In this paper,we revisit the problem of target detection in wireless sensor networks (WSNs).Because that the practical environment of WSNs is very complex,and usually the target signal is mixed with a
Sleep scheduling mechanism is used in the tradition sensor network to conserve battery power.However,in cognitive radio sensor networks (CRSNs),the sleep scheduling mechanism needs to consider the con
Over the past few years we have witnessed evolutionary changes to our communication network as the result of new application,computation and communications paradigms.As such,our understanding to the n
Internet applications with long-time quasi-periodic (LTQP) communication behavior are always sensitive and critical in traffic monitoring,safety detection,user billing etc.Analysis and detection on su
The aim to raise customer loyalty in telecom market requires an emphasis on one-to-one marketing and personalized services.To this end,it is essential to understand individual customer preferences for
IEEE 802.11 wireless local area networks (WLANs) standard is now used widely in daily life.IEEE 802.1 le,as a new standard of WLAN,can support different services such as audio and video.However,provid
Network selection in heterogeneous wireless networks aims to choose an optimal network from several candidate wireless networks according to different constraints presented by,for example,applications
Proxy signature allows an entity to delegate its signing capability to another entity called proxy signer which can produce a signature on behalf of the delegator.In this paper,based on efficiently co
Hash chain mechanism has been widely used into a variety of encryption applications and services.The introduction of renewable Hash chain overcomes resource-constrained defect in traditional Hash chai
This paper designed and evaluated MPDF,a mobile pulse data format which can be easily used in processing the traditional Chinese pulse data in the context of mobile healthcare (mHealthcare).MPDF aims