JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
On large-hollow lifting modules 在大型空心吊装模块上
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2095108
Amira A. Abduljaleel, Sahira M. Yaseen
{"title":"On large-hollow lifting modules","authors":"Amira A. Abduljaleel, Sahira M. Yaseen","doi":"10.1080/09720529.2022.2095108","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095108","url":null,"abstract":"Abstract In this paper, we introduce the concept of Large-hollow lifting modules and we give some properties of this new kind of module.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack 一种基于改进混沌Elman神经网络的入侵检测系统,用于保护移动自组织网络免受DDoS攻击
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2075063
Tuka Kareem Jebuer
{"title":"An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack","authors":"Tuka Kareem Jebuer","doi":"10.1080/09720529.2022.2075063","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075063","url":null,"abstract":"Abstract A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41679929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complex multi–fuzzy subgroups 复多模糊子群
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2101250
M. Alsarahead, A. Al-Husban
{"title":"Complex multi–fuzzy subgroups","authors":"M. Alsarahead, A. Al-Husban","doi":"10.1080/09720529.2022.2101250","DOIUrl":"https://doi.org/10.1080/09720529.2022.2101250","url":null,"abstract":"Abstract There has been an increased recognition that more attention needs to be paid to the area of fuzzy algebra. A closer look at the literature, reveals several gaps and shortcomings such as the concept of complex multi-fuzzy subgroups. This article introduces the concept as well as investigates the nexus between complex multi-fuzzy subgroups and multi-fuzzy subgroups. Further, this article discovers that each complex multi-fuzzy subgroup produces two multi-fuzzy subgroups. Furthermore, there is additional discussion of the nexus between complex multi-fuzzy subgroups and classical subgroups. Finally, characterizes and illustrates the back-and-forth images carried by such a group homomorphism.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47981464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On pseudo valuation module and injectivity property 伪估值模块与注入性
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060919
Amnah M. Saleh, M. M. Abed
{"title":"On pseudo valuation module and injectivity property","authors":"Amnah M. Saleh, M. M. Abed","doi":"10.1080/09720529.2022.2060919","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060919","url":null,"abstract":"Abstract In this paper; we study the relationship between two modules in module theory namely injective and pseudo valuation modules. We investigated that every module has three properties which are noetherian, cyclic and regular is pseudo valuation modules. Also, if R is an Artinian ring and E is finitely generated regular module, it implies that E is (P.V.M). We proved that for an R-module E, if R is a commutative ring with E is a Noetherian, Artinian and regular module, then E is P.V.M. Finally, some definitions and new results have introduced in this paper.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47898852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About the dual soft sets theory 关于对偶软集理论
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060917
L. Al-Swidi, Mustafa. H. Hadi, Reyadh. D. Ali
{"title":"About the dual soft sets theory","authors":"L. Al-Swidi, Mustafa. H. Hadi, Reyadh. D. Ali","doi":"10.1080/09720529.2022.2060917","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060917","url":null,"abstract":"Abstract Soft sets play a prominent role in solving many engineering and scientific problems. After a thorough study of it and to the fuzzy sets, there were real scientific and engineering problems that these sets could not give a typical solution to them, so the idea of expanding these sets came up and we call them the dual soft sets. Also we defined the dual soft points differently to those sets.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48746386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Symmetric text encryption scheme based Karhunen Loeve transform 基于Karhunen - Loeve变换的对称文本加密方案
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2095114
N. F. H. Al-Saffar, Inaam. R. Al-Saiq
{"title":"Symmetric text encryption scheme based Karhunen Loeve transform","authors":"N. F. H. Al-Saffar, Inaam. R. Al-Saiq","doi":"10.1080/09720529.2022.2095114","DOIUrl":"https://doi.org/10.1080/09720529.2022.2095114","url":null,"abstract":"Abstract Recently cryptography is one of the essence areas of study. There are two types of cryptography, this paper is concerned with the simplest and fastest which is “Symmetric Key Cryptography”. Symmetric encryption text information is widely known as an effective and secure method for the purpose of secure transmission. In this paper, we present a new symmetric encryption scheme for text encryption and decryption based on Karhunen Loeve transform, where Karhunen Loeve transform is a reversible linear transform. The time complexity of the proposed scheme is calculated for both encryption and decryption. The proposed scheme has an has efficiency according to the security measures.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47244408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East 最小生成树在中东地区Covid-19网络结构分析中的应用
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2060923
Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi
{"title":"Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East","authors":"Baidaa Saleh Mahdi, Jalal Hatem Hussein Al-Bayati, Amer J. Al-Mahdawi","doi":"10.1080/09720529.2022.2060923","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060923","url":null,"abstract":"Abstract Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48520666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing featured supereulerian graph 构造特征超欧拉图
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2021.2005232
M. Algefari
{"title":"Constructing featured supereulerian graph","authors":"M. Algefari","doi":"10.1080/09720529.2021.2005232","DOIUrl":"https://doi.org/10.1080/09720529.2021.2005232","url":null,"abstract":"Abstract A graph is supereulerian if it has a spanning eulerian subgraph. In this paper we construct a supereulerian graph controlling its matching number, minimum degree and edge connectivity, where δ(G) < α′(G)","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44658548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On simple submodules and C-rings 在简单子模和c环上
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2083682
Shaymaa E. Sarhan, M. M. Abed
{"title":"On simple submodules and C-rings","authors":"Shaymaa E. Sarhan, M. M. Abed","doi":"10.1080/09720529.2022.2083682","DOIUrl":"https://doi.org/10.1080/09720529.2022.2083682","url":null,"abstract":"Abstract In this paper; we will study the relationship between simple submodules of M and the C-ring. A ring R is called C-ring if every torsion module M over R has simple submodules. We investigated that if M is a torsion module over a semisimple ring; so, R is C-ring. Also, we study C-ring when R is Noetherian and T(M) = M such that any direct sum of modules with (SIP) has (SSP) implies that R is C- ring. We proved that if M is a torsion module and M = W + W′, this means R is C-ring where W and W′ are direct sum of M.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44689379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on security issues and solutions in cloud computing 回顾云计算中的安全问题和解决方案
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133253
Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar
{"title":"Review on security issues and solutions in cloud computing","authors":"Devanshi Ledwani, Himanshi Saini, Lalita Ledwani, Swami Nisha Bhagirath, Vaibhav Bhatnagar","doi":"10.1080/09720529.2022.2133253","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133253","url":null,"abstract":"Abstract Cloud computing is the on-demand availability of a group of networked elements providing services, especially data storage and computing power, without actual management and addressing by the user. In lieu, the entire suite of hardware and software is managed by a provider and have functions dispersed over various location, each location being a data center. Since cloud computing users rely on sharing resources and may request multiple cloud services concurrently, a dynamic provision must be there so that all the resources are available to the user in a competent manner. However, despite abundantly available benefits, many organizations are still skeptical about using the cloud computing service model because of security concerns associated with the service. The paper also discusses different types of cloud security, controls of cloud security and algorithms used for emanating the privacy of the client’s data. In this paper, a CNN and SVM model is also applied for detection Anti-Spoofing images for identification on images on cloud.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49242289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信