scholarly journals An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites

2021 ◽  
Vol 26 (6) ◽  
pp. 515-522
Author(s):  
Vibhor Sharma ◽  
Shashi Bhushan ◽  
Bhim Singh Boahar ◽  
Pramod Kumar ◽  
Anuj Kumar
2020 ◽  
Vol 17 (11) ◽  
pp. 4902-4906
Author(s):  
Senduru Srinivasulu ◽  
Boppana Saandeep ◽  
Vatikutti Yuva ◽  
R. Jeberson Retna Raj ◽  
S. Gowri

Presently a days Predicting understudy execution turns out to be progressively productive because the procedure enormous content of information in instructive databases. Numerous examinations are utilizing this idea and region of execution is as yet expanding bigger various models understudy marks, participation, semester mark, grade focuses, situation, wellbeing, educational plan exercises, and so on. In late patterns the measure of information put away is growing quickly. The primary objective is to make an overview of “A savvy way to deal with foresee the understudy conduct and execution” To build up a model to anticipate understudy Behavior and execution. The understudy execution in training is a significant job in instructive conditions. The put away database contains understudy data to improve understudy viewpoint and conduct. This paper show patterns and sorts of dissect ought to be performed to improve the training process. We anticipated understudy subtleties and produce a report to the workforce and guardians. In light of the presentation, we offer answers to improve their exhibition. Foreseeing understudy execution turns out to be all the more testing because of the enormous volume of information in instructive databases. This paper additionally centers around how the anticipated data can be utilized to recognize the most significant qualities of determination in understudy information. We could improve understudy accomplishment and achievement more in an effective manner utilizing instructive information mining systems. It could carry the advantages and effects of understudy, teachers, and scholastic foundations.


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


2005 ◽  
Author(s):  
Shinichi Nakasuka ◽  
Takashi Eishima ◽  
Hironori Sahara ◽  
Yuya Nakamura ◽  
Yoshiki Sugawara ◽  
...  

2014 ◽  
Author(s):  
Binyang Li ◽  
Lanjun Zhou ◽  
Zhongyu Wei ◽  
Kam-fai Wong ◽  
Ruifeng Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document