Privacy-Preserving Data Mining with Random decision tree framework
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 4
Abstract
Data mining is the useful tool to discovering the knowledge from large data. Different methods & algorithms are available in data mining. Classification is most common method used for finding the mine rule from the large database. Decision tree method generally used for the Classification, because it is the simple hierarchical structure for the user understanding & decision making. Various data mining algorithms available for classification based on Artificial Neural Network, Nearest Neighbour Rule & Bayesian classifiers but decision tree mining is simple one. ID3 and C4.5 algorithms have been introduced by J.R Quinlan which produce reasonable decision trees. The objective of this paper is to present these algorithms. At first we present the classical algorithm that is ID3, then highlights of this study we will discuss in more detail C4.5 this one is a natural extension of the ID3 algorithm. And we will make a comparison between these two algorithms and others algorithms such as C5.0 and CART. Indexterms: Data mining, Privacy-preserving data mining, classification horizontal partitioning, vertical partitioning
Authors and Affiliations
Ms. Ch. Likitha Sravya, Mrs. G. V Rajya Lakshmi
The Improved Image Encryption-Compression System for Error Clustering and Random Permutation
Abstract: Image encryption must be led before image pressure. In this paper we concentrate how to plan a couple of image encryption and pressure calculations such that packing encoded images can at present be proficientl...
A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todeman...
Use of MPSO To Break Transposition Cipher System
Particle swarm optimization (PSO) based cryptanalysis has acquired much attention because it has fast convergence rate. We investigate the use of Modify Particle Swarm Optimization (MPSO) with some modification in fitnes...
Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem
Abstract: Determination of the optimum route is often encountered in daily life. The purpose of the optimum route itself is to find the best trajectory of the two pairs of vertices contained in a map or graph. The search...
On Combined Approach for mining FSG in Transactionized Graph Datasets
Abstract: Graph Data mining has ushered into new era with advanced data mining techniques. Mining Frequent Sub Graphs is the crucial area which appeals the ease of extracting the patterns in the graph. Typical grap...