Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: SENSITIVE RULES.

Artykuły w czasopismach na temat „SENSITIVE RULES”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SENSITIVE RULES”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Wang, Hui. "Hiding Sensitive Association Rules by Sanitizing." Advanced Materials Research 694-697 (May 2013): 2317–21. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2317.

Pełny tekst źródła
Streszczenie:
The goal of knowledge discovery is to extract hidden or useful unknown knowledge from databases, while the objective of knowledge hiding is to prevent certain confidential data or knowledge from being extracted through data mining techniques. Hiding sensitive association rules is focused. The side-effects of the existing data mining technology are investigated. The problem of sensitive association rule hiding is described formally. The representative sanitizing strategies for sensitive association rule hiding are discussed.
Style APA, Harvard, Vancouver, ISO itp.
2

Bansal, Meenakshi, Dinesh Grover, and Dhiraj Sharma. "Sensitivity Association Rule Mining using Weight based Fuzzy Logic." Global Journal of Enterprise Information System 9, no. 2 (2017): 1. http://dx.doi.org/10.18311/gjeis/2017/15480.

Pełny tekst źródła
Streszczenie:
Mining of sensitive rules is the most important task in data mining. Most of the existing techniques worked on finding sensitive rules based upon the crisp thresh hold value of support and confidence which cause serious side effects to the original database. To avoid these crisp boundaries this paper aims to use WFPPM (Weighted Fuzzy Privacy Preserving Mining) to extract sensitive association rules. WFPPM completely find the sensitive rules by calculating the weights of the rules. At first, we apply FP-Growth to mine association rules from the database. Next, we implement fuzzy to find the sen
Style APA, Harvard, Vancouver, ISO itp.
3

Suma, B., and G. Shobha. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451–58. https://doi.org/10.11591/ijece.v11i4.pp3451-3458.

Pełny tekst źródła
Streszczenie:
Privacy preserving data mining has become the focus of attention of government statistical agencies and database security research community who are concerned with preventing privacy disclosure during data mining. Repositories of large datasets include sensitive rules that need to be concealed from unauthorized access. Hence, association rule hiding emerged as one of the powerful techniques for hiding sensitive knowledge that exists in data before it is published. In this paper, we present a constraint-based optimization approach for hiding a set of sensitive association rules, using a well-st
Style APA, Harvard, Vancouver, ISO itp.
4

Nguyen, Khac-Chien. "Mining Association Rules on Time-sensitive Data." ICT Research 2024, no. 2 (2024): 130–40. http://dx.doi.org/10.32913/mic-ict-research.v2024.n2.1256.

Pełny tekst źródła
Streszczenie:
Real-world data is continuously produced andcollected quickly; hence, mining association rules are used tofind relationships between item sets. One of these combinedrule mining techniques is Rare Association Rule Mining(RARM), a method that extracts rare, combined rules with lowsupport but high confidence from the database. Additionally,a large amount of time-sensitive data is created in many fields,and combining valid and outdated data leads to low efficiencyin extracting combined rules. This paper explores a miningmethod that increases rare, combined rules on time-sensitivedata to extract co
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Hui. "Hiding Sensitive Association Rules by Adjusting Support." Advanced Materials Research 756-759 (September 2013): 1875–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1875.

Pełny tekst źródła
Streszczenie:
Data mining technologies are successfully applied in lots of domains such as business, science research, health care, bioinformatics, financial forecasting and so on and so forth. Knowledge can be discovered by data mining and can help people to make better decisions and benefits. Association rule is one kind of the most popular knowledge discovered by data mining. While at the same time, some association rules extracted from data mining can be considered so sensitive for data holders that they will not like to share and really want to hide. Such kind of side effects of data mining is analyzed
Style APA, Harvard, Vancouver, ISO itp.
6

Rao, K. Srinivasa, CH Suresh Babu, A. Damodaram, and Tai-hoon Kim. "Distortion Technique for Hiding Sensitive Association Rules." International Journal of Multimedia and Ubiquitous Engineering 9, no. 10 (2014): 57–66. http://dx.doi.org/10.14257/ijmue.2014.9.10.06.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Whittle, P. "Entropy-minimising and risk-sensitive control rules." Systems & Control Letters 13, no. 1 (1989): 1–7. http://dx.doi.org/10.1016/0167-6911(89)90014-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Diwan, Abhishek, and Alpana Singh. "An Efficient Technique for Protecting Sensitive Information." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 03 (2013): 79–82. https://doi.org/10.5281/zenodo.14594519.

Pełny tekst źródła
Streszczenie:
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. Two important terms support and confidence are associated with each of the association rule. Actually any rule is call
Style APA, Harvard, Vancouver, ISO itp.
9

Alayiaboozar, Elham. "Studying the possibility of improving the function of a POS tagger system." Comparative Linguistic Research 10, no. 19 (2020): 95–110. https://doi.org/10.22084/RJHLL.2019.16614.1834.

Pełny tekst źródła
Streszczenie:
The aim of the present study is to check the possibility of improving the function of a POS tagger system via POS tag disambiguation of some of Persian noun and adjective homographs ending in <-ی>. The case study in present research is HAZM.The POS tag disambiguation program is based on some context-sensitive rules. the mentioned rules were extracted from Bijan Khan corpus, Hazm was trained by Bijan Khan corpus. General evaluation of the mentioned POS disambiguation program indicates that if some of the context-sensitive rules which play a role in better POS tagging are added to HAZM, th
Style APA, Harvard, Vancouver, ISO itp.
10

Hameed, S., F. Shahzad, and S. Asghar. "SANITIZING SENSITIVE ASSOCIATION RULES USING FUZZY CORRELATION SCHEME." Nucleus 50, no. 4 (2013): 359–67. https://doi.org/10.71330/thenucleus.2013.739.

Pełny tekst źródła
Streszczenie:
Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR) is based on fuzzy correlation analysis. In this work, fuzzy set concept is integrated with fuzzy correlation analysis and Apriori algorithm to mark interesting fuzzy association rules. The identified r
Style APA, Harvard, Vancouver, ISO itp.
11

Gayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.

Pełny tekst źródła
Streszczenie:
Abstract Association Rule Hiding methodology is a privacy preserving data mining technique that sanitizes the original database by hide sensitive association rules generated from the transactional database. The side effect of association rules hiding technique is to hide certain rules that are not sensitive, failing to hide certain sensitive rules and generating false rules in the resulted database. This affects the privacy of the data and the utility of data mining results. In this paper, a method called Gene Patterned Association Rule Hiding (GPARH) is proposed for preserving privacy of the
Style APA, Harvard, Vancouver, ISO itp.
12

Wang, Hui. "Strategies for Sensitive Association Rule Hiding." Applied Mechanics and Materials 336-338 (July 2013): 2203–6. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2203.

Pełny tekst źródła
Streszczenie:
Data mining technologies are used widely while the side effects it incurred are concerned so seriously. Privacy preserving data mining is so important for data and knowledge security during data mining applications. Association rule extracted from data mining is one kind of the most popular knowledge. It is challenging to hide sensitive association rules extracted by data mining process and make less affection on non-sensitive rules and the original database. In this work, we focus on specific association rule automatic hiding. Novel strategies are proposed which are based on increasing the su
Style APA, Harvard, Vancouver, ISO itp.
13

Jain, Dhyanendra. "Hiding Sensitive Association Rules Without Altering the Support of Sensitive Item(S)." International Journal of Artificial Intelligence & Applications 3, no. 2 (2012): 75–84. http://dx.doi.org/10.5121/ijaia.2012.3207.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Bonam, Janakiramaiah, and Ramamohan Reddy. "Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment." International Journal of Information Security and Privacy 8, no. 3 (2014): 39–62. http://dx.doi.org/10.4018/ijisp.2014070103.

Pełny tekst źródła
Streszczenie:
Privacy preserving association rule mining protects the sensitive association rules specified by the owner of the data by sanitizing the original database so that the sensitive rules are hidden. In this paper, the authors study a problem of hiding sensitive association rules by carefully modifying the transactions in the database. The algorithm BHPSP calculates the impact factor of items in the sensitive association rules. Then it selects a rule which contains an item with minimum impact factor. The algorithm alters the transactions of the database to hide the sensitive association rule by red
Style APA, Harvard, Vancouver, ISO itp.
15

Mohan, S. Vijayarani, and Tamilarasi Angamuthu. "Association Rule Hiding in Privacy Preserving Data Mining." International Journal of Information Security and Privacy 12, no. 3 (2018): 141–63. http://dx.doi.org/10.4018/ijisp.2018070108.

Pełny tekst źródła
Streszczenie:
This article describes how privacy preserving data mining has become one of the most important and interesting research directions in data mining. With the help of data mining techniques, people can extract hidden information and discover patterns and relationships between the data items. In most of the situations, the extracted knowledge contains sensitive information about individuals and organizations. Moreover, this sensitive information can be misused for various purposes which violate the individual's privacy. Association rules frequently predetermine significant target marketing informa
Style APA, Harvard, Vancouver, ISO itp.
16

Menon, Syam, Abhijeet Ghoshal, and Sumit Sarkar. "Modifying Transactional Databases to Hide Sensitive Association Rules." Information Systems Research 33, no. 1 (2022): 152–78. http://dx.doi.org/10.1287/isre.2021.1033.

Pełny tekst źródła
Streszczenie:
Although firms recognize the value in sharing data with supply chain partners, many remain reluctant to share for fear of sensitive information potentially making its way to competitors. Approaches that can help hide sensitive information could alleviate such concerns and increase the number of firms that are willing to share. Sensitive information in transactional databases often manifests itself in the form of association rules. The sensitive association rules can be concealed by altering transactions so that they remain hidden when the data are mined by the partner. The problem of hiding th
Style APA, Harvard, Vancouver, ISO itp.
17

Wu, Yi-hung, Chia-ming Chiang, and Arbee Chen. "Hiding Sensitive Association Rules with Limited Side Effects." IEEE Transactions on Knowledge and Data Engineering 19, no. 1 (2007): 29–42. http://dx.doi.org/10.1109/tkde.2007.250583.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Dehkordi, Mohammad Naderi, Kambiz Badie, and Ahmad Khadem Zadeh. "A new approach for sensitive association rules hiding." International Journal of Rapid Manufacturing 1, no. 2 (2009): 128. http://dx.doi.org/10.1504/ijrapidm.2009.029379.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Schmid-Hempel, Paul, and Regula Schmid-Hempel. "Nectar-collecting bees use Distance-sensitive movement rules." Animal Behaviour 34, no. 2 (1986): 605–7. http://dx.doi.org/10.1016/s0003-3472(86)80131-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Zwicky, Arnold M., Ellen M. Kaisse, and Michael Kenstowicz. "The phonology and syntax of wh-expressions in Tangale." Phonology Yearbook 4, no. 1 (1987): 229–41. http://dx.doi.org/10.1017/s0952675700000841.

Pełny tekst źródła
Streszczenie:
Study of the phonology-syntax interface has typically proceeded by asking the following question: what aspects of syntactic structure are relevant for the application of phonological rules? Several years’ study of the question by a number of persons (e.g. Kaisse 1985; Selkirk 1984) suggests that phonological rules may be sensitive, either directly or indirectly, to the surface-syntactic constituent structure – typically through extension of the notion of government or c-command. Phrasal phonological rules do not appear to be sensitive to differences in grammatical relations (e.g. subject vs. o
Style APA, Harvard, Vancouver, ISO itp.
21

Boddez, Yannick, Marc Patrick Bennett, Silke van Esch, and Tom Beckers. "Bending rules: the shape of the perceptual generalisation gradient is sensitive to inference rules." Cognition and Emotion 31, no. 7 (2016): 1444–52. http://dx.doi.org/10.1080/02699931.2016.1230541.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Krishnamoorthy, Sathiyapriya, G. Sudha Sadasivam, M. Rajalakshmi, K. Kowsalyaa, and M. Dhivya. "Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization." International Journal of Intelligent Information Technologies 13, no. 2 (2017): 1–20. http://dx.doi.org/10.4018/ijiit.2017040101.

Pełny tekst źródła
Streszczenie:
An association rule is classified as sensitive if its thread of revelation is above certain confidence value. If these sensitive rules were revealed to the public, it is possible to deduce sensitive knowledge from the published data and offers benefit for the business competitors. Earlier studies in privacy preserving association rule mining focus on binary data and has more side effects. But in practical applications the transactions contain the purchased quantities of the items. Hence preserving privacy of quantitative data is essential. The main goal of the proposed system is to hide a grou
Style APA, Harvard, Vancouver, ISO itp.
23

B., Suma, and Shobha G. "Association rule hiding using integer linear programming." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (2021): 3451. http://dx.doi.org/10.11591/ijece.v11i4.pp3451-3458.

Pełny tekst źródła
Streszczenie:
<span>Privacy preserving data mining has become the focus of attention of government statistical agencies and database security research community who are concerned with preventing privacy disclosure during data mining. Repositories of large datasets include sensitive rules that need to be concealed from unauthorized access. Hence, association rule hiding emerged as one of the powerful techniques for hiding sensitive knowledge that exists in data before it is published. In this paper, we present a constraint-based optimization approach for hiding a set of sensitive association rules, usi
Style APA, Harvard, Vancouver, ISO itp.
24

Khuda Bux, Naadiya, Mingming Lu, Jianxin Wang, Saajid Hussain, and Yazan Aljeroudi. "Efficient Association Rules Hiding Using Genetic Algorithms." Symmetry 10, no. 11 (2018): 576. http://dx.doi.org/10.3390/sym10110576.

Pełny tekst źródła
Streszczenie:
In today’s world, millions of transactions are connected to online businesses, and the main challenging task is ensuring the privacy of sensitive information. Sensitive association rules hiding (SARH) is an important goal of privacy protection algorithms. Various approaches and algorithms have been developed for sensitive association rules hiding, differentiated according to their hiding performance through utility preservation, prevention of ghost rules, and computational complexity. A meta-heuristic algorithm is a good candidate to solve the problem of SARH due to its selective and parallel
Style APA, Harvard, Vancouver, ISO itp.
25

Zhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 256–62. http://dx.doi.org/10.54097/ehss.v14i.8847.

Pełny tekst źródła
Streszczenie:
The Personal Information Protection Law has a special chapter to stipulate the special pro-cessing rules of sensitive personal information, which reflects the value orientation of strengthening the protection of sensitive personal information. However, due to the mode of permitting the processing of sensitive personal information in principle and restricting pro-cessing with exceptions, the protection of sensitive personal information is greatly weakened in fact. Through the comprehensive analysis of our country's specific specifications of pro-cessing mode of principled prohibition and except
Style APA, Harvard, Vancouver, ISO itp.
26

Zhu, Chenyi. "Realistic Dilemma and Improvement of Sensitive Personal Information Processing Rules." Journal of Education, Humanities and Social Sciences 14 (May 30, 2023): 127–33. http://dx.doi.org/10.54097/ehss.v14i.8806.

Pełny tekst źródła
Streszczenie:
The Personal Information Protection Law has a special chapter to stipulate the special pro-cessing rules of sensitive personal information, which reflects the value orientation of strengthening the protection of sensitive personal information. However, due to the mode of permitting the processing of sensitive personal information in principle and restricting pro-cessing with exceptions, the protection of sensitive personal information is greatly weakened in fact. Through the comprehensive analysis of our country's specific specifications of pro-cessing mode of principled prohibition and except
Style APA, Harvard, Vancouver, ISO itp.
27

Ali, Munawar. "Sustainability Index of Benoa Bay Beach Reclamation Against National Resistance." INFLUENCE: INTERNATIONAL JOURNAL OF SCIENCE REVIEW 5, no. 2 (2023): 43–62. http://dx.doi.org/10.54783/influencejournal.v5i2.135.

Pełny tekst źródła
Streszczenie:
This study aims to analyze systematically and thoroughly about how the impact of coastal reclamation on National Resilience. The activity starts from a thorough understanding of the system that occurs in the reclamation and variable processes that affect national security. The research method used analysis Multi-Dimensional Scaling Method. The Benoa Bay reclamation activity plan, multi-dimensional analysis is not or less sustainable, with an index of 42.93 %. The most sensitive attribute influences the dimensions of the environment, is the attribute of potential sedimentation is the most sensi
Style APA, Harvard, Vancouver, ISO itp.
28

Iqbal, Khalid, Dr Sohail Asghar, and Dr Abdulrehman Mirza. "Hiding Sensitive XML Association Rules With Supervised Learning Technique." Intelligent Information Management 03, no. 06 (2011): 219–29. http://dx.doi.org/10.4236/iim.2011.36027.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Clymer, John R., David J. Cheng, and Daniel Hernandez. "Induction of decision making rules for context sensitive systems." SIMULATION 59, no. 3 (1992): 198–206. http://dx.doi.org/10.1177/003754979205900308.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Barca, Laura, Andrew W. Ellis, and Cristina Burani. "Context-sensitive rules and word naming in Italian children." Reading and Writing 20, no. 5 (2006): 495–509. http://dx.doi.org/10.1007/s11145-006-9040-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Talebi, Behnam, and Mohammad Naderi Dehkordi. "Sensitive association rules hiding using electromagnetic field optimization algorithm." Expert Systems with Applications 114 (December 2018): 155–72. http://dx.doi.org/10.1016/j.eswa.2018.07.031.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Mary, A. Geetha, D. P. Acharjya, and N. Ch S. N. Iyengar. "Privacy preservation in fuzzy association rules using rough computing and DSR." Cybernetics and Information Technologies 14, no. 1 (2014): 52–71. http://dx.doi.org/10.2478/cait-2014-0005.

Pełny tekst źródła
Streszczenie:
Abstract In the present age of Internet, data is accumulated at a dramatic pace. The accumulated huge data has no relevance, unless it provides certain useful information pertaining to the interest of the organization. But the real challenge lies in hiding sensitive information in order to provide privacy. Therefore, attribute reduction becomes an important aspect for handling such huge database by eliminating superfluous or redundant data to enable a sensitive rule hiding in an efficient manner before it is disclosed to the public. In this paper we propose a privacy preserving model to hide s
Style APA, Harvard, Vancouver, ISO itp.
33

KAPLAN, ABBY. "How much homophony is normal?" Journal of Linguistics 47, no. 3 (2011): 631–71. http://dx.doi.org/10.1017/s0022226711000053.

Pełny tekst źródła
Streszczenie:
This paper argues that neutralizing phonological alternations are sensitive to how much homophony they create among distinct lexical items: neutralizing rules create fewer homophones than expected. Building on a case study of Korean by Silverman (2010), I compare the neutralizing rules of Korean to a large number of hypothetical alternatives generated by Monte Carlo simulations. The simulations reveal that the actual rules of Korean frequently create far fewer homophones than similar (but unattested) rules, even when the rules that are compared are controlled for the number of phonemic contras
Style APA, Harvard, Vancouver, ISO itp.
34

Le, Bac, Lien Kieu, and Dat Tran. "DISTORTION-BASED HEURISTIC METHOD FOR SENSITIVE ASSOCIATION RULE HIDING." Journal of Computer Science and Cybernetics 35, no. 4 (2019): 337–54. http://dx.doi.org/10.15625/1813-9663/35/4/14131.

Pełny tekst źródła
Streszczenie:
In the past few years, privacy issues in data mining have received considerable attention in the data mining literature. However, the problem of data security cannot simply be solved by restricting data collection or against unauthorized access, it should be dealt with by providing solutions that not only protect sensitive information, but also not affect to the accuracy of the results in data mining and not violate the sensitive knowledge related with individual privacy or competitive advantage in businesses. Sensitive association rule hiding is an important issue in privacy preserving data m
Style APA, Harvard, Vancouver, ISO itp.
35

B., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137–45. https://doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.

Pełny tekst źródła
Streszczenie:
Association rule mining is a well-known data mining technique used for extracting hidden correlations between data items in large databases. In the majority of the situations, data mining results contain sensitive information about individuals, and publishing such data will violate individual secrecy. The challenge of association rule mining is to preserve the confidentiality of sensitive rules when releasing the database to external parties. The association rule hiding technique conceals the knowledge extracted by the sensitive association rules by modifying the database. In this paper, we in
Style APA, Harvard, Vancouver, ISO itp.
36

B., Suma, and Shobha G. "Privacy preserving association rule hiding using border based approach." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 2 (2021): 1137. http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1137-1145.

Pełny tekst źródła
Streszczenie:
<div>Association rule mining is a well-known data mining technique used for extracting hidden correlations between data items in large databases. In the majority of the situations, data mining results contain sensitive information about individuals and publishing such data will violate individual secrecy. The challenge of association rule mining is to preserve the confidentiality of sensitive rules when releasing the database to external parties. The association rule hiding technique conceals the knowledge extracted by the sensitive association rules by modifying the database. In this pa
Style APA, Harvard, Vancouver, ISO itp.
37

Quoc Le, Hai, Somjit Arch-int, and Ngamnij Arch-int. "Association Rule Hiding Based on Intersection Lattice." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/210405.

Pełny tekst źródła
Streszczenie:
Association rule hiding has been playing a vital role in sensitive knowledge preservation when sharing data between enterprises. The aim of association rule hiding is to remove sensitive association rules from the released database such that side effects are reduced as low as possible. This research proposes an efficient algorithm for hiding a specified set of sensitive association rules based on intersection lattice of frequent itemsets. In this research, we begin by analyzing the theory of the intersection lattice of frequent itemsets and the applicability of this theory into association rul
Style APA, Harvard, Vancouver, ISO itp.
38

Yi, Tong, and Minyong Shi. "Privacy Protection Method for Multiple Sensitive Attributes Based on Strong Rule." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/464731.

Pełny tekst źródła
Streszczenie:
At present, most studies on data publishing only considered single sensitive attribute, and the works on multiple sensitive attributes are still few. And almost all the existing studies on multiple sensitive attributes had not taken the inherent relationship between sensitive attributes into account, so that adversary can use the background knowledge about this relationship to attack the privacy of users. This paper presents an attack model with the association rules between the sensitive attributes and, accordingly, presents a data publication for multiple sensitive attributes. Through proof
Style APA, Harvard, Vancouver, ISO itp.
39

Felando, Cynthia. "Breaking the rules of the game." Short Film Studies 9, no. 2 (2019): 157–60. http://dx.doi.org/10.1386/sfs.9.2.157_1.

Pełny tekst źródła
Streszczenie:
El Adiós is a sincere portrait of a dutiful servant as she tends to her deceased employer’s body and home for the last time, while enduring the routine class-based offenses delivered by her employer’s daughter. This article notes how camerawork and mise en scène emphasize the protagonist’s sensitive and ambiguous position.
Style APA, Harvard, Vancouver, ISO itp.
40

Jiang, Ying, Ming Jing, Jie Zeng, Feng Qi Shen, Du Lan Qi, and Li Hua Wang. "LanguageTool Based Proofreading of Sensitive Chinese Political Information." Applied Mechanics and Materials 687-691 (November 2014): 2644–47. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2644.

Pełny tekst źródła
Streszczenie:
Sensitive Chinese political information are partly monitored and controlled by Chinese mainstream media (newspaper, television, the Internet, etc.) and the National Security Agency as well as corresponding political authorities. However, Chinese media authorities still lack in a technology or some methods to detect and identify sensitive Chinese political information quickly and efficiently. Due to complexity of sensitive Chinese political information, it cannot be monitored by a list of keywords or a simple pattern matching. How to satisfy the demands of media institutions is one of the most
Style APA, Harvard, Vancouver, ISO itp.
41

Whittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.2307/3214366.

Pełny tekst źródła
Streszczenie:
A risk-sensitive certainty equivalence principle is deduced, expressed in Theorem 1, for a model with linear dynamics and observation rules, Gaussian noise and an exponential-quadratic criterion of the form (2). The senses in which one is now to understand certainty equivalence and the separation principle are discussed.
Style APA, Harvard, Vancouver, ISO itp.
42

Whittle, Peter. "The risk-sensitive certainty equivalence principle." Journal of Applied Probability 23, A (1986): 383–88. http://dx.doi.org/10.1017/s0021900200117218.

Pełny tekst źródła
Streszczenie:
A risk-sensitive certainty equivalence principle is deduced, expressed in Theorem 1, for a model with linear dynamics and observation rules, Gaussian noise and an exponential-quadratic criterion of the form (2). The senses in which one is now to understand certainty equivalence and the separation principle are discussed.
Style APA, Harvard, Vancouver, ISO itp.
43

Zwicky, Arnold M., Ellen M. Kaisse, Elizabeth A. Cowper, and Keren D. Rice. "Are phonosyntactic rules necessary?" Phonology Yearbook 4, no. 1 (1987): 185–94. http://dx.doi.org/10.1017/s0952675700000816.

Pełny tekst źródła
Streszczenie:
Selkirk (1986) proposes that rules of the phrasal phonology apply to a structure called P-structure that is derived from, but not isomorphic to, syntactic structure. While Selkirk claims that most rules of external sandhi fall into the category of P-structure rules, there are three rules that she suggests may still require direct reference to syntactic structure. These are Mende Consonant Mutation (Conteh et al. 1986), Kimatuumbi Vowel Shortening (Odden this volume), and ‘perhaps even rules like English wanna contraction’ (Selkirk 1986: 374). Selkirk says that these rules ‘appear to be sensiti
Style APA, Harvard, Vancouver, ISO itp.
44

Negus, Oliver J., Andrew Dunn, and William Ridsdill-Smith. "Lower limb acute joint injuries: when to refer for X-ray?" British Journal of Hospital Medicine 81, no. 3 (2020): 1–5. http://dx.doi.org/10.12968/hmed.2020.0055.

Pełny tekst źródła
Streszczenie:
This article summarises the clinical decision tools available to help decide when acute lower limb joint injuries should be referred for plain film radiography. The Ottawa foot and ankle rules are a tool for deciding whether to refer a patient for X-ray or not. The rules are highly sensitive, gaining National Institute for Health and Care Excellence recommendation in the UK, although they have limited benefit in some patient groups, such as those with peripheral neuropathy. The Ottawa knee rules are highly sensitive but less specific than the Pittsburgh decision rules. Although the Pittsburgh
Style APA, Harvard, Vancouver, ISO itp.
45

DOMINGO-FERRER, JOSEP, and VICENÇ TORRA. "A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, no. 05 (2002): 545–56. http://dx.doi.org/10.1142/s0218488502001636.

Pełny tekst źródła
Streszczenie:
In statistical disclosure control of tabular data, sensitivity rules are commonly used to decide whether a table cell is sensitive and should therefore not be published. The most popular sensitivity rules are the dominance rule, the p%-rule and the pq-rule. The dominance rule has received critiques based on specific numerical examples and is being gradually abandoned by leading statistical agencies. In this paper, we construct general counterexamples which show that none of the above rules does adequately reflect disclosure risk if cell contributors or coalitions of them behave as intruders: i
Style APA, Harvard, Vancouver, ISO itp.
46

Jing Yang, Junwei Zhang, Jianpei Zhang, and Lejun Zhang. "Blocking Inference Channels of Sensitive Rules in Data Stream Mining." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 7 (2013): 196–203. http://dx.doi.org/10.4156/aiss.vol5.issue7.24.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Sirole, Tapan, and Jaytrilok Choudhary. "A Survey of Various Methodologies for Hiding Sensitive Association Rules." International Journal of Computer Applications 96, no. 18 (2014): 12–15. http://dx.doi.org/10.5120/16893-6942.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Patel, Deepak, and Vineet Richhariya. "C Privacy Prevention of Discriminating Rules by Perturbing Sensitive Items." Communications on Applied Electronics 2, no. 8 (2015): 12–16. http://dx.doi.org/10.5120/cae2015651825.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Rajalakshmi, M., and T. Purusothaman. "Concealing party-centric sensitive rules in a centralized data source." International Journal of Machine Learning and Cybernetics 4, no. 5 (2012): 515–25. http://dx.doi.org/10.1007/s13042-012-0111-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Zhao, Mingjun. "Optimal simple rules in RE models with risk sensitive preferences." Economics Letters 97, no. 3 (2007): 260–66. http://dx.doi.org/10.1016/j.econlet.2007.03.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!