Privacy Preserving Closed Frequent Pattern Mining
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 102

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Mining closed frequent item sets is one of the important problems in data mining. There exists a possibility of designing differentially private Frequent Itemset Mining (FIM) algorithm which can achieve high data utility, efficiency and high degree of privacy. Private Frequent Pattern mining algorithms have a preprocessing phase and mining phase. In the preprocessing phase a novel smart splitting algorithm is used for transforming the database. In the mining phase transaction splitting is done. Certain amount of noise is added to the output for enhancing privacy. The amount of noise added is considerably reduced.

Keywords: Frequent Itemset Mining, transaction splitting

Edition: Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Share this Article

How to Cite this Article?

Anju Vijayan, "Privacy Preserving Closed Frequent Pattern Mining", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151382, Volume 4 Issue 11, November 2015, 1165 - 1168

Enter Your Email Address




Similar Articles with Keyword 'Frequent Itemset Mining'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1540 - 1544

Survey on Itemset Mining from Transactional Database

Anjali N. Radkar, S. S. Pawar

Share this Article

Similar Articles with Keyword 'Frequent'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Similar Articles with Keyword 'Itemset'

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2734 - 2838

Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey

Ganesh Sawant, Bhawana Kanawde

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Similar Articles with Keyword 'Mining'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Downloads: 65 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'transaction'

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Downloads: 89

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the Users Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'splitting'

Downloads: 1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1541 - 1546

Implementation of Peer-To-Peer Architecture in MMORPGs

Rutvij Joshi, Dharmik Patel, Swapna Naik

Share this Article



Top