Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
IJCATR Volume 13 Issue 8
Privacy-Preserving Data Mining: Techniques and Applications
George M. Kimwomi, Fullgence Mwakondo, Wilson Cheruiyot
10.7753/IJCATR1306.1016
keywords : Privacy preservation, data mining, privacy preservation techniques, privacy preservation applications
Continued advancement in technology and the resulting digitalization in society has generated large electronic databases which are unstructured. The databases contain valuable hidden information which could be extracted through data mining to support organizations in strategic management. But these data sets consist of private and sensitive data about individuals and organizations which could be exposed in the data mining process thereby breaching the right to privacy of the owners. Even so, the valuable information hidden in the data need to be extracted to support organizations make strategic decisions. A range of privacy preservation techniques have been developed which could be used to protect private and sensitive data in a data mining process so that the right to privacy is not breached. This paper sought to discuss the privacy preservation techniques in data mining and their areas of application.
@artical{g1382024ijcatr13081016,
Title = "Privacy-Preserving Data Mining: Techniques and Applications",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "13",
Issue ="8",
Pages ="180 - 183",
Year = "2024",
Authors ="George M. Kimwomi, Fullgence Mwakondo, Wilson Cheruiyot"}
Overview applications on Artificial Intelligence.
Algorithm used in Artificial Intelligence.
Real-time face monitoring using computer vision algorithm.
In industries and medical application Artificial Intelligence plays major roles.