Skip to Content

135 Results Found

  • Article
  • Open Access
4 Citations
2,981 Views
18 Pages

16 September 2021

The multi-source data collected by the power Internet of Things (IoT) provide the data foundation for the power big data analysis. Due to the limited computational capability and large amount of data collection terminals in power IoT, the traditional...

  • Article
  • Open Access
27 Citations
3,431 Views
16 Pages

BBNSF: Blockchain-Based Novel Secure Framework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems

  • Mohit Kumar,
  • Priya Mukherjee,
  • Sahil Verma,
  • Kavita,
  • Maninder Kaur,
  • S. Singh,
  • Martyna Kobielnik,
  • Marcin Woźniak,
  • Jana Shafi and
  • Muhammad Fazal Ijaz

2 December 2022

The wearable healthcare equipment is primarily designed to alert patients of any specific health conditions or to act as a useful tool for treatment or follow-up. With the growth of technologies and connectivity, the security of these devices has bec...

  • Article
  • Open Access
12 Citations
4,708 Views
17 Pages

13 March 2021

Public key algorithms based on quasi-cyclic binary moderate-density parity-check codes (QC-MDPCs) and QC low-density parity-check codes (QC-LDPCs) codes for key encapsulation and encryption submitted to the NIST post-quantum competition (Bit Flipping...

  • Article
  • Open Access
2 Citations
1,378 Views
27 Pages

An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials

  • Chunfu Zhang,
  • Jing Bai,
  • Yanchun Liang,
  • Adriano Tavares,
  • Lidong Wang,
  • Tiago Gomes and
  • Sandro Pinto

2 September 2024

Due to the similar characteristics of chaotic systems and cryptography, public key encryption algorithms based on chaotic systems are worth in-depth research and have high value for the future. Chebyshev polynomials have good properties and are often...

  • Article
  • Open Access
15 Citations
3,786 Views
23 Pages

5 September 2022

Various security threats are encountered when keys are transmitted in public channels. In this paper, we propose an image encryption algorithm based on complex network scrambling and multi-directional diffusion. Combining the idea of public key crypt...

  • Article
  • Open Access
1 Citations
1,988 Views
17 Pages

In recent years, governments have regarded blockchain technology as a key breakthrough in independent innovation of core technologies and have attached great importance to its development. In current blockchain solutions, the elliptic curve digital s...

  • Article
  • Open Access
9 Citations
5,280 Views
16 Pages

17 March 2024

Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys. A crucial and complex operation in ECC calculations is scalar point multi...

  • Article
  • Open Access
45 Citations
7,385 Views
21 Pages

Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?

  • Maximilian Schöffel,
  • Frederik Lauer,
  • Carl C. Rheinländer and
  • Norbert Wehn

24 March 2022

Recent progress in quantum computers severely endangers the security of widely used public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is currently exploring new post-quantum cryptographic algorithms that are robus...

  • Article
  • Open Access
1,849 Views
20 Pages

Image Cryptosystem in Optical Gyrator Transform Domain Using Audio Keys

  • Miao Tian,
  • Gege Sun,
  • Wenbo Song,
  • Zhengjun Liu and
  • Hang Chen

Two remote sensing image encryption algorithms based on the randomness of audio channel sequences are proposed and their robustness is verified by many attack experiments. The first encryption algorithm uses the randomness of audio to encrypt image p...

  • Article
  • Open Access
4 Citations
2,984 Views
10 Pages

Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are base...

  • Article
  • Open Access
23 Citations
3,889 Views
16 Pages

3 February 2023

In order to effectively carry out the heavy overload monitoring and maintenance of public transformers in the distribution network, ensure the reliability of the distribution network power supply, and improve customer satisfaction with electricity co...

  • Article
  • Open Access
5 Citations
3,341 Views
14 Pages

17 April 2023

In digital identity authentication, credentials are typically stored in a digital wallet and authenticated through a single key-based signature and public key verification. However, ensuring compatibility between systems and credentials can be challe...

  • Article
  • Open Access
8 Citations
4,107 Views
15 Pages

Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme

  • Binh Kieu-Do-Nguyen,
  • Nguyen The Binh,
  • Cuong Pham-Quoc,
  • Huynh Phuc Nghi,
  • Ngoc-Thinh Tran,
  • Trong-Thuc Hoang and
  • Cong-Kha Pham

11 July 2024

In the modern era of the Internet of Things (IoT), especially with the rapid development of quantum computers, the implementation of postquantum cryptography algorithms in numerous terminals allows them to defend against potential future quantum atta...

  • Article
  • Open Access
3 Citations
3,100 Views
23 Pages

20 November 2023

Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the...

  • Article
  • Open Access
44 Citations
4,156 Views
23 Pages

A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography

  • Haotian Liang,
  • Guidong Zhang,
  • Wenjin Hou,
  • Pinyi Huang,
  • Bo Liu and
  • Shouliang Li

19 June 2021

Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic cu...

  • Article
  • Open Access
1 Citations
2,007 Views
22 Pages

21 May 2025

Multi-Key Fully Homomorphic Encryption (MKFHE) offers a powerful solution for secure multi-party computations, where data encrypted under different keys can be jointly computed without decryption. However, existing MKFHE schemes still face challenges...

  • Article
  • Open Access
2 Citations
2,136 Views
29 Pages

1 November 2024

As a critical component of the transportation system, the safety of bridges is directly related to public safety and the smooth flow of traffic. This study addresses the aforementioned issues by focusing on the identification of bridge structure dete...

  • Article
  • Open Access
7 Citations
2,475 Views
14 Pages

A Spatio-Temporal Hybrid Neural Network for Crowd Flow Prediction in Key Urban Areas

  • Du He,
  • Jing Jia,
  • Yaoqing Wang,
  • Lan You,
  • Zhijun Chen,
  • Jiawen Li,
  • Qiyao Wu and
  • Yongsen Wang

The prediction of crowd flow in key urban areas is an important basis for city informatization development and management. Timely understanding of crowd flow trends can provide cities with data support in epidemic prevention, public security manageme...

  • Article
  • Open Access
475 Views
15 Pages

5 March 2026

The objective of this article is to examine how alternative digital platforms can be designed and governed as public-interest infrastructures capable of supporting democratic deliberation in the contemporary digital public sphere. Drawing on delibera...

  • Article
  • Open Access
9 Citations
3,102 Views
14 Pages

1 April 2020

Due to the limitation of current technologies and product costs, humans are still in the driving loop, especially for public traffic. One key problem of cooperative driving is determining the time when assistance is required by a driver. To overcome...

  • Review
  • Open Access
33 Citations
16,534 Views
39 Pages

12 August 2024

This paper systematically reviews remote sensing technology and learning algorithms in exploring landslides. The work is categorized into four key components: (1) literature search characteristics, (2) geographical distribution and research publicati...

  • Article
  • Open Access
8 Citations
2,081 Views
15 Pages

Optimal Selection of Distribution, Power, and Type of Luminaires for Street Lighting Designs Using Multi-Criteria Decision Model

  • Nataly Gabriela Valencia Pavón,
  • Alexander Aguila Téllez,
  • Marcelo García Torres,
  • Javier Rojas Urbano and
  • Narayanan Krishnan

3 May 2024

This article introduces an innovative design method for public lighting systems that surpasses the limitations of conventional approaches, which rely on predefined lamp characteristics and spatial arrangements. By employing a linear additive model to...

  • Article
  • Open Access
1,029 Views
21 Pages

6 October 2024

The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of...

  • Article
  • Open Access
8 Citations
2,450 Views
18 Pages

In underwater imaging, achieving high-quality imagery is essential but challenging due to factors such as wavelength-dependent absorption and complex lighting dynamics. This paper introduces MEvo-GAN, a novel methodology designed to address these cha...

  • Article
  • Open Access
57 Citations
9,712 Views
17 Pages

MFCosface: A Masked-Face Recognition Algorithm Based on Large Margin Cosine Loss

  • Hongxia Deng,
  • Zijian Feng,
  • Guanyu Qian,
  • Xindong Lv,
  • Haifang Li and
  • Gang Li

9 August 2021

The world today is being hit by COVID-19. As opposed to fingerprints and ID cards, facial recognition technology can effectively prevent the spread of viruses in public places because it does not require contact with specific sensors. However, people...

  • Article
  • Open Access
709 Views
18 Pages

Fish-Tail Bolt Loosening Detection Under Tilted Perspectives

  • Junqin Yu,
  • Qiwen Wu,
  • Kai Xie,
  • Yun Cao,
  • Xiaofei Wang,
  • Chang Wen and
  • Wei Zhang

As a critical fastener connecting steel rails, fish-tail bolts ensure the safety of railway transportation. To improve the efficiency of fish-tail bolt loosening detection, this paper proposes a computer vision-based method for detecting fish-tail bo...

  • Article
  • Open Access
1,484 Views
22 Pages

We study the relationship between tweets referencing Acute Respiratory Infections (ARI) or COVID-19 symptoms and confirmed cases of these diseases. Additionally, we propose a computational methodology for selecting and applying Machine Learning (ML)...

  • Article
  • Open Access
2 Citations
1,356 Views
37 Pages

21 June 2025

This study proposes a multi-dimensional urban transportation network optimization framework (MTNO-RQDC) to address structural failure risks from aging infrastructure and regional connectivity bottlenecks. Through dual-dataset validation using both th...

  • Article
  • Open Access
2 Citations
2,132 Views
30 Pages

21 August 2023

ECC is a popular public-key cryptographic algorithm, but it lacks an effective solution to multiple-point multiplication. This paper proposes a novel JSF-based fast implementation method for multiple-point multiplication. The proposed method requires...

  • Article
  • Open Access
32 Citations
4,745 Views
25 Pages

A Hybrid Privacy-Preserving Deep Learning Approach for Object Classification in Very High-Resolution Satellite Images

  • Wadii Boulila,
  • Manel Khazri Khlifi,
  • Adel Ammar,
  • Anis Koubaa,
  • Bilel Benjdira and
  • Imed Riadh Farah

16 September 2022

Deep learning (DL) has shown outstanding performances in many fields, including remote sensing (RS). DL is turning into an essential tool for the RS research community. Recently, many cloud platforms have been developed to provide access to large-sca...

  • Article
  • Open Access
10 Citations
3,586 Views
13 Pages

Setting Headways on a Bus Route under Uncertain Conditions

  • Weiya Chen,
  • Xin Liu,
  • Dingfang Chen and
  • Xin Pan

17 May 2019

Urban public transport is a sustainable transportation strategy. Promoting public transport is an important means of urban transport sustainable development. Reasonable operation scheduling can increase the attractiveness of public transit systems an...

  • Article
  • Open Access
5 Citations
3,783 Views
13 Pages

Loop Closure Detection in RGB-D SLAM by Utilizing Siamese ConvNet Features

  • Gang Xu,
  • Xiang Li,
  • Xingyu Zhang,
  • Guangxin Xing and
  • Feng Pan

22 December 2021

Loop closure detection is a key challenge in visual simultaneous localization and mapping (SLAM) systems, which has attracted significant research interest in recent years. It entails correctly determining whether a scene has previously been visited...

  • Article
  • Open Access
5 Citations
3,205 Views
22 Pages

The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management. Traditional centralized approaches are not sufficient to address these ris...

  • Article
  • Open Access
8 Citations
3,236 Views
19 Pages

Typhoon Trajectory Prediction by Three CNN+ Deep-Learning Approaches

  • Gang Lin,
  • Yanchun Liang,
  • Adriano Tavares,
  • Carlos Lima and
  • Dong Xia

28 September 2024

The accuracy in predicting the typhoon track can be key to minimizing their frequent disastrous effects. This article aims to study the accuracy of typhoon trajectory prediction obtained by combining several algorithms based on current deep-learning...

  • Article
  • Open Access
7 Citations
6,981 Views
17 Pages

Graph Neural Networks: A Bibliometric Mapping of the Research Landscape and Applications

  • Annielle Mendes Brito da Silva,
  • Natiele Carla da Silva Ferreira,
  • Luiza Amara Maciel Braga,
  • Fabio Batista Mota,
  • Victor Maricato and
  • Luiz Anastacio Alves

11 October 2024

Graph neural networks (GNNs) are deep learning algorithms that process graph-structured data and are suitable for applications such as social networks, physical models, financial markets, and molecular predictions. Bibliometrics, a tool for tracking...

