Please use this identifier to cite or link to this item:
Title: Certain investigations on privacy preserving data mining using segmentation algorithm
Researcher: Santhosh Kumar B
Guide(s): Arunachalam V P
Keywords: Data Mining
Engineering and Technology,Computer Science,Computer Science Information Systems
Preserving Data Mining
Segmentation Algorithm
University: Anna University
Completed Date: 2018
Abstract: The conventional scheme for information extortion might accomplish better on the mining of data needed to create a categorization policies made use for preceding classification in an administered data based issues. Moreover, most of the schemes conceal the individuality of the concepts where the data belongs to which might be a major cause of violating confidentiality. The intention is to resolve the problems by employing a graph and hypothetical scheme based on k segmentation of graphs which offers the generation of an intricate choice based tree categorizer arranged into a precedence based ladder. The analysis reveals that the scheme offers precision newlineand effectiveness. Several enhancements are prevailing in cooperative information newlineestimation. Theref ore the intention is to preserve unique subtle confidential information which is a crucial dispute for safeguarding confidentiality during extraction in a scattered setup. There are several efforts for designing confidentiality in information extraction. Therefore for mining the combination in terms of time division, the sequential combination based policies are analyzed. For offering improved and analysis the prevailing confidentiality safeguarding scheme it does not focus on sequential nature of the combination based policies. Therefore the intention is to design schemes with a suitable demonstration which aids to secretly decode sequential combination based policies which are shared to all the sharing events. newlineThe information disquiets are attractive in information extraction for safeguarding confidentiality. The key problem in information disquiets isto portray the equalization of two differing features as confidentiality safeguarding and information usage newline newline
Pagination: xvii, 128p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File38.9 kBAdobe PDFView/Open
02_certificates.pdf601.86 kBAdobe PDFView/Open
03_abstract.pdf31.19 kBAdobe PDFView/Open
04_acknowledgement.pdf40.04 kBAdobe PDFView/Open
05_table_of_contents.pdf48.25 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf28.41 kBAdobe PDFView/Open
07_chapter1.pdf148.76 kBAdobe PDFView/Open
08_chapter2.pdf158.85 kBAdobe PDFView/Open
09_chapter3.pdf53.13 kBAdobe PDFView/Open
10_chapter4.pdf174.48 kBAdobe PDFView/Open
11_chapter5.pdf265.7 kBAdobe PDFView/Open
12_chapter6.pdf501.48 kBAdobe PDFView/Open
13_conclusion.pdf33.32 kBAdobe PDFView/Open
14_references.pdf66.81 kBAdobe PDFView/Open
15_list_of_publications.pdf28.03 kBAdobe PDFView/Open
Show full item record

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: