Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/63410
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Isam, Md Zahidul | en |
dc.contributor.author | Brankovic, Ljiljana | en |
local.source.editor | Editor(s): R L May and W F Blyth | en |
dc.date.accessioned | 2024-10-10T04:00:32Z | - |
dc.date.available | 2024-10-10T04:00:32Z | - |
dc.date.issued | 2003-07 | - |
dc.identifier.citation | Proceedings of the 6th Engineering Mathematics and Applications Conference (EMAC2003), p. 85-90 | en |
dc.identifier.isbn | 1863655336 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/63410 | - |
dc.description.abstract | <p>In recent years advances in technology facilitated collection and storage of vast amount of data. Many organizations, including large and small businesses, and hospitals and government bodies rely on data for day-to-day operation as well as marketing, planning and research purposes. Examples include criminal records used by law enforcement and national security agencies, medical records used for treatment and research purposes and shopping records used for marketing and enhancing business strategies. The benefits of the information extracted from such data can hardly be overestimated. For example, we are witnessing huge progress made in the human genetic project bringing new promises of previously unimaginable treatments such as gene therapy.</p> | en |
dc.language | en | en |
dc.publisher | Engineering Mathematics Group, ANZIAM | en |
dc.relation.ispartof | Proceedings of the 6th Engineering Mathematics and Applications Conference (EMAC2003) | en |
dc.title | Noise Addition for Protecting Privacy in Data Mining | en |
dc.type | Conference Publication | en |
dc.relation.conference | EMAC 2003: The 6th Engineering Mathematics and Applications Conference (EMAC2003) | en |
local.contributor.firstname | Md Zahidul | en |
local.contributor.firstname | Ljiljana | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 7th - 11th July, 2003 | en |
local.conference.place | Sydney, Australia | en |
local.publisher.place | Australia | en |
local.format.startpage | 85 | en |
local.format.endpage | 90 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Isam | en |
local.contributor.lastname | Brankovic | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/63410 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Noise Addition for Protecting Privacy in Data Mining | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | EMAC 2003: The 6th Engineering Mathematics and Applications Conference (EMAC2003), Sydney, Australia, 7th - 11th July, 2003 | en |
local.search.author | Isam, Md Zahidul | en |
local.search.author | Brankovic, Ljiljana | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.conference.venue | University of Technology, Sydney | en |
local.sensitive.cultural | No | en |
local.year.published | 2003 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/88df9c3a-72a7-42f8-85ce-caa1118e311b | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.date.start | 2003-07-07 | - |
local.date.end | 2003-07-11 | - |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Description | Size | Format |
---|
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.