Shashi Raj, Dr. M. Manicka Raja, Dr Vijay More, Dr Ch Madhava Rao, Dr. M Kavitha, Dr. Gurwinder Singh
The rapid advancements in digital technologies have necessitated the development of robust information security measures. This paper explores the intersection of algebra and cryptography, focusing on how algebraic principles can enhance cryptographic techniques to provide stronger security foundations. By leveraging mathematical structures such as groups, rings, and fields, we can address critical challenges in encryption, secure communications, and data privacy. This study reviews key algebraic methods used in contemporary cryptographic protocols, including elliptic curve cryptography, homomorphic encryption, and lattice-based cryptography, and demonstrates their practical applications through detailed case studies. Our comparative analysis highlights the superior performance and security of algebra-based cryptographic solutions compared to traditional methods. Finally, we discuss the emerging trends and future directions in algebraic cryptography, emphasizing the potential of these mathematical foundations to address the evolving threats in information security.
{"title":"The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations","authors":"Shashi Raj, Dr. M. Manicka Raja, Dr Vijay More, Dr Ch Madhava Rao, Dr. M Kavitha, Dr. Gurwinder Singh","doi":"10.52783/cana.v31.943","DOIUrl":"https://doi.org/10.52783/cana.v31.943","url":null,"abstract":"The rapid advancements in digital technologies have necessitated the development of robust information security measures. This paper explores the intersection of algebra and cryptography, focusing on how algebraic principles can enhance cryptographic techniques to provide stronger security foundations. By leveraging mathematical structures such as groups, rings, and fields, we can address critical challenges in encryption, secure communications, and data privacy. This study reviews key algebraic methods used in contemporary cryptographic protocols, including elliptic curve cryptography, homomorphic encryption, and lattice-based cryptography, and demonstrates their practical applications through detailed case studies. Our comparative analysis highlights the superior performance and security of algebra-based cryptographic solutions compared to traditional methods. Finally, we discuss the emerging trends and future directions in algebraic cryptography, emphasizing the potential of these mathematical foundations to address the evolving threats in information security.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 37","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141677289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For a graph G, the total dominating set defined as a set of vertices in S such that all the vertices in V(G) has at least one neighbor in S, the least cardinality is noted as t(G). The total domination number of each and every graph while subdividing any edge xy of G is equal to the total domination number of G, which results in the total domination subdivision stable graph abbreviated as TDSS and the symbolic expression is Gtsd(xy). The research paper, we introduce TDSS and proposed conditions under which a graph is TDSS and not TDSS.
对于图 G,总支配集定义为 S 中的顶点集合,使得 V(G)中的所有顶点在 S 中至少有一个相邻顶点,最小心数记为 t(G)。在细分 G 的任意一条边 xy 时,每个图的总支配数都等于 G 的总支配数,因此总支配细分稳定图简称为 TDSS,符号表达式为 Gtsd(xy)。在本研究论文中,我们介绍了 TDSS,并提出了图是 TDSS 和不是 TDSS 的条件。
{"title":"Some Bench Mark Results on Total Domination Subdivision Stable Graph","authors":"A. Jeeva","doi":"10.52783/cana.v31.860","DOIUrl":"https://doi.org/10.52783/cana.v31.860","url":null,"abstract":"For a graph G, the total dominating set defined as a set of vertices in S such that all the vertices in V(G) has at least one neighbor in S, the least cardinality is noted as t(G). The total domination number of each and every graph while subdividing any edge xy of G is equal to the total domination number of G, which results in the total domination subdivision stable graph abbreviated as TDSS and the symbolic expression is Gtsd(xy). The research paper, we introduce TDSS and proposed conditions under which a graph is TDSS and not TDSS.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141674848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hadeel Salim Alkutubi, Maani A. Saeed, Shaymaa Y. Alkufi, Shaymaa Maki Kadham
In this research paper, data were analyzed from Environmental Statistics in Iraq (Health Indicators for 2019)/ Central Statistical Organization /Iraqi Ministry of Planning. The data represents the number of health institutions distributed across all governorates of Iraq (government hospitals, private hospitals, popular clinics, specialized health centers (dental, chest, allergy, asthma, other specialties), primary health care centers (main and subsidiary), other health institutions (insurance clinics). health care, health homes), training health center, family medicine health center, family planning center, central health laboratories, forensic medicine, blood bank). In addition to other data representing the number of infections with communicable diseases in Iraq (polio, acute flaccid paralysis, whooping cough, measles, German measles, mumps, congenital tetanus, adult tetanus, hydatid cysts, typhoid, malaria, schistosomiasis, bacillus dysentery, rabies, Diphtheria, chicken pox, hemorrhagic fever, Malta fever, pneumonia, cholera, scabies, cutaneous leishmaniasis, black fever, animal bites, meningitis of all kinds, bird flu, swine flu). It was determined whether there are significant differences in the number of health institutions in terms of their distribution across all governorates of Iraq, or not. Also, is there a significant difference in the number of infections with communicable diseases in all governorates of Iraq or not? If there is a significant difference in the number of health institutions or the number of infections with communicable diseases, whichever number is higher. The study included the total number of health institutions in Iraq, as well as the total number of communicable diseases of various types in all governorates of Iraq. The results were obtained by applying the Friedman test, in addition to two-way analysis of variance, as well as the Scheffé test.
{"title":"An Analytical Study of the Number of Communicable Diseases and Health Institutions in Iraq using Two-Way Analysis of Variance, Friedman and Scheffe Tests","authors":"Hadeel Salim Alkutubi, Maani A. Saeed, Shaymaa Y. Alkufi, Shaymaa Maki Kadham","doi":"10.52783/cana.v31.828","DOIUrl":"https://doi.org/10.52783/cana.v31.828","url":null,"abstract":"In this research paper, data were analyzed from Environmental Statistics in Iraq (Health Indicators for 2019)/ Central Statistical Organization /Iraqi Ministry of Planning. The data represents the number of health institutions distributed across all governorates of Iraq (government hospitals, private hospitals, popular clinics, specialized health centers (dental, chest, allergy, asthma, other specialties), primary health care centers (main and subsidiary), other health institutions (insurance clinics). health care, health homes), training health center, family medicine health center, family planning center, central health laboratories, forensic medicine, blood bank). In addition to other data representing the number of infections with communicable diseases in Iraq (polio, acute flaccid paralysis, whooping cough, measles, German measles, mumps, congenital tetanus, adult tetanus, hydatid cysts, typhoid, malaria, schistosomiasis, bacillus dysentery, rabies, Diphtheria, chicken pox, hemorrhagic fever, Malta fever, pneumonia, cholera, scabies, cutaneous leishmaniasis, black fever, animal bites, meningitis of all kinds, bird flu, swine flu). It was determined whether there are significant differences in the number of health institutions in terms of their distribution across all governorates of Iraq, or not. Also, is there a significant difference in the number of infections with communicable diseases in all governorates of Iraq or not? If there is a significant difference in the number of health institutions or the number of infections with communicable diseases, whichever number is higher. The study included the total number of health institutions in Iraq, as well as the total number of communicable diseases of various types in all governorates of Iraq. The results were obtained by applying the Friedman test, in addition to two-way analysis of variance, as well as the Scheffé test.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research examines smart solutions for agricultural sustainability using IoT-powered soil health detection systems. Innovative solutions are needed to manage resources and protect the environment as the world population grows and agricultural resources are under strain. IoT-enabled soil health monitoring has great potential. The suggested system uses IoT sensors to measure soil moisture, pH, nutrient content, and temperature in real time. This data is analyzed using powerful data analytics and machine learning algorithms to provide farmers soil health information. Monitoring soil quality allows farmers to make educated irrigation, fertilization, and crop selection choices, optimizing resource use and yields while minimizing environmental effect. The study also examines sensor selection, data transmission methods, and data security for IoT-powered soil health detection systems. Widespread use of these technologies might boost agricultural output, lower input costs, and enhance food security. Finally, IoT-powered soil health detection systems are a major step toward agricultural sustainability. These devices enable precision farming that is ecologically friendly and profitable by giving real-time soil data. However, effective implementation would need agricultural value chain stakeholders to collaborate and continued research to address growing issues and possibilities.
{"title":"Smart Solutions for Sustainable Agriculture: Design and Development of IoT-Powered Soil Health Identification Systems","authors":"Ritu Raj Sondhiya, Prof. Vikash Kumar, Singh","doi":"10.52783/cana.v31.946","DOIUrl":"https://doi.org/10.52783/cana.v31.946","url":null,"abstract":"This research examines smart solutions for agricultural sustainability using IoT-powered soil health detection systems. Innovative solutions are needed to manage resources and protect the environment as the world population grows and agricultural resources are under strain. IoT-enabled soil health monitoring has great potential. The suggested system uses IoT sensors to measure soil moisture, pH, nutrient content, and temperature in real time. This data is analyzed using powerful data analytics and machine learning algorithms to provide farmers soil health information. Monitoring soil quality allows farmers to make educated irrigation, fertilization, and crop selection choices, optimizing resource use and yields while minimizing environmental effect. The study also examines sensor selection, data transmission methods, and data security for IoT-powered soil health detection systems. Widespread use of these technologies might boost agricultural output, lower input costs, and enhance food security. Finally, IoT-powered soil health detection systems are a major step toward agricultural sustainability. These devices enable precision farming that is ecologically friendly and profitable by giving real-time soil data. However, effective implementation would need agricultural value chain stakeholders to collaborate and continued research to address growing issues and possibilities.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work introduces a potential Hybrid Algorithm for the complex field of forest monitoring, integrating Artificial Bee Colony Optimisation (ABC) and Ant Colony Optimisation (ACO). The performance indicators of the algorithm were carefully assessed in a fictitious use case. Its effectiveness was demonstrated by a shorter drone path, a shorter flight duration, and less energy usage, making it an affordable surveillance option. In addition, the algorithm demonstrated a great rate of mission coverage, quick convergence, and consistently good quality of solutions. Its usefulness in dynamic forest habitats was highlighted by its capacity to adjust to changing weather conditions and scale to accommodate more waypoints. Its cost-effectiveness is increased by efficient resource utilisation, which is demonstrated by low CPU and memory consumption. Taken together, these results highlight how the algorithm may transform forest surveillance by increasing operational effectiveness, cutting expenses, and satisfying the changing requirements of intricate monitoring scenarios. To fully realise the algorithm's potential for environmental monitoring applications, this research advocates for more real-world testing and optimisation.
{"title":"Optimizing Forest Surveillance: A Hybrid Algorithm Combining ACO and ABC","authors":"SJ Yatish, Viji Vinod","doi":"10.52783/cana.v31.827","DOIUrl":"https://doi.org/10.52783/cana.v31.827","url":null,"abstract":"This work introduces a potential Hybrid Algorithm for the complex field of forest monitoring, integrating Artificial Bee Colony Optimisation (ABC) and Ant Colony Optimisation (ACO). The performance indicators of the algorithm were carefully assessed in a fictitious use case. Its effectiveness was demonstrated by a shorter drone path, a shorter flight duration, and less energy usage, making it an affordable surveillance option. In addition, the algorithm demonstrated a great rate of mission coverage, quick convergence, and consistently good quality of solutions. Its usefulness in dynamic forest habitats was highlighted by its capacity to adjust to changing weather conditions and scale to accommodate more waypoints. Its cost-effectiveness is increased by efficient resource utilisation, which is demonstrated by low CPU and memory consumption. Taken together, these results highlight how the algorithm may transform forest surveillance by increasing operational effectiveness, cutting expenses, and satisfying the changing requirements of intricate monitoring scenarios. To fully realise the algorithm's potential for environmental monitoring applications, this research advocates for more real-world testing and optimisation.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141675130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Association schemes have been used in coding theory and other combinatorial problems. In this paper, we construct association schemes for the abelian groups Z_2^r,〖 Z〗_(n_1 )×Z_(n_2 )×⋯×Z_(n_r ), set of n ×n matrices over Z_m and for the general linear group of order 2 over Z_2,Z_4, and Z_6. We also obtain association schemes for symmetric groups and alternating groups of degree 4 and 5 using canonical forms.
{"title":"Association Schemes for Some Finite Group Rings II","authors":"Anuradha Sabharwal, Pooja Yadav, R. K. Sharma","doi":"10.52783/cana.v31.918","DOIUrl":"https://doi.org/10.52783/cana.v31.918","url":null,"abstract":"Association schemes have been used in coding theory and other combinatorial problems. In this paper, we construct association schemes for the abelian groups Z_2^r,〖 Z〗_(n_1 )×Z_(n_2 )×⋯×Z_(n_r ), set of n ×n matrices over Z_m and for the general linear group of order 2 over Z_2,Z_4, and Z_6. We also obtain association schemes for symmetric groups and alternating groups of degree 4 and 5 using canonical forms.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141674682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let S be a cr-set of graph G and let G be a connected graph. If S is the only cr-set that contains T, then a subset T⊆S is referred to be a forcing subset for S. A minimum forcing subset of S is a forcing subset for S of minimum cardinality. The cardinality of a minimum forcing subset of S is the forcing circular number of S, represented by the notation f_cr(S). f_cr (G) = min {f_cr(S)} is the forcing circular number of G, where the minimum is the sum of all minimum forcing circular-sets S in G. For several standard graphs, the forcing circular number is identified. It is demonstrated that there exists a connected graph G such that f_g (G)=a and f_cr (G)=b for every integer a≥0, and b≥0.
设 S 是图 G 的一个 cr 集,G 是一个连通图。如果 S 是唯一包含 T 的 cr 集,那么子集 T⊆S 就是 S 的强制子集。S 的最小强制子集的卡片数是 S 的强制循环数,用符号 f_cr(S) 表示。f_cr (G) = min {f_cr(S)} 是 G 的强制循环数,其中最小值是 G 中所有最小强制循环集 S 的和。证明存在一个连通图 G,对于每一个整数 a≥0 和 b≥0,f_g (G)=a 和 f_cr (G)=b 。
{"title":"The Forcing Circular Number of a Graph","authors":"S. Sheeja","doi":"10.52783/cana.v31.843","DOIUrl":"https://doi.org/10.52783/cana.v31.843","url":null,"abstract":"Let S be a cr-set of graph G and let G be a connected graph. If S is the only cr-set that contains T, then a subset T⊆S is referred to be a forcing subset for S. A minimum forcing subset of S is a forcing subset for S of minimum cardinality. The cardinality of a minimum forcing subset of S is the forcing circular number of S, represented by the notation f_cr(S). f_cr (G) = min {f_cr(S)} is the forcing circular number of G, where the minimum is the sum of all minimum forcing circular-sets S in G. For several standard graphs, the forcing circular number is identified. It is demonstrated that there exists a connected graph G such that f_g (G)=a and f_cr (G)=b for every integer a≥0, and b≥0.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141674252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ultra-wideband (UWB) communication systems, employing Orthogonal Frequency Division Multiplexing (OFDM) modulation, are renowned for their high data rates, low power consumption, and robust performance in multipath environments. However, these systems face significant challenges in varying propagation conditions, specifically under Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) scenarios. In LOS conditions, the signal travels directly from the transmitter to the receiver without obstructions, typically resulting in optimal performance characterized by high transmission efficiency, strong Signal-to-Noise Ratio (SNR), low Bit Error Rate (BER), and maximum throughput. Conversely, NLOS conditions involve obstructions and reflections that cause multipath propagation and signal degradation. This leads to reduced transmission efficiency, lower SNR, higher BER, and diminished throughput. This study examines the performance of an UWB communication system using OFDM modulation in both LOS and NLOS conditions. The performance metrics evaluated include transmission efficiency, SNR,BER, and throughput. In LOS conditions, the system demonstrates high transmission efficiency, superior SNR, minimal BER, and maximum throughput due to the unobstructed signal path. In contrast, NLOS conditions result in decreased transmission efficiency, lower SNR, increased BER, and reduced throughput due to signal attenuation and multipath effects. These findings highlight the significant impact of environmental conditions on UWB-OFDM system performance and underscore the importance of optimizing such systems for reliable communication in varied deployment scenarios.
采用正交频分复用(OFDM)调制的超宽带(UWB)通信系统以其高数据传输速率、低功耗以及在多径环境中的稳健性能而著称。然而,在不同的传播条件下,特别是在视距(LOS)和非视距(NLOS)情况下,这些系统面临着巨大的挑战。在 LOS 条件下,信号在没有障碍物的情况下直接从发射器到达接收器,通常会产生最佳性能,其特点是传输效率高、信噪比(SNR)强、误码率(BER)低和吞吐量最大。相反,NLOS 条件下的障碍物和反射会导致多径传播和信号衰减。这会导致传输效率降低、信噪比降低、误码率升高和吞吐量减少。本研究探讨了在 LOS 和 NLOS 条件下使用 OFDM 调制的 UWB 通信系统的性能。评估的性能指标包括传输效率、信噪比、误码率和吞吐量。在 LOS 条件下,由于信号路径畅通无阻,系统显示出较高的传输效率、出色的信噪比、最小的误码率和最大的吞吐量。相反,在非 LOS 条件下,由于信号衰减和多径效应,传输效率下降,信噪比降低,误码率增加,吞吐量减少。这些发现凸显了环境条件对 UWB-OFDM 系统性能的重大影响,并强调了在不同部署场景下优化此类系统以实现可靠通信的重要性。
{"title":"Enhanced Ultra-Wideband Communication System with OFDM Modulation: Performance Analysis in LOS and NLOS Conditions","authors":"Khushbu Meena, Rahul Jain","doi":"10.52783/cana.v31.845","DOIUrl":"https://doi.org/10.52783/cana.v31.845","url":null,"abstract":"Ultra-wideband (UWB) communication systems, employing Orthogonal Frequency Division Multiplexing (OFDM) modulation, are renowned for their high data rates, low power consumption, and robust performance in multipath environments. However, these systems face significant challenges in varying propagation conditions, specifically under Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) scenarios. In LOS conditions, the signal travels directly from the transmitter to the receiver without obstructions, typically resulting in optimal performance characterized by high transmission efficiency, strong Signal-to-Noise Ratio (SNR), low Bit Error Rate (BER), and maximum throughput. Conversely, NLOS conditions involve obstructions and reflections that cause multipath propagation and signal degradation. This leads to reduced transmission efficiency, lower SNR, higher BER, and diminished throughput. This study examines the performance of an UWB communication system using OFDM modulation in both LOS and NLOS conditions. The performance metrics evaluated include transmission efficiency, SNR,BER, and throughput. In LOS conditions, the system demonstrates high transmission efficiency, superior SNR, minimal BER, and maximum throughput due to the unobstructed signal path. In contrast, NLOS conditions result in decreased transmission efficiency, lower SNR, increased BER, and reduced throughput due to signal attenuation and multipath effects. These findings highlight the significant impact of environmental conditions on UWB-OFDM system performance and underscore the importance of optimizing such systems for reliable communication in varied deployment scenarios.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to high complexities within distributed computing environments, there's a critical need for advanced scheduling frameworks that are capable of optimizing MapReduce systems. Current approaches have static policies that limit their capability to adapt to changing system dynamics and workload variations for different cloud scenarios. To overcome these issues, this study introduces a robust MapReduce framework empowered by intelligent scheduling algorithms, tailored to enhance system efficiency and resilience levels. The framework introduces three novel scheduling models: Deep Reinforcement Learning for Dynamic Job Scheduling (DRDJS), Anomaly Detection-driven Adaptive Scheduling (ADAS), and Cluster-based Job Categorization and Scheduling (CJCS). DRDJS utilizes deep reinforcement learning to dynamically generate optimal scheduling policies based on multiple metrics that include historical job data, system metrics, and workload characteristics. This adaptive approach leads to significant reductions in job completion times, outperforming static scheduling methods by up to 30%. Next, ADAS leverages anomaly detection to prioritize critical tasks and efficiently allocate resources in response to anomalies, resulting in a notable improve scheduling speed by up to 40%. Finally, CJCS employs clustering algorithms to categorize jobs based on their resource requirements and execution profiles, enabling more accurate resource allocation and reducing average job completion times by up to 25%. By integrating these methods into a unified scheduling framework, the proposed solution addresses the variability in job characteristics and system performance, thereby enhancing the overall throughput and stability of MapReduce operations.
