نتایج جستجو برای: jamming

تعداد نتایج: 3897  

Journal: :Soft matter 2016
Peter K Morse Eric I Corwin

A jammed packing of frictionless spheres at zero temperature is perfectly specified by the network of contact forces from which mechanical properties can be derived. However, we can alternatively consider a packing as a geometric structure, characterized by a Voronoi tessellation which encodes the local environment around each particle. We find that this local environment characterizes systems ...

Journal: :JACIC 2007
Mo Wei Genshe Chen Jose B. Cruz Leonard Haynes Khanh D. Pham Erik Blasch

Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized approach, in which decentralization strategy red...

Journal: :Physical review letters 2010
K N Nordstrom E Verneuil P E Arratia A Basu Z Zhang A G Yodh J P Gollub D J Durian

The rheology near jamming of a suspension of soft colloidal spheres is studied using a custom microfluidic rheometer that provides the stress versus strain rate over many decades. We find non-Newtonian behavior below the jamming concentration and yield-stress behavior above it. The data may be collapsed onto two branches with critical scaling exponents that agree with expectations based on Hert...

2010
Sudip Misra Ranjit Singh S. V. Rohith Mohan

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...

2006
Maria Greco Fulvio Gini Alfonso Farina Valentina Ravenni

ABSTRACT 2. JAMMING SIGNAL MODEL This paper considers the problem of detecting and classifying a radar target against jamming signals emitted by electronic countermeasure (ECM) systems. The detectionclassification algorithm proposed here exploits the presence in the jamming spectrum of spurious terms due to phase quantization performed by the radio frequency digital memory (DRFM) device. A puls...

2010
Andrew R. Brown

Generative music systems can be played by musicians who manipulate the values of algorithmic parameters, and their datacentric nature provides an opportunity for coordinated interaction amongst a group of systems linked over IP networks; a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical ...

2014
John G Whitehead Subhradeep Roy

Echolocation is a powerful active sensory system, but it is susceptibility to jamming. Jamming occurs when calls of similar frequency, time, and amplitude coincide resulting in misperceptions of the surroundings. One strategy for avoiding jamming found in bats is to lower the emission rate of echolocation calls and follow a neighbor. However, bats are known to move in large groups that do not h...

2015
P. J. Crepeau

19. ABSTRACT (Continue on reverse if necessary and identify by block number) Several block and convolutional coding options are considered which are applicable to the noncoherent detection of FH/MFSK signals in the presence of tone jamming. The tone jamming model used in this report is the worst-cast tone jamming for an uncoded system. Using decoded probability of bit error as a performance cri...

2007
Patrick Tague Mingyan Li Radha Poovendran

The use of distinct, dedicated communication channels to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. We map the problem of providing resilien...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید