Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/21357
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLydia E.L.en_US
dc.contributor.authorPandiselvam R.en_US
dc.contributor.authorSaranya R.en_US
dc.contributor.authorKirutikaa U.S.en_US
dc.contributor.authorIlayaraja M.en_US
dc.contributor.authorShankar K.en_US
dc.contributor.authorMaseleno A.en_US
dc.date.accessioned2021-10-25T06:32:05Z-
dc.date.available2021-10-25T06:32:05Z-
dc.date.issued2019-
dc.identifier.urihttp://dspace2020.uniten.edu.my:8080/handle/123456789/21357-
dc.description.abstractData Analytics has taken important and demanding problems in the research areas such as computer science, biology, medicine, finance, and homeland security. This research paper has resolved the problem of Entity resolution(ER) which recognizes the database records, which referred to the same real-world entity. The latest explosion of data made ER a impeach problem in a large range of applications. This paper proposed a scalable ER approach, used on-board datasets. Our latest approaches are simple because they consider either the entire ER process or the function, which are matching, and merging records as a black box procedure and used in a large range of ER applications. Pay-as-you-go approach for ER was a limit on the resources (e.g., work, runtime). This made the maximum progress as possible as required. This paper suggests scalable ER methods and new ER functionalities that have been not studied in the previous. Entity Resolution as a black-box operation provides general mechanisms which be used across applications. Further, the issue of managing information leakage, where one must try to avoid important bits of data from resolved by Entity Resolution, to sage against the loss of data privacy. As more of our sensitive data gets unprotected to various merchants, health care providers, employers, social sites and so on, there is a large chance that an adversary can "connect the dots" and piece together our data, which leads to even more damage of privacy. Thus to measure the quantifying data leakage, we use "disinformation" as a device which containing data leakage. © 2019, Research Trend. All rights reserved.en_US
dc.language.isoenen_US
dc.titleData integration and data privacy through “Pay-As-You-Go” approachen_US
dc.typearticleen_US
item.cerifentitytypePublications-
item.languageiso639-1en-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextreserved-
item.openairetypearticle-
Appears in Collections:UNITEN Ebook and Article
Files in This Item:
File Description SizeFormat 
This document is not yet available.pdf
  Restricted Access
396.12 kBAdobe PDFView/Open    Request a copy
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.