شماره مدرك :
11202
شماره راهنما :
10308
پديد آورنده :
اسلامي، ميثاق
عنوان :

ارزيابي عملكرد تركيب روش هاي الكترواكسيداسيون و تصفيه بيولوژيكي در پاكسازي فاضلاب صنايع لبني

مقطع تحصيلي :
كارشناسي ارشد
گرايش تحصيلي :
مهندسي محيط زيست
محل تحصيل :
اصفهان: دانشگاه صنعتي اصفهان، دانشكده مهندسي عمران
سال دفاع :
1394
صفحه شمار :
شانزده، 108ص.: مصور
استاد راهنما :
هستي هاشمي نژاد
استاد مشاور :
ارجمند مهرباني
توصيفگر ها :
الكتروفنتون , الكترو انعقاد توسط آلومينيم , SBR , روش رويه پاسخ (RSM) , COD , كدورت
استاد داور :
نورالله ميرغفاري، مسعود طاهريون
تاريخ ورود اطلاعات :
1395/02/01
دانشكده :
مهندسي عمران
كد ايرانداك :
ID10308
چكيده انگليسي :
Application of Graph Theory in Privacy Preserving in Social Networks Hourie Mehrabiun h mehrabiun@math iut ac ir September 19 2015 Department of Mathematical Sciences Isfahan University of Technology Isfahan 84156 83111 Iran Supervisor Dr Behnaz Omoomi bomoomi@cc iut ac ir Advisor Dr Ali Fanian a fanian@cc iut ac ir 2010 MSC 05C80 05C90 Keywords Social Network Privacy Preserving Anonymous Graph Theory AbstractSocial networks have made considerable development in recent years and are spreading quickly indi erent ways The most common model for representation and study of social networks is based ongraph theory that it is widely used in the analysis of social networks A social network can be represented with a simple and undirected graph G V E where V isthe set of vertices and E is the set of edges so that each vertex corresponds to a user and edge betweentwo vertices represents relationship between corresponding users of the network such as friendship cooperation and so on The information of social networks are valuable sources of information that their publication isnecessary and useful in order to analyze the data On the other hand these information includessensitive private information of many people Thus the users privacy concerns have become one ofthe major concerns in the use of social networks So in order to privacy preserving we should releasethe anonymous version of the network that is di erent from the original version On the other hand to utility of analysis results of the anonymous version of network the anonymous network must besimilar as much as possible to the main network Therefore the signi cant problem is provide waysto balance between the security of the network and the loss information in the released network Now there is growing various methods for preserving privacy on a social network considering theamount of available information for the attacker and data utility after the publication of the network
استاد راهنما :
هستي هاشمي نژاد
استاد مشاور :
ارجمند مهرباني
استاد داور :
نورالله ميرغفاري، مسعود طاهريون
لينک به اين مدرک :

بازگشت