Huddling For Anonymization Of Compacted And Disseminated Public Systems
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the actors May be different kinds Links may have attributes, directed or undirected Social networks have received dramatic interest in research and development. We developed heuristics to deal with the problem, In this paper, we survey the very recent research development on privacy-preserving publishing of graphs and social network data. Our metric for data quality is the number of rules that can still be mined and the number of rules that appear as a side effect We developed heuristic algorithms to minimize the new rules of the concept.
Authors and Affiliations
P. Eswaraiah| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali, Pokuru. Nagarjuna| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali
Closed Loop Fuzzy Logic Control of 3-∅ BLDC Motor Driven by High Voltage Gain Interleaved Boost Converter
This paper deals the Brush Less DC Motor (BLCDM) driven by an efficient closed loop fuzzy logic based high voltage gain interleaved boost converter. The proposed high voltage gain interleaved boost converter in this...
Web based online Home Automation and security system based on wireless Video Streaming using Internet of Things
The present research work proposes an efficient implementation for IoT (Internet of Things) used for monitoring and controlling the home appliances via World Wide Web. IoT can be viewed as an evolution rather than a...
Weighted Contrast Enhancement Based Enhancement For Remote Sensing Images
This paper discuss a novel approach based on dominant brightness level analysis and adaptive intensity transformation to enhance the contrast for remote sensing images. In this approach we first perform discrete wave...
Peripatetic Shared TV Using Cloud
While demands on video traffic over Portable networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-va...
Study on Remote File Attacking – Inclusion & Detection
Presently applications of web are increasing exponentially. We are almost totally dependent on Internet and associated technologies. Huge applications in all walk of lives are inviting attacks on them. Their usage are...