• No results found

Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data

N/A
N/A
Protected

Academic year: 2020

Share "Preserving the Privacy and Sharing the Data Using Classification on Perturbed Data"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig 1. Block diagram for implementing perturbation technique
Fig 3. Example of classifier tree on perturbed data
Fig 5. The obtained decision tree using improved ID3 algorithm

References

Related documents

Artists (not necessarily theatre professionals, although this is the majority) with an already existing professional practice who are seeking a new stage of

International Journal of Scientific Research in Computer Science, Engineering and Information Technology CSEIT1724205 | Received 15 August 2017 | Accepted 31 August 2017 | July August

Amyloid deposits were identified more frequently with coexisting C hepatica infection; amyloidosis occurred in 26/106 animals with concurrent hepatic capillariasis, compared with

Key words: Carica papaya leaves, dengue, high performance liquid chromatography analysis, lyophilization, supplementary products.. Address

Religious coping styles such as perceived collaboration with God, seeking spiritual support from God or religious communities, and benevolent religious appraisal of

Tuberculosis screening for prospective migrants to high income countries systematic review of policies ww sciencedirect com p u b l i c h e a l t h 1 6 8 ( 2 0 1 9 ) 1 4 2 e1 4 7

The dual structure based on internal box is found effective for thermal barrier system, which can protect the electronic device inside of firefighting robot from

Platelet counts were low in children presenting with SMA (but only significantly so for the HIV-uninfected groups) than non-malaria controls, regardless of their HIV status (P