A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Maria Antoniate Martin, V.
- A Survey on Visual Secret Sharing Scheme
Authors
1 Bharathiar University, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts College, Affiliated to Bharathiar University, Udumalpet, Tirupur, Tamil Nadu, IN
3 St. Joseph's College, IN
Source
Software Engineering, Vol 8, No 4 (2016), Pagination: 91-96Abstract
The formatting requirements for Visual cryptographic technique is used for secure communication, various secrets and multimedia information are transmitted over the internet and suitable techniques are required to prevent form the illegal usage of information. This paper provides the survey of various visual cryptographic schemes based on their performance. This paper focuses on various threshold schemes like N, (2, N),(3,N), (K,K) and (K,N). In order to improve the security issue over the communication channel meaningful shares are used. The visual cryptography for binary pictures is also discussed. Other performance measures such as pixel expansion, contrast, accuracy is discussed in this paper.
Keywords
Cryptography, Visual Cryptography, Visual Secret Sharing, Pixel Expansion, Contrast and Encoding.- An Association between Trait Emotional Intelligence and Personality Trait Based on Students Performance
Authors
1 Department of Information Technology, St. Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, IN
2 Department of Computer Science, St. Joseph's College (Autonomous), Tiruchirappalli, Tamil Nadu, IN
Source
Software Engineering, Vol 4, No 3 (2012), Pagination: 92-97Abstract
Data mining is used to extract meaningful patterns, interesting patterns from databases or repositories. The aim of this study is to find the relation between the personality of an individual and the trait emotional intelligence ('trait EI') based on the academic performance of the individual, this study also involves of how a student will perform academically in accordance to the factors like locality and gender. Using the Trait Emotional Intelligence Questionnaire (TEIQue) the students were divided into five trait emotional intelligence (EI) variables (wellbeing, self-control, emotionality, sociability, and global trait EI), then their personalities were categorized under extraversion, neuroticism and psychoticism using the Eynseck Personality Questionnaire (EPQ). Data mining techniques, Association Rule Mining and Multilayer Perceptron were applied to the resultant data set. This study was conducted to provideinsight of how the students will perform academically and non-academically, based on their TEI and Personality Traits. This analysis can be used to help the students know about their standing and what could be done to improve themselves. It was found that students who scored high in trait EI and those who had high personality trait scores performed well academically, like wise students from rural areas and male students who had high Trait EI scores achieved well academically.
Keywords
Data Mining, Association Rule Mining, TEI, Personality, Multilayer Perceptron, EPQ, TEIQue.- A Survey on Various Techniques for Sentiment Analysis and Opinion Mining
Authors
1 Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore-641046, Tamil Nadu, IN
2 Department of Computer Science, H.H. The Rajah's College, Pudukkottai-622001, Tamil Nadu, IN
3 Department of Computer Science, St. Joseph's College, Trichy-620002, IN
Source
Data Mining and Knowledge Engineering, Vol 8, No 3 (2016), Pagination: 78-82Abstract
Sentiment analysis could be a range of language process for chase the mood of the general public a few unambiguous product or topic. Sentiment analysis, which is additionally called as opinion mining, involves in building a system to gather and examine opinions regarding the merchandise created in journal posts, comments, reviews or tweets. Here in this paper various sentiment analysis techniques are reviewed. The review sites mentioned for the awareness and various author's proposals are tabulated.Keywords
Sentiment Analysis, Opinion Mining, Joint Segmentation, NLP, POS Tagging.- A Survey on Security Challenges in Cloud Computing
Authors
1 Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore, Tamil Nadu 641046, IN
2 Department of Computer Science, H.H. The Rajah’s College, Pudukkottai, TamilNadu, IN
3 Department of Computer Science, St. Joseph’s College, Trichy – 620 002, IN
Source
Software Engineering, Vol 9, No 4 (2017), Pagination: 78-82Abstract
Cloud computing is the today latest technology in the IT world. It is the interesting technology which provides the services and resources through the internet. These services are easy to access with pay per use. The services are maintained from the data centers where the data is stored the cloud providers such that Google, Amazon….etc. Number of users used the cloud platform to store their data, so that storage security is very important. Lack of security is the one of the major issue in the cloud environment. Resources are delivered to the client through the internet from the third party provider. Using third party to avoid the unauthorized access to store the data on cloud. In this paper we discuss what are the security problems and risks in the cloud, which helps to better security from the cloud environment.