首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
Information security based on sub-system keys generator by utilizing polynomials method and logic gate 基于多项式法和逻辑门的子系统密钥生成器的信息安全
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1549
K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser
Information security is the biggest and most complex problem at present because of its great impact on modern software in all fields. Therefore, many researchers are working to develop modern methods of protecting data from modification or theft or even accessing it in one way or another. As dealing with data is a very sensitive matter in terms of sending this data from one party to another through the Internet or social media. The protection of that data requires the use of algorithms to encrypt or conceal the data with the proposed and used algorithms, and these algorithms work based on the proposed key exchange principle, so many of these algorithms need a key generator to work with other than the key is public or private for encryption or decryption the blade. Our proposed developed a key generation sub-system, as this system consists of two parts, the first part aimed to generate the first key (the first 64-bit subkey), while the second part (the second subsystem) will generate the second key (the second subkey is 64-bit). As the two sub-systems work to generate keys in different ways, the first system uses the principle of electronic gates to generate the keys randomly, while the second system uses binary text and LFSR. The idea in these sub-systems is that they work together in encrypting and decrypting data, requiring that the sender and receiver have the keys to complete the process. The results obtained from the two subsystems show the power in protecting data from reading or decoding its code, as the message consists of only a part of the key and the second part is at the receiver, and this gives stronger immunity in this encrypted data.
信息安全对现代软件的各个领域产生了巨大的影响,是当前最大、最复杂的问题。因此,许多研究人员正在努力开发现代方法来保护数据免受修改或盗窃,甚至以某种方式访问它。因为处理数据是一个非常敏感的问题,通过互联网或社交媒体将数据从一方发送到另一方。数据的保护需要使用算法来加密或隐藏数据,这些算法基于所建议的密钥交换原则工作,因此许多这些算法需要一个密钥生成器来使用,而不是公钥或私钥来加密或解密刀片。我们建议开发一个密钥生成子系统,因为该系统由两部分组成,第一部分旨在生成第一个密钥(第一个64位子密钥),而第二部分(第二个子系统)将生成第二个密钥(第二个子密钥是64位)。由于两个子系统生成密钥的方式不同,第一个系统使用电子门原理随机生成密钥,第二个系统使用二进制文本和LFSR。这些子系统的思想是,它们在加密和解密数据时协同工作,要求发送方和接收方拥有完成该过程的密钥。从这两个子系统得到的结果显示了保护数据不被读取或解码的能力,因为消息仅由一部分密钥组成,而另一部分在接收方,这使得加密数据具有更强的免疫力。
{"title":"Information security based on sub-system keys generator by utilizing polynomials method and logic gate","authors":"K. K. Jabbar, Hussain A. Hailal, Aysar Thamer Naser","doi":"10.47974/jdmsc-1549","DOIUrl":"https://doi.org/10.47974/jdmsc-1549","url":null,"abstract":"Information security is the biggest and most complex problem at present because of its great impact on modern software in all fields. Therefore, many researchers are working to develop modern methods of protecting data from modification or theft or even accessing it in one way or another. As dealing with data is a very sensitive matter in terms of sending this data from one party to another through the Internet or social media. The protection of that data requires the use of algorithms to encrypt or conceal the data with the proposed and used algorithms, and these algorithms work based on the proposed key exchange principle, so many of these algorithms need a key generator to work with other than the key is public or private for encryption or decryption the blade. Our proposed developed a key generation sub-system, as this system consists of two parts, the first part aimed to generate the first key (the first 64-bit subkey), while the second part (the second subsystem) will generate the second key (the second subkey is 64-bit). As the two sub-systems work to generate keys in different ways, the first system uses the principle of electronic gates to generate the keys randomly, while the second system uses binary text and LFSR. The idea in these sub-systems is that they work together in encrypting and decrypting data, requiring that the sender and receiver have the keys to complete the process. The results obtained from the two subsystems show the power in protecting data from reading or decoding its code, as the message consists of only a part of the key and the second part is at the receiver, and this gives stronger immunity in this encrypted data.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry 现代度量(MM):使用人工智能和数据分析应用程序的功能点进行软件规模估计,并使用印度软件工业找到功能单元的工作量调节器
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1734
J. T. M. Dhas, J. Midhunchakravarthy
SPM, Software Project Management is an engineering process for scheduling, developing, testing, and maintaining a software system. The size of a software is one of the important attributes in determining all the activities of SPM. Price, time, and effort are the basic factors for developing software in a successful and profitable manner. The fast explosions in technological development of software systems attracted all the fields that existed in the universe. The modern software system uses many programming languages, domains, operating systems, technologies, development cycles, topologies, etc. So, the industry is expecting a new, versatile, and highly updated sizing technique for modern software. Modern Metrics (MM) is a new anticipated size estimation technique for present software systems with updated functional values and metrics using Function Point (FP). This article analyzed the functional unit metric values (effort modifiers) of the MM with real world applications. MM is a novel method for determining the solution to the SPM challenges.
