首页 > 最新文献

Data Analytics and Artificial Intelligence最新文献

英文 中文
Python Programming to Solve Linear Equations by Gaussian methods 用高斯方法求解线性方程的Python编程
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/25
M. Shobana priya, T. V., Rezvana Parveen S
The development to f numerical processes was greatly aided by Newton and Leibniz's invention of calculus, which produced precise mathematical representations of physical reality first and then in other disciplines such as engineering, healthcare, and commerce. Typically, these mathematical models cannot be solved explicitly; therefore, approximate solutions must be obtained using numerical approaches [3][4][5].In this paper, Python Programming is used to solve system of linear equations by Gauss Elimination and Gauss Jordan method.
牛顿和莱布尼茨发明的微积分极大地促进了数值过程的发展,微积分首先产生了对物理现实的精确数学表示,然后在工程、医疗保健和商业等其他学科中得到了应用。通常,这些数学模型不能明确地求解;因此,必须用数值方法求得近似解[3][4][5]。本文利用Python编程方法,采用高斯消去法和高斯约当法求解线性方程组。
{"title":"Python Programming to Solve Linear Equations by Gaussian methods","authors":"M. Shobana priya, T. V., Rezvana Parveen S","doi":"10.46632/daai/3/2/25","DOIUrl":"https://doi.org/10.46632/daai/3/2/25","url":null,"abstract":"The development to f numerical processes was greatly aided by Newton and Leibniz's invention of calculus, which produced precise mathematical representations of physical reality first and then in other disciplines such as engineering, healthcare, and commerce. Typically, these mathematical models cannot be solved explicitly; therefore, approximate solutions must be obtained using numerical approaches [3][4][5].In this paper, Python Programming is used to solve system of linear equations by Gauss Elimination and Gauss Jordan method.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122031263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi Cluster Secure System for Out Sourced Encrypted Data Bases 外包加密数据库的多集群安全系统
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/33
Recently, database users have begun to use cloud database services to outsource theirdatabases. The reason for this is the high computation speed and the huge storage capacity thatcloud owners provide at low prices. However, despite the attractiveness of the cloud computingenvironment to database users, privacy issues remain a cause for concern for database ownerssince data access is out of their control. Encryption is the only way of assuaging users' fearssurroundingdataprivacy,butexecutingStructuredQueryLanguage (SQL)queriesoverencrypteddatais achallengingtask,especiallyif the data a re-encryptedby arandomizedencryptionalgorithm. Theexistingsystem, whichisanindexingschemetoencodetheoriginaltable’stuplesinto bit vectors (BVs) prior to the encryption. The resulting index is then usedto narrow therange of retrieved encrypted records from the cloud to a small set of records that are candidatesfor the user's query. Based on the indexing scheme, the designed system is used to execute SQLqueries over the encrypted data. The data are encrypted by a single randomized encryptionalgorithm,namely theAdvanced Encryption Standard-Cipher-Block Chaining (AES-CBC). Inthe existing scheme, theindex values (BVs) are stored atuser's side, and which is supportedmostof relational algebra operators, such as select, join,etc. In the existing system,the clouddata server is able to extract the ratio of two underlying data records, and key management servercandecryptthe ciphertextsofowners’data records,whichbreakthe privacysecurity.
最近,数据库用户开始使用云数据库服务来外包他们的数据库。其原因是高计算速度和巨大的存储容量,云计算所有者以低廉的价格提供。然而,尽管云计算环境对数据库用户具有吸引力,隐私问题仍然是数据库所有者关注的一个原因,因为数据访问超出了他们的控制。加密是缓解用户对数据隐私担忧的唯一方法,但是执行structurequerylanguage (SQL)查询过度加密的数据是一项具有挑战性的任务,特别是如果数据被随机加密算法重新加密。现有的系统,它是一种索引方案,在加密之前将原始表的串编码成比特向量(bv)。然后使用生成的索引将从云中检索到的加密记录的范围缩小到一小部分记录,这些记录是用户查询的候选记录。基于索引方案,设计的系统用于对加密数据执行sqlquery。数据通过单个随机加密算法进行加密,即高级加密标准-密码块链(AES-CBC)。在现有方案中,索引值存储在用户侧,支持大多数关系代数操作,如选择、连接等。在现有的系统中,云数据服务器可以提取两个底层数据记录的比值,密钥管理服务器可以对所有者数据记录的密文进行加密,从而破坏了隐私安全。
{"title":"A Multi Cluster Secure System for Out Sourced Encrypted Data Bases","authors":"","doi":"10.46632/daai/3/2/33","DOIUrl":"https://doi.org/10.46632/daai/3/2/33","url":null,"abstract":"Recently, database users have begun to use cloud database services to outsource theirdatabases. The reason for this is the high computation speed and the huge storage capacity thatcloud owners provide at low prices. However, despite the attractiveness of the cloud computingenvironment to database users, privacy issues remain a cause for concern for database ownerssince data access is out of their control. Encryption is the only way of assuaging users' fearssurroundingdataprivacy,butexecutingStructuredQueryLanguage (SQL)queriesoverencrypteddatais achallengingtask,especiallyif the data a re-encryptedby arandomizedencryptionalgorithm. Theexistingsystem, whichisanindexingschemetoencodetheoriginaltable’stuplesinto bit vectors (BVs) prior to the encryption. The resulting index is then usedto narrow therange of retrieved encrypted records from the cloud to a small set of records that are candidatesfor the user's query. Based on the indexing scheme, the designed system is used to execute SQLqueries over the encrypted data. The data are encrypted by a single randomized encryptionalgorithm,namely theAdvanced Encryption Standard-Cipher-Block Chaining (AES-CBC). Inthe existing scheme, theindex values (BVs) are stored atuser's side, and which is supportedmostof relational algebra operators, such as select, join,etc. In the existing system,the clouddata server is able to extract the ratio of two underlying data records, and key management servercandecryptthe ciphertextsofowners’data records,whichbreakthe privacysecurity.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Analysis of Wireless Sensor Networks in Recent Years 近年来无线传感器网络性能分析
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/34
Wireless Sensor networks (WSNs) have become one of the most interesting areas of research in the past few years. Undoubtedly, wireless transmission techniques are used for all node-to-node communication. Additionally, because wireless sensor networks are self- organized, independent of fixed infrastructure, and their topologies vary on a regular basis, broadcasting is the default method of communication in WSNs. But a handful of sensor nodes in long-lasting networks have dynamically accomplished it. They are autonomous systems that share common sensors, centralized nodes, and a back-end server. The real-time independent sensor data is initially transmitted by the common sensors, and finally, the back- end server receives the sensed data to do additional process and performance analysis. Wireless sensor networks (WSNs) are hybrid nodes with wireless communication interfaces, data sensing, processing, and storage capabilities that are rapidly expanding in number. It is used for many different things in daily life, including tracking vehicles, keeping an eye out for fires in the forest, finding and tracking soldiers for military usage, keeping an eye on the oceans and seas, and creating intelligent places.
近年来,无线传感器网络(WSNs)已成为一个热门的研究领域。毫无疑问,无线传输技术被用于所有的节点间通信。此外,由于无线传感器网络是自组织的,独立于固定的基础设施,并且它们的拓扑结构定期变化,广播是无线传感器网络中默认的通信方法。但在长期网络中,少数传感器节点已经动态地完成了这一任务。它们是共享公共传感器、集中式节点和后端服务器的自治系统。实时独立传感器数据首先由通用传感器传输,后端服务器接收到传感器数据后进行附加的流程和性能分析。无线传感器网络(wsn)是具有无线通信接口、数据感知、处理和存储功能的混合节点,其数量正在迅速扩大。它在日常生活中有许多不同的用途,包括跟踪车辆,监视森林中的火灾,寻找和跟踪军事用途的士兵,监视海洋和海洋,以及创建智能场所。
{"title":"A Performance Analysis of Wireless Sensor Networks in Recent Years","authors":"","doi":"10.46632/daai/3/2/34","DOIUrl":"https://doi.org/10.46632/daai/3/2/34","url":null,"abstract":"Wireless Sensor networks (WSNs) have become one of the most interesting areas of research in the past few years. Undoubtedly, wireless transmission techniques are used for all node-to-node communication. Additionally, because wireless sensor networks are self- organized, independent of fixed infrastructure, and their topologies vary on a regular basis, broadcasting is the default method of communication in WSNs. But a handful of sensor nodes in long-lasting networks have dynamically accomplished it. They are autonomous systems that share common sensors, centralized nodes, and a back-end server. The real-time independent sensor data is initially transmitted by the common sensors, and finally, the back- end server receives the sensed data to do additional process and performance analysis. Wireless sensor networks (WSNs) are hybrid nodes with wireless communication interfaces, data sensing, processing, and storage capabilities that are rapidly expanding in number. It is used for many different things in daily life, including tracking vehicles, keeping an eye out for fires in the forest, finding and tracking soldiers for military usage, keeping an eye on the oceans and seas, and creating intelligent places.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FTP Server Client Using Android Application FTP服务器客户端使用Android应用程序
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/11
On a computer network, the File Transfer Protocol (FTP) is a common communication protocol used to transfer data from a server to a client. FTP uses distinct control and data connections between the client and the server in client-server architecture. FTP offers two transfer methods: an anonymous technique and a password-based authentication method. The primary goal of FTP is to encourage file sharing. Clients can connect to the server using third-party applications (eg. FileZilla). A single FTP object can manage status, connection, settings, etc. is the centre of the Apache Commons Libraries. Obtaining a remote connection to involves a set of details, including the server's hostname or IP address, a username and a password.
在计算机网络中,文件传输协议(FTP)是一种常用的通信协议,用于将数据从服务器传输到客户端。FTP在客户机-服务器体系结构中使用不同的客户机和服务器之间的控制和数据连接。FTP提供两种传输方法:匿名技术和基于密码的身份验证方法。FTP的主要目标是鼓励文件共享。客户端可以使用第三方应用程序连接到服务器。FileZilla)。一个单独的FTP对象可以管理状态、连接、设置等,这是Apache Commons Libraries的核心。获取远程连接涉及一组详细信息,包括服务器的主机名或IP地址、用户名和密码。
{"title":"FTP Server Client Using Android Application","authors":"","doi":"10.46632/daai/3/1/11","DOIUrl":"https://doi.org/10.46632/daai/3/1/11","url":null,"abstract":"On a computer network, the File Transfer Protocol (FTP) is a common communication protocol used to transfer data from a server to a client. FTP uses distinct control and data connections between the client and the server in client-server architecture. FTP offers two transfer methods: an anonymous technique and a password-based authentication method. The primary goal of FTP is to encourage file sharing. Clients can connect to the server using third-party applications (eg. FileZilla). A single FTP object can manage status, connection, settings, etc. is the centre of the Apache Commons Libraries. Obtaining a remote connection to involves a set of details, including the server's hostname or IP address, a username and a password.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121285830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residential Property Price Estimation Using Machine Learning 使用机器学习估算住宅物业价格
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/2
{"title":"Residential Property Price Estimation Using Machine Learning","authors":"","doi":"10.46632/daai/3/1/2","DOIUrl":"https://doi.org/10.46632/daai/3/1/2","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Image and Under Exposed Image Enhancement Using Convolution Neural Network 基于卷积神经网络的水下图像和欠曝光图像增强
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/4
The turbidity media (for example, particulates, liquid) throughout the air degrades pictures from outside sceneries. Smog, mist, as well as smoky were examples of air absorptive processes. All along sight line, the lens receives less irradiation from video frame. In addition, the entering sunlight gets mixed with the sunlight from atmosphere (ambient light reflected into the line of sight by atmospheric particles). Intensity and correct information are lost in deteriorated photos. The deterioration is spatially variable because of the quantity of dispersion varies mostly on distances between the arty as well as the lens. In both customer imaging and image processing systems, fog removal1 (or poor) was widely sought. Firstly, reducing fog may greatly improve picture vision while also correcting that could go produced by the air sunlight. In speaking, the picture with no mist is far more attractive. Secondly, many neural networks presume that input layer (following rectangular grid) represents full animation, through reduced image processing to elevated object detection. This skewed, low - light picture illumination would unavoidably decrease the quality of machine vision (for example, focused product, filtration, and radiometric analyses). Finally, fog reduction may generate detailed information, which would be useful for several computer vision and sophisticated photo retouching. For picture comprehension, mist or foggy could be a helpful height indication. This picture of lawful fog could be put to good advantage. Decreased activity, on the other hand, is indeed a difficult challenge since the fog was based upon uncertain depth data. If indeed the data is merely a small hazy picture, then issue is under constrained. As a result, numerous solutions based on various pictures or other data were presented.
空气中的浊度介质(例如,颗粒、液体)会使外界景色的图像退化。烟雾、薄雾和烟雾都是空气吸收过程的例子。在视线范围内,镜头受到视频帧的照射较少。此外,进入的太阳光与来自大气的太阳光混合(环境光被大气粒子反射到视线中)。在变质的照片中,强度和正确的信息丢失了。恶化是空间可变的,因为色散的数量主要随火炮和镜头之间的距离而变化。在客户成像和图像处理系统中,雾去除(或差)被广泛寻求。首先,减少雾可以大大改善图像视觉,同时也可以纠正空气阳光可能产生的影响。说来,没有雾的画更有吸引力。其次,许多神经网络假设输入层(下面是矩形网格)代表完整的动画,通过减少图像处理来提升目标检测。这种倾斜的、低光的图像照明将不可避免地降低机器视觉的质量(例如,聚焦产品、过滤和辐射分析)。最后,雾的减少可以产生详细的信息,这将是有用的几个计算机视觉和复杂的照片修饰。对于图片的理解,雾或雾可能是一个有用的高度指示。这种法律迷雾的图景可以被利用起来。另一方面,减少活动确实是一个困难的挑战,因为雾是基于不确定的深度数据。如果数据确实只是一幅模糊的小画面,那么问题就受到了限制。因此,根据各种图片或其他数据提出了许多解决方案。
{"title":"Underwater Image and Under Exposed Image Enhancement Using Convolution Neural Network","authors":"","doi":"10.46632/daai/3/1/4","DOIUrl":"https://doi.org/10.46632/daai/3/1/4","url":null,"abstract":"The turbidity media (for example, particulates, liquid) throughout the air degrades pictures from outside sceneries. Smog, mist, as well as smoky were examples of air absorptive processes. All along sight line, the lens receives less irradiation from video frame. In addition, the entering sunlight gets mixed with the sunlight from atmosphere (ambient light reflected into the line of sight by atmospheric particles). Intensity and correct information are lost in deteriorated photos. The deterioration is spatially variable because of the quantity of dispersion varies mostly on distances between the arty as well as the lens. In both customer imaging and image processing systems, fog removal1 (or poor) was widely sought. Firstly, reducing fog may greatly improve picture vision while also correcting that could go produced by the air sunlight. In speaking, the picture with no mist is far more attractive. Secondly, many neural networks presume that input layer (following rectangular grid) represents full animation, through reduced image processing to elevated object detection. This skewed, low - light picture illumination would unavoidably decrease the quality of machine vision (for example, focused product, filtration, and radiometric analyses). Finally, fog reduction may generate detailed information, which would be useful for several computer vision and sophisticated photo retouching. For picture comprehension, mist or foggy could be a helpful height indication. This picture of lawful fog could be put to good advantage. Decreased activity, on the other hand, is indeed a difficult challenge since the fog was based upon uncertain depth data. If indeed the data is merely a small hazy picture, then issue is under constrained. As a result, numerous solutions based on various pictures or other data were presented.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123000264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in cloud computing using RSA Algorithm 基于RSA算法的云计算数据安全
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/18
L. Hanupriya, S.I Anto Ramya
The capacity of cloud computing, an emerging paradigm, to lower computer costs, has made it the hottest research area of the day. The most fascinating and alluring aspect of modern technology is what it is giving. The services to its customers over the internet on demand. Security has emerged as the primary challenge impeding the implementation of cloud settings because cloud computing stores data and distributes resources in an open environment. Although cloud computing is effective and promising, there are several issues with data security because the cloud user has no physical access to the data. We suggested a technique using the RSA algorithm to assure the security of the data.
