首页 > 最新文献

Data Analytics and Artificial Intelligence最新文献

英文 中文
A Study on Mixed Inverse Center-Smooth Set of Some Graphs and its application 若干图的混合逆中心光滑集及其应用研究
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/32
For S is a dominating set of G and V-S V(G) of a center smooth graph Gis called amixed inverse center smooth set if (i) For every vεV-S, |N[v]∩V(G)| 1(mod p) and (ii) Every elementuεS is either adjacent or incident to an element of V-S. The number of vertices in a mixed inversecenter smooth set is called the mixed inverse center smooth number and it is denoted by γmcs(G).Inthis paper, we introduce the new concept of mixed inverse center smooth number and establish someresults on this new parameter. Also, we determine the bounds of γmcs- set of some graph classes.
对于S是G和V-S的支配集V(G)的中心光滑图Gis称为混合逆中心光滑集,如果(i)对于每一个vεV-S, |N[V]∩V(G)| 1(mod p)和(ii)每一个元素εS相邻或关联于V-S的一个元素。混合反中心光滑集中的顶点数称为混合反中心光滑数,用γmcs(G)表示。本文引入了混合逆中心光滑数的新概念,并建立了关于该参数的一些结果。同时,我们还确定了一些图类的γ - mcs-集的界。
{"title":"A Study on Mixed Inverse Center-Smooth Set of Some Graphs and its application","authors":"","doi":"10.46632/daai/3/2/32","DOIUrl":"https://doi.org/10.46632/daai/3/2/32","url":null,"abstract":"For S is a dominating set of G and V-S V(G) of a center smooth graph Gis called amixed inverse center smooth set if (i) For every vεV-S, |N[v]∩V(G)| 1(mod p) and (ii) Every elementuεS is either adjacent or incident to an element of V-S. The number of vertices in a mixed inversecenter smooth set is called the mixed inverse center smooth number and it is denoted by γmcs(G).Inthis paper, we introduce the new concept of mixed inverse center smooth number and establish someresults on this new parameter. Also, we determine the bounds of γmcs- set of some graph classes.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection in IOMT (MDI) using RNN-LSTM 基于RNN-LSTM的IOMT (MDI)恶意软件检测
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/19
M. Uma Maheshwari, M. Suguna
The Internet of Things (IoT) has recently emerged as a cutting-edge technology for creating smart environments. The Internet of Things (IoT) connects systems, applications, data storage, and services, which may be a new entry point for cyber-attacks as they provide continuous services in the organization. At the current time, software piracy and malware attacks pose significant threats to IoT security. These threats may grab vital information, causing economic and reputational harm. The Internet of Medical Things (IoMT) is a subset of the Internet of Things in which medical equipment exchanges highly confidential with one another. These advancements allow the healthcare industry to maintain a higher level of touch and care for its patients. Security is viewed as a significant challenge in any technology's reliance on the IoT. Remote hijacking, impersonation, denial of service attacks, password guessing, and man-in-the-middle are all security concerns. Critical data associated with IoT connectivity may be revealed, altered, or even rendered inaccessible to authenticated persons in the event of such attacks. the deep recurrent neural network is used to detect malicious infections in IoT networks by displaying color images. In this paper, we propose a method for detecting cyber-attacks on IoMT systems that tends to make use of innovative deep learning. Specifically, our method incorporates a set of long short-term memory (LSTM) modules into a detector ensemble using a recurrent neural network.
