Crime Data Analysis Using Association Rule Mining Technique

Author(s):  
Vijendra Kamble ◽  
Aniket Muley ◽  
Nilesh Deshmukh ◽  
Parag Bhalchandra ◽  
Nitin Darkunde ◽  
...  
2021 ◽  
Vol 2 (2) ◽  
pp. 42-50
Author(s):  
Duygu ÇALIŞKAN,Buket DOĞAN,Kazım YILDIZ,Abdulsamet AKTAŞ

2017 ◽  
Vol 7 (1.1) ◽  
pp. 19
Author(s):  
T. Nusrat Jabeen ◽  
M. Chidambaram ◽  
G. Suseendran

Security and privacy has emerged to be a serious concern in which the business professional don’t desire to share their classified transaction data. In the earlier work, secured sharing of transaction databases are carried out. The performance of those methods is enhanced further by bringing in Security and Privacy aware Large Database Association Rule Mining (SPLD-ARM) framework. Now the Improved Secured Association Rule Mining (ISARM) is introduced for the horizontal and vertical segmentation of huge database. Then k-Anonymization methods referred to as suppression and generalization based Anonymization method is employed for privacy guarantee. At last, Diffie-Hellman encryption algorithm is presented in order to safeguard the sensitive information and for the storage service provider to work on encrypted information. The Diffie-Hellman algorithm is utilized for increasing the quality of the system on the overall by the generation of the secured keys and thus the actual data is protected more efficiently. Realization of the newly introduced technique is conducted in the java simulation environment that reveals that the newly introduced technique accomplishes privacy in addition to security.


2021 ◽  
pp. 223-237
Author(s):  
Md. Al-Mamun Biilah ◽  
M. Raihan ◽  
Tamanna Akter ◽  
Nasif Alvi ◽  
Nusrat Jahan Bristy ◽  
...  

Symmetry ◽  
2018 ◽  
Vol 10 (4) ◽  
pp. 106 ◽  
Author(s):  
Mohamed Abdel-Basset ◽  
Mai Mohamed ◽  
Florentin Smarandache ◽  
Victor Chang

IJARCCE ◽  
2015 ◽  
pp. 333-338
Author(s):  
Gajendra Singh Rajput ◽  
Nayna Sharma ◽  
Shashank Swami

Sign in / Sign up

Export Citation Format

Share Document