Digital Library
Vol. 13, No. 6, June 29, 2019
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- V2V communication
- cooperative scattering channel
- Non-Stationary
- velocity variations
- relay cooperative communication
- birth-death process
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Interference Alignment (IA)
- best-effort
- degree of freedom (DoF)
- throughput
- quasi-static MIMO interference channels
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Communication
- massive MIMO system
- 3D GBSM
- statistical properties
- channel capacity
- tunnel environment
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- T-S fuzzy neural network
- genetic optimization
- krill herd
- irrigation decision
- greenhouse tomatoes
- Internet of Things
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Artificial intelligence
- Hierarchical Networks
- Optical Burst Switching
- Optical Networks
- Resource Allocation
- Traffic Estimate
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless ad hoc networks
- Full-duplex communication
- MAC protocol
- collision avoidance
- hidden terminal problem
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Artificial Intelligence & Big Data
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cloud computing
- privacy and security
- Cloud Storage
- access control
- Privacy Protection
- preventive measures
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cloud Storage
- Data Deduplication
- Data encryption
- closed-circuit television (CCTV)
- ownership management
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- VEhicular Ad-Hoc Networks
- Anonymous Authentication
- secure data communication
- Identity Privacy
- Forward Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives