Slicing :A Proficient Scheme For Sustain And Publicize
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional data. Bucketization does not prevent membership disclosure and does not provide a clear separation between quasi identifying attributes and sensitive attributes. In this Paper we presents a new technique called slicing. Slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high dimensional data. Slicing can be use for attribute disclosure protection and develop an efficient algorithm for computing the sliced data.
Authors and Affiliations
D. Narayana, S Amar Nath Babu
Low Power Design of A SRAM Cell for Embedded Memory
This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...
Inter Transactional Association Rule Mining using Boolean Matrix
One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal...
Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes
The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing endto-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged...
Multi Biometric Model for Authentication Method
In recent years, biometric authentication has seen considerable improvements in reliability and accuracy,with some biometrics contribute reasonably good overall performance. In biometric based systems for identity ve...
Self-assured Data Arrangement within Information Exhaustive Wireless Sensor Correlation
In the corpulent number of outgrowing viable environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the familiar medium. Transferable nodes in mili...