نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
We answer the questions raised by Donev, Torquato, Stillinger, and Connelly (DTSC) in their preceding Comment on “Jamming at zero temperature and zero applied stress: The epitome of disorder” [Phys. Rev. E 70, 043301 (2004)] We emphasize that we follow a fundamentally different approach than they have done to reinterpret random close packing in terms of the “maximally random jammed” framework. ...
In this lecture we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously. The signal is obtained by starting with a narrowband signal and directly modulating a high bandwidth signal. As with frequency hopping direct-sequence has advantages when the channel contains a jamming like signal. The jamming could ...
Jamming attack in wireless networks is a severe problem and is easily accomplished by emitting a continuous radio signal. Although the perfect solution to avoid jamming attack does not exist due to the nature of the wireless shared medium, a channel-hopping scheme is considered one of the most effective ways to mitigate jamming attacks. In this paper, I consider various channel-hopping schemes ...
This letter proposes a novel UAV-enabled mobile jamming scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is employed to transmit jamming signals to combat against eavesdropping. Such a mobile jamming scheme is particularly appealing since the UAV-enabled jammer can fly close to the eavesdropper and opportunistically jam it by leveraging the UAV’s mobility. We ai...
A jammed packing of frictionless spheres at zero temperature is perfectly specified by the network of contact forces from which mechanical properties can be derived. However, we can alternatively consider a packing as a geometric structure, characterized by a Voronoi tessellation which encodes the local environment around each particle. We find that this local environment characterizes systems ...
Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized approach, in which decentralization strategy red...
The rheology near jamming of a suspension of soft colloidal spheres is studied using a custom microfluidic rheometer that provides the stress versus strain rate over many decades. We find non-Newtonian behavior below the jamming concentration and yield-stress behavior above it. The data may be collapsed onto two branches with critical scaling exponents that agree with expectations based on Hert...
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...
ABSTRACT 2. JAMMING SIGNAL MODEL This paper considers the problem of detecting and classifying a radar target against jamming signals emitted by electronic countermeasure (ECM) systems. The detectionclassification algorithm proposed here exploits the presence in the jamming spectrum of spurious terms due to phase quantization performed by the radio frequency digital memory (DRFM) device. A puls...
Generative music systems can be played by musicians who manipulate the values of algorithmic parameters, and their datacentric nature provides an opportunity for coordinated interaction amongst a group of systems linked over IP networks; a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید