ASPG Menu
search

American Scientific Publishing Group

Research Feed

Found 3831 matches for "All Articles"

Incremental Research on Cyber Security metrics in Android applications by implementing the ML algorithms in Malware Classification and Detection

Cyber attacks are prevailing to be a great headache for the technical advancements especially when dealt with mobile usage in an android application environment. For a new user, it is difficult to identify the set of harmful permissions. This could be an advantage for malware intruders to access the data or infect the mobile device by introducing malware applications. Thus the face of Cybersecurity has changed in recent times with the advent of new technologies such as the Cloud, the internet of things, mobile/wireless, and wearable technology. The technological advances in data science which help develop contemporary cybersecurity solutions are storage, computing, and behavior. In this paper, the possible investigations are done on the cyber attacks in android by adopting the various malware classification and detection techniques. Various Classifications and Detections are done on various malware prevailing in the android applications.

groups
Dr.Sreejith Vignesh B P mail
link https://doi.org/10.54216/JCIM.030102

Volume & Issue

Vol. Volume 3 / Iss. Issue 1

Details open_in_new

Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey

The internet of things has taken the world by storm. According to prediction, there will be around 30 billion connected devices in the year 2020. This means that some or all our home applications might have the capability to be controlled remotely. Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security-related problems that arise with the employment of fog computing by IoT.  

groups
Sayali Karmode mail
link https://doi.org/10.54216/JCIM.030103

Volume & Issue

Vol. Volume 3 / Iss. Issue 1

Details open_in_new

Pairwise Pythagorean Neutrosophic Strongly Irresolvable Spaces (with dependent neutrosophic components between T and F)

  In this paper, we have define the pairwise Pythagorean Neutrosophic (for short, pairwise PN) bitopological spaces (with dependent neutrosophic components between T and F). We also study the Pairwise PN strongly irresolvable spaces .The conditions under which pairwise PN strongly irresolvable spaces become pairwise PN first category spaces and pairwise PN Baire spaces are also investigated.  

groups
R.Jansi mail -
K.Mohana mail
link https://doi.org/10.54216/IJNS.0120101

Volume & Issue

Vol. Volume 12 / Iss. Issue 1

Details open_in_new

Introduction to NeutroGroups

The objective of this paper is to formally present the concept of NeutroGroups by considering three NeutroAxioms (NeutroAssociativity, existence of NeutroNeutral element and existence of NeutroInverse element). Several interesting results and examples of NeutroGroups, NeutroSubgroups, NeutroCyclicGroups, NeutroQuotientGroups and NeutroGroupHomomorphisms are presented. It is shown that generally, Lagrange’s theorem and 1st isomorphism theorem of the classical groups do not hold in the class of NeutroGroups.

groups
Agboola A.A.A. mail
link https://doi.org/10.54216/IJNS.060102

Volume & Issue

Vol. Volume 6 / Iss. Issue 1

Details open_in_new

Predicting purchase intention of consumer using twitter data

There has been a significant growth in the ecommerce sector as well as in people buying products online. More and more people have started posting online about their intention to buy a particular product or asking about any product's review. A lot of research is being done on determining the buying patterns of a user and more importantly the factors which determine whether the user has any intention to buy the product or not. One such micro-blogging website, Twitter, which has become quite popular in recent years. In this study, we explored the matter of identifying and predicting the purchase intention of a user for a product. After applying various text analytical models to tweets data, we found that it is indeed possible to predict if a user has shown purchase intention towards a product or not, and after doing some analysis we have found that individuals who had initially shown purchase intention towards the product have in most cases also bought the product.

groups
link

Volume & Issue

Details open_in_new

Identification of Facial Expressions using Deep Neural Networks

Detecting and analyzing emotions from human facial movements is a problem defined and developed over many years for the benefits it brings. During playback, when developing data sets, data sets with methods become more and more complex, and accuracy and difficulty increase gradually. In the given paper, we will use a deep structured learned network using the two mechanisms - Vgg and Resnet50 with deep layers to classify emotions based on input images in complex environments. Besides that, we also use learning methods combining many modern models to increase accuracy. Experimental results show that the two proposed methods have better results than some modern methods in emotional recognition problems for complex input images and some results reported in scientific studies. Particularly combined learning method gives good accuracy - 66.15% on the dataset FER2013

groups
Harsh Jain mail -
Parv Bharti mail -
Arun Kumar Dubey mail -
Preetika Soni mail
link https://doi.org/10.54216/FPA.020101

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

A New Trend to Extensions of CI-algebras

In this paper, as an extension of CI-algebras, we discuss the new notions of Neutro-CI-algebras and Anti-CI-algebras. First, some examples are given to show that these definitions are different. We prove that any proper CI-algebra is a Neutro-BE-algebra or Anti-BE-algebra. Also, we show that any NeutroSelf-distributive and AntiCommutative CI-algebras are not BE-algebras.  

groups
Florentin Smarandache mail -
Akbar Rezaei mail -
Hee Sik Kim mail
link https://doi.org/10.54216/IJNS.050101

Volume & Issue

Vol. Volume 5 / Iss. Issue 1

Details open_in_new

A SVTrN-number approach of multi-objective optimisation on the basis of simple ratio analysis based on MCDM method

An essential process in the study of human work behaviour or huma n resource management is the personnel selection/recruitment and a major challenge of an organization is to determine the most potential personnel. From this perspective, this paper tries to formulate MOOSRA approach in the neutrosophic environment to select potential personnel in organizations. The method proves to reduce complexity in computation and is comprehensible. An illustrative example is shown for better understanding of the proposed method.

groups
D. Ajay mail -
S. Abirami mail -
D. Jeni Seles Martina mail
link https://doi.org/10.54216/IJNS.050102

Volume & Issue

Vol. Volume 5 / Iss. Issue 1

Details open_in_new

On Refined Neutrosophic Algebraic Hyperstructures I

Given any algebraic hyperstructure (X, ∗, ◦), the objective of this paper is to generate a refined neutrosophic algebraic hyperstructure (X(I1, I2), ∗', ◦') from X, I1 and I2 and study refined neutrosophic Krasner hyper-rings in particular.

groups
A.A.A. Agboola mail -
M.A. Ibrahim mail -
E.O. Adeleke mail -
S.A. Akinleye mail
link https://doi.org/10.54216/IJNS.050103

Volume & Issue

Vol. Volume 5 / Iss. Issue 1

Details open_in_new

Dominating Energy in Neutrosophic graphs

Dominating energy of graphs plays a vital role in the field of application in energy. Results by applying neutrosophic graph theory is more efficient than other existing methods. So, dominating energy of neutrosophic graphs will also give more accurate results than other exixting methods in the field of energy. This article introduces dominating energy of neutrosophic graphs. Dominating energy of a neutrosophic graph, dominating neutrosophic adjacency matrix, eigen values for the dominating energy of a neutrosophic graphs and complement of neutrosophic graphs are defined with examples. Also, dominating energy in union and join operations of neutrosophic graphs are developed and some theorems in dominating energy of a neutrosophic graphs are derived here.

groups
M. Mullai mail -
Said Broumi mail
link https://doi.org/10.54216/IJNS.050104

Volume & Issue

Vol. Volume 5 / Iss. Issue 1

Details open_in_new