Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Udayarani"'
Autor:
Sujatha, K., Udayarani, V.
Publikováno v:
International Journal of Intelligent Computing and Cybernetics, 2021, Vol. 15, Issue 1, pp. 1-16.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJICC-05-2021-0094
Publikováno v:
Journal of Cardiovascular Disease Research (Journal of Cardiovascular Disease Research); 2024, Vol. 15 Issue 1, p2606-2614, 9p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
International Journal of System Assurance Engineering and Management.
Autor:
V. Udayarani, K. Sujatha
Publikováno v:
International Journal of Intelligent Computing and Cybernetics. 15:1-16
PurposeThe purpose of this paper is to improve the privacy in healthcare datasets that hold sensitive information. Putting a stop to privacy divulgence and bestowing relevant information to legitimate users are at the same time said to be of differin
Autor:
K. Sujatha, V. Udayarani
Publikováno v:
International Journal of System Assurance Engineering and Management.
Data privacy protection has become a multifaceted function with the inception of advanced data analysis tools and data mining methods. To this end, several privacy preservation methods have been developed in order to safeguard sensitive data concerni
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
The collection and effectiveness of sensitive Big Data have grown with Information Technology (IT) development. While using sensitive Big Data to acquire relevant information, it becomes indispensable that irrelevant sensitive data are reduced to saf
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 12:903
Big data has remodeled the way organizations supervise, examine and leverage data in any industry. To safeguard sensitive data from public contraventions, several countries investigated this issue and carried out privacy protection mechanism. With th
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Feb2022, Vol. 12 Issue 1, p903-913, 11p
Publikováno v:
International Journal of Data Mining Techniques and Applications. 6:33-35