JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
Automatic irrigation control system using Internet of Things(IoT) 基于物联网的自动灌溉控制系统
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068597
Satnam Singh Saini, Dheresh Soni, Simarjeet Singh Malhi, Vipin Tiwari, Ankur Goyal
{"title":"Automatic irrigation control system using Internet of Things(IoT)","authors":"Satnam Singh Saini, Dheresh Soni, Simarjeet Singh Malhi, Vipin Tiwari, Ankur Goyal","doi":"10.1080/09720529.2022.2068597","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068597","url":null,"abstract":"Abstract The water deficiency for agriculture around India has pushed a need for optimal utilization of it. Internet of Things (IoT) is today’s emerging trend which bridges the gap of real world with the technology. An IoT based automatic irrigation control systems helps in the optimal water utilization for the crop fields. This article proposes an automatic irrigation control system which is based on Internet of Things to predict water requirement of a crop field by processing the wireless sensor network’s (WSN) sensor data like relative humidity, moisture of soil, temperature of soil, and radiation of light (Ultraviolet) along with the Indian Meteorological Department’s weather forecast. Considering the sensed data from the environment with the weather forecasting data, a machine learning algorithm for soil moisture prediction is developed to evaluate the water requirement for a particular area of agricultural land for that crop yield. Real time information of the agriculture landscape is provided through a smart information processing and decision support system which is implemented using schematic web service. This article discusses and describes the system implementation in detail. The results by the automatic irrigation control system based on the soil moisture prediction algorithm are presented. The irrigation control system is completely automated and soil moisture prediction results are nearest to reality.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"879 - 889"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48863850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis and design of secure VANET by detection and avoidance of blackhole attack 检测和避免黑洞攻击的安全VANET分析与设计
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075091
Anil Pal, B. Keswani, Dinesh Goyal
{"title":"Analysis and design of secure VANET by detection and avoidance of blackhole attack","authors":"Anil Pal, B. Keswani, Dinesh Goyal","doi":"10.1080/09720529.2022.2075091","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075091","url":null,"abstract":"Abstract Transmission of the data and information over Ad-Hoc network and its security is a very big challenge. VANET Networks have evolved for helping mobile services, but still the users are facing lot of challenges to preserve the security of information. The proposed research includes the concepts of detecting the Blackhole node and counters it in the VANET network for preserving the network strength as well as performance using a new protocol. The proposed protocol encrypts and decrypts the information using RC4A and simultaneously protects the network from Blackhole Attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1173 - 1182"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46308118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public safety analysis and safety system using arduino 使用arduino的公共安全分析和安全系统
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072417
Deepika Saxena, Anuj Kumar Vishwakarma, S. Verma
{"title":"Public safety analysis and safety system using arduino","authors":"Deepika Saxena, Anuj Kumar Vishwakarma, S. Verma","doi":"10.1080/09720529.2022.2072417","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072417","url":null,"abstract":"Abstract Today, personal security has become a major issue for both men & women. Women have endured carnal harassment these days which is shocking every day. The circumstances are much worse in growing and less developed countries. Women’s safety is an hour-long necessity these days. In India, there are many cases of violence against women. Important saftey measures for men & women should be there at home, outside or in their workplace. In this paper an attempt has been made to make a smart machine that can help women when they feel unsafe. Women can get faster support and higher security by pressing the device’s emergency button. In the event of an incident, this device can trace the location of the user in actual time and send it to the nearest police station and volunteers [5]. The user can find a secure area nearby with this device as well. Additionally, this gadget works on both online and offline modes. Whether no internet is available, the user can still use the gadget to access the nearest police station and volunteer support. The device contains Raspberry pie, GSM, PIR sensors, Bluetooth, GPS, etc [2]. The sum of all these features together makes this gadget affordable and easy to navigate.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"955 - 961"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44434651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NOMA waveform technique using orthogonal supplementary signal for advanced 5G networks security 利用正交补充信号的NOMA波形技术实现先进的5G网络安全
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075088
Mohit K. Sharma, Arun Kumar
{"title":"NOMA waveform technique using orthogonal supplementary signal for advanced 5G networks security","authors":"Mohit K. Sharma, Arun Kumar","doi":"10.1080/09720529.2022.2075088","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075088","url":null,"abstract":"Abstract The rollout of the advanced communication network is going all around the world and the demands for wireless applications are increasing day by day. At the same time, the design of secured networks and efficient energy devices is considered a huge concern. In this work, we proposed an implementation of Non-Orthogonal Frequency Division Multiplexing (NOMA) for future networks in which supplementary signals are accurately implemented and spread over the peak of the subscriber signal. This method guarantees an ideal security against the external and internal intruders. In the second part of the work, we analyze and improve the battery performance of the user device by implementing a novel peak to average power ratio (PAPR) reduction algorithm. Other parameters such as Bit Error Rate (BER), PAPR are simulated using Matlab-2014. The outcomes of the work reveal that the proposed framework obtained a secured and less complicated network.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1125 - 1136"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49048181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic epileptic signal classification using deep convolutional neural network 基于深度卷积神经网络的癫痫信号自动分类
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072419
Dipali Sinha, K. Thangavel
{"title":"Automatic epileptic signal classification using deep convolutional neural network","authors":"Dipali Sinha, K. Thangavel","doi":"10.1080/09720529.2022.2072419","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072419","url":null,"abstract":"Abstract Epilepsy is a neurological illness that causes seizures in the brain and affects a huge number of people worldwide. Electroencephalography (EEG) is the most commonly used modality for epilepsy prognosis, although visual inspection of EEG signals is a time- consuming and cumbersome task. To avoid that, several automated systems have been developed to assist neurologists. Feature extraction-based machine learning algorithms were used long before the advent of deep learning. But their success was limited to the capabilities of those who crafted the features manually. Deep learning is an artificial intelligence branch in which feature extraction and classification are completely automated. This paper, in particular, presents a deep learning architecture, Convolutional Neural Network (CNN), to classify EEG signals into three categories: normal, pre-ictal, and ictal or seizure. The proposed model achieved an accuracy, precision, recall, F-measure, and error rate of 94.0%, 93.2%, 94.3%, 93.7, and 6.0% respectively.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"963 - 973"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45775314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting location privacy in cloud services 在云服务中保护位置隐私
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072430
Sarvesh Kumar, P. Srivastava, A. Pal, Vinay Priy Mishra, Prateek Singhal, Gaurav Kumar Srivastava, Udit Mamodiya
{"title":"Protecting location privacy in cloud services","authors":"Sarvesh Kumar, P. Srivastava, A. Pal, Vinay Priy Mishra, Prateek Singhal, Gaurav Kumar Srivastava, Udit Mamodiya","doi":"10.1080/09720529.2022.2072430","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072430","url":null,"abstract":"Abstract In GPS system enabled hand-held communication devices which works as a beacon that transmits our location. Also, the location-based services that emerged in recent years make use of location data. The location data provided to these location-based service providers have enough sensitive information to bother about. The location privacy became an area of concern in recent years. Developed and developing countries are now in process to make laws against the use of location information without the consent of the user or without legal warrant. Most of the research strategies proposed in recent years have one thing in common that we provide a region instead of exact coordinates of the location of the user. These attacks are called location dependent attacks or velocity linkage attacks in literature. We have in our effort proposed a solution to the problem of location privacy protection taking care of the location dependent attacks. We also keep in mind the fact that user is more concerned about his locations at certain places. We tested the proposed solution against requests issued by 5000 and 15000 users moving in a field of 10000x10000 units’ area.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1053 - 1062"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49376654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach COVID-19大流行与网络安全问题:情感分析和主题建模方法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072421
Sonali Khandelwal, Aanyaa Chaudhary
{"title":"COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach","authors":"Sonali Khandelwal, Aanyaa Chaudhary","doi":"10.1080/09720529.2022.2072421","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072421","url":null,"abstract":"Abstract The purpose of this study is to understand public awareness of cybersecurity-related issues and discussions during the COVID-19 pandemic. Employees and confidential organizational data are vulnerable to cyber-attacks as a result of the pandemic, which has raised concerns about cyber security about the new normal of working from home. The public’s main sentiments and aspects related to cyber security concerns have been mined from tweets on the microblogging social media website Twitter. Sentiment Analysis and Topic Modeling techniques have been applied to understand the perspectives, emotions, and themes discussed by people. The analysis reveals people are becoming more aware of cybercrime-related concerns and are more positive than negative in combating the challenge of cybercrime. The paper also highlights the main themes revealed by Topic Modeling.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"987 - 997"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47191403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of recurring vulnerabilities in computing services 检测计算服务中反复出现的漏洞
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072432
Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya
{"title":"Detection of recurring vulnerabilities in computing services","authors":"Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya","doi":"10.1080/09720529.2022.2072432","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072432","url":null,"abstract":"Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1063 - 1071"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45021933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Chaos based image encryption security in cloud computing 云计算中基于混沌的图像加密安全
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075085
Sarvesh Kumar, P. Srivastava, Gaurav Kumar Srivastava, Prateek Singhal, Dinesh Singh, D. Goyal
{"title":"Chaos based image encryption security in cloud computing","authors":"Sarvesh Kumar, P. Srivastava, Gaurav Kumar Srivastava, Prateek Singhal, Dinesh Singh, D. Goyal","doi":"10.1080/09720529.2022.2075085","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075085","url":null,"abstract":"Abstract In the rapid world of technology, the IT Industry is growing at a rapid speed with Cloud Image Security. In the developing trends, cloud orchestration is becoming impressive and uncertain of dealing a large amount of information. In the last two decades there has been extensive development in image encryption. Chaos based image encryption techniques form framework for a faster algorithm than traditional techniques. Chaos based techniques are highly efficient in case of multimedia data. The proposed algorithm uses the modified logistic map for the generation of chaotic sequence, encrypts the image in single scan, so runs faster and makes the proper use of confusion and diffusion. It dynamically updates the key during execution. This algorithm is secure against the brute force attack and differential attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1041 - 1051"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46203591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing information security metrics and measures for risk assessment of an organization 为组织的风险评估制定信息安全标准和措施
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075092
Prashant Manuja, R. Shekhawat
{"title":"Developing information security metrics and measures for risk assessment of an organization","authors":"Prashant Manuja, R. Shekhawat","doi":"10.1080/09720529.2022.2075092","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075092","url":null,"abstract":"Abstract The absence of public safety normalization bodies can antagonistically affect the reception of worldwide security guidelines and best practices. This research is done for the benefit of people, process and technology for any organization. This paper presents a novel pragmatic network protection evaluation structure that is custom-made to the ISO 2700x standard necessities for the improvement of Information Security Management System (ISMS). This model can be utilized for both self-appraisal and examining/scoring instruments by public network protection specialists. Utilizing this model, associations can consider their current data security the broad frameworks in contrast to nearby and global guidelines by using worked in pre-review instruments. All things considered, the model will assist associations with assessing and improving their status for developing dangers and dangers. In this system, an original numerical model was likewise planned and carried out for the scoring/rating instrument, specifically, the public digital protection list (aeNCI). The aeNCI utilizes various boundaries to decide the development of existing network safety programs at public associations and produce a classification and correlation reports. The outcomes empowered the partner to confirm the security configuration of their frameworks and recognize possible attacks/hazard vectors.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1195 - 1202"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45341145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信