JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
Information security based on sub-system keys generator by utilizing polynomials method and logic gate 基于多项式法和逻辑门的子系统密钥生成器的信息安全
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1549
K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser
{"title":"Information security based on sub-system keys generator by utilizing polynomials method and logic gate","authors":"K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser","doi":"10.47974/jdmsc-1549","DOIUrl":"https://doi.org/10.47974/jdmsc-1549","url":null,"abstract":"Information security is the biggest and most complex problem at present because of its great impact on modern software in all fields. Therefore, many researchers are working to develop modern methods of protecting data from modification or theft or even accessing it in one way or another. As dealing with data is a very sensitive matter in terms of sending this data from one party to another through the Internet or social media. The protection of that data requires the use of algorithms to encrypt or conceal the data with the proposed and used algorithms, and these algorithms work based on the proposed key exchange principle, so many of these algorithms need a key generator to work with other than the key is public or private for encryption or decryption the blade. Our proposed developed a key generation sub-system, as this system consists of two parts, the first part aimed to generate the first key (the first 64-bit subkey), while the second part (the second subsystem) will generate the second key (the second subkey is 64-bit). As the two sub-systems work to generate keys in different ways, the first system uses the principle of electronic gates to generate the keys randomly, while the second system uses binary text and LFSR. The idea in these sub-systems is that they work together in encrypting and decrypting data, requiring that the sender and receiver have the keys to complete the process. The results obtained from the two subsystems show the power in protecting data from reading or decoding its code, as the message consists of only a part of the key and the second part is at the receiver, and this gives stronger immunity in this encrypted data.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"28 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry 现代度量(MM):使用人工智能和数据分析应用程序的功能点进行软件规模估计,并使用印度软件工业找到功能单元的工作量调节器
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1734
J. T. M. Dhas, J. Midhunchakravarthy
{"title":"Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry","authors":"J. T. M. Dhas, J. Midhunchakravarthy","doi":"10.47974/jdmsc-1734","DOIUrl":"https://doi.org/10.47974/jdmsc-1734","url":null,"abstract":"SPM, Software Project Management is an engineering process for scheduling, developing, testing, and maintaining a software system. The size of a software is one of the important attributes in determining all the activities of SPM. Price, time, and effort are the basic factors for developing software in a successful and profitable manner. The fast explosions in technological development of software systems attracted all the fields that existed in the universe. The modern software system uses many programming languages, domains, operating systems, technologies, development cycles, topologies, etc. So, the industry is expecting a new, versatile, and highly updated sizing technique for modern software. Modern Metrics (MM) is a new anticipated size estimation technique for present software systems with updated functional values and metrics using Function Point (FP). This article analyzed the functional unit metric values (effort modifiers) of the MM with real world applications. MM is a novel method for determining the solution to the SPM challenges.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy RG-ideals of RG-algebra rg代数的模糊rg理想
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1552
A. Hameed, Show Mohammed Abraham, A. Abed
{"title":"Fuzzy RG-ideals of RG-algebra","authors":"A. Hameed, Show Mohammed Abraham, A. Abed","doi":"10.47974/jdmsc-1552","DOIUrl":"https://doi.org/10.47974/jdmsc-1552","url":null,"abstract":"The aim of this paper is to introduce the terms fuzzy RG-subalgebra of RG -algebra, provide a few important examples, and look at a few aspects in this paper. The image and pre-image of fuzzy RG-subalgebra of RG-algebra are presented, as well as an introduction to the concept of fuzzy RG-ideal of RG-algebra, and several properties and theorems are proved.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"276 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On characterizations some of subgroups of the dihedral group D2n 二面体群D2n的若干子群的刻画
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1553
Hader Baqer Shelash, Hasanain Hamid Ahmad, Ahmed J. Obaid
{"title":"On characterizations some of subgroups of the dihedral group D2n","authors":"Hader Baqer Shelash, Hasanain Hamid Ahmad, Ahmed J. Obaid","doi":"10.47974/jdmsc-1553","DOIUrl":"https://doi.org/10.47974/jdmsc-1553","url":null,"abstract":"The finite group M is an H-group if every subgroup in M is an M-subgroup, and we say M is a j-group if every subgroup in M is a j-subgroup. In this study, we look at some of the characteristics of some dihedral group subgroups. As a result, we have student relationships between several subgroups, the quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On permutation topological groups with their basic properties 论置换拓扑群及其基本性质
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1551
Abu Firas Muhammad Jawad Al Musawi, E. Suleiman
