期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on Privacy Preserving Data Mining
1
作者 Pingshui Wang Tao Chen Zecheng Wang 《Journal of Information Hiding and Privacy Protection》 2019年第2期61-68,共8页
In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have... In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed. 展开更多
关键词 privacy preserving data mining RANDOMIZATION ANONYMIZATION secure multiparty computation
下载PDF
Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)
2
作者 Neetika Bhandari Payal Pahwa 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2043-2055,共13页
Data is humongous today because of the extensive use of World WideWeb, Social Media and Intelligent Systems. This data can be very important anduseful if it is harnessed carefully and correctly. Useful information can... Data is humongous today because of the extensive use of World WideWeb, Social Media and Intelligent Systems. This data can be very important anduseful if it is harnessed carefully and correctly. Useful information can beextracted from this massive data using the Data Mining process. The informationextracted can be used to make vital decisions in various industries. Clustering is avery popular Data Mining method which divides the data points into differentgroups such that all similar data points form a part of the same group. Clusteringmethods are of various types. Many parameters and indexes exist for the evaluationand comparison of these methods. In this paper, we have compared partitioningbased methods K-Means, Fuzzy C-Means (FCM), Partitioning AroundMedoids (PAM) and Clustering Large Application (CLARA) on secure perturbeddata. Comparison and identification has been done for the method which performsbetter for analyzing the data perturbed using Extended NMF on the basis of thevalues of various indexes like Dunn Index, Silhouette Index, Xie-Beni Indexand Davies-Bouldin Index. 展开更多
关键词 Clustering CLARA Davies-Bouldin index Dunn index FCM intelligent systems K-means non-negative matrix factorization(NMF) PAM privacy preserving data mining Silhouette index Xie-Beni index
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部