نتایج جستجو برای: jamming
تعداد نتایج: 3897 فیلتر نتایج به سال:
A jammed packing of frictionless spheres at zero temperature is perfectly specified by the network of contact forces from which mechanical properties can be derived. However, we can alternatively consider a packing as a geometric structure, characterized by a Voronoi tessellation which encodes the local environment around each particle. We find that this local environment characterizes systems ...
Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized approach, in which decentralization strategy red...
The rheology near jamming of a suspension of soft colloidal spheres is studied using a custom microfluidic rheometer that provides the stress versus strain rate over many decades. We find non-Newtonian behavior below the jamming concentration and yield-stress behavior above it. The data may be collapsed onto two branches with critical scaling exponents that agree with expectations based on Hert...
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...
ABSTRACT 2. JAMMING SIGNAL MODEL This paper considers the problem of detecting and classifying a radar target against jamming signals emitted by electronic countermeasure (ECM) systems. The detectionclassification algorithm proposed here exploits the presence in the jamming spectrum of spurious terms due to phase quantization performed by the radio frequency digital memory (DRFM) device. A puls...
Generative music systems can be played by musicians who manipulate the values of algorithmic parameters, and their datacentric nature provides an opportunity for coordinated interaction amongst a group of systems linked over IP networks; a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical ...
Echolocation is a powerful active sensory system, but it is susceptibility to jamming. Jamming occurs when calls of similar frequency, time, and amplitude coincide resulting in misperceptions of the surroundings. One strategy for avoiding jamming found in bats is to lower the emission rate of echolocation calls and follow a neighbor. However, bats are known to move in large groups that do not h...
19. ABSTRACT (Continue on reverse if necessary and identify by block number) Several block and convolutional coding options are considered which are applicable to the noncoherent detection of FH/MFSK signals in the presence of tone jamming. The tone jamming model used in this report is the worst-cast tone jamming for an uncoded system. Using decoded probability of bit error as a performance cri...
The use of distinct, dedicated communication channels to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. We map the problem of providing resilien...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید