504 research outputs found

    Data Hiding using Emoticons

    Get PDF
    In 21st century Digital communication has become a very essential part of day to day life of every human. It has continuously evolved over the year. It has made communication easier. People can communicate anywhere and anytime large amount of data is transmitted every day, every second. Here data security comes into picture. Each and every individual want their data to be secure and doesnā€™t want it to be used in an unauthorized way. There are various techniques to provide data security such as cryptography and steganography. Cryptography is the science of encompassing the principles and methods of transforming a plain text message into one that is unintelligible and then, that message back to its original form. Steganography is the art and science of hiding information by embedding messages into other messages. Steganography means ā€œCovered Writingā€ in Greek. Both the techniques have their own limitations; to overcome those limitations, here in this paper, we are combining both the techniques to enhance data security

    Review Paper - High Utility Item sets Mining on Incremental Transactions using UP-Growth and UP-Growth+ Algorithm

    Get PDF
    One of the important research area in data mining is high utility pattern mining. Discovering itemsets with high utility like profit from database is known as high utility itemset mining. There are number of existing algorithms have been work on this issue. Some of them incurs problem of generating large number of candidate itemsets. This leads to degrade the performance of mining in case of execution time and space. In this paper we have focus on UP-Growth and UP-Growth+ algorithm which overcomes this limitation. This technique uses tree based data structure, UP-Tree for generating candidate itemsets with two scan of database. In this paper we extend the functionality of these algorithms on incremental database.

    Sistem Pembiayaan Islamic Bank Of Thailand Cabang Provinsi Yala Thailand Selatan Menurut Perspektif Hukum Ekonomi Syariah

    Get PDF
    Islamic bank of Thailand adalah salah satu lembaga keuangan yang usaha pokoknya memberikan pembiayaan dan jasa lain dalam lalu lintas pembayaran uang yang beroperasi dengan prinsip-prinsip syariat, Namun masyarakat awam banyak yang beranggapan bahwa bank syariah itu sesuatu yang kaku dan menakutkan sehingga kurang mengalami perkembangan yang baik atau kurang diminati masyarakat. Berdasarkan uraian tersebut peneliti tertarik untuk meneliti dan menganalisa bagaimana sistem pembiayaan yang sesungguhnya menurut hukum Islam. Tujuan dari penelitian ini adalah sebagai berikut: 1) Mendeskripsikan sistem pembiayaan Islamic Bank of Thailand cabang provinsiYala Thailand Selatan. 2) Menjelaskan hukum pelaksanaan system pembiayaan Islamic Bank of Thailand menurut perspektif hukum ekonomi syariah. Penelitian ini adalah penelitian lapangan (field research ) dengan pendektan deskriptif kualitatif. Metode yang digunakan dalam pengumpulan data adalah dengan cara wawancara dan dokumentasi. Analisis yang digunakan adalah metode Deduktif dan metode Induktif. Berdasarkan penelitian sistem pembiayaan di Islamic Bank of Thailand ada 4 aplikasi yaitu, 1) Produk Pembiayaan Konsumen(Islamic Consumer Finance), 2)Produk Pinjaman Modal Usaha(Islamic Commercial Finance),3)Produk Pembiayaan Pendidikan, dan 4)Produk Pinjaman Keuangan Mikro(Islamic Microfinance Product). Akad-akad yang digunakan oleh Islamic bank of Thailand adalah akad mudĢ£aĢ„rabah, muraĢ„bahĢ£ah, musyarakah, ijaĢ„rah, qardĢ£ dan Ar-Rahn yang dapat dikatakan sebagai akad-akad yang sah sesuai dengan hukum Islam

    Use of Social Media Platforms for Dissemination of Information and Creating Awareness about Library Resources and Services among Students in Lagos State University, Nigeria

    Get PDF
    Social media platforms are a combination of internet applications that build on the technological foundations of Web 2.0, which allow the creation and exchange of user-generated content. Social media platforms offer instant messages which are preferred in the contemporary world by students. The purpose of libraries for using social media platforms enhance sharing of news, market their services, provide instructions for information literacy, provide information about library resources and services and for feedback from the users. Hence this study elucidated the use of social media platforms for the dissemination of information and creating awareness about library resources and services among students in Lagos State University, Nigeria. A survey research design was used for the study. The multi-stage sampling procedure was used to select 200 respondents for the study. Data were collected with the use of a structured questionnaire of the respondents. Frequency count, percentage, mean standard deviation, were used to analyse the data. Results review that YouTube = (3.70), WhatsApp = x (3.58), Facebook = (3.15), are the major social media platforms that are available and relevant to academic libraries. Also, shows that Social media provides a platform for lecturers to create chat rooms, forums and groups to expand classroom discussion to post assignments, tests and quizzes = (3.80), social media is useful for getting information = (3.80) and Social media provides Forum for Feedback = (3.74) are the major benefit of social media platform to users. The finding also shows that lack of internet access = (3.57), Network problem = (3.54), Unreliable power supply= (3.50) are the major challenges encountered in the use of social platforms among librarians and library users. In conclusion, social media are communities of people who share interests, activities and provide directions for users to interact. This study recommended that the tertiary institutions should recognise social media platforms that are used among students and librarians for education purposes

    18. Feeding Selectivity of Tetrahymena pyriformis with the Use of Charged Latex Beads

    Get PDF
    Tetrahymena pyriformis is a single-cellular alveolate that uses cilia to filter-feed on small particles. The fact that T. pyriformis ingests non-nutritive material, such as latex beads and carbon particles, along with nutritional ones, led to the hypothesis that the organism feeds non-selectively. One recent article, however, calls this hypothesis into question. We sought to investigate feeding preference in Tetrahymena by determining its rate of phagocytosis on three types of 3 mm polystyrene beads, each at two concentrations. Beads had either a neutral surface, one that was negatively-charged through carboxylation, or a positively-charged, aminated surface. To determine feeding rate, we mixed one type of bead with Tetrahymena and made slides from that mixture at three time points. Since beads accumulate in T. pyriformis over time, the slope of the best-fit line provides a measure of feeding rate. Thirty such measures were obtained for each type of bead and concentration. ANOVA revealed that both bead-type and concentration had significant effects on feeding rate, but there was no hint of an interaction. Tetrahymena fed 54% more rapidly on positively-charged beads than on the ones that were negatively charged. The rate of feeding on neutral beads fell in between the other two. Our study provides new evidence that Tetrahymena feeds selectively. Since surface charge plays a role, electrostatic interactions, as often occur when receptors bind ligands, appear to underlie that selectivity

    Relationship Between Sense of Belonging and Academic Achievement: Effect of Involvement in a Sports Team

    Get PDF
    This study investigated whether a correlation existed between involvement in a university sports team and studentsā€™ sense of belonging and academic achievement. A total of 35 participants were investigated. The study group was comprised of 12 female undergraduate students completing a first year introductory course who were members of the Western All-Girl cheerleading team and the comparison group included 23 female undergraduate students enrolled in Psychology 1000 at Brescia University College who were not members of a university sports team. Participants completed a total of four questionnaires which measured the following variables: sense of belonging, academic precursors and academic achievement. The results of a Pearson correlation indicated that there was a non-significant relationship between studentsā€™ academic achievement and the following variables: sense of belonging-psychological experiences, sense of belonging-antecedents, academic procrastination and involvement in a sports team

    Review Paper-Social networking with protecting sensitive labels in data Anonymization

    Get PDF
    The use of social network sites goes on increasing such as facebook, twitter, linkedin, live journal social network and wiki vote network. By using this, users find that they can obtain more and more useful information such as the user performance, private growth, dispersal of disease etc. It is also important that users private information should not get disclose. Thus, Now a days it is important to protect users privacy and utilization of social network data are challenging. Most of developer developed privacy models such as K-anonymity for protecting node or vertex reidentification in structure information. Users privacy models get forced by other user, if a group of node largely share the same sensitive labels then other users easily find out oneā€™s data ,so that structure anonymization method is not purely protected. There are some previous approaches such as edge editing or node clustering .Here structural information as well as sensitive labels of individuals get considered using K-degree l-deversityanonymity model. The new approach in anonymization methodology is adding noise nodes. By considering the least distortion to graph properties,the development of new algorithm using noise nodes into original graph. Most important it will provide an analysis of no.of noise nodes added and their impact on important graph property

    Sentimate Analysis For Web Product Ranking

    Get PDF
    Now a days web access is very important part of our day-to-day life. Everyone can do anything by using internet. Peoples are doing online shopping increasingly. Manufacturer sells their products through internet and users can buy anything from internet and also user has a permission to express their opinions. When user wants to buy something from internet they can read all the reviews of other peoples so that they can decide either this product is good or not. However it is impossible for customer to read all the product reviews. Therefore it is need of customer to summarize pros and cons so that customers can buy a product easily. In this paper we present a web product ranking system by using sentimate analysis. When user passes a query about any product he/she get back the ranking results. In this system we have also considered the phrases like either-or, not only-but also and so on. So this is practical and ranking results are interesting
    • ā€¦
    corecore