Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13511
W. Kleinhempel
The author considers question-answering (QA) systems with a number of platforms operating in a common space. The platforms are equipped with interrogators and/or with transponders. The goal of such QA systems is to obtain information about the characteristics of the platforms with transponders at the platforms with interrogators. A general model for QA systems is introduced. Based on this model, it is shown that the probability of identification, the information-theoretical efficiency, and the average cost are quantities suitable for evaluating QA systems. The theory is especially applicable to identification systems for friend or foe. For such a system the advantage offered by spread-spectrum techniques is determined.<>
{"title":"A universal model for question-answering systems with special consideration of modern spread spectrum identification systems","authors":"W. Kleinhempel","doi":"10.1109/MILCOM.1988.13511","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13511","url":null,"abstract":"The author considers question-answering (QA) systems with a number of platforms operating in a common space. The platforms are equipped with interrogators and/or with transponders. The goal of such QA systems is to obtain information about the characteristics of the platforms with transponders at the platforms with interrogators. A general model for QA systems is introduced. Based on this model, it is shown that the probability of identification, the information-theoretical efficiency, and the average cost are quantities suitable for evaluating QA systems. The theory is especially applicable to identification systems for friend or foe. For such a system the advantage offered by spread-spectrum techniques is determined.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"103 1","pages":"1003-1008 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74868770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13410
K. Brayer, S. Natarajan
An investigation of error control coding techniques on an experimental northern latitude meteor burst link is presented. Bit error patterns were obtained and the performance of automatic repeat request (ARQ) and hybrid forward error correction (FEC) with ARQ was examined from the standpoint of probability of message delivery and encountered delays with respect to the message delivery. It is demonstrated that FEC will yield orders of magnitude of improvement in the delivery of messages within a maximum time constraint. The potential gains in extending the usable time duration of a meteor burst channel are on the order of factors of four with successful delivery percentages increased by factors of 50.<>
{"title":"An investigation of ARQ and hybrid FEC-ARQ on an experimental high latitude meteor burst channel","authors":"K. Brayer, S. Natarajan","doi":"10.1109/MILCOM.1988.13410","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13410","url":null,"abstract":"An investigation of error control coding techniques on an experimental northern latitude meteor burst link is presented. Bit error patterns were obtained and the performance of automatic repeat request (ARQ) and hybrid forward error correction (FEC) with ARQ was examined from the standpoint of probability of message delivery and encountered delays with respect to the message delivery. It is demonstrated that FEC will yield orders of magnitude of improvement in the delivery of messages within a maximum time constraint. The potential gains in extending the usable time duration of a meteor burst channel are on the order of factors of four with successful delivery percentages increased by factors of 50.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"4 1","pages":"313-319 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73005329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13399
A. Saha, B. Mazumder
A novel method of economic transmission of parallel data over a pair of wires is described. The n-bit digital word X is encoded into a pulse of duration tau (X), where f(X), the reciprocal of tau (X) is proportional to the magnitude of X. At the receiver end, information is retrieved by converting f(X) back to X by a successive approximation logic f-to-D converter technique. Appropriate protocols have been formulated for smooth flow of data. Algorithms for transmission, reception, and protocols are implemented by developing software programs for the complete system using 8085 microprocessors.<>
本文描述了一种新型的并行数据经济传输方法。n位数字字X被编码成持续时间为tau (X)的脉冲,其中f(X), tau (X)的倒数与X的大小成正比。在接收端,通过连续逼近逻辑f- d转换器技术将f(X)转换回X来检索信息。为保证数据的畅通,已制定了适当的协议。使用8085微处理器为整个系统开发软件程序,实现了传输、接收和协议的算法。
{"title":"A novel microprocessor based data communication system","authors":"A. Saha, B. Mazumder","doi":"10.1109/MILCOM.1988.13399","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13399","url":null,"abstract":"A novel method of economic transmission of parallel data over a pair of wires is described. The n-bit digital word X is encoded into a pulse of duration tau (X), where f(X), the reciprocal of tau (X) is proportional to the magnitude of X. At the receiver end, information is retrieved by converting f(X) back to X by a successive approximation logic f-to-D converter technique. Appropriate protocols have been formulated for smooth flow of data. Algorithms for transmission, reception, and protocols are implemented by developing software programs for the complete system using 8085 microprocessors.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"234 1","pages":"235-239 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78590927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13409
S. Wicker
It is shown that the Viterbi decoding algorithm can be modified for use in a type-I hybrid-ARQ (automatic-repeat-request) scheme. Through proper definition, the partial path metrics can be made directly proportional to the error content in a received sequence. Retransmission requests are generated whenever all partial path metrics exceed a fixed threshold before decoding is completed. The threshold may be varied to balance reliability with retransmission frequency. The implementation of this scheme increases reliability performance by several orders of magnitude at the expense of minimal modification to the basic Viterbi decoder and, in some cases, a negligible decrease in throughput.<>
{"title":"An adaptive type-I hybrid-ARQ technique using the Viterbi decoding algorithm","authors":"S. Wicker","doi":"10.1109/MILCOM.1988.13409","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13409","url":null,"abstract":"It is shown that the Viterbi decoding algorithm can be modified for use in a type-I hybrid-ARQ (automatic-repeat-request) scheme. Through proper definition, the partial path metrics can be made directly proportional to the error content in a received sequence. Retransmission requests are generated whenever all partial path metrics exceed a fixed threshold before decoding is completed. The threshold may be varied to balance reliability with retransmission frequency. The implementation of this scheme increases reliability performance by several orders of magnitude at the expense of minimal modification to the basic Viterbi decoder and, in some cases, a negligible decrease in throughput.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"47 1","pages":"307-311 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75143688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13418
J. Montgomery, D. Runyon, J. Fuller
The authors discuss a practical design for a 265-port multiple-beam antenna (MBA) for EHF military satellite communication (MILSATCOM). A constrained beamforming network (BFN) with several hundred feeds and seven port feed clusters is for the intended applications in terms of performance, complexity, weight, and power consumption, is established. The design of the dielectric lens is examined. The performance of the MBA is analyzed.<>
{"title":"Large multibeam lens antennas for EHF SATCOM","authors":"J. Montgomery, D. Runyon, J. Fuller","doi":"10.1109/MILCOM.1988.13418","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13418","url":null,"abstract":"The authors discuss a practical design for a 265-port multiple-beam antenna (MBA) for EHF military satellite communication (MILSATCOM). A constrained beamforming network (BFN) with several hundred feeds and seven port feed clusters is for the intended applications in terms of performance, complexity, weight, and power consumption, is established. The design of the dielectric lens is examined. The performance of the MBA is analyzed.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"36 1","pages":"369-373 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77358324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13449
S.S.L. Chang
The feedback adaptive variable-bit-rate system (FAVR) is a means of maximizing the throughput and minimizing the waiting time of a meteor-burst communication channel. It is shown that high reliability in automatic bit-rate identification can be realized with a small reduction in throughput as compared with an ideal variable bit-rate system. It is concluded that high throughput is achieved because the signal power is most effectively utilized and there is no overhead for conveying the bit-rate information. The system provides minimum waiting time because it makes use of weak bursts as well as strong bursts.<>
{"title":"Performance analysis of the FAVR meteor burst communication system","authors":"S.S.L. Chang","doi":"10.1109/MILCOM.1988.13449","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13449","url":null,"abstract":"The feedback adaptive variable-bit-rate system (FAVR) is a means of maximizing the throughput and minimizing the waiting time of a meteor-burst communication channel. It is shown that high reliability in automatic bit-rate identification can be realized with a small reduction in throughput as compared with an ideal variable bit-rate system. It is concluded that high throughput is achieved because the signal power is most effectively utilized and there is no overhead for conveying the bit-rate information. The system provides minimum waiting time because it makes use of weak bursts as well as strong bursts.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"1 1","pages":"583-587 vol.2"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79589164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13493
M. Freeman
The author examines the telecommunications local area network, and computer-integrated network control system (TLC, INC) concept which uses modern network management principles to detect service-affecting problems so that corrective action can be applied to restore service. The information is presented to network managers on a high-resolution color graphic workstation in real time. An operation overview of the TLC, INC is presented, and attention is given to such features as global and site display, telecommunications, computer resources, controls, preplans, trend analysis, and performance, audit, and ad hoc reports.<>
{"title":"Telecommunications, local area networks, and computers-integrated network control","authors":"M. Freeman","doi":"10.1109/MILCOM.1988.13493","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13493","url":null,"abstract":"The author examines the telecommunications local area network, and computer-integrated network control system (TLC, INC) concept which uses modern network management principles to detect service-affecting problems so that corrective action can be applied to restore service. The information is presented to network managers on a high-resolution color graphic workstation in real time. An operation overview of the TLC, INC is presented, and attention is given to such features as global and site display, telecommunications, computer resources, controls, preplans, trend analysis, and performance, audit, and ad hoc reports.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"150 1","pages":"877-881 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79849419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13495
C. Noren
The author presents a tutorial on the use of an expert shell in rapid prototyping of network management systems. Prototyping issues considered include the selection of an expert shell, software architecture, and the development cycle. It is concluded that expert-system shells provide a development environment that can dramatically boost productivity over conventional programming approaches and make rapid prototyping possible. It is noted that the frame- and rule-based nature of the shells fits well in real-time network configuration and fault analysis.<>
{"title":"Rapid prototyping network management systems","authors":"C. Noren","doi":"10.1109/MILCOM.1988.13495","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13495","url":null,"abstract":"The author presents a tutorial on the use of an expert shell in rapid prototyping of network management systems. Prototyping issues considered include the selection of an expert shell, software architecture, and the development cycle. It is concluded that expert-system shells provide a development environment that can dramatically boost productivity over conventional programming approaches and make rapid prototyping possible. It is noted that the frame- and rule-based nature of the shells fits well in real-time network configuration and fault analysis.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"30 1","pages":"891-895 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81697607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13488
D. Manela, D. Schilling
The authors consider a multihop packet radio network, i.e., a spread-spectrum multiple-access (SSMA) network. The network by nature of its operation, has collisions, when two or more users share the same frequency bin at a given time. A solution to the collisions is available by introducing error-correcting codes into the transmitted data. A simple projection code which asymptotically approaches Reiger's bound is suggested and analyzed. Unlike the Reed-Solomon code the projection code is not subject to algebraic constraints and can be easily adjusted to any system parameters such as packet size, code rate, number of bits per hop, and modulation alphabet. The code's structure, features, performances, and implementation, and its advantages over other codes are described.<>
{"title":"Projection codes for burst error correction in SSMA networks","authors":"D. Manela, D. Schilling","doi":"10.1109/MILCOM.1988.13488","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13488","url":null,"abstract":"The authors consider a multihop packet radio network, i.e., a spread-spectrum multiple-access (SSMA) network. The network by nature of its operation, has collisions, when two or more users share the same frequency bin at a given time. A solution to the collisions is available by introducing error-correcting codes into the transmitted data. A simple projection code which asymptotically approaches Reiger's bound is suggested and analyzed. Unlike the Reed-Solomon code the projection code is not subject to algebraic constraints and can be easily adjusted to any system parameters such as packet size, code rate, number of bits per hop, and modulation alphabet. The code's structure, features, performances, and implementation, and its advantages over other codes are described.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"134 1","pages":"839-843 vol.3"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76559581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1988-10-23DOI: 10.1109/MILCOM.1988.13414
P. Gross, G. Reichlen
The Defense Communications Agency has developed a strategy for the adoption of the GOSIP (Government OSI profile) defined open system interconnection (OSI) protocols within the Department of Defense (DoD). The cornerstone of the DoD's OSI migration strategy is coexistence and interoperability with the DoD protocols through progressive stages of implementation. Coexistence and interoperability are discussed with respect to the dual-protocol host, selected application-layer interoperability, internetwork-level OSI connectivity, and publicly available OSI software.<>
{"title":"DoD support for OSI protocols","authors":"P. Gross, G. Reichlen","doi":"10.1109/MILCOM.1988.13414","DOIUrl":"https://doi.org/10.1109/MILCOM.1988.13414","url":null,"abstract":"The Defense Communications Agency has developed a strategy for the adoption of the GOSIP (Government OSI profile) defined open system interconnection (OSI) protocols within the Department of Defense (DoD). The cornerstone of the DoD's OSI migration strategy is coexistence and interoperability with the DoD protocols through progressive stages of implementation. Coexistence and interoperability are discussed with respect to the dual-protocol host, selected application-layer interoperability, internetwork-level OSI connectivity, and publicly available OSI software.<<ETX>>","PeriodicalId":66166,"journal":{"name":"军事通信技术","volume":"32 1","pages":"343-347 vol.1"},"PeriodicalIF":0.0,"publicationDate":"1988-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89976253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}