DISTRIBUTION OF DATA BASED ON DEPENDENCIES AND ASSOCIATION RULES
International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
Today's massive databases provide a daunting challenge. But it's possible that conventional data analytics won't be able to deal with these massive volumes. As a result, researchers exert considerable effort to provide a conducive setting in which to analyse and improve the algorithms. This study introduces a technique for safeguarding digital data by examining the relationship between the columns of a dataset using highly relative connection patterns. When columns are relocated to other positions, the resulting dataset is reduced in size. Therefore, a sophisticated encryption technique was implemented to increase the security of information kept on these servers. The adult dataset is a large collection of real-world data utilised in scientific research. The proposed technique is superior to current approaches, as shown by the comparative results. On the basis of assessment criteria, outperforms other, more conventional methods.
References
1. Chu, Wesley W., et al. "Task Allocation in Distributed Data Processing." Computer 13.11 (1980): 57-69.
2. Rajkumar, V., and V. Maniraj. "Dependency Aware Caching (Dac) For Software Defined Networks." Webology (ISSN: 1735-188X) 18.5 (2021).
3. Agarwal, Shivam. "Data mining: Data mining concepts and techniques." 2013 international conference on machine intelligence and research advancement. IEEE, 2013.
4. Han, Jiawei, Jian Pei, and Hanghang Tong. Data mining: concepts and techniques. Morgan kaufmann, 2022.
5. Rajkumar, V., and V. Maniraj. "HCCLBA: Hop-By-Hop Consumption Conscious Load Balancing Architecture Using Programmable Data Planes." Webology (ISSN: 1735-188X) 18.2 (2021).
6. Rajkumar, V., and V. Maniraj. "Software-Defined Networking's Study with Impact on Network Security." Design Engineering (ISSN: 0011-9342) 8 (2021).
7. Kantardzic, Mehmed. Data mining: concepts, models, methods, and algorithms. John Wiley & Sons, 2011.
8. Gorunescu, Florin. Data Mining: Concepts, models and techniques. Vol. 12. Springer Science & Business Media, 2011.
9. Rajkumar, V., and V. Maniraj. "PRIVACY-PRESERVING COMPUTATION WITH AN EXTENDED FRAMEWORK AND FLEXIBLE ACCESS CONTROL." ?????? (?????) 48.10 (2021).
10. Papenbrock, Thorsten, and Felix Naumann. "A hybrid approach to functional dependency discovery." Proceedings of the 2016 International Conference on Management of Data. 2016.
11. Garvey, Paul R., and C. Ariel Pinto. "Introduction to functional dependency network analysis." The MITRE Corporation and Old Dominion, Second International Symposium on Engineering Systems, MIT, Cambridge, Massachusetts. Vol. 5. 2009.
12. Rajkumar, V., and V. Maniraj. "RL-ROUTING: A DEEP REINFORCEMENT LEARNING SDN ROUTING ALGORITHM." JOURNAL OF EDUCATION: RABINDRABHARATI UNIVERSITY (ISSN: 0972-7175) 24.12 (2021).
13. Jones, Mark P. "Type classes with functional dependencies." European Symposium on Programming. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
14. Abedjan, Ziawasch, Patrick Schulze, and Felix Naumann. "DFD: Efficient functional dependency discovery." Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management. 2014.
15. Li, Mingda, Hongzhi Wang, and Jianzhong Li. "Mining conditional functional dependency rules on big data." Big Data Mining and Analytics 3.1 (2019): 68-84.
16. Gupta, Gopal K. Introduction to data mining with case studies. PHI Learning Pvt. Ltd., 2014.
17. Rajkumar, V., and V. Maniraj. "HYBRID TRAFFIC ALLOCATION USING APPLICATION-AWARE ALLOCATION OF RESOURCES IN CELLULAR NETWORKS." Shodhsamhita (ISSN: 2277-7067) 12.8 (2021).
Keywords
Effective Pruning, Data Mining, Functional Dependency, Encryption, Distributed Data.