53 datasets found
  1. d

    Privacy Preserving Distributed Data Mining

    • catalog.data.gov
    • s.cnmilf.com
    Updated Apr 10, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dashlink (2025). Privacy Preserving Distributed Data Mining [Dataset]. https://catalog.data.gov/dataset/privacy-preserving-distributed-data-mining
    Explore at:
    Dataset updated
    Apr 10, 2025
    Dataset provided by
    Dashlink
    Description

    Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring systems. For example, consider an airline manufacturer [tex]$\mathcal{C}$[/tex] manufacturing an aircraft model [tex]$A$[/tex] and selling it to five different airline operating companies [tex]$\mathcal{V}_1 \dots \mathcal{V}_5$[/tex]. These aircrafts, during their operation, generate huge amount of data. Mining this data can reveal useful information regarding the health and operability of the aircraft which can be useful for disaster management and prediction of efficient operating regimes. Now if the manufacturer [tex]$\mathcal{C}$[/tex] wants to analyze the performance data collected from different aircrafts of model-type [tex]$A$[/tex] belonging to different airlines then central collection of data for subsequent analysis may not be an option. It should be noted that the result of this analysis may be statistically more significant if the data for aircraft model [tex]$A$[/tex] across all companies were available to [tex]$\mathcal{C}$[/tex]. The potential problems arising out of such a data mining scenario are:

  2. Privacy Preserving Distributed Data Mining - Dataset - NASA Open Data Portal...

    • data.nasa.gov
    Updated Mar 31, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). Privacy Preserving Distributed Data Mining - Dataset - NASA Open Data Portal [Dataset]. https://data.nasa.gov/dataset/privacy-preserving-distributed-data-mining
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring systems. For example, consider an airline manufacturer [tex]$\mathcal{C}$[/tex] manufacturing an aircraft model [tex]$A$[/tex] and selling it to five different airline operating companies [tex]$\mathcal{V}_1 \dots \mathcal{V}_5$[/tex]. These aircrafts, during their operation, generate huge amount of data. Mining this data can reveal useful information regarding the health and operability of the aircraft which can be useful for disaster management and prediction of efficient operating regimes. Now if the manufacturer [tex]$\mathcal{C}$[/tex] wants to analyze the performance data collected from different aircrafts of model-type [tex]$A$[/tex] belonging to different airlines then central collection of data for subsequent analysis may not be an option. It should be noted that the result of this analysis may be statistically more significant if the data for aircraft model [tex]$A$[/tex] across all companies were available to [tex]$\mathcal{C}$[/tex]. The potential problems arising out of such a data mining scenario are:

  3. Review results of the manuscript "A Systematic Review on Privacy-Preserving...

    • figshare.com
    txt
    Updated Aug 26, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Chang Sun (2021). Review results of the manuscript "A Systematic Review on Privacy-Preserving Distributed Data Mining" [Dataset]. http://doi.org/10.6084/m9.figshare.14239937.v4
    Explore at:
    txtAvailable download formats
    Dataset updated
    Aug 26, 2021
    Dataset provided by
    Figsharehttp://figshare.com/
    figshare
    Authors
    Chang Sun
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset contains the review results of the manuscript of "A Systematic Review on Privacy-Preserving Distributed Data Mining" authored by Chang Sun, Lianne Ippel, Andre Dekker, Michel Dumontier, Johan van Soest. In the datasets, there are 231 published articles about privacy-perserving distributed data mining. Variables include article DOI, title, authors, keywords, user scenarios, distributed data scenarios, privacy/security definition/proof/analysis, privacy statement, privacy-preserving methods category, privacy-preserving methods (specific), data mining problem, data mining/machine learning methods, experiment data information, accuracy of the methods, efficiency (computation and communication cost), and scalability. The search method and evaluation criteria are described in the paper "A Systematic Review on Privacy-Preserving Distributed Data Mining". The DOI and link to the paper will be provided when the paper gets published.

  4. d

    Data from: Privacy Preserving Outlier Detection through Random Nonlinear...

    • catalog.data.gov
    • data.amerigeoss.org
    Updated Apr 10, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dashlink (2025). Privacy Preserving Outlier Detection through Random Nonlinear Data Distortion [Dataset]. https://catalog.data.gov/dataset/privacy-preserving-outlier-detection-through-random-nonlinear-data-distortion
    Explore at:
    Dataset updated
    Apr 10, 2025
    Dataset provided by
    Dashlink
    Description

    Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive information. Privacy preserving data mining aims to solve this problem by randomly transforming the data prior to its release to data miners. Previous work only considered the case of linear data perturbations — additive, multiplicative or a combination of both for studying the usefulness of the perturbed output. In this paper, we discuss nonlinear data distortion using potentially nonlinear random data transformation and show how it can be useful for privacy preserving anomaly detection from sensitive datasets. We develop bounds on the expected accuracy of the nonlinear distortion and also quantify privacy by using standard definitions. The highlight of this approach is to allow a user to control the amount of privacy by varying the degree of nonlinearity. We show how our general transformation can be used for anomaly detection in practice for two specific problem instances: a linear model and a popular nonlinear model using the sigmoid function. We also analyze the proposed nonlinear transformation in full generality and then show that for specific cases it is distance preserving. A main contribution of this paper is the discussion between the invertibility of a transformation and privacy preservation and the application of these techniques to outlier detection. Experiments conducted on real-life datasets demonstrate the effectiveness of the approach.

  5. d

    Data from: Multi-objective optimization based privacy preserving distributed...

    • catalog.data.gov
    • s.cnmilf.com
    Updated Sep 19, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dashlink (2025). Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks [Dataset]. https://catalog.data.gov/dataset/multi-objective-optimization-based-privacy-preserving-distributed-data-mining-in-peer-to-p
    Explore at:
    Dataset updated
    Sep 19, 2025
    Dataset provided by
    Dashlink
    Description

    This paper proposes a scalable, local privacy preserving algorithm for distributed Peer-to-Peer (P2P) data aggregation useful for many advanced data mining/analysis tasks such as average/sum computation, decision tree induction, feature selection, and more. Unlike most multi-party privacy-preserving data mining algorithms, this approach works in an asynchronous manner through local interactions and it is highly scalable. It particularly deals with the distributed computation of the sum of a set of numbers stored at different peers in a P2P network in the context of a P2P web mining application. The proposed optimization based privacy-preserving technique for computing the sum allows different peers to specify different privacy requirements without having to adhere to a global set of parameters for the chosen privacy model. Since distributed sum computation is a frequently used primitive, the proposed approach is likely to have significant impact on many data mining tasks such as multi-party privacy-preserving clustering, frequent itemset mining, and statistical aggregate computation.

  6. Data from: Peer-to-Peer Data Mining, Privacy Issues, and Games

    • data.nasa.gov
    • s.cnmilf.com
    • +2more
    Updated Mar 31, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). Peer-to-Peer Data Mining, Privacy Issues, and Games [Dataset]. https://data.nasa.gov/dataset/peer-to-peer-data-mining-privacy-issues-and-games
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    Peer-to-Peer (P2P) networks are gaining increasing popularity in many distributed applications such as file-sharing, network storage, web caching, sear- ching and indexing of relevant documents and P2P network-threat analysis. Many of these applications require scalable analysis of data over a P2P network. This paper starts by offering a brief overview of distributed data mining applications and algorithms for P2P environments. Next it discusses some of the privacy concerns with P2P data mining and points out the problems of existing privacy-preserving multi-party data mining techniques. It further points out that most of the nice assumptions of these existing privacy preserving techniques fall apart in real-life applications of privacy-preserving distributed data mining (PPDM). The paper offers a more realistic formulation of the PPDM problem as a multi-party game and points out some recent results.

  7. G

    Privacy‑Preserving Data Mining Tools Market Research Report 2033

    • growthmarketreports.com
    csv, pdf, pptx
    Updated Aug 29, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Growth Market Reports (2025). Privacy‑Preserving Data Mining Tools Market Research Report 2033 [Dataset]. https://growthmarketreports.com/report/privacypreserving-data-mining-tools-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Aug 29, 2025
    Dataset authored and provided by
    Growth Market Reports
    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Privacy?Preserving Data Mining Tools Market Outlook



    According to our latest research, the global Privacy?Preserving Data Mining Tools market size reached USD 1.42 billion in 2024, reflecting robust adoption across diverse industries. The market is expected to exhibit a CAGR of 22.8% during the forecast period, propelling the market to USD 10.98 billion by 2033. This remarkable growth is driven by the increasing need for secure data analytics, stringent data protection regulations, and the rising frequency of data breaches, all of which are pushing organizations to adopt advanced privacy solutions.



    One of the primary growth factors for the Privacy?Preserving Data Mining Tools market is the exponential rise in data generation and the parallel escalation of privacy concerns. As organizations collect vast amounts of sensitive information, especially in sectors like healthcare and BFSI, the risk of data exposure and misuse grows. Governments worldwide are enacting stricter data protection laws, such as the GDPR in Europe and CCPA in California, compelling enterprises to integrate privacy?preserving technologies into their analytics workflows. These regulations not only mandate compliance but also foster consumer trust, making privacy?preserving data mining tools a strategic investment for businesses aiming to maintain a competitive edge while safeguarding user data.



    Another significant driver is the rapid digital transformation across industries, which necessitates the extraction of actionable insights from large, distributed data sets without compromising privacy. Privacy?preserving techniques, such as federated learning, homomorphic encryption, and differential privacy, are gaining traction as they allow organizations to collaborate and analyze data securely. The advent of cloud computing and the proliferation of connected devices further amplify the demand for scalable and secure data mining solutions. As enterprises embrace cloud-based analytics, the need for robust privacy-preserving mechanisms becomes paramount, fueling the adoption of advanced tools that can operate seamlessly in both on-premises and cloud environments.



    Moreover, the increasing sophistication of cyber threats and the growing awareness of the potential reputational and financial damage caused by data breaches are prompting organizations to prioritize data privacy. High-profile security incidents have underscored the vulnerabilities inherent in traditional data mining approaches, accelerating the shift towards privacy-preserving alternatives. The integration of artificial intelligence and machine learning with privacy-preserving technologies is also opening new avenues for innovation, enabling more granular and context-aware data analytics. This technological convergence is expected to further catalyze market growth, as organizations seek to harness the full potential of their data assets while maintaining stringent privacy standards.



    Privacy-Preserving Analytics is becoming a cornerstone in the modern data-driven landscape, offering organizations a way to extract valuable insights while maintaining stringent data privacy standards. This approach ensures that sensitive information remains protected even as it is analyzed, allowing businesses to comply with increasing regulatory demands without sacrificing the depth and breadth of their data analysis. By leveraging Privacy-Preserving Analytics, companies can foster greater trust among their customers and stakeholders, knowing that their data is being handled with the utmost care and security. This paradigm shift is not just about compliance; it’s about redefining how organizations approach data analytics in a world where privacy concerns are paramount.



    From a regional perspective, North America currently commands the largest share of the Privacy?Preserving Data Mining Tools market, driven by the presence of leading technology vendors, high awareness levels, and a robust regulatory framework. Europe follows closely, propelled by stringent data privacy laws and increasing investments in secure analytics infrastructure. The Asia Pacific region is witnessing the fastest growth, fueled by rapid digitalization, expanding IT ecosystems, and rising cybersecurity concerns in emerging economies such as China and India. Latin America and the Middle East & Africa are also experiencing steady growth, albeit from

  8. d

    Privacy Preservation through Random Nonlinear Distortion

    • catalog.data.gov
    • s.cnmilf.com
    Updated Apr 9, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dashlink (2025). Privacy Preservation through Random Nonlinear Distortion [Dataset]. https://catalog.data.gov/dataset/privacy-preservation-through-random-nonlinear-distortion
    Explore at:
    Dataset updated
    Apr 9, 2025
    Dataset provided by
    Dashlink
    Description

    Consider a scenario in which the data owner has some private or sensitive data and wants a data miner to access them for studying important patterns without revealing the sensitive information. Privacy-preserving data mining aims to solve this problem by randomly transforming the data prior to their release to the data miners. Previous works only considered the case of linear data perturbations - additive, multiplicative, or a combination of both - for studying the usefulness of the perturbed output. In this paper, we discuss nonlinear data distortion using potentially nonlinear random data transformation and show how it can be useful for privacy-preserving anomaly detection from sensitive data sets. We develop bounds on the expected accuracy of the nonlinear distortion and also quantify privacy by using standard definitions. The highlight of this approach is to allow a user to control the amount of privacy by varying the degree of nonlinearity. We show how our general transformation can be used for anomaly detection in practice for two specific problem instances: a linear model and a popular nonlinear model using the sigmoid function. We also analyze the proposed nonlinear transformation in full generality and then show that, for specific cases, it is distance preserving. A main contribution of this paper is the discussion between the invertibility of a transformation and privacy preservation and the application of these techniques to outlier detection. The experiments conducted on real-life data sets demonstrate the effectiveness of the approach.

  9. Privacy Preserving Outlier Detection through Random Nonlinear Data...

    • data.nasa.gov
    Updated Mar 31, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    nasa.gov (2025). Privacy Preserving Outlier Detection through Random Nonlinear Data Distortion - Dataset - NASA Open Data Portal [Dataset]. https://data.nasa.gov/dataset/privacy-preserving-outlier-detection-through-random-nonlinear-data-distortion
    Explore at:
    Dataset updated
    Mar 31, 2025
    Dataset provided by
    NASAhttp://nasa.gov/
    Description

    Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive information. Privacy preserving data mining aims to solve this problem by randomly transforming the data prior to its release to data miners. Previous work only considered the case of linear data perturbations — additive, multiplicative or a combination of both for studying the usefulness of the perturbed output. In this paper, we discuss nonlinear data distortion using potentially nonlinear random data transformation and show how it can be useful for privacy preserving anomaly detection from sensitive datasets. We develop bounds on the expected accuracy of the nonlinear distortion and also quantify privacy by using standard definitions. The highlight of this approach is to allow a user to control the amount of privacy by varying the degree of nonlinearity. We show how our general transformation can be used for anomaly detection in practice for two specific problem instances: a linear model and a popular nonlinear model using the sigmoid function. We also analyze the proposed nonlinear transformation in full generality and then show that for specific cases it is distance preserving. A main contribution of this paper is the discussion between the invertibility of a transformation and privacy preservation and the application of these techniques to outlier detection. Experiments conducted on real-life datasets demonstrate the effectiveness of the approach.

  10. f

    A sample transaction database.

    • plos.figshare.com
    xls
    Updated Feb 3, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo (2025). A sample transaction database. [Dataset]. http://doi.org/10.1371/journal.pone.0317427.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Feb 3, 2025
    Dataset provided by
    PLOS ONE
    Authors
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen. To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced. An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM). The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques. However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.). These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks. The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.

  11. Sanitized databases using MLHProtector algorithm.

    • plos.figshare.com
    xls
    Updated Feb 3, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo (2025). Sanitized databases using MLHProtector algorithm. [Dataset]. http://doi.org/10.1371/journal.pone.0317427.t007
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Feb 3, 2025
    Dataset provided by
    PLOShttp://plos.org/
    Authors
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen. To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced. An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM). The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques. However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.). These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks. The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.

  12. External utilities of items from Table 1.

    • plos.figshare.com
    xls
    Updated Feb 3, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo (2025). External utilities of items from Table 1. [Dataset]. http://doi.org/10.1371/journal.pone.0317427.t002
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Feb 3, 2025
    Dataset provided by
    PLOShttp://plos.org/
    Authors
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen. To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced. An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM). The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques. However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.). These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks. The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.

  13. P

    Privacy Computing Platform Report

    • archivemarketresearch.com
    doc, pdf, ppt
    Updated Feb 18, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Archive Market Research (2025). Privacy Computing Platform Report [Dataset]. https://www.archivemarketresearch.com/reports/privacy-computing-platform-35524
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Feb 18, 2025
    Dataset authored and provided by
    Archive Market Research
    License

    https://www.archivemarketresearch.com/privacy-policyhttps://www.archivemarketresearch.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The global privacy computing platform market size was valued at USD 8.7 billion in 2025 and is projected to reach USD 168.2 billion by 2033, exhibiting a CAGR of 43.2% during the forecast period. The rising concerns over data breaches and the stringent government regulations to safeguard sensitive data are the major drivers of the market. Moreover, the adoption of cloud-based platforms and the rapid digitalization across various industries are further fueling the growth of the privacy computing platform market. The increasing demand for privacy-preserving analytics, data mining, and machine learning algorithms has led to the emergence of innovative solutions in the privacy computing platform market. Cloud-based platforms have gained traction due to their flexibility, scalability, and cost-effectiveness. Furthermore, the convergence of privacy-enhancing technologies such as homomorphic encryption, secure multi-party computation, and differential privacy is creating new opportunities for market players. The market is characterized by a mix of established vendors, startups, and technology giants, who are investing heavily in research and development to offer advanced and secure privacy computing solutions.

  14. m

    A brief dataset highlighting online learning test scores of Bangladeshi...

    • data.mendeley.com
    Updated Feb 5, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Shabab Rahman (2024). A brief dataset highlighting online learning test scores of Bangladeshi high-school stduents [Dataset]. http://doi.org/10.17632/g88h8vz9kg.1
    Explore at:
    Dataset updated
    Feb 5, 2024
    Authors
    Shabab Rahman
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Area covered
    Bangladesh
    Description

    Purposive sampling was the method we chose to collect the data. We obtained information from two after-school coaching programs that voluntarily provided their online learning data to us in 2020 during the pandemic. Batches of 45 and 75 students each were used to organize the data, which were then combined to create a single dataset with 399 entries. Two phases of collection took place: on January 17, 2023, and on February 12, 2023. The initial data recording was done using Google Learning Management System's Google Classroom. The data was then exported to local storage by the classroom faculties and then passed onto the researchers. Excel was used to organize the data, with rows representing individual students and columns representing different topics. The dataset, which consists of four mock tests and sixteen physics topics, was gathered from grade 10 physics instructors and students. Every pupil was given a unique ID to protect their privacy, resulting in 399 distinct entries overall. The coaching institution standardized the dataset to score it out of 100 for consistency. It is important to note that for students who did not take the majority of the exams, the institutions did not gather or transmit missing data. The dataset displays a spread with a standard deviation of 20.5 and an average score of 69.547.

  15. D

    Data Processing and Hosting Services Industry Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). Data Processing and Hosting Services Industry Report [Dataset]. https://www.marketreportanalytics.com/reports/data-processing-and-hosting-services-industry-89228
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Apr 26, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Data Processing and Hosting Services market, exhibiting a Compound Annual Growth Rate (CAGR) of 4.20%, presents a significant opportunity for growth. While the exact market size in millions is not specified, considering the substantial involvement of major players like Amazon Web Services, IBM, and Salesforce, coupled with the pervasive adoption of cloud computing and big data analytics across diverse sectors, a 2025 market size exceeding $500 billion is a reasonable estimate. This robust growth is driven by several key factors. The increasing reliance on cloud-based solutions by both large enterprises and SMEs reflects a shift towards greater scalability, flexibility, and cost-effectiveness. Furthermore, the exponential growth of data necessitates advanced data processing capabilities, fueling demand for data mining, cleansing, and management services. The burgeoning adoption of AI and machine learning further enhances this need, as these technologies require robust data infrastructure and sophisticated processing techniques. Specific industry segments like IT & Telecommunications, BFSI (Banking, Financial Services, and Insurance), and Retail are major consumers, demanding reliable and secure hosting solutions and data processing capabilities to manage their critical operations and customer data. However, challenges remain, including the ongoing threat of cyberattacks and data breaches, necessitating robust security measures and compliance with evolving data privacy regulations. Competition among existing players is intense, driving innovation and price wars, which can impact profitability for some market participants. The forecast period of 2025-2033 indicates a continued upward trajectory for the market, largely fueled by expanding digitalization efforts globally. The Asia Pacific region is projected to be a significant contributor to this growth, driven by increasing internet penetration and a burgeoning technological landscape. While North America and Europe maintain substantial market share, the faster growth rate anticipated in Asia Pacific and other emerging markets signifies an evolving global market dynamic. Continued advancements in technologies such as edge computing, serverless architecture, and improved data analytics techniques will further drive market expansion and shape the competitive landscape. The segmentation within the market (by organization size, service offering, and end-user industry) presents diverse investment opportunities for businesses catering to specific needs and technological advancements within these niches. Recent developments include: December 2022 - TetraScience, the Scientific Data Cloud company, announced that Gubbs, a lab optimization, and validation software leader, joined the Tetra Partner Network to increase and enhance data processing throughput with the Tetra Scientific Data Cloud., November 2022 - Kinsta, a hosting provider that provides managed WordPress hosting powered by Google Cloud Platform, announced the launch of Application Hosting and Database Hosting. It is adding these two hosting services to its Managed WordPress product ushers in a new era for Kinsta as a Cloud Platform, enabling developers and businesses to run powerful applications, databases, websites, and services more flexibly than ever.. Key drivers for this market are: Growing Adoption of Cloud Computing to Accomplish Economies of Scale, Rising Demand for Outsourcing Data Processing Services. Potential restraints include: Growing Adoption of Cloud Computing to Accomplish Economies of Scale, Rising Demand for Outsourcing Data Processing Services. Notable trends are: Web Hosting is Gaining Traction Due to Emergence of Cloud-based Platform.

  16. US Deep Learning Market Analysis, Size, and Forecast 2025-2029

    • technavio.com
    pdf
    Updated Jul 8, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2025). US Deep Learning Market Analysis, Size, and Forecast 2025-2029 [Dataset]. https://www.technavio.com/report/us-deep-learning-market-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jul 8, 2025
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Time period covered
    2025 - 2029
    Description

    Snapshot img

    US Deep Learning Market Size 2025-2029

    The deep learning market size in US is forecast to increase by USD 5.02 billion at a CAGR of 30.1% between 2024 and 2029.

    The deep learning market is experiencing robust growth, driven by the increasing adoption of artificial intelligence (AI) in various industries for advanced solutioning. This trend is fueled by the availability of vast amounts of data, which is a key requirement for deep learning algorithms to function effectively. Industry-specific solutions are gaining traction, as businesses seek to leverage deep learning for specific use cases such as image and speech recognition, fraud detection, and predictive maintenance. Alongside, intuitive data visualization tools are simplifying complex neural network outputs, helping stakeholders understand and validate insights. 
    
    
    However, challenges remain, including the need for powerful computing resources, data privacy concerns, and the high cost of implementing and maintaining deep learning systems. Despite these hurdles, the market's potential for innovation and disruption is immense, making it an exciting space for businesses to explore further. Semi-supervised learning, data labeling, and data cleaning facilitate efficient training of deep learning models. Cloud analytics is another significant trend, as companies seek to leverage cloud computing for cost savings and scalability. 
    

    What will be the Size of the market During the Forecast Period?

    Request Free Sample

    Deep learning, a subset of machine learning, continues to shape industries by enabling advanced applications such as image and speech recognition, text generation, and pattern recognition. Reinforcement learning, a type of deep learning, gains traction, with deep reinforcement learning leading the charge. Anomaly detection, a crucial application of unsupervised learning, safeguards systems against security vulnerabilities. Ethical implications and fairness considerations are increasingly important in deep learning, with emphasis on explainable AI and model interpretability. Graph neural networks and attention mechanisms enhance data preprocessing for sequential data modeling and object detection. Time series forecasting and dataset creation further expand deep learning's reach, while privacy preservation and bias mitigation ensure responsible use.

    In summary, deep learning's market dynamics reflect a constant pursuit of innovation, efficiency, and ethical considerations. The Deep Learning Market in the US is flourishing as organizations embrace intelligent systems powered by supervised learning and emerging self-supervised learning techniques. These methods refine predictive capabilities and reduce reliance on labeled data, boosting scalability. BFSI firms utilize AI image recognition for various applications, including personalizing customer communication, maintaining a competitive edge, and automating repetitive tasks to boost productivity. Sophisticated feature extraction algorithms now enable models to isolate patterns with high precision, particularly in applications such as image classification for healthcare, security, and retail.

    How is this market segmented and which is the largest segment?

    The market research report provides comprehensive data (region-wise segment analysis), with forecasts and estimates in 'USD million' for the period 2025-2029, as well as historical data from 2019-2023 for the following segments.

    Application
    
      Image recognition
      Voice recognition
      Video surveillance and diagnostics
      Data mining
    
    
    Type
    
      Software
      Services
      Hardware
    
    
    End-user
    
      Security
      Automotive
      Healthcare
      Retail and commerce
      Others
    
    
    Geography
    
      North America
    
        US
    

    By Application Insights

    The Image recognition segment is estimated to witness significant growth during the forecast period. In the realm of artificial intelligence (AI) and machine learning, image recognition, a subset of computer vision, is gaining significant traction. This technology utilizes neural networks, deep learning models, and various machine learning algorithms to decipher visual data from images and videos. Image recognition is instrumental in numerous applications, including visual search, product recommendations, and inventory management. Consumers can take photographs of products to discover similar items, enhancing the online shopping experience. In the automotive sector, image recognition is indispensable for advanced driver assistance systems (ADAS) and autonomous vehicles, enabling the identification of pedestrians, other vehicles, road signs, and lane markings.

    Furthermore, image recognition plays a pivotal role in augmented reality (AR) and virtual reality (VR) applications, where it tracks physical objects and overlays digital content onto real-world scenarios. The model training process involves the backpropagation algorithm, which calculates the loss fu

  17. Set of SML-HUIs.

    • plos.figshare.com
    xls
    Updated Feb 3, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo (2025). Set of SML-HUIs. [Dataset]. http://doi.org/10.1371/journal.pone.0317427.t005
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Feb 3, 2025
    Dataset provided by
    PLOShttp://plos.org/
    Authors
    Loan T. T. Nguyen; Hoa Duong; An Mai; Bay Vo
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. High-utility itemset mining (HUIM) is an extension to frequent itemset mining (FIM) which deals with business data in the form of transaction databases, data that is also in danger of being stolen. To deal with this, a number of privacy-preserving data mining (PPDM) techniques have been introduced. An important topic in PPDM in the recent years is privacy-preserving utility mining (PPUM). The goal of PPUM is to protect the sensitive information, such as sensitive high-utility itemsets, in transaction databases, and make them undiscoverable for data mining techniques. However, available PPUM methods do not consider the generalization of items in databases (categories, classes, groups, etc.). These algorithms only consider the items at a specialized level, leaving the item combinations at a higher level vulnerable to attacks. The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely MLHProtector and FMLHProtector, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.

  18. Medicare Claims Synthetic Public Use Files

    • kaggle.com
    zip
    Updated Sep 11, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Kannal (2021). Medicare Claims Synthetic Public Use Files [Dataset]. https://www.kaggle.com/anikannal/cms-synthetic-data
    Explore at:
    zip(54542207 bytes)Available download formats
    Dataset updated
    Sep 11, 2021
    Authors
    Ani Kannal
    License

    https://creativecommons.org/publicdomain/zero/1.0/https://creativecommons.org/publicdomain/zero/1.0/

    Description

    Medicare Claims Synthetic Public Use Files (SynPUFs)

    Medicare Claims Synthetic Public Use Files (SynPUFs) were created to allow interested parties to gain familiarity using Medicare claims data while protecting beneficiary privacy. The data structure of the Medicare SynPUFs is very similar to the CMS Limited Data Sets, but with a smaller number of variables. They provide data analysts and software developers the opportunity to develop programs and products utilizing the identical formats and variable names as those which appear in the actual CMS data files. The files have been designed so that programs and procedures created on the SynPUFs will function on CMS Limited Data Sets. The SynPUFs also provide a robust set of metadata on the CMS claims data that have not been available in the public domain. After developmental work has been completed potential users should be much better informed about which CMS data products they would need to acquire to fulfill their analytic needs.

    These files may be used to:

    allow data entrepreneurs to develop and create software and applications that may eventually be applied to actual CMS claims data; train researchers on the use and complexity of conducting analyses with CMS claims data prior to initiating the process to obtain access to actual CMS data; and, support safe data mining innovations that may reveal unanticipated knowledge gains while preserving beneficiary privacy. Although these files have very limited inferential research value to draw conclusions about Medicare beneficiaries due to the synthetic processes used to create the files, they increase access to realistic Medicare claims data files in a timely and less expensive manner to spur the innovation necessary to achieve the goals of better care for beneficiaries and improve the health of the population.

    Files will be made available as a free downloads in order to provide access to Medicare data without the time and cost associated with obtaining data files which require more restricted access.

    The first Synthetic PUF released is the 2008-2010 Data Entrepreneurs’ SynPUF.

    Acknowledgements

    This data is published on the CMS website - https://www.cms.gov/Research-Statistics-Data-and-Systems/Downloadable-Public-Use-Files/SynPUFs

  19. Automatic Data Capture (ADC) Market Analysis North America, APAC, Europe,...

    • technavio.com
    pdf
    Updated Jun 11, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2024). Automatic Data Capture (ADC) Market Analysis North America, APAC, Europe, South America, Middle East and Africa - US, China, Germany, UK, France - Size and Forecast 2024-2028 [Dataset]. https://www.technavio.com/report/automatic-data-capture-adc-market-market-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jun 11, 2024
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Time period covered
    2024 - 2028
    Area covered
    United Kingdom, United States, Germany
    Description

    Snapshot img

    Automatic Data Capture (ADC) Market Size 2024-2028

    The automatic data capture (adc) market size is valued to increase by USD 48.69 billion, at a CAGR of 13.64% from 2023 to 2028. Increasing application of RFID will drive the automatic data capture (adc) market.

    Market Insights

    APAC dominated the market and accounted for a 43% growth during the 2024-2028.
    By Product - RFID segment was valued at USD 23.12 billion in 2022
    By Application - Industrial segment accounted for the largest market revenue share in 2022
    

    Market Size & Forecast

    Market Opportunities: USD 154.06 million 
    Market Future Opportunities 2023: USD 48685.50 million
    CAGR from 2023 to 2028 : 13.64%
    

    Market Summary

    The market encompasses technologies and solutions that enable the automatic collection, processing, and transmission of data from various sources, primarily barcodes, RFID, and biometric systems. This market is driven by the increasing demand for real-time data processing and analysis to optimize business operations, enhance productivity, and ensure regulatory compliance. One significant trend in the ADC market is the growing popularity of smart factories, where ADC technologies play a crucial role in streamlining manufacturing processes and improving overall efficiency. For instance, RFID tags can be used to track inventory levels, monitor equipment performance, and manage work-in-progress in real-time, leading to reduced downtime and improved quality. However, the adoption of ADC technologies also brings about security concerns. With the increasing amount of data being generated and transmitted, there is a growing need to protect sensitive information from unauthorized access and cyber-attacks. This has led to the development of advanced security solutions, such as encryption, access control, and intrusion detection, to safeguard data and maintain privacy. A real-world business scenario illustrating the importance of ADC technologies is in the supply chain optimization of a global retailer. By implementing RFID technology, the retailer can monitor inventory levels in real-time, reducing the need for manual stock checks and minimizing stockouts. Furthermore, RFID tags can be used to track the movement of goods throughout the supply chain, enabling better visibility and control over the entire process, ultimately leading to improved customer satisfaction and operational efficiency.

    What will be the size of the Automatic Data Capture (ADC) Market during the forecast period?

    Get Key Insights on Market Forecast (PDF) Request Free SampleThe market continues to evolve, driven by advancements in technology and increasing business demands. Parallel processing and distributed computing are key trends transforming the ADC landscape, enabling real-time data capture and analysis. These innovations can significantly impact boardroom-level decisions, such as compliance and budgeting. For instance, data privacy regulations like GDPR and HIPAA mandate strict data handling procedures, making real-time data capture and analysis crucial for companies to ensure compliance. Furthermore, distributed computing can help organizations save on IT infrastructure costs by optimizing resource utilization. According to recent research, companies have achieved a 30% reduction in processing time by implementing parallel processing techniques. Data capture workflows, API integration methods, and data preprocessing steps are essential components of successful ADC implementations. System reliability analysis, algorithm optimization, and data transformation methods are also crucial for ensuring data accuracy and efficiency. By embracing these trends, businesses can streamline their data capture processes, enhance operational efficiency, and make informed decisions based on real-time data insights.

    Unpacking the Automatic Data Capture (ADC) Market Landscape

    The market encompasses technologies and solutions that facilitate real-time data processing from various sources, including barcode scanning and RFID tagging systems. ADC solutions streamline data acquisition systems, enabling businesses to improve data quality metrics by up to 30% through real-time data validation techniques and data integrity checks. Furthermore, real-time analytics and predictive modeling techniques enhance operational efficiency by up to 25%, ensuring data-driven decision-making and compliance alignment with regulatory standards. Wireless data transmission and cloud data storage enable scalable data architecture and high-volume data handling, while machine learning algorithms and data mining strategies uncover valuable insights from the data stream. Data visualization tools and error correction algorithms further enhance system performance benchmarks, ensuring data security measures remain effective. Pattern recognition systems and anomaly detection methods further bolster data g

  20. n

    Malaria disease and grading system dataset from public hospitals reflecting...

    • data.niaid.nih.gov
    • datadryad.org
    zip
    Updated Nov 10, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Temitope Olufunmi Atoyebi; Rashidah Funke Olanrewaju; N. V. Blamah; Emmanuel Chinanu Uwazie (2023). Malaria disease and grading system dataset from public hospitals reflecting complicated and uncomplicated conditions [Dataset]. http://doi.org/10.5061/dryad.4xgxd25gn
    Explore at:
    zipAvailable download formats
    Dataset updated
    Nov 10, 2023
    Dataset provided by
    Nasarawa State University
    Authors
    Temitope Olufunmi Atoyebi; Rashidah Funke Olanrewaju; N. V. Blamah; Emmanuel Chinanu Uwazie
    License

    https://spdx.org/licenses/CC0-1.0.htmlhttps://spdx.org/licenses/CC0-1.0.html

    Description

    Malaria is the leading cause of death in the African region. Data mining can help extract valuable knowledge from available data in the healthcare sector. This makes it possible to train models to predict patient health faster than in clinical trials. Implementations of various machine learning algorithms such as K-Nearest Neighbors, Bayes Theorem, Logistic Regression, Support Vector Machines, and Multinomial Naïve Bayes (MNB), etc., has been applied to malaria datasets in public hospitals, but there are still limitations in modeling using the Naive Bayes multinomial algorithm. This study applies the MNB model to explore the relationship between 15 relevant attributes of public hospitals data. The goal is to examine how the dependency between attributes affects the performance of the classifier. MNB creates transparent and reliable graphical representation between attributes with the ability to predict new situations. The model (MNB) has 97% accuracy. It is concluded that this model outperforms the GNB classifier which has 100% accuracy and the RF which also has 100% accuracy. Methods Prior to collection of data, the researcher was be guided by all ethical training certification on data collection, right to confidentiality and privacy reserved called Institutional Review Board (IRB). Data was be collected from the manual archive of the Hospitals purposively selected using stratified sampling technique, transform the data to electronic form and store in MYSQL database called malaria. Each patient file was extracted and review for signs and symptoms of malaria then check for laboratory confirmation result from diagnosis. The data was be divided into two tables: the first table was called data1 which contain data for use in phase 1 of the classification, while the second table data2 which contains data for use in phase 2 of the classification. Data Source Collection Malaria incidence data set is obtained from Public hospitals from 2017 to 2021. These are the data used for modeling and analysis. Also, putting in mind the geographical location and socio-economic factors inclusive which are available for patients inhabiting those areas. Naive Bayes (Multinomial) is the model used to analyze the collected data for malaria disease prediction and grading accordingly. Data Preprocessing: Data preprocessing shall be done to remove noise and outlier. Transformation: The data shall be transformed from analog to electronic record. Data Partitioning The data which shall be collected will be divided into two portions; one portion of the data shall be extracted as a training set, while the other portion will be used for testing. The training portion shall be taken from a table stored in a database and will be called data which is training set1, while the training portion taking from another table store in a database is shall be called data which is training set2. The dataset was split into two parts: a sample containing 70% of the training data and 30% for the purpose of this research. Then, using MNB classification algorithms implemented in Python, the models were trained on the training sample. On the 30% remaining data, the resulting models were tested, and the results were compared with the other Machine Learning models using the standard metrics. Classification and prediction: Base on the nature of variable in the dataset, this study will use Naïve Bayes (Multinomial) classification techniques; Classification phase 1 and Classification phase 2. The operation of the framework is illustrated as follows: i. Data collection and preprocessing shall be done. ii. Preprocess data shall be stored in a training set 1 and training set 2. These datasets shall be used during classification. iii. Test data set is shall be stored in database test data set. iv. Part of the test data set must be compared for classification using classifier 1 and the remaining part must be classified with classifier 2 as follows: Classifier phase 1: It classify into positive or negative classes. If the patient is having malaria, then the patient is classified as positive (P), while a patient is classified as negative (N) if the patient does not have malaria.
    Classifier phase 2: It classify only data set that has been classified as positive by classifier 1, and then further classify them into complicated and uncomplicated class label. The classifier will also capture data on environmental factors, genetics, gender and age, cultural and socio-economic variables. The system will be designed such that the core parameters as a determining factor should supply their value.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Dashlink (2025). Privacy Preserving Distributed Data Mining [Dataset]. https://catalog.data.gov/dataset/privacy-preserving-distributed-data-mining

Privacy Preserving Distributed Data Mining

Explore at:
Dataset updated
Apr 10, 2025
Dataset provided by
Dashlink
Description

Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring systems. For example, consider an airline manufacturer [tex]$\mathcal{C}$[/tex] manufacturing an aircraft model [tex]$A$[/tex] and selling it to five different airline operating companies [tex]$\mathcal{V}_1 \dots \mathcal{V}_5$[/tex]. These aircrafts, during their operation, generate huge amount of data. Mining this data can reveal useful information regarding the health and operability of the aircraft which can be useful for disaster management and prediction of efficient operating regimes. Now if the manufacturer [tex]$\mathcal{C}$[/tex] wants to analyze the performance data collected from different aircrafts of model-type [tex]$A$[/tex] belonging to different airlines then central collection of data for subsequent analysis may not be an option. It should be noted that the result of this analysis may be statistically more significant if the data for aircraft model [tex]$A$[/tex] across all companies were available to [tex]$\mathcal{C}$[/tex]. The potential problems arising out of such a data mining scenario are:

Search
Clear search
Close search
Google apps
Main menu