T. Dharani, R. Kiruba Kumari, B. Sindhupiriya, R. Mahalakshmi
Nowadays, the image database is growing in enormous size with heterogeneous categories. Similarly, there is rising demands from users in various ways. The most demanding domains in society are health care, Agriculture, commerce, and security. Healthcare domain is concerned with diagnosing the disease. Security domain is involved in investigation of the Criminals. Commerce domain needs analysis to recognize the right product. Agriculture domain requires processing of disease affected fruit images. The PBIR system that combines evidence from multiple digital image domains can reduce those problems of existing image retrieval systems. The PBIR system is used to find uncertain parts of the image during augmentation steps. The result is identified with various parameters (e.g., accuracy, precision, distance, sum of distance), showing that the performance of the k-medoids pam algorithm better than the existing iterative clustering algorithms
{"title":"Pattern Based Image Retrieval System by Using Clustering Techniques","authors":"T. Dharani, R. Kiruba Kumari, B. Sindhupiriya, R. Mahalakshmi","doi":"10.46632/daai/3/2/9","DOIUrl":"https://doi.org/10.46632/daai/3/2/9","url":null,"abstract":"Nowadays, the image database is growing in enormous size with heterogeneous categories. Similarly, there is rising demands from users in various ways. The most demanding domains in society are health care, Agriculture, commerce, and security. Healthcare domain is concerned with diagnosing the disease. Security domain is involved in investigation of the Criminals. Commerce domain needs analysis to recognize the right product. Agriculture domain requires processing of disease affected fruit images. The PBIR system that combines evidence from multiple digital image domains can reduce those problems of existing image retrieval systems. The PBIR system is used to find uncertain parts of the image during augmentation steps. The result is identified with various parameters (e.g., accuracy, precision, distance, sum of distance), showing that the performance of the k-medoids pam algorithm better than the existing iterative clustering algorithms","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IOT) system is a network system that communicates with other devices and systems via the web by using any one of the sensors, devices, applications, and other tools. To prevent unauthorized data transmission access, these systems and networks should include a suitable cryptography mechanism. The security of the shared resources on the data communication network is regarded as one of the key challenges. In this paper, the proposed scheme consists of two parts: (i) generating a key using an array of prime numbers based on the RSA algorithm, and (ii) devising a secure communication scheme based on DNA cryptography and Insertion Method. DNA cryptography is a cryptographic technique that uses DNA sequences to encode and decode source data using biological processes. It is an innovative way to protect data from hackers using DNA. The proposed scheme's security analysis shows that it is secure against the relevant threat models and provides a higher level of protection than previous related studies in the literature.
{"title":"Medical Data Security in IOT Using DNA Cryptography and Insertion Method","authors":"E. Vidhya, R. Kiruba Kumari","doi":"10.46632/daai/3/2/5","DOIUrl":"https://doi.org/10.46632/daai/3/2/5","url":null,"abstract":"The Internet of Things (IOT) system is a network system that communicates with other devices and systems via the web by using any one of the sensors, devices, applications, and other tools. To prevent unauthorized data transmission access, these systems and networks should include a suitable cryptography mechanism. The security of the shared resources on the data communication network is regarded as one of the key challenges. In this paper, the proposed scheme consists of two parts: (i) generating a key using an array of prime numbers based on the RSA algorithm, and (ii) devising a secure communication scheme based on DNA cryptography and Insertion Method. DNA cryptography is a cryptographic technique that uses DNA sequences to encode and decode source data using biological processes. It is an innovative way to protect data from hackers using DNA. The proposed scheme's security analysis shows that it is secure against the relevant threat models and provides a higher level of protection than previous related studies in the literature.