A Review on K-Anonymization Techniques
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 6
Abstract
Securing information protection is an imperative issue in microdata distribution. Anonymity strategies regularly mean to ensure singular security, with insignificant effect on the nature of the discharged information. As of late, a couple of models are acquainted with guarantee the security ensuring or potentially to diminish the data misfortune to such an extent as could be allowed. That is, they additionally enhance the adaptability of the anonymous system to make it all the more near reality, and after that to meet the various needs of the general population. Different proposition and calculations have been intended for them in the meantime. In this paper a review of anonymity techniques for privacy preserving. In this paper, the discussion about the anonymity models, the significant execution ways and the techniques of anonymity algorithm, and also analyzed their strength and limitations. Keywords: Anonymity techniques, anonymity models, privacy preserving algorithm.
Authors and Affiliations
Anisha Tiwari, Minu Choudhary
Restraint of Pear Juice Browning through Pre-Treating Material with Microwave
Pear materials were respectively treated with 90, 270, 450, 720, and 900 W microwave power at 30, 60, 90, and 120s, and the effect of microwave pretreatment on the browning of pear juice were investigated. The results sh...
Data Embedding in a moving Compressed Video
The proposed work deals with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis,...
Road Traffic Accident in Kano Nigeria: A Case Study of Kano Metropolitan
The increasing level of road traffic crash (RTC) in Kano metropolitan and the consequent of injuries and fatalities necessitate the need for its regular analysis. In the present study, data on recorded cases of RTC were...
A new non-monotone line search technique
In this paper, we propose a new non-monotone line search algorithm for unconstrained optimization problems. We incorporate the proposed non-monotone strategy in [3] into an inexact Wolfe-type line search approach to cons...
Sufficient conditions for meromorphic close-to-convexity of order
The purpose of the present paper is to consider some sufficient conditions for close-to-convexity of order alpha of meromorphic functions in the punctured unit disc. Keywords: Starlike functions; Meromorphic close-to-c...