• Nenhum resultado encontrado

[PDF] Top 20 A Hybrid Approach to Privacy Preserving in Association Rules Mining

Has 10000 "A Hybrid Approach to Privacy Preserving in Association Rules Mining" found on our website. Below are the top 20 most common "A Hybrid Approach to Privacy Preserving in Association Rules Mining".

A Hybrid Approach to Privacy Preserving in Association Rules Mining

A Hybrid Approach to Privacy Preserving in Association Rules Mining

... data mining technique aims to detect useful rules and relationships of database items for which standard algorithms are used such as Apriori and ...detected rules are divided into two groups: ... See full document

4

Finding Association Rules through Efficient  Knowledge Management Technique

Finding Association Rules through Efficient Knowledge Management Technique

... topics in databases is Data Mining, to find, extract and mine the useful information from ...databases. In case of updating transactions in the database the already discovered knowledge ... See full document

4

An Efficient Approach to Prune Mined Association Rules in Large Databases

An Efficient Approach to Prune Mined Association Rules in Large Databases

... data mining, association rule learning is a popular and well researched method for discovering interesting relations between variables in large ...databases. Association rule Mining ... See full document

7

Mining rare associations between biological ontologies.

Mining rare associations between biological ontologies.

... for mining rare ARs, can treat hierarchically organized data in an appropriate ...manner. In such a case, the redundancy of ARs is caused to a large extent by the hierarchical structure itself ... See full document

13

A Novel Texture Classification Procedure by using Association Rules

A Novel Texture Classification Procedure by using Association Rules

... using association rules for texture image classification is ...variations in the structure and intensity values of the corresponding ...of association rule approach to capture ... See full document

12

Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters

Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters

... preserved in the randomized ...multi-variate association measures studied in the data mining community are special cases of loglinear ...data mining tasks (e.g., association rule ... See full document

21

Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

... data mining method. The basic learning approach of decision tree is greedy algorithm, which use the recursive top-down approach of decision tree ...Quinlan in 1979 put forward a well-known ID3 ... See full document

8

An Effective Data Transformation Approach for Privacy Preserving Clustering

An Effective Data Transformation Approach for Privacy Preserving Clustering

... of hybrid data transformation methods introduced ensures privacy preservation in clustering analysis, notably on categorical ...attributes to meet privacy requirements, while ... See full document

7

Multi Agent System and an Approach for Association Rule Mining

Multi Agent System and an Approach for Association Rule Mining

... follows rules written in ...according to our ...limited to this, can have any characteristic according to type of modeling, these characteristics have been just taken as an ...example). ... See full document

6

A Recent Review on XML data mining and FFP

A Recent Review on XML data mining and FFP

... a) Association Rules Association rule mining is a process of mining data as a set of rules from a transactional database which support the minimum support and ...for ... See full document

6

A pragmatic approach on association rule mining and its effective utilization in large databases

A pragmatic approach on association rule mining and its effective utilization in large databases

... respect to minimum support and minimum confidence ...of association rules grow rapidly and when the frequent item- sets increase, more numbers of association rules are presented ... See full document

10

Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

... technique in recent years and this study uses this technique to mine association rules ...interesting association rules can be generated more ...novel approach which ... See full document

11

A New Approach to Find Predictor of Software Fault Using Association Rule Mining

A New Approach to Find Predictor of Software Fault Using Association Rule Mining

... conducted association rule mining and statistical analysis to see whether we could classify the Software module into Multinomial ...categorization. In Multinomial categorization, we ... See full document

14

A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining

A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining

... for mining association rules [10]; Atallah et al contributed to secure multiparty computation geometry, which are a base for routing and other network related problems ...solutions to ... See full document

5

Time-Saving Approach for Optimal Mining of Association Rules

Time-Saving Approach for Optimal Mining of Association Rules

... Abstract—Data mining is the process of analyzing data so as to get useful information to be exploited by ...users. Association rules is one of data mining techniques used ... See full document

7

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

... Data mining is a knowledge extracting process of analyzing data from different point of ...expressed in decision trees, clusters or association ...rules. Association rule mining ... See full document

7

investigation of source code mining using novel code mining parameter matrix: recent state of art

investigation of source code mining using novel code mining parameter matrix: recent state of art

...  Association Based Rule Mining Method: Use of Data Mining rules for establishing the correlation and prediction of software defects from the software matrices are also been proposed in ... See full document

10

A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING

... of rules that specify how significant they ...changes in the database introduced by the hiding process should be limited, in such a way that the information incurred by the process is ...an ... See full document

13

A Secure and Privacy Preserving Approach to Medical Data Mining Applications

A Secure and Privacy Preserving Approach to Medical Data Mining Applications

... lead to the inability to continue operations without a reset of the whole process or lead to another entity faking its identity as if it was the owner of the private ...appropriate to the RSA ... See full document

117

A Privacy Preserving Approach to Analyze Security in  VoIPSystem

A Privacy Preserving Approach to Analyze Security in VoIPSystem

... problem in which a sound pattern has to be recognized or classified into a category that represents a meaning to a ...broken in smaller more basic ...going to lower levels even more, we ... See full document

7

Show all 10000 documents...