JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
Designing and developing IoT based security system for smart home 设计和开发基于物联网的智能家居安防系统
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133244
Md. Sharifuzzaman, Jahidul Islam, Suman Chowdhury
{"title":"Designing and developing IoT based security system for smart home","authors":"Md. Sharifuzzaman, Jahidul Islam, Suman Chowdhury","doi":"10.1080/09720529.2022.2133244","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133244","url":null,"abstract":"Abstract This paper represents Internet of Things (IoT) based security system for smart home. As technology has progressed and the use of IoT has grown, digital door locks have become increasingly common. Door Security System application uses ESP8266 and IoT technology to monitor the status of the door. Blynk is a communication protocol that allows a smartphone to communicate with a door lock system. The Door Security System is available on Android and iOS. With this automation system, users may utilize an IR (Infrared remote) remote to manage their home security system from afar. We attempted to connect door security system in our home. Obviously, we will be able to solve that problem in the future. WiFi modules connect to our home internet router and link to our IoT server. Our Android and Web applications communicate with the server as well. This program allows users to check the current state of their home appliances and control them from anywhere. Also MQ3 indicates higher overall performance than the MQ2 in phrases of distance and reaction time.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2049 - 2056"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
V-Net architecture based advanced visually meaningful image encryption technique 基于V-Net架构的先进图像加密技术
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133255
Varsha Himthani, V. Dhaka, Manjit Kaur, Prashant Hemrajani
{"title":"V-Net architecture based advanced visually meaningful image encryption technique","authors":"Varsha Himthani, V. Dhaka, Manjit Kaur, Prashant Hemrajani","doi":"10.1080/09720529.2022.2133255","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133255","url":null,"abstract":"Abstract The visually meaningful image encryption (VMIE) technique is used to offer additional security to the noise-like encrypted image by implanting the secret image in the cover image. Generally, VMIE techniques follow two steps: pre-encryption and embedding. In this paper, an advanced V-Net architecture based VMIE technique is presented. V-Net architecture is based on a Convolution Neural Network (CNN) and offered medical image segmentation, that is utilized in the image into image steganography in the proposed work. In the proposed VMIE technique, the secret image is encrypted by utilizing the 5D chaotic map to provide high security, and the encrypted secret image is implanted into the cover image using a V-Net based embedding method. CNN-based image embedding methods offer high payload capacity and imperceptibility. In these methods, the encoder hides the secret image into the cover and the decoder reconstruct the secret image. Furthermore, a CNN-based efficient decoder is designed in the proposed method. Moreover, to validate the proposed method, standard evaluation parameters are analyzed.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2183 - 2194"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48794236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MORID: MQTT oriented routing between IoT devices MORID:物联网设备之间面向MQTT的路由
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2139933
Sonam, R. Johari
{"title":"MORID: MQTT oriented routing between IoT devices","authors":"Sonam, R. Johari","doi":"10.1080/09720529.2022.2139933","DOIUrl":"https://doi.org/10.1080/09720529.2022.2139933","url":null,"abstract":"Abstract Routing is a key to exchange of the messages between the IoT enabled devices. For routing to be effective and efficient the message needs to be delivered instantly between neighboring nodes in IoT enabled network, if they are co-located in the overlapping transmission range of each other or through the cloud if the devices are located remotely. In today’s scenario, optimized routing is the need of the hour. In the proposed research work, an effort has been made to demonstrate the effective routing between publisher and subscriber through a centralized broker using IoT routing protocol such as MQTT (Message Queue Telemetry Transport). The Simulation of the protocol has been accomplished in JAVA Programming language using MOSQUITTO open-source toolkit and the results have been positive and encouraging.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2121 - 2128"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43579960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy ideals and fuzzy congruences of distributive demi-p-algebras 分配半-p代数的模糊理想与模糊同余
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-09-25 DOI: 10.1080/09720529.2021.2012889
Teferi Getachew Alemayehu, Zebider Ayenew Ageze
{"title":"Fuzzy ideals and fuzzy congruences of distributive demi-p-algebras","authors":"Teferi Getachew Alemayehu, Zebider Ayenew Ageze","doi":"10.1080/09720529.2021.2012889","DOIUrl":"https://doi.org/10.1080/09720529.2021.2012889","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59648047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A signature algorithm based on chaotic maps and factoring problems 一种基于混沌映射和分解问题的签名算法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-09-12 DOI: 10.1080/09720529.2022.2101601
N. Tahat, M. Shatnawi, S. Shatnawi, O. Ababneh, Obaida M. Al-hazaimeh
{"title":"A signature algorithm based on chaotic maps and factoring problems","authors":"N. Tahat, M. Shatnawi, S. Shatnawi, O. Ababneh, Obaida M. Al-hazaimeh","doi":"10.1080/09720529.2022.2101601","DOIUrl":"https://doi.org/10.1080/09720529.2022.2101601","url":null,"abstract":"Abstract There has been a great deal of interest in researching the behavior of chaotic systems over the past decade. They are distinguished by their sensitivity to initial conditions, continuous broad-band power spectrum, and similarity to random behavior. Chaos has possible applications in the encryption, compression, and modulation blocks of a digital communication system. The possibility of self-synchronization of chaotic oscillations has spawned a deluge of research on the cryptographic applications of chaos. FAC (Factoring) and CM (Chaotic maps) are used in this research to develop a new signature system (CM). Our system has a higher security level than any other based on a single hard number-theoretic problem since it is extremely unlikely that FAC and CM can be solved effectively at the same time. We further demonstrate that the scheme’s performance involves only minimal operations in signing and validating logarithms, and that it is impervious to attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"2783 - 2794"},"PeriodicalIF":1.4,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48316621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the eigenvalues of closed shadow graphs 关于闭影图的特征值
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2060609
F. J. Campena, Melody Mae C. Lunar, Inseok Sung
{"title":"On the eigenvalues of closed shadow graphs","authors":"F. J. Campena, Melody Mae C. Lunar, Inseok Sung","doi":"10.1080/09720529.2022.2060609","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060609","url":null,"abstract":"Abstract The energy and d-energy of a graph is the sum of the absolute values of the graphs’ adjacency and distance matrix respectively. In 2017, S. Vaidya and K. Popat determined the energy of a shadow graph of a connected graph. In this study we determine the eigenvalues and d-eigenvalues of a closed shadow graph. Thus, determining also the energy and distance energy of a closed shadow graph. As a consequence, the closed shadow graph of G is integral whenever G is integral, that is the eigenvalues of the adjacency matrix of the graph are all integers.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1937 - 1944"},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44944433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Notes on elementary proof of Graham conjecture 关于格雷厄姆猜想初等证明的注解
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-08-18 DOI: 10.1080/09720529.2021.1995221
Wei Ren
{"title":"Notes on elementary proof of Graham conjecture","authors":"Wei Ren","doi":"10.1080/09720529.2021.1995221","DOIUrl":"https://doi.org/10.1080/09720529.2021.1995221","url":null,"abstract":"Abstract We prove Graham conjecture for some cases only by elementary methods in basic number theory. Extensive notes and remarks on new results on searching for the elementary proof of Graham conjecture are presented and discussed, e.g., by induction or directed graph.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"139 2","pages":"1899 - 1921"},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41309093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of RSA with smooth prime sum 光滑素数和RSA的密码分析
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-08-18 DOI: 10.1080/09720529.2021.2000152
Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi
{"title":"Cryptanalysis of RSA with smooth prime sum","authors":"Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi","doi":"10.1080/09720529.2021.2000152","DOIUrl":"https://doi.org/10.1080/09720529.2021.2000152","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46127888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Q-smarandache pseudo clean ideals of BH-Algebra h -代数的一个Q-smarandache伪干净理想
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2099060
A. Jabbar, A. H. Hussain
{"title":"A Q-smarandache pseudo clean ideals of BH-Algebra","authors":"A. Jabbar, A. H. Hussain","doi":"10.1080/09720529.2022.2099060","DOIUrl":"https://doi.org/10.1080/09720529.2022.2099060","url":null,"abstract":"Abstract In this paper, we studied some of the properties of a Q-Samarandache pseudo BH- algebra, a Q-Samarandache pseudo ideal, a pseudo clean ideal and a Q-Samarandache pseudo clean ideal of a Q-Samarandache pseudo BH-algebra respectively and so we presented the relationships between these types of ideals.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1945 - 1950"},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59648250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nearly prime GR-submodules of GR-modules GR模的近素数GR子模
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-08-18 DOI: 10.1080/09720529.2022.2060918
Hasan Abdulraheem Jubair Al-Yasiri, Ali Abd Alhussein Zyarah, Adnan Waseel Kadhim Shubbar
{"title":"Nearly prime GR-submodules of GR-modules","authors":"Hasan Abdulraheem Jubair Al-Yasiri, Ali Abd Alhussein Zyarah, Adnan Waseel Kadhim Shubbar","doi":"10.1080/09720529.2022.2060918","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060918","url":null,"abstract":"Abstract A gamma ring(Γ− ring) is ΓR-module and W is proper ΓR-submodule. Let W be a proper ΓR-submodule of an ΓR-module is called nearly prime, for short N-P.ΓR-submodule if whenever and rγ m ∈ W implies that either or where is the Jacobson radical of . The goal of this work is to offer an intriguing way of defining and studying nearly P.ΓR-submodule of ΓR-module, for short N-P.ΓR-submodule of ΓR-module result N-P.ΓR-submodule of ΓR-module which represent generalization N-prime submodules.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1923 - 1929"},"PeriodicalIF":1.4,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41687763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信