نتایج جستجو برای: jamming

تعداد نتایج: 3897  

2012
CHARLES REICHHARDT CYNTHIA REICHHARDT

Submitted for the MAR10 Meeting of The American Physical Society Jamming in Granular Polymers and Frictional Granular Assemblies LENA LOPATINA, Kent State University, CHARLES REICHHARDT, CYNTHIA REICHHARDT, Los alamos National Laboratory — Jamming has attracted growing attention as a possible unifying theme for granular materials, glasses and threshold behaviour in materials. Recent results for...

Journal: :The Journal of experimental biology 2008
Mary E Bates Sarah A Stamper James A Simmons

When searching for prey, big brown bats (Eptesicus fuscus) enhance the range of their sonar by concentrating more energy in the nearly constant-frequency (CF) tail portion of their frequency-modulated (FM) sweeps. We hypothesize that this portion of their signals may be vulnerable to interference from conspecifics using the same frequencies in their own emissions. To determine how bats modify t...

1998
Poompat Saengudomlert Muriel Médard Arthur C. Smith

Existing supervisory schemes which can be used for detecting jamming attacks in all-optical networks are mostly based on average power detection and the use of pilot signals. We point out that these methods are not adequate to handle all types of jamming attacks. Based on a newly designed attack detection device at a network node, a novel attack detection scheme against jamming attacks is propo...

2013
Ashish Kumar Sachin Kumar Gupta Shubham Singh

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...

Journal: :IEEE transactions on neural networks 1994
Hyuck M. Kwon Lawrence T. Schaefer

A known jamming state information (JSI) scheme for a coded frequency-hopped M-ary frequency-shift-keying (FH/MFSK) system under partial-band noise jamming, plus additive white Gaussian noise, utilizes the maximum a posteriori (MAP) rule based on the total energy received in the M-tone signaling bands. It is assumed that the knowledge of partial-band noise jamming fraction is available to the JS...

2013
Roberto Di Pietro Gabriele Oligeri

Jamming techniques require just moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this paper we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this ...

Journal: :Physical review. E 2016
Yoav Kallus

The jamming transition of particles with finite-range interactions is characterized by a variety of critical phenomena, including power-law distributions of marginal contacts. We numerically study a recently proposed simple model of jamming, which is conjectured to lie in the same universality class as the jamming of spheres in all dimensions. We extract numerical estimates of the critical expo...

Journal: :Physical review letters 2017
Robert S Hoy

We study jamming in model freely rotating polymers as a function of chain length N and bond angle θ_{0}. The volume fraction at jamming ϕ_{J}(θ_{0}) is minimal for rigid-rodlike chains (θ_{0}=0), and increases monotonically with increasing θ_{0}≤π/2. In contrast to flexible polymers, marginally jammed states of freely rotating polymers are highly hypostatic, even when bond and angle constraints...

2015
Hui Sun Rui Wang Yanxiao Zhao

Dynamic Spectrum Access (DSA) network is envisioned as a promising candidate to significantly improve the spectrum utilization. Due to its specific features of the DSA, however, this network is more vulnerable to security attacks than the traditional wireless networks. And channel jamming is a one of main threats to DSA networks. So far, limited works have been done in mathematical and formal m...

Journal: :Perform. Eval. 2014
Cankut Orakcal David Starobinski

We introduce a theoretical framework to formally analyze the vulnerability of IEEE 802.11 rate adaptation algorithms (RAAs) to selective jamming attacks, and to develop countermeasures providing provable performance guarantees. Thus, we propose a new metric called Rate of Jamming (RoJ), wherein a low RoJ implies that an RAA is highly vulnerable to jamming attacks, while a high RoJ implies that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید