A Survey on Privacy Preserving Decision Tree Classifier
|
|
|
- Simon Stafford
- 10 years ago
- Views:
Transcription
1 A Survey on Classifier Tejaswini Pawar*, Prof. Snehal Kamalapur ** * Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ** Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ABSTRACT In recent year s privacy preservation in minin has become an important issue. A new class of minin method called privacy preservin minin alorithm has been developed. The aim of these alorithms is protectin the sensitive information in while extractin knowlede from lare amount of. The extracted knowlede is enerally expressed in the form of cluster, decision tree or association rule allow one to mine the information. Several modification technique like randomization method, anonymization method, distributed privacy technique have been developed to incorporatin privacy mechanism and allow to hide sensitive pattern or itemset before minin process is executed. This paper mainly focuses on eneral classification technique decision tree classifier for preservin privacy. It presents a survey on decision tree learnin on various privacy techniques. Keywords - Data Minin, Classifiers, Perturbation, Data Minin, Splittin Criteria I. INTRODUCTION Data minin is a recently emerin field, connectin the three worlds of bases, statistics and artificial intellience. Data minin is the process of extractin knowlede or pattern from lare amount of. It is widely used by researchers for science and business process. Data collected from information providers are important for pattern reoranization and decision makin. The collection process takes time and efforts hence sample sets are sometime stored for reuse. However attacks are attempted to steal these sample sets and private information may be leaked from these stolen sets. Therefore privacy preservin minin are developed to convert sensitive sets into sanitized version in which private or sensitive information is hidden from unauthorized retrievers. preservin minin refers to the area of minin that seeks to safeuard sensitive information from unsanctioned or unsolicited disclosure. Preservation Data Minin [1] [2] was introducin to preserve the privacy durin minin process to enable conventional minin technique. Many privacy preservation approaches were developed to protect private information of sample set. The rest of this paper is structured as follows: the next section describes tree classifier and ives brief introduction about decision tree alorithm. Section 3 introduces different privacy preservation technique throuh decision tree approach. Section 4 provides an overall summary of this paper, and suests directions for further research on this topic. II. DECISION TREE CLASSIFIER A decision tree[3][4][5] is defined as a predictive modelin technique from the field of machine learnin and statistics that builds a simple tree-like structure to model the underlyin pattern of. tree is one of the popular methods is able to handle both cateorical and numerical and perform classification with less computation. trees are often easier to interpret. tree is a classifier which is a directed tree with a node havin no incomin edes called root. All the nodes except root have exactly one incomin ede. Each non-leaf node called internal node or splittin node contains a decision and most appropriate taret value assined to one class is represented by leaf node. tree classifier is able to break down a complex decision makin process into collection of simpler decision. The complex decision is subdivided into simpler decision on the basis of splittin criteria. It divides whole trainin set into smaller subsets. Information ain, ain ratio, ini index are three basic splittin criteria to select attribute as a splittin point. trees can be built from historical they are often used for explanatory analysis as well as a form of supervision learnin. The alorithm is desin in such a way that it works on all the that is available and as perfect as possible. Accordin to Breiman et al. [6] the tree complexity has a crucial effect on its accuracy performance. The tree complexity is explicitly controlled by the prunin method employed and the stoppin criteria used. Usually, the tree complexity is measured by one of the followin metrics: The total number of nodes; Total number of leaves; depth; 843 P a e
2 Number of attributes used. tree induction is closely related to rule induction. Each path from the root of a decision tree to one of its leaves can be transformed into a rule simply by conjoinin the tests alon the path to form the antecedent part, and takin the leaf s class prediction as the class value. The resultin rule set can then be simplified to improve its accuracy and comprehensibility to a human user [7]. Flowchart for tree based classification is shown in Fi.1 Start Sample set If all instance into same class Return the class Fi. 2 A framework for privacy preservin decision tree minin The splittin ceases when the number of instances to be split is below a certain threshold. C4.5 can handle numeric attributes. It perform error based prunin after rowin phase. It can use corrected ain ratio induce from a trainin set that incorporates missin values. III. PRIVACY PRESERVING DECISION TREE LEARNING This section explores the privacy preservation decision tree learnin techniques in which firstly is modified by usin different modification and perturbation-based approaches and then decision tree minin is applied to modified or sanitized set.fi.2 shows a framework for privacy preservin decision tree minin Select hihest information attribute Divide the set usin that attribute Fi.1. Flowchart for tree based classification End Hyafil and Rivest proved that ettin the optimal tree is NP-complete [8]. Most alorithms employ the reedy search and the divide-and-conquer approach to row a tree. In particular, the trainin set continues to be split in small. ID3 [4] and C4.5 [4] [9] adopt a reedy approach in which decision trees are constructed in top down recursive divide and conquer manner. ID3 was one of the first tree alorithms. It works on wide variety of problems in both academia and industry and has been modified improved and borrowed from many times over. ID3 picks splittin value and predicators on the basis of ain in information that the split or splits provide. Gain represents difference between the amount of information that is needed to correctly make a prediction both before and after the split has been made. Information ain is defined as the difference between the entropy of oriinal sement and accumulated entropies of the resultin split sement. C4.5 [9] is an extension of ID3, presented by the same author (Quinlan, 1993). It uses ain ratio as splittin criteria. A. - Minin Based on Random Substitutions: Inspired by the fact that the pioneerin privacypreservin decision tree minin method of [1] was flawed [11], Jim Dowd, Shouhuai Xu, and Weinin Zhan [10] explored a random substitution perturbation technique for privacy-preservin decision tree minin methods. This perturbation technique is based on a different privacy measure called ρ1-to-ρ2 privacy breachin [12] and a special type of perturbation matrix called the γ-diaonal matrix [13].They makes several contributions towards privacy-preservin decision tree minin. A novel error reduction technique is introduced for reconstruction, so that it not only prevents a critical problem caused by a lare perturbation matrix, but also uarantees a strictly better accuracy. In addition, the resultin privacy-preservin decision tree minin method has immune to the relevant recovery and repeated-perturbation attacks which were not accommodated in the model of [12]. It ensures that the decision trees learned from the perturbed are quite accurate compared with those learned from the oriinal. The parameters include: (1) assurance metric γ, (2) Dimension size N of perturbation matrix, which affects the accuracy of reconstructed as well as performance, and (3) Entropy of a perturbation matrix, which, to some extent, can encompass the effect of both γ and N. It is showed that one can achieve the desired trade-off between accuracy, privacy, and performance by selectin an appropriate N. Oriinal Dataset Perturbation Perturbed Dataset Reconstruction Reconstruct ed Dataset Minin Perturbation Matrix 844 P a e
3 B. A Noise Addition Scheme in for Data Minin [14]: Mohammad Ali Kadampur, Somayajulu D.V.L.N. propose a stratey that protects the privacy durin decision tree analysis of minin process. It is basically a noise addition framework specifically tailored toward classification task in minin. They propose to add specific noise to the numeric attributes after explorin the decision tree of the oriinal. The obfuscated then is presented to the second party for decision tree analysis. The decision tree obtained on the oriinal and the obfuscated are similar but by usin this method the proper is not revealed to the second party durin the minin process and hence the privacy will be preserved. The method also preserves averaes and few other statistical parameters thus makin the modified set useful for both minin and statistical purposes. This paper uses Quinlan's [15] C5.0 decision tree builder on the selected set [16] and obtain the decision tree of the oriinal set and a unique method of listin the nodes (attributes) that we touch in the path from the root of the tree to the leaf, then use a noise addition stratey for each of the attributes. The approach taken in this paper interates both cateorical and numeric types and focuses on privacy preservin durin decision tree analysis. The noise addition methods used are effective in preservin the privacy of the proper and producin prediction accuracies on par with the oriinal set. Noise addition technique is the ability to maintain ood quality and ensure individual privacy. This approach deals only with the classification task so this approach is addressin the issue of privacy preservin minin partially. More experiments are to be conducted on security level measurement and quality. C. - s over Vertically Partitioned Data: Jaideep Vaidya, Chris Clifton, Murat Kantarciolu and A. Scott Patterson [17] introduce a - s over Vertically Partitioned Data, eneralized privacy-preservin variant of the ID3 alorithm for vertically partitioned distributed over two or more parties. The alorithm as presented in this paper is workin proram is a sinificant step forward in creatin usable, distributed, privacy preservin -minin alorithms. This paper presents a new protocol to construct a decision tree on vertically partitioned with an arbitrary number of parties where only one party has the class attribute. It presents a eneral framework for constructin a system in which distributed classification would work. It serves to show that the methods can actually be built and are feasible. This work provides an upper bound on the complexity of buildin privacy preservin decision trees. Sinificant work is required to find a tiht upper bound on the complexity. D. Minin from Perturbed Data: In this paper, Li Liu, Murat Kantarciolu and Bhavani Thuraisinham [18] propose a new perturbation based technique to modify the minin alorithms. They build a classifier for the oriinal set from the perturbed trainin set. This paper proposed a modified C4.5 [9] decision tree classifier which is suitable for privacy preservin minin can be used to classify both the oriinal and the perturbed. This technique considers the splittin point of the attribute as well as the bias of the noise set as well. It calculates the bias whenever try to find the best attribute, the best split point and partition the trainin. This alorithm is based on the perturbation scheme, but skips the steps of reconstructin the oriinal distribution. The proposed technique has increased the privacy protection with less computation time. as a security issue in minin area is still a challene. E. Learnin Usin Unrealized Data Sets: Pui K. Fon and Jens H. Weber-Jahnke [19] introduce a new perturbation and randomization based approach that protects centralized sample sets utilized for decision tree minin. They introduced a new privacy preservin approach via set complementation. Dataset complementation confirms the utility of trainin sets for decision tree learnin. This approach converts the oriinal sample sets into a roup of unreal sets. The oriinal samples cannot be reconstructed without the entire roup of unreal sets. An accurate decision tree can be built directly from those unreal sets. This novel approach can be applied directly to the storae as soon as the first sample is collected and applied at any time durin the collection process. In order to mitiate the threat of their inadvertent disclosure or theft, privacy preservation is applied to sanitize the samples prior to their release to third parties. In contrast to other sanitization methods, this technique does not affect the accuracy of minin results. The decision tree can be built directly from the sanitized sets, no need to be reconstructin the oriinal set. The set reconstruction alorithm is eneric hence privacy preservation via set complementation fails if all trainin sets were leaked. This limitation need to be overcome by applyin technique like encryption. This technique requires extra storae for storin perturbed and complement of sample set. So optimizin the storae size of the unrealized samples needs to be explored. 845 P a e
4 IV. CONCLUSION In this paper, we present a decision tree classification technique. We have surveyed different approaches used in evaluatin the effectiveness of privacy preservin minin alorithms usin decision tree classifier. The work presents in this paper indicates the ever increasin interest of researchers in the area of securin sensitive and knowlede from malicious users. Many privacy preservin alorithms of decision tree minin are proposed by researchers however, privacy preservin technoloy needs to be further researched because of the complexity of the privacy problem. We conclude privacy preservin decision tree minin alorithms by analyzin the existin work in the table.1and make some remark. Future research need to be developed to work on these remarks. Sr. No Technique Purpose Remark - Minin Based on Random Substituti ons A Noise Addition Scheme in for Data Minin - s over Vertically Partitione d Data Author presented a perturbation technique based on random substitutions & showed that the resultin privacypreservin decision tree minin method is immune to attacks that are seeminly relevant. Propose to add specific noise to the numeric attributes after explorin the decision tree of the oriinal. Proper is not revealed to the second party durin the minin process Tackled the problem of classification & introduced a eneralized privacy preservin variant of the ID3 alorithm for vertically partitioned distributed Extra storae required for storin perturbati on matrix, do not make strict tradeoffs between preservati on of sample utility and privacy It works on numerical only, need to work on quality and security level measurem ent. Required to find a tiht upper bound on the complexit y 4 5 Minin from Perturbed Data Learnin Usin Unrealize d Data Sets over two or more parties A new perturbation based technique proposed a modified C4.5 decision tree classifier New perturbation and randomization based approach via set complementation Need various ways to build classifiers which can be used to classify the perturbed set. Requires extra storae for storin perturbed and compleme nt of sample set and fails if all trainin were leaked sets REFERENCES [1] R. Arawal and R. Srikant. preservin minin. In ACM SIGMOD International Conference on Manaement of Data, paes ACM, [2] Y. Lindell and B. Pinkas. preservin minin. In Advances in Cryptoloy, volume 1880 of Lecture Notes in Computer Science, paes Spriner-Verla, [3] Lior Rokach and Oded Maimon Top- Down Induction of s Classifiers A Survey, IEEE TRANSACTIONS ON SYSTEMS, MAN AND CYBERNETICS: PART C, VOL. 1, NO. 11, NOVEMBER 2002 [4] Jiawei Han, Micheline Kamber, Data Minin: Concepts and Techniques, Moran Kaufmann, [5] Lior Rokach, Oded Maimon Data Minin and Knowlede Discovery Handbook Second edition paes , Spriner Science + Business Media,2010 [6] L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Reression s. Wadsworth Int. Group, [7] J.R. Quinlan, Simplifyin decision trees, International Journal of Man- Machine Studies, 27, , P a e
5 [8] L. Hyafil and R. L. Rivest, "Constructin Optimal Binary s is {NP}- Complete," Inf. Process. Lett, vol. 5, pp , [9] J. R. Quinlan. C4.5: Prorams for Machine Learnin. Moran Kaufmann, [10] J. Dowd, S. Xu, and W. Zhan, - Minin Based on Random Substitions, Proc. Int l Conf. Emerin Trends in Information and Comm. Security (ETRICS 06), pp , [11] Hillol Karupta, Souptik Datta, Qi Wan, and Krishnamoorthy Sivakumar. On the privacy preservin properties of random perturbation techniques. In IEEE International Conference on Data Minin, [12] A. Evfimievski, J. Gehrke, and R. Srikant. Limitin privacy breachin in privacy preservin minin. In ACM Symposium on Principles of Database Systems, paes ACM, [13] Shipra Arawal and Jayant R. Haritsa. A framework for hih-accuracy privacypreservin minin. In IEEE International Conference on Data Enineerin, [14] Mohammad Ali Kadampur, Somayajulu D.V.L.N., A Noise Addition Scheme in for Data Minin, Journal of Computin, Vol 2, Issue 1, January 2010, ISSN [15] Lian Liu.,Jie Wan.,Jun Zhan., ``Wavelet based perturbation for simultaneous privacy preservin and statistics preservin.,'' In Proceedins of IEEE International Conference on Data Minin workshop., [16] Charu C Arwal.,Philip S Yu., preservin minin models and Alorithms., Spriner Science+Business media.,llc [17] J. Vaidya and C. Clifton. preservin decision trees over vertically partitioned. In Proceedins of the 19th Annual IFIP WG 11.3 Workin Conference on Data and Applications Security, Storrs,Connecticut, Spriner. L. Liu, M. Kantarciolu, and B. Thuraisinham, Minin from Perturbed Data, Proc. 42 nd Hawaii Int l Conf. System Sciences (HICSS 09), [18] Pui K. Fon and Jens H. Weber-Jahnke, Learnin Usin Unrealized Data Sets. IEEE Transl. on knowlede and enineerin, vol. 24, no. 2, February P a e
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
Listwise Approach to Learning to Rank - Theory and Algorithm
Fen Xia* [email protected] Institute of Automation, Chinese Academy of Sciences, Beijin, 100190, P. R. China. Tie-Yan Liu [email protected] Microsoft Research Asia, Sima Center, No.49 Zhichun Road, Haidian
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
Classification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
AnalysisofData MiningClassificationwithDecisiontreeTechnique
Global Journal of omputer Science and Technology Software & Data Engineering Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
Save thousands with the complete e-document distribution solution
Albany econnect Save thousands with the complete e-document distribution solution The UK s leadin provider of electronic document distribution software Since 1989, Albany Software has been developin software
Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification
Feature vs. Classifier Fusion for Predictive Data Mining a Case Study in Pesticide Classification Henrik Boström School of Humanities and Informatics University of Skövde P.O. Box 408, SE-541 28 Skövde
Strategies for Reducing the Risk of ecommerce Fraud
October 2010 Strateies for Reducin the Risk of ecommerce Fraud Fraud techniques are constantly evolvin, and new data breaches are reported every day are your online security practices adaptin rapidly enouh?
A HyFlex Module for the Personnel Scheduling Problem
A HyFle Module for the Personnel Schedulin Problem Tim Curtois, Gabriela Ochoa, Matthew Hyde, José Antonio Vázquez-Rodríuez Automated Schedulin, Optimisation and Plannin (ASAP) Group, School of Computer
Performance Analysis of Decision Trees
Performance Analysis of Decision Trees Manpreet Singh Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India Sonam Sharma CBS Group of Institutions, New Delhi,India
ON AN APPROACH TO STATEMENT OF SQL QUESTIONS IN THE NATURAL LANGUAGE FOR CYBER2 KNOWLEDGE DEMONSTRATION AND ASSESSMENT SYSTEM
216 International Journal "Information Technoloies & Knowlede" Volume 9, Number 3, 2015 ON AN APPROACH TO STATEMENT OF SQ QUESTIONS IN THE NATURA ANGUAGE FOR CYBER2 KNOWEDGE DEMONSTRATION AND ASSESSMENT
A Multiagent Based System for Resource Allocation and Scheduling of Distributed Projects
International Journal of Modelin and Optimization, Vol. 2, No., Auust 2012 A Multiaent Based System for Resource Allocation and Schedulin of Distributed Projects Sunil Adhau and M. L. Mittal Abstract In
On the Influence of the Prediction Horizon in Dynamic Matrix Control
International Journal of Control Science and Enineerin 203, 3(): 22-30 DOI: 0.5923/j.control.203030.03 On the Influence of the Prediction Horizon in Dynamic Matrix Control Jose Manue l Lope z-gue de,*,
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Decision Tree Learning on Very Large Data Sets
Decision Tree Learning on Very Large Data Sets Lawrence O. Hall Nitesh Chawla and Kevin W. Bowyer Department of Computer Science and Engineering ENB 8 University of South Florida 4202 E. Fowler Ave. Tampa
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS
ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS Abstract D.Lavanya * Department of Computer Science, Sri Padmavathi Mahila University Tirupati, Andhra Pradesh, 517501, India [email protected]
Impacts of Manufacturing Sector on Economic Growth in Ethiopia: A Kaldorian Approach
Available online at http://www.journaldynamics.or/jbems Journal of Business Economics and Manaement Sciences Vol. 1(1), pp.1-8, December 2014 Article ID: JBEMS14/011 2014 Journal Dynamics Oriinal Research
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
SPSS WebApp Framework
SPSS WebApp Framework Solve business problems with customized, Web-based, analytical applications powered by SPSS Solve business problems with SPSS WebApp applications Predictin the best course of action
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION
A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION Carlos Eduardo Thomaz Department of Electrical Enineerin, Centro Universitario da FEI, FEI, Sao Paulo, Brazil
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Effective Data Mining Using Neural Networks
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
S i m p l i c i t y c o n t r o l P o w e r. Alcatel-Lucent OmniTouch Contact Center Premium Edition
Alcatel-Lucent OmniTouch Contact Center Premium Edition Enablin onoin visual trackin of contact center activities S i m p l i c i t y c o n t r o l P o w e r Can you UNDERSTAND, ANTICIPATE and RESPOND
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules
Performing Data Mining in (SRMS) through Vertical Approach with Association Rules Mr. Ambarish S. Durani 1 and Miss. Rashmi B. Sune 2 MTech (III rd Sem), Vidharbha Institute of Technology, Nagpur, Nagpur
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
Data Mining: A Preprocessing Engine
Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm
Privacy-Preserving Mining of Association Rules On Cloud by improving Rob Frugal Algorithm Mr.Vishal R. Redekar Department of Computer Engineering Smt.Kashibai Navale College of Engineering Pune-411041,
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model ABSTRACT Mrs. Arpana Bharani* Mrs. Mohini Rao** Consumer credit is one of the necessary processes but lending bears
Synergy supports your network
Synery supports your network Silver Systems Manaement Silver Volume Licensin SYNERGY Global Reach, Local Service. Yours is a successful, midmarket company. You depend upon computers and your network to
Data Mining and Database Systems: Where is the Intersection?
Data Mining and Database Systems: Where is the Intersection? Surajit Chaudhuri Microsoft Research Email: [email protected] 1 Introduction The promise of decision support systems is to exploit enterprise
Comparison of Data Mining Techniques used for Financial Data Analysis
Comparison of Data Mining Techniques used for Financial Data Analysis Abhijit A. Sawant 1, P. M. Chawan 2 1 Student, 2 Associate Professor, Department of Computer Technology, VJTI, Mumbai, INDIA Abstract
Principles of Assessment and Reporting in NSW Public Schools
NSW DEPARTMENT OF EDUCATION & TRAINING Auust 2008 nt sme Lea rn portin Re Principles Assessment and Reportin in NSW Public Schools in Ass es to p a re nts Preamble Backround Underpinnin the development
Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing
www.ijcsi.org 198 Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing oei 1 and Jiayang Wang 2 1 School of Information Science and Engineering, Central South University
Mining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
Data Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
REVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
BPM for Information Technology Transforming IT through Business Process Management
white paper BPM for Information Technoloy Transformin IT throuh Business Process Manaement This paper is intended for CIOs, IT Executives and Senior IT Manaers interested in understandin more about the
UNIQUE Business for SaaS
UNIQUE The solution for your business with more control and security when accessin your Cloud network. UNIQUE enables secure access control of all remote desktop structures and web services in the Cloud
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Data Mining with R. Decision Trees and Random Forests. Hugh Murrell
Data Mining with R Decision Trees and Random Forests Hugh Murrell reference books These slides are based on a book by Graham Williams: Data Mining with Rattle and R, The Art of Excavating Data for Knowledge
ACO and PSO Algorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks
2012 International Conference on Networks and Information (ICNI 2012) IPCSIT vol. 57 (2012) (2012) IACSIT Press, Sinapore DOI: 10.7763/IPCSIT.2012.V57.02 ACO and PSO Alorithms Applied to Gateway Placement
Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad Email: [email protected]
96 Business Intelligence Journal January PREDICTION OF CHURN BEHAVIOR OF BANK CUSTOMERS USING DATA MINING TOOLS Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad
Professor Anita Wasilewska. Classification Lecture Notes
Professor Anita Wasilewska Classification Lecture Notes Classification (Data Mining Book Chapters 5 and 7) PART ONE: Supervised learning and Classification Data format: training and test data Concept,
Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption
Efficient and Provably Secure Ciphers for Storae Device Block evel Encryption Yulian Zhen SIS Department, UNC Charlotte [email protected] Yone Wan SIS Department, UNC Charlotte [email protected] ABSTACT Block
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Weather forecast prediction: a Data Mining application
Weather forecast prediction: a Data Mining application Ms. Ashwini Mandale, Mrs. Jadhawar B.A. Assistant professor, Dr.Daulatrao Aher College of engg,karad,[email protected],8407974457 Abstract
Distributed forests for MapReduce-based machine learning
Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication
Efficient Integration of Data Mining Techniques in Database Management Systems
Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES Bruno Carneiro da Rocha 1,2 and Rafael Timóteo de Sousa Júnior 2 1 Bank of Brazil, Brasília-DF, Brazil [email protected] 2 Network Engineering
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
Data Mining & Data Stream Mining Open Source Tools
Data Mining & Data Stream Mining Open Source Tools Darshana Parikh, Priyanka Tirkha Student M.Tech, Dept. of CSE, Sri Balaji College Of Engg. & Tech, Jaipur, Rajasthan, India Assistant Professor, Dept.
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
The International Arab Journal of Information Technoloy, Vol. 5, No. 1, January 2008 25 Internet Connectivity for Mobile Ad Hoc Networks Usin Hybrid Adaptive Mobile Aent Protocol Velmuruan Ayyadurai 1
Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm
Experiments in Web Page Classification for Semantic Web
Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address
Healthcare Data Mining: Prediction Inpatient Length of Stay
3rd International IEEE Conference Intelligent Systems, September 2006 Healthcare Data Mining: Prediction Inpatient Length of Peng Liu, Lei Lei, Junjie Yin, Wei Zhang, Wu Naijun, Elia El-Darzi 1 Abstract
Introducing diversity among the models of multi-label classification ensemble
Introducing diversity among the models of multi-label classification ensemble Lena Chekina, Lior Rokach and Bracha Shapira Ben-Gurion University of the Negev Dept. of Information Systems Engineering and
HPC Scheduling & Job Prioritization WHITEPAPER
HPC Schedulin & Job Prioritization WHITEPAPER HPC Schedulin & Job Prioritization Table of contents 3 Introduction 3 The Schedulin Cycle 5 Monitorin The Schedulin Cycle 6 Conclusion 2 HPC Schedulin & Job
D-optimal plans in observational studies
D-optimal plans in observational studies Constanze Pumplün Stefan Rüping Katharina Morik Claus Weihs October 11, 2005 Abstract This paper investigates the use of Design of Experiments in observational
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Implementation of Data Mining Techniques to Perform Market Analysis
Implementation of Data Mining Techniques to Perform Market Analysis B.Sabitha 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, P.Balasubramanian 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Knowledge Based Context Awareness Network Security For Wireless Networks
Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness
IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA
International Conference on Computer Science, Electronics & Electrical Engineering-0 IMPROVED MASK ALGORITHM FOR MINING PRIVACY PRESERVING ASSOCIATION RULES IN BIG DATA Pavan M N, Manjula G Dept Of ISE,
Optimization of Image Search from Photo Sharing Websites Using Personal Data
Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search
Technical Report Documentation Page 2. Government Accession No. 3. Recipient s Catalog No.
1. Report No. Technical Report Documentation Pae 2. Government Accession No. 3. Recipient s Catalo No. FHWA/TX-03/4386-1 4. Title and Subtitle DEVELOPMENT OF A TOOL FOR EXPEDITING HIGHWAY CONSTRUCTION
