A. V. Sriharsha

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Privacy in data for data mining is ensured by many methods since decades. Data Transformation in the KDD process ensures transforming the data into cryptic codes and some abbreviated forms, yet the details of the data are guessable to the data miners. Perturbation theory comprises mathematical methods that are used to find an approximate solution to a(More)
With the vast amount of digital text materials available on the Net, it is almost impractical for people to absorb all related information in a timely manner. This problem has been overcome by erstwhile researchers and scientists of data mining. The efficiency in the methods and exploratory analysis has to be ascertained yet. Document wise term frequencies(More)
This paper is a outcome of a detailed examination of tools, systems and notation used in software architectures. Modeling software architecture for a system is not as easy as one can understand tools, applying the appropriate tool essentially varies its efficiency and demands. In the background of Software Architecture analysis, design there is a profound(More)
The process of modeling concerns itself with the extraction organization of knowledge unambiguously. The rapid advancements in information processing systems are steering engineering research towards the development of intelligent systems. Though the aim of modeling is to provide the human user of the environment to represent knowledge that is convenient to(More)
  • 1