物联网(IoT)最近成为创造智能环境的尖端技术。物联网(IoT)连接了系统、应用程序、数据存储和服务,这可能是网络攻击的新切入点,因为它们在组织中提供连续的服务。目前,软件盗版和恶意软件攻击对物联网安全构成重大威胁。这些威胁可能会获取重要信息,造成经济和声誉损失。医疗物联网(IoMT)是物联网的一个子集,其中医疗设备彼此交换高度机密。这些进步使医疗保健行业能够为患者保持更高水平的接触和护理。在任何依赖物联网的技术中,安全都被视为一个重大挑战。远程劫持、冒充、拒绝服务攻击、密码猜测和中间人攻击都是安全问题。在发生此类攻击时,与物联网连接相关的关键数据可能会被泄露、更改,甚至使经过身份验证的人员无法访问。深度递归神经网络通过显示彩色图像来检测物联网网络中的恶意感染。在本文中,我们提出了一种检测IoMT系统网络攻击的方法,该方法倾向于利用创新的深度学习。具体来说,我们的方法使用递归神经网络将一组长短期记忆(LSTM)模块集成到检测器集成中。
{"title":"Malware detection in IOMT (MDI) using RNN-LSTM","authors":"M. Uma Maheshwari, M. Suguna","doi":"10.46632/daai/3/2/19","DOIUrl":"https://doi.org/10.46632/daai/3/2/19","url":null,"abstract":"The Internet of Things (IoT) has recently emerged as a cutting-edge technology for creating smart environments. The Internet of Things (IoT) connects systems, applications, data storage, and services, which may be a new entry point for cyber-attacks as they provide continuous services in the organization. At the current time, software piracy and malware attacks pose significant threats to IoT security. These threats may grab vital information, causing economic and reputational harm. The Internet of Medical Things (IoMT) is a subset of the Internet of Things in which medical equipment exchanges highly confidential with one another. These advancements allow the healthcare industry to maintain a higher level of touch and care for its patients. Security is viewed as a significant challenge in any technology's reliance on the IoT. Remote hijacking, impersonation, denial of service attacks, password guessing, and man-in-the-middle are all security concerns. Critical data associated with IoT connectivity may be revealed, altered, or even rendered inaccessible to authenticated persons in the event of such attacks. the deep recurrent neural network is used to detect malicious infections in IoT networks by displaying color images. In this paper, we propose a method for detecting cyber-attacks on IoMT systems that tends to make use of innovative deep learning. Specifically, our method incorporates a set of long short-term memory (LSTM) modules into a detector ensemble using a recurrent neural network.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skin Disease Prediction Machine Learning Model Using Ensemble Classifier with PCA 基于PCA集成分类器的皮肤病预测机器学习模型
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/31
In the medical era, skin disease is considered one of the most common diseases among humans. Skin cancer is the most dangerous type, which can be curable if identified at the initial stage. The severity of skin cancer and the rapid count of affected people make it necessary to introduce an automatic detection scheme. Generally, analyzing and identifying skin disease in a short time is the most complex and challenging task. Several deep learning (DL) and machine learning (ML) are introduced to achieve this. However, the still fulfilling the skin cancer diagnosis is not accomplished completely. To achieve this, we proposed a machine learning model using an ensemble classifier with PCA to predict skin disease with maximum accuracy. The proposed Ensemble classifier is based on similar features and classifies several stages. It is executed by labeling vertebral disorder images according to these statistical features. The performance obtained by the ensemble classifier is compared with Support Vector Machine (SVM) and Resent with several evaluation metrics. The analysis shows that the accuracy attained by the proposed ensemble classifier is 97 % which is far better than the others in terms of classification and accuracy.
在医学时代,皮肤病被认为是人类最常见的疾病之一。皮肤癌是最危险的类型,如果在最初阶段发现是可以治愈的。皮肤癌的严重程度和受影响人数的快速统计使得有必要引入自动检测方案。一般来说,在短时间内分析和识别皮肤病是最复杂和最具挑战性的任务。介绍了几种深度学习(DL)和机器学习(ML)来实现这一目标。然而,仍未完全完成皮肤癌的诊断。为了实现这一点,我们提出了一种机器学习模型,使用PCA集成分类器以最大的准确性预测皮肤病。所提出的集成分类器基于相似的特征,并对多个阶段进行分类。它是通过根据这些统计特征标记脊椎疾病图像来执行的。结合多个评价指标,将集成分类器的性能与支持向量机(SVM)和重构分类器进行了比较。分析表明,所提出的集成分类器的分类准确率达到97%,在分类和准确率方面都远远优于其他分类器。
{"title":"Skin Disease Prediction Machine Learning Model Using Ensemble Classifier with PCA","authors":"","doi":"10.46632/daai/3/2/31","DOIUrl":"https://doi.org/10.46632/daai/3/2/31","url":null,"abstract":"In the medical era, skin disease is considered one of the most common diseases among humans. Skin cancer is the most dangerous type, which can be curable if identified at the initial stage. The severity of skin cancer and the rapid count of affected people make it necessary to introduce an automatic detection scheme. Generally, analyzing and identifying skin disease in a short time is the most complex and challenging task. Several deep learning (DL) and machine learning (ML) are introduced to achieve this. However, the still fulfilling the skin cancer diagnosis is not accomplished completely. To achieve this, we proposed a machine learning model using an ensemble classifier with PCA to predict skin disease with maximum accuracy. The proposed Ensemble classifier is based on similar features and classifies several stages. It is executed by labeling vertebral disorder images according to these statistical features. The performance obtained by the ensemble classifier is compared with Support Vector Machine (SVM) and Resent with several evaluation metrics. The analysis shows that the accuracy attained by the proposed ensemble classifier is 97 % which is far better than the others in terms of classification and accuracy.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Object Recognition in Earth Surface Satellite Images Using Digital Image Processing and Machine Learning Techniques with Big Data Technologies 基于大数据技术的数字图像处理和机器学习技术在地表卫星图像中的目标识别
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/27
Misba Khan k
Detection of an object from a satellite image is a difficult process because the presence of objects in a satellite image is unpredictable. Different approaches have been available to detect vehicles, buildings, trees however all these objects were detected individually through machine learning and some other methods. Similarly accuracy in object detection is another major issue. In our proposed work, To analyze the object accurately, Polygon approach is implemented which includes both shape and color as input and processes it with datasets to attain maximum accurate result. Here image parameters have been extracted accurately through feature detection. After segmentation of a particular object from image CNN classification is implemented. Through this, in our proposal we are going to detect roads, trees, buildings, waterway and few other objects accurately with this single approach.
从卫星图像中检测物体是一个困难的过程,因为卫星图像中物体的存在是不可预测的。检测车辆、建筑物、树木的方法不同,但所有这些物体都是通过机器学习和其他一些方法单独检测的。同样,物体检测的准确性是另一个主要问题。在本文中,为了准确地分析物体,采用多边形方法,将形状和颜色作为输入,并与数据集进行处理,以获得最准确的结果。通过特征检测,准确提取了图像参数。从图像中分割出特定目标后,实现CNN分类。通过这种方法,在我们的提案中,我们将使用这种方法准确地检测道路,树木,建筑物,水道和其他一些物体。
{"title":"Object Recognition in Earth Surface Satellite Images Using Digital Image Processing and Machine Learning Techniques with Big Data Technologies","authors":"Misba Khan k","doi":"10.46632/daai/3/2/27","DOIUrl":"https://doi.org/10.46632/daai/3/2/27","url":null,"abstract":"Detection of an object from a satellite image is a difficult process because the presence of objects in a satellite image is unpredictable. Different approaches have been available to detect vehicles, buildings, trees however all these objects were detected individually through machine learning and some other methods. Similarly accuracy in object detection is another major issue. In our proposed work, To analyze the object accurately, Polygon approach is implemented which includes both shape and color as input and processes it with datasets to attain maximum accurate result. Here image parameters have been extracted accurately through feature detection. After segmentation of a particular object from image CNN classification is implemented. Through this, in our proposal we are going to detect roads, trees, buildings, waterway and few other objects accurately with this single approach.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certain Iterative Methods to Solve System of Equations by Python Programming 用 Python 编程求解方程组的某些迭代法
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/37
In the 1980s and 1990s, a field known as scientific computing or computational science began to emerge as a result of the increasing significance of using computers to carry out numerical operations in order to solve mathematical models of the world. This paper examines numerical analysis’s application from a computer science view point; see[3][4][5].In this paper, Iterative methods like Gauss Jacobi and Gauss Serial were used to solve the system of simultaneous equation by using Python Programming.
20 世纪 80 年代和 90 年代,随着利用计算机进行数值运算以求解世界数学模型的重要性日益凸显,一个被称为科学计算或计算科学的领域开始兴起。本文从计算机科学的角度研究了数值分析的应用;见[3][4][5]。本文使用 Python 编程,采用高斯雅可比和高斯序列等迭代法求解同时方程组。
{"title":"Certain Iterative Methods to Solve System of Equations by Python Programming","authors":"","doi":"10.46632/daai/3/2/37","DOIUrl":"https://doi.org/10.46632/daai/3/2/37","url":null,"abstract":"In the 1980s and 1990s, a field known as scientific computing or computational science began to emerge as a result of the increasing significance of using computers to carry out numerical operations in order to solve mathematical models of the world. This paper examines numerical analysis’s application from a computer science view point; see[3][4][5].In this paper, Iterative methods like Gauss Jacobi and Gauss Serial were used to solve the system of simultaneous equation by using Python Programming.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block Chain for IOT Security Using Consensus Algorithms 使用共识算法的物联网安全区块链
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/16
P. Kalpana, I. Anusha Prem
The first distributed recordkeeping system with a built-in trust structure is the block chain. It creates a dependable architecture for decentralized control through information redundancy across multiple nodes. Based on this, this study suggests a minimal block chain-based IoT information exchange security framework. The framework uses a double-chain approach that combines the data block chain and the transaction block chain. Distributed storage and tamper-proof data are implemented in the data block chain, and the consensus process is improved using the improved practical Byzantine fault-tolerant (PBFT) mechanism. Data registration efficiency, resource and data transfers, and privacy protection are all enhanced by better partial blind signature-based algorithms in the transaction block chain. This article focuses on how well the consensus algorithms employed in a block chain system for the Internet of Things perform (IoT). Such systems' time requirements to accomplish. Consensus ought to be minimal. The three most popular consensus algorithms—modified proof of work, realistic byzantine fault tolerance, and binary consensus—are assessed under various conditions, including mote type, number of participating nodes, and radio propagation model. To enable an IoT node to switch between different consensus algorithms, a comprehensive solution is put forward. The Contiki IoT operating system simulations display strong performance (time to achieve consensus less than seconds)
第一个内置信任结构的分布式记录保存系统是区块链。它通过跨多个节点的信息冗余为分散控制创建了可靠的体系结构。基于此,本研究提出了一种基于区块链的最小物联网信息交换安全框架。该框架使用双链方法,将数据区块链和交易区块链结合起来。在数据区块链中实现分布式存储和防篡改数据,并使用改进的实用拜占庭容错(PBFT)机制改进共识过程。交易区块链中基于部分盲签名的算法提高了数据注册效率、资源和数据传输以及隐私保护。本文重点介绍了用于物联网(IoT)的区块链系统中采用的共识算法的性能。这样的系统需要时间来完成。共识应该是最小的。三种最流行的共识算法——修正工作量证明、现实拜占庭容错和二元共识——在各种条件下进行评估,包括粒子类型、参与节点数量和无线电传播模型。为了使物联网节点能够在不同的共识算法之间切换,提出了一种综合解决方案。Contiki物联网操作系统模拟显示出强大的性能(达成共识的时间少于秒)
{"title":"Block Chain for IOT Security Using Consensus Algorithms","authors":"P. Kalpana, I. Anusha Prem","doi":"10.46632/daai/3/2/16","DOIUrl":"https://doi.org/10.46632/daai/3/2/16","url":null,"abstract":"The first distributed recordkeeping system with a built-in trust structure is the block chain. It creates a dependable architecture for decentralized control through information redundancy across multiple nodes. Based on this, this study suggests a minimal block chain-based IoT information exchange security framework. The framework uses a double-chain approach that combines the data block chain and the transaction block chain. Distributed storage and tamper-proof data are implemented in the data block chain, and the consensus process is improved using the improved practical Byzantine fault-tolerant (PBFT) mechanism. Data registration efficiency, resource and data transfers, and privacy protection are all enhanced by better partial blind signature-based algorithms in the transaction block chain. This article focuses on how well the consensus algorithms employed in a block chain system for the Internet of Things perform (IoT). Such systems' time requirements to accomplish. Consensus ought to be minimal. The three most popular consensus algorithms—modified proof of work, realistic byzantine fault tolerance, and binary consensus—are assessed under various conditions, including mote type, number of participating nodes, and radio propagation model. To enable an IoT node to switch between different consensus algorithms, a comprehensive solution is put forward. The Contiki IoT operating system simulations display strong performance (time to achieve consensus less than seconds)","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Unemployment In India Using Fb Prophet 用Fb预言家预测印度失业率
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/5
The unemployment rate is a key indicator of economic performance and financial market risk. The main causes of unemployment in India are Large population, lack of professional qualifications, or poorly educated workforce. Labor-intensive sectors have suffered from a slowdown in private investment, especially after the banknote withdrawal. The Covid surge has made unemployment one of the biggest problems in India. The purpose of this project is to predict the future unemployment rate in India using the FB Prophet model. This model is used to predict the future values and developed by Facebook. There are many predictive model in unemployment using LSTM and ARIMA model but the values are not much precise, so we proposed the FB Prophet model for predicting the precise value. We can get a precise with the help of FB Prophet Model. The values are predicted using the FB prophet model and the predicted values are displayed in the form of graph.
失业率是经济绩效的关键指标和金融市场风险。印度失业的主要原因是人口众多,缺乏专业资格,或受教育程度低的劳动力。劳动密集型行业受到私人投资放缓的影响,尤其是在纸币退出之后。新冠肺炎疫情的激增使失业成为印度最大的问题之一。这个项目的目的是预测未来的失业率在印度使用FB先知模型。该模型用于预测未来价值,由Facebook开发。利用LSTM和ARIMA模型对失业率进行预测的模型很多,但预测结果精度不高,因此提出了FB Prophet模型对失业率进行精确预测。我们可以借助FB先知模型得到一个精确的模型。利用FB预测模型对预测值进行预测,并以图形的形式显示预测值。
{"title":"Prediction of Unemployment In India Using Fb Prophet","authors":"","doi":"10.46632/daai/3/1/5","DOIUrl":"https://doi.org/10.46632/daai/3/1/5","url":null,"abstract":"The unemployment rate is a key indicator of economic performance and financial market risk. The main causes of unemployment in India are Large population, lack of professional qualifications, or poorly educated workforce. Labor-intensive sectors have suffered from a slowdown in private investment, especially after the banknote withdrawal. The Covid surge has made unemployment one of the biggest problems in India. The purpose of this project is to predict the future unemployment rate in India using the FB Prophet model. This model is used to predict the future values and developed by Facebook. There are many predictive model in unemployment using LSTM and ARIMA model but the values are not much precise, so we proposed the FB Prophet model for predicting the precise value. We can get a precise with the help of FB Prophet Model. The values are predicted using the FB prophet model and the predicted values are displayed in the form of graph.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Web Chat Application Monitering System 公共网络聊天应用监控系统
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/1
The goal of this study of group behavior is to comprehend how people act in a social networking setting. Social media platforms like Facebook, Twitter, Flickr, and YouTube produce vast amounts of data. Opportunities and difficulties for large-scale research on group behavior. In this research, our goal is to develop the ability to forecast group behavior on social media. How can we, in particular, infer the behavior of unobserved individuals in the same network given information about some individuals?
群体行为研究的目的是了解人们在社交网络环境中的行为。Facebook、Twitter、Flickr和YouTube等社交媒体平台产生了大量数据。群体行为大规模研究的机遇与困难。在这项研究中,我们的目标是发展预测社交媒体群体行为的能力。特别是,在给定某些个体的信息的情况下,我们如何推断同一网络中未被观察到的个体的行为?
