Digital Library
Vol. 12, No. 10, October 30, 2018
[Regular Papers]
Internet & Communications


- Software-Defined Networking
- service function chaining placement
- integer linear programming
- greedy heuristic solution

- Dynamic opportunistic D2D network
- heterogeneous devices
- instantly decodable network coding
- maximal clique problem
- Retransmission


Tassawar Iqbal,
Muhammad Tariq Yousafzai,
Sabeen Ali,
Kinza Sattar,
Muhammad Qaiser Saleem,
Usman Habib,
Atta ur Rehman Khan

- Facebooking
- Self-Esteem
- Pretentious
- Narcissism
- Life Satisfaction
- Netizens
- Stalking
- Web 2.0
- Reed’s Law
- Social Technographics





- Wireless Sensor Networks
- network architecture
- complex fast independent component analysis
- reference-signal negentropy cFastICA
- noncircular signals
- blind source separation

- channel estimation
- non-convex optimization
- Majorization-Minimization method
- prior information
- particle filer
- sparse signal recovery



Multimedia


- Noise-aware Training
- identity-vector, L2 regularization, speech enhancement, DNN, condition mismatch

- Hesitant fuzzy linguistic terms set
- 2-tuple linguistic model
- linguistic multi-criteria group decision making
- fuzzy ontology
- linguistic probabilistic aggregation operator.



- Hyperspectral image classification
- Multi-layer superpixels
- Joint sparse representation
- Discriminative optimization sampling
- Reconstruction matrix


Internet Security

- Intrusion Detection System
- Feauture Selection
- Artificial Intelligence Algorithms
- Deterministic algorithms
- Swarm intelligence.

Abubakker Usman Akram,
Hikmat Ullah Khan,
Saqib Iqbal,
Tassawar Iqbal,
Ehsan Ullah Munir,
Dr. Muhammad Shafi


- Intrusion Detection System
- Weighted Support Vector Machine
- Stratified sampling
- Cost function
- NSL-KDD

- Network intrusion detection
- Deep Convolutional Neural Networks
- Deep Learning
- CNN
- IDS
- information security
Archives