Please use this identifier to cite or link to this item: http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5446
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDr. B. Herawan, Hayadi-
dc.date.accessioned2022-11-28T08:43:23Z-
dc.date.available2022-11-28T08:43:23Z-
dc.date.issued2020-09-01-
dc.identifier.issn2456-1983-
dc.identifier.urihttp://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5446-
dc.descriptionThe focus of Artificial Intelligence (AI) is now at the heart of the Industry of cybersecurity. AI is a word that exceeds these relatively Days, but it applies to a few approaches that can be very useful. Precious for protection. It requires machine learning, Algorithms that can recognize threats and respond to them as It'll happen. They can predict whether the incoming data is likely to be safe or malicious. Many assaults are occurring these days, Uh, not new. These attacks have happened with some other attacks. Before, people in several other locations. Additionally, if we build a database that collects all the data ever generated gets existed and feeds it to neural networks, it is possible to attack Prevented although it takes place. In classification one, we can look at the learning styles and preferences to going to have to decide whether it is malicious or not.en_US
dc.description.abstractThe science of extracting patterns, trends, and actionable data analysis detail of large data sets. The growing existence of data in different county’s servers with structured, semi-structured, and unstructured data formats, such as the data. The demands of these are not met by conventional IT infrastructure, a modern landscape of "Data Analysis." For these reasons, several companies are turning to as a possible solution to this unmet commercial business, Hadoop (opensource projects). The amount of data collected by organizations, especially unstructured data, as businesses burst, Hadoop is increasingly emerging as one of the primary alternatives to store and execute operations on that data. The secondary question of data analysis is defense, the rapid increase in internet use, the dramatic shift in acceptance of people who use social media apps that allow users to generate content freely and intensify the already enormous amount of the site. In today's firms, there are a few stuff to bear in mind when starting innovation ventures for big data and analytics. In the business environment, the need for secure data analytics tools is mandatory. In the previous paper, they implemented a high profile dataset using the encryption technique. Using only the encryption method, cannot secure data very highly. There is a chance of knowing the original data to the third party. To reduce the above issues, the paper introduces a new technology called “Artificial intelligence". Using this new technology, paper can achieve more security for data sets. Using both encryption and decryption models in artificial intelligence can solve the drawback in an existing paper. This will provide the data with either a significant degree of authentication analyzed to ever be. The provision of data analytics is pursued with attribute-based restricts Data extraction allows enabled. This model will work better than the present model. In both security and sensitive economic restructuring, data analytical tools.en_US
dc.publisherMelange Publicationen_US
dc.relation.ispartofseriesVol 1;-
dc.subjectData analysis, Hadoop, big data, dataset, encryption, artificial intelligence, and decryption.en_US
dc.titleData Encryption and Decryption Techniques for a High Secure Dataset using Artificial Intelligenceen_US
Appears in Collections:Untitled



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.