JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
L(1, d)-labeling number of direct product of two cycles L(1, d)-两循环直积的标记数
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-24 DOI: 10.1080/09720529.2021.1930652
Qiong Wu, W. Shiu
{"title":"L(1, d)-labeling number of direct product of two cycles","authors":"Qiong Wu, W. Shiu","doi":"10.1080/09720529.2021.1930652","DOIUrl":"https://doi.org/10.1080/09720529.2021.1930652","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44035497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized (α, β)-derivations in 3-prime near-rings 3-素数近环中的广义(α,β)-导子
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-24 DOI: 10.1080/09720529.2021.1985801
A. Boua, A. Abdelwanis
{"title":"Generalized (α, β)-derivations in 3-prime near-rings","authors":"A. Boua, A. Abdelwanis","doi":"10.1080/09720529.2021.1985801","DOIUrl":"https://doi.org/10.1080/09720529.2021.1985801","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47073994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyper and multiple f-index of nano star dendrimers 纳米星形树状大分子的超和多重f指数
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-24 DOI: 10.1080/09720529.2021.1923923
S. Ghobadi, M. Ghods, M. Ghorbaninejad
{"title":"Hyper and multiple f-index of nano star dendrimers","authors":"S. Ghobadi, M. Ghods, M. Ghorbaninejad","doi":"10.1080/09720529.2021.1923923","DOIUrl":"https://doi.org/10.1080/09720529.2021.1923923","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46681447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Commutativity degree of chains of finite groups 有限群链的交换度
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-24 DOI: 10.1080/09720529.2021.1974647
H. Darabi, M. Imanparast
{"title":"Commutativity degree of chains of finite groups","authors":"H. Darabi, M. Imanparast","doi":"10.1080/09720529.2021.1974647","DOIUrl":"https://doi.org/10.1080/09720529.2021.1974647","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42147487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information cryptography using cellular automata and digital image processing 利用元胞自动机和数字图像处理的信息密码学
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072437
Anil Kumar, Sandeep Sharma
{"title":"Information cryptography using cellular automata and digital image processing","authors":"Anil Kumar, Sandeep Sharma","doi":"10.1080/09720529.2022.2072437","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072437","url":null,"abstract":"Abstract In the recent era, security of the data and information is a very big challenge. The society is also facing a lot of challenges to preserve the security of information. The proposed research explores an asymmetric key encryption and decryption method by processing an image. The keys are extracted from the image by selecting a window from the image. The proposed research includes the concepts of cellular automata to increasing strength of the method. The cellular automata technique suggests proposed keys to encode and decode the information by analyzing image pixels intensity.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1105 - 1111"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45599765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of routing and security issues in OLSR protocol for video streaming over MANET MANET视频流OLSR协议的路由和安全问题分析
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072439
Ravi Shanker Sharma, B. Keswani, Dinesh Goyal
{"title":"Analysis of routing and security issues in OLSR protocol for video streaming over MANET","authors":"Ravi Shanker Sharma, B. Keswani, Dinesh Goyal","doi":"10.1080/09720529.2022.2072439","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072439","url":null,"abstract":"Abstract Mobile ad-hoc networks (MANETs) are autonomous, self-organizing networks without infrastructure support. The nodes in MANET network are dynamic and these nodes create creates a topological map through exchange of routing information defined by some set of rules called routing protocols which are further classified as proactive, reactive and hybrid. OLSR is proactive type of protocol which is widely used in MANET. The basic principal of OLSR is based on selection of Multipoint Relays (MPR) through flooding mechanism. There have been many enhancements in OLSR routing protocol to improve routing and security issues. But there is still a very vital scope for enhancement in OLSR to overcome these issues. In this paper, we review the different enhancements in OLSR and attempt to find out different routing and security challenges that can be further enhanced in OLSR for video streaming over MANET","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1203 - 1211"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41638747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An enhanced digital forensic investigation framework for XSS attack 增强的跨站攻击数字取证调查框架
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072424
Saurabh Kumar, S. Pathak, Jagendra Singh
{"title":"An enhanced digital forensic investigation framework for XSS attack","authors":"Saurabh Kumar, S. Pathak, Jagendra Singh","doi":"10.1080/09720529.2022.2072424","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072424","url":null,"abstract":"Abstract Cyber crimes and frauds are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. The digital forensics method entails analyzing network traffic in order to detect and investigate intrusions. For cyber crime investigation, various models with merits and demerits have been offered. This study examines the characteristics of existing digital forensic investigation models and analyses some of the challenges surrounding digital forensic research.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1009 - 1018"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46217745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient resource allocation scheme for D2D enabled vehicular networks in secured 5G communication 安全5G通信中D2D车载网络的高效资源分配方案
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068605
Amit Rathee, Y. Chaba
{"title":"Efficient resource allocation scheme for D2D enabled vehicular networks in secured 5G communication","authors":"Amit Rathee, Y. Chaba","doi":"10.1080/09720529.2022.2068605","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068605","url":null,"abstract":"Abstract D2D communications are regarded as one of the important technology in the 5th generation network. Due to the lack of spectrum resources, resource allocation has some uphill challenges. In this paper, we execute spectrum distribution and power allocation to attain the maximum efficiency for the resource allocation scheme in wireless channels. We try to maximize the ergodic capacity for both V2V and V2I connections while keeping reliability for every V2I link. Hybrid algorithms approach that turnout ideal resource allocation for D2D are proposed. The presentation of channels is established by MATLAB Simulation.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"931 - 942"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48543554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vector space modelling-based intelligent binary image encryption for secure communication 基于向量空间建模的安全通信智能二值图像加密
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075090
V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra
{"title":"Vector space modelling-based intelligent binary image encryption for secure communication","authors":"V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra","doi":"10.1080/09720529.2022.2075090","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075090","url":null,"abstract":"Abstract In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1157 - 1171"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41413108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data management framework for IoT edge-cloud architecture for resource-constrained IoT application 面向资源受限物联网应用的数据管理框架——边缘云架构
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075086
G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar
{"title":"Data management framework for IoT edge-cloud architecture for resource-constrained IoT application","authors":"G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar","doi":"10.1080/09720529.2022.2075086","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075086","url":null,"abstract":"Abstract There has never been a time when the volume and complexity of data travelling through modern networks have increased rapidly, but the Internet of Things has played a significant role in this rise. This will result in a significant increase in traffic directed to data centres for processing. This increase in traffic directly impacts the response time of IoT devices, which may be undesirable in sensitive environments such as hospitals. We want to look at a modern computing paradigm known as Edge Computing, which brings some of the analytical and processing resources, that cloud platforms now have, to the point where data is generated, reducing the amount of data generated. This information must be communicated to the network, and the system’s response time must be improved.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1093 - 1103"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44611616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信