  • Article
  • Open Access
26 Citations
3,618 Views
20 Pages

21 February 2024

Lithium-ion batteries (LIBs) have been widely used for electric vehicles owing to their high energy density, light weight, and no memory effect. However, their health management problems remain unsolved in actual application. Therefore, this paper fo...

  • Article
  • Open Access
494 Views
25 Pages

19 December 2025

A large share of the global population now lives in urban areas, which creates growing challenges for city life. Local authorities are seeking ways to enhance urban livability, with transportation emerging as a major focus. Developing smart public tr...

  • Article
  • Open Access
3 Citations
657 Views
30 Pages

15 December 2025

The inherent volatility and intermittency of solar power generation pose significant challenges to the stability of power systems. Consequently, high-precision power forecasting is critical for mitigating these impacts and ensuring reliable operation...

  • Article
  • Open Access
11 Citations
5,674 Views
16 Pages

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

  • Hyunjun Kim,
  • Wonwoong Kim,
  • Yeajun Kang,
  • Hyunji Kim and
  • Hwajeong Seo

18 September 2024

The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a ser...

  • Article
  • Open Access
12 Citations
5,422 Views
21 Pages

10 March 2023

Crowd congestion is one of the main causes of modern public safety issues such as stampedes. Conventional crowd congestion monitoring using closed-circuit television (CCTV) video surveillance relies on manual observation, which is tedious and often e...

  • Article
  • Open Access
4 Citations
2,386 Views
17 Pages

15 February 2023

In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of...

  • Article
  • Open Access
2,016 Views
19 Pages

9 September 2023

Photosynthesis is one of the key issues for vertical cultivation in plant factories, and efficient natural sunlight utilization requires predicting the light falling on each seedbed in a real-time manner. However, public weather services neither prov...

  • Article
  • Open Access
893 Views
19 Pages

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

  • Koon-Ming Chan,
  • Swee-Huay Heng,
  • Syh-Yuan Tan and
  • Shing-Chiang Tan

Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised...

  • Article
  • Open Access
1 Citations
2,080 Views
25 Pages

12 November 2024

Shared bikes are widely used in Chinese cities as a green and healthy solution to address the First/Last Mile issue in public transit access. However, usage declines in cold regions during winter due to harsh weather conditions. While climate factors...

  • Article
  • Open Access
14 Citations
5,662 Views
18 Pages

14 July 2024

The unsafe action of miners is one of the main causes of mine accidents. Research on underground miner unsafe action recognition based on computer vision enables relatively accurate real-time recognition of unsafe action among underground miners. A d...

  • Article
  • Open Access
5 Citations
3,072 Views
32 Pages

CME-YOLO: A Cross-Modal Enhanced YOLO Algorithm for Adverse Weather Object Detection in Autonomous Driving

  • Yifei Yuan,
  • Yingmei Wei,
  • Yanming Guo,
  • Jiangming Chen and
  • Tingshuai Jiang

In open and dynamic environments, object detection is affected by rain, fog, snow, and complex lighting conditions, leading to decreased accuracy and posing a threat to driving safety. Infrared images can provide clear images at nighttime or in adver...

  • Article
  • Open Access
10 Citations
2,920 Views
28 Pages

13 March 2025

The mental health of university students has received much attention due to the various pressures of studies, life, and employment. Several studies have confirmed that campus public spaces contain multiple restorative potentials. Yet, the campus publ...

  • Article
  • Open Access
8 Citations
2,917 Views
14 Pages

13 November 2022

The Montgomery modular multiplication is an integral operation unit in the public key cryptographic algorithm system. Previous work achieved good performance at low input widths by combining Redundant Binary Representation (RBR) with Montgomery modul...

  • Article
  • Open Access
3 Citations
2,920 Views
17 Pages

Person re-identification can identify specific pedestrians across cameras and solve the visual limitations of a single fixed camera scene. It achieves trajectory analysis of target pedestrians, facilitating case analysis by public security personnel....

  • Article
  • Open Access
4 Citations
1,938 Views
27 Pages

3 March 2025

The microgrid is a small-scale, independent power system that plays a crucial role in the transition to carbon-neutral energy systems. Combined heat and power (CHP) systems with energy storage reduce energy waste within microgrids, enhancing energy u...

of 3