2 research outputs found
Review Paper-Social networking with protecting sensitive labels in data Anonymization
The use of social network sites goes on increasing such as facebook, twitter, linkedin, live journal social network and wiki vote network. By using this, users find that they can obtain more and more useful information such as the user performance, private growth, dispersal of disease etc. It is also important that users private information should not get disclose. Thus, Now a days it is important to protect users privacy and utilization of social network data are challenging. Most of developer developed privacy models such as K-anonymity for protecting node or vertex reidentification in structure information. Users privacy models get forced by other user, if a group of node largely share the same sensitive labels then other users easily find out one’s data ,so that structure anonymization method is not purely protected. There are some previous approaches such as edge editing or node clustering .Here structural information as well as sensitive labels of individuals get considered using K-degree l-deversityanonymity model. The new approach in anonymization methodology is adding noise nodes. By considering the least distortion to graph properties,the development of new algorithm using noise nodes into original graph. Most important it will provide an analysis of no.of noise nodes added and their impact on important graph property
INFREQUENT WEIGHTED ITEMSET MINING FOR TRANSACTIONAL DATABASES USING FREQUENT PATTERN GROWTH
Mining Weighted Item sets from a transactional database includes to the discovery of itemsets with high utility like profits.Although a number of relevant techniques have been planned in recent years, they obtain the problem of producing a large number of candidate itemsets for high utility itemsets. Such a large number of candidate itemsets weakens the mining performance in terms of execution time and space requirement. In this paper we have concentrate on UP-Growth and UP-Growth+ algorithmwhich will overcome this impediment. This technique includes tree based data structure finding itemsets, UP-Tree for generating candidate itemsets with two scan of database. In this paper we extend the functionality of UP-Growth and UP-Growth+ algorithms on transactional database. The situation may become poorwhen the database contains lots of long transactions or long high utility itemsets. An appearing topic in the field of data mining is utility mining. The main goal of utility mining is to identify the itemsets with highest utilities, by considering profit, quantity, cost or other user preferences. This topic includes many applications in website click stream analysis, business promotion in chain hypermarkets, cross marketing in retail stores, online e-commerce management, and mobile commerce environment planning and even finding important patterns in biomedical applications