ASPG Menu
search

American Scientific Publishing Group

Research Feed

Found 3831 matches for "All Articles"

On Refined Neutrosophic R-module

Modules are one of the fundamental and rich algebraic structure concerning some binary operations in the study of algebra. In this paper, some basic structures of refined neutrosophic R-modules and refined neutrosophic submodules in algebra are generalized. Some properties of refined neutrosophic R-modules and refined neutrosophic submodules are presented. More precisely, classical modules and refined neutrosophic rings are utilized. Consequently, refinedneutrosophic R- modules that are completely different from the classical modular in the structural properties are introduced. Also, neutrosophic R-module homomorphism is explained and some definitions and theorems are presented.  

groups
Necati Olgun mail -
Ahmed Hatip mail
link https://doi.org/10.54216/IJNS.070201

Volume & Issue

Vol. Volume 7 / Iss. Issue 2

Details open_in_new

Cyber Attacks Evaluation Targeting Internet Facing IoT: An Experimental Evaluation

The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. With the latest advancement of IoT in variety of domains such as healthcare, smart city, smart agriculture it has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of peoples; that are involving with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard in order to analyse cyber threats that come through the Internet, here we are doing an experimental evaluation to analyse the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests that made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders ; in this study.

groups
Navod Neranjan Thilakarathne mail -
N.T Weerawarna mail -
Rakesh Kumar Mahendran mail
link https://doi.org/10.54216/JCIM.090102

Volume & Issue

Vol. Volume 9 / Iss. Issue 1

Details open_in_new

Classical Homomorphisms Between Refined Neutrosophic Rings and Neutrosophic Rings

The aim of this paper is to study homomorphisms between refined neutrosophic rings and neutrosophic rings. We prove that every neutrosophic ring R(I) is a homomorphic image of the refined neutrosophic ring R(I_1,I_2). Furthermore, we prove the following interesting result:

groups
Mohammad Abobala mail
link https://doi.org/10.54216/IJNS.050202

Volume & Issue

Vol. Volume 5 / Iss. Issue 2

Details open_in_new

Control of Enviornmental Parametrs in A Greenhouse

This paper concentrates on the sustainable use of energy, water, and raw materials to increase production to meet the demand of a high population with available areas. In this work, a kind of automatically controlled greenhouse system of single-chip microcomputer based on sensors is described. This paper presents the system's hardware structure, working principle and process, and a large number of experiments on the effect of the control system. Five control parameters are chosen to increase the yield of the greenhouse, which can be used in indoor breeding and planting. Control actions are performed on the basis of the fusion of different parameters. For the actuation system, the greenhouse is controlled by relays. The proposed control framework permits sparing costs related to wear minimization and delaying the actuator's life, yet continuing promising execution comes out.  Results and conclusions are derived by methods of simulation results.

groups
Surinder Kaur mail -
Diksha Kumari mail -
Vandana Kumari mail
link https://doi.org/10.54216/FPA.010102

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Operations on Single-Valued Trapezoidal Neutrosophic Numbers using (α,β,γ)-Cuts “Maple Package”

In this paper we present a Maple package called Neutrosophic, which allows users to do operations on trapezoidal and triangular neutrosophic numbers including summation, subtraction, division and multiplication based on -cuts and plots the results, also the package allows users to rank numbers depending on ambiguity index and value index. This package is very useful in neutrosophic decision making problems, neutrosophic probabilities, neutrosophic statistics and in many other fields of neutrosophic researches.

groups
Mohamed Bisher Zeina mail -
Omar Zeitouny mail -
Fatina Masri mail -
Fatima Kadoura mail -
Said Broumi mail
link https://doi.org/10.54216/IJNS.150205

Volume & Issue

Vol. Volume 15 / Iss. Issue 2

Details open_in_new

Palmprint Recognition Using Fusion of Local Binary Pattern and Histogram of Oriented Gradients

In this paper, unique features of the segmented image samples are extracted by using two major feature extraction techniques: Local Binary Pattern (LBP) and Histogram of Oriented Gradients (HOG). After this, these features are fused to get more precise and productive outcomes. The average accuracy of the three distinct datasets that were generated using the LBP and HOG features are determined. To calculate the accuracy of the three distinct models, classification techniques like KNN and SVM, are adopted.

groups
Hardik Agarwal mail -
Kanika Somani mail -
Shivangi Sharma mail -
Prerna Arora mail -
P. Singh Lamba mail -
Gopal Chaudhary mail
link https://doi.org/10.54216/FPA.010103

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Artificial Intelligence enabled virtual sixth sense application for the disabled

The sixth sense is a multi-platform app for aiding the people in need, that is, people who are handicapped in the form of lack of speech (dumb), lack of hearing (deaf), lack sight (blind), lack of judicial power to differentiate between objects (visual agnosia) and people suffering from autism (characterized by great difficulty in communicating and forming relationships with other people and in using language and abstract concepts). Our current product implementation is on two platforms, namely, mobile and a web app. The mobile app even works for object detection cases in offline mode. What we want to achieve using this is to make a better world for the people suffering from disabilities as well as an educational end for people with cognitive disabilities using our app. The current implementation deals with object recognition, text to speech, and a speech-to-text converter. The speech-to-text converter and text-to-speech converter utilized the Web Speech API (Application Program Interface) for the website and the mobile platform's text-to- speech and speech-to-text library. The object recognition wouldn't fetch enough use out of a website. Hence, it has been implemented on the mobile app utilizing the Firebase ML toolkit and different pre-trained models, both available offline and online.

groups
Aditya Sharma mail -
Aditya Vats mail -
Shiv Shankar Dash mail -
Surinder Kaur mail
link https://doi.org/10.54216/FPA.010104

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Study of Multi-Prime RSA

This paper studies and analyses the encryption and decryption times of a popular variant of the RSA algorithm, the multi-prime RSA. This algorithm uses more than two prime numbers for the encryption process. In this paper, 3, 4, and 5 prime RSA algorithms have been implemented and studied. The rate of increase of encryption and decryption times concerning the number of primes used is also illustrated and compared graphically.

groups
Surinder Kaur mail -
Shivani Mankotia mail -
Pooja Bharadwaj mail
link https://doi.org/10.54216/FPA.010105

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Particle Swarm Optimization based Multihop Routing Techniques in Mobile ADHOC Networks

Mobile adhoc network (MANET) comprises a network of mobile nodes, which communicates with one another through wireless connections. Reliability, energy efficiency, congestion control and interferences are the problems faced with the traditional routing protocols in MANET. Routing defines the process of identifying the optimal paths between two nodes in the network. For resolving these issues, several multipath routing techniques have been presented. This paper assesses the performance of the two bio-inspired multipath routing techniques namely Energy-Aware Multipath Routing Scheme based on particle swarm optimization (EMPSO) and PSO with fitness function (PSO-FF) algorithms. These two algorithms are compared and the results are investigated under several performance measures. The simulation results stated that the PSO-FF algorithm has shown better results over the EMPSO algorithm under several measures.

groups
M. Ilayaraja mail
link https://doi.org/10.54216/IJWAC.010105

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new