scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Discrete Mathematical Sciences and Cryptography in 2020"


Journal ArticleDOI
TL;DR: The Corona Virus Disease 2019 (COVID-19) prediction of confirmed, deceased and recovered cases will help to plan resources, determine government policy, and provide survivors with immunity passports, and use the same plasma for care.
Abstract: Predicting the probability of CORONA virus outbreak has been studied in recent days, but the published literature seldom contains multiple model comparisons or predictive analysis of uncertainty. T...

166 citations


Journal ArticleDOI
TL;DR: To determine the efficacy and accuracy of the proposed resume ranker, an enhanced rival modern optimizer, i.e., firefly ranking algorithm is applied to accelerate the speed of ranking algorithm to indicate that the resume parser has been incorporated with robust techniques and hence concedes to the accuracy ofthe results.
Abstract: In this paper, contemporary Natural Language Processing techniques have been leveraged to demonstrate the capability of data-driven HR towards significant improvement in the quality and speed of th...

45 citations


Journal ArticleDOI
TL;DR: Three well known CNN models, namely, AlexNet, SqueezeNet and Inception V3, are implemented for evaluating disease severity in Tomato Late Blight disease to achieve the highest accuracy in both approaches.
Abstract: For food security in future, precise measurements of disease incidence and severity are crucial for suitable treatments and adopting preventive measures. In this paper, the authors have implemented...

44 citations


Journal ArticleDOI
TL;DR: In this paper, Mansour and Schork introduce the concept of bridge graphs and define a bridge graph B(G 1, G 2, … , Gm ) as the graph of vertices with respect to the vertices.
Abstract: In 2009, T. Mansour, M. Schork, introduce the concept of bridge graphs. A bridge graph B(G 1, G 2, … , Gm ) = B(G 1, G 2, … , Gm ; v 1, v 2, … , vm ) of with respect to the vertices is the graph ob...

24 citations


Journal ArticleDOI
TL;DR: QuantQueryEXP implements an eminent technique, the Deutsch-Jozsa algorithm, in an altered manner, delivering a substitute for expansion and recommendation of queries implementing quantum techniques which offers much higher accuracy with optimization in complexity over any conventional algorithm to achieve supremacy in quantum computing.
Abstract: In our current world, numerous innovative approaches aimed at expansion and recommendation of queries are developing to satisfy the mounting tendencies of social networking and the internet. Many e...

24 citations


Journal ArticleDOI
TL;DR: The numerical encoding of chemical structure with topological indices is currently growing in chemical graph theory as discussed by the authors, and an important aspect of these topology indices related with the prediction of the prediction is discussed in Section 2.
Abstract: The numerical encoding of chemical structure with topological indices is currently growing in chemical graph theory. An important aspect of these topological indices related with the prediction of ...

22 citations


Journal ArticleDOI
TL;DR: In predicting bioactivity and physicochemical properties of a chemical graph, mathematical invariants in the topological indices have been correlated with mathematical properties of the graph as mentioned in this paper, showing that these invariants can be used to predict the bioactivity of a graph.
Abstract: In predicting of their bioactivity and physicochemical properties of a chemical graph extremely important correlated with mathematical invariants in the topological indices. These topological indic...

20 citations


Journal ArticleDOI
TL;DR: The proposed approach shows that use of principal component analysis before genetic algorithms improves the accuracy of the model with less number of features.
Abstract: Feature engineering is the way toward utilizing domain knowledge of the records to build features that in turn assist Machine Learning (ML) algorithms to provide efficient results. It is crucial to...

18 citations


Journal ArticleDOI
TL;DR: This work proposes a three-factor authentication scheme for WSNs using ECC, shows that it is more secured than the others schemes and has less communication cost, and evaluates the performance in terms of security features, computational cost, communication cost and storage cost.
Abstract: Wireless Sensor Networks (WSNs) consist of small and low powered devices called as sensor nodes. They have been used in many areas like military, safety, health, agriculture, etc. One of the challe...

18 citations


Journal ArticleDOI
TL;DR: By utilizing the degree of the vertex of the graphs, M-polynomials of book graph obtained and examined in this paper were obtained and the various vertex degree dependent indices of book graphs can be calculated.
Abstract: By utilizing the degree of the vertex of the graphs, M-polynomials of book graph obtained and examined in this paper. The various vertex degree dependent indices of book graph can be calculated rea...

17 citations


Journal ArticleDOI
TL;DR: Enhanced- RFA performs significantly better than RFA for both the datasets with an improvement in R2 values equal to 69.57% for QUES and 31.81% for UIMS using chisquared, RF and linear correlation filter techniques respectively.
Abstract: Now-a-days, software maintainability has become one of the significant quality-assessing attributes for any software system. Current study presents an enhanced-RFA (Random Forest Algorithm) approac...

Journal ArticleDOI
TL;DR: This paper aims to analyze the effectiveness of three optimization methods: Grid Search, Random Search and Bayesian Optimization on small and medium sized medical datasets to select a set of optimal hyper parameters for an ensemble classifier (here used decision tree ensemble using AdaBoost).
Abstract: The accuracy of the various classifiers depends mainly on good hyper-parameter and consequently on the scheme (hyper-parameter tuning algorithm) adopted to estimate these values. Currently, the hyp...

Journal ArticleDOI
TL;DR: In this work, a new NTRU-analog cryptosystem called QOBTRU is proposed based on a newly designed algebraic structure called Carternion algebra, which is intended to have an alternative security and performance attribute upon three chosen highly performed multidimensional N TRU-like Cryptosystems, which are QTRU, O TRU, and BITRU.
Abstract: NTRU public key cryptosystem relies on computations that are efficiently performed with insignificant storage and time complexity. Many researchers were motivated to improve NTRU performance by rep...

Journal ArticleDOI
TL;DR: The aim is to overcome the problem which has not been explained in ECDSA schemes of both Liao and Shen and Chande and Lee by introducing the unknown parameters which are used in the verification of the signature.
Abstract: Elliptic Curve Digital Signature Algorithm (ECDSA) is a public key cryptographic algorithm based on the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP), it is used to ensure users...

Journal ArticleDOI
TL;DR: An ensemble feature reduction method to identify a reduced feature subset for the classification of web-attack and is compared with current state-of-the-art systems using J48 with 10-fold cross-validation.
Abstract: There are a large number of features present in benchmark datasets that are used to test and evaluate intrusion detection systems. However, these high dimensional datasets require more computing re...

Journal ArticleDOI
TL;DR: A topological index is a real number which is the same under graph isomorphism and it is derived from a graph by mathematically as discussed by the authors, and a molecular graph is a simple graph having no topology.
Abstract: A topological index is a real number which is same under graph isomorphism and it is derived from a graph by mathematically. In chemical graph theory, a molecular graph is a simple graph having no ...

Journal ArticleDOI
TL;DR: A graph invariant is one of the tools of topological indices used in chemical graph theory as mentioned in this paper, and most of chemist study in Zagreb indices and Zag Croatia coindices related to the connectivity of ato...
Abstract: A graph invariant is one of the tools of topological indices used in chemical graph theory. Recently, most of chemist study in Zagreb indices and Zagreb coindices related to the connectivity of ato...

Journal ArticleDOI
TL;DR: An energy-efficient heuristic addressing K-Coverage problem which is an alternative of target coverage problem where every target is shielded by a minimum K-number of sensors to determine a set of different non-disjoint K- Covers is suggested.
Abstract: Wireless sensor network (WSN) is collection of various sensors placed according to the application requirement to accomplish quality of service (QOS) that is how fine the sensors are covering or mo...

Journal ArticleDOI
TL;DR: It is concluded that ML methods have proven to give better results than the old signature-based or heuristics-based detection techniques and have high possibilities of further development.
Abstract: With the increasing importance of the internet and computers in the modern world, the task of its maintenance and protection from the threats posed by malicious software has become incredibly impor...

Journal ArticleDOI
TL;DR: In this paper, a hybridization of the crow search algorithm with particle swarm optimization (hCA-PSO) is presented for automatic generation control (AGC) studies, and a new controller is proposed.
Abstract: This article presents the hybridization of crow-search algorithm with particle swarm optimization (hCA-PSO) in automatic generation control (AGC) studies. A new controller termed by integral-minus-...

Journal ArticleDOI
TL;DR: A review on UAV communication has been presented that throws light on trajectory planning, its optimization and various issues in a summarized way and some fundamental trade-offs among throughput, energy and delay are observed.
Abstract: With the huge advantages and increasing growth of unmanned aerial vehicles (UAVs), their popularity expanded and used in every aspect of our lives including government, industry, environment and so...

Journal ArticleDOI
TL;DR: The influence of ocular diseases on iris using a reliable Fuzzy recognition scheme is proposed here and it is inferred that the method takes only 2 minutes with an accuracy, specificity and sensitivity varying in the range of 94% to 98% respectively.
Abstract: Detection of eye pathologies from the database of iris images is taken into deliberation. The images of disease affected and normal eyes are collected from High-Resolution Fundus (HRF) Image Databa...

Journal ArticleDOI
TL;DR: A security system based on fuzzy rule based intelligent system which can be used for authentication process based on the user’s behavior, cost effective and robust in security aspect is proposed.
Abstract: Security of the data is one of the major concerns now a days. To secure data text–based authentication vulnerable to attacks like shoulder surfing, hidden cameras and hackers. To avoid these attack...

Journal ArticleDOI
TL;DR: A local antimagic lableing is defined in this article, where for any two adjacent vertices u and v, w(u) ≠ w(v), where w (u)=...
Abstract: Let G = (V, E) be a connected graph with |V|= n and |E|= m. A bijection f : E → {1, 2, … , m} is called a local antimagic lableing if for any two adjacent vertices u and v, w(u) ≠ w(v), where w(u)=...

Journal ArticleDOI
TL;DR: An improved cuckoo search algorithm is proposed to determine the sensor covers by optimizing the sensing range of the sensors to reduce the redundancy in the network.
Abstract: Maximizing the sensor cover from randomly deployed sensors to provide k-target coverage, is a challenging problem in Wireless Sensor Network (WSN). In this paper, an improved cuckoo search algorith...

Journal ArticleDOI
TL;DR: The results presented in this paper obtained by implementing the neural networks such as a Long Short-Term Memory or a Fuzzy Logic along with possible classifier sets are significant enough in terms of higher accuracy and recognition.
Abstract: The uniqueness of an individual can be identified according to one’s behavior, qualities, skills, characteristics, social connectivity, knowledge which all resemble to a single term called, “Person...

Journal ArticleDOI
TL;DR: The results show that the ANN model yields a high accuracy of 99.6% and an impressive weighted accuracy of 90.9% on the selected dataset, and it may be strongly suggested to build an ANN-based model for CHD detection in yet to be born babies using such noninvasive nonclinical datasets.
Abstract: A plethora of studies have shown that heart diseases have become the number one killer in the world. Congenital Heart Defect (CHD) is one of the most commonly observed heart defect in an increasing...

Journal ArticleDOI
TL;DR: This paper deals with the analysis and processing aspects of raw data and cleaned data in big data applications and also deals with data cleaning and its implementation concepts.
Abstract: Data analysis and processing is playing an important role because of the large amount of data generated through various sources of big data. It is an important component in big data-based applicati...

Journal ArticleDOI
TL;DR: A technique using concepts of DWT, SVD, entropy and pixel position shuffling is proposed to achieve the robustness, imperceptibility and security characteristics of watermarking.
Abstract: Digital watermarking is a branch of steganography, which is used to secure the copyright ownership of owner of the content available in digital form. It refers to an infrastructure where any digita...

Journal ArticleDOI
TL;DR: The researcher identified that OSS as the development technique is more better then COTS development and can improve the software quality by creating some tools and models for estimation of quality characteristics according to the modified ISO-9126 quality assurance model for OSS.
Abstract: Every organization wants to run with profit only and it is a common trend to acquire the new technologies, methods and models to enhance the quality of software product. Quality of product is direc...