Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5514
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVashi, Devendra I.-
dc.date.accessioned2015-07-10T07:44:29Z-
dc.date.available2015-07-10T07:44:29Z-
dc.date.issued2014-06-
dc.identifier.citationNational Conference on Analysis, Design & Research in Engineering, Technology & Sciences – 2014, KIRC-382721,Gujarat, And AES Journals in Engineering , Technology, Science and Managementen_US
dc.identifier.urihttp://hdl.handle.net/123456789/5514-
dc.descriptionInternational Journal Of Emerging Technologies And Applications In Engineering, Technology And Sciences (IJ-ETA-ETS)en_US
dc.description.abstractWhile sharing the private data, privacy preserving is becoming an increasingly significant issue. Various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. analyze the comparative study of all techniques so Issues about privacy-preserving data mining have emerged globally. The aim of privacy-preserving data mining is to find the right balance between maximizing analysis results that are useful for the common good and keeping the inferences that disclose private information about organizations or individuals at a minimum.en_US
dc.publisherIJ-ETA-ETSen_US
dc.relation.ispartofseriesITFCA008-7;-
dc.subjectData Miningen_US
dc.subjectPrivacy Preserving Data Miningen_US
dc.subjectRandomizationen_US
dc.subjectAnonymizationen_US
dc.subjectSequential Pattern Hidingen_US
dc.subjectData Perturbationen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCA008en_US
dc.titleSurvey On Privacy Preserving Data Mining Techniquesen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCA008-7.pdfITFCA008-7204.11 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.