The simplest model of jamming

نویسنده

  • Silvio Franz
چکیده

The packing fraction ρ of a collection of hard spheres in three dimension cannot exceed a maximum of about 0.74. In that limit, the spheres are arranged in a close-packed crystalline lattice (such as the HCP lattice). If, however, a loose collection of hard spheres is compactified, starting from some random initial condition, then the maximum packing fraction ρc that can be achieved by compaction is well below 0.74: the system jams during compaction before it can crystallize. In fact, ρc is always less than about 0.64, known as the random close packing limit. That does not mean that there are no arrangements of hard spheres with packing fractions in between 0.64 and 0.74. It is in fact straightforward to construct such arrangements [1]. What it does mean is that hard sphere assemblies with packing fraction between 0.74 and 0.64 are not accessible by compaction of randomly chosen sphere arrangements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor

Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...

متن کامل

A New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

AONT - Based Packet Hiding Method for Preventing Jamming Attacks

Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...

متن کامل

The jamming transition and the marginally jammed solid

When a system jams it undergoes a transition from a flowing to a rigid state. Despite this important change in the dynamics, the internal structure of the system remains disordered in the solid as well as the fluid phase. In this way jamming is very different from crystallization, the other common way in which a fluid solidifies. Jamming is a paradigm for thinking about how many different types...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015