Learn More
Three-dimensional UnderWater Acoustic Sensor Networks (UWASN) are supposed to be deployed for many applications. However, a protocol for sensors' self-localization and time-synchronization in UWASN remains a challenge problem. In this paper, we developed a multilateration algorithm which could reliably localize and synchronize underwater sensor networks by(More)
Now, an ad hoc network works well rely on other nodes in the network for discovering route and forwarding data packets. Most routing protocols are based on the assumption of cooperation and no cheat. If there are malicious nodes to attack network, these protocols would be broken down. In this paper, we propose the cooperative on-demand secure route (COSR)(More)
Multiparty conference is an important telephone service. However, today, the session initiation protocol (SIP) is primary used in point-to-point calls. SIP can support multi-party conferencing in many different ways. This article introduces some SIP conferencing architectures, their advantages, disadvantages and performance. According to centralized(More)
Recommendation systems mainly focus on three specific domain like that CB filtering, CF-based filtering and Context-aware filtering.In content filtering, using users publishing and Interaction with in social network to calculate the similarity between users.Then recommend items to a user. The multimedia services and contents in the Internet, People usually(More)
Cognitive radio networks allow opportunistic spectrum access and can significantly improve spectral efficiency. To achieve higher sensing accuracy, cognitive radio systems often require cooperation among secondary users. One of the most important aspects in collaborative spectrum sensing is the data fusion algorithm which combines the sensing results from(More)
With the broad implementation of Internet, VoIP poses an important role on the Internet and provides a new way to people to contact each other. As VoIP's cheapness and simpleness, many institutes forecast that VoIP emerges as next spam entryway like e-mail service. In this paper, we propose a novel schema, called P2P-AVS (anti-voice-spam), against spam call(More)
Many applications in wireless sensor networks have strict coverage accuracy requirements and need to operate as long as possible. In this paper, based on the new confident information coverage model proposed in our previous study (Wang et al., 2012), we design a novel sensor scheduling algorithm to prolong the network lifetime. This algorithm organizes the(More)