• Nenhum resultado encontrado

[PDF] Top 20 A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

Has 10000 "A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING" found on our website. Below are the top 20 most common "A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING".

A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

... based on reducing the support and confidence of rules that specify how significant they ...constraint on the algorithms proposed is that the changes in the database introduced by the hiding process should ... See full document

13

A Hybrid Approach to Privacy Preserving in Association Rules Mining

A Hybrid Approach to Privacy Preserving in Association Rules Mining

... dependent on the ordering of transactions, gives a different result with reordering transactions in the database, needs sorting of the database after each item is deleted and is not suitable for large ... See full document

4

Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters

Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters

... between privacy preservation and utility loss has been extensively studied in privacy preserving data ...to privacy concerns. In this paper, we focus on the scenario where distortion ... See full document

21

Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

... the privacy by perturbing the original data using randomized data perturbation privacy preserving data mining technique and then constructing a decision tree classifier on the perturbed ... See full document

8

Survey on Mining Order-Preserving Sub Matrices

Survey on Mining Order-Preserving Sub Matrices

... their survey [5]some bi-clustering structures defined by: single bi- cluster, exclusive rows bi-clusters, exclusive columns bi-clusters, non overlapping bi-clusters with tree arrangement, and arbitrarily ... See full document

6

Study on the Customer targeting using Association Rule Mining

Study on the Customer targeting using Association Rule Mining

... Data mining is one of the widest area where many researches takes place to mine desired and hidden ...follows association rule concept to group the required data ...of mining time can be ... See full document

3

A Recent Review on XML data mining and FFP

A Recent Review on XML data mining and FFP

... Data Mining is referred to as Knowledge Discovery in ...data on the web and bioinformatics databases often lack such a regular structure called semi- ...This survey papers gives a brief survey ... See full document

6

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

... Data mining is the process of identifying patterns from large amount of ...data. Association rule mining aims to discover dependency relationships across ...data mining techniques to ... See full document

7

Privacy in Data Publishing for Tailored Recommendation
Scenarios

Privacy in Data Publishing for Tailored Recommendation Scenarios

... addressing privacy in high-dimensional ...the privacy problem in a way that allows them to relate some amount of auxiliary information with the probability of sensitive attribute disclosure, and propose a ... See full document

27

Multi-objective Numeric Association Rules Mining via Ant Colony Optimization for Continuous Domains without Specifying Minimum Support and Minimum Confidence

Multi-objective Numeric Association Rules Mining via Ant Colony Optimization for Continuous Domains without Specifying Minimum Support and Minimum Confidence

... the rule, found by previous works and the proposed ...Genetic Association Rule Mining algorithm [24] and SA [25] find directly numeric association rules without finding frequent ... See full document

8

A Privacy Preserving Approach to Analyze Security in  VoIPSystem

A Privacy Preserving Approach to Analyze Security in VoIPSystem

... based on timing-based traffic analysis attacks that can be used to reconstruct the communication on end-to-end voipsystems by taking advantage of the reduction or suppression of the generation of traffic ... See full document

7

An Effective Data Transformation Approach for Privacy Preserving Clustering

An Effective Data Transformation Approach for Privacy Preserving Clustering

... The privacy becomes worst when they decided to have secondary usage of data when they are unaware of behind the scenes use of data mining techniques [11] ...reside on thousands of file servers ... See full document

7

Finding Association Rules through Efficient  Knowledge Management Technique

Finding Association Rules through Efficient Knowledge Management Technique

... couple association rule algorithm with the relational database in a number of ...data mining application process space is outside the database process ... See full document

4

Association Technique based on Classification for Classifying Microcalcification and Mass in Mammogram

Association Technique based on Classification for Classifying Microcalcification and Mass in Mammogram

... One of the effective algorithm of applying association rules for classification is the Classification based on Predictive Association Rules (CPAR) [6]. The algorithm CPAR is started by reading the ... See full document

8

On the security of an anonymous roaming protocol in UMTS mobile networks

On the security of an anonymous roaming protocol in UMTS mobile networks

... overhead on the side of HS due to the computation of w , the computation cost of FS or U is significantly reduced since both FS and U omit several costly operations (including bilinear map and ... See full document

8

: Brapci ::

: Brapci ::

... based on a validity assumption for classification schemes like the IPC (International Patent Classification), convergence can be found in patent data through growing overlap among IPCs and through an increase in ... See full document

16

An association rule mining-based framework for understanding lifestyle risk behaviors.

An association rule mining-based framework for understanding lifestyle risk behaviors.

... the association structure of 7 binary health risk behaviors, we would need to analyze a contingency table with 262 7 possible ...simple association rules between three or more ... See full document

9

Privacy preserving approach using encrypted cloud database

Privacy preserving approach using encrypted cloud database

... :H SURSRVH DQ LQQRYDWLYH DUFKLWHFWXUH WKDW JXDUDQWHHV FRQILGHQWLDOLW\ RI GDWD VWRUHG LQ SXEOLF FORXG GDWDEDVHV 8QOLNHVWDWHRIWKHDUWDSSURDFKHVRXUVROXWLRQGRHVQRWUHO\RQDQLQWHUPHGLDWHSUR[\WKD[r] ... See full document

7

A New Approach to Find Predictor of Software Fault Using Association Rule Mining

A New Approach to Find Predictor of Software Fault Using Association Rule Mining

... using association mining [19- ...pattern mining using Apriori algorithm and introduces the concept of F-measure by using the notion of correlation ...i.e., association rule is generated ... See full document

14

Image Mining for Mammogram Classification by Association Rule Using Statistical and GLCM features

Image Mining for Mammogram Classification by Association Rule Using Statistical and GLCM features

... image mining technique deals with the extraction of implicit knowledge and image with data relationship or other patterns not explicitly stored in the ...data mining to image ...image mining in the ... See full document

10

Show all 10000 documents...