An anonymization technique using intersected decision trees
نویسندگان
چکیده
منابع مشابه
Classification Using Decision Trees
Data mining term is mainly used for the specific set of six activities namely Classification, Estimation, Prediction, Affinity grouping or Association rules, Clustering, Description and Visualization. The first three tasks classification, estimation and prediction are all examples of directed data mining or supervised learning. Decision Tree (DT) is one of the most popular choices for learning ...
متن کاملPublishing High-Dimensional Micro Data Using Anonymization Technique
Now a day’s society is experiencing very good growth in the count and variety of data collections having person-specific information as network connectivity, computer technology & disk storage space become increasingly affordable. Large databases is in use today’s society. The large amount of data available means that it is helpful to learn lot of individual information from public data. While ...
متن کاملPrivacy Preservation in Data Mining using Anonymization Technique
Data mining is the process of extracting interesting patterns or knowledge from huge amount of data. In recent years, there has been a tremendous growth in the amount of personal data that can be collected and analyzed by the organizations. As hardware costs go down, organizations find it easier than ever to keep any piece of information acquired from the ongoing activities of their clients. Th...
متن کاملRule Generation using Decision Trees
A DT is a classification scheme which generates a tree and a set of rules, representing the model of different classes, from a given dataset. As per Hans and Kamber [HK01], DT is a flow chart like tree structure, where each internal node denotes a test on an attribute, each branch represents an outcome of the test and leaf nodes represent the classes or class distributions. The top most node in...
متن کاملVariable Importance Using Decision Trees
Decision trees and random forests are well established models that not only offer good predictive performance, but also provide rich feature importance information. While practitioners often employ variable importance methods that rely on this impurity-based information, these methods remain poorly characterized from a theoretical perspective. We provide novel insights into the performance of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of King Saud University - Computer and Information Sciences
سال: 2015
ISSN: 1319-1578
DOI: 10.1016/j.jksuci.2014.06.015