Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John M. Shea is active.

Publication


Featured researches published by John M. Shea.


IEEE Journal on Selected Areas in Communications | 1999

Nonuniform phase-shift-key modulation for multimedia multicast transmission in mobile wireless networks

Michael B. Pursley; John M. Shea

It is a common requirement in a mobile wireless communication network that a radio must be capable of simultaneously transmitting a message to two or more neighbors in the network. Some of the intended recipients may be more capable than others in the sense that their communication links from the transmitter have less interference, fading, or attenuation. Because it is desirable that a multicast or broadcast transmission be received successfully by all radios for which it is intended, the usual approach is to limit the transmission rate to that which can be demodulated by the least capable among these radios. Nonuniform nonbinary phase-shift-key (PSK) signal constellations can be designed to increase the throughput of multicast transmissions by delivering additional information to more-capable receivers along with the multicast message. This additional throughput can be employed to transmit multimedia messages (e.g., voice and data) to the more-capable receivers. In this paper, we determine the error probabilities for coherent demodulation of nonuniform PSK signals and noncoherent demodulation of nonuniform differential PSK signals. Because the PSK constellations have a constant envelope, they are better for use in mobile wireless communication networks than the constellations based on quadrature-amplitude modulation that have been proposed in previous publications.


IEEE Journal on Selected Areas in Communications | 2000

Adaptive nonuniform phase-shift-key modulation for multimedia traffic in wireless networks

Michael B. Pursley; John M. Shea

The characteristics of mobile wireless communication channels fluctuate for many reasons, including movement of the radios, changes in path attenuation, and variations in interference. Several adaptive signaling techniques have been proposed for use in wideband code-division multiple-access (CDMA) systems including adaptive data rates, adaptive spreading code rates, discontinuous transmission, and multicode CDMA. We introduce adaptive signaling techniques that use nonuniform phase-shift-key (PSK) modulation. These techniques have several advantages for use in CDMA communications, and they support multimedia transmission by simultaneously delivering different types of traffic, each with its own required quality of service. The signaling methods that we propose deliver a basic message at a specified error rate and simultaneously deliver an additional message by exploiting any extra capability that is available. We show that by adapting the location of the points in a PSK constellation, the throughput can be maximized for the additional message while maintaining an acceptable error rate for the basic message. Responses to larger changes in channel quality are accomplished by adapting the PSK constellation size, signaling rate, and error-correcting code. Examples of adaptive signaling schemes that employ nonuniform PSK constellations are presented, including an application to a cellular CDMA system.


Proceedings of the ACM 2nd international workshop on Video surveillance & sensor networks | 2004

Airborne traffic surveillance systems: video surveillance of highway traffic

Suman Srinivasan; Haniph A. Latchman; John M. Shea; Tan F. Wong; Janice McNair

Timely information about highway traffic conditions is very important for the Department of Transportation (DOT) and other relevant agencies. Such live information would be very important when traffic incidents or accidents occur. An aerial view is the best for traffic situations, particularly over highways. Unmanned aircraft equipped with video cameras and/or other sensors may be able to deliver the necessary information through video images with relatively low operational costs and risks to human life. ATSS (Airborne Traffic Surveillance System), a project funded by the Florida Department of Transportation, attempts to make this vision a reality. This paper describes how the University of Florida research team implemented a system for ATSS from the ground up, using unmanned aerial vehicles, digital video encoding, and transmission of data and multimedia video streams over FDOTs microwave IP networks.


IEEE Transactions on Automatic Control | 2012

Network Connectivity Preserving Formation Stabilization and Obstacle Avoidance via a Decentralized Controller

Zhen Kan; Ashwin P. Dani; John M. Shea; Warren E. Dixon

A decentralized control method is developed to enable a group of agents to achieve a desired global configuration while maintaining global network connectivity and avoiding obstacles, using only local feedback and no radio communication between the agents for navigation. By modeling the interaction among the agents as a graph, and given a connected initial graph with a desired neighborhood between agents, the developed method ensures the desired communication links remain connected for all time. To guide the agents to a desired configuration while avoiding obstacles, a decentralized controller is developed based on the navigation function formalism. By proving that the proposed controller is a qualified navigation function, convergence to the desired formation is guaranteed.


IEEE Journal on Selected Areas in Communications | 1999

Multimedia multicast wireless communications with phase-shift-key modulation and convolutional coding

Michael B. Pursley; John M. Shea

Broadcast or multicast signaling can be employed in a wireless communication network to transmit a message to multiple neighbors simultaneously. The capabilities of the intended recipients may vary in the sense that the communication links to some neighbors may have less interference or attenuation than the links to others. We have previously proposed the use of nonuniform phase-shift key (PSK) signal constellations to allow a transmitter to deliver a basic message to each of the intended receivers and an additional message to the more-capable receivers. In this paper, convolutional coding and nonuniform PSK modulation are combined to provide greater efficiency and increased flexibility. The primary goal of multicast transmission, which is for each designated neighbor to have an acceptable probability of receiving the multicast message correctly, is achieved in a way that permits inclusion of multimedia messages for the more-capable receivers. Performance results and tradeoffs are presented for hard- and soft-decision decoding of convolutionally encoded coherent M-ary PSK multicast transmissions. Our results show that convolutional coding can be used with nonuniform PSK modulation to transmit additional information in mobile communication systems with little degradation to the basic information.