云计算作为一种新兴的模式,其降低计算机成本的能力使其成为当今最热门的研究领域。现代科技最吸引人、最吸引人的地方在于它所能提供的东西。通过互联网按需为客户提供服务。安全性已成为阻碍云设置实现的主要挑战,因为云计算在开放环境中存储数据和分配资源。尽管云计算是有效和有前途的,但由于云用户无法对数据进行物理访问,因此存在一些数据安全性问题。我们建议使用RSA算法来保证数据的安全性。
{"title":"Data security in cloud computing using RSA Algorithm","authors":"L. Hanupriya, S.I Anto Ramya","doi":"10.46632/daai/3/2/18","DOIUrl":"https://doi.org/10.46632/daai/3/2/18","url":null,"abstract":"The capacity of cloud computing, an emerging paradigm, to lower computer costs, has made it the hottest research area of the day. The most fascinating and alluring aspect of modern technology is what it is giving. The services to its customers over the internet on demand. Security has emerged as the primary challenge impeding the implementation of cloud settings because cloud computing stores data and distributes resources in an open environment. Although cloud computing is effective and promising, there are several issues with data security because the cloud user has no physical access to the data. We suggested a technique using the RSA algorithm to assure the security of the data.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134529368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Garbage Vehicle Tracking System Using Android 基于Android的垃圾车跟踪系统
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/1/6
Trash vehicle global positioning framework constructed utilizing android programming, we can utilize this application on our mobiles to follow trash vehicles and send a warning to the clients when the trash vehicle going into their roads, assuming we have any grievances about their administration, we can give our input and objections about that help, we can give our criticism and grumblings utilizing this application The protests can be seen by the administrator. They can figure out their grievances in a current framework. The trash vehicle gives a notice by whistle (or) playing a tune however it makes more commotion contamination (or) the client misses the vehicle, so the client puts their trash close to their city intersections, so it makes our roads non-cleanliness and grimy, to beat this issue we foster an application that sends a warning to the client, while trash vehicle goes into their roads, clients need to enlist their subtleties and they need to sign in by their enrolled subtleties. On the off chance that the login and enlistment are coordinated, it permits the client to get to an application they get a warning and send their criticism and objections about their administrations, The trash vehicle gatherer needs to enroll their subtleties and sign in, subsequent to signing in, the administrator has a data set of roads, where they need to go today, which roads are distributed for them. The administrator can deal with the client subtleties and gatherer subtleties and they can figure out the grumblings of clients, to give great support of the clients.
利用android编程构建的垃圾车全球定位框架,我们可以在手机上使用这个应用程序跟踪垃圾车,并在垃圾车进入他们的道路时向客户发送警告,假设我们对他们的管理有任何不满,我们可以给出我们的输入和反对的帮助,我们可以使用这个应用程序给出我们的批评和抱怨,抗议可以被管理员看到。他们可以在当前的框架中找出自己的不满。吹口哨的垃圾车辆给通知(或)一首乐曲然而更骚动污染(或)客户的没有什么车辆,所以客户把他们的垃圾接近他们的城市十字路口,它使我们的道路non-cleanliness和肮脏的,打败这个问题我们培养一个客户机应用程序,该应用程序发送一个警告,而垃圾车辆进入他们的道路,客户需要招募他们的微妙之处和他们需要登录的微妙之处。如果登录和注册是协调的,它允许客户访问一个应用程序,他们会得到警告,并发送他们对管理的批评和反对意见,垃圾车收集者需要注册他们的细微之处并登录,登录后,管理员有一个道路数据集,他们今天需要去哪里,哪些道路为他们分配。管理员能够处理客户的细微之处和收集者的细微之处,能够发现客户的抱怨,给予客户极大的支持。
{"title":"Garbage Vehicle Tracking System Using Android","authors":"","doi":"10.46632/daai/3/1/6","DOIUrl":"https://doi.org/10.46632/daai/3/1/6","url":null,"abstract":"Trash vehicle global positioning framework constructed utilizing android programming, we can utilize this application on our mobiles to follow trash vehicles and send a warning to the clients when the trash vehicle going into their roads, assuming we have any grievances about their administration, we can give our input and objections about that help, we can give our criticism and grumblings utilizing this application The protests can be seen by the administrator. They can figure out their grievances in a current framework. The trash vehicle gives a notice by whistle (or) playing a tune however it makes more commotion contamination (or) the client misses the vehicle, so the client puts their trash close to their city intersections, so it makes our roads non-cleanliness and grimy, to beat this issue we foster an application that sends a warning to the client, while trash vehicle goes into their roads, clients need to enlist their subtleties and they need to sign in by their enrolled subtleties. On the off chance that the login and enlistment are coordinated, it permits the client to get to an application they get a warning and send their criticism and objections about their administrations, The trash vehicle gatherer needs to enroll their subtleties and sign in, subsequent to signing in, the administrator has a data set of roads, where they need to go today, which roads are distributed for them. The administrator can deal with the client subtleties and gatherer subtleties and they can figure out the grumblings of clients, to give great support of the clients.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Cryptography 密码学概述
Pub Date : 2023-02-01 DOI: 10.46632/daai/3/2/15
B. U. Archana, V. Niranjana
Until very recently, the term "cryptography" was almost always used to refer to "encryption," which is the act of transforming plaintext or conventional information into an unintelligible form (called cipher text). Decryption is the opposite, or the process of returning plaintext from the unintelligible cipher text. The encryption and reversing decryption operations are carried out by a pair of algorithms known as cyphers (or cyphers). The algorithm and, in each case, a "key" work together just to regulate the precise operation of a cypher. The key, which is required to decrypt the cipher text, is a secret that should ideally only be known by the communicants. It typically takes the form of a short string of characters that the user can remember. A "cryptosystem" is the ordered list of elements with a finite number of potential combinations in formal mathematics.