{"title":"Public Web Chat Application Monitering System","authors":"","doi":"10.46632/daai/3/1/1","DOIUrl":"https://doi.org/10.46632/daai/3/1/1","url":null,"abstract":"The goal of this study of group behavior is to comprehend how people act in a social networking setting. Social media platforms like Facebook, Twitter, Flickr, and YouTube produce vast amounts of data. Opportunities and difficulties for large-scale research on group behavior. In this research, our goal is to develop the ability to forecast group behavior on social media. How can we, in particular, infer the behavior of unobserved individuals in the same network given information about some individuals?","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125263998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice Control Hot-Cold Water Dispenser System Using Arduino 基于Arduino的冷热水机语音控制系统
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/7
The Technology is transforming human life into a smart world due to its rapid expansion. To make people's lives easier, smart sensors connected to physical items give data. We show a case study of a smart water dispenser that uses weight sensors, temperature sensors, and Arduino to track how much water customers and water bottle suppliers use on a daily basis. When the water in the dispenser is ready to run out, the smart water dispenser weighs the water that is still within and sends out a warning. It takes the temperature and sends the user notifications regarding water use. Here, we propose an Arduino and Relay-based completely automated RFID-based water dispenser system. Using solenoid tap and sensors, the device may fully automate the water distribution process. In order to prevent water deterioration if no glass is placed at the counter panel, the system also detects the presence of glass there. Infrared (IR) sensors are used by the system to identify glass, after which the sensors provide a signal to the microcontroller. Now that the sensors have provided information, the microcontroller is processing it to see if glass is present. The system features an RFID Reader that may be used to read specific tags and provide information about valid tags to the microcontroller. When a valid tag is found, the system now sends a signal to the controller, which then determines whether glass is there before starting the motor to pour water into the glass while the glass is still there. If glass is removed while the process is running, the mechanism shuts off the water flow until glass is found. So, in this article, we propose a smart water dispenser system with a water-saving feature.
由于技术的快速发展,它正在将人类生活转变为一个智能世界。为了让人们的生活更方便,与实物相连的智能传感器可以提供数据。我们展示了一个智能饮水机的案例研究,它使用重量传感器、温度传感器和Arduino来跟踪客户和水瓶供应商每天使用多少水。当饮水机里的水快要用完时,智能饮水机会对剩余的水进行称重,并发出警告。它可以测量温度,并向用户发送有关用水量的通知。在这里,我们提出了一个基于Arduino和relay的全自动rfid饮水机系统。通过使用电磁水龙头和传感器,该设备可以完全自动化配水过程。为了防止水变质,如果没有玻璃放置在柜台面板,系统也检测玻璃的存在。该系统使用红外(IR)传感器来识别玻璃,然后传感器向微控制器提供信号。现在传感器已经提供了信息,微控制器正在处理它,看看是否有玻璃存在。该系统具有RFID阅读器,可用于读取特定标签并向微控制器提供有关有效标签的信息。当找到一个有效的标签时,系统现在向控制器发送一个信号,然后控制器确定杯子是否在那里,然后启动电机,在杯子还在的时候把水倒进杯子里。如果玻璃在过程中被移走,该装置会关闭水流,直到找到玻璃为止。因此,在本文中,我们提出了一种具有节水功能的智能饮水机系统。
{"title":"Voice Control Hot-Cold Water Dispenser System Using Arduino","authors":"","doi":"10.46632/daai/3/1/7","DOIUrl":"https://doi.org/10.46632/daai/3/1/7","url":null,"abstract":"The Technology is transforming human life into a smart world due to its rapid expansion. To make people's lives easier, smart sensors connected to physical items give data. We show a case study of a smart water dispenser that uses weight sensors, temperature sensors, and Arduino to track how much water customers and water bottle suppliers use on a daily basis. When the water in the dispenser is ready to run out, the smart water dispenser weighs the water that is still within and sends out a warning. It takes the temperature and sends the user notifications regarding water use. Here, we propose an Arduino and Relay-based completely automated RFID-based water dispenser system. Using solenoid tap and sensors, the device may fully automate the water distribution process. In order to prevent water deterioration if no glass is placed at the counter panel, the system also detects the presence of glass there. Infrared (IR) sensors are used by the system to identify glass, after which the sensors provide a signal to the microcontroller. Now that the sensors have provided information, the microcontroller is processing it to see if glass is present. The system features an RFID Reader that may be used to read specific tags and provide information about valid tags to the microcontroller. When a valid tag is found, the system now sends a signal to the controller, which then determines whether glass is there before starting the motor to pour water into the glass while the glass is still there. If glass is removed while the process is running, the mechanism shuts off the water flow until glass is found. So, in this article, we propose a smart water dispenser system with a water-saving feature.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Neural Certificate less Hessian Heap Sign cryption for Secure Data Transmission in Wireless Network 面向无线网络数据安全传输的深度神经证书无黑森堆签名加密
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/23
N. Shoba, V. Sathya
Systematic and well grounded data transmission over wireless networks has been substance of uninterrupted research over the last few years. The paramount is scrutinizing the amount of security provisioning owing to the security challenges during transmission over wireless network. In fact, it is moderate to eavesdrop and alter data packets. Accessing the personal computer and public network possess the potentiality to apprehend the network traffic possibly compromising the privacy. Therefore for wireless applications, it is essential to ensure data integrity during data transmission. To efficiently address the above issues, a Deep Neural Certificate less Hessian Curve Heap Sign cryption (DNC-HCHS) method for secured data transmission in wireless network is proposed. Compared with the conventional, Certificate less Sign cryption DNC-HCHS method improves the data confidentiality and data integrity by generating smaller keys employing the Hessian Curve Heap function. Additionally with the assistance of the access point or the aggregator, the sensitivity of heaped sign crypted cipher text can improve the security of data transmission and reduce the message delivery time. Aimed at reducing the delay in data transmission, application of Certificate less Hessian Curve Heap Sign cryption in Deep Learning (i.e., Deep Neural Network) performs the overall process in a swift manner and performs a much better encryption. Simulation is performed to validate the viability and efficiency of the proposed method. The results show that the data confidentiality and data integrity rate are strongly improved, while the delay is minimized.
在过去几年中,通过无线网络进行系统的、接地良好的数据传输一直是不间断研究的内容。最重要的是仔细检查由于无线网络传输过程中的安全挑战而提供的安全配置数量。实际上,窃听和篡改数据包是适度的。访问个人计算机和公共网络具有捕获可能危及隐私的网络流量的潜力。因此,对于无线应用来说,确保数据传输过程中的数据完整性至关重要。为了有效地解决上述问题,提出了一种无深度神经证书的Hessian曲线堆符号加密(DNC-HCHS)无线网络安全数据传输方法。与传统的无证书签名加密DNC-HCHS方法相比,DNC-HCHS方法利用Hessian曲线堆函数生成更小的密钥,提高了数据的保密性和数据完整性。此外,在接入点或聚合器的辅助下,堆签名加密密文的敏感性可以提高数据传输的安全性,缩短消息传递时间。为了减少数据传输的延迟,在深度学习(即深度神经网络)中应用Certificate - less Hessian Curve Heap Sign加密,可以快速完成整个过程,并且加密效果更好。通过仿真验证了该方法的可行性和有效性。结果表明,该方法在最大限度地降低时延的同时,数据保密性和数据完整性得到了极大的提高。
{"title":"Deep Neural Certificate less Hessian Heap Sign cryption for Secure Data Transmission in Wireless Network","authors":"N. Shoba, V. Sathya","doi":"10.46632/daai/3/2/23","DOIUrl":"https://doi.org/10.46632/daai/3/2/23","url":null,"abstract":"Systematic and well grounded data transmission over wireless networks has been substance of uninterrupted research over the last few years. The paramount is scrutinizing the amount of security provisioning owing to the security challenges during transmission over wireless network. In fact, it is moderate to eavesdrop and alter data packets. Accessing the personal computer and public network possess the potentiality to apprehend the network traffic possibly compromising the privacy. Therefore for wireless applications, it is essential to ensure data integrity during data transmission. To efficiently address the above issues, a Deep Neural Certificate less Hessian Curve Heap Sign cryption (DNC-HCHS) method for secured data transmission in wireless network is proposed. Compared with the conventional, Certificate less Sign cryption DNC-HCHS method improves the data confidentiality and data integrity by generating smaller keys employing the Hessian Curve Heap function. Additionally with the assistance of the access point or the aggregator, the sensitivity of heaped sign crypted cipher text can improve the security of data transmission and reduce the message delivery time. Aimed at reducing the delay in data transmission, application of Certificate less Hessian Curve Heap Sign cryption in Deep Learning (i.e., Deep Neural Network) performs the overall process in a swift manner and performs a much better encryption. Simulation is performed to validate the viability and efficiency of the proposed method. The results show that the data confidentiality and data integrity rate are strongly improved, while the delay is minimized.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Data Analytics and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1