Quantum-resistant cryptography for the internet of things based on location-based lattices

OS Althobaiti, M Dohler - IEEE Access, 2021 - ieeexplore.ieee.org
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things
(NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum …

[PDF][PDF] Routing algorithm based on delay rate in wireless cognitive radio network

G Yan, Y Lv, Q Wang, Y Geng - Journal of Networks, 2014 - Citeseer
To reduce the end-to-end average delay of algorithm in wireless network, this paper
proposes the real-time routing algorithm in spectrum network. It is analyzed that the dynamic …

Application of wireless sensor network based improved immune gene algorithm in airport floating personnel positioning

H Liu, KY Ki - Computer Communications, 2020 - Elsevier
Based on wireless sensor network (WSN) and the moving characteristics of airport
passengers, this paper presents an improved WSN algorithm for airport passenger …

[PDF][PDF] QR Code Image Correction based on Corner Detection and Convex Hull Algorithm.

K Suran - Journal of multimedia, 2013 - Citeseer
Since the angular deviation produced when shooting a QR code image by a camera would
cause geometric distortion of the QR code image, the traditional algorithm of QR code image …

[HTML][HTML] Intelligent bio-latticed cryptography: A quantum-proof efficient proposal

OS Althobaiti, T Mahmoodi, M Dohler - Symmetry, 2022 - mdpi.com
The emergence of the Internet of Things (IoT) and the tactile internet presents high-quality
connectivity strengthened by next-generation networking to cover a vast array of smart …

Matching larger image areas for unconstrained face identification

J Gaston, J Ming, D Crookes - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
Many approaches to unconstrained face identification exploit small patches which are
unaffected by distortions outside their locality. A larger area usually contains more …

IPMA: Indirect patterns mining algorithm

T Herawan, A Noraziah, Z Abdullah, MM Deris… - Advanced Methods for …, 2013 - Springer
Indirect pattern is considered as valuable and hidden information in transactional database.
It represents the property of high dependencies between two items that are rarely occurred …

[PDF][PDF] Task scheduling model of cloud computing based on firefly algorithm

J Hu, Y Fu - International Journal of Hybrid Information Technology, 2015 - gvpress.com
We proposed a task scheduling in cloud computing based on intelligence firefly algorithm
aimed at the disadvantages of cloud computing task scheduling. Firstly, on the basis of cloud …

[PDF][PDF] Face recognition based on multi-classifier weighted optimization and sparse representation

D Nan, Z Xu, SQ Bian - Int. J. Signal Process. Image Process. Pattern …, 2013 - Citeseer
Facial recognition (FR) is a challenging area of research due to difficulties with robust FR
when the number of training samples is very small. The state-of-the-art sparse …

Unconstrained face identification with multi-scale block-based correlation

J Gaston, M Ji, D Crookes - IEEE International Conference on …, 2017 - pure.qub.ac.uk
Many approaches to unconstrained face identification exploit small patches which are
unaffected by distortions outside of their locality. However, small patches have limited …