Data Analytics and Artificial Intelligence最新文献

筛选
英文 中文
Python Programming to Solve Linear Equations by Gaussian methods 用高斯方法求解线性方程的Python编程
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/25
M. Shobana priya, T. V., Rezvana Parveen S
{"title":"Python Programming to Solve Linear Equations by Gaussian methods","authors":"M. Shobana priya, T. V., Rezvana Parveen S","doi":"10.46632/daai/3/2/25","DOIUrl":"https://doi.org/10.46632/daai/3/2/25","url":null,"abstract":"The development to f numerical processes was greatly aided by Newton and Leibniz's invention of calculus, which produced precise mathematical representations of physical reality first and then in other disciplines such as engineering, healthcare, and commerce. Typically, these mathematical models cannot be solved explicitly; therefore, approximate solutions must be obtained using numerical approaches [3][4][5].In this paper, Python Programming is used to solve system of linear equations by Gauss Elimination and Gauss Jordan method.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122031263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi Cluster Secure System for Out Sourced Encrypted Data Bases 外包加密数据库的多集群安全系统
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/33
{"title":"A Multi Cluster Secure System for Out Sourced Encrypted Data Bases","authors":"","doi":"10.46632/daai/3/2/33","DOIUrl":"https://doi.org/10.46632/daai/3/2/33","url":null,"abstract":"Recently, database users have begun to use cloud database services to outsource theirdatabases. The reason for this is the high computation speed and the huge storage capacity thatcloud owners provide at low prices. However, despite the attractiveness of the cloud computingenvironment to database users, privacy issues remain a cause for concern for database ownerssince data access is out of their control. Encryption is the only way of assuaging users' fearssurroundingdataprivacy,butexecutingStructuredQueryLanguage (SQL)queriesoverencrypteddatais achallengingtask,especiallyif the data a re-encryptedby arandomizedencryptionalgorithm. Theexistingsystem, whichisanindexingschemetoencodetheoriginaltable’stuplesinto bit vectors (BVs) prior to the encryption. The resulting index is then usedto narrow therange of retrieved encrypted records from the cloud to a small set of records that are candidatesfor the user's query. Based on the indexing scheme, the designed system is used to execute SQLqueries over the encrypted data. The data are encrypted by a single randomized encryptionalgorithm,namely theAdvanced Encryption Standard-Cipher-Block Chaining (AES-CBC). Inthe existing scheme, theindex values (BVs) are stored atuser's side, and which is supportedmostof relational algebra operators, such as select, join,etc. In the existing system,the clouddata server is able to extract the ratio of two underlying data records, and key management servercandecryptthe ciphertextsofowners’data records,whichbreakthe privacysecurity.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Analysis of Wireless Sensor Networks in Recent Years 近年来无线传感器网络性能分析
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/34
{"title":"A Performance Analysis of Wireless Sensor Networks in Recent Years","authors":"","doi":"10.46632/daai/3/2/34","DOIUrl":"https://doi.org/10.46632/daai/3/2/34","url":null,"abstract":"Wireless Sensor networks (WSNs) have become one of the most interesting areas of research in the past few years. Undoubtedly, wireless transmission techniques are used for all node-to-node communication. Additionally, because wireless sensor networks are self- organized, independent of fixed infrastructure, and their topologies vary on a regular basis, broadcasting is the default method of communication in WSNs. But a handful of sensor nodes in long-lasting networks have dynamically accomplished it. They are autonomous systems that share common sensors, centralized nodes, and a back-end server. The real-time independent sensor data is initially transmitted by the common sensors, and finally, the back- end server receives the sensed data to do additional process and performance analysis. Wireless sensor networks (WSNs) are hybrid nodes with wireless communication interfaces, data sensing, processing, and storage capabilities that are rapidly expanding in number. It is used for many different things in daily life, including tracking vehicles, keeping an eye out for fires in the forest, finding and tracking soldiers for military usage, keeping an eye on the oceans and seas, and creating intelligent places.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FTP Server Client Using Android Application FTP服务器客户端使用Android应用程序
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/11
{"title":"FTP Server Client Using Android Application","authors":"","doi":"10.46632/daai/3/1/11","DOIUrl":"https://doi.org/10.46632/daai/3/1/11","url":null,"abstract":"On a computer network, the File Transfer Protocol (FTP) is a common communication protocol used to transfer data from a server to a client. FTP uses distinct control and data connections between the client and the server in client-server architecture. FTP offers two transfer methods: an anonymous technique and a password-based authentication method. The primary goal of FTP is to encourage file sharing. Clients can connect to the server using third-party applications (eg. FileZilla). A single FTP object can manage status, connection, settings, etc. is the centre of the Apache Commons Libraries. Obtaining a remote connection to involves a set of details, including the server's hostname or IP address, a username and a password.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121285830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residential Property Price Estimation Using Machine Learning 使用机器学习估算住宅物业价格
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/2
{"title":"Residential Property Price Estimation Using Machine Learning","authors":"","doi":"10.46632/daai/3/1/2","DOIUrl":"https://doi.org/10.46632/daai/3/1/2","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Image and Under Exposed Image Enhancement Using Convolution Neural Network 基于卷积神经网络的水下图像和欠曝光图像增强
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/4
{"title":"Underwater Image and Under Exposed Image Enhancement Using Convolution Neural Network","authors":"","doi":"10.46632/daai/3/1/4","DOIUrl":"https://doi.org/10.46632/daai/3/1/4","url":null,"abstract":"The turbidity media (for example, particulates, liquid) throughout the air degrades pictures from outside sceneries. Smog, mist, as well as smoky were examples of air absorptive processes. All along sight line, the lens receives less irradiation from video frame. In addition, the entering sunlight gets mixed with the sunlight from atmosphere (ambient light reflected into the line of sight by atmospheric particles). Intensity and correct information are lost in deteriorated photos. The deterioration is spatially variable because of the quantity of dispersion varies mostly on distances between the arty as well as the lens. In both customer imaging and image processing systems, fog removal1 (or poor) was widely sought. Firstly, reducing fog may greatly improve picture vision while also correcting that could go produced by the air sunlight. In speaking, the picture with no mist is far more attractive. Secondly, many neural networks presume that input layer (following rectangular grid) represents full animation, through reduced image processing to elevated object detection. This skewed, low - light picture illumination would unavoidably decrease the quality of machine vision (for example, focused product, filtration, and radiometric analyses). Finally, fog reduction may generate detailed information, which would be useful for several computer vision and sophisticated photo retouching. For picture comprehension, mist or foggy could be a helpful height indication. This picture of lawful fog could be put to good advantage. Decreased activity, on the other hand, is indeed a difficult challenge since the fog was based upon uncertain depth data. If indeed the data is merely a small hazy picture, then issue is under constrained. As a result, numerous solutions based on various pictures or other data were presented.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123000264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in cloud computing using RSA Algorithm 基于RSA算法的云计算数据安全
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/18
L. Hanupriya, S.I Anto Ramya
{"title":"Data security in cloud computing using RSA Algorithm","authors":"L. Hanupriya, S.I Anto Ramya","doi":"10.46632/daai/3/2/18","DOIUrl":"https://doi.org/10.46632/daai/3/2/18","url":null,"abstract":"The capacity of cloud computing, an emerging paradigm, to lower computer costs, has made it the hottest research area of the day. The most fascinating and alluring aspect of modern technology is what it is giving. The services to its customers over the internet on demand. Security has emerged as the primary challenge impeding the implementation of cloud settings because cloud computing stores data and distributes resources in an open environment. Although cloud computing is effective and promising, there are several issues with data security because the cloud user has no physical access to the data. We suggested a technique using the RSA algorithm to assure the security of the data.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134529368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Garbage Vehicle Tracking System Using Android 基于Android的垃圾车跟踪系统
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/6
{"title":"Garbage Vehicle Tracking System Using Android","authors":"","doi":"10.46632/daai/3/1/6","DOIUrl":"https://doi.org/10.46632/daai/3/1/6","url":null,"abstract":"Trash vehicle global positioning framework constructed utilizing android programming, we can utilize this application on our mobiles to follow trash vehicles and send a warning to the clients when the trash vehicle going into their roads, assuming we have any grievances about their administration, we can give our input and objections about that help, we can give our criticism and grumblings utilizing this application The protests can be seen by the administrator. They can figure out their grievances in a current framework. The trash vehicle gives a notice by whistle (or) playing a tune however it makes more commotion contamination (or) the client misses the vehicle, so the client puts their trash close to their city intersections, so it makes our roads non-cleanliness and grimy, to beat this issue we foster an application that sends a warning to the client, while trash vehicle goes into their roads, clients need to enlist their subtleties and they need to sign in by their enrolled subtleties. On the off chance that the login and enlistment are coordinated, it permits the client to get to an application they get a warning and send their criticism and objections about their administrations, The trash vehicle gatherer needs to enroll their subtleties and sign in, subsequent to signing in, the administrator has a data set of roads, where they need to go today, which roads are distributed for them. The administrator can deal with the client subtleties and gatherer subtleties and they can figure out the grumblings of clients, to give great support of the clients.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Cryptography 密码学概述
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/15
B. U. Archana, V. Niranjana
{"title":"Overview of Cryptography","authors":"B. U. Archana, V. Niranjana","doi":"10.46632/daai/3/2/15","DOIUrl":"https://doi.org/10.46632/daai/3/2/15","url":null,"abstract":"Until very recently, the term \"cryptography\" was almost always used to refer to \"encryption,\" which is the act of transforming plaintext or conventional information into an unintelligible form (called cipher text). Decryption is the opposite, or the process of returning plaintext from the unintelligible cipher text. The encryption and reversing decryption operations are carried out by a pair of algorithms known as cyphers (or cyphers). The algorithm and, in each case, a \"key\" work together just to regulate the precise operation of a cypher. The key, which is required to decrypt the cipher text, is a secret that should ideally only be known by the communicants. It typically takes the form of a short string of characters that the user can remember. A \"cryptosystem\" is the ordered list of elements with a finite number of potential combinations in formal mathematics.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114429636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Development Techniques In Current Scenario 当前场景下的软件开发技术
Data Analytics and Artificial Intelligence Pub Date : 2023-02-01 DOI: 10.46632/cllrm/3/2/10
S. Nagalakshmi
{"title":"Software Development Techniques In Current Scenario","authors":"S. Nagalakshmi","doi":"10.46632/cllrm/3/2/10","DOIUrl":"https://doi.org/10.46632/cllrm/3/2/10","url":null,"abstract":"Now a days, technology of Internet become very fast growing development and rapid advancement in software. Internet is very essential resource for the people. IOT, Machine Learning, Big Data technologies, Artificial Intelligence etc., are some of the new technologies with variety of applications all over the world. Predicting the future in the computing Industry is very harder. In the field of software introduces of key changes to the research process. As a result, the software research is blowing in increasing breath of topics that tends to Implementation. Software technology today is improving at a rapid growth, enabling faster change and progress, Causing an accelerating of the rate of change. It is not only technology trends and emerging technologies that are extend, a lot more has changed this year due to COVID-19. The software development techniques may tend to learning and relearning process.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信