{"title":"Design of an Iterative Method for MapReduce Scheduling Using Deep Reinforcement Learning and Anomaly Detection","authors":"Mr. Aihtesham Kazi, Dr. Dinesh Chaudhari","doi":"10.52783/cana.v31.953","DOIUrl":"https://doi.org/10.52783/cana.v31.953","url":null,"abstract":"Due to high complexities within distributed computing environments, there's a critical need for advanced scheduling frameworks that are capable of optimizing MapReduce systems. Current approaches have static policies that limit their capability to adapt to changing system dynamics and workload variations for different cloud scenarios. To overcome these issues, this study introduces a robust MapReduce framework empowered by intelligent scheduling algorithms, tailored to enhance system efficiency and resilience levels. The framework introduces three novel scheduling models: Deep Reinforcement Learning for Dynamic Job Scheduling (DRDJS), Anomaly Detection-driven Adaptive Scheduling (ADAS), and Cluster-based Job Categorization and Scheduling (CJCS). DRDJS utilizes deep reinforcement learning to dynamically generate optimal scheduling policies based on multiple metrics that include historical job data, system metrics, and workload characteristics. This adaptive approach leads to significant reductions in job completion times, outperforming static scheduling methods by up to 30%. Next, ADAS leverages anomaly detection to prioritize critical tasks and efficiently allocate resources in response to anomalies, resulting in a notable improve scheduling speed by up to 40%. Finally, CJCS employs clustering algorithms to categorize jobs based on their resource requirements and execution profiles, enabling more accurate resource allocation and reducing average job completion times by up to 25%. By integrating these methods into a unified scheduling framework, the proposed solution addresses the variability in job characteristics and system performance, thereby enhancing the overall throughput and stability of MapReduce operations. ","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent scenarios expressing live digital forensics and its applications in security domain with multiple constraint-based analysis. Many digital forensic tools available in the market helps to make a good analysis of various digital forensic situations but the awareness of the situation-based decision making is still an unsolvable issue in many critical forensic cases. As the digital forensic domain increases its scope to various business and computer related industries, leading market investors and the employees are much aware about the digital crimes and its prevention. Here in this article, we proposed a new protocol which can help the decision making of sensitive digital forensic cases by the involvement of various constraint-based evaluation. A multi constraint operational system proposed here for live digital forensic and the decision support system takes an object parameter while the decision-making procedure is implemented. Thus, the protocol introduced here may carry a set of rules where the object formation and decision support constraints bind together and it may reply on the digital forensic tool integration. The characteristics of this protocol is mainly distributed for situation awareness criterion evaluation and modelled to limit the amount of data retrieval and its acquisition. categorical acquisition of digital evidences through time, duration, devices involved, wings of affect, cause of the target, hacker/attacker/affected user, kind of attack are the constraints to be solved through this prototype. The focus of this prototype is for dynamic digital forensics instead classic forensics conducted on switched off devices. This protocol supports the standard organizational formats to follow the forensic procedures in which a detailed recommendations and documentation from various organizations. The standardized formats of National Institute of Standards and Technology (NIST), International Standards Organization (ISO), Global Professional Information Community (AIIM) and American Society for Testing and Materials (now ASTM International) into considered while developing this protocol.
{"title":"An Object Based Decision Support Protocol for Multi- Constraint Agile Digital Forensics Investigation","authors":"T. M. Bhraguram, Dr. P.S Rajakumar, Dr. N. Kanya","doi":"10.52783/cana.v31.854","DOIUrl":"https://doi.org/10.52783/cana.v31.854","url":null,"abstract":"The recent scenarios expressing live digital forensics and its applications in security domain with multiple constraint-based analysis. Many digital forensic tools available in the market helps to make a good analysis of various digital forensic situations but the awareness of the situation-based decision making is still an unsolvable issue in many critical forensic cases. As the digital forensic domain increases its scope to various business and computer related industries, leading market investors and the employees are much aware about the digital crimes and its prevention. Here in this article, we proposed a new protocol which can help the decision making of sensitive digital forensic cases by the involvement of various constraint-based evaluation. A multi constraint operational system proposed here for live digital forensic and the decision support system takes an object parameter while the decision-making procedure is implemented. Thus, the protocol introduced here may carry a set of rules where the object formation and decision support constraints bind together and it may reply on the digital forensic tool integration. The characteristics of this protocol is mainly distributed for situation awareness criterion evaluation and modelled to limit the amount of data retrieval and its acquisition. categorical acquisition of digital evidences through time, duration, devices involved, wings of affect, cause of the target, hacker/attacker/affected user, kind of attack are the constraints to be solved through this prototype. The focus of this prototype is for dynamic digital forensics instead classic forensics conducted on switched off devices. This protocol supports the standard organizational formats to follow the forensic procedures in which a detailed recommendations and documentation from various organizations. The standardized formats of National Institute of Standards and Technology (NIST), International Standards Organization (ISO), Global Professional Information Community (AIIM) and American Society for Testing and Materials (now ASTM International) into considered while developing this protocol.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141675119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}