Digital Library
Vol. 12, No. 3, March 30, 2018
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Vehicular ad hoc network(VANET)
- wireless access in vehicular environments (WAVE)
- IEEE 802.11p
- carrier sense multiple access with collision avoidance (CSMA/CA)
- collision reduction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Software Defined Network (SDN)
- Software defined wireless network (SDWN)
- network situation awareness (NSA)
- network performance awareness
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- heterogeneous wireless sensor networks
- Range-free localization
- multi-hop
- expected hop progress
- quantum particle swarm optimization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Massive MIMO downlink
- channel aging
- time varying Ricean fading
- sum rate
- Energy Efficiency
- power scaling law.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Ayad A. Abdulkafi,
Mohamad Yusoff Alias,
Yaseein Soubhi Hussein,
Nazaruddin Omar,
Mohd Kamarulzamin Bin Salleh
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Fourier transform
- fuzzy edge detection
- motion detection
- UAV
- photogrammetric mapping and remote sensing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Two-stage linear discrimination analysis
- Small size sample problem
- Selection and compression method
- Approximation matrix method
- regularization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Saliency Object Detection
- Soft-Label Partition
- Similarity Voting
- Adaptive Figure-Ground Classification
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Ciphertext-policy attribute based encryption
- Non-monotonic access structure
- full security
- access control
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives