Digital Library
Vol. 11, No. 4, April 29, 2017
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Device-to-Device communications
- Heterogeneous Network
- interference mitigation
- interference alignment
- MIMO
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- clustering
- Energy-Efficient
- heterogeneity
- phases of network
- stability period
- Wireless Sensor Network
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless powered communications (WPC)
- multiple antennas
- multiple-input single-output
- multiple antennas
- power allocation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- multiple-input multiple-output
- component-level soft interference cancellation
- non-binary LDPC
- iterative detection and decoding
- extrinsic information transfer chart
Regional Science and Technology Resource Allocation Optimization Based on Improved Genetic Algorithm
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Low-density parity-check codes
- LDPC decoder
- min-sum algorithm
- adaptive min-sum decoding
- error correction codes
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Application-layer DDoS attack
- Path vulnerabilities-based attack
- Web-resource-weighted-directed graph
- Top M longest path algorithm
- Finite-state machine
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Software Defined Network (SDN)
- Moving target defense (MTD)
- Multicast tree
- Minimum hotness tree
- game theory
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- fuzzy vault
- cancelable fingerprint template, encryption, irreversible transformation function, minutiae descriptor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Proxy re-encryption
- bilinear pairing
- Unidirectional
- multi-use
- chosen-ciphertext security
- random oracles
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives