Publications
Tagged As
Optimizing media access strategy for competing cognitive radio networks
Summary
Summary
This paper describes an adaptation of cognitive radio technology for tactical wireless networking. We introduce Competing Cognitive Radio Network (CCRN) featuring both communicator and jamming cognitive radio nodes that strategize in taking actions on an open spectrum under the presence of adversarial threats. We present the problem in the Multi-armed...
Competing Mobile Network Game: embracing antijamming and jamming strategies with reinforcement learning
Summary
Summary
We introduce Competing Mobile Network Game (CMNG), a stochastic game played by cognitive radio networks that compete for dominating an open spectrum access. Differentiated from existing approaches, we incorporate both communicator and jamming nodes to form a network for friendly coalition, integrate antijamming and jamming subgames into a stochastic framework...
Reconfigurable RF systems using commercially available digital capacitor arrays
Summary
Summary
Various RF circuit blocks implemented by using commercially available MEMS digital capacitor arrays are presented for reconfigurable RF systems. The designed circuit blocks are impedance-matching network, tunable bandpass filter, and VSWR sensor. The frequency range of the designed circuits is 0.4-4GHz. The MEMS digital capacitor arrays that are employed in...
Uses for field communication data in designing air traffic management decision support
Summary
Summary
In this paper, example uses of field communication data are provided and how these data impact the evolution of the Route Availability Planning Tool (RAPT) for air traffic management is introduced. Simple communications analyses are provided that illustrate how communications can be used to improve what decision support is provided...
Channel engineering of SOI MOSFETs for RF applications
Summary
Summary
Channel engineering of SOI MOSFETs is explored by altering ion implantation without adding any new fabrication steps to the standard CMOS process. The effects of implantation on characteristics important for RF applications, such as transconductance, output resistance, breakdown voltage, are compared. Data show that the best overall RF MOSFET has...
A sub-10mW 2Mbps BFSK transceiver at 1.35 to 1.75GHz.
Summary
Summary
This work presents the design and measurement of a 2Mbps BFSK transceiver at 1.35 to 1.75GHz for use in wireless sensor node applications. The receiver is a direct conversion architecture and has a sensitivity of -74dBm at 2Mbps and consumes 8.0mW. The transmitter generates orthogonal BFSK modulation through the use...
An end-to-end demonstration of a receiver array based free-space photon counting communications link
Summary
Summary
NASA anticipates a significant demand for long-haul communications service from deep-space to Earth in the near future. To address this need, a substantial effort has been invested in developing a free-space laser communications system that can be operated at data rates that are 10-1000 times higher than current RF systems...
Robust collaborative multicast service for airborne command and control environment
Summary
Summary
RCM (Robust Collaborative Multicast) is a communication service designed to support collaborative applications operating in dynamic, mission-critical environments. RCM implements a set of well-specified message ordering and reliability properties that balance two conflicting goals: a)providing low-latency, highly-available, reliable communication service, and b) guaranteeing global consistency in how different participants perceive...
Information Survivability for Mobile Wireless Systems
Summary
Summary
Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use...
Security implications of adaptive multimedia distribution
Summary
Summary
We discuss the security implications of different techniques used in adaptive audio and video distribution. Several sources of variability in the network make it necessary for applications to adapt. Ideally, each receiver should receive media quality commensurate with the capacity of the path leading to it from each sender. Several...