H.3.14. Knowledge Management
1. Introducing an algorithm for use to hide sensitive association rules through perturb technique

M. Sakenian Dehkordi; M. Naderi Dehkordi

Volume 4, Issue 2 , Summer 2016, , Pages 219-227

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.10

Abstract
  Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on ...  Read More

F.1. General
2. Data sanitization in association rule mining based on impact factor

A. Telikani; A. Shahbahrami; R. Tavoli

Volume 3, Issue 2 , Summer 2015, , Pages 131-140

http://dx.doi.org/10.5829/idosi.JAIDM.2015.03.02.02

Abstract
  Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that ...  Read More