Providing Efficient Privacy Of Xml Data By Using Anonymity
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
Scientists mine the extensive information got from various sources having distinctive configurations like database information and XML. Protection is one of most critical component while exchanging the information to information mineworkers. Prior exploration on security concentrated just database table information. For this k-anonymity and l-diversity qualities procedures are accessible to avoid unveil of client information. Present center to giving security on tree structure information .however existing techniques can't give protection on tree organized information. We exhibit a novel security calculation termed as k(m;n)- anonymity Along with covetous anonymization heuristic which avoids personality divulgence of information.
Authors and Affiliations
A. Veera Lakshmi| Dept of IT, ADITYA Engineering College, Surampalem, Gandepalli Mandal, East Godavari District,AP,India, P. Nanna Babu| Dept of IT, ADITYA Engineering College, Surampalem, Gandepalli Mandal, East Godavari District,AP,India
Performance Improvement of IUPQC in Distribution System under Abnormal Conditions Using PID
To improve the performance of feeders in the distribution system a new topology is introduced in this paper based on the interline unified power quality conditioner (IUPQC). This IUPQC consists of both series and shu...
A New Optimal Voltage Control Technique For UPS System
This paper proposes a simple best possible voltage control technique for three-stage uninterruptiblecontrol supply frameworks. The proposed voltage controller is made out of an input control term and a repaying contro...
We depict our CDA report era and coordination Open API benefit in light of distributed computing, through which doctor's facilities are empowered to helpfully create CDA records without purchasing exclusive programmi...
In this work a rapid and vitality productive two-cycle duplicate gather (MAC) engineering that backings both marked and unsigned numbers is proposed. A productive MAC configuration utilizing 4:2 compressors is displa...
Reduction of Torque Ripple in Direct Torque Control of Induction Machines by Use of all Voltage Vectors of Matrix Converters
This paper proposes the use of all voltage vectors of matrix converters to reduce the electromagnetic torque ripple which is one of the most important drawbacks of direct torque control for induction motors using mat...