skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Fully cognitive transceiver for High Frequency (HF) applications
Ionospheric conditions are variable in nature and can cause destructive interference to transmissions made in the High Frequency (HF) band, which ranges from 3-30 MHz. This poses a problem as the HF band is a critical fre- quency range for various applications (i.e. emergency, military). To manage these dynamic conditions, intelligent techniques should be implemented at the transmitter and receiver to properly maintain reliable communications. In this paper, we present work deriving components of a cognitive HF transceiver with agents called cognitive engines (CEs) operating at the transmitter and receiver. At the transmitter, cognition is employed to determine the combination of modulation and coding techniques that maximize throughput. At the receiver, cognition is implemented to derive the best parameters for equalization (i.e. tap length, step size, filter type, etc.) Results are presented showing that the individual components are able to satisfy their objectives. A discussion is also provided surveying recent research efforts pertaining to the development of cognitive methods for the Automatic Link Establishment (ALE) protocol, a common networking methodology for HF stations.  more » « less
Award ID(s):
1822071
PAR ID:
10188926
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
SPIE
Volume:
11015
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract We demonstrate that the key components of cognitive architectures (declarative and procedural memory) and their key capabilities (learning, memory retrieval, probability judgment, and utility estimation) can be implemented as algebraic operations on vectors and tensors in a high‐dimensional space using a distributional semantics model. High‐dimensional vector spaces underlie the success of modern machine learning techniques based on deep learning. However, while neural networks have an impressive ability to process data to find patterns, they do not typically model high‐level cognition, and it is often unclear how they work. Symbolic cognitive architectures can capture the complexities of high‐level cognition and provide human‐readable, explainable models, but scale poorly to naturalistic, non‐symbolic, or big data. Vector‐symbolic architectures, where symbols are represented as vectors, bridge the gap between the two approaches. We posit that cognitive architectures, if implemented in a vector‐space model, represent a useful, explanatory model of the internal representations of otherwise opaque neural architectures. Our proposed model, Holographic Declarative Memory (HDM), is a vector‐space model based on distributional semantics. HDM accounts for primacy and recency effects in free recall, the fan effect in recognition, probability judgments, and human performance on an iterated decision task. HDM provides a flexible, scalable alternative to symbolic cognitive architectures at a level of description that bridges symbolic, quantum, and neural models of cognition. 
    more » « less
  2. Abstract In this work, we analyze data collected by an HF transmitter/receiver radio link, operating as an oblique ionosonde between the McMurdo Station (transmitter) and South Pole Station (receiver) at 4.1, 5.1, 6.0, 6.4, and 7.2 MHz between 28 February and 14 March 2019. To help contextualize the link's data we have performed numerical raytrace simulations to help understand the observations. By considering both the data and simulations, we have identified both single‐ and two‐hop E‐ and F‐region propagation modes in the data, where the multi‐hop modes were observed in the hours around sunrise and sunset in the 4.1 and 5.1 MHz channels. This is an unexpected result given the accepted wisdom that multi‐hop modes, which require a ground scatter component, cannot be supported in Antarctica because of the highly absorptive ice covering much of the continent. Our results show that multi‐hop propagation modes can be supported in the region under specific ionospheric conditions—around sunrise and sunset—if the mode's ground scatter component is collocated with the Transantarctic Mountains. The mountains are located along the great‐circle path between the link's transmitter and receiver. However, the combination of favorable ionospheric and ground scattering conditions makes the detection of the multi‐hop mode a rare occurrence in the data set analyzed here. These findings are critical to data analysis efforts of any current or future oblique ionosonde systems operating in Antarctica and other regions such as the Arctic. 
    more » « less
  3. Social interactions are mediated by recognition systems, meaning that the cognitive abilities or phenotypic diversity that facilitate recognition may be common targets of social selection. Recognition occurs when a receiver compares the phenotypes produced by a sender with a template. Coevolution between sender and receiver traits has been empirically reported in multiple species and sensory modalities, though the dynamics and relative exaggeration of traits from senders versus receivers have received little attention. Here, we present a coevolutionary dynamic model that examines the conditions under which senders and receivers should invest effort in facilitating individual recognition. The model predicts coevolution of sender and receiver traits, with the equilibrium investment dependent on the relative costs of signal production versus cognition. In order for recognition to evolve, initial sender and receiver trait values must be above a threshold, suggesting that recognition requires some degree of pre-existing diversity and cognitive abilities. The analysis of selection gradients demonstrates that the strength of selection on sender signals and receiver cognition is strongest when the trait values are furthest from the optima. The model provides new insights into the expected strength and dynamics of selection during the origin and elaboration of individual recognition, an important feature of social cognition in many taxa. This article is part of the theme issue ‘Signal detection theory in recognition systems: from evolving models to experimental tests’. 
    more » « less
  4. Classical beamforming techniques rely on highly linear transmitters and receivers to allow phase-coherent combining at the transmitter and receiver. The transmitter uses eamforming to steer signal power towards the receiver, and the receiver uses beamforming to gather and coherently combine the signals from multiple receiver antennas. When the transmitters and receivers are instead constrained for power and cost reasons to be nonlinear one-bit devices, the potential advantages and performance metrics associated with beamforming are not as well understood. We define beamforming at the transmitter as a codebook design problem to maximize the minimum distance between codewords. We define beamforming at the receiver as the maximum likelihood detector of the transmitted codeword. We show that beamforming with one-bit transceivers is a constellation design problem, and that we can come within a few dB SNR of the capacity attained by linear transceivers. 
    more » « less
  5. Due to the open nature of wireless medium, wireless communications are especially vulnerable to eavesdropping attacks. This paper designs a new wireless communication system to deal with eavesdropping attacks. The proposed system can enable a legitimate receiver to get desired messages and meanwhile an eavesdropper to hear ``fake" but meaningful messages by combining confidentiality and deception, thereby confusing the eavesdropper and achieving additional concealment that further protects exchanged messages. Towards this goal, we propose techniques that can conceal exchanged messages by utilizing wireless channel characteristics between the transmitter and the receiver, as well as techniques that can attract an eavesdropper to gradually approach a trap region, where the eavesdropper can get fake messages. We also provide both theoretical and empirical analysis of the established secure channel between the transmitter and the receiver. We develop a prototype system using Universal Software Defined Radio Peripherals (USRPs)Experimental results show that an eavesdropper at a trap location can receive fake information with a bit error rate (BER) close to 0, and the transmitter with multiple antennas can successfully deploy a trap area. 
    more » « less