Learn More
Recommendation systems mainly focus on three specific domain like that CB filtering, CF-based filtering and Context-aware filtering.In content filtering, using users publishing and Interaction with in social network to calculate the similarity between users.Then recommend items to a user. The multimedia services and contents in the Internet, People usually(More)
Indoor localization has become a hot topic thanks to the fast development of wireless local area networks. The basic localization scheme can be divided into two approaches: fingerprint-based and lateration-based. In this paper, we propose a novel localization method that combines the fingerprint method and lateration method. Fingerprint-based method is(More)
Multiparty conference is an important telephone service. However, today, the session initiation protocol (SIP) is primary used in point-to-point calls. SIP can support multi-party conferencing in many different ways. This article introduces some SIP conferencing architectures, their advantages, disadvantages and performance. According to centralized(More)
Now, an ad hoc network works well rely on other nodes in the network for discovering route and forwarding data packets. Most routing protocols are based on the assumption of cooperation and no cheat. If there are malicious nodes to attack network, these protocols would be broken down. In this paper, we propose the cooperative on-demand secure route (COSR)(More)
Three-dimensional Under-Water Acoustic Sensor Networks (UWASN) are supposed to be deployed for many applications. However, a protocol for sensors’ self-localization and time-synchronization in UWASN remains a challenge problem. In this paper, we developed a multilateration algorithm which could reliably localize and synchronize underwater sensor networks by(More)
MicroRNAs (miRNAs) have been proven to play crucial roles in cancer, including tumor chemotherapy resistance and metastasis of non-small-cell lung cancer (NSCLC). TGFβ signal pathway abnormality is widely found in cancer and correlates with tumor proliferation, apoptosis and metastasis. Here, miR-17, 20a, 20b were detected down-regulated in A549/DDP cells(More)
With the broad implementation of Internet, VoIP poses an important role on the Internet and provides a new way to people to contact each other. As VoIP's cheapness and simpleness, many institutes forecast that VoIP emerges as next spam entryway like e-mail service. In this paper, we propose a novel schema, called P2P-AVS (anti-voice-spam), against spam call(More)
Many applications in wireless sensor networks have strict coverage accuracy requirements and need to operate as long as possible. In this paper, based on the new confident information coverage model proposed in our previous study (Wang et al., 2012), we design a novel sensor scheduling algorithm to prolong the network lifetime. This algorithm organizes the(More)
In the area of performance analysis of wireless networks, one critical issue is the hidden terminal problem, which is considered as one of the severest reasons for the degradation of network performance. In this paper, we incorporate reactive jamming scheme with distributed coordination function (DCF) in IEEE 802.11 based wireless local area networks(More)
Nowadays, the fast development of wireless mesh networks have led to a significant growth of energy consumption. Green mesh networks consisting of rechargeable routers supplied by renewable energy sources such as solar power have become a cost-effective alternative solution. In this paper, we study the rechargeable router placement problem and formulate it(More)