Huddling For Anonymization Of Compacted And Disseminated Public Systems
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the actors May be different kinds Links may have attributes, directed or undirected Social networks have received dramatic interest in research and development. We developed heuristics to deal with the problem, In this paper, we survey the very recent research development on privacy-preserving publishing of graphs and social network data. Our metric for data quality is the number of rules that can still be mined and the number of rules that appear as a side effect We developed heuristic algorithms to minimize the new rules of the concept.
Authors and Affiliations
P. Eswaraiah| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali, Pokuru. Nagarjuna| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali
Role of Cloud Computing in Health Monitoring System
Patient care is the focus of many clinical disciplines application but it is very complex as patient care is the essential information for direct patient care is defined on the applications. The present applications...
We propose a shared data based algorithm that analytically chooses the optimal feature for classification. This common information based component choice calculation can manage straightly and nonlinearly subordinate...
A Novel Control Strategy of PV Generation System with LPC for Loading Balance of Distribution Feeders
To reduce the power loss and power flow over loading in a distribution system. Proper loading balance of distribution feeders is important. In this paper, a loop power controller (LPC) is applied for the control of r...
A Categorized Multiuser Data Share Environment In A Mobile Cloud Computing Model
With a specific end goal to give protected and secure operation, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a changed three-layer structure is proposed in...
Maintain Data Integrity And Protection Of Private Label Information In Social Network Data
Perceptive information about users of the social networks should be protected. The confront is to plan methods to publish social network data in a form that affords usefulness without compromising privacy. Previous r...