{"title":"On permutation topological groups with their basic properties","authors":"Abu Firas Muhammad Jawad Al Musawi, E. Suleiman","doi":"10.47974/jdmsc-1551","DOIUrl":"https://doi.org/10.47974/jdmsc-1551","url":null,"abstract":"In this research, one of the non-classical sets, the permutation set, is utilized to analyze a new class of topological groups induced by β-sets, it is named permutation topological groups, and investigates some of its basic features. In addition, several results are applied to our permutation topological group class.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized deep learning methodology for intruder behavior detection and classification in cloud 优化了云环境下入侵者行为检测与分类的深度学习方法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1516
{"title":"Optimized deep learning methodology for intruder behavior detection and classification in cloud","authors":"","doi":"10.47974/jdmsc-1516","DOIUrl":"https://doi.org/10.47974/jdmsc-1516","url":null,"abstract":"Apps, networks, frameworks, and services are all made possible by the cloud. In order to get the most out of the improved accessibility and computational capabilities, the Service Providers can offer an optimal use of current services. Application services have been revolutionised as their launch since they are useful and cost-effective for both suppliers and users. Increasingly, cyber defence is a vital research area in today’s environment, where networks are essential. The software and hardware of a network are constantly monitored by an intrusion detection framework (IDF), which is an essential part of any cyber defence plan. Many of the current IDSs are still struggling to improve detection performance, reduce false alarm rates and detect new threats. Based on parametric computation analysis, this study provides a deep learning approach to optimize cloud networks and to identify intruders. Results of suggested approach have been displayed from data compared to current methods in the conclusion section.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I-prime fuzzy submodules i '模糊子模块
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1563
Manal Ali Sagban, Ali Abd Alhussein Zyarah, A. H. Hussain
{"title":"I-prime fuzzy submodules","authors":"Manal Ali Sagban, Ali Abd Alhussein Zyarah, A. H. Hussain","doi":"10.47974/jdmsc-1563","DOIUrl":"https://doi.org/10.47974/jdmsc-1563","url":null,"abstract":"In this paper, we introduce a new generalization of prime F.S.M (P.F.S), called I- prime F.S.M and I be any ideal of a commutative ring R also, we study some properties of it and giving some characterizations of I-P.F.S. We establish the situation of I-P.F.Ss in F.M of the R-module and, we show that I-P.F.S and P.F.S are coincident under certain conditions.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart oyster mushroom cultivation using automatic fuzzy logic controller 一种基于自动模糊逻辑控制器的智能平菇栽培技术
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1731
Dakhole Dipali, Thiruselvan Subramanian, G. Kumaran
{"title":"A smart oyster mushroom cultivation using automatic fuzzy logic controller","authors":"Dakhole Dipali, Thiruselvan Subramanian, G. Kumaran","doi":"10.47974/jdmsc-1731","DOIUrl":"https://doi.org/10.47974/jdmsc-1731","url":null,"abstract":"Oyster mushroom cultivation is an eco-friendly, profitable agribusiness because of its nutritious and medicinal value but it is labor-intensive, and it grows in a sensitive environment. It must use an autonomous environment control system to optimize and offer the necessary growing conditions. To optimize the temperature and humidity and consequently maximize mushroom production, a smart mushroom watering, monitoring, and controlling system using fuzzy logic controllers (FLC) have been developed. This study suggests installing an Internet of Things (IoT) node that uses DHT22 sensors, an ESP32 board, and relays to control actuators (sprinkler, cooling fan, humidifier, and heater) in a smart oyster mushroom house. The controller on sensing current temperature and humidity values using the fuzzy logic technique switches on/off the actuators automatically. The data collected at each IoT node is collected and visualized on the ThingSpeak platform. The computed response time for actuators using FLC is compared with that calculated using a simple ON-OFF method. The findings demonstrate that response time calculation using fuzzy logic is significantly accurate and faster than a simple ON-OFF approach. Additionally, the graphs created in live on ThingSpeak, demonstrate that the FLC algorithm is more robust and effective than the simple ON-OFF algorithm.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A4-graph for the twisted group 3D4 (3) 扭曲群3D4(3)图
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1562
Salwa Mohammed Hamid, A. Aubad
{"title":"A4-graph for the twisted group 3D4 (3)","authors":"Salwa Mohammed Hamid, A. Aubad","doi":"10.47974/jdmsc-1562","DOIUrl":"https://doi.org/10.47974/jdmsc-1562","url":null,"abstract":"Assume that G is a finite group and X = tG where t is non-identity element with t3 = 1. The simple graph with node set being X such that a, b ∈ X, are adjacent if ab-1 is an involution element, is called the A4-graph, and designated by A4(G, X). In this article, the construction of A4(G, X) is analyzed for G is the twisted group of Lie type 3D4(3).","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some diagonalizable matrices, connected with difference equations of degree 3 与3次差分方程相连接的若干可对角化矩阵
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2059921
D. Savin
{"title":"Some diagonalizable matrices, connected with difference equations of degree 3","authors":"D. Savin","doi":"10.1080/09720529.2022.2059921","DOIUrl":"https://doi.org/10.1080/09720529.2022.2059921","url":null,"abstract":"Abstract In this paper, we obtain a certain class of diagonalizable matrices, starting from a certain difference equation of degree 3, which is related to Pell’s numbers.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2765 - 2771"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49251551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信