Open Access   Article Go Back

Resolving the Conflicts Data in an Organization using Classifier Process

L.Sampath 1 , R.Umadevi 2 , N.Vijayaraj 3

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 416-420, Mar-2018

Online published on Mar 31, 2018

Copyright © L.Sampath, R.Umadevi, N.Vijayaraj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: L.Sampath, R.Umadevi, N.Vijayaraj, “Resolving the Conflicts Data in an Organization using Classifier Process,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.416-420, 2018.

MLA Style Citation: L.Sampath, R.Umadevi, N.Vijayaraj "Resolving the Conflicts Data in an Organization using Classifier Process." International Journal of Computer Sciences and Engineering 06.02 (2018): 416-420.

APA Style Citation: L.Sampath, R.Umadevi, N.Vijayaraj, (2018). Resolving the Conflicts Data in an Organization using Classifier Process. International Journal of Computer Sciences and Engineering, 06(02), 416-420.

BibTex Style Citation:
@article{_2018,
author = {L.Sampath, R.Umadevi, N.Vijayaraj},
title = {Resolving the Conflicts Data in an Organization using Classifier Process},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {416-420},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=278},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=278
TI - Resolving the Conflicts Data in an Organization using Classifier Process
T2 - International Journal of Computer Sciences and Engineering
AU - L.Sampath, R.Umadevi, N.Vijayaraj
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 416-420
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

A sequence of Files losses in the Organization network, we are interested in determining whether the losses are caused by link errors only, or by the collective effect of link errors and malicious drop. Link error and malicious packet reducing are two sources for packet losses in multi-hop wireless ad hoc network. We are chiefly nervous in the insider-attack case, whereby hateful nodes that are fraction of the way exploit their knowledge of the communication context to selectively drop a miniature quantity of packets dangerous to the network presentation. Because the File dropping velocity in this case is equivalent to the channel error rate, “conventional algorithms” that are based on detecting the File loss rate cannot realize reasonable detection accuracy. To recover the detection accuracy, we suggest extending the correlations between lost Files. Furthermore, to assurance directly computation of these correlations, we expand a “homomorphic linear authenticator (HLA)” based public auditing structural design that allows the detector to substantiate the truthfulness of the files loss in sequence reported by nodes. This construction is privacy preserving, collusion evidence, and incurs low communication and storage expenses. To reduce the calculation glide of the baseline system, a “packet-block-based mechanism” is also proposed, which allows one to trade detection accuracy for inferior computation complexity

Key-Words / Index Term

Data fusion, truth discovery, heterogeneous data

References

[1] J. Bleiholder and F. Naumann, “Data fusion,” ACM Computing Surveys, vol. 41, no. 1, pp. 1:1–1:41, 2009.
[2] X. L. Dong and F. Naumann, “Data fusion: Resolving data conflicts for integration,” PVLDB, vol. 2, no. 2, pp. 1654–1655, 2009.
[3] Z. Jiang, “A decision-theoretic framework for numerical attribute value reconciliation,” TKDE, vol. 24, no. 7, pp. 1153–1169, 2012.
[4] X. Yin, J. Han, and P. S. Yu, “Truth discovery with multiple conflicting information providers on the web,” in Proc. of KDD, 2007, pp. 1048–1052.
[5] A.Galland,S.Abiteboul,A.Marian,andP.Senellart,“Corroborating information from disagreeing views,” in Proc. of WSDM, 2010, pp. 131–140.
[6] B. Zhao, B. I. P. Rubinstein, J. Gemmell, and J. Han, “A bayesian approach to discovering truth from conflicting sources for data integration,” PVLDB, vol. 5, no. 6, pp. 550–561, 2012.
[7] X. L. Dong and D. Srivastava, “Big data integration,” in Proc. of ICDE, 2013, pp. 1245–1248.
[8] V. Vydiswaran, C. Zhai, and D. Roth, “Content-driven trust propagation framework,” in Proc. of KDD, 2011, pp. 974–982.
[9] J. Pasternack and D. Roth, “Making better informed trust decisions with generalized fact-finding,” in Proc. of IJCAI, 2011, pp. 2324– 2329
[10] X. L. Dong, L. Berti-Equille, and D. Srivastava, “Integrating conflicting data: The role of source dependence,” PVLDB, vol. 2, no. 1, pp. 550–561, 2009.