Privacy Preserving Using Randomization and Encryption Methods
Journal Title: Scholars Journal of Engineering and Technology - Year 2013, Vol 1, Issue 3
Abstract
The technology of data mining is used in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Before publishing or sharing private information about individuals, businesses and organizations have to be suppressed. Privacy-preserving data mining has thus become an important issue in current years. This paper has review of evolutionary privacy-preserving data mining technology to find appropriate method to perform secure transactions into a database.
Authors and Affiliations
Mohnish Patel, Prashant Richariya, Anurag Shrivastava
Image Encryption and Compression Using Scalable Coding Techniques
Abstract: The security becomes an important issue of communication and storage of image due to the growth of multimedia application. Encryption is one of the ways to ensure high security. Images are used in many fields s...
Modelling natural gas pressure reducing stations for power generation using expansion turbines
Natural gas has a high pressure before consumption in industries and cities. This pressure is reduced using relief valves in urban gas pressure reducing stations. Pressure drop results in great energy loss and accordingl...
Automated Controllers Functioning Criteria in Content Distribution Systems
This paper describes content distribution systems (CDS) used in telecommunication datacenters. First or last, the CDS becomes large, and its detailed engineering can not be performed during reasonable time span. Therefor...
The Impact of Clustering Mechanism in Dense Wireless Sensor Network
Abstract: A sensor is a miniature component which gauges physical parameters from the environment. A sensor measures the physical parameters and transmits them either by wired or wireless means. In wireless medium the se...
Simulating Calculation of Oilfield Water Injection System
The text introduces the base theory of pipeline network hydraulic calculation, analyzes how to set up the mathematical model solving the node pressure by the continuous equation and pressure drop equation and discusses t...