{"title":"L(1, d)-labeling number of direct product of two cycles","authors":"Qiong Wu, W. Shiu","doi":"10.1080/09720529.2021.1930652","DOIUrl":"https://doi.org/10.1080/09720529.2021.1930652","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44035497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hyper and multiple f-index of nano star dendrimers","authors":"S. Ghobadi, M. Ghods, M. Ghorbaninejad","doi":"10.1080/09720529.2021.1923923","DOIUrl":"https://doi.org/10.1080/09720529.2021.1923923","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46681447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commutativity degree of chains of finite groups","authors":"H. Darabi, M. Imanparast","doi":"10.1080/09720529.2021.1974647","DOIUrl":"https://doi.org/10.1080/09720529.2021.1974647","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42147487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information cryptography using cellular automata and digital image processing","authors":"Anil Kumar, Sandeep Sharma","doi":"10.1080/09720529.2022.2072437","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072437","url":null,"abstract":"Abstract In the recent era, security of the data and information is a very big challenge. The society is also facing a lot of challenges to preserve the security of information. The proposed research explores an asymmetric key encryption and decryption method by processing an image. The keys are extracted from the image by selecting a window from the image. The proposed research includes the concepts of cellular automata to increasing strength of the method. The cellular automata technique suggests proposed keys to encode and decode the information by analyzing image pixels intensity.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1105 - 1111"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45599765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of routing and security issues in OLSR protocol for video streaming over MANET","authors":"Ravi Shanker Sharma, B. Keswani, Dinesh Goyal","doi":"10.1080/09720529.2022.2072439","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072439","url":null,"abstract":"Abstract Mobile ad-hoc networks (MANETs) are autonomous, self-organizing networks without infrastructure support. The nodes in MANET network are dynamic and these nodes create creates a topological map through exchange of routing information defined by some set of rules called routing protocols which are further classified as proactive, reactive and hybrid. OLSR is proactive type of protocol which is widely used in MANET. The basic principal of OLSR is based on selection of Multipoint Relays (MPR) through flooding mechanism. There have been many enhancements in OLSR routing protocol to improve routing and security issues. But there is still a very vital scope for enhancement in OLSR to overcome these issues. In this paper, we review the different enhancements in OLSR and attempt to find out different routing and security challenges that can be further enhanced in OLSR for video streaming over MANET","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1203 - 1211"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41638747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced digital forensic investigation framework for XSS attack","authors":"Saurabh Kumar, S. Pathak, Jagendra Singh","doi":"10.1080/09720529.2022.2072424","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072424","url":null,"abstract":"Abstract Cyber crimes and frauds are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. The digital forensics method entails analyzing network traffic in order to detect and investigate intrusions. For cyber crime investigation, various models with merits and demerits have been offered. This study examines the characteristics of existing digital forensic investigation models and analyses some of the challenges surrounding digital forensic research.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1009 - 1018"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46217745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient resource allocation scheme for D2D enabled vehicular networks in secured 5G communication","authors":"Amit Rathee, Y. Chaba","doi":"10.1080/09720529.2022.2068605","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068605","url":null,"abstract":"Abstract D2D communications are regarded as one of the important technology in the 5th generation network. Due to the lack of spectrum resources, resource allocation has some uphill challenges. In this paper, we execute spectrum distribution and power allocation to attain the maximum efficiency for the resource allocation scheme in wireless channels. We try to maximize the ergodic capacity for both V2V and V2I connections while keeping reliability for every V2I link. Hybrid algorithms approach that turnout ideal resource allocation for D2D are proposed. The presentation of channels is established by MATLAB Simulation.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"931 - 942"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48543554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic irrigation control system using Internet of Things(IoT)","authors":"Satnam Singh Saini, Dheresh Soni, Simarjeet Singh Malhi, Vipin Tiwari, Ankur Goyal","doi":"10.1080/09720529.2022.2068597","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068597","url":null,"abstract":"Abstract The water deficiency for agriculture around India has pushed a need for optimal utilization of it. Internet of Things (IoT) is today’s emerging trend which bridges the gap of real world with the technology. An IoT based automatic irrigation control systems helps in the optimal water utilization for the crop fields. This article proposes an automatic irrigation control system which is based on Internet of Things to predict water requirement of a crop field by processing the wireless sensor network’s (WSN) sensor data like relative humidity, moisture of soil, temperature of soil, and radiation of light (Ultraviolet) along with the Indian Meteorological Department’s weather forecast. Considering the sensed data from the environment with the weather forecasting data, a machine learning algorithm for soil moisture prediction is developed to evaluate the water requirement for a particular area of agricultural land for that crop yield. Real time information of the agriculture landscape is provided through a smart information processing and decision support system which is implemented using schematic web service. This article discusses and describes the system implementation in detail. The results by the automatic irrigation control system based on the soil moisture prediction algorithm are presented. The irrigation control system is completely automated and soil moisture prediction results are nearest to reality.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"879 - 889"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48863850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar
{"title":"Data management framework for IoT edge-cloud architecture for resource-constrained IoT application","authors":"G. Sharma, N. Hemrajani, Satyajeet Sharma, Aditya Upadhyay, Y. Bhardwaj, Ashutosh Kumar","doi":"10.1080/09720529.2022.2075086","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075086","url":null,"abstract":"Abstract There has never been a time when the volume and complexity of data travelling through modern networks have increased rapidly, but the Internet of Things has played a significant role in this rise. This will result in a significant increase in traffic directed to data centres for processing. This increase in traffic directly impacts the response time of IoT devices, which may be undesirable in sensitive environments such as hospitals. We want to look at a modern computing paradigm known as Edge Computing, which brings some of the analytical and processing resources, that cloud platforms now have, to the point where data is generated, reducing the amount of data generated. This information must be communicated to the network, and the system’s response time must be improved.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1093 - 1103"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44611616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}