SPM,软件项目管理是一个工程过程,用于调度、开发、测试和维护软件系统。软件的大小是决定SPM所有活动的重要属性之一。价格、时间和努力是以成功和有利可图的方式开发软件的基本因素。软件系统技术发展的迅猛发展吸引了宇宙中存在的所有领域。现代软件系统使用了许多编程语言、领域、操作系统、技术、开发周期、拓扑结构等。因此,业界期望为现代软件提供一种新的、通用的、高度更新的大小调整技术。现代度量(MM)是一种基于功能点(FP)的更新功能值和度量的软件系统的新的预期规模估计技术。本文在实际应用中分析了MM的功能单位度量值(工作量调节剂)。MM是一种确定SPM问题解决方案的新方法。
{"title":"Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry","authors":"J. T. M. Dhas, J. Midhunchakravarthy","doi":"10.47974/jdmsc-1734","DOIUrl":"https://doi.org/10.47974/jdmsc-1734","url":null,"abstract":"SPM, Software Project Management is an engineering process for scheduling, developing, testing, and maintaining a software system. The size of a software is one of the important attributes in determining all the activities of SPM. Price, time, and effort are the basic factors for developing software in a successful and profitable manner. The fast explosions in technological development of software systems attracted all the fields that existed in the universe. The modern software system uses many programming languages, domains, operating systems, technologies, development cycles, topologies, etc. So, the industry is expecting a new, versatile, and highly updated sizing technique for modern software. Modern Metrics (MM) is a new anticipated size estimation technique for present software systems with updated functional values and metrics using Function Point (FP). This article analyzed the functional unit metric values (effort modifiers) of the MM with real world applications. MM is a novel method for determining the solution to the SPM challenges.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy RG-ideals of RG-algebra rg代数的模糊rg理想
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1552
A. Hameed, Show Mohammed Abraham, A. Abed
The aim of this paper is to introduce the terms fuzzy RG-subalgebra of RG -algebra, provide a few important examples, and look at a few aspects in this paper. The image and pre-image of fuzzy RG-subalgebra of RG-algebra are presented, as well as an introduction to the concept of fuzzy RG-ideal of RG-algebra, and several properties and theorems are proved.
本文介绍了RG-代数中的模糊RG-子代数,给出了几个重要的例子,并从几个方面进行了探讨。给出了rg -代数的模糊rg -子代数的像和预像,介绍了rg -代数的模糊rg -理想的概念,并证明了几个性质和定理。
{"title":"Fuzzy RG-ideals of RG-algebra","authors":"A. Hameed, Show Mohammed Abraham, A. Abed","doi":"10.47974/jdmsc-1552","DOIUrl":"https://doi.org/10.47974/jdmsc-1552","url":null,"abstract":"The aim of this paper is to introduce the terms fuzzy RG-subalgebra of RG -algebra, provide a few important examples, and look at a few aspects in this paper. The image and pre-image of fuzzy RG-subalgebra of RG-algebra are presented, as well as an introduction to the concept of fuzzy RG-ideal of RG-algebra, and several properties and theorems are proved.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On characterizations some of subgroups of the dihedral group D2n 二面体群D2n的若干子群的刻画
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1553
Hader Baqer Shelash, Hasanain Hamid Ahmad, Ahmed J. Obaid
The finite group M is an H-group if every subgroup in M is an M-subgroup, and we say M is a j-group if every subgroup in M is a j-subgroup. In this study, we look at some of the characteristics of some dihedral group subgroups. As a result, we have student relationships between several subgroups, the quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.
如果M中的每个子群都是M-子群,则有限群M是h群,如果M中的每个子群都是j-子群,则M是j群。在这项研究中,我们研究了一些二面体群亚群的一些特征。因此,我们有几个子群体之间的学生关系,数量需求和研发投资,而另一个模型侧重于数量需求和价格之间更现实的关系。
{"title":"On characterizations some of subgroups of the dihedral group D2n","authors":"Hader Baqer Shelash, Hasanain Hamid Ahmad, Ahmed J. Obaid","doi":"10.47974/jdmsc-1553","DOIUrl":"https://doi.org/10.47974/jdmsc-1553","url":null,"abstract":"The finite group M is an H-group if every subgroup in M is an M-subgroup, and we say M is a j-group if every subgroup in M is a j-subgroup. In this study, we look at some of the characteristics of some dihedral group subgroups. As a result, we have student relationships between several subgroups, the quantity demand and investment in research and development, while the other model focuses on a more realistic relationship between the quantity demand and the price.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On permutation topological groups with their basic properties 论置换拓扑群及其基本性质
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1551
Abu Firas Muhammad Jawad Al Musawi, E. Suleiman
In this research, one of the non-classical sets, the permutation set, is utilized to analyze a new class of topological groups induced by β-sets, it is named permutation topological groups, and investigates some of its basic features. In addition, several results are applied to our permutation topological group class.
本文利用置换集这一非经典集合中的一种,分析了由β-集合引发的一类新的拓扑群,并研究了它的一些基本特征。此外,一些结果应用于我们的置换拓扑群类。
{"title":"On permutation topological groups with their basic properties","authors":"Abu Firas Muhammad Jawad Al Musawi, E. Suleiman","doi":"10.47974/jdmsc-1551","DOIUrl":"https://doi.org/10.47974/jdmsc-1551","url":null,"abstract":"In this research, one of the non-classical sets, the permutation set, is utilized to analyze a new class of topological groups induced by β-sets, it is named permutation topological groups, and investigates some of its basic features. In addition, several results are applied to our permutation topological group class.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized deep learning methodology for intruder behavior detection and classification in cloud 优化了云环境下入侵者行为检测与分类的深度学习方法
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1516
Apps, networks, frameworks, and services are all made possible by the cloud. In order to get the most out of the improved accessibility and computational capabilities, the Service Providers can offer an optimal use of current services. Application services have been revolutionised as their launch since they are useful and cost-effective for both suppliers and users. Increasingly, cyber defence is a vital research area in today’s environment, where networks are essential. The software and hardware of a network are constantly monitored by an intrusion detection framework (IDF), which is an essential part of any cyber defence plan. Many of the current IDSs are still struggling to improve detection performance, reduce false alarm rates and detect new threats. Based on parametric computation analysis, this study provides a deep learning approach to optimize cloud networks and to identify intruders. Results of suggested approach have been displayed from data compared to current methods in the conclusion section.
应用程序、网络、框架和服务都是由云实现的。为了最大限度地利用改进的可访问性和计算能力,服务提供者可以提供对当前服务的最佳使用。应用程序服务一经推出就发生了革命性的变化,因为它们对供应商和用户都很有用,而且成本效益高。在网络至关重要的今天,网络防御日益成为一个重要的研究领域。网络的软件和硬件由入侵检测框架(IDF)持续监控,这是任何网络防御计划的重要组成部分。目前的许多入侵防御系统仍在努力提高检测性能、降低误报率和检测新威胁。基于参数计算分析,本研究提供了一种深度学习方法来优化云网络并识别入侵者。建议的方法的结果已经显示从数据比较目前的方法在结论部分。
{"title":"Optimized deep learning methodology for intruder behavior detection and classification in cloud","authors":"","doi":"10.47974/jdmsc-1516","DOIUrl":"https://doi.org/10.47974/jdmsc-1516","url":null,"abstract":"Apps, networks, frameworks, and services are all made possible by the cloud. In order to get the most out of the improved accessibility and computational capabilities, the Service Providers can offer an optimal use of current services. Application services have been revolutionised as their launch since they are useful and cost-effective for both suppliers and users. Increasingly, cyber defence is a vital research area in today’s environment, where networks are essential. The software and hardware of a network are constantly monitored by an intrusion detection framework (IDF), which is an essential part of any cyber defence plan. Many of the current IDSs are still struggling to improve detection performance, reduce false alarm rates and detect new threats. Based on parametric computation analysis, this study provides a deep learning approach to optimize cloud networks and to identify intruders. Results of suggested approach have been displayed from data compared to current methods in the conclusion section.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I-prime fuzzy submodules i '模糊子模块
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1563
Manal Ali Sagban, Ali Abd Alhussein Zyarah, A. H. Hussain
In this paper, we introduce a new generalization of prime F.S.M (P.F.S), called I- prime F.S.M and I be any ideal of a commutative ring R also, we study some properties of it and giving some characterizations of I-P.F.S. We establish the situation of I-P.F.Ss in F.M of the R-module and, we show that I-P.F.S and P.F.S are coincident under certain conditions.
本文引入了素数F.S.M的一种新的推广(P.F.S),称为I-素数F.S.M, I是交换环R的任意理想,研究了它的一些性质,给出了I-P.F.S的一些刻画。我们建立i - p - f的情况。s在r模的F.M中,我们证明了I-P.F。S和P.F.S在一定条件下是一致的。
{"title":"I-prime fuzzy submodules","authors":"Manal Ali Sagban, Ali Abd Alhussein Zyarah, A. H. Hussain","doi":"10.47974/jdmsc-1563","DOIUrl":"https://doi.org/10.47974/jdmsc-1563","url":null,"abstract":"In this paper, we introduce a new generalization of prime F.S.M (P.F.S), called I- prime F.S.M and I be any ideal of a commutative ring R also, we study some properties of it and giving some characterizations of I-P.F.S. We establish the situation of I-P.F.Ss in F.M of the R-module and, we show that I-P.F.S and P.F.S are coincident under certain conditions.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart oyster mushroom cultivation using automatic fuzzy logic controller 一种基于自动模糊逻辑控制器的智能平菇栽培技术
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1731
Dakhole Dipali, Thiruselvan Subramanian, G. Kumaran
Oyster mushroom cultivation is an eco-friendly, profitable agribusiness because of its nutritious and medicinal value but it is labor-intensive, and it grows in a sensitive environment. It must use an autonomous environment control system to optimize and offer the necessary growing conditions. To optimize the temperature and humidity and consequently maximize mushroom production, a smart mushroom watering, monitoring, and controlling system using fuzzy logic controllers (FLC) have been developed. This study suggests installing an Internet of Things (IoT) node that uses DHT22 sensors, an ESP32 board, and relays to control actuators (sprinkler, cooling fan, humidifier, and heater) in a smart oyster mushroom house. The controller on sensing current temperature and humidity values using the fuzzy logic technique switches on/off the actuators automatically. The data collected at each IoT node is collected and visualized on the ThingSpeak platform. The computed response time for actuators using FLC is compared with that calculated using a simple ON-OFF method. The findings demonstrate that response time calculation using fuzzy logic is significantly accurate and faster than a simple ON-OFF approach. Additionally, the graphs created in live on ThingSpeak, demonstrate that the FLC algorithm is more robust and effective than the simple ON-OFF algorithm.
由于其营养和药用价值,平菇种植是一种环保、有利可图的农业综合企业,但它是劳动密集型的,而且生长在一个敏感的环境中。它必须使用一个自主的环境控制系统来优化和提供必要的生长条件。为了优化温度和湿度,从而最大限度地提高蘑菇产量,开发了一种使用模糊逻辑控制器(FLC)的智能蘑菇浇水、监测和控制系统。该研究建议在智能蘑菇屋中安装使用DHT22传感器、ESP32板和继电器控制执行器(洒水器、冷却风扇、加湿器、加热器)的物联网(IoT)节点。控制器对当前温度和湿度值的感知采用模糊逻辑技术自动开关执行器。每个物联网节点收集的数据在ThingSpeak平台上进行收集和可视化。用FLC计算的执行器响应时间与用简单的ON-OFF方法计算的响应时间进行了比较。结果表明,与简单的ON-OFF方法相比,使用模糊逻辑计算响应时间具有显著的准确性和速度。此外,在ThingSpeak上实时创建的图表表明,FLC算法比简单的on - off算法更健壮和有效。
{"title":"A smart oyster mushroom cultivation using automatic fuzzy logic controller","authors":"Dakhole Dipali, Thiruselvan Subramanian, G. Kumaran","doi":"10.47974/jdmsc-1731","DOIUrl":"https://doi.org/10.47974/jdmsc-1731","url":null,"abstract":"Oyster mushroom cultivation is an eco-friendly, profitable agribusiness because of its nutritious and medicinal value but it is labor-intensive, and it grows in a sensitive environment. It must use an autonomous environment control system to optimize and offer the necessary growing conditions. To optimize the temperature and humidity and consequently maximize mushroom production, a smart mushroom watering, monitoring, and controlling system using fuzzy logic controllers (FLC) have been developed. This study suggests installing an Internet of Things (IoT) node that uses DHT22 sensors, an ESP32 board, and relays to control actuators (sprinkler, cooling fan, humidifier, and heater) in a smart oyster mushroom house. The controller on sensing current temperature and humidity values using the fuzzy logic technique switches on/off the actuators automatically. The data collected at each IoT node is collected and visualized on the ThingSpeak platform. The computed response time for actuators using FLC is compared with that calculated using a simple ON-OFF method. The findings demonstrate that response time calculation using fuzzy logic is significantly accurate and faster than a simple ON-OFF approach. Additionally, the graphs created in live on ThingSpeak, demonstrate that the FLC algorithm is more robust and effective than the simple ON-OFF algorithm.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A4-graph for the twisted group 3D4 (3) 扭曲群3D4(3)图
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1562
Salwa Mohammed Hamid, A. Aubad
Assume that G is a finite group and X = tG where t is non-identity element with t3 = 1. The simple graph with node set being X such that a, b ∈ X, are adjacent if ab-1 is an involution element, is called the A4-graph, and designated by A4(G, X). In this article, the construction of A4(G, X) is analyzed for G is the twisted group of Lie type 3D4(3).
设G是有限群,X = tG,其中t为非单位元,t3 = 1。当ab-1为对合元时,节点集为X且a, b∈X相邻的简单图称为A4-图,用A4(G, X)表示。本文分析了A4(G, X)的构造,因为G是Lie型的扭曲群3D4(3)。
{"title":"A4-graph for the twisted group 3D4 (3)","authors":"Salwa Mohammed Hamid, A. Aubad","doi":"10.47974/jdmsc-1562","DOIUrl":"https://doi.org/10.47974/jdmsc-1562","url":null,"abstract":"Assume that G is a finite group and X = tG where t is non-identity element with t3 = 1. The simple graph with node set being X such that a, b ∈ X, are adjacent if ab-1 is an involution element, is called the A4-graph, and designated by A4(G, X). In this article, the construction of A4(G, X) is analyzed for G is the twisted group of Lie type 3D4(3).","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some diagonalizable matrices, connected with difference equations of degree 3 与3次差分方程相连接的若干可对角化矩阵
IF 1.4 Q1 Mathematics Pub Date : 2022-11-17 DOI: 10.1080/09720529.2022.2059921
D. Savin
Abstract In this paper, we obtain a certain class of diagonalizable matrices, starting from a certain difference equation of degree 3, which is related to Pell’s numbers.
摘要本文从一个与Pell数有关的3阶差分方程出发,得到了一类可对角化矩阵。
{"title":"Some diagonalizable matrices, connected with difference equations of degree 3","authors":"D. Savin","doi":"10.1080/09720529.2022.2059921","DOIUrl":"https://doi.org/10.1080/09720529.2022.2059921","url":null,"abstract":"Abstract In this paper, we obtain a certain class of diagonalizable matrices, starting from a certain difference equation of degree 3, which is related to Pell’s numbers.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49251551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1