{"title":"The extremal Sombor index of trees and unicyclic graphs with given matching number","authors":"Ting Zhou, Zhen Lin, L. Miao","doi":"10.1080/09720529.2021.2015090","DOIUrl":"https://doi.org/10.1080/09720529.2021.2015090","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43632016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abelian Non Jordan-Lie Inner Ideals of the Orthogonal Finite Dimensional Lie Algebras","authors":"H. Shlaka, F. Kareem","doi":"10.1080/09720529.2022.2083152","DOIUrl":"https://doi.org/10.1080/09720529.2022.2083152","url":null,"abstract":"Abstract Let A associative algebra (finite dimensional over ) of any characteristic with involution * and let K = skew(A) = {a ∈ A|a* = -a} be its corresponding sub-algebra under the Lie product [a, b] = ab - ba for all a, b ∈ A. If A = End V for some finite dimensional vector space over and * is an adjoint involution with a symmetric non-alternating bilinear form on V, then * is said to be orthogonal. In this paper, abelian inner ideals which are non Jordan-Lie of such Lie algebras were defined, considered, studied, and classified. Some examples and results were provided. It is proved that every abelian inner ideal which is non Jordan-Lie B of K can be expressed as B = {v, H ⊥}, where v is an isotropic vector of a hyperbolic plane H ⊆ V and H ⊥ is the orthogonal subspace of H.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1547 - 1561"},"PeriodicalIF":1.4,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42837685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. H. Agustin, L. Susilowati, Dafik, I. N. Cangul, N. Mohanapriya
{"title":"On the vertex irregular reflexive labeling of several regular and regular-like graphs","authors":"I. H. Agustin, L. Susilowati, Dafik, I. N. Cangul, N. Mohanapriya","doi":"10.1080/09720529.2022.2063543","DOIUrl":"https://doi.org/10.1080/09720529.2022.2063543","url":null,"abstract":"Abstract A total k-labeling is defined as a function g from the edge set to the first natural number ke and a function f from the vertex set to a non-negative even number up to 2kv , where k = max{ke , 2kv }. A vertex irregular reflexive k-labeling of the graph G is total k-labeling if wt(x) ¹ wt(x¢) for every two different vertices x and x¢ of G, where wt(x) = f (x) + Σ xy ∈E(G) g(xy). The reflexive vertex strength of the graph G, denoted by rvs(G), is the minimum k for a graph G with a vertex irregular reflexive k-labeling. We will determine the exact value of rvs(G) in this paper, where G is a regular and regular-like graph. A regular graph is a graph where each vertex has the same number of neighbors. A regular graph with all vertices of degree r is called an r-regular graph or regular graph of degree r. A regular-like graphs is an almost regular graph that we develop in a new definition and we called it with (s, r) -almost regular graphs.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1457 - 1473"},"PeriodicalIF":1.4,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47613200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An equivalence based classification of [6, 3, 4] error correcting codes over GF(5)","authors":"Sharmin Sultana, H. Akter, P. Dey","doi":"10.1080/09720529.2022.2026625","DOIUrl":"https://doi.org/10.1080/09720529.2022.2026625","url":null,"abstract":"Abstract We were able to classify all 1-error correcting [5, 3] codes over GF(5) in paper [1] and [5, 2] ternary codes in paper [2]. Now, our focus is an equivalence based classification of error correcting linear codes of length 6 over GF(5). In paper [3], we investigated the equivalence of [6,3,4] codes of length 6 and dimension 3 over GF(4). In this paper we classify the [6,3,4] codes over GF(5). We explore the weight distribution of these codes as well as their duals.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1425 - 1434"},"PeriodicalIF":1.4,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42708786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INF-hesitant fuzzy ideals of semigroups and their INF-hesitant fuzzy translations","authors":"Uraiwan Jittburus, P. Julatha, Aiyared Iampan","doi":"10.1080/09720529.2022.2060608","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060608","url":null,"abstract":"Abstract The main aims of this paper are to introduce the concept of an INF-hesitant fuzzy ideal in a semigroup and its INF-hesitant fuzzy translations, and to investigate their properties. Further, characterizations of the INF-hesitant fuzzy ideal are given in terms of sets, fuzzy sets, Pythagorean fuzzy sets, interval-valued fuzzy sets, hesitant fuzzy sets, and its INF-hesitant fuzzy translations.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1487 - 1507"},"PeriodicalIF":1.4,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47662577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On gs-pseudo-injective modules","authors":"Eman Ayed Naim, Akeel Ramadan Mehdi","doi":"10.1080/09720529.2022.2082724","DOIUrl":"https://doi.org/10.1080/09720529.2022.2082724","url":null,"abstract":"Abstract As a proper generalization of pseudo-injectivity, we introduce and investigate gs-pseudo-injective modules. A right module M over a ring R is said to be gs-pseudo- N -injective (where N is a right R -module) if every R -monomorphism from a submodule of soc ( N ) soc ( RR ) into M extends to N. A module M is said to be gs-pseudo-injective, if M is gs-pseudo-M-injective. We obtain various characterizations and properties of these modules. Some results on pseudo-injectivity are extended to gs-pseudo-injectivity.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1535 - 1545"},"PeriodicalIF":1.4,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45732267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tayyiba Sattar, M. S. Sardar, M. Alaeiyan, M. R. Farahani, M. Cancan, Ziyattin Taş
{"title":"The study of the b-choromatic number of some classes of fractal graphs","authors":"Tayyiba Sattar, M. S. Sardar, M. Alaeiyan, M. R. Farahani, M. Cancan, Ziyattin Taş","doi":"10.1080/09720529.2022.2067390","DOIUrl":"https://doi.org/10.1080/09720529.2022.2067390","url":null,"abstract":"Abstract In graph coloring, labels are assigned to graph elements according to certain constraints. Colors are a special case of graph labeling as well as in practical applications, graph coloring also poses some theoretical challenges. A topic related to graph coloring will be discussed in this study, i.e., b-chromatic number. In proper coloring, edges, vertices, or both of them are colored so that they are distinct from one another. A b-coloring of m colors of a graph G is similar to proper coloring in which at least one vertex from each color class is connected to (m-1) other colors. The b-chromatic number of a graph G is the greatest positive number k such that G admits a b-coloring with k colors and is represented by ϕ(G). Fractals are geometric objects that are self-similar at multiple scales and their geometric measurements are different from fractal measurements. In this paper, we will evaluate the b-chromatic number of Fractal type graphs, i.e., Sierpinski network S(n; Kk) (where Kk is a complete graph of order k) and Sierpinski gasket network S(n). Firstly, we will compute the b-chromatic number of S(n; K3), S(n; K4) and S(n; K5) for n ≥ 2. After that, we will generalize the result for the Sierpinski network of complete graph Kk. In addition, we will also determine the b-choromatic number of Sierpinski gasket graph S(n). As an application, we will also determine the b-chromatic number of Sierpinski graph of house graph.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1509 - 1524"},"PeriodicalIF":1.4,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48361965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of α-open set and α-closure operator via digraph","authors":"Hassanein Falah, Sarah Nahed Abdul Abbas","doi":"10.1080/09720529.2022.2068599","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068599","url":null,"abstract":"Abstract In this paper, authors defined a conical open set’s characterization. As a consequence, they introduced the (- space and - space)-open subdigraph in graph theory. Their interrelationships were investigated. As a result, several theorems have been proven. The aim of this paper, is to find graph theory applications due to the difficulty in finding applications in topological spaces, which are pure mathematics branches. We defined a conical open set’s characterization. As a consequence, we introduced the ( space and - space )-open subdigraph in graph theory. Their interrelationships were investigated. As a result, several theorems have been proven.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1475 - 1485"},"PeriodicalIF":1.4,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45308437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new symmetrical cryptosystem based cellular automata and chaotic map function","authors":"Asmaa Boudali, N. H. Said, A. Ali-Pacha","doi":"10.1080/09720529.2021.2020427","DOIUrl":"https://doi.org/10.1080/09720529.2021.2020427","url":null,"abstract":"Abstract Multimedia data including text, audio, image, and video are increasingly transmitted over networks or stored in digital format. Therefore, secure transmission and storage are required to preserve it. This is why the utilization of cryptography has become imperative to establish new approaches for rising security. The cryptographic systems rely on cellular automata (CA) and chaotic systems, which are fundamental in various cryptographic applications such as key generation and image encryption. Some of them are complex and others have little key space. In this paper, a novel research work based on cellular automata and chaotic logistic mapping is proposed. Overall, the paper aims to propose a new cryptographic system that produces encrypted data with random characteristics. A novel technique is adopted to develop the evolution of configurations in elementary cellular automata (ECA) which makes the obtained result more random. Simulation results demonstrate that the proposed approach has a high level of security and resists various attacks. In addition, it outperforms some existing image encryption algorithms.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1435 - 1455"},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43337523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}