IEEE Transactions on Mobile Computing | 2004

Courtesy piggybacking: supporting differentiated services in multihop mobile ad hoc networks

Wei Liu; Xiang Chen; Yuguang Fang; John M. Shea

Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different quality of service (CoS) requirements in multihop mobile ad hoc networks. In the last few years, many channel-dependent mechanisms are proposed to address this issue based on the cross-layer design philosophy. However, a lot of problems remain before more efficient solutions are found. One of the problems is how to alleviate the conflict between throughput and fairness for different prioritized traffic, especially how to avoid the bandwidth starvation problem for low-priority traffic when the high-priority traffic load is very high. In this paper, we propose a novel scheme named Courtesy Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols.


IEEE Transactions on Mobile Computing | 2006

OMAR: Utilizing Multiuser Diversity in Wireless Ad Hoc Networks

Jianfeng Wang; Hongqiang Zhai; Yuguang Fang; John M. Shea; Dapeng Wu

One of the most promising approaches to improving communication efficiency in wireless communication systems is the use of multiuser diversity. Although it has been widely investigated and shown feasible and efficient in cellular networks, there is little work for the ad hoc networks, especially in real protocol and algorithm design. In this paper, we propose a novel scheme, namely, the opportunistic medium access and auto rate (OMAR), to efficiently utilize the shared medium in IEEE 802.11-based ad hoc networks by taking advantage of diversity, distributed scheduling, and adaptivity. In an ad hoc network, especially in a heterogeneous ad hoc network or a mesh network, some nodes may need to communicate with multiple one-hop nodes. We allow such a node with a certain number of links to function as a clusterhead to locally coordinate multiuser communications. We introduce a CDF-based (cumulative distribution function) K-ary opportunistic splitting algorithm and a distributed stochastic scheduling algorithm to resolve intra and intercluster collisions, respectively. Fairness is formulated and solved in terms of social optimality within and across clusters. Analytical and simulation results show that our scheme can significantly improve communication efficiency while providing social fairness


IEEE Transactions on Information Forensics and Security | 2011

Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

Chan Wong Wong; Tan F. Wong; John M. Shea

The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase-shift-keyed (BPSK) symbols, and symbol-by-symbol hard-decision quantization is applied to the received symbols of the destination. An error-free public channel is also available for the source and destination to exchange messages in order to help the secret-sharing process. The wiretapper can perfectly observe all messages in the public channel. It is shown that a secret-sharing scheme that employs a random ensemble of regular low-density parity-check (LDPC) codes can achieve the key capacity of the BPSK-constrained Gaussian wiretap channel asymptotically with increasing block length. To accommodate practical constraints of finite block length and limited decoding complexity, fixed irregular LDPC codes are also designed to replace the regular LDPC code ensemble in the proposed secret-sharing scheme.


IEEE Transactions on Mobile Computing | 2009

Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks

John M. Shea

In wireless ad hoc networks (WANets), multihop routing may result in a radio knowing the content of transmissions of nearby radios. This knowledge can be used to improve spatial reuse in the network, thereby enhancing network throughput. Consider two radios, Alice and Bob, that are neighbors in a WANet not employing spread-spectrum multiple access. Suppose that Alice transmits a packet to Bob for which Bob is not the final destination. Later, Bob forwards that packet on to the destination. Any transmission by Bob not intended for Alice usually causes interference that prevents Alice from receiving a packet from any of her neighbors. However, if Bob is transmitting a packet that he previously received from Alice, then Alice knows the content of the interfering packet, and this knowledge can allow Alice to receive a packet from one of her neighbors during Bobs transmission. In this paper, we develop overlapped transmission techniques based on this idea and analyze several factors affecting their performance. We then develop a MAC protocol based on the IEEE 802.11 standard to support overlapped transmission in a WANet. The resulting overlapped CSMA (OCSMA) protocol improves spatial reuse and end-to-end throughput in several scenarios.


international conference on communications | 2003

Reliability-based hybrid ARQ using convolutional codes

Abhinav Roongta; John M. Shea

Reliability-based hybrid ARQ (RB-HARQ) is a recently introduced approach to incremental-redundancy ARQ. In RB-HARQ, the bits that are to be retransmitted are adaptively selected at the receiver based on the estimated bit reliabilities. This technique has the potential to improve performance and minimize retransmission size by targeting those bits that are likely to be in error. However, previous versions of the RB-HARQ algorithm have resulted in large request (NACK) packets that made the technique appropriate only for systems that can tolerate large request packets on the feedback link. In this paper, we show that RB-HARQ is effective with convolutional codes, and we exploit the time-correlation properties of these codes to significantly reduce the size of the retransmission requests.

Collaboration


Dive into the John M. Shea's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhen Kan

University of Florida

View shared research outputs
Top Co-Authors

Avatar

Eduardo L. Pasiliao

Air Force Research Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xin Li

University of Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge