BMEF – Infrastructure for students & their studies

Confused?Which course to choose? Career choices are life choices. Take them seriously. Come, join BMEF and do it correctly. “Find out what you like doing best and get someone to pay you for doing it”. Education is a journey not a race. Be a part of this beautiful journey of life with BMEF. Find out perfect course for you at BMEF, where you learn and leave behind legacy that people will follow. Bhagwan Mahavir Education Foundation (BMEF) is a well known Trust established in 2002 .It’s main objective is to provide Quality Education to the students of Gujarat and undertake all the activities for upliftment and job oriented education. The foundation was registered on 24 Jan 2002 at SURAT.

Under BMEF trust they have 3 engineering colleges. BMCET – Bhagwan Mahavir College of Engineering And TechnologyMSCET – Mahavir Swami College Of Engineering And TechnologyBAIT – Bhagwan Arihant Institute and Technology All colleges teach various courses like Engineering & Technology, Science & Te…

Privacy Preservation in Data Mining

Data mining aims to retrieve a useful or knowledgeable data from the large data repository. But privacy preservation means publishing the knowledgeable data along with hiding/protecting the sensitive data (personal data).Concerning illustration the aggregate utilization of information mining, vast information from claiming private majority of the data (data) would recurrently gathered furthermore broke down. Such information hold numerous shopping habits, restorative history, criminal records, kudos records and so forth throughout this way, observing and stock arrangement of all instrumentation may be etc.  And these data are the important asset to the governments and business organization for conclusion making process and to deliver social benefits such as health research, nationwide security etc. This is mostly concern through government agencies, insurance companies, hospitals and others that have information they would like to issue to researchers. Every record takes a number of attributes which can be separated into 3 categories: I. Explicit identifiers which can identify people. II. Quasi identifier features whose values when taken can simply recognize entity’s characteristics. III. Sensitive attributes which are considered as private and need not be revealed. Different anonymization methods have been explored to guard the sensitive data of the people. Re-identification of the data does not deliver anonymity, as the out data too contain quasi identifiers can be used for re-identifying the information of people, thus dripping that data which is not planned to be revealed data leakage occurs by coordination of quasi identifiers and external knowledge. Thus, the main aim is to bind the expose risk towards an acceptable level. So, it can be reached by anonymizing the data previously discharging it.

Deeksha Gupta
Bhagwan Arihant College of Engineering & Technology, Surat.

Popular posts from this blog

Aeronautical Engineering Course offered by BAIT

Cognitive Radio Science