A New Hybrid Algorithm for Privacy Preserving Data Mining
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for knowledge- and information-based decision making. Driven by mutual benefits, or by regulations that require certain data to be published, there is a demand for the exchange and publication of data among various parties. Data in its original form, however, typically contains sensitive information about individuals, and publishing such data will violate individual privacy. The current practice in data publishing relies mainly on policies and guidelines as to what types of data can be published and on agreements on the use of published data. This approach alone may lead to excessive data distortion or insufficient protection. Privacy-preserving data publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Recently, PPDP has received considerable attention in research communities, and many approaches have been proposed for different data publishing scenarios. In privacy-preserving domain, the existing EA solutions are restricted to specific problems such as cost function evaluation. In this work, it is proposed to implement a Hybrid Evolutionary Algorithm using Genetic Algorithm (GA) and Ant colony Optimization (ACO). Both GA and ACO in the proposed system work with the same population. In the proposed framework, l-diversity is accomplished by Slicing approach of the original dataset. The hybrid optimization is used to search for optimal generalized feature set.
Authors and Affiliations
S. Chidambaranathan
DATA ANALYSIS BASED ON DATA MINING ALGORITHMS USING WEKA WORKBENCH
In this paper, machine learning algorithms and artificial neural networks classification from instances in the breast cancer data set are applied by Weka (Data Mining Workbench). The data set were donated in 1...
A Survey on Blackhole Attack Detection Methods in Manet
The mobile ad hoc network is the wireless network. MANET is gaining technology because users want to use wireless devices. It is a group of mobile devices connected by wireless link with no access point. Every mob...
SEEWAGE SLUDGE ASH (SSA) IN PRECAST CONCRETE BLOCKS
The present study explored the technological feasibility of re-using sewage sludge ash (SSA) as a Portland cement replacement in commercially manufactured pre cast concrete blocks. The blocks analysed were made to...
An Approach to Code Generation from UML Diagrams
The Unified Modeling Language (UML) has now become the de-facto industry standard for object-oriented (OO) software development. UML provides a set of diagrams to model structural and behavioral aspects of an obj...
Assessment For Gasifier Shell Due To Thermal Fatigue
The stresses which produce fatigue failure at high temperature do not necessarily need to come from mechanical source. Fatigue failure can be produce produced by mechanical causes. Thermal stresses result when th...