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to WordPress","authors":"","doi":"10.4324/9780203385173-4","DOIUrl":"https://doi.org/10.4324/9780203385173-4","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: The Internet of Things (IoT), a new paradigm, has transformed traditional living into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy conservation, smart transportation, and smart industries are among the changes brought about by IoT. Many significant research projects and investigations have been undertaken in order to advance technology through IoT. To fully realise the promise of IoT, numerous obstacles and problems must be overcome. These challenges and problems must be considered from a variety of IoT perspectives, including applications, challenges, enabling technologies, social and environmental implications, and so on. The primary goal of this review article is to provide a thorough discussion from both a technological and a sociological standpoint. The article investigates the Internet of Things' various challenges, critical problems, architecture, and significant application domains. The paper also discusses existing literature and how it contributes to various IoT elements. Furthermore, the significance of big data and its analysis in relation to IoT has been discussed. This page will help readers and researchers understand the Internet of Things and how it applies in real life. Because of the massive number of wireless devices, such as smartphones and the Internet of Things (IoT), and the recent exponential growth in mobile traffic, the wireless network industry has produced and amassed an unprecedented amount of data. According to the International Data Corporation, there will be around 42 billion Internet-connected devices by 2025, with 80 zeta bytes of data created during the same year. There is no question that a new age is dawning as IoT and Artificial Intelligence (AI) grow more prevalent in society, and when 5G technology is implemented, new ideas in all industries will be inspired. We are creating a hyper-connected world in which gadgets are employed for more than simply data transmission and are gradually becoming intelligent and aware of their surroundings as a result of IoT ecosystem innovation. Because of advances in sensing, data processing, cloud, and communication technologies, the systems can interact with the environment and optimise operations by learning via interactions. As a consequence, intelligent settings and self-aware, linked "things" will be developed for applications in health, mobility, the digital society, food, energy, and the environment .
物联网(IoT)作为一种新范式,将传统的生活方式转变为高科技的生活方式。智慧城市、智能家居、污染治理、节能减排、智能交通、智能产业等都是物联网带来的变化。为了通过物联网推进技术,已经开展了许多重要的研究项目和调查。为了充分实现物联网的承诺,必须克服许多障碍和问题。这些挑战和问题必须从各种物联网的角度来考虑,包括应用、挑战、使能技术、社会和环境影响等等。这篇评论文章的主要目的是从技术和社会学的角度提供一个彻底的讨论。本文研究了物联网的各种挑战、关键问题、体系结构和重要应用领域。本文还讨论了现有文献及其对物联网各种要素的贡献。此外,还讨论了大数据的重要性及其与物联网相关的分析。本页将帮助读者和研究人员了解物联网及其在现实生活中的应用。由于大量的无线设备,如智能手机和物联网(IoT),以及最近移动流量的指数级增长,无线网络行业产生并积累了前所未有的数据量。根据国际数据公司(International Data Corporation)的数据,到2025年,将有大约420亿台联网设备,同年将产生80 zeta字节的数据。毫无疑问,随着物联网和人工智能(AI)在社会中越来越普遍,一个新的时代正在到来,当5G技术实施时,所有行业的新想法都将受到启发。我们正在创造一个超连接的世界,在这个世界中,设备不仅仅用于数据传输,而且由于物联网生态系统的创新,它们逐渐变得智能并意识到周围的环境。由于传感、数据处理、云和通信技术的进步,这些系统可以与环境互动,并通过互动学习来优化操作。因此,智能设置和自我意识、相互关联的“事物”将被开发出来,应用于健康、移动、数字社会、食品、能源和环境。
{"title":"World of IOT and Its Challenges","authors":"Ramji Rajbhar","doi":"10.46632/daai/2/6/6","DOIUrl":"https://doi.org/10.46632/daai/2/6/6","url":null,"abstract":": The Internet of Things (IoT), a new paradigm, has transformed traditional living into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy conservation, smart transportation, and smart industries are among the changes brought about by IoT. Many significant research projects and investigations have been undertaken in order to advance technology through IoT. To fully realise the promise of IoT, numerous obstacles and problems must be overcome. These challenges and problems must be considered from a variety of IoT perspectives, including applications, challenges, enabling technologies, social and environmental implications, and so on. The primary goal of this review article is to provide a thorough discussion from both a technological and a sociological standpoint. The article investigates the Internet of Things' various challenges, critical problems, architecture, and significant application domains. The paper also discusses existing literature and how it contributes to various IoT elements. Furthermore, the significance of big data and its analysis in relation to IoT has been discussed. This page will help readers and researchers understand the Internet of Things and how it applies in real life. Because of the massive number of wireless devices, such as smartphones and the Internet of Things (IoT), and the recent exponential growth in mobile traffic, the wireless network industry has produced and amassed an unprecedented amount of data. According to the International Data Corporation, there will be around 42 billion Internet-connected devices by 2025, with 80 zeta bytes of data created during the same year. There is no question that a new age is dawning as IoT and Artificial Intelligence (AI) grow more prevalent in society, and when 5G technology is implemented, new ideas in all industries will be inspired. We are creating a hyper-connected world in which gadgets are employed for more than simply data transmission and are gradually becoming intelligent and aware of their surroundings as a result of IoT ecosystem innovation. Because of advances in sensing, data processing, cloud, and communication technologies, the systems can interact with the environment and optimise operations by learning via interactions. As a consequence, intelligent settings and self-aware, linked \"things\" will be developed for applications in health, mobility, the digital society, food, energy, and the environment .","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this type of networks, overall network stability, utilization of resources, User satisfaction and most conducive to quality of service and selecting a Trusted access network (AN) is network in HWN (ANS) paper Proposes plan proposed project user, Can consider operator and/or quos perspectives general multicriteria software assistant (SA) was used to present and design. In imperfect wireless networks Bayesian information on the network selection problem we make it a game. Generally, a mobile user's preference (i.e., usage) is personal information. Therefore, each user provides others an optimal network selection decision must be made. Bayesian Nash equilibrium is assumed to be the solution of this game, also between the Bayesian Nash equilibrium and the equilibrium distribution of aggregate dynamics there is a one-to-one mapping. This is a Bayesian network selection game Integration of overall optimal response dynamics Numerical results. Show that Referring to the notification, the current paper is called Exams presents a review on the application of MCDM to determine the best PC architecture among three PC architectures, i.e.: A, B&C using ELECTRE technique based on four criteria. Provides a dynamic response to the problem. Henceforth this strategy is incorporated in this study. Arrangements obtained by AHP and ELECTRE technique are considered in the present study. Alternatives (eg wireless networks) represent attributes such as Network Selection 1, Network Selection 2, Network Selection 3, Network Selection 4, and Network Selection 5. Delay (msec), Jitter (msec), BER (• 10), Throughput (kbps), Cost (units) is an evaluation method. In this type of analysis, Gray Correlation Analysis (GRA) methods determine the best solution for a short distance to negativity and a long distance to solution. As a result, Wireless Network 5 ranked first and Wireless Network 4 ranked lowest.
