Digital Library
Vol. 13, No. 5, May 30, 2019
[Regular Papers]
Internet & Communications




- Target localization
- Multipath environment
- Data association
- Expectation maximization
- Distributed implementation
- Average consensus

- Small Cell Networks (SCNs)
- Pre-caching Technology
- Internet Content Providers (ICPs)
- Bankruptcy Game
- Analytic Hierarchy Process (AHP)

- Reliability, expression of reliability, I.E principle
- vehicular ad-hoc networks, headway distance, freeway highway, universal speed factor


- Top-N recommendation
- Collaborative Filtering (CF)
- learning to rank (LTR)
- Mean Average Precision (MAP)
- implicit feedback

- distributed compressive sensing (DCS)
- adaptive matching pursuit
- doubly-selective fading channel
- basis expansion model (BEM)
- channel estimation

- 3D laser radar
- laser triangulation
- distance measurement
- weighted average algorithm
- 3D reconstruction


- Direct position determinations(DPD)
- Nested array
- distributed source
- Compressed sensing
- vectorization

- Low-energy adaptive clustering hierarchy (LEACH) protocol
- bat algorithm
- Curve decline strategy
- Triangle-flipping strategy

- Online communications
- comments and reactions
- media consumers
- willingness to watch
- distinction bias
- behavioral economics
Multimedia

- license plate recognition
- license plate structure classification
- multi-style license plate
- k-nearest neighbor




Internet Security

- homomorphic encryption
- digital speech signal
- secure speech storing
- less data expansion
- Cloud computing


- Fully homomorphic encryption
- Ciphertext Matrix
- Ciphertexts Stack
- Decryption Structure
- Concert Parameters


- password authentication
- targeted password attacking
- BiLSTM
- probabilistic context-free grammar
- Markov chain
- Personal Information

- Image secrecy
- Multi-stage encryption
- Visual cryptography
- One time pad
- Steganography
- Least Significant Bit

- Ciphertext-policy attribute-based encryption
- conjunctive keyword search
- Secure channel
- Keyword-guessing attacks
- Search policy

- Wireless Sensor Network
- artificial immune
- Intrusion Detection
- danger theory
- Genetic Algorithms
- Security


Archives