{"title":"L(1, d)-labeling number of direct product of two cycles","authors":"Qiong Wu, W. Shiu","doi":"10.1080/09720529.2021.1930652","DOIUrl":"https://doi.org/10.1080/09720529.2021.1930652","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44035497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyper and multiple f-index of nano star dendrimers","authors":"S. Ghobadi, M. Ghods, M. Ghorbaninejad","doi":"10.1080/09720529.2021.1923923","DOIUrl":"https://doi.org/10.1080/09720529.2021.1923923","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46681447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commutativity degree of chains of finite groups","authors":"H. Darabi, M. Imanparast","doi":"10.1080/09720529.2021.1974647","DOIUrl":"https://doi.org/10.1080/09720529.2021.1974647","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42147487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information cryptography using cellular automata and digital image processing","authors":"Anil Kumar, Sandeep Sharma","doi":"10.1080/09720529.2022.2072437","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072437","url":null,"abstract":"Abstract In the recent era, security of the data and information is a very big challenge. The society is also facing a lot of challenges to preserve the security of information. The proposed research explores an asymmetric key encryption and decryption method by processing an image. The keys are extracted from the image by selecting a window from the image. The proposed research includes the concepts of cellular automata to increasing strength of the method. The cellular automata technique suggests proposed keys to encode and decode the information by analyzing image pixels intensity.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1105 - 1111"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45599765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of routing and security issues in OLSR protocol for video streaming over MANET","authors":"Ravi Shanker Sharma, B. Keswani, Dinesh Goyal","doi":"10.1080/09720529.2022.2072439","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072439","url":null,"abstract":"Abstract Mobile ad-hoc networks (MANETs) are autonomous, self-organizing networks without infrastructure support. The nodes in MANET network are dynamic and these nodes create creates a topological map through exchange of routing information defined by some set of rules called routing protocols which are further classified as proactive, reactive and hybrid. OLSR is proactive type of protocol which is widely used in MANET. The basic principal of OLSR is based on selection of Multipoint Relays (MPR) through flooding mechanism. There have been many enhancements in OLSR routing protocol to improve routing and security issues. But there is still a very vital scope for enhancement in OLSR to overcome these issues. In this paper, we review the different enhancements in OLSR and attempt to find out different routing and security challenges that can be further enhanced in OLSR for video streaming over MANET","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1203 - 1211"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41638747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced digital forensic investigation framework for XSS attack","authors":"Saurabh Kumar, S. Pathak, Jagendra Singh","doi":"10.1080/09720529.2022.2072424","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072424","url":null,"abstract":"Abstract Cyber crimes and frauds are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. The digital forensics method entails analyzing network traffic in order to detect and investigate intrusions. For cyber crime investigation, various models with merits and demerits have been offered. This study examines the characteristics of existing digital forensic investigation models and analyses some of the challenges surrounding digital forensic research.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1009 - 1018"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46217745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient resource allocation scheme for D2D enabled vehicular networks in secured 5G communication","authors":"Amit Rathee, Y. Chaba","doi":"10.1080/09720529.2022.2068605","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068605","url":null,"abstract":"Abstract D2D communications are regarded as one of the important technology in the 5th generation network. Due to the lack of spectrum resources, resource allocation has some uphill challenges. In this paper, we execute spectrum distribution and power allocation to attain the maximum efficiency for the resource allocation scheme in wireless channels. We try to maximize the ergodic capacity for both V2V and V2I connections while keeping reliability for every V2I link. Hybrid algorithms approach that turnout ideal resource allocation for D2D are proposed. The presentation of channels is established by MATLAB Simulation.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"931 - 942"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48543554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra
{"title":"Vector space modelling-based intelligent binary image encryption for secure communication","authors":"V. Dankan Gowda, Avinash Sharma, M. Nagabushanam, H. G. Govardhana Reddy, K. Raghavendra","doi":"10.1080/09720529.2022.2075090","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075090","url":null,"abstract":"Abstract In this research work, a secured routing technique is developed based on the LEACH algorithm. Many secure routing algorithms were proposed in the past by modifying the LEACH algorithm with trust management techniques, key generation, and distribution technique and intrusion detection algorithms. Most present solutions are unable to address the issue of modifying and intercepting assaults. To tackle this problem, a new secured routing algorithm is developed in this work that divides the image and messages into sub-components, represent them in a matrix format and add them to get a steganographic image which is encrypted using a suitable encryption algorithm selected by the rule system developed in this research work. Moreover, intelligent agents are incorporated in all the sensor nodes in the network to communicate the encrypted images to the neighbor nodes more reliably.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1157 - 1171"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41413108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar
{"title":"Data management framework for IoT edge-cloud architecture for resource-constrained IoT application","authors":"G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar","doi":"10.1080/09720529.2022.2075086","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075086","url":null,"abstract":"Abstract There has never been a time when the volume and complexity of data travelling through modern networks have increased rapidly, but the Internet of Things has played a significant role in this rise. This will result in a significant increase in traffic directed to data centres for processing. This increase in traffic directly impacts the response time of IoT devices, which may be undesirable in sensitive environments such as hospitals. We want to look at a modern computing paradigm known as Edge Computing, which brings some of the analytical and processing resources, that cloud platforms now have, to the point where data is generated, reducing the amount of data generated. This information must be communicated to the network, and the system’s response time must be improved.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1093 - 1103"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44611616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}