Privacy Preserving Classification of heterogeneous Partition Data through ID3 Technique

Size: px
Start display at page:

Download "Privacy Preserving Classification of heterogeneous Partition Data through ID3 Technique"

Transcription

1 Privacy Preserving Classification of heterogeneous Partition Data through ID3 Technique Saurabh Karsoliya 1 B.Tech. (CSE) MANIT, Bhopal, M.P., INDIA Abstract: The goal of data mining is to extract or mine knowledge from large amounts of data. For information Extraction this knowledge several data mining classification techniques are used. ID3 algorithm is widely used technique in this classification arena. ID3 Algorithm classifies data by creating decision tree over heterogeneously partitioned data. In this paper we propose vertically partitioned micro array data along with preserving privacy by different methods of privacy preserving i.e. secure multi party computation However, micro data is often collected by several different sites. Privacy, legal and commercial concerns restrict centralized access to this data. Together, these enable the secure mining of knowledge. We focus on the problem of decision tree learning with the popular ID3 algorithm. We consider that database is vertically Partitioned into two pieces. Database which is considered is Micro array data that is heterogeneously classified. Keywords: Privacy Preserving, ID3, Decision tree, Classification, Micro array Data. 1. INTRODUCTION In data mining knowledge are extracted through different technique such as classification, clustering, association etc. The ID3 algorithm is a standard, popular, and simple method for data classification and decision tree creation. it is developed by J. R. Quinlan, also known as Ross Quinlan [3]. Since privacy-preserving data mining should be taken into consideration, several secure multi-party computation protocols have been presented based on this technique [2]. In this paper every extraction of knowledge is comes out in terms of decision tree, the input for the decision tree creation is the micro array data. Decision tree is a rooted tree containing nodes and edges. In which each internal node is a test Node and corresponds to an attribute; the edges leaving a node correspond to the possible values taken on by that attribute. For example, the attribute Home-Owner would have two edges leaving it, one for Yes and one for No. Finally, the leaves of the tree contain the expected class value for transactions matching the path from the root to that leaf [3]. The basic building block of the ID3 algorithm is used through entropy and Gini index protocol for creation of the tree [3, 4]. There are two main operations during tree building to obtain the information Gain: Step 1: Evaluation of splits for each attribute and selection of the best split Step 2: Creation of partitions using the best split. Having determined the overall best split, partitions can be created by a simple application of the splitting criterion to the data. Entropy and Gini Index are two protocols which compute Information-Gain at each step for producing a decision tree. The Gini Index, however, has been less studied in privacy-preserving data mining for classifying the Micro array data. The formula used for calculation of Entropy and Gini are as follows Where Pj is the relative frequency of class j in S. Based on the entropy or the gini index, we can compute the information gain if attribute A is used to partition the data set S Where v represents any possible values of attribute A; Sv is the subset of S for which attribute A has value v; Sv is the number of elements in Sv; S is the number of elements in S. In Gini index splits are done in such that the largest class goes into one pure node while the other classes go into the other node. Entropy normally tries to create balanced tree. In this paper, we proposed that how Gini can be used in privacy-preserving classification of DNA Microarry data in ID3 algorithms to create decision tree. ID3 worked iteratively, it uses top-down traversing approach where initially all training cases belong to a single root node which is then successively split to form a tree. Building of decision tree with ID3 algorithm Volume 1, Issue 4 November - December 2012 Page 135

2 Step 1: Select the attribute with the most Information gain. Step 2: Create the subset for each value of the Attribute. Step3: For each subset If not all the elements of the subset belongs to some class repeat the step 1-3 for the subset. Empirical evidence suggests that a correct decision tree is usually found more quickly by this iterative method than by forming a tree directly from the entire training set. As its well known that ID3 was designed for the condition where there are many attributes and the training set contains many objects, but where a reasonably good decision tree is required without much computation, as in DNA micro array a typical glass slide is used in which DNA molecules are fixed in an orderly manner at specific locations called spots (or features). A micro array may contain thousands of spots and each spot may contain a few million copies of identical DNA molecules that uniquely correspond to a gene [5]. The DNA in a spot may either be genomic DNA or short stretch of oligo-nucleotide strands that correspond to a gene. The spots are printed on to the glass slide by a robot or are synthesized by the process of photolithography [5,6]. Micro arrays may be used to measure gene expression in many ways, but one of the most popular applications is to compare expression of a set of genes from a cell maintained in a particular condition to the same set of genes from a reference cell. Family of algorithms for Top down Induction of Decision Trees The DNA Microarray data classification is done in such a way that involved parties that can jointly compute the gain value of each normal attribute without revealing their own private information to each other, while the database is vertically partitioned over two or more parties. Micro arrays have opened the possibility of creating data sets of molecular information to represent many systems of biological or clinical interest. Gene expression profiles can be used as inputs to large-scale data analysis, for example, to serve as fingerprints to build more accurate molecular classification, to discover hidden taxonomies or to increase our understanding of normal and disease states. The main types of data analysis needed to for biomedical applications include: Gene Selection in data mining terms this is a process of attribute selection, which finds the genes most strongly related to a particular class. Classification classifying diseases or predicting outcomes based on gene expression patterns, and perhaps even identifying the best treatment for given genetic signature. Classification involves finding rules that partition the data into disjoint groups. The input for the classification is the training data set, whose class labels are already known. It analyzes the training data set and constructs a model based on the class label. It is a kind of supervised learning because class field is known Real life Example of classification: the diagnosis of a medical condition from symptoms, in which the classes could be either the various disease states or the possible therapies; determining the game-theoretic value of a chess position, with the classes won for white, lost for white, and drawn; and deciding from atmospheric observations whether a severe thunderstorm is unlikely, possible or probable. Clustering finding new biological classes or refining existing ones. Gene Selection: this method is also used in DNA micro arrays data. Because the microarray dataset has many more features than records, the common statistical and machine learning procedures such as classification can lead to true discoveries due to random chance. The highlights of the common errors is identifying informative features and developing accurate classifiers, and shows the correct approach [2]. [3] Author presents a review of methods available in Microarray classification, which cover the full spectrum of micro array data analysis, including data preprocessing, experimental design, quality control, gene selection and differential expression analysis, classification, and clustering. One would expect that different datasets representing the same biological system will display some amount of invariant biological characteristics independent of the idiosyncrasies or details of the sample sources, the preparation procedures and the technological platforms used to obtain the data. These invariant biological characteristics, when properly captured and exposed, can provide the basis to build more robust, general and accurate classification models. To classify heterogeneous factors is based on IFs (impact factors) addresses this problem. The IFs provide a way to measure the variations between individual classes in train and test samples and can be integrated into standard classifiers such as Weighted Voting or k-nn resulting in a significantly improvement in the accuracy for classifying heterogeneous samples. 2. RELATED WORK In data mining knowledge are extracted through different technique such as classification, clustering, association etc. In early work in the field of Privacy Preserving Data Mining. problem propose a solution to the privacy Volume 1, Issue 4 November - December 2012 Page 136

3 preserving classification problem using the oblivious transfer protocol, a powerful tool developed by the secure multi-party computation studies [4]. The solution, however, only deals with the horizontally partitioned data and targets only for the ID3 algorithm (because it only emulates the computation of the ID3 algorithm). Another approach for solving the privacy preserving classification problem was proposed and also studied in [4, 6]. In this approach, each individual data item is perturbed and the distribution of the all data is reconstructed at an aggregate level. The technique works for those data mining algorithms that use the probability distributions rather than individual records. An example of classification algorithm which uses such aggregate information is also discussed [7]. information, but about different entities. An example of that would be grocery shopping data collected by different supermarkets (also known as market-basket data in the data mining literature) [11]. Figure below illustrates horizontal partitioning and shows the credit card databases of two diffrent (local) credit Unions. Taken together, one may that fraudulent customers often have similar Transaction histories, etc. Horizontally partitioned data is data which is homogeneously distributed, meaning that all data tuples yield over the same item or feature set. Essentially this boils down to different data sites collecting the same kind of information over different individuals. In Horizontal partitioned data: the database scheme is looking like the Figure 3.1 shown below, There has been research considering preserving privacy for other type of data mining. For instance, proposed a solution to the privacy preserving distributed Association mining problem is discussed in [6]. Secure Multi-party Computation. The problem we are studying is actually a special case of a more general problem, the Secure Multi-party Computation (SMC) problem. Briefly, a SMC problem deals with computing any function on any input, in a distributed network where each participant holds one of the inputs, while ensuring that no more information is revealed to a participant in the computation than can be inferred from that participant s input and output [8]. The SMC problem literature is extensive, having been introduced by [7] and expanded [6, 9]. It has been proved that for any function, there is a secure multiparty computation solution [4]. The approach used is as follows the function F to be computed is first represented as a combinatorial circuit, and then the parties run a short protocol for every gate in the circuit. Every participant gets corresponding shares of the input wires and the output wires for every gate. This approach, though appealing in its generality and simplicity, means that the size of the protocol depends on the size of the circuit, which depends on the size of the input. This is highly inefficient for large inputs, as in data mining [8]. It has been well accepted that for special cases of computations, special solutions should be developed for efficiency reasons. Therefore in each and every case either horizontal or vertical partition are considered but we proposed to consider vertical partition of DNA Micro array data over ID3 classification by preserving privacy also. 3. HORIZONTAL AND VERTICAL PARTITIONING In horizontal partitioning (a.k.a. homogeneous distribution), different sites collect the same set of Figure 3.1 Example: Consider for instance a supermarket chain which gathers information on the buying behavior of its customers. Typically, such a company has different branches, implying data to be horizontally distributed. Horizontal partitioning involves putting different rows into different tables. Perhaps customers with ZIP codes less than are stored in Customers-East, while customers with ZIP codes greater than or equal to are stored in Customers-West. The two partition tables are then Customers-East and Customers-West, while a view with a union might be created over both of them to provide a complete view of all customers. In this paper we proposed heterogeneously distributed data that is also known a s vertically partitioned data, in the data base system database can be partitioned into different types of partitioned such as horizontal partitioning, vertical and grid partitioning, that is the combination of both the partitioning horizontal and vertical also. In Vertically partitioned data: the database scheme is looking like the Figure 3.2 shown below, Volume 1, Issue 4 November - December 2012 Page 137

4 and Figure 5.1, the graph shows the comparison result of DNA dataset are shown below. Table 5.1 Figure 3.2 Vertical partitioning involves creating tables with fewer columns and using additional tables to store the remaining columns. Concept of database such as Normalization also involves this splitting of columns across tables, but vertical partitioning goes beyond that and partitions columns even when already normalized. Different physical storage might be used to realize vertical partitioning as well; storing infrequently used or very wide columns on a different device, for example, is a method of vertical partitioning. Done explicitly or implicitly, this type of partitioning is called "row splitting" (the row is split by its columns). A common form of vertical partitioning is to split (slow to find) dynamic data from (fast to find) static data in a table where the dynamic data is not used as often as the static. Creating a view across the two newly created tables restores the original table with a performance penalty, however performance will increase when accessing the static data e.g. for statistical analysis. Vertically distributed data is data which is heterogeneously distributed. Basically this means that data is collected by different sites or parties on the same individuals but with differing item or feature sets. Consider for instance financial institutions as banks and credit card companies, they both collect data on customers having a credit card but with differing item sets. Vertical partitioning is also known as heterogeneous distribution of data which implies that though different sites gather information about the same set of entities, they collect different feature sets. 4. IMPLEMENTATION To check the performance of the proposed algorithm, four different datasets are used to see how much communication overhead is caused by the proposed algorithm and algorithms by [1, 2]. 5. EXPERIMENTAL SETUP For testing the proposed algorithm four different datasets were used; DNA dataset taken from UCI Machine Learning Repository [11]. The DNA dataset consist of 150 entities, 3 classes and 4 attributes for each entity, the experiment is compared and is shown in the Table 5.1 No of DNA paira Horizotal Vertical Proposed Heterogeneous partitioned based method CONCLUSION Figure 5.1 Microarrays are a revolutionary new technology with great potential to provide accurate medical diagnostics help find the right treatment and cure for many diseases and provide a detailed genome-wide molecular portrait of cellular states. By considering the vertical partitioning of the data good decision tree can be created by using the ID3 classification algorithm so that accurate medical decision and diagnostics can be done to provide better cure for the diseases by creating decision tree on the basis of the gene Finding new insights into the molecular basis of biological processes and searching for new drugs and treatments is a problem of high complexity and where the techniques of molecular biology has been applied for many decades. The process is analogous to a large search of a few molecular entities, connections or relationships in a large sea of possibilities. We hope that this special issue on Microarray Data Mining will make more researchers interested in the field and its challenges and will be a contribution towards realizing the potential of microarrays for biology and medicine. Volume 1, Issue 4 November - December 2012 Page 138

5 REFERENCES [1] M.C. Doganay, T.B. Pederson, Y. Saygin, E. Savas and A. Levi. Distributed privacy preserving k- means clustering with additive secret sharing, Proceedings of the 2008 international workshop on Privacy and anonymity in information society. PAIS '08, pp , Mar [2] Jaideep Vaidya and Chris Clifton \Privacypreserving k - means clustering over vertically partitioned data,"proceedings of ninth ACM SIGKDD international Conference on Knowledge discovery and data mining. USA '03, pp , Dec [3] A. Rakesh and R. Srikant \Privacy- preserving data mining, "Proceedings Of the 2000 ACM SIGMOD International conference of Management of Data.USA, pp , Mar [4] Margaret H. Dunham, Data Mining - Introductory and Advanced Concepts, Person Education, [5] H Kargupta, S Datta,Q wang and K Siva Kumar\Random-data perturbation techniques and privacy-preserving data mining "IEEE conference on Knowledge and Information system on data mining. London, pp , sep [6] S.V. Kaya, T.B. Pedersen, E. Savas and Y Saygan \Efficient Privacy- preserving distributed clustering based on secret sharing, In PAKDD 2007 International Workshops: Emerging Technologies in Knowledge Discovery and data mining. Springer, pp , Mar [7] Random-permutation: /Random Permutation. [8] Pascal Pailliar. \Public key Cryptosystem based on composite degree residuosity class, "Advances in Cryptology EUROCRYPT 99 International Conference on Theory and Application of Cryptographic Techniques. pp , May [9] Jaideep Vaidya and Chris Clifton.\Privacypreserving association rules in vertically partitioned data."in Proceedings of Eighth ACMSIGKD international Conference on Knowledge discovery and data mining. CANADA '02, pp , july [10]Secure-multiparty-computation: multiparty computation. [11] Merz C J, Murphy P M, "UCI Repository of Machine Learning Database," Available mlearn/. Volume 1, Issue 4 November - December 2012 Page 139

PRIVACY-PRESERVING MULTI-PARTY DECISION TREE INDUCTION

PRIVACY-PRESERVING MULTI-PARTY DECISION TREE INDUCTION PRIVACY-PRESERVING MULTI-PARTY DECISION TREE INDUCTION Justin Z. Zhan, LiWu Chang, Stan Matwin Abstract We propose a new scheme for multiple parties to conduct data mining computations without disclosing

More information

Privacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases

Privacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases Privacy Preserving Two-Layer Decision Tree Classifier for Multiparty Databases Alka Gangrade T.I.T.-M.C.A. Technocrats Institute of Technology Bhopal, India alkagangrade@yahoo.co.in Ravindra Patel Dept.

More information

Agglomerative clustering on vertically partitioned data

Agglomerative clustering on vertically partitioned data Agglomerative clustering on vertically partitioned data R.Senkamalavalli Research Scholar, Department of Computer Science and Engg., SCSVMV University, Enathur, Kanchipuram 631 561 sengu_cool@yahoo.com

More information

Partition Based Perturbation for Privacy Preserving Distributed Data Mining

Partition Based Perturbation for Privacy Preserving Distributed Data Mining BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 2 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0015 Partition Based Perturbation

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Basic Data Mining Technique

Basic Data Mining Technique Basic Data Mining Technique What is classification? What is prediction? Supervised and Unsupervised Learning Decision trees Association rule K-nearest neighbor classifier Case-based reasoning Genetic algorithm

More information

Biclustering for Microarray Data: A Short and Comprehensive Tutorial

Biclustering for Microarray Data: A Short and Comprehensive Tutorial Biclustering for Microarray Data: A Short and Comprehensive Tutorial 1 Arabinda Panda, 2 Satchidananda Dehuri 1 Department of Computer Science, Modern Engineering & Management Studies, Balasore 2 Department

More information

MINING ASSOCIATION RULE FOR HORIZONTALLY PARTITIONED DATABASES USING CK SECURE SUM TECHNIQUE

MINING ASSOCIATION RULE FOR HORIZONTALLY PARTITIONED DATABASES USING CK SECURE SUM TECHNIQUE MINING ASSOCIATION RULE FOR HORIZONTALLY PARTITIONED DATABASES USING CK SECURE SUM TECHNIQUE Jayanti Danasana 1, Raghvendra Kumar 1 and Debadutta Dey 1 1 School of Computer Engineering, KIIT University,

More information

Prognosis of Lung Cancer Using Data Mining Techniques

Prognosis of Lung Cancer Using Data Mining Techniques Prognosis of Lung Cancer Using Data Mining Techniques 1 C. Saranya, M.Phil, Research Scholar, Dr.M.G.R.Chockalingam Arts College, Arni 2 K. R. Dillirani, Associate Professor, Department of Computer Science,

More information

PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES)

PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES) PRIVACY PRESERVING IN DISTRIBUTED DATABASE USING DATA ENCRYPTION STANDARD (DES) Jyotirmayee Rautaray 1, Raghvendra Kumar 2 School of Computer Engineering, KIIT University, Odisha, India 1 School of Computer

More information

Service-Oriented Architecture for Privacy-Preserving Data Mashup

Service-Oriented Architecture for Privacy-Preserving Data Mashup Service-Oriented Architecture for Privacy-Preserving Data Mashup Thomas Trojer a Benjamin C. M. Fung b Patrick C. K. Hung c a Quality Engineering, Institute of Computer Science, University of Innsbruck,

More information

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,

More information

Taxonomically Clustering Organisms Based on the Profiles of Gene Sequences Using PCA

Taxonomically Clustering Organisms Based on the Profiles of Gene Sequences Using PCA Journal of Computer Science 2 (3): 292-296, 2006 ISSN 1549-3636 2006 Science Publications Taxonomically Clustering Organisms Based on the Profiles of Gene Sequences Using PCA 1 E.Ramaraj and 2 M.Punithavalli

More information

BUILDING PRIVACY-PRESERVING C4.5 DECISION TREE CLASSIFIER ON MULTI- PARTIES

BUILDING PRIVACY-PRESERVING C4.5 DECISION TREE CLASSIFIER ON MULTI- PARTIES BUILDING PRIVACY-PRESERVING C4.5 DECISION TREE CLASSIFIER ON MULTI- PARTIES ALKA GANGRADE 1, RAVINDRA PATEL 2 1 Technocrats Institute of Technology, Bhopal, MP. 2 U.I.T., R.G.P.V., Bhopal, MP email alkagangrade@yahoo.co.in,

More information

Data Mining. 3.2 Decision Tree Classifier. Fall Instructor: Dr. Masoud Yaghini. Chapter 5: Decision Tree Classifier

Data Mining. 3.2 Decision Tree Classifier. Fall Instructor: Dr. Masoud Yaghini. Chapter 5: Decision Tree Classifier Data Mining 3.2 Decision Tree Classifier Fall 2008 Instructor: Dr. Masoud Yaghini Outline Introduction Basic Algorithm for Decision Tree Induction Attribute Selection Measures Information Gain Gain Ratio

More information

Reconstruction-based Classification Rule Hiding through Controlled Data Modification

Reconstruction-based Classification Rule Hiding through Controlled Data Modification Reconstruction-based Classification Rule Hiding through Controlled Data Modification Aliki Katsarou, Aris Gkoulalas-Divanis, and Vassilios S. Verykios Abstract In this paper, we propose a reconstruction

More information

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati

Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering

More information

Extra readings beyond the lecture slides are important:

Extra readings beyond the lecture slides are important: 1 Notes To preview next lecture: Check the lecture notes, if slides are not available: http://web.cse.ohio-state.edu/~sun.397/courses/au2017/cse5243-new.html Check UIUC course on the same topic. All their

More information

Chapter 1, Introduction

Chapter 1, Introduction CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from

More information

Credit card Fraud Detection using Predictive Modeling: a Review

Credit card Fraud Detection using Predictive Modeling: a Review February 207 IJIRT Volume 3 Issue 9 ISSN: 2396002 Credit card Fraud Detection using Predictive Modeling: a Review Varre.Perantalu, K. BhargavKiran 2 PG Scholar, CSE, Vishnu Institute of Technology, Bhimavaram,

More information

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1395

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1395 Data Mining Introduction Hamid Beigy Sharif University of Technology Fall 1395 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1395 1 / 21 Table of contents 1 Introduction 2 Data mining

More information

D B M G Data Base and Data Mining Group of Politecnico di Torino

D B M G Data Base and Data Mining Group of Politecnico di Torino DataBase and Data Mining Group of Data mining fundamentals Data Base and Data Mining Group of Data analysis Most companies own huge databases containing operational data textual documents experiment results

More information

Privacy Preserving Decision Tree Classification on Horizontal Partition Data

Privacy Preserving Decision Tree Classification on Horizontal Partition Data Privacy Preserving Decision Tree Classification on Horizontal Partition Kamini D. Tandel Shri S ad Vidya Mandal Institute of Technology Bharuch, Gujarat, India Jignasa N. Patel Shri S ad Vidya Mandal Institute

More information

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1394

Data Mining. Introduction. Hamid Beigy. Sharif University of Technology. Fall 1394 Data Mining Introduction Hamid Beigy Sharif University of Technology Fall 1394 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1394 1 / 20 Table of contents 1 Introduction 2 Data mining

More information

An Architecture for Privacy-preserving Mining of Client Information

An Architecture for Privacy-preserving Mining of Client Information An Architecture for Privacy-preserving Mining of Client Information Murat Kantarcioglu Jaideep Vaidya Department of Computer Sciences Purdue University 1398 Computer Sciences Building West Lafayette, IN

More information

Data mining fundamentals

Data mining fundamentals Data mining fundamentals Elena Baralis Politecnico di Torino Data analysis Most companies own huge bases containing operational textual documents experiment results These bases are a potential source of

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Randomized Response Technique in Data Mining

Randomized Response Technique in Data Mining Randomized Response Technique in Data Mining Monika Soni Arya College of Engineering and IT, Jaipur(Raj.) 12.monika@gmail.com Vishal Shrivastva Arya College of Engineering and IT, Jaipur(Raj.) vishal500371@yahoo.co.in

More information

Role of Association Rule Mining in DNA Microarray Data - A Research

Role of Association Rule Mining in DNA Microarray Data - A Research Role of Association Rule Mining in DNA Microarray Data - A Research T. Arundhathi Asst. Professor Department of CSIT MANUU, Hyderabad Research Scholar Osmania University, Hyderabad Prof. T. Adilakshmi

More information

1. Inroduction to Data Mininig

1. Inroduction to Data Mininig 1. Inroduction to Data Mininig 1.1 Introduction Universe of Data Information Technology has grown in various directions in the recent years. One natural evolutionary path has been the development of the

More information

International Journal of Modern Engineering and Research Technology

International Journal of Modern Engineering and Research Technology Volume 2, Issue 4, October 2015 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Privacy Preservation in Data Mining Using Mixed

More information

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan

More information

TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET

TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET Priya Kumari 1 and Seema Maitrey 2 1 M.Tech (CSE) Student KIET Group of Institution, Ghaziabad, U.P, 2 Assistant Professor KIET Group

More information

Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset

Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset M.Hamsathvani 1, D.Rajeswari 2 M.E, R.Kalaiselvi 3 1 PG Scholar(M.E), Angel College of Engineering and Technology, Tiruppur,

More information

Decision Trees Dr. G. Bharadwaja Kumar VIT Chennai

Decision Trees Dr. G. Bharadwaja Kumar VIT Chennai Decision Trees Decision Tree Decision Trees (DTs) are a nonparametric supervised learning method used for classification and regression. The goal is to create a model that predicts the value of a target

More information

Big Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1

Big Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1 Big Data Methods Chapter 5: Machine learning Big Data Methods, Chapter 5, Slide 1 5.1 Introduction to machine learning What is machine learning? Concerned with the study and development of algorithms that

More information

IJSER. Privacy and Data Mining

IJSER. Privacy and Data Mining Privacy and Data Mining 2177 Shilpa M.S Dept. of Computer Science Mohandas College of Engineering and Technology Anad,Trivandrum shilpams333@gmail.com Shalini.L Dept. of Computer Science Mohandas College

More information

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining

Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining CS573 Data Privacy and Security Secure Multiparty Computation Introduction to Privacy Preserving Distributed Data Mining Li Xiong Slides credit: Chris Clifton, Purdue University; Murat Kantarcioglu, UT

More information

Distributed Data Mining with Differential Privacy

Distributed Data Mining with Differential Privacy Distributed Data Mining with Differential Privacy Ning Zhang, Ming Li, Wenjing Lou Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, MA Email: {ning, mingli}@wpi.edu,

More information

An Empirical Study on feature selection for Data Classification

An Empirical Study on feature selection for Data Classification An Empirical Study on feature selection for Data Classification S.Rajarajeswari 1, K.Somasundaram 2 Department of Computer Science, M.S.Ramaiah Institute of Technology, Bangalore, India 1 Department of

More information

An Information-Theoretic Approach to the Prepruning of Classification Rules

An Information-Theoretic Approach to the Prepruning of Classification Rules An Information-Theoretic Approach to the Prepruning of Classification Rules Max Bramer University of Portsmouth, Portsmouth, UK Abstract: Keywords: The automatic induction of classification rules from

More information

CSE4334/5334 DATA MINING

CSE4334/5334 DATA MINING CSE4334/5334 DATA MINING Lecture 4: Classification (1) CSE4334/5334 Data Mining, Fall 2014 Department of Computer Science and Engineering, University of Texas at Arlington Chengkai Li (Slides courtesy

More information

MICROARRAY IMAGE SEGMENTATION USING CLUSTERING METHODS

MICROARRAY IMAGE SEGMENTATION USING CLUSTERING METHODS Mathematical and Computational Applications, Vol. 5, No. 2, pp. 240-247, 200. Association for Scientific Research MICROARRAY IMAGE SEGMENTATION USING CLUSTERING METHODS Volkan Uslan and Đhsan Ömür Bucak

More information

Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets

Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets Sheng Zhong August 15, 2003 Abstract Standard algorithms for association rule mining are based on identification of frequent itemsets.

More information

Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM

Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM Research Paper SECURED UTILITY ENHANCEMENT IN MINING USING GENETIC ALGORITHM 1 Dr.G.Kirubhakar and 2 Dr.C.Venkatesh Address for Correspondence 1 Department of Computer Science and Engineering, Surya Engineering

More information

A Program demonstrating Gini Index Classification

A Program demonstrating Gini Index Classification A Program demonstrating Gini Index Classification Abstract In this document, a small program demonstrating Gini Index Classification is introduced. Users can select specified training data set, build the

More information

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique Research Paper Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique C. Sudarsana Reddy 1 S. Aquter Babu 2 Dr. V. Vasu 3 Department

More information

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018 MIT 801 [Presented by Anna Bosman] 16 February 2018 Machine Learning What is machine learning? Artificial Intelligence? Yes as we know it. What is intelligence? The ability to acquire and apply knowledge

More information

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga.

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. Americo Pereira, Jan Otto Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. ABSTRACT In this paper we want to explain what feature selection is and

More information

Classification and Regression

Classification and Regression Classification and Regression Announcements Study guide for exam is on the LMS Sample exam will be posted by Monday Reminder that phase 3 oral presentations are being held next week during workshops Plan

More information

Accountability in Privacy-Preserving Data Mining

Accountability in Privacy-Preserving Data Mining PORTIA Privacy, Obligations, and Rights in Technologies of Information Assessment Accountability in Privacy-Preserving Data Mining Rebecca Wright Computer Science Department Stevens Institute of Technology

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Privacy preserving data mining Li Xiong Slides credits: Chris Clifton Agrawal and Srikant 4/3/2011 1 Privacy Preserving Data Mining Privacy concerns about personal data AOL

More information

ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining

ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, 2014 ISSN 2278 5485 EISSN 2278 5477 discovery Science Comparative Study of Classification Algorithms Using Data Mining Akhila

More information

CMPUT 391 Database Management Systems. Data Mining. Textbook: Chapter (without 17.10)

CMPUT 391 Database Management Systems. Data Mining. Textbook: Chapter (without 17.10) CMPUT 391 Database Management Systems Data Mining Textbook: Chapter 17.7-17.11 (without 17.10) University of Alberta 1 Overview Motivation KDD and Data Mining Association Rules Clustering Classification

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data Li Liu, Murat Kantarcioglu and Bhavani Thuraisingham Computer Science Department University of Texas

More information

A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING

A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant

More information

Privacy Preserving Data Mining Technique and Their Implementation

Privacy Preserving Data Mining Technique and Their Implementation International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 4, Issue 2, 2017, PP 14-19 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0402003

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING

ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING ADDITIVE GAUSSIAN NOISE BASED DATA PERTURBATION IN MULTI-LEVEL TRUST PRIVACY PRESERVING DATA MINING R.Kalaivani #1,S.Chidambaram #2 # Department of Information Techology, National Engineering College,

More information

Exploratory data analysis for microarrays

Exploratory data analysis for microarrays Exploratory data analysis for microarrays Jörg Rahnenführer Computational Biology and Applied Algorithmics Max Planck Institute for Informatics D-66123 Saarbrücken Germany NGFN - Courses in Practical DNA

More information

Question Bank. 4) It is the source of information later delivered to data marts.