{"title":"Performance Analysis of Network Selection Using ELECTRE Method","authors":"","doi":"10.46632/daai/1/1/11","DOIUrl":"https://doi.org/10.46632/daai/1/1/11","url":null,"abstract":"In this type of networks, overall network stability, utilization of resources, User satisfaction and most conducive to quality of service and selecting a Trusted access network (AN) is network in HWN (ANS) paper Proposes plan proposed project user,\u0000Can consider operator and/or quos perspectives general multicriteria software assistant (SA) was used to present and design. In imperfect wireless networks Bayesian information on the network selection problem we make it a game. Generally, a\u0000mobile user's preference (i.e., usage) is personal information. Therefore, each user provides others an optimal network selection decision must be made. Bayesian Nash equilibrium is assumed to be the solution of this game, also between the Bayesian Nash equilibrium and the equilibrium distribution of aggregate dynamics there is a one-to-one mapping. This is a Bayesian network selection game Integration of overall optimal response dynamics Numerical results. Show that Referring to the notification, the current paper is called Exams presents a review on the application of MCDM to determine the best PC architecture among three PC architectures, i.e.: A, B&C using ELECTRE technique based on four criteria. Provides a dynamic response to the problem. Henceforth this strategy is incorporated in this study. Arrangements obtained by AHP and ELECTRE technique are considered in the present study. Alternatives (eg wireless networks) represent attributes such as Network Selection 1, Network Selection 2, Network Selection 3, Network Selection 4, and Network Selection 5. Delay (msec), Jitter (msec), BER (• 10), Throughput (kbps), Cost (units) is an evaluation method. In this type of analysis, Gray Correlation Analysis (GRA) methods determine the best solution for a short distance to negativity and a long distance to solution. As a result, Wireless Network 5 ranked first and Wireless Network 4 ranked lowest.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131628656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research Paper on White Box Testing","authors":"","doi":"10.46632/daai/2/6/8","DOIUrl":"https://doi.org/10.46632/daai/2/6/8","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133203525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Operating system are computer software a user and a computer is between Communication an operating system (OS) is a All other applications on the computer Programs and programs through the launch program After loading into the computer A program that manages to make Limited application interface Requests for services through (API). Mostly, Apple Mac OS, Microsoft Windows and The top five, including Google's Android OS The IT sector is focused on OSes. Linux Operating system and Apple iOS. Operating system is most people are using the very difficult situation solving the problem in computer. ELECTRE (Elimination Et Choice Translating Reality) analysis using the ELECTRE methods, performance comparisons combining an Operating system 1, Operating system 2, Operating system 3, Operating system 4 Alternative value and Memory management, Process management, Storage management, protection and security, Software Features, Database management Evaluation Parameters in value. Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank. In this paper Operating system for ELECTRE in Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank.
操作系统是计算机软件,是用户和计算机之间的通信,操作系统(OS)是计算机上的所有其他应用程序和程序通过启动程序加载到计算机后的程序,它通过API管理有限的应用程序接口请求服务。大多数情况下,苹果的Mac操作系统,微软的Windows和前五名,包括b谷歌的Android操作系统。Linux操作系统和苹果iOS。操作系统是大多数人正在使用的非常困难的情况下解决问题的计算机。ELECTRE (Elimination Et Choice translation Reality)采用ELECTRE方法进行分析,结合操作系统1、操作系统2、操作系统3、操作系统4的性能比较,选择价值与内存管理、进程管理、存储管理、保护与安全、软件功能、数据库管理等参数进行价值评估。操作系统1排名第一,而操作系统4排名最低。在本文中,操作系统1中的e操作系统是排名第一的,而操作系统4是排名最低的。
{"title":"Evaluation of Operating System Using Electric Multi Criteria Decision Making Method","authors":"","doi":"10.46632/daai/1/1/10","DOIUrl":"https://doi.org/10.46632/daai/1/1/10","url":null,"abstract":"Operating system are computer software a user and a computer is between Communication an operating system (OS) is a All other applications on the computer Programs and programs through the launch program After loading into the computer A\u0000program that manages to make Limited application interface Requests for services through (API). Mostly, Apple Mac OS, Microsoft Windows and The top five, including Google's Android OS The IT sector is focused on OSes. Linux Operating system and Apple iOS. Operating system is most people are using the very difficult situation solving the problem in computer. ELECTRE (Elimination Et Choice Translating Reality) analysis using the ELECTRE methods, performance comparisons combining an Operating system 1, Operating system 2, Operating system 3, Operating system 4 Alternative value and Memory management, Process management, Storage management, protection and security, Software Features, Database management Evaluation Parameters in value. Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank. In this paper Operating system for ELECTRE in Operating system 1 is got the first rank whereas is the Operating system 4 is having the Lowest rank.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JBPM in IT Sector for Banking Products","authors":"","doi":"10.46632/daai/2/6/3","DOIUrl":"https://doi.org/10.46632/daai/2/6/3","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future of Software Testing Using Artificial Intelligence","authors":"","doi":"10.46632/daai/2/6/4","DOIUrl":"https://doi.org/10.46632/daai/2/6/4","url":null,"abstract":"","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128915696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}