International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015


Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav | Amit B. Chougule [2]


Abstract: The learning problems have to be concerned about distributed input data, because of gradual expansion of distributed computing environment. It is important to address the privacy concern of each data holder by extending the privacy preservation concept to original learning algorithms, to enhance co-operations in learning. In this project, focus is on protecting the privacy in significant learning model i. e. Multilayer Back Propagation Neural Network using Gradient Descent Methods. For protecting the privacy of the data items (concentration is towards Vertically Partitioned Data and Horizontally Partitioned Data), semi honest model and underlying security of El Gamal Scheme is referred [7].


Keywords: Cryptography Techniques, Distributed Datasets, Gradient Descent Methods, Back Propagation Neural Network


Edition: Volume 4 Issue 6, June 2015,


Pages: 1592 - 1597


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sachin P. Yadav, Amit B. Chougule, "Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 1592-1597, https://www.ijsr.net/get_abstract.php?paper_id=SUB155632

Similar Articles with Keyword 'Cryptography Techniques'

Downloads: 111

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1002 - 1007

Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh [9] | Mahima Sharma [2]

Share this Article
Top