Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Privacy Preserving Data Mining(PPDM) is an emerging research area. Its objective is to extend thetraditional data mining techniques to work with transformed data while protecting confidential information withminimized loss of privacy and information. In other words PPDM techniques aimed at modifying the originaldata while still being able to recover the data mining results from the modified data. This article analyses theexisting PPDM techniques and presents the analysis of the proposed algorithms in the research work.

Authors and Affiliations

Cynthia Selvi. P , Mohamed Shanavas. A. R

Keywords

Related Articles

 Enhancedcongestion Control In Reset Frequency Controlled Dccp_Tfrc

 Abstract: Congestion control (CC) is one of the major issues in wireless sensor network. CC will be handled in Data link layer, Network layer and Transport layer. Among all existing transport protocols, it is prove...

Bandwidth allocation mechanisms in the next mobile generation: A practical Approach

Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is im...

 Mathematical Modeling of Image Steganographic System

 Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based...

 Design and Implementation of Binary Neural Network Classification Learning Algorithm

 In this paper a Binary Neural Network Learning (BNN-CLA)[1] is analyzed and implemented for solving multi class problem normally the classifier are construct by combining the outputs of several binary ones. The B...

A Multi-Agent System to Support ICT based Distance Learningthrough Modeling of Learner Needs: The Caseof Bachelor of Education at the University of Nairobi

Abstract:In distant learning environments, most learners need feedback from their lecturers and administration. The feedback supports them to achieve their learning objectives. However, the feedback that the most distant...

Download PDF file
  • EP ID EP94878
  • DOI -
  • Views 75
  • Downloads 0

How To Cite

Cynthia Selvi. P, Mohamed Shanavas. A. R (2015).  Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 70-76. https://europub.co.uk/articles/-A-94878