Question Bank. 4) It is the source of information later delivered to data marts. Question Bank Year: 2016-2017 Subject Dept: CS Semester: First Subject Name: Data Mining. Q1) What is data warehouse? ANS. A data warehouse is a subject-oriented, integrated, time-variant, and nonvolatile

More information

Experimental Analysis of a Privacy-Preserving Scalar Product Protocol

Experimental Analysis of a Privacy-Preserving Scalar Product Protocol Experimental Analysis of a Privacy-Preserving Scalar Product Protocol Zhiqiang Yang Rebecca N. Wright Hiranmayee Subramaniam Computer Science Department Stevens Institute of Technology graduate Stevens

More information

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42 Pattern Mining Knowledge Discovery and Data Mining 1 Roman Kern KTI, TU Graz 2016-01-14 Roman Kern (KTI, TU Graz) Pattern Mining 2016-01-14 1 / 42 Outline 1 Introduction 2 Apriori Algorithm 3 FP-Growth

More information

Data Cleaning and Prototyping Using K-Means to Enhance Classification Accuracy

Data Cleaning and Prototyping Using K-Means to Enhance Classification Accuracy Data Cleaning and Prototyping Using K-Means to Enhance Classification Accuracy Lutfi Fanani 1 and Nurizal Dwi Priandani 2 1 Department of Computer Science, Brawijaya University, Malang, Indonesia. 2 Department

More information

COMP 465: Data Mining Classification Basics

COMP 465: Data Mining Classification Basics Supervised vs. Unsupervised Learning COMP 465: Data Mining Classification Basics Slides Adapted From : Jiawei Han, Micheline Kamber & Jian Pei Data Mining: Concepts and Techniques, 3 rd ed. Supervised

More information

Fuzzy Partitioning with FID3.1

Fuzzy Partitioning with FID3.1 Fuzzy Partitioning with FID3.1 Cezary Z. Janikow Dept. of Mathematics and Computer Science University of Missouri St. Louis St. Louis, Missouri 63121 janikow@umsl.edu Maciej Fajfer Institute of Computing

More information

A Cloud Based Intrusion Detection System Using BPN Classifier

A Cloud Based Intrusion Detection System Using BPN Classifier A Cloud Based Intrusion Detection System Using BPN Classifier Priyanka Alekar Department of Computer Science & Engineering SKSITS, Rajiv Gandhi Proudyogiki Vishwavidyalaya Indore, Madhya Pradesh, India

More information

The k-means Algorithm and Genetic Algorithm

The k-means Algorithm and Genetic Algorithm The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective

More information

CLASSIFICATIONANDEVALUATION THE PRIVACY PRESERVING DISTRIBUTED DATA MININGTECHNIQUES

CLASSIFICATIONANDEVALUATION THE PRIVACY PRESERVING DISTRIBUTED DATA MININGTECHNIQUES CLASSIFICATIONANDEVALUATION THE PRIVACY PRESERVING DISTRIBUTED DATA MININGTECHNIQUES 1 SOMAYYEH SEIFI MORADI, 2 MOHAMMAD REZA KEYVANPOUR 1 Department of Computer Engineering, Qazvin University, Qazvin,

More information

PPKM: Preserving Privacy in Knowledge Management

PPKM: Preserving Privacy in Knowledge Management PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com

More information

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING

FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING FREQUENT ITEMSET MINING USING PFP-GROWTH VIA SMART SPLITTING Neha V. Sonparote, Professor Vijay B. More. Neha V. Sonparote, Dept. of computer Engineering, MET s Institute of Engineering Nashik, Maharashtra,

More information

HIMIC : A Hierarchical Mixed Type Data Clustering Algorithm

HIMIC : A Hierarchical Mixed Type Data Clustering Algorithm HIMIC : A Hierarchical Mixed Type Data Clustering Algorithm R. A. Ahmed B. Borah D. K. Bhattacharyya Department of Computer Science and Information Technology, Tezpur University, Napam, Tezpur-784028,

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario Using Un-trusted Third Party

Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario Using Un-trusted Third Party IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727, Volume 7, Issue 6 (Nov. - Dec. 2012), PP 04-12 Privacy Preserving Naïve Bayes Classifier for Horizontally Distribution Scenario

More information

Mining Multiple Private Databases Using a knn Classifier

Mining Multiple Private Databases Using a knn Classifier Mining Multiple Private Databases Using a knn Classifier Li Xiong Emory University lxiong@mathcs.emory.edu Subramanyam Chitti, Ling Liu Georgia Institute of Technology chittis, lingliu@cc.gatech.edu ABSTRACT

More information

Applications and Trends in Data Mining

Applications and Trends in Data Mining Applications and Trends in Data Mining Data mining applications Data mining system products and research prototypes Additional themes on data mining Social impacts of data mining Trends in data mining

More information

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem

Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Group Authentication Using The Naccache-Stern Public-Key Cryptosystem Scott Guthery sguthery@mobile-mind.com Abstract A group authentication protocol authenticates pre-defined groups of individuals such

More information

Semi-Supervised Clustering with Partial Background Information

Semi-Supervised Clustering with Partial Background Information Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject

More information

Patterns that Matter

Patterns that Matter Patterns that Matter Describing Structure in Data Matthijs van Leeuwen Leiden Institute of Advanced Computer Science 17 November 2015 Big Data: A Game Changer in the retail sector Predicting trends Forecasting

More information

A Naïve Soft Computing based Approach for Gene Expression Data Analysis

A Naïve Soft Computing based Approach for Gene Expression Data Analysis Available online at www.sciencedirect.com Procedia Engineering 38 (2012 ) 2124 2128 International Conference on Modeling Optimization and Computing (ICMOC-2012) A Naïve Soft Computing based Approach for

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Privacy Preservation Data Mining Using GSlicing Approach Mr. Ghanshyam P. Dhomse

More information

On Privacy-Preservation of Text and Sparse Binary Data with Sketches

On Privacy-Preservation of Text and Sparse Binary Data with Sketches On Privacy-Preservation of Text and Sparse Binary Data with Sketches Charu C. Aggarwal Philip S. Yu Abstract In recent years, privacy preserving data mining has become very important because of the proliferation

More information

Privacy and Security Ensured Rule Mining under Partitioned Databases

Privacy and Security Ensured Rule Mining under Partitioned Databases www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Privacy and Security Ensured Rule Mining under Partitioned Databases

More information

Cse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University

Cse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University Cse634 DATA MINING TEST REVIEW Professor Anita Wasilewska Computer Science Department Stony Brook University Preprocessing stage Preprocessing: includes all the operations that have to be performed before

More information

Comparing Univariate and Multivariate Decision Trees *

Comparing Univariate and Multivariate Decision Trees * Comparing Univariate and Multivariate Decision Trees * Olcay Taner Yıldız, Ethem Alpaydın Department of Computer Engineering Boğaziçi University, 80815 İstanbul Turkey yildizol@cmpe.boun.edu.tr, alpaydin@boun.edu.tr

More information

Keywords: clustering algorithms, unsupervised learning, cluster validity

Keywords: clustering algorithms, unsupervised learning, cluster validity Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Clustering Based

More information

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY T.Ramya 1, A.Mithra 2, J.Sathiya 3, T.Abirami 4 1 Assistant Professor, 2,3,4 Nadar Saraswathi college of Arts and Science, Theni, Tamil Nadu (India)

More information

Estimating Missing Attribute Values Using Dynamically-Ordered Attribute Trees

Estimating Missing Attribute Values Using Dynamically-Ordered Attribute Trees Estimating Missing Attribute Values Using Dynamically-Ordered Attribute Trees Jing Wang Computer Science Department, The University of Iowa jing-wang-1@uiowa.edu W. Nick Street Management Sciences Department,

More information

Co-clustering for differentially private synthetic data generation

Co-clustering for differentially private synthetic data generation Co-clustering for differentially private synthetic data generation Tarek Benkhelif, Françoise Fessant, Fabrice Clérot and Guillaume Raschia January 23, 2018 Orange Labs & LS2N Journée thématique EGC &

More information

International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN V.Sathya, and Dr.V.

International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN V.Sathya, and Dr.V. International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 52 Encryption-Based Techniques For Privacy Preserving Data Mining V.Sathya, and Dr.V. Gayathiri ABSTRACT: In present

More information

SOCIAL MEDIA MINING. Data Mining Essentials

SOCIAL MEDIA MINING. Data Mining Essentials SOCIAL MEDIA MINING Data Mining Essentials Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate

More information

Image Mining: frameworks and techniques

Image Mining: frameworks and techniques Image Mining: frameworks and techniques Madhumathi.k 1, Dr.Antony Selvadoss Thanamani 2 M.Phil, Department of computer science, NGM College, Pollachi, Coimbatore, India 1 HOD Department of Computer Science,

More information

CHAPTER 4 K-MEANS AND UCAM CLUSTERING ALGORITHM

CHAPTER 4 K-MEANS AND UCAM CLUSTERING ALGORITHM CHAPTER 4 K-MEANS AND UCAM CLUSTERING 4.1 Introduction ALGORITHM Clustering has been used in a number of applications such as engineering, biology, medicine and data mining. The most popular clustering

More information

Privacy Preserving Distributed Data Mining

Privacy Preserving Distributed Data Mining Privacy Preserving Distributed Mining Chris Clifton Department of Computer Sciences November 9, 2001 mining technology has emerged as a means for identifying patterns and trends from large quantities of

More information

A Review on Cluster Based Approach in Data Mining

A Review on Cluster Based Approach in Data Mining A Review on Cluster Based Approach in Data Mining M. Vijaya Maheswari PhD Research Scholar, Department of Computer Science Karpagam University Coimbatore, Tamilnadu,India Dr T. Christopher Assistant professor,

More information

Classification with Decision Tree Induction

Classification with Decision Tree Induction Classification with Decision Tree Induction This algorithm makes Classification Decision for a test sample with the help of tree like structure (Similar to Binary Tree OR k-ary tree) Nodes in the tree

More information