Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761035
Sankarsan Panda, V. Somani
Guava leaves are healthy indicators for growth in a tree. The visual inspection of diseased area might mislead to inaccuracy for pruning. The leaves of guava are majorly elliptical or oval within the upper surface, and dull green in color. If the leaf diseased, it appears to be red or purple. There are number of pathogen might impact on any parts of its surface. In this paper, a total of four types of diseases namely: canker, dot, mummification and rust considered from the already available data set. The necrotic areas, perimeter, major axis and minor axis measured within the diseased area in its gray scale image. Additionally, shape descriptors used for analyzing the region of interest in diseased areas of dot, mummification and rust images.
{"title":"Certain Investigations of Guava Leaf Disease Measurement in Necrotic Areas with Image Processing Techniques","authors":"Sankarsan Panda, V. Somani","doi":"10.1109/ICSCDS53736.2022.9761035","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761035","url":null,"abstract":"Guava leaves are healthy indicators for growth in a tree. The visual inspection of diseased area might mislead to inaccuracy for pruning. The leaves of guava are majorly elliptical or oval within the upper surface, and dull green in color. If the leaf diseased, it appears to be red or purple. There are number of pathogen might impact on any parts of its surface. In this paper, a total of four types of diseases namely: canker, dot, mummification and rust considered from the already available data set. The necrotic areas, perimeter, major axis and minor axis measured within the diseased area in its gray scale image. Additionally, shape descriptors used for analyzing the region of interest in diseased areas of dot, mummification and rust images.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760778
Kumar Vivek Ranjan, V. Laxmi
The TRMS is a prototype helicopter. The reason to study the TRMS theory and creating a controller to manage TRMS reaction is to develop a platform for helicopter flight control. This research linearized and described the nonlinear model in state space form. To control activity, a MIMO Twin Rotor system was designed with a Linear Quadratic Gaussian (LQG) compensator. In order to construct a controller, a 2-DOF dynamic model was used to study pitch and yaw motion. The two-stage layout method begins with the creation of an optimal LQR and ends with the creation of a Kalman filter observer. To achieve the required response, the LQR parameters Q and R are changed at arbitrary. Later, the BFO approach was applied to improve the LQG compensator's Q and R parameters. Simulations indicate that the proposed controller can meet the requirements.
{"title":"Design of an Optimal Controller for a Twin Rotor Mimo System (TRMS)","authors":"Kumar Vivek Ranjan, V. Laxmi","doi":"10.1109/ICSCDS53736.2022.9760778","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760778","url":null,"abstract":"The TRMS is a prototype helicopter. The reason to study the TRMS theory and creating a controller to manage TRMS reaction is to develop a platform for helicopter flight control. This research linearized and described the nonlinear model in state space form. To control activity, a MIMO Twin Rotor system was designed with a Linear Quadratic Gaussian (LQG) compensator. In order to construct a controller, a 2-DOF dynamic model was used to study pitch and yaw motion. The two-stage layout method begins with the creation of an optimal LQR and ends with the creation of a Kalman filter observer. To achieve the required response, the LQR parameters Q and R are changed at arbitrary. Later, the BFO approach was applied to improve the LQG compensator's Q and R parameters. Simulations indicate that the proposed controller can meet the requirements.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760961
K. Vardhan, B. Josephine, K. Rao
The introduction of the internet and the quick adoption of public news platforms (such as Facebook(FB), Twitter and Instagram) prepared the door for unprecedented levels of knowledge distribution in human history. Thanks to social media platforms, consumers are creating and sharing more knowledge compare to before, Most of it is incorrect and has no bearing on the discussion. It's difficult to categorise a written work as misleading or disinformation using an algorithm. Even an expert in a given field must consider a variety of factors before deciding whether or not an item is true. For detecting spurious news, researchers recommend using a machine learning classification approach. Our research looks into different textual qualities that can be used to tell the difference between false and real content. We train a set of distinct machine learning algorithms using diverse integral approaches and evaluate their performance on real-world datasets using those properties. Our proposed ensemble learner method outperforms individual learners.
{"title":"Fake News Detection in Social Media Using Supervised Learning Techniques","authors":"K. Vardhan, B. Josephine, K. Rao","doi":"10.1109/ICSCDS53736.2022.9760961","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760961","url":null,"abstract":"The introduction of the internet and the quick adoption of public news platforms (such as Facebook(FB), Twitter and Instagram) prepared the door for unprecedented levels of knowledge distribution in human history. Thanks to social media platforms, consumers are creating and sharing more knowledge compare to before, Most of it is incorrect and has no bearing on the discussion. It's difficult to categorise a written work as misleading or disinformation using an algorithm. Even an expert in a given field must consider a variety of factors before deciding whether or not an item is true. For detecting spurious news, researchers recommend using a machine learning classification approach. Our research looks into different textual qualities that can be used to tell the difference between false and real content. We train a set of distinct machine learning algorithms using diverse integral approaches and evaluate their performance on real-world datasets using those properties. Our proposed ensemble learner method outperforms individual learners.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760833
N. Gayatri, B. Vamsi, P. Vidyullatha
Cotton is one of Ethiopia's most commercially important agricultural crops, although it faces a variety of challenges in the leaf area. The bulk of these limitations are caused by diseases and pests that are difficult to spot with the naked eye. Using the deep learning approach CNN, this research aimed at developing a model to improve the detection of cotton leaf disease by insects. Researchers have done this using common diseases of the cotton leaf and insects such as bacterial blight, spider mite, and leaf miner. K -variance verification method was used to classify the databases and improved the performance of the CNN model as a whole. In this study, approximately 2400 specimens of 600 images per class were present retrieved.
{"title":"Deep Learning LSTM Approach on Hyperspectral Images using Keras Framework","authors":"N. Gayatri, B. Vamsi, P. Vidyullatha","doi":"10.1109/ICSCDS53736.2022.9760833","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760833","url":null,"abstract":"Cotton is one of Ethiopia's most commercially important agricultural crops, although it faces a variety of challenges in the leaf area. The bulk of these limitations are caused by diseases and pests that are difficult to spot with the naked eye. Using the deep learning approach CNN, this research aimed at developing a model to improve the detection of cotton leaf disease by insects. Researchers have done this using common diseases of the cotton leaf and insects such as bacterial blight, spider mite, and leaf miner. K -variance verification method was used to classify the databases and improved the performance of the CNN model as a whole. In this study, approximately 2400 specimens of 600 images per class were present retrieved.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761047
Rosary Catherin Steffy A, S. Pushpa, M. K, Senbagakuzhalvaimozhi S, Varalakshmi P
Fourier transform is the conversion of signal from time domain to frequency domain. FFT is a modified version of DFT, where the computation is fast when compared to DFT. Performing FFT over finite field is the main task. Finite fields are fields which consists of finite elements. Performing FFT over finite field is called Galois field FFT. In this project, a method to implement the Galois field FFT without multipliers is done for three architectures namely the SIPO (Serial In Parallel Out) architecture, PISO (Parallel In Serial Out) architecture and optimized SIPO architecture. It is observed that a reduction in area of 42% in 'SIPO and PISO architectures' and 50% reduction in area in ‘optimized SIPO architecture’ is achieved on implementing multiplier less design by replacing the wrap around carry addition with XOR multiplexer full adder instead of conventional full adder.
{"title":"Area Optimized Implementation of Galois Field Fourier Transform","authors":"Rosary Catherin Steffy A, S. Pushpa, M. K, Senbagakuzhalvaimozhi S, Varalakshmi P","doi":"10.1109/ICSCDS53736.2022.9761047","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761047","url":null,"abstract":"Fourier transform is the conversion of signal from time domain to frequency domain. FFT is a modified version of DFT, where the computation is fast when compared to DFT. Performing FFT over finite field is the main task. Finite fields are fields which consists of finite elements. Performing FFT over finite field is called Galois field FFT. In this project, a method to implement the Galois field FFT without multipliers is done for three architectures namely the SIPO (Serial In Parallel Out) architecture, PISO (Parallel In Serial Out) architecture and optimized SIPO architecture. It is observed that a reduction in area of 42% in 'SIPO and PISO architectures' and 50% reduction in area in ‘optimized SIPO architecture’ is achieved on implementing multiplier less design by replacing the wrap around carry addition with XOR multiplexer full adder instead of conventional full adder.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761017
X. Zhang
Design of smart cheerleading competition assistant evaluation system with big data and information retrieval sorting algorithm is studied in the paper. The information retrieval and sorting method has well attracted more and more researchers' attention in recent years because of its better retrieval speed and lower storage cost. Its core idea is to transform the feature vector in the high-dimensional space into the Hamming space. low dimensional. For a data sequence a, sorting refers to arranging all data in a sequence from small to large, and then determining the position of any data in a in the sequence. With this theoretical basis, the smart cheerleading competition assistant evaluation system is implemented. For the efficient analysis, the combination pattern is integrated, and the UI is implemented. Through the experiment, the system details are demonstrated.
{"title":"Design of Smart Cheerleading Competition Assistant Evaluation System with Big Data and Information Retrieval Sorting Algorithm","authors":"X. Zhang","doi":"10.1109/ICSCDS53736.2022.9761017","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761017","url":null,"abstract":"Design of smart cheerleading competition assistant evaluation system with big data and information retrieval sorting algorithm is studied in the paper. The information retrieval and sorting method has well attracted more and more researchers' attention in recent years because of its better retrieval speed and lower storage cost. Its core idea is to transform the feature vector in the high-dimensional space into the Hamming space. low dimensional. For a data sequence a, sorting refers to arranging all data in a sequence from small to large, and then determining the position of any data in a in the sequence. With this theoretical basis, the smart cheerleading competition assistant evaluation system is implemented. For the efficient analysis, the combination pattern is integrated, and the UI is implemented. Through the experiment, the system details are demonstrated.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126870718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761003
P. H. Babu, P. Yalla
In Industry 4.0, Deep Learning techniques have become an important research tool in many area namely healthcare, automobiles, video analysis, audio analytics, software systems etc. In recent years, many research are performed in software analysis using modern technologies. CrosLSim, SimMax, and atrpos models are used to review the software similarity detection techniques for different software systems. The existing models for similarity detection are not efficient to be used in major software projects. In this paper, the Techvar-DNN system which performs enhanced Probability, maintainability, testability, and reusability has been proposed. When compared with other methods namely Random Forest and Support vector machines, the proposed system provides increased recall, a smaller function size, and more efficient computing. Moreover, the proposed model results show better F-measure, precision and recall to improve the software similarity detection in a more efficient manner.
{"title":"Techvar: Classification of Similarity in Software Detection Model using Deep Learning","authors":"P. H. Babu, P. Yalla","doi":"10.1109/ICSCDS53736.2022.9761003","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761003","url":null,"abstract":"In Industry 4.0, Deep Learning techniques have become an important research tool in many area namely healthcare, automobiles, video analysis, audio analytics, software systems etc. In recent years, many research are performed in software analysis using modern technologies. CrosLSim, SimMax, and atrpos models are used to review the software similarity detection techniques for different software systems. The existing models for similarity detection are not efficient to be used in major software projects. In this paper, the Techvar-DNN system which performs enhanced Probability, maintainability, testability, and reusability has been proposed. When compared with other methods namely Random Forest and Support vector machines, the proposed system provides increased recall, a smaller function size, and more efficient computing. Moreover, the proposed model results show better F-measure, precision and recall to improve the software similarity detection in a more efficient manner.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760816
S. Sandhiyaa, C. Gomathy
The Underwater Wireless Sensor Network (UWSN) is a new communication approach for exploring deserted and complicated seas. Furthermore, UWSNs vary considerably from field wireless communications and current small-scale underwater acoustics platforms in terms of propagation latency, bobbing packet forwarding, and restricted Underwater acoustic connection bandwidth (LANs). Because of the impacts of the underwater environments, the changing nature of the conduit for acoustical, radio waves with different frequencies, and electro-optic waves, and the severe underwater noise circumstances, designing a scheduling algorithm is a difficult challenge. This paper discusses the different difficulties that arise while develoing routing algorithms and covers the most prevalent network parameters for UWSNs, as well as their benefits and drawbacks. The scheduling algorithms are further grouped into four subgroups: region segmentation, cluster, and coordinated schemes. The effectiveness of these technologies is addressed in terms of greenhouse gas emissions, network longevity, latency, dependability, and telecommunication running costs, among other network characteristics. To a broad range of security risks and unwanted assaults. This article presents an overview of UWSN risks, difficulties, and potential vulnerabilities. Comparison of VBF and DBR protocol energy consumption, End-to-end delay, Packet delivery ratio by using NS-3 simulator.
