Implementing Cognitive Apps Based Key Generation System

Authors(2) :-Arun Kumar Silivery, Suvarna S

Frequent pattern mining algorithm should not mine all frequent patterns but only the closed ones because the latter leads to not only a more compact yet complete result set but also better efficiency. However, most of the previously developed closed pattern mining algorithms work under the candidate maintenance-and-test paradigm, which is inherently costly in both runtime and space usage when the support threshold is low and the patterns become long. In this paper, we present BIDE, an efficient algorithm for mining frequent closed sequences without candidate maintenance. It adopts a novel sequence closure checking scheme called BI-Directional Extension and prunes the search space more deeply compared to the previous algorithms by using the Back Scan pruning method. A thorough performance study with both sparse and dense, real, and synthetic data sets have demonstrated that BIDE significantly outperforms the previous algorithm. It reveals only a small subset of the concept nodes finally the expected user navigation cost is minimized.

Authors and Affiliations

Arun Kumar Silivery
Department of CSE, Raja Mahindra College of Engineering, Ibrahimpatnam, Hyderabad, Telangana, India
Suvarna S
Assistant Professor, Department of CSE, Raja Mahindra College of Engineering, Ibrahimpatnam, Hyderabad, Telangana, India

Website Design, User Navigation, Page Ranking, Sequences, Frequent Closed Sequences

  1. M. Armbrust, A. Fox, R. Gri±th, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing," Communications of the ACM, vol. 53, pp. 50{58, 2010.
  2. B. SakthiSaravanan., M.Tech#1, R.DheenadayaluM.Sc (Engg) #2 "Improving Efficiency and Security Based Data Sharing in Large Scale Network" International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013, ISSN: 2319-5967
  3. A. Sahai and B. Waters. Fuzzy identity based encryption. In Eurocrypt 2005.
  4. M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and Athena Vakali, Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Computing, vol. 13, pp. 10 {13, 2009.
  5. D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213–229. Springer Verlag, 2001.
  6. C. Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360–363, 2001.
  7. A. Shamir. Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in Cryptology, pages 47–53. Springer Verlag New York, Inc., 1985.
  8. Matthew Pirretti , Patrick Traynor "Secure Attribute Based Systems"
  9. Mr. RupeshVaishnav "Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 10, December 2012 ISSN: 2278-0181.
  10. D.Khader ," Attribute Based Authentication Schemes," PhD Dissertation University of Bath, 2009.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1037-1040
Manuscript Number : CSEIT11726297
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Arun Kumar Silivery, Suvarna S, "Implementing Cognitive Apps Based Key Generation System", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1037-1040, November-December-2017. |          | BibTeX | RIS | CSV

Article Preview