Digital Library
Vol. 11, No. 10, October 30, 2017
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- FD-MIMO
- 3D spatial channel model
- urban channel model
- inter-element spacing
- and elevation angles of departure restriction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- SC-FDMA
- Heterogeneous Network
- adaptive service rate control
- dynamic subcarrier allocation
- quality of service (QoS)
Anwar Khan,
Nadeem Javaid,
Ihsan Ali,
Mohammad Hossein Anisi,
Atiq Ur Rahman,
Naeem Bhatti,
Muhammad Zia,
Hasan Mahmood
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Power Line Communication (PLC)
- relay-involved PLC channel
- non-regenerative relay
- amplify-and-forward
- diversity
- Power saving
- quality-of-service (QoS)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Short term traffic flow forecasting
- Relevance vector regression (RVR)
- Chaotic simulated annealing (CSA)
- Double seasonal holt-winters exponential smoothing DSHWES)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Visual tracking
- object tracking
- correlation filter
- computer vision
- target representation
- target scale estimation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Similarity recognition
- fuzzy inference system
- Particle Swarm Optimization
- near optimal parameters
- membership functions
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- sequential pattern mining
- Intrusion Detection System
- Spoofing Attack
- Flooding of packets
- Big data
- Feature selection
- Apache Hadoop YARN
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- secret key generation
- Physical-layer security
- channel reciprocity
- quantization
- Information reconciliation
- Privacy amplification
Papers on ICONI 2016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Controller area network
- In-Vehicle Network
- MAC
- media access control
- non-destructive bitwise arbitration
- Automotive
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- RF-DC conversion efficiency
- series rectenna
- parallel rectenna
- cascade rectenna
- wireless power transfer
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Video Sensor Network
- Communication Buffer Sizing
- Lifetime Maximization of WVSN nodes
- Minimizing Energy Consumption of Sensor Node
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives