Digital Library
Vol. 12, No. 6, June 29, 2018
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- open information extraction
- Word Vector
- Maximum likelihood estimation
- Bayes Inference
- Natural Language Processing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cognitive Radio Networks
- common channel
- average angle difference pattern
- system activation signal
- boundary symbol synchronization.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Software-defined networking (SDN)
- source routing
- K Shortest Paths (KSP)
- quality of service (QoS)
- Path Discovery
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Microcell terrain
- wireless network optimization
- B spline interpolation
- PCCPCH RSCP , power amplification
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Dense heterogeneous netwoks
- physical layer security
- cooperative jamming
- non-convex optimization
- Semidefinite Relaxation (SDR)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Energy-Efficient Routing Protocol for Wireless Sensor Networks Based on Improved Grey Wolf Optimizer
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Sensor Networks (WSNs)
- energy-efficiency
- Gray Wolf Optimizer (GWO)
- balanced cluster structure
- network lifetime
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Non-orthogonal multiple access
- power NOMA in 5G
- Adaptive Power Control
- evolutionary game theory
- spectral efficiency
- Energy Efficiency
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
Minkyu Lim,
Donghyun Lee,
Hosung Park,
Yoseb Kang,
Junseok Oh,
Jeong-Sik Park,
Gil-Jin Jang,
Ji-Hwan Kim
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- MANET security
- dynamic behaviour
- reputation based scheme
- Secure routing
- misbehaving nodes
- routing misbehaviour.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- MANET
- tactical networks
- intrusion detection and prevention system
- Virtual Clustering
- smart MIML-IDPS protocol.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Stream authentication
- Trapdoor Hash Function
- Merkle Hash Tree
- Digital Signature Algorithm (DSA)
- Signature amortization
- online/offline signature.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives