T. Dharani, R. Kiruba Kumari, B. Sindhupiriya, R. Mahalakshmi
{"title":"Pattern Based Image Retrieval System by Using Clustering Techniques","authors":"T. Dharani, R. Kiruba Kumari, B. Sindhupiriya, R. Mahalakshmi","doi":"10.46632/daai/3/2/9","DOIUrl":"https://doi.org/10.46632/daai/3/2/9","url":null,"abstract":"Nowadays, the image database is growing in enormous size with heterogeneous categories. Similarly, there is rising demands from users in various ways. The most demanding domains in society are health care, Agriculture, commerce, and security. Healthcare domain is concerned with diagnosing the disease. Security domain is involved in investigation of the Criminals. Commerce domain needs analysis to recognize the right product. Agriculture domain requires processing of disease affected fruit images. The PBIR system that combines evidence from multiple digital image domains can reduce those problems of existing image retrieval systems. The PBIR system is used to find uncertain parts of the image during augmentation steps. The result is identified with various parameters (e.g., accuracy, precision, distance, sum of distance), showing that the performance of the k-medoids pam algorithm better than the existing iterative clustering algorithms","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Data Security in IOT Using DNA Cryptography and Insertion Method","authors":"E. Vidhya, R. Kiruba Kumari","doi":"10.46632/daai/3/2/5","DOIUrl":"https://doi.org/10.46632/daai/3/2/5","url":null,"abstract":"The Internet of Things (IOT) system is a network system that communicates with other devices and systems via the web by using any one of the sensors, devices, applications, and other tools. To prevent unauthorized data transmission access, these systems and networks should include a suitable cryptography mechanism. The security of the shared resources on the data communication network is regarded as one of the key challenges. In this paper, the proposed scheme consists of two parts: (i) generating a key using an array of prime numbers based on the RSA algorithm, and (ii) devising a secure communication scheme based on DNA cryptography and Insertion Method. DNA cryptography is a cryptographic technique that uses DNA sequences to encode and decode source data using biological processes. It is an innovative way to protect data from hackers using DNA. The proposed scheme's security analysis shows that it is secure against the relevant threat models and provides a higher level of protection than previous related studies in the literature.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to WordPress","authors":"","doi":"10.4324/9780203385173-4","DOIUrl":"https://doi.org/10.4324/9780203385173-4","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"World of IOT and Its Challenges","authors":"Ramji Rajbhar","doi":"10.46632/daai/2/6/6","DOIUrl":"https://doi.org/10.46632/daai/2/6/6","url":null,"abstract":": The Internet of Things (IoT), a new paradigm, has transformed traditional living into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy conservation, smart transportation, and smart industries are among the changes brought about by IoT. Many significant research projects and investigations have been undertaken in order to advance technology through IoT. To fully realise the promise of IoT, numerous obstacles and problems must be overcome. These challenges and problems must be considered from a variety of IoT perspectives, including applications, challenges, enabling technologies, social and environmental implications, and so on. The primary goal of this review article is to provide a thorough discussion from both a technological and a sociological standpoint. The article investigates the Internet of Things' various challenges, critical problems, architecture, and significant application domains. The paper also discusses existing literature and how it contributes to various IoT elements. Furthermore, the significance of big data and its analysis in relation to IoT has been discussed. This page will help readers and researchers understand the Internet of Things and how it applies in real life. Because of the massive number of wireless devices, such as smartphones and the Internet of Things (IoT), and the recent exponential growth in mobile traffic, the wireless network industry has produced and amassed an unprecedented amount of data. According to the International Data Corporation, there will be around 42 billion Internet-connected devices by 2025, with 80 zeta bytes of data created during the same year. There is no question that a new age is dawning as IoT and Artificial Intelligence (AI) grow more prevalent in society, and when 5G technology is implemented, new ideas in all industries will be inspired. We are creating a hyper-connected world in which gadgets are employed for more than simply data transmission and are gradually becoming intelligent and aware of their surroundings as a result of IoT ecosystem innovation. Because of advances in sensing, data processing, cloud, and communication technologies, the systems can interact with the environment and optimise operations by learning via interactions. As a consequence, intelligent settings and self-aware, linked \"things\" will be developed for applications in health, mobility, the digital society, food, energy, and the environment .","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Network Selection Using ELECTRE Method","authors":"","doi":"10.46632/daai/1/1/11","DOIUrl":"https://doi.org/10.46632/daai/1/1/11","url":null,"abstract":"In this type of networks, overall network stability, utilization of resources, User satisfaction and most conducive to quality of service and selecting a Trusted access network (AN) is network in HWN (ANS) paper Proposes plan proposed project user,\u0000Can consider operator and/or quos perspectives general multicriteria software assistant (SA) was used to present and design. In imperfect wireless networks Bayesian information on the network selection problem we make it a game. Generally, a\u0000mobile user's preference (i.e., usage) is personal information. Therefore, each user provides others an optimal network selection decision must be made. Bayesian Nash equilibrium is assumed to be the solution of this game, also between the Bayesian Nash equilibrium and the equilibrium distribution of aggregate dynamics there is a one-to-one mapping. This is a Bayesian network selection game Integration of overall optimal response dynamics Numerical results. Show that Referring to the notification, the current paper is called Exams presents a review on the application of MCDM to determine the best PC architecture among three PC architectures, i.e.: A, B&C using ELECTRE technique based on four criteria. Provides a dynamic response to the problem. Henceforth this strategy is incorporated in this study. Arrangements obtained by AHP and ELECTRE technique are considered in the present study. Alternatives (eg wireless networks) represent attributes such as Network Selection 1, Network Selection 2, Network Selection 3, Network Selection 4, and Network Selection 5. Delay (msec), Jitter (msec), BER (• 10), Throughput (kbps), Cost (units) is an evaluation method. In this type of analysis, Gray Correlation Analysis (GRA) methods determine the best solution for a short distance to negativity and a long distance to solution. As a result, Wireless Network 5 ranked first and Wireless Network 4 ranked lowest.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131628656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research Paper on White Box Testing","authors":"","doi":"10.46632/daai/2/6/8","DOIUrl":"https://doi.org/10.46632/daai/2/6/8","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133203525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Operating System Using Electric Multi Criteria Decision Making Method","authors":"","doi":"10.46632/daai/1/1/10","DOIUrl":"https://doi.org/10.46632/daai/1/1/10","url":null,"abstract":"Operating system are computer software a user and a computer is between Communication an operating system (OS) is a All other applications on the computer Programs and programs through the launch program After loading into the computer A\u0000program that manages to make Limited application interface Requests for services through (API). Mostly, Apple Mac OS, Microsoft Windows and The top five, including Google's Android OS The IT sector is focused on OSes. Linux Operating system and Apple iOS. Operating system is most people are using the very difficult situation solving the problem in computer. ELECTRE (Elimination Et Choice Translating Reality) analysis using the ELECTRE methods, performance comparisons combining an Operating system 1, Operating system 2, Operating system 3, Operating system 4 Alternative value and Memory management, Process management, Storage management, protection and security, Software Features, Database management Evaluation Parameters in value. Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank. In this paper Operating system for ELECTRE in Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JBPM in IT Sector for Banking Products","authors":"","doi":"10.46632/daai/2/6/3","DOIUrl":"https://doi.org/10.46632/daai/2/6/3","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future of Software Testing Using Artificial Intelligence","authors":"","doi":"10.46632/daai/2/6/4","DOIUrl":"https://doi.org/10.46632/daai/2/6/4","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128915696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}