Technique for optimizing of association rule mining by utilizing genetic algorithm

Author(s):  
Darshana H. Patel ◽  
Saurabh Shah ◽  
Avani Vasant

With the advent of various technologies and digitization, popularity of the data mining has been increased for analysis and growth purpose in several fields. However, such pattern discovery by data mining also discloses personal information of an individual or organization. In today’s world, people are very much concerned about their sensitive information which they don’t want to share. Thus, it is very much required to protect the private data. This paper focuses on preserving the sensitive information as well as maintaining the efficiency which gets affected due to privacy preservation. Privacy is preserved by anonymization and efficiency is improved by optimization techniques as now days several advanced optimization techniques are used to solve the various problems of different areas. Furthermore, privacy preserving association classification has been implemented utilizing various datasets considering the accuracy parameter and it has been concluded that as privacy increases, accuracy gets degraded due to data transformation. Hence, optimization techniques are applied to improve the accuracy. In addition, comparison with the existing optimization technique namely particle swarm optimization, Cuckoo search and animal migration optimization has been carried out with the proposed approach specifically genetic algorithm for optimizing association rules.It has been concluded that the proposed approach requires more execution time about 20-80 milliseconds depending on the dataset but at the same time accuracy is improved by 5-6 % as compared to the existing approaches.

2016 ◽  
Vol 2016 ◽  
pp. 1-9
Author(s):  
Fayiz Abu Khadra ◽  
Jaber Abu Qudeiri ◽  
Mohammed Alkahtani

A control methodology based on a nonlinear control algorithm and optimization technique is presented in this paper. A controller called “the robust integral of the sign of the error” (in short, RISE) is applied to control chaotic systems. The optimum RISE controller parameters are obtained via genetic algorithm optimization techniques. RISE control methodology is implemented on two chaotic systems, namely, the Duffing-Holms and Van der Pol systems. Numerical simulations showed the good performance of the optimized RISE controller in tracking task and its ability to ensure robustness with respect to bounded external disturbances.


Author(s):  
Shapour Azar ◽  
Brian J. Reynolds ◽  
Sanjay Narayanan

Abstract Engineering decision making involving multiple competing objectives relies on choosing a design solution from an optimal set of solutions. This optimal set of solutions, referred to as the Pareto set, represents the tradeoffs that exist between the competing objectives for different design solutions. Generation of this Pareto set is the main focus of multiple objective optimization. There are many methods to solve this type of problem. Some of these methods generate solutions that cannot be applied to problems with a combination of discrete and continuous variables. Often such solutions are obtained by an optimization technique that can only guarantee local Pareto solutions or is applied to convex problems. The main focus of this paper is to demonstrate two methods of using genetic algorithms to overcome these problems. The first method uses a genetic algorithm with some external modifications to handle multiple objective optimization, while the second method operates within the genetic algorithm with some significant internal modifications. The fact that the first method operates with the genetic algorithm and the second method within the genetic algorithm is the main difference between these two techniques. Each method has its strengths and weaknesses, and it is the objective of this paper to compare and contrast the two methods quantitatively as well as qualitatively. Two multiobjective design optimization examples are used for the purpose of this comparison.


2019 ◽  
Vol 29 (1) ◽  
pp. 1441-1452 ◽  
Author(s):  
G.K. Shailaja ◽  
C.V. Guru Rao

Abstract Privacy-preserving data mining (PPDM) is a novel approach that has emerged in the market to take care of privacy issues. The intention of PPDM is to build up data-mining techniques without raising the risk of mishandling of the data exploited to generate those schemes. The conventional works include numerous techniques, most of which employ some form of transformation on the original data to guarantee privacy preservation. However, these schemes are quite multifaceted and memory intensive, thus leading to restricted exploitation of these methods. Hence, this paper intends to develop a novel PPDM technique, which involves two phases, namely, data sanitization and data restoration. Initially, the association rules are extracted from the database before proceeding with the two phases. In both the sanitization and restoration processes, key extraction plays a major role, which is selected optimally using Opposition Intensity-based Cuckoo Search Algorithm, which is the modified format of Cuckoo Search Algorithm. Here, four research issues, such as hiding failure rate, information preservation rate, and false rule generation, and degree of modification are minimized using the adopted sanitization and restoration processes.


Author(s):  
Bhargav Appasani ◽  
Rahul Pelluri ◽  
Vijay Kumar Verma ◽  
Nisha Gupta

Genetic Algorithm (GA) is a widely used optimization technique with multitudinous applications. Improving the performance of the GA would further augment its functionality. This paper presents a Crossover Improved GA (CIGA) that emulates the motion of fireflies employed in the Firefly Algorithm (FA). By employing this mimicked crossover operation, the overall performance of the GA is greatly enhanced. The CIGA is tested on 14 benchmark functions conjointly with the other existing optimization techniques to establish its superiority. Finally, the CIGA is applied to the practical optimization problem of synthesizing non-uniform linear antenna arrays with low side lobe levels (SLL) and low beam width, both requirements being incompatible. However, the proposed CIGA applied for the synthesis of a 12 element array yields an SLL of [Formula: see text]29.2[Formula: see text]dB and a reduced beam width of 19.1[Formula: see text].


2021 ◽  
Author(s):  
Rohit Ravindra Nikam ◽  
Rekha Shahapurkar

Data mining is a technique that explores the necessary data is extracted from large data sets. Privacy protection of data mining is about hiding the sensitive information or identity of breach security or without losing data usability. Sensitive data contains confidential information about individuals, businesses, and governments who must not agree upon before sharing or publishing his privacy data. Conserving data mining privacy has become a critical research area. Various evaluation metrics such as performance in terms of time efficiency, data utility, and degree of complexity or resistance to data mining techniques are used to estimate the privacy preservation of data mining techniques. Social media and smart phones produce tons of data every minute. To decision making, the voluminous data produced from the different sources can be processed and analyzed. But data analytics are vulnerable to breaches of privacy. One of the data analytics frameworks is recommendation systems commonly used by e-commerce sites such as Amazon, Flip Kart to recommend items to customers based on their purchasing habits that lead to characterized. This paper presents various techniques of privacy conservation, such as data anonymization, data randomization, generalization, data permutation, etc. such techniques which existing researchers use. We also analyze the gap between various processes and privacy preservation methods and illustrate how to overcome such issues with new innovative methods. Finally, our research describes the outcome summary of the entire literature.


Author(s):  
G. Bhavani ◽  
S. Sivakumari

Data mining process extracts useful information from a large amount of data. The most interesting part of data mining is discovering the unseen patterns without unpacking sensitive knowledge. Privacy Preserving Data Mining abbreviated as PPDM deals with the issue of sustaining the privacy of information. This methodology covers the sensitive information from disclosure. PPDM techniques are established for hiding the sensitive information even after performing the data mining. One of the practices to hide the sensitive association rules is termed as association rule hiding. The main objective of association rule hiding algorithm is to slightly adjust the original database so that no sensitive association rule is derived from it. The following article presents a detailed survey of various association rule hiding techniques for preserving privacy in data mining. At first, different techniques developed by previous researchers are studied in detail. Then, a comparative analysis is carried out to know the limitations of each technique and then providing a suggestion for future improvement in association rule hiding for privacy preservation.


Author(s):  
Koushik Majumder ◽  
Debashis De ◽  
Senjuti Kar ◽  
Rani Singh

Mobile Ad hoc Networks (MANET) are wireless infrastructure less networks that are formed spontaneously and are highly dynamic in nature. Clustering is done in MANETs to address issues related to scalability, heterogeneity and to reduce network overhead. In clustering the entire network is divided into clusters or groups with one Cluster Head (CH) per cluster. The process of CH selection and route optimization is extremely crucial in clustering. Genetic Algorithm (GA) can be implemented to optimize the process of clustering in MANETs. GA is the most recently used advanced bio-inspired optimization technique which implements techniques of genetics like selection, crossover, mutation etc. to find out an improved solution to a problem similar to the next generation that inherits the positive traits and features of the previous one. In this chapter several genetic algorithm based optimization techniques for clustering has been discussed. A comparative analysis of the different approaches has also been presented. This chapter concludes with future research directions in this domain.


2020 ◽  
Vol 17 (11) ◽  
pp. 4971-4979
Author(s):  
D. Menaga ◽  
I. Humaira Begum

Security of the data is also concerned with the privacy of the data since the data or the information can be easily disclosed. Data sharing also plays a key role in security. Recently, patterns are disclosed using associative rule mining and the sensitive information are one of the imposing threats to the security aspects in data mining. Preserving the data as well as the privacy of the user using several PPDM approaches leads to provide authorized access for such sensitive information. The security threats for preserving privacy are provided by developing a sanitization process. The sanitization process is considered to be one of the biggest challenges in the mining of data. In this paper, different approaches such as GA-based and PSO based algorithms are surveyed and analyzed for preserving the privacy of data. The purpose of data sanitization and the use of Bio-Inspired algorithms such as Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) are discussed.


2016 ◽  
Vol 58 (1) ◽  
pp. 51-77 ◽  
Author(s):  
S. BERRES ◽  
A. CORONEL ◽  
R. LAGOS ◽  
M. SEPÚLVEDA

This paper deals with the flux identification problem for scalar conservation laws. The problem is formulated as an optimization problem, where the objective function compares the solution of the direct problem with observed profiles at a fixed time. A finite volume scheme solves the direct problem and a continuous genetic algorithm solves the inverse problem. The numerical method is tested with synthetic experimental data. Simulation parameters are recovered approximately. The tested heuristic optimization technique turns out to be more robust than classical optimization techniques.


Author(s):  
Kalpana Chavhan ◽  
Dr. Praveen S. Challagidad

Any data that user creates or owns is known as the user's data (For example: Name, USN, Phone number, address, email Id). As the number of users in social networks are increasing day by day the data generated by the user's is also increasing. Network providers will publish the data to others for analysis with hope that mining will provide additional functionality to their users or produce useful results that they can share with others. The analysis of social networks is used in modern sociology, geography, economics and information science as well as in various fields. Publicizing the original data of social networks for analysis raises issues of confidentiality, the adversary can search for documented threats such as identity theft, digital harassment and personalized spam. The published data may contain some sensitive information of individuals which must not be disclosed for this reason social network data must be anonymized before it is published. To do the data in nominate the anonymization technique should be applied, to preserve the privacy of data in the social network in a manner that preserves the privacy of the user whose records are being published while maintaining the published dataset rich enough to allow for the exploration of data. In order to address the issue of privacy protection, we first describe the concept of k-anonymity and illustrate different approaches for its enforcement. We then discuss how the privacy requirements characterized by k-anonymity can be violated in data mining and introduce possible approaches to ensure the satisfaction of k-anonymity in data mining also several attacks on dataset are discussed.


Sign in / Sign up

Export Citation Format

Share Document