直到最近,术语“密码学”几乎总是用来指“加密”,这是将明文或常规信息转换为不可理解的形式(称为密文)的行为。解密则相反,即从难以理解的密文返回明文的过程。加密和反向解密操作由一对称为密码(或密码)的算法执行。在每种情况下,算法和“密钥”一起工作只是为了规范密码的精确操作。解密密文所需的密钥是一个只有通信方知道的秘密。它通常采用用户可以记住的短字符串的形式。在形式数学中,“密码系统”是具有有限数量潜在组合的元素的有序列表。
{"title":"Overview of Cryptography","authors":"B. U. Archana, V. Niranjana","doi":"10.46632/daai/3/2/15","DOIUrl":"https://doi.org/10.46632/daai/3/2/15","url":null,"abstract":"Until very recently, the term \"cryptography\" was almost always used to refer to \"encryption,\" which is the act of transforming plaintext or conventional information into an unintelligible form (called cipher text). Decryption is the opposite, or the process of returning plaintext from the unintelligible cipher text. The encryption and reversing decryption operations are carried out by a pair of algorithms known as cyphers (or cyphers). The algorithm and, in each case, a \"key\" work together just to regulate the precise operation of a cypher. The key, which is required to decrypt the cipher text, is a secret that should ideally only be known by the communicants. It typically takes the form of a short string of characters that the user can remember. A \"cryptosystem\" is the ordered list of elements with a finite number of potential combinations in formal mathematics.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114429636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Development Techniques In Current Scenario 当前场景下的软件开发技术
Pub Date : 2023-02-01 DOI: 10.46632/cllrm/3/2/10
S. Nagalakshmi
Now a days, technology of Internet become very fast growing development and rapid advancement in software. Internet is very essential resource for the people. IOT, Machine Learning, Big Data technologies, Artificial Intelligence etc., are some of the new technologies with variety of applications all over the world. Predicting the future in the computing Industry is very harder. In the field of software introduces of key changes to the research process. As a result, the software research is blowing in increasing breath of topics that tends to Implementation. Software technology today is improving at a rapid growth, enabling faster change and progress, Causing an accelerating of the rate of change. It is not only technology trends and emerging technologies that are extend, a lot more has changed this year due to COVID-19. The software development techniques may tend to learning and relearning process.
如今,互联网技术的发展非常迅速,软件的进步也非常迅速。互联网对人们来说是非常重要的资源。物联网,机器学习,大数据技术,人工智能等,是一些在世界各地有各种应用的新技术。预测计算机行业的未来是非常困难的。在软件领域介绍了关键变化的研究过程。因此,软件研究越来越多的主题倾向于实现。今天的软件技术正在以快速的增长改进,使更快的变化和进步成为可能,导致变化速度的加速。不仅是技术趋势和新兴技术得到扩展,由于COVID-19,今年发生了更多变化。软件开发技术可能趋向于学习和再学习的过程。
{"title":"Software Development Techniques In Current Scenario","authors":"S. Nagalakshmi","doi":"10.46632/cllrm/3/2/10","DOIUrl":"https://doi.org/10.46632/cllrm/3/2/10","url":null,"abstract":"Now a days, technology of Internet become very fast growing development and rapid advancement in software. Internet is very essential resource for the people. IOT, Machine Learning, Big Data technologies, Artificial Intelligence etc., are some of the new technologies with variety of applications all over the world. Predicting the future in the computing Industry is very harder. In the field of software introduces of key changes to the research process. As a result, the software research is blowing in increasing breath of topics that tends to Implementation. Software technology today is improving at a rapid growth, enabling faster change and progress, Causing an accelerating of the rate of change. It is not only technology trends and emerging technologies that are extend, a lot more has changed this year due to COVID-19. The software development techniques may tend to learning and relearning process.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Data Analytics and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1