Author of the publication

Hybrid Temporal Mining for Finding Out Frequent Itemsets in Temporal Databases Using Clustering and Bit Vector Methods.

, , , and . ICISTM, volume 141 of Communications in Computer and Information Science, page 245-255. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and modeling of multivalued attributes in entity relationship modeling: an approach for improved database design., , , and . Comput. Syst. Sci. Eng., (2013)Dynamic Scheduling Algorithm for Reducing Start Time in Hadoop., , , , , and . ICIA, page 123:1-123:4. ACM, (2016)Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor Networks., , and . ICIA, page 73:1-73:5. ACM, (2016)Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection., , and . ICONIP, volume 3316 of Lecture Notes in Computer Science, page 983-988. Springer, (2004)A Novel Rule Based Classifier for Mining Temporal Medical Databases Using Fuzzy Rough Set Approach., , and . ACITY (3), volume 178 of Advances in Intelligent Systems and Computing, page 85-95. Springer, (2012)Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM., , and . Comput. Intell. Neurosci., (2012)Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT., , , , , and . Comput. Networks, (2019)A Behavior Based Approach to Host-Level Intrusion Detection Using Self-Organizing Maps., , , , and . ICETET, page 1267-1271. IEEE Computer Society, (2008)Clinical Dataset Classification Using Feature Ranking And Satin Bower Bird Optimized SVMs., , , and . Comput. J., 67 (5): 1993-2006 (2024)Multi-lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks., , , and . Concurr. Comput. Pract. Exp., (August 2024)