Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data
PaperId: :  3690
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 1 2017
DUI:    16.0415/IJARIIE-3690
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Ankur V VadhelRaksha Shakti University
Ravi K ShethRaksha Shakti University

Abstract

Information technology
Frequent Pattern Mining, MAC Protection, Unstructured Data, Data Mining Algorithms, Anonymization, Encryption, Minimum Support, Frequent Patterns, Tree Structures, And Uncertain Data
There are miscellaneous current working algorithms provides mining in Unstructured/Frequent patterns from existing or precise data based on its importance. Meanwhile now in the era of technology, the need of Uncertain Data Mining is highly increased. There are too many cases in which obtained data are unstructured where shorting is required. For Frequent/Unstructured Data Mining through pattern mining, there are two mainly approaches are providing where one is step-by-step approach and another one is pattern-growth approach. One of the best example of Step-By-Step algorithm is U-Apriori and UF-growth & UFP-growth algorithm are the perfect illustration of Pattern growth approach. While in mining process the data is manipulated differently where security of data in highly needed. There are plenty of chances of data loss in the mining process. There we can provide MAC security to the algorithm that checks the data coming for the mining is form as single MAC address. So we can prevent the collision of different data in Mining process. In the real world the final outputted data is also not as much secured as it is in manipulation process so it is a huge need of security after the Mining where we can encrypt Patterned/Structured data with the help of any encryption key like Ciphertext. In this paper we are carrying out a case study of different existing world algorithm that are working on mining unstructured pattern from Uncertain data to regulate the data obtained from existing world applications with MAC and encryption technologies.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Ankur V Vadhel, and Ravi K Sheth. "A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data" International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 1 2017 Page 430-436
MLA Ankur V Vadhel, and Ravi K Sheth. "A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data." International Journal Of Advance Research And Innovative Ideas In Education 3.1(2017) : 430-436.
APA Ankur V Vadhel, & Ravi K Sheth. (2017). A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data. International Journal Of Advance Research And Innovative Ideas In Education, 3(1), 430-436.
Chicago Ankur V Vadhel, and Ravi K Sheth. "A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 1 (2017) : 430-436.
Oxford Ankur V Vadhel, and Ravi K Sheth. 'A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, 2017, p. 430-436. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/A_Review_Paper_on_MAC_Encrypted_Frequent_Pattern_Mining_with_Uncertain_Data_ijariie3690.pdf (Accessed : 14 September 2020).
Harvard Ankur V Vadhel, and Ravi K Sheth. (2017) 'A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data', International Journal Of Advance Research And Innovative Ideas In Education, 3(1), pp. 430-436IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/A_Review_Paper_on_MAC_Encrypted_Frequent_Pattern_Mining_with_Uncertain_Data_ijariie3690.pdf (Accessed : 14 September 2020)
IEEE Ankur V Vadhel, and Ravi K Sheth, "A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, pp. 430-436, Jan-Feb 2017. [Online]. Available: https://ijariie.com/AdminUploadPdf/A_Review_Paper_on_MAC_Encrypted_Frequent_Pattern_Mining_with_Uncertain_Data_ijariie3690.pdf [Accessed : 14 September 2020].
Turabian Ankur V Vadhel, and Ravi K Sheth. "A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 1 (14 September 2020).
Vancouver Ankur V Vadhel, and Ravi K Sheth. A Review Paper on MAC Encrypted Frequent Pattern Mining with Uncertain Data. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : 14 September 2020]; 3(1) : 430-436. Available from: https://ijariie.com/AdminUploadPdf/A_Review_Paper_on_MAC_Encrypted_Frequent_Pattern_Mining_with_Uncertain_Data_ijariie3690.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 9/14/2020 3:15:26 PM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
QUANTIFYING THE EFFECTS OF EMOTIVE VS. DENOTATIVE LANGUAGE PROMPTS ON CHATGPT-3.5 RESPONSES: INSIGHTS FROM UTA STUDENTSTechnology in EducationMohamed Ataieb Hmouma Download
The Farmer PortalInformation TechnologySakshi Yede Download
DYNAMIC MULTI-KEY AUTHENTICATION FOR IOT SYSTEM USING SECURE VAULTSInformation Science EngineeringVinay M G Download
Eye Glaucoma Detection Using Machine LearningInformation Science & Engineering Uday M B Download
The Shift to Electronic Payment Methods in Commercial Banks: Benefits and ChallengesDigital BankingEssam Zaid Shoaib Al-Dabbashi Download
DEEP ADAPTIVE FEATURE FUSION FOR ORIGIN DESTINATION PASSENGER FLOW FORECASTING IN MASS EVENTSInformation TechnologyBHUKYA RAJAKUMAR Download
REAL TIME EMERGENCY VEHICLE DETECTION USING MACHINE LEARNINGComputer Science and EngineeringAravinthkumar A Download
COLLEGIUMBOT: AN AI-DRIVEN CHATBOT FOR ENHANCING STUDENT ENGAGEMENT AND CAMPUS LIFE THROUGH VOICE-BASED INTERACTIONInformation TechnologySIVASANKAR CHITTOOR Download
AUTOMATED VIDEO TEXT EXTRACTION AND SUMMARIZATION SYSTEM USING LSTM NETWORKSInformation TechnologyT SUNDARARAJULU Download
BLOOD GROUP DETECTION USING FINGERPRINTInformation TechnologyN ANITHA Download
SOLAR RADIATION PREDICTION USING MACHINE LEARNINGInformation TechnologyM RAM KUMAR Download
DEFENDING AGAINST POISONING ATTACKS IN FEDERATED LEARNING WITH BLOCKCHAININFORMATION TECHNOLOGYT.SUNDARARAJULU. Download
DEEP CONVOLUTIONAL NEURAL NETWORK FOR ROBUST DETECTION OF OBJECT-BASED FORGERIES IN ADVANCED VIDEOINFORMATION TECHNOLOGYD.VISWASAHITYA Download
SMART CAR PRICE PREDICTOR USING MACHINE LEARNINGINFORMATION TECHNOLOGYS.JASMIN Download
SUPERVISED LEARNING MODEL INSIGHTS AND EVALUATIONInformation TechnologyB. RAJA KUMAR Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.