Back to Search
Start Over
Triple Security Generator in Smart Authentication Using Data Mining Techniques.
- Source :
-
Proceedings of the World Congress on Engineering 2012 Volume I . 2012, p403-405. 3p. - Publication Year :
- 2012
-
Abstract
- The primary objective of this paper is to authenticate and work with playlists by using Triple Security Generator (TSG). It is used to evaluate with best suitable data mining functions, to explore and express features and grouping of music. Here we have three methods to authenticate playlists. The recommender systems are popular social web tools, as they address the information overload problem and provide personalization of results. Our intent is to select optimal features, to identify and develop the best suitable Data Mining functionality that could be applied to class of problem. The TSG technique can provide best secure of the list. This playlist authentication generation technique provides security among music files and user interested music file with flexible manner. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISBNs :
- 9789881925138
- Database :
- Academic Search Index
- Journal :
- Proceedings of the World Congress on Engineering 2012 Volume I
- Publication Type :
- Conference
- Accession number :
- 87089070