نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
An adaptive serial search pseudonoise (PN) code acquisition scheme is proposed, in which the detection threshold is scaled by the instantaneous received power measured prior to PN code correlation. We observe that the proposed scheme achieves significantly improved mean acquisition times compared to the conventional nonadaptive schemes under Rayleigh fading and pulsed Gaussian noise jamming. Fu...
While frictionless spheres at jamming are isostatic, frictional spheres at jamming are not. As a result, frictional spheres near jamming do not necessarily exhibit an excess of soft modes. However, a generalized form of isostaticity can be introduced if fully mobilized contacts at the Coulomb friction threshold are considered as slipping contacts. We show here that, in this framework, the vibra...
While frictionless spheres at jamming are isostatic, frictional spheres at jamming are not. As a result, frictional spheres near jamming do not necessarily exhibit an excess of soft modes. However, a generalized form of isostaticity can be introduced if fully mobilized contacts at the Coulomb friction threshold are considered as slipping contacts. We show here that, in this framework, the vibra...
Despite the antenna’s privileged position as the first line of defense against interferers, jammers and spoofers, most detection and mitigation techniques are realized in the receiver’s backend signal processing blocks. Nonetheless, these solutions often require considerable additional hardware added to the receiver’s frontend and antenna design. For example, multi-antenna arrays replace a sing...
Signal evolution in social animals has produced a wide variety of communal displays, many of them remarkable feats of complex coordination. The two main explanations for this temporal precision are: (1) it evolves as a cooperative signal of coalition quality or (2) it minimizes signal jamming (i.e., interference of one signal by another). However, support for the first hypothesis is inconclusiv...
We numerically study the jamming transition of frictionless polydisperse spheres in three dimensions. We use an efficient thermalisation algorithm for the equilibrium hard sphere fluid and generate amorphous jammed packings over a range of critical jamming densities that is about three times broader than in previous studies. This allows us to reexamine a wide range of structural properties char...
Wireless Sensor Network (WSN) is an emerging technology for various applications public sector, private sector and military. It formed by a large number of networked sensing nodes. It contains of many sensor devices to cooperatively monitor selected target locations and communicate with base stations. Due to the different requirements of large-scale and realtime data processing in WSNs, provide...
Defense against denial of service (DoS) attacks is a critical component of any security system as these attacks can affect the availability of a node or an entire network. In this work, we focus on jamming type DoS attacks at the physical and MAC layers in 802.11 based ad hoc networks. Collisions in wireless networks occur due to varying factors such as jamming attacks, hidden terminal interfer...
By using smart radio devices, a jammer can dynamically change its jamming policy based on opposing security mechanisms; it can even induce the mobile device to enter a specific communication mode and then launch the jamming policy accordingly. On the other hand, mobile devices can exploit spread spectrum and user mobility to address both jamming and interference. In this paper, a two-dimensiona...
With the increasing volume of wireless traffic that military operations require, the likelihood of transmissions interfering with each other is steadily growing to the point that new techniques need to be employed. Furthermore, to combat remotely operated improvised explosive devices, many ground convoys transmit high-power broadband jamming signals, which block both hostile as well as friendly...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید