This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
: This paper deals with twisting motion of a falling cat robot by two torque inputs around her waist. The cat robot consists of two rigid columns and has internally two actuators a...
Orientation of extracellular matrix fibers in the skin is a key ingredient of tissue appearance and function, and differences in fiber alignment are one of the main distinctions be...
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...