Showing 401 - 420 results of 462 for search '"The Jam"', query time: 0.04s Refine Results
  1. 401

    Dynamic Analysis of Traffic State and Congestion Propagation on Bidirectional Grid Network by Shu-bin Li, Bai-bai Fu, Jian-feng Zheng

    Published 2013-01-01
    “…Many traffic problems in China such as traffic jams and air pollutions are mainly caused by the increasing traffic volume. …”
    Get full text
    Article
  2. 402

    Adaptive packet selection scheme and selective retransmission algorithm for Bluetooth by WANG Xue, QIAN Zhi-hong, LI Bing, LI Yue

    Published 2011-01-01
    “…To improve the anti-jamming capability and transmission efficiency of Bluetooth,the retransmission mecha-nism was worked out for baseband layer and L2CAP layer.In baseband layer,the adaptive packet selection strategy was presented,which utilized the times of retransmission to evaluate the channel quality.The packet that satisfied the biggest throughput of the current channel was chosen dynamically according to the times of retransmission.In L2CAP layer,in view of the shortcomings that data frames successfully received need to be transmitted once more,the selective retrans-mission algorithm was proposed,depending on the unique characteristic that Bluetooth could support a number of logical channels.The algorithm combines the retransmission mode and flow control mode,with no redundancy varieties of the protocol.Simulations and performance analysis indicate that system throughput and transmission efficiency get promoted with decrease of communication delay.It is easy to implement the algorithm.…”
    Get full text
    Article
  3. 403

    Designing Unimodular Waveform with Low Range Sidelobes and Stopband for Cognitive Radar via Relaxed Alternating Projection by Xiang Feng, Yang-chun Song, Zhi-quan Zhou, Yi-nan Zhao

    Published 2016-01-01
    “…Cognitive radar could adapt the spectrum of waveforms in response to information regarding the changing environment, so as to avoid narrowband interference or electronic jamming. Besides stopband constraints, low range sidelobes and unimodular property are also desired. …”
    Get full text
    Article
  4. 404

    A New Modified Three-Term Conjugate Gradient Method with Sufficient Descent Property and Its Global Convergence by Bakhtawar Baluch, Zabidin Salleh, Ahmad Alhawarat, U. A. M. Roslan

    Published 2017-01-01
    “…As the numerator of PRP plays a vital role in numerical result and not having the jamming issue, PRP method is not globally convergent. …”
    Get full text
    Article
  5. 405

    Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication by Guizhou Cao, Dawei Xia, Bokang Liu, Kai Meng, Zhenlong Wu, Yuan-Cheng Sun

    Published 2025-01-01
    “…The resilient control issue for the generation unit (GU) in a local power plant with unreliable communication is addressed in this article, where the communication may be jammed by denial-of-service (DoS) attacks. Based on the GU model of voltage and current at the point of common coupling, a demand-driven network communication protocol is proposed to decrease the number of scheduling signal transmissions, and an observer-based prediction method is provided to replenish the lack of dispatching data during transmission intervals when the demand has not changed. …”
    Get full text
    Article
  6. 406

    Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication by Zan LI, Junfan HU, Bing LI, Jia SHI, Jiangbo SI

    Published 2021-08-01
    “…In order to improve the security performance of low earth orbit (LEO) satellite downlink communication system, a cooperative UAV was employed to send jamming signals against the eavesdroppers.In particular, the downlink transmission was based on the orthogonal time frequency space (OTFS) technique to combat the severe Doppler effect caused by the high mobility of the LEO satellite.The closed form expression for the security outage probability (SOP) was derived at the legitimate receiver, where a novel moment matching approach was used for finding a summed probability distribution function (PDF) of the shadowed-Rician (SR) distributed terms.Simulation results prove that the SOP performance advantage of the downlink LEO satellite communication achieved by OTFS over OFDM scheme, and show the effectiveness of employing unmanned aerial vehicle (UAV) jammer in terms of enhancing secrecy transmission.…”
    Get full text
    Article
  7. 407

    Real-time predication and navigation on traffic congestion model with equilibrium Markov chain by Yan Zheng, Yanran Li, Chung-Ming Own, Zhaopeng Meng, Mengya Gao

    Published 2018-04-01
    “…In contrast to the traditional shortest path algorithms, focused on the static network, the first part of our guiding method considered the potential traffic jams and was developed to provide the optimal driving advice for the distinct periods of a day. …”
    Get full text
    Article
  8. 408

    A Spread Spectrum Sequence for MC-CDMA System by Zhicheng Zhang, Xiaona Huang, Li Xiong

    Published 2015-11-01
    “…The MC-CDMA system takes the advantages of the OFDM system and the CDMA system.The MC-CDMA system is a kind of wireless communication aroused an ongoing and growing research interests,which has the characteristics of high bit transmission rate,high bandwidth efficiency,anti-jamming,and a large system capacity.Since the MC-CDMA system includes the multi-carrier modulation,it is difficult to design a spread spectrum sequence performing not only a high level of self-correlation and cross-correlation but also a low peak-to-average power ratio in the MC-CDMA system.To solve this problem,a spread spectrum sequence which was modulated by Golay code and m sequence was proposed.The spread spectrum sequence proposed owned a good performance in self-correlation,cross-correlation and peak-to-average power ratio.The simulation results show the effectiveness and the superiority of the proposed spread spectrum sequence.…”
    Get full text
    Article
  9. 409

    Beamforming Algorithm of LEO Satellite Communication System by Haiwang WANG, Chenguang HUANG, Cheng ZOU, Fengwei SHAO, Jiachao CHANG, Guotong LI

    Published 2022-06-01
    “…The rapid development of broadband satellite internet has brought satellite communication into a new era.The establishment of large-scale low-orbit satellite constellations has gradually saturated spectrum resources, and the high overlap in frequency use has led to serious interference problems between satellite communication systems.Satellite payloads typically communicate using phased-array antennas, which reduce interference by beamforming at the receiving and transmitting ends.The adaptive beamforming algorithm was used at the receiving end to suppressed interference by adaptive zeroing; The low sidelobe beamforming algorithm was used at the transmitting end, which reduced the interference by imposing specifi c constraints on the sidelobes to suppressed the sidelobe level.Three anti-jamming beamforming algorithms were introduced for the ground receiving end and the satellite sending end respectively, which provided a beamlevel method for reduced the interference between satellite communication systems.…”
    Get full text
    Article
  10. 410

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  11. 411

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  12. 412

    Dynamic Path Optimization in Sharing Mode to Relieve Urban Traffic Congestion by Hongmei Chen, Yuanhang Zhang

    Published 2021-01-01
    “…The results show that both the model and algorithm are reliable and effective; thus, travel efficiency can be effectively improved and traffic jams can be alleviated.…”
    Get full text
    Article
  13. 413

    Numerical Simulation and Experimental Study on Flow of Polymer Aqueous Solution in Porous Jet Nozzle by Minghui Wei, Chenghuai Wu, Yanxi Zhou

    Published 2020-01-01
    “…In this paper, a self-propelled porous jet bit with a support plate is designed, which can prevent the drill bit from jamming due to the jet nozzle against the bottom of the well during the drilling process. …”
    Get full text
    Article
  14. 414

    Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network by Weiheng Jiang, Wenjiang Feng

    Published 2015-01-01
    “…Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate. …”
    Get full text
    Article
  15. 415

    Les TIC et la surveillance des zones maritimes sensibles. Penser globalement, agir localement by Mélanie Fournier

    Published 2012-10-01
    “…Even if in recent decades information systems have modified the geographical space and allowed the acceleration of decision making, the role of the information in a conflict is not new (alert, deciphering, jamming, damaging the enemy’s infrastructures, destabilization etc.). …”
    Get full text
    Article
  16. 416

    Joint power control for untrusted relay cooperation-based confidential communication by Wen-jiang FENG, Wei-heng JIANG, Yi-na DENG, Yang YUAN

    Published 2014-11-01
    “…The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure communication between BS and multiple MS,destination-based jamming (DBJ) scheme was adopted.With the assumption that all MS had fixed transmit power,the joint UR and BS power control which aims at maximizing system sum secrecy rate was discussed.For this problem,analysis indicated that it was equivalent to joint access control and power allocation problem thus its NP-hard.Through problem relaxation,a suboptimal MS access control and alternatively power allocation algorithm was provided.This algorithm is proved to have polynomial complexity and can converge to at least a suboptimal solution for original problem.Simulation results show that compared with the benchmark algorithms,the proposed suboptimal algorithm is better in the achievable secrecy rate performance.…”
    Get full text
    Article
  17. 417

    Emergency Evacuation of Hazardous Chemical Accidents Based on Diffusion Simulation by Jiang-Hua Zhang, Hai-Yue Liu, Rui Zhu, Yang Liu

    Published 2017-01-01
    “…Due to the toxicity and diffusion of hazardous chemicals, these accidents often lead to not only severe consequences and economic losses, but also traffic jams at the same time. Emergency evacuation after hazardous chemical accidents is an effective means to reduce the loss of life and property and to smoothly resume the transport network as soon as possible. …”
    Get full text
    Article
  18. 418

    A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security by Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang

    Published 2023-01-01
    “…The former includes classical encryption-based and quantum encryption-based secure communication, and the latter is further divided into precoding-based, cooperative jamming-based, relay selection-based, and physical-layer authentication-based secure communication depending on the applied techniques. …”
    Get full text
    Article
  19. 419

    Adaptive Trajectory Tracking Algorithm of a Quadrotor with Sliding Mode Control and Multilayer Neural Network by Kang Niu, Di Yang, Xi Chen, Rong Wang, Jianqiao Yu

    Published 2022-01-01
    “…To improve the trajectory tracking accuracy, the anti-jamming performance, and the environment adaptability of a quadrotor, the paper proposes a new adaptive trajectory tracking algorithm with multilayer neural network and sliding mode control method. …”
    Get full text
    Article
  20. 420

    Fractional-Order Sliding Mode with Active Disturbance Rejection Control for UAVs by Zhikun Zhang, Hui Zhang

    Published 2025-01-01
    “…Through the inner and outer loop design, the jitter of the sliding mode controller (SMC) is effectively suppressed, and fast response and strong anti-jamming ability are achieved, which, in turn, improves the control accuracy. …”
    Get full text
    Article