نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

2004
Corey S. O’Hern Leonardo E. Silbert Andrea J. Liu Sidney R. Nagel

We answer the questions raised by Donev, Torquato, Stillinger, and Connelly (DTSC) in their preceding Comment on “Jamming at zero temperature and zero applied stress: The epitome of disorder” [Phys. Rev. E 70, 043301 (2004)] We emphasize that we follow a fundamentally different approach than they have done to reinterpret random close packing in terms of the “maximally random jammed” framework. ...

2004

In this lecture we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously. The signal is obtained by starting with a narrowband signal and directly modulating a high bandwidth signal. As with frequency hopping direct-sequence has advantages when the channel contains a jamming like signal. The jamming could ...

2014
Yongchul Kim

Jamming attack in wireless networks is a severe problem and is easily accomplished by emitting a continuous radio signal. Although the perfect solution to avoid jamming attack does not exist due to the nature of the wireless shared medium, a channel-hopping scheme is considered one of the most effective ways to mitigate jamming attacks. In this paper, I consider various channel-hopping schemes ...

Journal: :CoRR 2018
An Li Qingqing Wu Rui Zhang

This letter proposes a novel UAV-enabled mobile jamming scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is employed to transmit jamming signals to combat against eavesdropping. Such a mobile jamming scheme is particularly appealing since the UAV-enabled jammer can fly close to the eavesdropper and opportunistically jam it by leveraging the UAV’s mobility. We ai...

Journal: :Soft matter 2016
Peter K Morse Eric I Corwin

A jammed packing of frictionless spheres at zero temperature is perfectly specified by the network of contact forces from which mechanical properties can be derived. However, we can alternatively consider a packing as a geometric structure, characterized by a Voronoi tessellation which encodes the local environment around each particle. We find that this local environment characterizes systems ...

Journal: :JACIC 2007
Mo Wei Genshe Chen Jose B. Cruz Leonard Haynes Khanh D. Pham Erik Blasch

Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized approach, in which decentralization strategy red...

Journal: :Physical review letters 2010
K N Nordstrom E Verneuil P E Arratia A Basu Z Zhang A G Yodh J P Gollub D J Durian

The rheology near jamming of a suspension of soft colloidal spheres is studied using a custom microfluidic rheometer that provides the stress versus strain rate over many decades. We find non-Newtonian behavior below the jamming concentration and yield-stress behavior above it. The data may be collapsed onto two branches with critical scaling exponents that agree with expectations based on Hert...

2010
Sudip Misra Ranjit Singh S. V. Rohith Mohan

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as...

2006
Maria Greco Fulvio Gini Alfonso Farina Valentina Ravenni

ABSTRACT 2. JAMMING SIGNAL MODEL This paper considers the problem of detecting and classifying a radar target against jamming signals emitted by electronic countermeasure (ECM) systems. The detectionclassification algorithm proposed here exploits the presence in the jamming spectrum of spurious terms due to phase quantization performed by the radio frequency digital memory (DRFM) device. A puls...

2010
Andrew R. Brown

Generative music systems can be played by musicians who manipulate the values of algorithmic parameters, and their datacentric nature provides an opportunity for coordinated interaction amongst a group of systems linked over IP networks; a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید