نتایج جستجو برای: association rule hiding
تعداد نتایج: 658337 فیلتر نتایج به سال:
finding frequent patterns plays a key role in exploring association patterns, correlation, and many other interesting relationships that are applicable in tdb. several association rule mining algorithms such as apriori, fp-growth, and eclat have been proposed in the literature. fp-growth algorithm construct a tree structure from transaction database and recursively traverse this tree to extract...
Association Rules revealed by association rule mining may contain some sensitive rules, which may cause prospective threats towards privacy and protection. A number of researchers in this area have recently made efforts to preserve privacy for sensitive association rules in transactional databases. In this paper, we put forward a heuristic based association rule hiding algorithm to get rid of t...
Apriori Algorithm is the most popular and useful algorithm of Association Rule Mining of Data Mining. As Association rule of data mining is used in all real life applications of business and industry. Objective of taking Apriori is to find frequent itemsets and to uncover the hidden information. This paper elaborates upon the use of association rule mining in extracting patterns that occur freq...
In the statistical literature, there has been considerable development of methods of data releases for multivariate categorical data sets, where the releases come in the form of marginal and conditional tables corresponding to subsets of the categorical variables. In this chapter we provide an overview of this methodology and we relate it to the literature on the release of association rules wh...
Many algorithms are proposed by researchers to find association rules which help the users to make strategic decisions to improve the performance of the business or any qualitative organizations. The threat occurs to association rule mining when data or information is required to share to many users to get mutual benefits. Among the existing techniques the exact hiding approaches provides best ...
We consider exchange markets with heterogeneous indivisible goods. We are interested in exchange rules that are efficient and immune to manipulations via endowments (either with respect to hiding or destroying part of the endowment or transferring part of the endowment to another trader). We consider three manipulability axioms: hiding-proofness, destruction-proofness, and transfer-proofness. W...
Separation logic supports state-modular program verification in two aspects: local reasoning by means of the ordinary (first-order) frame rule and information hiding by the hypothetical frame rule (a second-order frame rule). In this paper, we show the support of local reasoning and information hiding in SCAP, a program logic for low-level programs with stack-based control abstractions. We show...
It is crucial, while using healthcare data, to assess the advantages of data privacy against possible drawbacks. Data from several sources must be combined for use in many mining applications. The medical practitioner may results association rule performed on this aggregated better personalize patient care and implement preventive measures. Historically, numerous heuristics (e.g., greedy search...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید