%0 Journal Article %T Data mining- A Mathematical Realization and cryptic application using variable key %A Chakrabarti P. %J Advances in Information Mining %D 2010 %I %X In this paper we have depicted the various mathematical models based on the themes on datamining. The numerical representations of regression and linear models have been explained. We have alsoshown the prediction of datum in the light of statistical approaches namely probabilistic approach, dataestimation and dispersion theory. The paper also deals with the efficient generation of shared keys requiredfor direct communication among co-processors without active participation of server. Hence minimization oftime-complexity, proper utilization of resource as well as environment for parallel computing can be achievedwith higher throughput in secured fashion. The techniques involved are cryptic methods based supportanalysis, confidence rule, resource mining, sequence mining and feature extraction. A new approachtowards realizing variability concept of key in Wide ¨C Mouth Frog Protocol, Yahalom Protocol and SKEYProtocol has been depicted in this context. %K data mining %K regression %K dispersion theory %K sequence mining %K variable key %U http://www.bioinfo.in/uploadfiles/12695967202_1_4_AIM.pdf