Results 51 to 60 of about 334,773 (381)

Entropy of Jammed Matter [PDF]

open access: yesPhysical Review Letters, 2008
5 pages, 1 ...
Christopher Briscoe   +3 more
openaire   +4 more sources

Jamming Modulation: An Active Anti-Jamming Scheme

open access: yesIEEE Transactions on Wireless Communications, 2023
Providing quality communications under adversarial electronic attacks, e.g., broadband jamming attacks, is a challenging task. Unlike state-of-the-art approaches which treat jamming signals as destructive interference, this paper presents a novel active anti-jamming (AAJ) scheme for a jammed channel to enhance the communication quality between a ...
Jianhui Ma   +5 more
openaire   +3 more sources

Jamming Detection in Broadband Frequency Hopping Systems Based on Multi-Segment Signals Spectrum Clustering

open access: yesIEEE Access, 2021
Accurate jamming detection in the broadband frequency hopping (FH) systems plays a vital role in improving the anti-jamming performance of the communication systems.
Hao Xu, Yufan Cheng, Pengyu Wang
doaj   +1 more source

Smart Jamming Attacks in 5G New Radio: A Review [PDF]

open access: yesComputing and Communication Workshop and Conference, 2020
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for emergency services, natural disasters rescue, public safety, and military communications.
Youness Arjoune, S. Faruque
semanticscholar   +1 more source

Microrheology near jamming

open access: yesSoft Matter, 2023
We construct a theoretical framework of microrheology of jammed particles. We find that microrheology follows characteristic scaling laws near the jamming transition, which is equivalent to the ones in macrorheology.
Yusuke Hara   +2 more
openaire   +3 more sources

Jamming versus caging in three dimensional jamming percolation [PDF]

open access: yesJournal of Statistical Mechanics: Theory and Experiment, 2016
To appear in JSTAT special issue on structure in glassy and jammed ...
Nimrod Segall, Eial Teomy, Yair Shokef
openaire   +3 more sources

A Data Fusion Technique to Detect Wireless Network Virtual Jamming Attacks [PDF]

open access: yes, 2015
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Wireless communications are potentially exposed to jamming due to the openness of the medium and, in ...
Aparicio-Navarro, Francisco J.   +5 more
core   +3 more sources

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network

open access: yesIEEE Access, 2020
Flying Ad-hoc Network (FANET) is a decentralized communication system solely formed by Unmanned Aerial Vehicles (UAVs). In FANET, the UAV clients are vulnerable to various malicious attacks such as the jamming attack.
Nishat I. Mowla   +3 more
semanticscholar   +1 more source

Junctional Adhesion Molecules (JAMs): The JAM-Integrin Connection [PDF]

open access: yesCells, 2018
Junctional adhesion molecules (JAMs) are cell surface adhesion receptors of the immunoglobulin superfamily. JAMs are involved in a variety of biological processes both in the adult organism but also during development. These include processes such as inflammation, angiogenesis, hemostasis, or epithelial barrier formation, but also developmental ...
Daniel Kummer, Klaus Ebnet
openaire   +4 more sources

An Anti-Jamming Method against Interrupted Sampling Repeater Jamming Based on Compressed Sensing

open access: yesSensors, 2022
Interrupted sampling repeater jamming (ISRJ) is an attracted coherent jamming method to inverse synthetic aperture radar (ISAR) in the past decades. By means of different jamming parameters settings, realistic dense false targets can be formed around the
Yingxi Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy