Digital Library
Vol. 12, No. 10, October 30, 2018
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Software-Defined Networking
- service function chaining placement
- integer linear programming
- greedy heuristic solution
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Dynamic opportunistic D2D network
- heterogeneous devices
- instantly decodable network coding
- maximal clique problem
- Retransmission
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Tassawar Iqbal,
Muhammad Tariq Yousafzai,
Sabeen Ali,
Kinza Sattar,
Muhammad Qaiser Saleem,
Usman Habib,
Atta ur Rehman Khan
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Facebooking
- Self-Esteem
- Pretentious
- Narcissism
- Life Satisfaction
- Netizens
- Stalking
- Web 2.0
- Reed’s Law
- Social Technographics
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Sensor Networks
- network architecture
- complex fast independent component analysis
- reference-signal negentropy cFastICA
- noncircular signals
- blind source separation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- channel estimation
- non-convex optimization
- Majorization-Minimization method
- prior information
- particle filer
- sparse signal recovery
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Noise-aware Training
- identity-vector, L2 regularization, speech enhancement, DNN, condition mismatch
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Hesitant fuzzy linguistic terms set
- 2-tuple linguistic model
- linguistic multi-criteria group decision making
- fuzzy ontology
- linguistic probabilistic aggregation operator.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Hyperspectral image classification
- Multi-layer superpixels
- Joint sparse representation
- Discriminative optimization sampling
- Reconstruction matrix
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Intrusion Detection System
- Feauture Selection
- Artificial Intelligence Algorithms
- Deterministic algorithms
- Swarm intelligence.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Abubakker Usman Akram,
Hikmat Ullah Khan,
Saqib Iqbal,
Tassawar Iqbal,
Ehsan Ullah Munir,
Dr. Muhammad Shafi
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Intrusion Detection System
- Weighted Support Vector Machine
- Stratified sampling
- Cost function
- NSL-KDD
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Network intrusion detection
- Deep Convolutional Neural Networks
- Deep Learning
- CNN
- IDS
- information security
Archives