Abstract: In this paper, we consider a two-way or bidirectional communications system with a relay equipped with multiple antennas. We show that when the downlink channel state inf...
Chau Yuen, Woon Hau Chin, Yong Liang Guan, Wenhua ...
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Sensor network applications frequently require that the sensors know their physical locations in some global coordinate system. This is usually achieved by equipping each sensor w...
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the dista...
This paper expands previous work dealing with oligopolistic supply chains to the field of closedloop supply chains. The model presented has been formulated with the intent of exa...