Author of the publication

Mining Association Rules between Sets of Items in Large Databases

, , and . International Journal of Innovative Science and Modern Engineering (IJISME), 1 (5): 24-27 (April 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Weighted Monetary Transaction Network., , , , , , , and . Adv. Complex Syst., 14 (5): 691-710 (2011)Investigation of Cybersecurity Attacks and Threats on Cloud Using Black Widow Algorithm with Recurrent Neural Network., , , and . SN Comput. Sci., 3 (6): 451 (2022)Customer churn prediction model in cloud environment using DFE-WUNB: ANN deep feature extraction with Weight Updated Tuned Naïve Bayes classification with Block-Jacobi SVD dimensionality reduction., and . Eng. Appl. Artif. Intell., (November 2023)Performance implications of hosting enterprise telephony applications on virtualized multi-core platforms., , , , and . IPTComm, page 8. ACM, (2009)Real-time traffic over the IEEE 802.11 medium access control layer., and . Bell Labs Tech. J., 1 (2): 172-187 (1996)MEOW with CATS: multimedia extensions over wireless with CTS-assisted transmission scheme., , and . WCNC, page 145-150. IEEE, (2005)Load-Based Metrics and Flooding in Wireless Mesh Networks., , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 84-95. Springer, (2008)Quality-of-service in ad hoc carrier sense multiple access wireless networks., and . IEEE J. Sel. Areas Commun., 17 (8): 1353-1368 (1999)Automatic generation of functional vectors using the extended finite state machine model., and . ACM Trans. Design Autom. Electr. Syst., 1 (1): 57-79 (1996)Measuring video quality degradation using face detection., and . Sarnoff Symposium, page 1-5. IEEE, (2012)