A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sujatha, D.
- Plywood from Plantation Species - Paraserienthes odoratissima and Paraserienthes lebbek
Authors
Source
Indian Forester, Vol 129, No 11 (2003), Pagination: 1370-1378Abstract
Plywood industry presently utilizes lesser known hardwoods and plantation timbers for the manufacture of plywood. In continuation of the studies of these. species for plywood manufacture, an investigation was undertaken to find out the peeling, drying and gluing characteristics of Paraserienthes odoratissima Benth. and Paraserienthes lebbek Benth. and provide necessary information on optimum processing conditions for plywood manufacture. Studies showed that type B surface veneers could be peeled with suitable modifications in lathe settings. Drying of the veneers was possible without major drying degrades. Gluing characteristics of the species were good with both Urea formaldehyde and Phenol formaldehyde resin adhesives for making MR grade and BWR grade plywood respectively.- Implementing Novel Cryptography Technique in Image Encryption and Secure Data Hiding
Authors
1 Anna University, Madurai, IN
Source
Digital Image Processing, Vol 6, No 5 (2014), Pagination: 242-245Abstract
This work proposes a Secure and authenticated discrete reversible data hiding in images deals with security and authentication. In the first phase, a content owner encrypts the original image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additional data. With an encrypted image containing additional data, if a receiver has the data hiding key, receiver can extract the additional data though receiver does not know the image content. If the receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the original content without any error. In order to achieve authentication AES algorithm is being used. And also compare the efficiency using PSNR and MSE.
Keywords
Image Encryption, Data Embedding, Image Extraction, Reversible Data Hiding.- Pattern Discovery:An Inference Analysis Approach
Authors
1 Aurora Engineering College, IN
2 CSE Department, Aurora's Technological and Research Institute, IN
Source
Data Mining and Knowledge Engineering, Vol 3, No 15 (2011), Pagination: 927-933Abstract
Data mining is a process of discovering knowledge of interest for the users from various information repositories like databases and data warehouses by extracting interesting data patterns that represent knowledge. These interesting data patterns are obtained by evaluating the existing data patterns based on some interestingness measures. This data mining process is carried out by using several data mining functionalities among which Association Rule Mining is most commonly used to find interesting data patterns based on the association relationship among various data items of a data set. This association relation is represented by an association rule, which is a data pattern. To evaluate the interestingness of an association rule, two interestingness measures called as support and confidence are used whose threshold values are set by domain experts. These threshold values called as minimum support and minimum confidence which represent domain knowledge. These threshold values cannot be always accurate, which leads to loss of interesting association rules and also affects the quality of association rules discovered. This leads a user to take wrong decisions.To avoid this problem, we need to move from this support-confidence framework for a process which can find interesting association rules based on their logical correctness. An association rule is logically correct only when it satisfies a logical principle called Equivalence, such rules are called as coherent rules. As these coherent rules are discovered without using domain knowledge, no interesting association rules are lost. Though this process is accurate, it is a time consuming task to check the logical correctness of every association rule. So we need to use a technique called Pruning, through which we can get accurate results by consuming less time.
Keywords
Data Mining, Association Rules, Coherent Rule, Equivalence, Pruning.- A Study on Work from Home in the Indian Context
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 12 (2014), Pagination:Abstract
Be it travelling through the overcrowded roads of the metropolitan cities which has become more of a hazardous part of every employees work schedules or being part of the family, which has become a dream for most of the employees in the IT sector, in today’s world employees and employers first and last task of the day is travelling. Employers and employees are exhausted even before reaching their office, which makes them start their work with a tired note. The concept of work from home emerged as a solution to this as well as to the problem of maintaining good work life balance. As many organizations have allowed their employees to take the option of WFM some organizations are still in the dilemma as to will WFH increase or decrease productivity and some organizations have put a ban on work from home as face time is now seen as a crucial part of the work environment. This study enables us to understand the employee perception on work from home in the Indian IT sector and the analyses the job satisfaction and the performance levels of the employees adopting work from home. The study shows WFH leads to lesser satisfaction levels but increased performance level among the employees.