Academic Journals Database
Disseminating quality controlled scientific knowledge

Data mining- A Mathematical Realization and cryptic application using variable key

ADD TO MY LIST
 
Author(s): Chakrabarti P.

Journal: Advances in Information Mining
ISSN 0975-3265

Volume: 2;
Issue: 1;
Start page: 18;
Date: 2010;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: data mining | regression | dispersion theory | sequence mining | variable key

ABSTRACT
In this paper we have depicted the various mathematical models based on the themes on datamining. The numerical representations of regression and linear models have been explained. We have alsoshown the prediction of datum in the light of statistical approaches namely probabilistic approach, dataestimation and dispersion theory. The paper also deals with the efficient generation of shared keys requiredfor direct communication among co-processors without active participation of server. Hence minimization oftime-complexity, proper utilization of resource as well as environment for parallel computing can be achievedwith higher throughput in secured fashion. The techniques involved are cryptic methods based supportanalysis, confidence rule, resource mining, sequence mining and feature extraction. A new approachtowards realizing variability concept of key in Wide – Mouth Frog Protocol, Yahalom Protocol and SKEYProtocol has been depicted in this context.
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Jona
Tangokurs Rapperswil-Jona