{"title":"Performance Analysis of Routing Protocol in Underwater Wireless Sensor Network","authors":"S. Sandhiyaa, C. Gomathy","doi":"10.1109/ICSCDS53736.2022.9760816","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760816","url":null,"abstract":"The Underwater Wireless Sensor Network (UWSN) is a new communication approach for exploring deserted and complicated seas. Furthermore, UWSNs vary considerably from field wireless communications and current small-scale underwater acoustics platforms in terms of propagation latency, bobbing packet forwarding, and restricted Underwater acoustic connection bandwidth (LANs). Because of the impacts of the underwater environments, the changing nature of the conduit for acoustical, radio waves with different frequencies, and electro-optic waves, and the severe underwater noise circumstances, designing a scheduling algorithm is a difficult challenge. This paper discusses the different difficulties that arise while develoing routing algorithms and covers the most prevalent network parameters for UWSNs, as well as their benefits and drawbacks. The scheduling algorithms are further grouped into four subgroups: region segmentation, cluster, and coordinated schemes. The effectiveness of these technologies is addressed in terms of greenhouse gas emissions, network longevity, latency, dependability, and telecommunication running costs, among other network characteristics. To a broad range of security risks and unwanted assaults. This article presents an overview of UWSN risks, difficulties, and potential vulnerabilities. Comparison of VBF and DBR protocol energy consumption, End-to-end delay, Packet delivery ratio by using NS-3 simulator.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114198924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760838
Yijie Du
In this paper, the realization of computer intensive network technology in symfony architecture of student psychological mutual aid platform is studied. For the designed system, the improvement of the safety issues is considered at first. Both symmetric and asymmetric data encryption algorithms have their own advantages and disadvantages. Therefore, in the process of applying data encryption algorithms, users need to conduct regular security monitoring of the results of data encryption operations according to the general actual security monitoring conditions of the local computer network topology as an examination. Then, considering the Symfony atchitectyure, the MVC structure is applied for the systematic design. Furthermore, psychological mutual aid platform is implemented. Through the experimental testing, the verification has shown that the designed platform is efficient.
{"title":"Realization of Computer Intensive Network Technology in Symfony Architecture of Student Psychological Mutual Aid Platform","authors":"Yijie Du","doi":"10.1109/ICSCDS53736.2022.9760838","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760838","url":null,"abstract":"In this paper, the realization of computer intensive network technology in symfony architecture of student psychological mutual aid platform is studied. For the designed system, the improvement of the safety issues is considered at first. Both symmetric and asymmetric data encryption algorithms have their own advantages and disadvantages. Therefore, in the process of applying data encryption algorithms, users need to conduct regular security monitoring of the results of data encryption operations according to the general actual security monitoring conditions of the local computer network topology as an examination. Then, considering the Symfony atchitectyure, the MVC structure is applied for the systematic design. Furthermore, psychological mutual aid platform is implemented. Through the experimental testing, the verification has shown that the designed platform is efficient.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760759
Wei Li
Aiming at the problem that the data index of the distributed storage system in the cloud computing environment does not support complex queries, a multi-dimensional data indexing mechanism, M-Index, is proposed, which uses pyramid technology to describe the multi-dimensional metadata of the data as a one-dimensional index. This is the first time on this basis. The concept of prefix binary tree is proposed, and one-dimensional index and the prefix of PBT effective node are extracted as the primary key of data in the storage system. This paper proposes a new multi-dimensional cloud data indexing scheme based on UB tree: Cloud UB. This scheme first uses the Z curve to reduce the dimensionality of the multi-dimensional space, and then divides the multi-dimensional space into Z regions along the Z curve.
{"title":"Panel Data Fusion of Distributed Multi-Dimensional Data Index Strategy in Cloud Computing Environment","authors":"Wei Li","doi":"10.1109/ICSCDS53736.2022.9760759","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760759","url":null,"abstract":"Aiming at the problem that the data index of the distributed storage system in the cloud computing environment does not support complex queries, a multi-dimensional data indexing mechanism, M-Index, is proposed, which uses pyramid technology to describe the multi-dimensional metadata of the data as a one-dimensional index. This is the first time on this basis. The concept of prefix binary tree is proposed, and one-dimensional index and the prefix of PBT effective node are extracted as the primary key of data in the storage system. This paper proposes a new multi-dimensional cloud data indexing scheme based on UB tree: Cloud UB. This scheme first uses the Z curve to reduce the dimensionality of the multi-dimensional space, and then divides the multi-dimensional space into Z regions along the Z curve.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}