitting on a given channel. We develop the Agent-Based Simulation (ABS) to investigate and analyze various versions of these games and agent strategies. We report on the results of the ABS investigations and our mathematical analysis.
{"title":"Games applied to jam resistant DSA radios","authors":"Gregory Rucker, R. Cole, D. Cansever, A. Mishra","doi":"10.1109/MILCOM.2012.6415633","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415633","url":null,"abstract":"In this paper, we apply Game Theory to the exploration into the development of Medium Access Protocols (MACs) for Dynamic Spectrum Access (DSA) software-define Secondary Radios (SRs) in the presence of Adversarial Jammers (AJs). We develop the Static Game representation of a hierarchical game involving the Primary Users (PUs) and the SRs and AJs. We then define a Dynamic, Repetitive Game to test the effectiveness of different SR and AJ agent strategies. These strategies are defined in terms of how aggressive the agents modify their future play based upon observations related to previous play outcomes. The observations are defined in the context of incomplete information, as it is not likely that a radio transceiver is capable of discerning all possible plays of competitors across all channels while also potentially transmitting on a given channel. We develop the Agent-Based Simulation (ABS) to investigate and analyze various versions of these games and agent strategies. We report on the results of the ABS investigations and our mathematical analysis.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87862629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415743
S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin
We introduce a fault tolerant bio-inspired topolog-ical control mechanism (TCM-Y) for the evolutionary decision making process of autonomous mobile nodes that adaptively adjust their spatial configuration in MANETs. TCM-Y is based on differential evolution and maintains a user-defined minimum connectivity for each node with its near neighbors. TCM-Y, therefore, provides a topology control mechanism which is fault tolerant with regards to network connectivity that each mobile node is required to maintain. In its fitness calculations, TCM-Y uses the Yao graph structure to enforce a user-defined minimum number of neighbors while obtaining uniform network topology. The effectiveness of TCM-Y is evaluated by comparing it with our differential evolution based topology mechanism (TCM-DE) that uses virtual forces from neighbors in its fitness function. Experimental results obtained from simulation software show that TCM-Y performs well with respect to normalized area coverage, the average connectivity, and the minimum connectivity achieved by mobile nodes. Simulation experiments demonstrate that TCM-Y generates encouraging results for uniform distribution of mobile nodes over unknown terrains while maintaining a user-defined minimum connectivity between neighboring nodes.
{"title":"Fault tolerant bio-inspired topology control mechanism for autonomous mobile node distribution in MANETs","authors":"S. Gundry, Jianmin Zou, Janusz Kusyk, M. U. Uyar, C. Sahin","doi":"10.1109/MILCOM.2012.6415743","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415743","url":null,"abstract":"We introduce a fault tolerant bio-inspired topolog-ical control mechanism (TCM-Y) for the evolutionary decision making process of autonomous mobile nodes that adaptively adjust their spatial configuration in MANETs. TCM-Y is based on differential evolution and maintains a user-defined minimum connectivity for each node with its near neighbors. TCM-Y, therefore, provides a topology control mechanism which is fault tolerant with regards to network connectivity that each mobile node is required to maintain. In its fitness calculations, TCM-Y uses the Yao graph structure to enforce a user-defined minimum number of neighbors while obtaining uniform network topology. The effectiveness of TCM-Y is evaluated by comparing it with our differential evolution based topology mechanism (TCM-DE) that uses virtual forces from neighbors in its fitness function. Experimental results obtained from simulation software show that TCM-Y performs well with respect to normalized area coverage, the average connectivity, and the minimum connectivity achieved by mobile nodes. Simulation experiments demonstrate that TCM-Y generates encouraging results for uniform distribution of mobile nodes over unknown terrains while maintaining a user-defined minimum connectivity between neighboring nodes.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87408093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415635
E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen
NATO has identified Web services as a key enabler for its network enabled capability. Web services facilitate interoperability, easy integration and use of commercial off-the-shelf components, and while request/response-based schemes have hitherto been predominant, publish/subscribe-based services are gaining ground. SOAP-based Web services, however, introduce considerable communication overhead, and optimization must be done to enable use on the tactical level. Data compression is one such optimization, and it works well for large messages. We claim that the inherent characteristics of publish/subscribe-based Web services are such that using difference-based compression will allow effective compression also for small messages. In this paper we present the design and implementation of a proof-of-concept mechanism called ZDiff, which we have tested on several types of military data formats. Together with our SOAP-based proxy system it can be used together with commercial off-the-shelf Web services software. The results show that difference-based compression outperforms traditional compression for small messages, at the same time as it never performs worse than traditional compression for larger messages.
{"title":"Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids","authors":"E. Skjervold, K. Lund, T. H. Bloebaum, F. T. Johnsen","doi":"10.1109/MILCOM.2012.6415635","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415635","url":null,"abstract":"NATO has identified Web services as a key enabler for its network enabled capability. Web services facilitate interoperability, easy integration and use of commercial off-the-shelf components, and while request/response-based schemes have hitherto been predominant, publish/subscribe-based services are gaining ground. SOAP-based Web services, however, introduce considerable communication overhead, and optimization must be done to enable use on the tactical level. Data compression is one such optimization, and it works well for large messages. We claim that the inherent characteristics of publish/subscribe-based Web services are such that using difference-based compression will allow effective compression also for small messages. In this paper we present the design and implementation of a proof-of-concept mechanism called ZDiff, which we have tested on several types of military data formats. Together with our SOAP-based proxy system it can be used together with commercial off-the-shelf Web services software. The results show that difference-based compression outperforms traditional compression for small messages, at the same time as it never performs worse than traditional compression for larger messages.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"54 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87422098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415626
Alberto Domingo, H. Wietgrefe
The NATO Network-Enabled Capabilities concept (NNEC) enables NATO to maximize the sharing of information and services in a wide variety of missions, characterized by a a-priori uncertainty about the mission service requirements, partner composition and command and control structures. NNEC guidance and principles are well documented in the NNEC framework and the NNEC Body of Knowledge (BoK). Experience and lessons learnt from mission support in Afghanistan's International Security Assistance Force (ISAF) and Libya (Operation Unified Protector OUP) have shown that deploying NNEC capabilities from scratch is complex and time consuming. Therefore, NATO and the Nations have decided to formalize the implementation of NNEC into a flexible, tailor-able and scalable capability known as the Future Mission Network (FMN). The FMN seeks to implement a NNEC-aligned set of network, systems and services, along with the necessary doctrine and processes, to facilitate federation of mission information and supporting capabilities in future operations. This paper will introduce the NATO NNEC framework and Body of Knowledge, its persistent requirements and the associated NNEC operational and technical achievements. Then, the NATO requirements for a Future Mission Network (FMN) are derived, taking into account experience from recent operations and also the NATO transformational vision and political guidance. Finally, the NNEC compliant approach for a NATO Future Mission Network is described, along with the high-level material and non-material solutions to facilitate information sharing in federated environments.
{"title":"A NNEC-compliant approach for a Future Mission Network","authors":"Alberto Domingo, H. Wietgrefe","doi":"10.1109/MILCOM.2012.6415626","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415626","url":null,"abstract":"The NATO Network-Enabled Capabilities concept (NNEC) enables NATO to maximize the sharing of information and services in a wide variety of missions, characterized by a a-priori uncertainty about the mission service requirements, partner composition and command and control structures. NNEC guidance and principles are well documented in the NNEC framework and the NNEC Body of Knowledge (BoK). Experience and lessons learnt from mission support in Afghanistan's International Security Assistance Force (ISAF) and Libya (Operation Unified Protector OUP) have shown that deploying NNEC capabilities from scratch is complex and time consuming. Therefore, NATO and the Nations have decided to formalize the implementation of NNEC into a flexible, tailor-able and scalable capability known as the Future Mission Network (FMN). The FMN seeks to implement a NNEC-aligned set of network, systems and services, along with the necessary doctrine and processes, to facilitate federation of mission information and supporting capabilities in future operations. This paper will introduce the NATO NNEC framework and Body of Knowledge, its persistent requirements and the associated NNEC operational and technical achievements. Then, the NATO requirements for a Future Mission Network (FMN) are derived, taking into account experience from recent operations and also the NATO transformational vision and political guidance. Finally, the NNEC compliant approach for a NATO Future Mission Network is described, along with the high-level material and non-material solutions to facilitate information sharing in federated environments.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415653
Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles
Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.
{"title":"Anti-jamming defense mechanism in cognitive radios networks","authors":"Marcelo Camilo, D. Moura, J. F. Galdino, R. Salles","doi":"10.1109/MILCOM.2012.6415653","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415653","url":null,"abstract":"Cognitive Radio is a technology that enables the spectrum sharing in an opportunistic fashion. However, as the development of cognitive radio technology occurs, its security problems like jamming arise. In this paper, we studied the jamming attack in cognitive radio networks. We sketched a scenario comprised by a primary user, a secondary user, and a spectrum jammer (namely attacker). Since the legitimate secondary user needs to transmit control messages and data in the available channels, we derived the best combinations of the number of control and data channels to the legitimate secondary user in face of different data applications considering the quality of service requirements reliability and throughput. We also considered the device with and without power constraints.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80043477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415721
J. Cleveland, J. Loyall, J. Hanna
Information Management (IM) services provide a powerful capability for military operations, enabling managed information exchange based on the characteristics of the information that is needed and the information that is available, rather than on explicit knowledge of the information consumers, producers, and repositories. To be usable in tactical environments and mission critical operations, IM services need to be resilient to faults and failures, which can be due to many factors, including design or implementation flaws, misconfiguration, corruption, hardware or infrastructure failure, resource intermittency or contention, or hostile actions. This paper presents a reference model for representing the performance and fault tolerance requirements of IM services in tactical operations. A Joint Close Air Support operation is described using this representation and the viability of canonical fault tolerance techniques are examined for a given deployment.
{"title":"Fault tolerance requirements of tactical Information Management systems","authors":"J. Cleveland, J. Loyall, J. Hanna","doi":"10.1109/MILCOM.2012.6415721","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415721","url":null,"abstract":"Information Management (IM) services provide a powerful capability for military operations, enabling managed information exchange based on the characteristics of the information that is needed and the information that is available, rather than on explicit knowledge of the information consumers, producers, and repositories. To be usable in tactical environments and mission critical operations, IM services need to be resilient to faults and failures, which can be due to many factors, including design or implementation flaws, misconfiguration, corruption, hardware or infrastructure failure, resource intermittency or contention, or hostile actions. This paper presents a reference model for representing the performance and fault tolerance requirements of IM services in tactical operations. A Joint Close Air Support operation is described using this representation and the viability of canonical fault tolerance techniques are examined for a given deployment.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"506 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77064386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/MILCOM.2012.6415602
M. Srivatsa, Sihyung Lee, T. Abdelzaher
Network operations that support tactical missions are often characterized by evolving information that needs to be delivered over bandwidth constrained communication networks and presented to a social/cognitive network with limited human attention span and high stress. Most past research efforts on data dissemination examined syntactic redundancy between data items (e.g., common bit strings, entropy coding and compression, etc.), but only limited work has examined the problem of reducing semantic redundancy with the goal of providing higher quality information to end users. In this paper we propose to measure semantic redundancy in large volume text streams using online topic models and opinion analysis (e.g., topic = Location X and opinion = possible_hazard+, safe_zone-). By suppressing semantically redundant content one can better utilize bottleneck resources such as bandwidth on a resource constrained network or attention time of a human user. However, unlike syntactic redundancy (e.g., lossless compression, lossy compression with small reconstruction errors), a semantic redundancy based approach is faced with the challenge of having to deal with larger inaccuracies (e.g., false positive and false negative probabilities in an opinion classifier). This paper seeks to quantify the effectiveness of a semantic redundancy based approach (over its syntactic counterparts) as a function of such inaccuracies and present a detailed experimental evaluation using realistic information flows collected from an enterprise network with about 1500 users1.
{"title":"Mining diverse opinions","authors":"M. Srivatsa, Sihyung Lee, T. Abdelzaher","doi":"10.1109/MILCOM.2012.6415602","DOIUrl":"https://doi.org/10.1109/MILCOM.2012.6415602","url":null,"abstract":"Network operations that support tactical missions are often characterized by evolving information that needs to be delivered over bandwidth constrained communication networks and presented to a social/cognitive network with limited human attention span and high stress. Most past research efforts on data dissemination examined syntactic redundancy between data items (e.g., common bit strings, entropy coding and compression, etc.), but only limited work has examined the problem of reducing semantic redundancy with the goal of providing higher quality information to end users. In this paper we propose to measure semantic redundancy in large volume text streams using online topic models and opinion analysis (e.g., topic = Location X and opinion = possible_hazard+, safe_zone-). By suppressing semantically redundant content one can better utilize bottleneck resources such as bandwidth on a resource constrained network or attention time of a human user. However, unlike syntactic redundancy (e.g., lossless compression, lossy compression with small reconstruction errors), a semantic redundancy based approach is faced with the challenge of having to deal with larger inaccuracies (e.g., false positive and false negative probabilities in an opinion classifier). This paper seeks to quantify the effectiveness of a semantic redundancy based approach (over its syntactic counterparts) as a function of such inaccuracies and present a detailed experimental evaluation using realistic information flows collected from an enterprise network with about 1500 users1.","PeriodicalId":18720,"journal":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","volume":"284 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77073333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}