Digital Library
Vol. 13, No. 11, November 30, 2019
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- bandwidth efficiency
- reactive relay selection
- Cooperative Transmission
- cognitive cooperative network
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Non-orthogonal multiple access
- residual hardware impairments
- two-way relay
- channel estimation errors
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- representation learning
- Unsupervised Learning
- generative adversarial networks
- deep convolutional autoencoders
- Bagging
Appropriate Synchronization Time Allocation for Distributed Heterogeneous Parallel Computing Systems
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- multi-population genetic algorithm
- individual information sharing
- multi-target paths coverage
- contact layer proximity
- Test Case
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- evolutionary computing
- constrained multi-objective optimization
- constraint handling
- diversity maintenance
- convergence
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Virtual character
- Human Computer Interaction
- natural user interface
- Physics 밷ased optimization
- Motion synthesis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- malicious robots
- social robots detection
- generative adversarial networks
- supervised classification
- unbalanced data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Secure outsourced computation
- secure multiple matrix multiplication
- computation over encrypted data
- fully homomorphic encryption
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Zaid Ameen Abduljabbar,
Ayad Ibrahim,
Mohammed Abdulridha Hussain,
Zaid Alaa Hussien,
Mustafa A. Al Sibahee,
Songfeng Lu
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Searchable encryption
- secure image retrieval
- IoT-Cloud
- k-Means Clustering
- SURF local feature
- Similarity Measure
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives