Showing 21 - 40 results of 347 for search '"The Jam"', query time: 0.05s Refine Results
  1. 21

    Interrupted Sampling Repeater Jamming Recognition Method Based on Wavelet Packet Transform by Zhong Qi, Fan Shoutao, He Zhiyi, Liu Jianxin

    Published 2025-01-01
    Subjects: “…Interrupted sampling repeater jamming (ISRJ)…”
    Get full text
    Article
  2. 22

    Paisagem Virtual e os Green Game Jam no Enfrentamento à Crise Ambiental by Rubian Diego Andrade, Elisangela Gisele do Carmo, Juliana de Paula Figueiredo, Amanda Mayara do Nascimento-Cardoso, Nara Heloisa Rodrigues, Dimitri Wo Pereira, Viviane Kawano Dias, Gisele Maria Schwartz

    Published 2025-02-01
    “…Esse estudo objetivou analisar as estratégias adotadas nos 10 videogames premiados no Green Game Jam 2023, como coadjuvantes no enfrentamento aos desafios ambientais. …”
    Get full text
    Article
  3. 23
  4. 24

    An Innovative Architecture of UTC GPS/INS System with Improved Performance under Severe Jamming by Xueyun Wang, Jingjuan Zhang, Wei Wang, Pengyu Gao

    Published 2014-01-01
    “…However the performance of UTC GPS/INS system will be degraded by severe jamming interference, especially when low-grade inertial measurement unit (IMU) is used. …”
    Get full text
    Article
  5. 25

    Polarity-JaM: an image analysis toolbox for cell polarity, junction and morphology quantification by Wolfgang Giese, Jan Philipp Albrecht, Olya Oppenheim, Emir Bora Akmeriç, Julia Kraxner, Deborah Schmidt, Kyle Harrington, Holger Gerhardt

    Published 2025-02-01
    “…Here we present Polarity-JaM, an open source package for reproducible exploratory image analysis that provides versatile methods for single cell segmentation, feature extraction and statistical analysis. …”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. …”
    Get full text
    Article
  13. 33

    Fixing Device for a Planar Object by Incorporating Jamming Transition Phenomenon and a Suction Unit by Akira Bekku, Yoshikazu Nakajima

    Published 2015-01-01
    “…To overcome this problem, we proposed a deformable device that works as a universal suction pad and that can hold an ungraspable target by utilizing the jamming transition phenomenon. We determined the effect of the type of grains on the jamming transition phenomenon in terms of stability under jammed conditions. …”
    Get full text
    Article
  14. 34
  15. 35

    ANTi-JAM solutions for smart roads: Ant-inspired traffic flow rules under CAVs environment by Marco Guerrieri, Nicola Pugno

    Published 2025-01-01
    “…The results show that ants adopt specific traffic strategies (platoon formation, quasi-constant speed and no overtaking maneuvers) that help avoid jam phenomena, even at high density. Emerging technologies, including smart roads, communication systems, and Cooperative and Automated Vehicles (CAVs), allow us to speculate on the use of traffic control systems inspired by ant behaviour to avoid the risk of congestion even at high traffic volumes, as demonstrated by the preliminary results of this research.…”
    Get full text
    Article
  16. 36
  17. 37

    A Robust Method to Suppress Jamming for GNSS Array Antenna Based on Reconstruction of Sample Covariance Matrix by Yanyun Gong, Ling Wang, Rugui Yao, Zhaolin Zhang

    Published 2017-01-01
    “…No nulling is formed while suppressing the main-lobe jamming, which avoids main-lobe direction distortion. …”
    Get full text
    Article
  18. 38

    LPI‐based cooperative tactic for satellite communication uplink signal accompanied by directed and power limited jamming by Fei Wang, Xiaoyan Huang, Yiyuan Chen, Chenguang Shi, Jun Chen

    Published 2022-02-01
    “…Aiming at this problem, the second tactic is to mask LPI SCUS with directed and power limited jamming. The purpose of using directed and power limited jamming is to reduce direction‐finding accuracy of the eavesdropper, and to achieve the optimal LPI performance with the minimum radiation energy. …”
    Get full text
    Article
  19. 39

    A Method against Interrupted-Sampling Repeater Jamming Based on Energy Function Detection and Band-Pass Filtering by Hui Yuan, Chun-yang Wang, Xin Li, Lei An

    Published 2017-01-01
    “…Interrupted-sampling repeater jamming (ISRJ) is a new kind of coherent jamming to the large time-bandwidth linear frequency modulation (LFM) signal. …”
    Get full text
    Article
  20. 40