This Volume 1 of 5 of the conference proceedings contains 231 papers. Topics discussed include digital signal processing, adaptive filtering, multimedia over internet protocol and over wireless networks, VLSI arithmet...
详细信息
This Volume 1 of 5 of the conference proceedings contains 231 papers. Topics discussed include digital signal processing, adaptive filtering, multimedia over internet protocol and over wireless networks, VLSI arithmetic architectures, system level issues, digital to analog conversion, radio frequency mixers, analog testability, interconnect modeling and optimization, multiple antenna systems, cellular neural networks, stability and control, wireless communicationarchitectures, system design, transconductance and low voltage amplifiers, physical design, multimedia communication and transmission, bifurcation and chaos, FIR filter design and implementation, low power VLSI systems, analog to digital conversion, radio frequency filter systems, filter theory and linear networks, analog modeling, testing, communication theory, `nonlinear circuit analysis methods, microelectromechanical devices, hardware implementation for multimedia, image compression, multidimensional signal processing, filter banks, channel coding architecture and pipelined analog to digital conversion.
The US Army's Future Combat systems (FCS) and Objective Force will rely heavily on the use of unattended sensor net-works to detect, locate and identify enemy targets in order to survive with less armor protection...
详细信息
ISBN:
(纸本)0819444936
The US Army's Future Combat systems (FCS) and Objective Force will rely heavily on the use of unattended sensor net-works to detect, locate and identify enemy targets in order to survive with less armor protection on the future battlefield. Successful implementation of these critical communication net-works will require the collection of the sensor data, processing and collating it with available intelligence, then transporting it in a format conducive to make quick and accurate command decisions based on the latest tactical situational awareness. The networked communications must support both static deployed and mobile ground and air robotic sensors with secure, stealthy, andjam resistant links for sensor fusion and command and control. It is envisioned for broadest application that sensor networks can be deployed in a two-tiered architecture. The architecture includes a lower sensor sub-layer consisting of mixes of acoustic, magnetic and seismic detectors and an upper sub-layer consisting of infrared or visual imagers. The upper sub-layer can be cued by the lower sub-layer and provides a gateway link to the higher echelon tactical maneuver layer networks such as the Tactical Internet. The sensor deployments, networking constraints and reach back distances to Command and control (C2) nodes will be mission scenario specific, however, the architecture will also apply to tactical unattended sensor, munition and robotic applications. Technologies from the Army Research Laboratory, Defense Advance Research Projects Agency (DARPA), and commercial will be leveraged for this effort.
Almost all business processes among enterprise activities use information technology (IT) systems. These days several applications are integrated to implement more useful services. In addition, IT systems and networks...
详细信息
ISBN:
(纸本)1864671149
Almost all business processes among enterprise activities use information technology (IT) systems. These days several applications are integrated to implement more useful services. In addition, IT systems and networks are becoming larger and more complex in order to satisfy severe business requirements. The performance of a business process is largely dependent on the IT system performance. Therefore, the performance design and management of the IT system are becoming more important issues. They must be viewed from an application perspective, and application transactions need to be tracked end-to-end through the entire infrastructure including client nodes, protocols, network configurations, server architectures, and other components. In this paper, I introduce the performance design approach concept called ITAP (IT System architecture Planning) approach by integrating and leveraging Business Process Modeling, Application Traffic Profiling, and network Simulation, Benchmarking. As a case study, I evaluated the performance of three application-level communication protocols: fan-out, pipeline, and ordered synchronous request/response communication protocols, using the ITAP approach. Given the activity diagrams that represent the ways for the initiating process running on the broker server to receive the sub application services running on the remote servers, I developed simulation modules that represent the dynamics of these application-level communication protocols and performed simulation experiments.
The traditional model of mission operations is centralized with all activities taking place at a single location. The Multi-mission Encrypted communication System (MECS) is a tool for enabling distributed operations w...
详细信息
There is considerable interest in developing small satellites for quick-turnaround missions to investigate near-earth phenomena from space. In this paper we investigate medium access control (MAC) issues related to th...
详细信息
The nationwide AT&T Intelligent opticalnetwork is being deployed with the new intelligent network elements to create a network with reduced capital cost, simplified operations, improved performance and reliabilit...
详细信息
ISBN:
(纸本)1557527008
The nationwide AT&T Intelligent opticalnetwork is being deployed with the new intelligent network elements to create a network with reduced capital cost, simplified operations, improved performance and reliability, with the ability to quickly support new services. The mesh architecture and the new control plane are keys to making this network a reality.
The OBLSR protection architecture using the ONPE was introduced into the IP network. The all-optical protection effectively achieved a faster protection of IP packets than OSPF-based IP layer protection. We demonstrat...
详细信息
ISBN:
(纸本)1557527008
The OBLSR protection architecture using the ONPE was introduced into the IP network. The all-optical protection effectively achieved a faster protection of IP packets than OSPF-based IP layer protection. We demonstrated the protection time for IP layer to be less than 21 milliseconds in a 500 km bi-directional ring network by using the OBLSR protection and the proper guard time of IP routers.
We have proposed and described an all-optical circuit for the control of traffic congestion in a system with self-routing cells/packets. The operation of the circuit was successfully demonstrated by an experiment. We ...
详细信息
ISBN:
(纸本)1557527008
We have proposed and described an all-optical circuit for the control of traffic congestion in a system with self-routing cells/packets. The operation of the circuit was successfully demonstrated by an experiment. We are sure that this scheme provides a useful step towards the realization of an all-optical ultra-fast transmission system.
Power systems can become vulnerable in the face of possible power system abnormalities. To maintain system reliability becomes a serious concern for the future. The SPID project was launched by EPRI/DoD to understand ...
详细信息
ISBN:
(纸本)0780373227
Power systems can become vulnerable in the face of possible power system abnormalities. To maintain system reliability becomes a serious concern for the future. The SPID project was launched by EPRI/DoD to understand the origin and nature of catastrophic failures and to develop defense strategies and technologies that will significantly reduce the vulnerability of the power system infrastructure. The approach is characterized by the extensive use of network and real time information from diverse sources, coupled with the development of an evolving dynamic decision event tree. This paper examines the communicationissues for the SPID system including information transmission network design and data exchange architecture design. A communication infrastructure design for the SPID system is also proposed. Rather than specifying the detailed network design, the paper provides an overview of the architectureissues.
A packet pre-classification MAC (media access control) protocol based on carrier sense multiple access with collision avoidance (CSMA/CA) scheme has been investigated for supporting IP packet over the all-optical WDM ...
详细信息
ISBN:
(纸本)0780375106
A packet pre-classification MAC (media access control) protocol based on carrier sense multiple access with collision avoidance (CSMA/CA) scheme has been investigated for supporting IP packet over the all-optical WDM ring networks. The intention of the protocol is to increase throughput of IP over opticalnetworks in metropolitan area network (MAN). This protocol avoids both packet collision and packet fragmentation. In order to improve the utilization of network, the packets transmitted from local area network (LAN) are pre-classified into various class queues of access point (AP) according their length. Simulations had been done to evaluate the performance of the protocol, and the simulation results show extraordinarily good network efficiency.
暂无评论