ASPG Menu
search

American Scientific Publishing Group

Research Feed

Found 3831 matches for "All Articles"

Neutrosophic Crisp Semi Separation Axioms In Neutrosophic Crisp Topological Spaces

The main goal of this paper is to propose a new type of separation axioms via neutrosophic crisp semi open sets and neutrosophic crisp points in neutrosophic crisp topological spaces, namely neutrosophic crisp semi separation axioms. Finally, we examine the relationship between them in details. And also includes the study of the connections between these neutrosophic crisp semi separation axioms and the existing neutrosophic crisp separation axioms. Moreover, many examples are presented, to illustrate the concepts introduced in this paper. and investigate their fundamental properties, relationships and characterizations.

groups
Riad K. Al-Hamido mail -
Luai Salha mail -
Taleb Gharibah mail
link https://doi.org/10.54216/IJNS.060105

Volume & Issue

Vol. Volume 6 / Iss. Issue 1

Details open_in_new

Cyber Attacks Evaluation Targeting Internet Facing IoT: An Experimental Evaluation

The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.

groups
Navod Neranjan Thilakarathne mail -
N.T Weerawarna mail -
Rakesh Kumar Mahendran mail
link https://doi.org/10.54216/JCIM.090102

Volume & Issue

Vol. Volume 9 / Iss. Issue 1

Details open_in_new

On Refined Neutrosophic Vector Spaces I

The objective of this paper is to present the concept of a refined neutrosophic vector space. Weak(strong) refined neutrosophic vector spaces and subspaces, and, strong refined neutrosophic quotient vector spaces are studied. Several interesting results and examples are presented. It is shown that every weak (strong) refined neutrosophic vector space is a vector space and it is equally shown that every strong refined neutrosophic vector space is a weak refined neutrosophic vector space.

groups
M.A. Ibrahim mail -
A.A.A. Agboola mail -
B.S. Badmus mail -
S.A. Akinleye mail
link https://doi.org/10.54216/IJNS.070202

Volume & Issue

Vol. Volume 7 / Iss. Issue 2

Details open_in_new

Dominations in Complex Neutrosophic Graph

Abstract In this paper, we make known to various types of Complex Neutrosophic Graphs(CNG) named complete CNG, bipartite CNG , spanning CNG, path-forest-tree of CNG . We also conferred about the original and advanced concept of dominations in complex neutrosophic graph.

groups
SureshRengarajulu mail -
Dr.R.SURESHRENGARAJULU mail -
M. Vivekanandan mail -
Dr.P.THIRUNAVUKARASU mail
link

Volume & Issue

Details open_in_new

Systematic Literature Review on Quantum Cryptography

In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.

groups
Manav Sohal mail -
Mandeep Kaur Sandhu mail -
Rupinder kaur mail
link https://doi.org/10.54216/JCIM.070101

Volume & Issue

Vol. Volume 7 / Iss. Issue 1

Details open_in_new

Plithogenic n-Super Hypergraph in Novel Multi-Attribute Decision Making

An optimal decision-making environment demands feasible Multi-Attribute Decision-Making methods. Plithogenic n – Super Hypergraph introduced by Smarandache is a novel concept and it involves many attributes. This article aims to bridge the concept of Plithogenic n-Super Hypergraph in the vicinity of optimal decision making. This research work introduces the novel concepts of enveloping vertex, super enveloping vertex, dominant enveloping vertex, classification of the dominant enveloping vertex (input, intervene, output dominant enveloping vertices), plithogenic connectors. An application of Plithogenic n-super hypergraph in making optimum decisions is discussed under various decision-making scenarios. Several insights are drawn from this research work and will certainly benefit the decision-makers to overcome the challenges in building decisions.

groups
Florentin Smarandache mail -
Nivetha Martin mail
link https://doi.org/10.54216/IJNS.070101

Volume & Issue

Vol. Volume 7 / Iss. Issue 1

Details open_in_new

Introduction to NeutroRings

The objective of this paper is to introduce the concept of NeutroRings by considering three NeutroAxioms (NeutroAbelianGroup (additive), NeutroSemigroup (multiplicative) and NeutroDistributivity (multiplication over addition)). Several interesting results and examples on NeutroRings, NeutroSubgrings, NeutroIdeals, NeutroQuotientRings and NeutroRingHomomorphisms are presented. It is shown that the 1st isomorphism theorem of the classical rings holds in the class of NeutroRings.

groups
Agboola A.A.A mail
link https://doi.org/10.54216/IJNS.070203

Volume & Issue

Vol. Volume 7 / Iss. Issue 2

Details open_in_new

Classical Homomorphisms Between n-Refined Neutrosophic Rings

This paper studies classical homomorphisms between n-refined neutrosophic ring and m-refined neutrosophic ring. It proves that every m-refined neutrosophic ring  is a homomorphic image of n-refined neutrosophic ring , where . Also, it presents a discussion of kernels and some corresponding isomorphisms between those rings.

groups
Mohammad Abobala mail
link https://doi.org/10.54216/IJNS.070204

Volume & Issue

Vol. Volume 7 / Iss. Issue 2

Details open_in_new

AH-Substructures in Neutrosophic Modules

This article introduces the concept of AH-submodule, AHS-submodule of a neutrosophic module, and AHS-homomorphism. This work presents some basic notions and properties of these concepts such as AH-Kernel, AH-Quotient, and dimension, and determines the algebraic structure of weak neutrosophic module over a commutative ring R. 

groups
Mohammad Abobala mail -
Riad K. Alhamido mail
link https://doi.org/10.54216/IJNS.070205

Volume & Issue

Vol. Volume 7 / Iss. Issue 2

Details open_in_new

A Note On Neutrosophic Soft Menger Topological Spaces

In this paper, the concept of neutrosophic soft Mengerness, neutrosophic soft near Mengerness and neutrosophic soft almost Mengerness are introduced and studied. Some characterizations of neutrosophic soft almost Mengerness in terms of neutrosophic soft regular open or neutrosophic soft regular closed are given.

groups
A.Haydar Es mail
link https://doi.org/10.54216/IJNS.070102

Volume & Issue

Vol. Volume 7 / Iss. Issue 1

Details open_in_new