{"title":"On large-hollow lifting modules","authors":"Amira A. Abduljaleel, Sahira M. Yaseen","doi":"10.1080/09720529.2022.2095108","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095108","url":null,"abstract":"Abstract In this paper, we introduce the concept of Large-hollow lifting modules and we give some properties of this new kind of module.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2739 - 2745"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack","authors":"Tuka Kareem Jebuer","doi":"10.1080/09720529.2022.2075063","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075063","url":null,"abstract":"Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2759 - 2764"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41679929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex multi–fuzzy subgroups","authors":"M. Alsarahead, A. Al-Husban","doi":"10.1080/09720529.2022.2101250","DOIUrl":"https://doi.org/10.1080/09720529.2022.2101250","url":null,"abstract":"Abstract There has been an increased recognition that more attention needs to be paid to the area of fuzzy algebra. A closer look at the literature, reveals several gaps and shortcomings such as the concept of complex multi-fuzzy subgroups. This article introduces the concept as well as investigates the nexus between complex multi-fuzzy subgroups and multi-fuzzy subgroups. Further, this article discovers that each complex multi-fuzzy subgroup produces two multi-fuzzy subgroups. Furthermore, there is additional discussion of the nexus between complex multi-fuzzy subgroups and classical subgroups. Finally, characterizes and illustrates the back-and-forth images carried by such a group homomorphism.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2707 - 2716"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47981464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On pseudo valuation module and injectivity property","authors":"Amnah M. Saleh, M. M. Abed","doi":"10.1080/09720529.2022.2060919","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060919","url":null,"abstract":"Abstract In this paper; we study the relationship between two modules in module theory namely injective and pseudo valuation modules. We investigated that every module has three properties which are noetherian, cyclic and regular is pseudo valuation modules. Also, if R is an Artinian ring and E is finitely generated regular module, it implies that E is (P.V.M). We proved that for an R-module E, if R is a commutative ring with E is a Noetherian, Artinian and regular module, then E is P.V.M. Finally, some definitions and new results have introduced in this paper.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2753 - 2757"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47898852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About the dual soft sets theory","authors":"L. Al-Swidi, Mustafa. H. Hadi, Reyadh. D. Ali","doi":"10.1080/09720529.2022.2060917","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060917","url":null,"abstract":"Abstract Soft sets play a prominent role in solving many engineering and scientific problems. After a thorough study of it and to the fuzzy sets, there were real scientific and engineering problems that these sets could not give a typical solution to them, so the idea of expanding these sets came up and we call them the dual soft sets. Also we defined the dual soft points differently to those sets.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2717 - 2722"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48746386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric text encryption scheme based Karhunen Loeve transform","authors":"N. F. H. Al-Saffar, Inaam. R. Al-Saiq","doi":"10.1080/09720529.2022.2095114","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095114","url":null,"abstract":"Abstract Recently cryptography is one of the essence areas of study. There are two types of cryptography, this paper is concerned with the simplest and fastest which is “Symmetric Key Cryptography”. Symmetric encryption text information is widely known as an effective and secure method for the purpose of secure transmission. In this paper, we present a new symmetric encryption scheme for text encryption and decryption based on Karhunen Loeve transform, where Karhunen Loeve transform is a reversible linear transform. The time complexity of the proposed scheme is calculated for both encryption and decryption. The proposed scheme has an has efficiency according to the security measures.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2773 - 2781"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47244408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi
{"title":"Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East","authors":"Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi","doi":"10.1080/09720529.2022.2060923","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060923","url":null,"abstract":"Abstract Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2723 - 2728"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48520666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing featured supereulerian graph","authors":"M. Algefari","doi":"10.1080/09720529.2021.2005232","DOIUrl":"https://doi.org/10.1080/09720529.2021.2005232","url":null,"abstract":"Abstract A graph is supereulerian if it has a spanning eulerian subgraph. In this paper we construct a supereulerian graph controlling its matching number, minimum degree and edge connectivity, where δ(G) < α′(G)","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2729 - 2738"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44658548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On simple submodules and C-rings","authors":"Shaymaa E. Sarhan, M. M. Abed","doi":"10.1080/09720529.2022.2083682","DOIUrl":"https://doi.org/10.1080/09720529.2022.2083682","url":null,"abstract":"Abstract In this paper; we will study the relationship between simple submodules of M and the C-ring. A ring R is called C-ring if every torsion module M over R has simple submodules. We investigated that if M is a torsion module over a semisimple ring; so, R is C-ring. Also, we study C-ring when R is Noetherian and T(M) = M such that any direct sum of modules with (SIP) has (SSP) implies that R is C- ring. We proved that if M is a torsion module and M = W + W′, this means R is C-ring where W and W′ are direct sum of M.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2747 - 2751"},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44689379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on security issues and solutions in cloud computing","authors":"Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar","doi":"10.1080/09720529.2022.2133253","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133253","url":null,"abstract":"Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2149 - 2158"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}