American Journal of Advanced Computing最新文献

筛选
英文 中文
Mobile Application Development for West Bengal Tourism 西孟加拉邦旅游业的移动应用程序开发
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2105
{"title":"Mobile Application Development for West Bengal Tourism","authors":"","doi":"10.15864/ajac.2105","DOIUrl":"https://doi.org/10.15864/ajac.2105","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114733748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical study on fall-detection using K-means based training data subset selection 基于k均值训练数据子集选择的跌倒检测实证研究
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2101
{"title":"An empirical study on fall-detection using K-means based training data subset selection","authors":"","doi":"10.15864/ajac.2101","DOIUrl":"https://doi.org/10.15864/ajac.2101","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Security and Privacy Challenges and their solutions in IoT data 物联网数据中的安全和隐私挑战及其解决方案研究
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2102
{"title":"Study of Security and Privacy Challenges and their solutions in IoT data","authors":"","doi":"10.15864/ajac.2102","DOIUrl":"https://doi.org/10.15864/ajac.2102","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on SQL Injection Attack in Internet of Things 物联网中SQL注入攻击研究综述
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2106
{"title":"A Review on SQL Injection Attack in Internet of Things","authors":"","doi":"10.15864/ajac.2106","DOIUrl":"https://doi.org/10.15864/ajac.2106","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying Infected and Uninfected Red Blood Cell Images for Malaria Detection using Convolutional Neural Networks 基于卷积神经网络的疟疾检测中感染和未感染红细胞图像分类
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2107
{"title":"Classifying Infected and Uninfected Red Blood Cell Images for Malaria Detection using Convolutional Neural Networks","authors":"","doi":"10.15864/ajac.2107","DOIUrl":"https://doi.org/10.15864/ajac.2107","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"249 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113996717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Vision Based Pre-Processing System for Autonomous Vehicles 基于计算机视觉的自动驾驶汽车预处理系统
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2103
{"title":"Computer Vision Based Pre-Processing System for Autonomous Vehicles","authors":"","doi":"10.15864/ajac.2103","DOIUrl":"https://doi.org/10.15864/ajac.2103","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prime Generation: Algorithms and Analyses 质数生成:算法与分析
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2108
{"title":"Prime Generation: Algorithms and Analyses","authors":"","doi":"10.15864/ajac.2108","DOIUrl":"https://doi.org/10.15864/ajac.2108","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapid Measurement of Physical Quality of Dry Chili – A Machine Vision Approach 干辣椒物理品质的快速测量——一种机器视觉方法
American Journal of Advanced Computing Pub Date : 2021-01-01 DOI: 10.15864/ajac.2104
{"title":"Rapid Measurement of Physical Quality of Dry Chili – A Machine Vision Approach","authors":"","doi":"10.15864/ajac.2104","DOIUrl":"https://doi.org/10.15864/ajac.2104","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"28 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient (t,n) Threshold Secret Image Sharing Scheme Based on Thien-Lin Secret Image Sharing 基于Thien-Lin秘密图像共享的高效(t,n)阈值秘密图像共享方案
American Journal of Advanced Computing Pub Date : 2020-10-01 DOI: 10.15864/AJAC.1401
Nag Amitava, Arup Kumar Chattopadhyay, Maitra Paramita
{"title":"An Efficient (t,n) Threshold Secret Image Sharing Scheme Based on Thien-Lin Secret Image Sharing","authors":"Nag Amitava, Arup Kumar Chattopadhyay, Maitra Paramita","doi":"10.15864/AJAC.1401","DOIUrl":"https://doi.org/10.15864/AJAC.1401","url":null,"abstract":"In a (t, n) threshold secret image sharing scheme (TSIS), a secret image is first encoded into n pieces, normally referred as shares or shadow images. Those share-images can be stored or transferred safely as individually a share-image cannot reveal\u0000 any detail about the secret image. The receiver or user of the share-images referred as participants. If at least t(≤n) share-images are submitted by the participants, the secret image can be recomputed. One of the most popular secret image sharing schemes was proposed\u0000 by Thien-Lin (2002). The authors had proposed two versions of the scheme. The first version of SIS by Thien-Lin is efficient, but lossy as the pixel values more than 250 (< 256) are truncated to 250. The second one is lossless, but it increases the size of the secret image\u0000 during preprocessing. In this paper, we propose a secret image sharing scheme based on Thien-Lin scheme. We consider a little loss in the reconstructed image which is maximum one per pixel (the loss can be one to five in Thien-Lin scheme) and keep the size of the secret image same. Although\u0000 buffer pixels may be added for the sake of programming, after reconstruction of the secret image the buffer pixels are easily identifiable and can be safely removed.","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering Techniques and Their Applications: A Review 聚类技术及其应用综述
American Journal of Advanced Computing Pub Date : 2020-10-01 DOI: 10.15864/AJAC.1404
Arjun Dutta
{"title":"Clustering Techniques and Their Applications: A Review","authors":"Arjun Dutta","doi":"10.15864/AJAC.1404","DOIUrl":"https://doi.org/10.15864/AJAC.1404","url":null,"abstract":"This paper deals with concise study on clustering: existing methods and developments made at various times. Clustering is defined as an unsupervised learning where the targets are sorted out on the foundation of some similarity inherent among them. In the recent\u0000 times, we dispense with large masses of data including images, video, social text, DNA, gene information, etc. Data clustering analysis has come out as an efficient technique to accurately achieve the task of categorizing information into sensible groups. Clustering has a deep association\u0000 with researches in several scientific fields. k-means algorithm was suggested in 1957. K-mean is the most popular partitional clustering method till date. In many commercial and non-commercial fields, clustering techniques are used. The applications of clustering in some areas like\u0000 image segmentation, object and role recognition and data mining are highlighted. In this paper, we have presented a brief description of the surviving types of clustering approaches followed by a survey of the areas.","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信