A Survey on Privacy Preserving Decision Tree Classifier

Size: px
Start display at page:

Download "A Survey on Privacy Preserving Decision Tree Classifier"

Transcription

1 A Survey on Classifier Tejaswini Pawar*, Prof. Snehal Kamalapur ** * Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ** Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ABSTRACT In recent year s privacy preservation in minin has become an important issue. A new class of minin method called privacy preservin minin alorithm has been developed. The aim of these alorithms is protectin the sensitive information in while extractin knowlede from lare amount of. The extracted knowlede is enerally expressed in the form of cluster, decision tree or association rule allow one to mine the information. Several modification technique like randomization method, anonymization method, distributed privacy technique have been developed to incorporatin privacy mechanism and allow to hide sensitive pattern or itemset before minin process is executed. This paper mainly focuses on eneral classification technique decision tree classifier for preservin privacy. It presents a survey on decision tree learnin on various privacy techniques. Keywords - Data Minin, Classifiers, Perturbation, Data Minin, Splittin Criteria I. INTRODUCTION Data minin is a recently emerin field, connectin the three worlds of bases, statistics and artificial intellience. Data minin is the process of extractin knowlede or pattern from lare amount of. It is widely used by researchers for science and business process. Data collected from information providers are important for pattern reoranization and decision makin. The collection process takes time and efforts hence sample sets are sometime stored for reuse. However attacks are attempted to steal these sample sets and private information may be leaked from these stolen sets. Therefore privacy preservin minin are developed to convert sensitive sets into sanitized version in which private or sensitive information is hidden from unauthorized retrievers. preservin minin refers to the area of minin that seeks to safeuard sensitive information from unsanctioned or unsolicited disclosure. Preservation Data Minin [1] [2] was introducin to preserve the privacy durin minin process to enable conventional minin technique. Many privacy preservation approaches were developed to protect private information of sample set. The rest of this paper is structured as follows: the next section describes tree classifier and ives brief introduction about decision tree alorithm. Section 3 introduces different privacy preservation technique throuh decision tree approach. Section 4 provides an overall summary of this paper, and suests directions for further research on this topic. II. DECISION TREE CLASSIFIER A decision tree[3][4][5] is defined as a predictive modelin technique from the field of machine learnin and statistics that builds a simple tree-like structure to model the underlyin pattern of. tree is one of the popular methods is able to handle both cateorical and numerical and perform classification with less computation. trees are often easier to interpret. tree is a classifier which is a directed tree with a node havin no incomin edes called root. All the nodes except root have exactly one incomin ede. Each non-leaf node called internal node or splittin node contains a decision and most appropriate taret value assined to one class is represented by leaf node. tree classifier is able to break down a complex decision makin process into collection of simpler decision. The complex decision is subdivided into simpler decision on the basis of splittin criteria. It divides whole trainin set into smaller subsets. Information ain, ain ratio, ini index are three basic splittin criteria to select attribute as a splittin point. trees can be built from historical they are often used for explanatory analysis as well as a form of supervision learnin. The alorithm is desin in such a way that it works on all the that is available and as perfect as possible. Accordin to Breiman et al. [6] the tree complexity has a crucial effect on its accuracy performance. The tree complexity is explicitly controlled by the prunin method employed and the stoppin criteria used. Usually, the tree complexity is measured by one of the followin metrics: The total number of nodes; Total number of leaves; depth; 843 P a e

2 Number of attributes used. tree induction is closely related to rule induction. Each path from the root of a decision tree to one of its leaves can be transformed into a rule simply by conjoinin the tests alon the path to form the antecedent part, and takin the leaf s class prediction as the class value. The resultin rule set can then be simplified to improve its accuracy and comprehensibility to a human user [7]. Flowchart for tree based classification is shown in Fi.1 Start Sample set If all instance into same class Return the class Fi. 2 A framework for privacy preservin decision tree minin The splittin ceases when the number of instances to be split is below a certain threshold. C4.5 can handle numeric attributes. It perform error based prunin after rowin phase. It can use corrected ain ratio induce from a trainin set that incorporates missin values. III. PRIVACY PRESERVING DECISION TREE LEARNING This section explores the privacy preservation decision tree learnin techniques in which firstly is modified by usin different modification and perturbation-based approaches and then decision tree minin is applied to modified or sanitized set.fi.2 shows a framework for privacy preservin decision tree minin Select hihest information attribute Divide the set usin that attribute Fi.1. Flowchart for tree based classification End Hyafil and Rivest proved that ettin the optimal tree is NP-complete [8]. Most alorithms employ the reedy search and the divide-and-conquer approach to row a tree. In particular, the trainin set continues to be split in small. ID3 [4] and C4.5 [4] [9] adopt a reedy approach in which decision trees are constructed in top down recursive divide and conquer manner. ID3 was one of the first tree alorithms. It works on wide variety of problems in both academia and industry and has been modified improved and borrowed from many times over. ID3 picks splittin value and predicators on the basis of ain in information that the split or splits provide. Gain represents difference between the amount of information that is needed to correctly make a prediction both before and after the split has been made. Information ain is defined as the difference between the entropy of oriinal sement and accumulated entropies of the resultin split sement. C4.5 [9] is an extension of ID3, presented by the same author (Quinlan, 1993). It uses ain ratio as splittin criteria. A. - Minin Based on Random Substitutions: Inspired by the fact that the pioneerin privacypreservin decision tree minin method of [1] was flawed [11], Jim Dowd, Shouhuai Xu, and Weinin Zhan [10] explored a random substitution perturbation technique for privacy-preservin decision tree minin methods. This perturbation technique is based on a different privacy measure called ρ1-to-ρ2 privacy breachin [12] and a special type of perturbation matrix called the γ-diaonal matrix [13].They makes several contributions towards privacy-preservin decision tree minin. A novel error reduction technique is introduced for reconstruction, so that it not only prevents a critical problem caused by a lare perturbation matrix, but also uarantees a strictly better accuracy. In addition, the resultin privacy-preservin decision tree minin method has immune to the relevant recovery and repeated-perturbation attacks which were not accommodated in the model of [12]. It ensures that the decision trees learned from the perturbed are quite accurate compared with those learned from the oriinal. The parameters include: (1) assurance metric γ, (2) Dimension size N of perturbation matrix, which affects the accuracy of reconstructed as well as performance, and (3) Entropy of a perturbation matrix, which, to some extent, can encompass the effect of both γ and N. It is showed that one can achieve the desired trade-off between accuracy, privacy, and performance by selectin an appropriate N. Oriinal Dataset Perturbation Perturbed Dataset Reconstruction Reconstruct ed Dataset Minin Perturbation Matrix 844 P a e

3 B. A Noise Addition Scheme in for Data Minin [14]: Mohammad Ali Kadampur, Somayajulu D.V.L.N. propose a stratey that protects the privacy durin decision tree analysis of minin process. It is basically a noise addition framework specifically tailored toward classification task in minin. They propose to add specific noise to the numeric attributes after explorin the decision tree of the oriinal. The obfuscated then is presented to the second party for decision tree analysis. The decision tree obtained on the oriinal and the obfuscated are similar but by usin this method the proper is not revealed to the second party durin the minin process and hence the privacy will be preserved. The method also preserves averaes and few other statistical parameters thus makin the modified set useful for both minin and statistical purposes. This paper uses Quinlan's [15] C5.0 decision tree builder on the selected set [16] and obtain the decision tree of the oriinal set and a unique method of listin the nodes (attributes) that we touch in the path from the root of the tree to the leaf, then use a noise addition stratey for each of the attributes. The approach taken in this paper interates both cateorical and numeric types and focuses on privacy preservin durin decision tree analysis. The noise addition methods used are effective in preservin the privacy of the proper and producin prediction accuracies on par with the oriinal set. Noise addition technique is the ability to maintain ood quality and ensure individual privacy. This approach deals only with the classification task so this approach is addressin the issue of privacy preservin minin partially. More experiments are to be conducted on security level measurement and quality. C. - s over Vertically Partitioned Data: Jaideep Vaidya, Chris Clifton, Murat Kantarciolu and A. Scott Patterson [17] introduce a - s over Vertically Partitioned Data, eneralized privacy-preservin variant of the ID3 alorithm for vertically partitioned distributed over two or more parties. The alorithm as presented in this paper is workin proram is a sinificant step forward in creatin usable, distributed, privacy preservin -minin alorithms. This paper presents a new protocol to construct a decision tree on vertically partitioned with an arbitrary number of parties where only one party has the class attribute. It presents a eneral framework for constructin a system in which distributed classification would work. It serves to show that the methods can actually be built and are feasible. This work provides an upper bound on the complexity of buildin privacy preservin decision trees. Sinificant work is required to find a tiht upper bound on the complexity. D. Minin from Perturbed Data: In this paper, Li Liu, Murat Kantarciolu and Bhavani Thuraisinham [18] propose a new perturbation based technique to modify the minin alorithms. They build a classifier for the oriinal set from the perturbed trainin set. This paper proposed a modified C4.5 [9] decision tree classifier which is suitable for privacy preservin minin can be used to classify both the oriinal and the perturbed. This technique considers the splittin point of the attribute as well as the bias of the noise set as well. It calculates the bias whenever try to find the best attribute, the best split point and partition the trainin. This alorithm is based on the perturbation scheme, but skips the steps of reconstructin the oriinal distribution. The proposed technique has increased the privacy protection with less computation time. as a security issue in minin area is still a challene. E. Learnin Usin Unrealized Data Sets: Pui K. Fon and Jens H. Weber-Jahnke [19] introduce a new perturbation and randomization based approach that protects centralized sample sets utilized for decision tree minin. They introduced a new privacy preservin approach via set complementation. Dataset complementation confirms the utility of trainin sets for decision tree learnin. This approach converts the oriinal sample sets into a roup of unreal sets. The oriinal samples cannot be reconstructed without the entire roup of unreal sets. An accurate decision tree can be built directly from those unreal sets. This novel approach can be applied directly to the storae as soon as the first sample is collected and applied at any time durin the collection process. In order to mitiate the threat of their inadvertent disclosure or theft, privacy preservation is applied to sanitize the samples prior to their release to third parties. In contrast to other sanitization methods, this technique does not affect the accuracy of minin results. The decision tree can be built directly from the sanitized sets, no need to be reconstructin the oriinal set. The set reconstruction alorithm is eneric hence privacy preservation via set complementation fails if all trainin sets were leaked. This limitation need to be overcome by applyin technique like encryption. This technique requires extra storae for storin perturbed and complement of sample set. So optimizin the storae size of the unrealized samples needs to be explored. 845 P a e

4 IV. CONCLUSION In this paper, we present a decision tree classification technique. We have surveyed different approaches used in evaluatin the effectiveness of privacy preservin minin alorithms usin decision tree classifier. The work presents in this paper indicates the ever increasin interest of researchers in the area of securin sensitive and knowlede from malicious users. Many privacy preservin alorithms of decision tree minin are proposed by researchers however, privacy preservin technoloy needs to be further researched because of the complexity of the privacy problem. We conclude privacy preservin decision tree minin alorithms by analyzin the existin work in the table.1and make some remark. Future research need to be developed to work on these remarks. Sr. No Technique Purpose Remark - Minin Based on Random Substituti ons A Noise Addition Scheme in for Data Minin - s over Vertically Partitione d Data Author presented a perturbation technique based on random substitutions & showed that the resultin privacypreservin decision tree minin method is immune to attacks that are seeminly relevant. Propose to add specific noise to the numeric attributes after explorin the decision tree of the oriinal. Proper is not revealed to the second party durin the minin process Tackled the problem of classification & introduced a eneralized privacy preservin variant of the ID3 alorithm for vertically partitioned distributed Extra storae required for storin perturbati on matrix, do not make strict tradeoffs between preservati on of sample utility and privacy It works on numerical only, need to work on quality and security level measurem ent. Required to find a tiht upper bound on the complexit y 4 5 Minin from Perturbed Data Learnin Usin Unrealize d Data Sets over two or more parties A new perturbation based technique proposed a modified C4.5 decision tree classifier New perturbation and randomization based approach via set complementation Need various ways to build classifiers which can be used to classify the perturbed set. Requires extra storae for storin perturbed and compleme nt of sample set and fails if all trainin were leaked sets REFERENCES [1] R. Arawal and R. Srikant. preservin minin. In ACM SIGMOD International Conference on Manaement of Data, paes ACM, [2] Y. Lindell and B. Pinkas. preservin minin. In Advances in Cryptoloy, volume 1880 of Lecture Notes in Computer Science, paes Spriner-Verla, [3] Lior Rokach and Oded Maimon Top- Down Induction of s Classifiers A Survey, IEEE TRANSACTIONS ON SYSTEMS, MAN AND CYBERNETICS: PART C, VOL. 1, NO. 11, NOVEMBER 2002 [4] Jiawei Han, Micheline Kamber, Data Minin: Concepts and Techniques, Moran Kaufmann, [5] Lior Rokach, Oded Maimon Data Minin and Knowlede Discovery Handbook Second edition paes , Spriner Science + Business Media,2010 [6] L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Reression s. Wadsworth Int. Group, [7] J.R. Quinlan, Simplifyin decision trees, International Journal of Man- Machine Studies, 27, , P a e

5 [8] L. Hyafil and R. L. Rivest, "Constructin Optimal Binary s is {NP}- Complete," Inf. Process. Lett, vol. 5, pp , [9] J. R. Quinlan. C4.5: Prorams for Machine Learnin. Moran Kaufmann, [10] J. Dowd, S. Xu, and W. Zhan, - Minin Based on Random Substitions, Proc. Int l Conf. Emerin Trends in Information and Comm. Security (ETRICS 06), pp , [11] Hillol Karupta, Souptik Datta, Qi Wan, and Krishnamoorthy Sivakumar. On the privacy preservin properties of random perturbation techniques. In IEEE International Conference on Data Minin, [12] A. Evfimievski, J. Gehrke, and R. Srikant. Limitin privacy breachin in privacy preservin minin. In ACM Symposium on Principles of Database Systems, paes ACM, [13] Shipra Arawal and Jayant R. Haritsa. A framework for hih-accuracy privacypreservin minin. In IEEE International Conference on Data Enineerin, [14] Mohammad Ali Kadampur, Somayajulu D.V.L.N., A Noise Addition Scheme in for Data Minin, Journal of Computin, Vol 2, Issue 1, January 2010, ISSN [15] Lian Liu.,Jie Wan.,Jun Zhan., ``Wavelet based perturbation for simultaneous privacy preservin and statistics preservin.,'' In Proceedins of IEEE International Conference on Data Minin workshop., [16] Charu C Arwal.,Philip S Yu., preservin minin models and Alorithms., Spriner Science+Business media.,llc [17] J. Vaidya and C. Clifton. preservin decision trees over vertically partitioned. In Proceedins of the 19th Annual IFIP WG 11.3 Workin Conference on Data and Applications Security, Storrs,Connecticut, Spriner. L. Liu, M. Kantarciolu, and B. Thuraisinham, Minin from Perturbed Data, Proc. 42 nd Hawaii Int l Conf. System Sciences (HICSS 09), [18] Pui K. Fon and Jens H. Weber-Jahnke, Learnin Usin Unrealized Data Sets. IEEE Transl. on knowlede and enineerin, vol. 24, no. 2, February P a e

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment

A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment www.ijcsi.org 434 A generalized Framework of Privacy Preservation in Distributed Data mining for Unstructured Data Environment V.THAVAVEL and S.SIVAKUMAR* Department of Computer Applications, Karunya University,

More information

Listwise Approach to Learning to Rank - Theory and Algorithm

Listwise Approach to Learning to Rank - Theory and Algorithm Fen Xia* fen.xia@ia.ac.cn Institute of Automation, Chinese Academy of Sciences, Beijin, 100190, P. R. China. Tie-Yan Liu tyliu@microsoft.com Microsoft Research Asia, Sima Center, No.49 Zhichun Road, Haidian

More information

A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE

A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data

More information

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic

More information

Classification and Prediction

Classification and Prediction Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser

More information

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

On the Performance Measurements for Privacy Preserving Data Mining

On the Performance Measurements for Privacy Preserving Data Mining On the Performance Measurements for Privacy Preserving Data Mining Nan Zhang, Wei Zhao, and Jianer Chen Department of Computer Science, Texas A&M University College Station, TX 77843, USA {nzhang, zhao,

More information

AnalysisofData MiningClassificationwithDecisiontreeTechnique

AnalysisofData MiningClassificationwithDecisiontreeTechnique Global Journal of omputer Science and Technology Software & Data Engineering Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised

More information

Save thousands with the complete e-document distribution solution

Save thousands with the complete e-document distribution solution Albany econnect Save thousands with the complete e-document distribution solution The UK s leadin provider of electronic document distribution software Since 1989, Albany Software has been developin software

More information

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification

Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification Henrik Boström School of Humanities and Informatics University of Skövde P.O. Box 408, SE-541 28 Skövde

More information

Two-Phase Modular Cooling

Two-Phase Modular Cooling Two-Phase Modular Coolin for the Data Center Ensurin the reliability and efficiency of your data center operations requires a strateic partner that is qualified to minimize enery usae, reduce costs, and

More information

Strategies for Reducing the Risk of ecommerce Fraud

Strategies for Reducing the Risk of ecommerce Fraud October 2010 Strateies for Reducin the Risk of ecommerce Fraud Fraud techniques are constantly evolvin, and new data breaches are reported every day are your online security practices adaptin rapidly enouh?

More information

A HyFlex Module for the Personnel Scheduling Problem

A HyFlex Module for the Personnel Scheduling Problem A HyFle Module for the Personnel Schedulin Problem Tim Curtois, Gabriela Ochoa, Matthew Hyde, José Antonio Vázquez-Rodríuez Automated Schedulin, Optimisation and Plannin (ASAP) Group, School of Computer

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

Performance Analysis of Decision Trees

Performance Analysis of Decision Trees Performance Analysis of Decision Trees Manpreet Singh Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India Sonam Sharma CBS Group of Institutions, New Delhi,India

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

ON AN APPROACH TO STATEMENT OF SQL QUESTIONS IN THE NATURAL LANGUAGE FOR CYBER2 KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM

ON AN APPROACH TO STATEMENT OF SQL QUESTIONS IN THE NATURAL LANGUAGE FOR CYBER2 KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM 216 International Journal "Information Technoloies & Knowlede" Volume 9, Number 3, 2015 ON AN APPROACH TO STATEMENT OF SQ QUESTIONS IN THE NATURA ANGUAGE FOR CYBER2 KNOWEDGE DEMONSTRATION AND ASSESSMENT

More information

A Multiagent Based System for Resource Allocation and Scheduling of Distributed Projects

A Multiagent Based System for Resource Allocation and Scheduling of Distributed Projects International Journal of Modelin and Optimization, Vol. 2, No., Auust 2012 A Multiaent Based System for Resource Allocation and Schedulin of Distributed Projects Sunil Adhau and M. L. Mittal Abstract In

More information

On the Influence of the Prediction Horizon in Dynamic Matrix Control

On the Influence of the Prediction Horizon in Dynamic Matrix Control International Journal of Control Science and Enineerin 203, 3(): 22-30 DOI: 0.5923/j.control.203030.03 On the Influence of the Prediction Horizon in Dynamic Matrix Control Jose Manue l Lope z-gue de,*,

More information

PRIVACY PRESERVING ASSOCIATION RULE MINING

PRIVACY PRESERVING ASSOCIATION RULE MINING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Decision Tree Learning on Very Large Data Sets

Decision Tree Learning on Very Large Data Sets Decision Tree Learning on Very Large Data Sets Lawrence O. Hall Nitesh Chawla and Kevin W. Bowyer Department of Computer Science and Engineering ENB 8 University of South Florida 4202 E. Fowler Ave. Tampa

More information

ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS

ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS Abstract D.Lavanya * Department of Computer Science, Sri Padmavathi Mahila University Tirupati, Andhra Pradesh, 517501, India lav_dlr@yahoo.com

More information

Impacts of Manufacturing Sector on Economic Growth in Ethiopia: A Kaldorian Approach

Impacts of Manufacturing Sector on Economic Growth in Ethiopia: A Kaldorian Approach Available online at http://www.journaldynamics.or/jbems Journal of Business Economics and Manaement Sciences Vol. 1(1), pp.1-8, December 2014 Article ID: JBEMS14/011 2014 Journal Dynamics Oriinal Research

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

SPSS WebApp Framework

SPSS WebApp Framework SPSS WebApp Framework Solve business problems with customized, Web-based, analytical applications powered by SPSS Solve business problems with SPSS WebApp applications Predictin the best course of action

More information

For Educational Service Subject To Article 6 But Not Article 7 Of The Private Postsecondary And Vocational Education Reform Act.

For Educational Service Subject To Article 6 But Not Article 7 Of The Private Postsecondary And Vocational Education Reform Act. Anaheim University TESOL Student Enrollment Areement Anaheim University 1240 S. State Collee Blvd. Room #110 Anaheim, CA 9206 USA Tel: 714-772-3330 Fax: 714-772-3331 E-mail: admissions@anaheim.edu Website:

More information

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules

Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION

A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION Carlos Eduardo Thomaz Department of Electrical Enineerin, Centro Universitario da FEI, FEI, Sao Paulo, Brazil

More information

How many i s in Art? the Interna5onal, Intersectoral and Interdisciplinary Dimensions in Ar5s5c Doctorates in Music Jeremy Cox AEC Chief Execu5ve

How many i s in Art? the Interna5onal, Intersectoral and Interdisciplinary Dimensions in Ar5s5c Doctorates in Music Jeremy Cox AEC Chief Execu5ve How many i s in Art? the Interna5onal, Intersectoral and Interdisciplinary Dimensions in Ar5s5c Doctorates in Music Jeremy Cox AEC Chief Execu5ve About the AEC: The Association Académies de Musique is

More information

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 lakshmi.mahanra@gmail.com

More information

Privacy-Preserving Data Mining through Knowledge Model Sharing

Privacy-Preserving Data Mining through Knowledge Model Sharing Privacy-Preserving Data Mining through Knowledge Model Sharing Patrick Sharkey, Hongwei Tian, Weining Zhang, and Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {psharkey,htian,wzhang,shxu}@cs.utsa.edu

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Effective Data Mining Using Neural Networks

Effective Data Mining Using Neural Networks IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,

More information

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases

A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering

More information

Enhancement of Security in Distributed Data Mining

Enhancement of Security in Distributed Data Mining Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 sharda.darekar@gmail.com,

More information

TSM ASSESSMENT PROTOCOL

TSM ASSESSMENT PROTOCOL TSM ASSESSMENT PROTOCOL A Tool for Assessin External Outreach Performance Introduction Launched in 2004, Towards Sustainable Minin (TSM) is an initiative of the Minin Association of Canada desined to enhance

More information

S i m p l i c i t y c o n t r o l P o w e r. Alcatel-Lucent OmniTouch Contact Center Premium Edition

S i m p l i c i t y c o n t r o l P o w e r. Alcatel-Lucent OmniTouch Contact Center Premium Edition Alcatel-Lucent OmniTouch Contact Center Premium Edition Enablin onoin visual trackin of contact center activities S i m p l i c i t y c o n t r o l P o w e r Can you UNDERSTAND, ANTICIPATE and RESPOND

More information

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules

Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur

More information

Data Outsourcing based on Secure Association Rule Mining Processes

Data Outsourcing based on Secure Association Rule Mining Processes , pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim

More information

Data Mining: A Preprocessing Engine

Data Mining: A Preprocessing Engine Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,

More information

UNIQUE Identity Access Management

UNIQUE Identity Access Management Manaement UNIQUE Manaement The IAM solution for your company with more control and security when accessin your corporate network. UNIQUE Manaement enables secure access control of all remote desktop structures

More information

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm

Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,

More information

BPO. COMPEtitive BUSINESS PROCESS

BPO. COMPEtitive BUSINESS PROCESS BPO BUSINESS PROCESS outsourcin COMPEtitive INTELlience SmartBPO is a unique, innovative business process outsourcin (BPO) and competitive intellience model that helps companies to simplify their operations

More information

A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model

A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model ABSTRACT Mrs. Arpana Bharani* Mrs. Mohini Rao** Consumer credit is one of the necessary processes but lending bears

More information

Synergy supports your network

Synergy supports your network Synery supports your network Silver Systems Manaement Silver Volume Licensin SYNERGY Global Reach, Local Service. Yours is a successful, midmarket company. You depend upon computers and your network to

More information

Data Mining and Database Systems: Where is the Intersection?

Data Mining and Database Systems: Where is the Intersection? Data Mining and Database Systems: Where is the Intersection? Surajit Chaudhuri Microsoft Research Email: surajitc@microsoft.com 1 Introduction The promise of decision support systems is to exploit enterprise

More information

DATA MINING METHODS WITH TREES

DATA MINING METHODS WITH TREES DATA MINING METHODS WITH TREES Marta Žambochová 1. Introduction The contemporary world is characterized by the explosion of an enormous volume of data deposited into databases. Sharp competition contributes

More information

Comparison of Data Mining Techniques used for Financial Data Analysis

Comparison of Data Mining Techniques used for Financial Data Analysis Comparison of Data Mining Techniques used for Financial Data Analysis Abhijit A. Sawant 1, P. M. Chawan 2 1 Student, 2 Associate Professor, Department of Computer Technology, VJTI, Mumbai, INDIA Abstract

More information

Principles of Assessment and Reporting in NSW Public Schools

Principles of Assessment and Reporting in NSW Public Schools NSW DEPARTMENT OF EDUCATION & TRAINING Auust 2008 nt sme Lea rn portin Re Principles Assessment and Reportin in NSW Public Schools in Ass es to p a re nts Preamble Backround Underpinnin the development

More information

Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing

Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing www.ijcsi.org 198 Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing oei 1 and Jiayang Wang 2 1 School of Information Science and Engineering, Central South University

More information

Mining Association Rules: A Database Perspective

Mining Association Rules: A Database Perspective IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology

More information

Data Mining Project Report. Document Clustering. Meryem Uzun-Per

Data Mining Project Report. Document Clustering. Meryem Uzun-Per Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

Hardware Resource Allocation for Hardware/Software Partitioning in the LYCOS System

Hardware Resource Allocation for Hardware/Software Partitioning in the LYCOS System Downloaded from orbit.dtu.dk on: Feb 02, 2016 Hardware Resource Allocation for Hardware/Software Partitionin in the LYCOS System Grode, Jesper Nicolai Riis; Knudsen, Peter Voit; Madsen, Jan Published in:

More information

PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM

PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM PRIVACY PRESERVING DATA MINING BY USING IMPLICIT FUNCTION THEOREM Pasupuleti Rajesh 1 and Gugulothu Narsimha 2 1 Department of Computer Science and Engineering, VVIT College, Guntur, India rajesh.pleti@gmail.com

More information

REVIEW OF ENSEMBLE CLASSIFICATION

REVIEW OF ENSEMBLE CLASSIFICATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

BPM for Information Technology Transforming IT through Business Process Management

BPM for Information Technology Transforming IT through Business Process Management white paper BPM for Information Technoloy Transformin IT throuh Business Process Manaement This paper is intended for CIOs, IT Executives and Senior IT Manaers interested in understandin more about the

More information

UNIQUE Business for SaaS

UNIQUE Business for SaaS UNIQUE The solution for your business with more control and security when accessin your Cloud network. UNIQUE enables secure access control of all remote desktop structures and web services in the Cloud

More information

Data Mining for Knowledge Management. Classification

Data Mining for Knowledge Management. Classification 1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh

More information

Windows 2003 Security Hints

Windows 2003 Security Hints Windows 2003 Security Hints christoph.schnidri@csnc.ch Security Event April 28, 2004 Pae 1 Aenda The Power of Group Policies Local Policies Active Directory Services (Oranizational Units) Group Policy

More information

Data Mining with R. Decision Trees and Random Forests. Hugh Murrell

Data Mining with R. Decision Trees and Random Forests. Hugh Murrell Data Mining with R Decision Trees and Random Forests Hugh Murrell reference books These slides are based on a book by Graham Williams: Data Mining with Rattle and R, The Art of Excavating Data for Knowledge

More information

ACO and PSO Algorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks

ACO and PSO Algorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks 2012 International Conference on Networks and Information (ICNI 2012) IPCSIT vol. 57 (2012) (2012) IACSIT Press, Sinapore DOI: 10.7763/IPCSIT.2012.V57.02 ACO and PSO Alorithms Applied to Gateway Placement

More information

Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad Email: Prasad_vungarala@yahoo.co.in

Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad Email: Prasad_vungarala@yahoo.co.in 96 Business Intelligence Journal January PREDICTION OF CHURN BEHAVIOR OF BANK CUSTOMERS USING DATA MINING TOOLS Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad

More information

Professor Anita Wasilewska. Classification Lecture Notes

Professor Anita Wasilewska. Classification Lecture Notes Professor Anita Wasilewska Classification Lecture Notes Classification (Data Mining Book Chapters 5 and 7) PART ONE: Supervised learning and Classification Data format: training and test data Concept,

More information

How to Build a Private Data Classifier

How to Build a Private Data Classifier Building Decision Tree Classifier on Private Data Wenliang Du Zhijun Zhan Center for Systems Assurance Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244,

More information

RELIABILITY BASED MAINTENANCE (RBM) Using Key Performance Indicators (KPIs) To Drive Proactive Maintenance

RELIABILITY BASED MAINTENANCE (RBM) Using Key Performance Indicators (KPIs) To Drive Proactive Maintenance RELIABILITY BASED MAINTENANCE (RBM) Usin Key Performance Indicators (KPIs) To Drive Proactive Maintenance Robert Ford, CMRP GE Power Generation Services 4200 Wildwood Parkway, Atlanta, GA 30339 USA Abstract

More information

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption Efficient and Provably Secure Ciphers for Storae Device Block evel Encryption Yulian Zhen SIS Department, UNC Charlotte yzhen@uncc.edu Yone Wan SIS Department, UNC Charlotte yonwan@uncc.edu ABSTACT Block

More information

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Weather forecast prediction: a Data Mining application

Weather forecast prediction: a Data Mining application Weather forecast prediction: a Data Mining application Ms. Ashwini Mandale, Mrs. Jadhawar B.A. Assistant professor, Dr.Daulatrao Aher College of engg,karad,ashwini.mandale@gmail.com,8407974457 Abstract

More information

Distributed forests for MapReduce-based machine learning

Distributed forests for MapReduce-based machine learning Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication

More information

Efficient Integration of Data Mining Techniques in Database Management Systems

Efficient Integration of Data Mining Techniques in Database Management Systems Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France

More information

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES Bruno Carneiro da Rocha 1,2 and Rafael Timóteo de Sousa Júnior 2 1 Bank of Brazil, Brasília-DF, Brazil brunorocha_33@hotmail.com 2 Network Engineering

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

Delivering Value, Security, and Speed with BPM in the Cloud

Delivering Value, Security, and Speed with BPM in the Cloud Deliverin Value, Security, and Speed with BPM in the Cloud BPM Software in the cloud enables strateic process improvement, reduced technoloy cost, and better alinment of IT with business oals. Strateic

More information

Data Mining & Data Stream Mining Open Source Tools

Data Mining & Data Stream Mining Open Source Tools Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol The International Arab Journal of Information Technoloy, Vol. 5, No. 1, January 2008 25 Internet Connectivity for Mobile Ad Hoc Networks Usin Hybrid Adaptive Mobile Aent Protocol Velmuruan Ayyadurai 1

More information

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool. International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm

More information

Experiments in Web Page Classification for Semantic Web

Experiments in Web Page Classification for Semantic Web Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address

More information

Performance of KDB-Trees with Query-Based Splitting*

Performance of KDB-Trees with Query-Based Splitting* Performance of KDB-Trees with Query-Based Splitting* Yves Lépouchard Ratko Orlandic John L. Pfaltz Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science University of Virginia Illinois

More information

Healthcare Data Mining: Prediction Inpatient Length of Stay

Healthcare Data Mining: Prediction Inpatient Length of Stay 3rd International IEEE Conference Intelligent Systems, September 2006 Healthcare Data Mining: Prediction Inpatient Length of Peng Liu, Lei Lei, Junjie Yin, Wei Zhang, Wu Naijun, Elia El-Darzi 1 Abstract

More information

Introducing diversity among the models of multi-label classification ensemble

Introducing diversity among the models of multi-label classification ensemble Introducing diversity among the models of multi-label classification ensemble Lena Chekina, Lior Rokach and Bracha Shapira Ben-Gurion University of the Negev Dept. of Information Systems Engineering and

More information

HPC Scheduling & Job Prioritization WHITEPAPER

HPC Scheduling & Job Prioritization WHITEPAPER HPC Schedulin & Job Prioritization WHITEPAPER HPC Schedulin & Job Prioritization Table of contents 3 Introduction 3 The Schedulin Cycle 5 Monitorin The Schedulin Cycle 6 Conclusion 2 HPC Schedulin & Job

More information

D-optimal plans in observational studies

D-optimal plans in observational studies D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Implementation of Data Mining Techniques to Perform Market Analysis

Implementation of Data Mining Techniques to Perform Market Analysis Implementation of Data Mining Techniques to Perform Market Analysis B.Sabitha 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, P.Balasubramanian 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Knowledge Based Context Awareness Network Security For Wireless Networks

Knowledge Based Context Awareness Network Security For Wireless Networks Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness

More information

IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA

IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA International Conference on Computer Science, Electronics & Electrical Engineering-0 IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA Pavan M N, Manjula G Dept Of ISE,

More information

Optimization of Image Search from Photo Sharing Websites Using Personal Data

Optimization of Image Search from Photo Sharing Websites Using Personal Data Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search

More information

Technical Report Documentation Page 2. Government Accession No. 3. Recipient s Catalog No.

Technical Report Documentation Page 2. Government Accession No. 3. Recipient s Catalog No. 1. Report No. Technical Report Documentation Pae 2. Government Accession No. 3. Recipient s Catalo No. FHWA/TX-03/4386-1 4. Title and Subtitle DEVELOPMENT OF A TOOL FOR EXPEDITING HIGHWAY CONSTRUCTION

More information