首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
Automatic irrigation control system using Internet of Things(IoT) 基于物联网的自动灌溉控制系统
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068597
Satnam Singh Saini, Dheresh Soni, Simarjeet Singh Malhi, Vipin Tiwari, Ankur Goyal
Abstract The water deficiency for agriculture around India has pushed a need for optimal utilization of it. Internet of Things (IoT) is today’s emerging trend which bridges the gap of real world with the technology. An IoT based automatic irrigation control systems helps in the optimal water utilization for the crop fields. This article proposes an automatic irrigation control system which is based on Internet of Things to predict water requirement of a crop field by processing the wireless sensor network’s (WSN) sensor data like relative humidity, moisture of soil, temperature of soil, and radiation of light (Ultraviolet) along with the Indian Meteorological Department’s weather forecast. Considering the sensed data from the environment with the weather forecasting data, a machine learning algorithm for soil moisture prediction is developed to evaluate the water requirement for a particular area of agricultural land for that crop yield. Real time information of the agriculture landscape is provided through a smart information processing and decision support system which is implemented using schematic web service. This article discusses and describes the system implementation in detail. The results by the automatic irrigation control system based on the soil moisture prediction algorithm are presented. The irrigation control system is completely automated and soil moisture prediction results are nearest to reality.
摘要印度农业用水短缺,迫切需要对水资源进行优化利用。物联网(IoT)是当今的新兴趋势,它弥合了现实世界与技术的差距。基于物联网的自动灌溉控制系统有助于作物田地的最佳水资源利用。本文提出了一种基于物联网的自动灌溉控制系统,通过处理无线传感器网络(WSN)的相对湿度、土壤湿度、土壤温度、光辐射(紫外线)等传感器数据,结合印度气象部门的天气预报,预测农田需水量。考虑到从环境中感知到的数据与天气预报数据,开发了一种用于土壤湿度预测的机器学习算法,以评估特定区域的农业用地对该作物产量的需水量。通过智能信息处理和决策支持系统提供农业景观的实时信息,该系统采用原理图web服务实现。本文对系统的实现进行了详细的讨论和描述。介绍了基于土壤水分预测算法的自动灌溉控制系统的试验结果。灌溉控制系统完全自动化,土壤湿度预测结果最接近实际。
{"title":"Automatic irrigation control system using Internet of Things(IoT)","authors":"Satnam Singh Saini, Dheresh Soni, Simarjeet Singh Malhi, Vipin Tiwari, Ankur Goyal","doi":"10.1080/09720529.2022.2068597","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068597","url":null,"abstract":"Abstract The water deficiency for agriculture around India has pushed a need for optimal utilization of it. Internet of Things (IoT) is today’s emerging trend which bridges the gap of real world with the technology. An IoT based automatic irrigation control systems helps in the optimal water utilization for the crop fields. This article proposes an automatic irrigation control system which is based on Internet of Things to predict water requirement of a crop field by processing the wireless sensor network’s (WSN) sensor data like relative humidity, moisture of soil, temperature of soil, and radiation of light (Ultraviolet) along with the Indian Meteorological Department’s weather forecast. Considering the sensed data from the environment with the weather forecasting data, a machine learning algorithm for soil moisture prediction is developed to evaluate the water requirement for a particular area of agricultural land for that crop yield. Real time information of the agriculture landscape is provided through a smart information processing and decision support system which is implemented using schematic web service. This article discusses and describes the system implementation in detail. The results by the automatic irrigation control system based on the soil moisture prediction algorithm are presented. The irrigation control system is completely automated and soil moisture prediction results are nearest to reality.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"879 - 889"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48863850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis and design of secure VANET by detection and avoidance of blackhole attack 检测和避免黑洞攻击的安全VANET分析与设计
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075091
Anil Pal, B. Keswani, Dinesh Goyal
Abstract Transmission of the data and information over Ad-Hoc network and its security is a very big challenge. VANET Networks have evolved for helping mobile services, but still the users are facing lot of challenges to preserve the security of information. The proposed research includes the concepts of detecting the Blackhole node and counters it in the VANET network for preserving the network strength as well as performance using a new protocol. The proposed protocol encrypts and decrypts the information using RC4A and simultaneously protects the network from Blackhole Attack.
在Ad-Hoc网络上传输数据和信息及其安全性是一个很大的挑战。VANET网络的发展是为了帮助移动服务,但用户仍然面临着许多挑战,以保持信息的安全。提出的研究包括在VANET网络中检测黑洞节点和对抗黑洞节点的概念,以使用新协议保持网络强度和性能。该协议使用RC4A对信息进行加密和解密,同时保护网络免受黑洞攻击。
{"title":"Analysis and design of secure VANET by detection and avoidance of blackhole attack","authors":"Anil Pal, B. Keswani, Dinesh Goyal","doi":"10.1080/09720529.2022.2075091","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075091","url":null,"abstract":"Abstract Transmission of the data and information over Ad-Hoc network and its security is a very big challenge. VANET Networks have evolved for helping mobile services, but still the users are facing lot of challenges to preserve the security of information. The proposed research includes the concepts of detecting the Blackhole node and counters it in the VANET network for preserving the network strength as well as performance using a new protocol. The proposed protocol encrypts and decrypts the information using RC4A and simultaneously protects the network from Blackhole Attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1173 - 1182"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46308118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public safety analysis and safety system using arduino 使用arduino的公共安全分析和安全系统
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072417
Deepika Saxena, Anuj Kumar Vishwakarma, S. Verma
Abstract Today, personal security has become a major issue for both men & women. Women have endured carnal harassment these days which is shocking every day. The circumstances are much worse in growing and less developed countries. Women’s safety is an hour-long necessity these days. In India, there are many cases of violence against women. Important saftey measures for men & women should be there at home, outside or in their workplace. In this paper an attempt has been made to make a smart machine that can help women when they feel unsafe. Women can get faster support and higher security by pressing the device’s emergency button. In the event of an incident, this device can trace the location of the user in actual time and send it to the nearest police station and volunteers [5]. The user can find a secure area nearby with this device as well. Additionally, this gadget works on both online and offline modes. Whether no internet is available, the user can still use the gadget to access the nearest police station and volunteer support. The device contains Raspberry pie, GSM, PIR sensors, Bluetooth, GPS, etc [2]. The sum of all these features together makes this gadget affordable and easy to navigate.
今天,个人安全已经成为男人和女人的主要问题。如今,女性遭受的肉体骚扰每天都令人震惊。发展中国家和欠发达国家的情况要糟糕得多。如今,女性的安全是一个小时的必需品。在印度,有许多针对妇女的暴力案件。对于男性和女性来说,重要的安全措施应该在家里、外面或工作场所。在这篇论文中,人们试图制造一种智能机器,当女性感到不安全时,它可以帮助她们。女性可以通过按下设备的紧急按钮来获得更快的支持和更高的安全性。在发生事故时,该设备可以实时追踪用户的位置,并将其发送给最近的警察局和志愿者b[5]。用户也可以用这个设备找到附近的安全区域。此外,这个小工具可以在在线和离线模式下工作。即使没有互联网,用户也可以使用这个小工具联系最近的警察局和志愿者。该设备包含覆盆子派,GSM, PIR传感器,蓝牙,GPS等[2]。所有这些功能加在一起,使这个小工具价格实惠,易于操作。
{"title":"Public safety analysis and safety system using arduino","authors":"Deepika Saxena, Anuj Kumar Vishwakarma, S. Verma","doi":"10.1080/09720529.2022.2072417","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072417","url":null,"abstract":"Abstract Today, personal security has become a major issue for both men & women. Women have endured carnal harassment these days which is shocking every day. The circumstances are much worse in growing and less developed countries. Women’s safety is an hour-long necessity these days. In India, there are many cases of violence against women. Important saftey measures for men & women should be there at home, outside or in their workplace. In this paper an attempt has been made to make a smart machine that can help women when they feel unsafe. Women can get faster support and higher security by pressing the device’s emergency button. In the event of an incident, this device can trace the location of the user in actual time and send it to the nearest police station and volunteers [5]. The user can find a secure area nearby with this device as well. Additionally, this gadget works on both online and offline modes. Whether no internet is available, the user can still use the gadget to access the nearest police station and volunteer support. The device contains Raspberry pie, GSM, PIR sensors, Bluetooth, GPS, etc [2]. The sum of all these features together makes this gadget affordable and easy to navigate.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"955 - 961"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44434651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NOMA waveform technique using orthogonal supplementary signal for advanced 5G networks security 利用正交补充信号的NOMA波形技术实现先进的5G网络安全
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075088
Mohit K. Sharma, Arun Kumar
Abstract The rollout of the advanced communication network is going all around the world and the demands for wireless applications are increasing day by day. At the same time, the design of secured networks and efficient energy devices is considered a huge concern. In this work, we proposed an implementation of Non-Orthogonal Frequency Division Multiplexing (NOMA) for future networks in which supplementary signals are accurately implemented and spread over the peak of the subscriber signal. This method guarantees an ideal security against the external and internal intruders. In the second part of the work, we analyze and improve the battery performance of the user device by implementing a novel peak to average power ratio (PAPR) reduction algorithm. Other parameters such as Bit Error Rate (BER), PAPR are simulated using Matlab-2014. The outcomes of the work reveal that the proposed framework obtained a secured and less complicated network.
摘要先进的通信网络正在世界各地推广,对无线应用的需求与日俱增。与此同时,安全网络和高效能源设备的设计被认为是一个巨大的问题。在这项工作中,我们提出了一种用于未来网络的非正交频分复用(NOMA)的实现方式,在该网络中,补充信号被准确地实现并分布在用户信号的峰值上。这种方法保证了针对外部和内部入侵者的理想安全性。在工作的第二部分中,我们通过实现一种新颖的峰均功率比(PAPR)降低算法来分析和提高用户设备的电池性能。其他参数,如误码率(BER)、PAPR,使用Matlab-2014进行模拟。工作结果表明,所提出的框架获得了一个安全且不那么复杂的网络。
{"title":"NOMA waveform technique using orthogonal supplementary signal for advanced 5G networks security","authors":"Mohit K. Sharma, Arun Kumar","doi":"10.1080/09720529.2022.2075088","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075088","url":null,"abstract":"Abstract The rollout of the advanced communication network is going all around the world and the demands for wireless applications are increasing day by day. At the same time, the design of secured networks and efficient energy devices is considered a huge concern. In this work, we proposed an implementation of Non-Orthogonal Frequency Division Multiplexing (NOMA) for future networks in which supplementary signals are accurately implemented and spread over the peak of the subscriber signal. This method guarantees an ideal security against the external and internal intruders. In the second part of the work, we analyze and improve the battery performance of the user device by implementing a novel peak to average power ratio (PAPR) reduction algorithm. Other parameters such as Bit Error Rate (BER), PAPR are simulated using Matlab-2014. The outcomes of the work reveal that the proposed framework obtained a secured and less complicated network.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1125 - 1136"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49048181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic epileptic signal classification using deep convolutional neural network 基于深度卷积神经网络的癫痫信号自动分类
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072419
Dipali Sinha, K. Thangavel
Abstract Epilepsy is a neurological illness that causes seizures in the brain and affects a huge number of people worldwide. Electroencephalography (EEG) is the most commonly used modality for epilepsy prognosis, although visual inspection of EEG signals is a time- consuming and cumbersome task. To avoid that, several automated systems have been developed to assist neurologists. Feature extraction-based machine learning algorithms were used long before the advent of deep learning. But their success was limited to the capabilities of those who crafted the features manually. Deep learning is an artificial intelligence branch in which feature extraction and classification are completely automated. This paper, in particular, presents a deep learning architecture, Convolutional Neural Network (CNN), to classify EEG signals into three categories: normal, pre-ictal, and ictal or seizure. The proposed model achieved an accuracy, precision, recall, F-measure, and error rate of 94.0%, 93.2%, 94.3%, 93.7, and 6.0% respectively.
摘要癫痫是一种导致大脑癫痫发作的神经系统疾病,影响着全世界大量的人。脑电图(EEG)是癫痫预后最常用的方法,尽管视觉检查EEG信号是一项耗时且繁琐的任务。为了避免这种情况,已经开发了几个自动化系统来帮助神经学家。早在深度学习出现之前,就已经使用了基于特征提取的机器学习算法。但他们的成功仅限于那些手工制作这些功能的人的能力。深度学习是一个人工智能分支,其中特征提取和分类是完全自动化的。本文特别提出了一种深度学习架构——卷积神经网络(CNN),将脑电图信号分为三类:正常、发作前和发作或癫痫。该模型的准确率、精密度、召回率、F-测度和错误率分别为94.0%、93.2%、94.3%、93.7%和6.0%。
{"title":"Automatic epileptic signal classification using deep convolutional neural network","authors":"Dipali Sinha, K. Thangavel","doi":"10.1080/09720529.2022.2072419","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072419","url":null,"abstract":"Abstract Epilepsy is a neurological illness that causes seizures in the brain and affects a huge number of people worldwide. Electroencephalography (EEG) is the most commonly used modality for epilepsy prognosis, although visual inspection of EEG signals is a time- consuming and cumbersome task. To avoid that, several automated systems have been developed to assist neurologists. Feature extraction-based machine learning algorithms were used long before the advent of deep learning. But their success was limited to the capabilities of those who crafted the features manually. Deep learning is an artificial intelligence branch in which feature extraction and classification are completely automated. This paper, in particular, presents a deep learning architecture, Convolutional Neural Network (CNN), to classify EEG signals into three categories: normal, pre-ictal, and ictal or seizure. The proposed model achieved an accuracy, precision, recall, F-measure, and error rate of 94.0%, 93.2%, 94.3%, 93.7, and 6.0% respectively.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"963 - 973"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45775314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting location privacy in cloud services 在云服务中保护位置隐私
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072430
Sarvesh Kumar, P. Srivastava, A. Pal, Vinay Priy Mishra, Prateek Singhal, Gaurav Kumar Srivastava, Udit Mamodiya
Abstract In GPS system enabled hand-held communication devices which works as a beacon that transmits our location. Also, the location-based services that emerged in recent years make use of location data. The location data provided to these location-based service providers have enough sensitive information to bother about. The location privacy became an area of concern in recent years. Developed and developing countries are now in process to make laws against the use of location information without the consent of the user or without legal warrant. Most of the research strategies proposed in recent years have one thing in common that we provide a region instead of exact coordinates of the location of the user. These attacks are called location dependent attacks or velocity linkage attacks in literature. We have in our effort proposed a solution to the problem of location privacy protection taking care of the location dependent attacks. We also keep in mind the fact that user is more concerned about his locations at certain places. We tested the proposed solution against requests issued by 5000 and 15000 users moving in a field of 10000x10000 units’ area.
摘要在GPS系统中,手持通信设备可以作为信标传输我们的位置。此外,近年来出现的基于位置的服务利用了位置数据。提供给这些基于位置的服务提供商的位置数据有足够的敏感信息需要关注。近年来,位置隐私成为人们关注的一个领域。发达国家和发展中国家目前正在制定法律,禁止在未经用户同意或未经法律授权的情况下使用位置信息。近年来提出的大多数研究策略都有一个共同点,即我们提供一个区域,而不是用户位置的精确坐标。这些攻击在文献中被称为位置相关攻击或速度链接攻击。在我们的努力中,我们提出了一个解决位置隐私保护问题的方案,以应对与位置相关的攻击。我们还注意到,用户更关心他在某些地方的位置。我们针对在10000x10000单元区域内移动的5000和15000名用户发出的请求测试了所提出的解决方案。
{"title":"Protecting location privacy in cloud services","authors":"Sarvesh Kumar, P. Srivastava, A. Pal, Vinay Priy Mishra, Prateek Singhal, Gaurav Kumar Srivastava, Udit Mamodiya","doi":"10.1080/09720529.2022.2072430","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072430","url":null,"abstract":"Abstract In GPS system enabled hand-held communication devices which works as a beacon that transmits our location. Also, the location-based services that emerged in recent years make use of location data. The location data provided to these location-based service providers have enough sensitive information to bother about. The location privacy became an area of concern in recent years. Developed and developing countries are now in process to make laws against the use of location information without the consent of the user or without legal warrant. Most of the research strategies proposed in recent years have one thing in common that we provide a region instead of exact coordinates of the location of the user. These attacks are called location dependent attacks or velocity linkage attacks in literature. We have in our effort proposed a solution to the problem of location privacy protection taking care of the location dependent attacks. We also keep in mind the fact that user is more concerned about his locations at certain places. We tested the proposed solution against requests issued by 5000 and 15000 users moving in a field of 10000x10000 units’ area.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1053 - 1062"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49376654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach COVID-19大流行与网络安全问题:情感分析和主题建模方法
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072421
Sonali Khandelwal, Aanyaa Chaudhary
Abstract The purpose of this study is to understand public awareness of cybersecurity-related issues and discussions during the COVID-19 pandemic. Employees and confidential organizational data are vulnerable to cyber-attacks as a result of the pandemic, which has raised concerns about cyber security about the new normal of working from home. The public’s main sentiments and aspects related to cyber security concerns have been mined from tweets on the microblogging social media website Twitter. Sentiment Analysis and Topic Modeling techniques have been applied to understand the perspectives, emotions, and themes discussed by people. The analysis reveals people are becoming more aware of cybercrime-related concerns and are more positive than negative in combating the challenge of cybercrime. The paper also highlights the main themes revealed by Topic Modeling.
本研究旨在了解2019冠状病毒病大流行期间公众对网络安全相关问题的认识和讨论。受疫情影响,员工和组织机密数据容易受到网络攻击,这引发了人们对在家办公新常态下网络安全的担忧。公众对网络安全担忧的主要情绪和方面是从微博社交媒体网站Twitter上的推文中挖掘出来的。情感分析和主题建模技术已被应用于理解人们讨论的观点、情绪和主题。分析显示,人们越来越意识到与网络犯罪有关的问题,在打击网络犯罪的挑战方面,人们的态度是积极的,而不是消极的。文章还强调了主题建模所揭示的主要主题。
{"title":"COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach","authors":"Sonali Khandelwal, Aanyaa Chaudhary","doi":"10.1080/09720529.2022.2072421","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072421","url":null,"abstract":"Abstract The purpose of this study is to understand public awareness of cybersecurity-related issues and discussions during the COVID-19 pandemic. Employees and confidential organizational data are vulnerable to cyber-attacks as a result of the pandemic, which has raised concerns about cyber security about the new normal of working from home. The public’s main sentiments and aspects related to cyber security concerns have been mined from tweets on the microblogging social media website Twitter. Sentiment Analysis and Topic Modeling techniques have been applied to understand the perspectives, emotions, and themes discussed by people. The analysis reveals people are becoming more aware of cybercrime-related concerns and are more positive than negative in combating the challenge of cybercrime. The paper also highlights the main themes revealed by Topic Modeling.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"987 - 997"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47191403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of recurring vulnerabilities in computing services 检测计算服务中反复出现的漏洞
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072432
Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya
Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.
在实时应用开发中,开源公式及其效果得到了极大的增强。安全是检测漏洞的主要技术领域。相互检测费时费力,是不可行的。有很多检测漏洞的技术。在这项研究工作中,我们开发了一种混合检测方法。我们正在使用一个庞大的软件系统。我们的方法是基于令牌公式和基于指纹的错误检测。我们正在设计的工具能够检测和修补与安全相关的威胁。我们还将我们的方法与现有的方法进行了比较,我们的工具的性能和效率比其他方法要好得多。
{"title":"Detection of recurring vulnerabilities in computing services","authors":"Sarvesh Kumar, Kamlesh Kumar Dubey, A. Gautam, Shikha Verma, Vinay Kumar, Udit Mamodiya","doi":"10.1080/09720529.2022.2072432","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072432","url":null,"abstract":"Abstract In real time the open-source formulation and their effects are becoming highly enhanced for the development of applications. Security is the major area of technology to detect vulnerabilities. Mutual detection is time taking and very tough which is not feasible. There are a lot of techniques for the detection of vulnerabilities. In this research work we have developed the hybrid approach for the detection. We are using a huge software system. Our approach is based on the token formulation and fingerprint-based detection of errors. The tool we are designing is able to detect and patch the security related threats. We have also compared our approach with the existing approach and the performance and efficiency of our tool is much better than others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1063 - 1071"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45021933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Chaos based image encryption security in cloud computing 云计算中基于混沌的图像加密安全
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075085
Sarvesh Kumar, P. Srivastava, Gaurav Kumar Srivastava, Prateek Singhal, Dinesh Singh, D. Goyal
Abstract In the rapid world of technology, the IT Industry is growing at a rapid speed with Cloud Image Security. In the developing trends, cloud orchestration is becoming impressive and uncertain of dealing a large amount of information. In the last two decades there has been extensive development in image encryption. Chaos based image encryption techniques form framework for a faster algorithm than traditional techniques. Chaos based techniques are highly efficient in case of multimedia data. The proposed algorithm uses the modified logistic map for the generation of chaotic sequence, encrypts the image in single scan, so runs faster and makes the proper use of confusion and diffusion. It dynamically updates the key during execution. This algorithm is secure against the brute force attack and differential attack.
在飞速发展的技术世界中,随着云图像安全的发展,IT行业正在快速发展。从发展趋势来看,云编排在处理大量信息方面变得越来越令人印象深刻和不确定。在过去的二十年里,图像加密技术得到了广泛的发展。基于混沌的图像加密技术形成了一个比传统技术更快的算法框架。基于混沌的技术在处理多媒体数据时效率很高。该算法采用改进的逻辑映射生成混沌序列,对图像进行一次扫描加密,运行速度更快,并合理利用了混淆和扩散。它在执行期间动态更新键。该算法对暴力破解和差分攻击是安全的。
{"title":"Chaos based image encryption security in cloud computing","authors":"Sarvesh Kumar, P. Srivastava, Gaurav Kumar Srivastava, Prateek Singhal, Dinesh Singh, D. Goyal","doi":"10.1080/09720529.2022.2075085","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075085","url":null,"abstract":"Abstract In the rapid world of technology, the IT Industry is growing at a rapid speed with Cloud Image Security. In the developing trends, cloud orchestration is becoming impressive and uncertain of dealing a large amount of information. In the last two decades there has been extensive development in image encryption. Chaos based image encryption techniques form framework for a faster algorithm than traditional techniques. Chaos based techniques are highly efficient in case of multimedia data. The proposed algorithm uses the modified logistic map for the generation of chaotic sequence, encrypts the image in single scan, so runs faster and makes the proper use of confusion and diffusion. It dynamically updates the key during execution. This algorithm is secure against the brute force attack and differential attack.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1041 - 1051"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46203591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing information security metrics and measures for risk assessment of an organization 为组织的风险评估制定信息安全标准和措施
IF 1.4 Q2 MATHEMATICS, APPLIED Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075092
Prashant Manuja, R. Shekhawat
Abstract The absence of public safety normalization bodies can antagonistically affect the reception of worldwide security guidelines and best practices. This research is done for the benefit of people, process and technology for any organization. This paper presents a novel pragmatic network protection evaluation structure that is custom-made to the ISO 2700x standard necessities for the improvement of Information Security Management System (ISMS). This model can be utilized for both self-appraisal and examining/scoring instruments by public network protection specialists. Utilizing this model, associations can consider their current data security the broad frameworks in contrast to nearby and global guidelines by using worked in pre-review instruments. All things considered, the model will assist associations with assessing and improving their status for developing dangers and dangers. In this system, an original numerical model was likewise planned and carried out for the scoring/rating instrument, specifically, the public digital protection list (aeNCI). The aeNCI utilizes various boundaries to decide the development of existing network safety programs at public associations and produce a classification and correlation reports. The outcomes empowered the partner to confirm the security configuration of their frameworks and recognize possible attacks/hazard vectors.
公共安全规范化机构的缺失会对全球安全准则和最佳实践的接受产生不利影响。这项研究是为了任何组织的人员、流程和技术的利益而进行的。本文根据ISO 2700x信息安全管理体系(ISMS)改进的标准要求,提出了一种新颖实用的网络保护评估结构。该模型可用于公共网络保护专家的自我评估和检查/评分工具。利用该模型,协会可以通过使用预先审查工具,将其当前的数据安全性考虑为与附近和全球指导方针相比的广泛框架。考虑到所有因素,该模型将有助于协会评估和改善其发展危险和危险的状况。在本系统中,同样为评分/评级工具,即公共数字保护清单(aeNCI),规划并执行了一个独创的数值模型。aeNCI利用各种界限决定公共协会现有网络安全计划的发展,并制作分类和相关报告。结果使合作伙伴能够确认其框架的安全配置并识别可能的攻击/危害向量。
{"title":"Developing information security metrics and measures for risk assessment of an organization","authors":"Prashant Manuja, R. Shekhawat","doi":"10.1080/09720529.2022.2075092","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075092","url":null,"abstract":"Abstract The absence of public safety normalization bodies can antagonistically affect the reception of worldwide security guidelines and best practices. This research is done for the benefit of people, process and technology for any organization. This paper presents a novel pragmatic network protection evaluation structure that is custom-made to the ISO 2700x standard necessities for the improvement of Information Security Management System (ISMS). This model can be utilized for both self-appraisal and examining/scoring instruments by public network protection specialists. Utilizing this model, associations can consider their current data security the broad frameworks in contrast to nearby and global guidelines by using worked in pre-review instruments. All things considered, the model will assist associations with assessing and improving their status for developing dangers and dangers. In this system, an original numerical model was likewise planned and carried out for the scoring/rating instrument, specifically, the public digital protection list (aeNCI). The aeNCI utilizes various boundaries to decide the development of existing network safety programs at public associations and produce a classification and correlation reports. The outcomes empowered the partner to confirm the security configuration of their frameworks and recognize possible attacks/hazard vectors.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1195 - 1202"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45341145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1