JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
IoT-based air pollution detection, monitoring and controlling system 基于物联网的空气污染检测、监测和控制系统
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133254
Dipti Mitra, A. Saha
{"title":"IoT-based air pollution detection, monitoring and controlling system","authors":"Dipti Mitra, A. Saha","doi":"10.1080/09720529.2022.2133254","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133254","url":null,"abstract":"Abstract Air pollution is one of the most concerning and alarming problems in the modern world, and it is increasing day by day due to a large number of industries and urbanization. When pollutants are released into the air from several sources, such as the combustion of fossil fuels, industrial emissions, agricultural sources, and so on, it is referred to as air pollution. It is acknowledged as a significant risk factor for noncommunicable diseases (NCDs) that include lung cancer, stroke, heart disease, and acute and chronic respiratory illnesses including asthma. An estimated seven million individuals die globally every year due to air pollution as the world health organization reported on their website. In this paper, we have proposed an Internet of Things (IoT) based air pollution detection, monitoring, and controlling system. The system detects the various air pollutants by combining the different sensors, helps users to monitor the received pollutants levels over LCD, user’s mobile app, and cloud server, and controls the air quality up to a certain level when pollutants levels cross the threshold limits. NodeMCU plays an important role to exchange the data or information between the proposed system devices. We have designed a prototype for demonstrating the proposed system performance. The prototype testing and result show’s that the proposed system works significantly well in terms of detection, monitoring, and controlling air pollution, especially proposed controllers exhibit impressive performance for maintaining the air quality.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2173 - 2182"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43328897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling 基于混合混沌映射置乱的图形信号处理和束状虫群优化图像隐写
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2139934
Shikha Chaudhary, Saroj Hiranwal, C. Gupta
{"title":"Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling","authors":"Shikha Chaudhary, Saroj Hiranwal, C. Gupta","doi":"10.1080/09720529.2022.2139934","DOIUrl":"https://doi.org/10.1080/09720529.2022.2139934","url":null,"abstract":"Abstract This paper put forwards a secure image steganography technique for transmitting sensitive data using a Tunicate swarm optimization algorithm. A hybrid chaotic map-based image scrambling method is proposed with the combination of Tent and Tinkerbell chaotic maps. The scrambling of the secret image provides an added level of security in data hiding. The graph signal processing of cover image using the Meyer wavelet filter is performed to conceal the secret data within the transformed cover image using the alpha blending operation. To discover the optimal value of alpha for alpha blending, the tunicate swarm optimization algorithm is employed. To take the hidden information out at receiver end, the reverse approach is applied. The experimental results revealed that the embedding technique using the tunicate algorithm with a hybrid chaotic map provides better imperceptibility and robustness in comparison to the existing graph signal-based image steganography technique. The investigation is done on PSNR, MSE and SSIM performance parameters for evaluating the proposed technique.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2159 - 2171"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44456963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid convolutional long short-term memory (CNN-LSTM) based natural language processing (NLP) model for sentiment analysis of customer product reviews in Bangla 基于混合卷积长短期记忆(CNN-LSTM)的自然语言处理(NLP)模型用于孟加拉语客户产品评论的情感分析
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133250
Mahbuba Rahman Purba, Moniya Akter, Rubayea Ferdows, Fuad Ahmed
{"title":"A hybrid convolutional long short-term memory (CNN-LSTM) based natural language processing (NLP) model for sentiment analysis of customer product reviews in Bangla","authors":"Mahbuba Rahman Purba, Moniya Akter, Rubayea Ferdows, Fuad Ahmed","doi":"10.1080/09720529.2022.2133250","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133250","url":null,"abstract":"Abstract Sentiment Analysis (SA) examines how people feel about products, services, people, organizations, events etc. Most of the Natural language processing on SA research has focused on English. In the case of Bangla, it lacks sufficient study as well as a proper dataset. All previous analyses employed KNN, NB, and other methods. We develop a natural language processing (NLP) model for separating opinion and sentiment from Bangla customer surveys. This technology isolates extreme client opinions to help with business and marketing decisions. Bangladesh is embracing e-commerce and f-commerce. Client comments and evaluations are becoming more significant in judging product or service quality, and this industry is evolving toward internet distribution. Organizations utilize client audits to check product quality. Our objective is to systematically collect client feedback and understand their product reaction. We used a hybrid CNN-LSTM based NLP model to classify Bangla texts in 3 viewpoint categories (positive, negative and neutral). We tested our model using a Bangla dataset that we generated. For our dataset, we collected polls and comments from websites and social media. Finally, among the three evaluation matrices, the f-1 score is providing the highest average, and the three-opinion technique is 87.22 percent accurate in determining the performance of our task.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2111 - 2120"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47018130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for user authentication using keystroke dynamics 一种使用击键动力学进行用户身份验证的新方法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133241
Kirty Shekhawat, Devershi Pallavi Bhatt
{"title":"A novel approach for user authentication using keystroke dynamics","authors":"Kirty Shekhawat, Devershi Pallavi Bhatt","doi":"10.1080/09720529.2022.2133241","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133241","url":null,"abstract":"Abstract One Time Password (OTP) and Text Password are becoming less important in the current age of cybercrime because of the rapid development of new security systems. A user authentication system that is easy, robust, scalable, and cost-effective is a must. For both security and surveillance purposes, keystroke biometrics is a viable option. Behavior biometrics, of which keystroke biometrics is a subset, is used to identify individuals based on the way they type. Typing habits are not set in stone and are subject to change depending on the scenario, the device being used, and the user’s emotional state. As a result, the performance of a keystroke biometrics-based user authentication system is influenced by how well the retrieved information from typing and classification algorithms is processed. Using a keyboard with an array of pressure sensors, this research presents a unique way to keystroke dynamics-based authentication. The goal of this study is to develop user profiles that are unique and different in order to improve the suggested system’s efficiency. A real-world dataset is used to test the suggested method. The outcome is achieved with a 97% success rate in experiments.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2015 - 2027"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46676202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Foreword 前言
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720510.2022.2145706
R. C. Poonia, K. Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass
{"title":"Foreword","authors":"R. C. Poonia, K. Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass","doi":"10.1080/09720510.2022.2145706","DOIUrl":"https://doi.org/10.1080/09720510.2022.2145706","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"iii - iv"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41585717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editors 特邀编辑
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2156438
R. C. Poonia, Kashinath Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass
{"title":"Guest Editors","authors":"R. C. Poonia, Kashinath Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass","doi":"10.1080/09720529.2022.2156438","DOIUrl":"https://doi.org/10.1080/09720529.2022.2156438","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":"ii - ii"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49012537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using clustering scheme: Prevent reply attack in vehicular ad-hoc networks (VANET) 使用集群方案:防止车载自组织网络(VANET)中的回复攻击
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133240
Mousumi Ahmed Mimi
{"title":"Using clustering scheme: Prevent reply attack in vehicular ad-hoc networks (VANET)","authors":"Mousumi Ahmed Mimi","doi":"10.1080/09720529.2022.2133240","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133240","url":null,"abstract":"Abstract Many researchers work on VANET which is a hot topic for today’s research work. VANET transfers data, messages sent and makes life safe but lots of consequences also occur. Among them, there are lots of attacks that can happen in VANET. Replay attacks, DoS attacks, and DDoS attacks are among them. Many researchers work to detect replay and DDoS attacks but they do not provide any solution for preventing the attacks. Some researchers provide some researches with algorithms to prevent replay attacks. All of them apply V2I communication without clustering to prevent replay attacks but they cannot prevent it with 100% accuracy. They do not apply any clustering formula to prevent replay attacks. To prevent replay attacks I will apply V2V communication with clustering formula. By using SUMO, NS3 I will prove that applying the clustering formula prevents attacks more than without applying it to the cluster.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2007 - 2014"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44429499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A type of public cryptosystem using polynomials and pell sequences 一种使用多项式和pell序列的公共密码系统
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133237
Gudela Ashok, S. Ashok Kumar, D. Chaya Kumari, Mathe Ramakrishna
{"title":"A type of public cryptosystem using polynomials and pell sequences","authors":"Gudela Ashok, S. Ashok Kumar, D. Chaya Kumari, Mathe Ramakrishna","doi":"10.1080/09720529.2022.2133237","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133237","url":null,"abstract":"Abstract In this paper, a kind of Public key Cryptosystem is established using Polynomials and Pell sequences by exploiting the properties of both Polynomials and Pell sequences by converting Polynomial into Octal and Binary system. Securing the digital data and modifying it by using modern Cryptographic methods that plays a vital role in Network Security.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1951 - 1963"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41567416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recursive approach for multiple step-ahead software fault prediction through long short-term memory (LSTM) 基于LSTM的多步超前软件故障预测递归方法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133251
Md. Rashedul Islam, M. Begum, Md. Nasim Akhtar
{"title":"Recursive approach for multiple step-ahead software fault prediction through long short-term memory (LSTM)","authors":"Md. Rashedul Islam, M. Begum, Md. Nasim Akhtar","doi":"10.1080/09720529.2022.2133251","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133251","url":null,"abstract":"Abstract The advancement of technologies demands a sustainable solution. To ensure the software system’s sustainability, diminishing the software faults before the implementation requires utmost attention, along with an effective procedure to predict the faults. A software system’s maximum number of faults can be neutralized if it can be predicted at the earliest possible time. Therefore, we applied Long short-term memory (LSTM) to predict the faults of multi-time stamps ahead using a recursive approach. The Min-Max scaler and one of the power transformation methods, Box-Cox are used to normalize the software fault data. The traditional software reliability growth models (SRGMs) are also used to predict faults. The performance of the LSTM and SRGMs models are compared based on their prediction accuracy evaluation. The observed prediction error of LSTM models is much lower than the SRGMs.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2129 - 2138"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49123172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET VANET中使用人工智能实现数据安全和位置隐私的密钥分发
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133256
Shivkant Kaushik, R. C. Poonia, S. Khatri
{"title":"Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET","authors":"Shivkant Kaushik, R. C. Poonia, S. Khatri","doi":"10.1080/09720529.2022.2133256","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133256","url":null,"abstract":"Abstract Location privacy & data security in VANET are now becoming most important in today’s paradigm of information age. Unauthorized access to location information of vehicles may pose a significant security threat, thus it is necessary to secure this information from intruders. In proposed work, Artificial intelligence based RF range approximation is used with multi key controlled cryptography for enhancement of location privacy and data security in service location protocol of VANET’S.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2195 - 2203"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46929173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信