نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
We expose a relationship between jamming and a generalization of Tutte’s barycentric embedding. This provides a basis for the systematic treatment of jamming and maximal packing problems on two-dimensional surfaces.
We investigate universal features of the jamming transition in granular materials, colloids and glasses. We show that the jamming transition in these systems has common features: slowing of response to external perturbation, and the onset of structural heterogeneities.
In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model dif...
Submitted for the MAR10 Meeting of The American Physical Society Jamming in Granular Polymers and Frictional Granular Assemblies LENA LOPATINA, Kent State University, CHARLES REICHHARDT, CYNTHIA REICHHARDT, Los alamos National Laboratory — Jamming has attracted growing attention as a possible unifying theme for granular materials, glasses and threshold behaviour in materials. Recent results for...
When searching for prey, big brown bats (Eptesicus fuscus) enhance the range of their sonar by concentrating more energy in the nearly constant-frequency (CF) tail portion of their frequency-modulated (FM) sweeps. We hypothesize that this portion of their signals may be vulnerable to interference from conspecifics using the same frequencies in their own emissions. To determine how bats modify t...
Existing supervisory schemes which can be used for detecting jamming attacks in all-optical networks are mostly based on average power detection and the use of pilot signals. We point out that these methods are not adequate to handle all types of jamming attacks. Based on a newly designed attack detection device at a network node, a novel attack detection scheme against jamming attacks is propo...
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...
A known jamming state information (JSI) scheme for a coded frequency-hopped M-ary frequency-shift-keying (FH/MFSK) system under partial-band noise jamming, plus additive white Gaussian noise, utilizes the maximum a posteriori (MAP) rule based on the total energy received in the M-tone signaling bands. It is assumed that the knowledge of partial-band noise jamming fraction is available to the JS...
The jamming transition of particles with finite-range interactions is characterized by a variety of critical phenomena, including power-law distributions of marginal contacts. We numerically study a recently proposed simple model of jamming, which is conjectured to lie in the same universality class as the jamming of spheres in all dimensions. We extract numerical estimates of the critical expo...
We study jamming in model freely rotating polymers as a function of chain length N and bond angle θ_{0}. The volume fraction at jamming ϕ_{J}(θ_{0}) is minimal for rigid-rodlike chains (θ_{0}=0), and increases monotonically with increasing θ_{0}≤π/2. In contrast to flexible polymers, marginally jammed states of freely rotating polymers are highly hypostatic, even when bond and angle constraints...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید