Development of a Network Configuration Management System Using Artificial Neural Networks
|
|
- Rachel Russell
- 8 years ago
- Views:
Transcription
1 Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department Department of Computer Communications School of Engineering and Information Sciences Middlesex University, The Burroughs, Hendon, London, NW4 4BT, UK {RR412, E.Gemikonakli, O.Gemikonakli}@mdx.ac.uk Abstract In this paper we present a structure for Network Monitoring based on a connectionist inference model based on graph theory operating in conjunction with an information base to create a self-managing system in order to automatically detect and analyse network problems, and take necessary corrective actions. Identifying malfunctions in networks is challenging but crucial to ensuring secured communication. Connectionist Associative Memory Model (CAMM) is used to analyse corrupted network management information as it uses simple set operations leading to minimal computation and furthermore it is memory efficient due to its self-organising and dynamic structure. The simplicity and efficiency of CAMM are key properties to resolving network management issues and this paper elaborates on the studies being performed in this area. The proposed approach can be further extended to address various network security concerns. Keywords: network management and security; fault identification and recovery; CAMM N I. INTRODUCTION etwork Configuration management is not only a daily and essential requirement in computer network systems but it also forms part of a vast field of research and development. Computer networks change at every moment to fulfil the operational and security requirements of the services running and of the users being serviced. Therefore rigorous verifications and maintenance need to be carried out to ensure optimum network performance and security. Throughout the years, the task of Network Managers has shifted from tedious and time consuming monitoring, configurations and troubleshooting to mostly monitoring and less human intervention for configuration and troubleshooting. The need for a shift in the scope of work of Network Managers is seen to be towards a higher level interaction with the network components whereby the complexity of the networks are to be mostly handled by Artificial Intelligence (AI) entities. In an attempt to understand existing systems in place and current research and development relating to Network Configuration Management, studies relating to similar applications have been carried out and concepts have been dissected to evaluate their possible contributions into the development of a Network Configuration Management System Using Neural Networks. Such studies included those of biological nervous systems whereby the links and communications between the components have been transposed to those of artificial neural networks, networks that consist of artificial neurons or nodes are called Artificial Neural Networks [7]. In Artificial Neural Networks, a good internal representation plays significant role to efficiently storing and retrieving information. In traditional connectionist models the internal representation forms distributed representation of data, which is completely connected. This causes many unnecessary connections that give rise to ambiguity and noise [3]. Neural networks can be effectively used in the recognition of sequences, such as biological data. Biological data (e.g. protein and DNA sequences) generally contain significant levels of noise and overlapping subsequences. When we transpose such data to computer networks we have Object Identifiers (OIDs) and Management Information Base (MIB). OIDs are strings of numbers allocated in a hierarchical manner used in a variety of protocols. One of the most widely used approach to network monitoring and management is the Simple Network Management Protocol (SNMP). A MIB is a collection of management objects (OIDs) maintained on a network entity that may be remotely manipulated to achieve remote network management [4]. The MIB has a tree structure with
2 OIDs branching out representing their relationships throughout the tree. OIDs uniquely identify each node of the tree starting from the root as depicted in the Fig.1. Since OID sequences used in MIB browsers have similar patterns and characteristics as DNA sequences, studies relative to the latter are relevant. Although a number of artificial neural network-inspired sequence recognition models have been used in identifying protein and DNA sequences and in classifying biological data, these models are inclined to produce a single output and totally ignore the possibility of a fragment belonging to more than one sequence. A major drawback of existing models is their incapability to capture multiple associations. Furthermore conventional approaches can be both uninteresting and computationally expensive to carry out an unambiguous identification of an OID which is derived from incomplete information. Although Self-Organising Feature Map attempts to simulate some partial connectivity while remaining a fully connected model, it still has the drawback of having unrelated connections that are considered to be redundant [9]. Fig. 1. Tree structure of a MIB with its corresponding OID In the case of Network Configuration Management we believe it is possible to develop new learning strategies to make the existing models capable of dealing with the classification of OID sequences and using these classifications for identifying OIDs. The Connectionist Associative Memory Model (CAMM) relies on a two phase learning process using Hebbian learning on a feed-forward type of network. The project involves the development of strategies that will accommodate lateral connections and thus expected to produce a flexible framework for solving different applications. We have adopted this approach to make the model capable of dealing with OIDs and developing cognitive models [1]. The next step was the development of learning algorithms for an existing connectionist associative memory model and devising a dynamic database that will act as the information base that will store the OIDs in different required formats used in sequence recognition and agent based applications. Furthermore, we attempted to create and manage the network topology and relate the objects to the different components of the network in the same database. The information base is designed to enable the use of relationships between components that will determine the overall structure of the network topology. Thus should any component affecting the operations of other sub components fail to work as per specifications, the failure is generalised to this specific part of the network. II. THEORETICAL BACKGROUND AND RESEARCH Expert systems effectively use knowledge bases. One example for such a case can be given as the knowledge bases mostly built using the knowledge taken out from the human experts and the pertinent network information. This information is usually obtained from a network itself. Expert system techniques, which can be classified as knowledge-based and rule-based, are probably one of the very first AI techniques that were used to create an automatic and intelligent network management system. In the network management area, especially at the application level, it is hard to model a significant part of the problems that may occur. Lower layer problems are well-understood while problems at the application layer are complex, application dependent, and distinct from one another. The reason of this may be the difficulties encountered in modelling the reasoning relating to a collection of knowledge, or the nature of the problem to be solved [6]. A network sometimes uses a finite state machine model in order to display certain nondeterministic behaviour [1]. However, some faults do exist in the implementation machine, but they cannot be successfully located and therefore are not able to be corrected [8]. The advanced database techniques design is aimed at having the network operators interacting only with the database. If an operator requires a change in network functioning, like changing a routing scheme, the operator makes these changes in the relevant database. This approach allows the operator to focus on what has to be done, while the database automatically implements the changes and deals with other such mechanics. The advanced database design is also considered a bottom-up design and not just a modified version of other commercial database systems. Therefore, a system architecture that is made specifically for network management is the result. Finally, to efficiently determine the required Management Information Base function, we did everything to identify and use to our advantage the
3 special characteristics of network management data and transactions [5]. Although high level models include expert systems, finite state machines, and advanced database techniques attempt to address these points by correlating the low-level information at the node in order to take sequential relationships into account, they need fault specification to set the essential concept up [1]. Approaches such as expert systems, finite state machines, and advanced database techniques do not point out the abnormal information which is not available in most cases. Additionally the accuracy of high-level models decreases as the network evolves [6]. Pattern recognition is an attempt to solve real world problems that are not especially unambiguous. However, pattern recognition techniques tend to be much better at solving problems which include more information than either expert systems or rule based systems [2]. The monitoring hierarchy contains CAMM and neural networks. The CAMM employs only partial connectivity information to store sequences and retrieve them based on set-theoretic operation. The model has two stages. At the beginning of the first stage, each input string is represented as partially connected set of sub-strings and encapsulated in a topology to constitute a multi-graph. After representing each input string as partially connected, the i k connection sets v +, (shortly known as v-sets) which i j collect the internal relations in the sequence and represent the connections between node ( i + k) v i, j and the nodes in the th layer formed by the data elements in the input data sequences, are completely formed to describe the nodes and the neighbouring layers. The v-set representation for five sets hat, hate, data, date and rare are shown in Figure 2 [1]. Fig. 2. Architecture of Stage 1 for five strings At the end of the first stage a partially connected network representation is produced where sub-strings are superimposed and therefore share the same storage space. Fig. 3. Graph created at the end of stage 1 & Topology of Stage 2 In training part of Stage 2 (see Figure 3), the gradient descent technique is used for those nodes that have been activated by the training set, to set the connection to exact values. All possible paths produced in Stage 1 are represented and therefore the l-paths are calculated. Consequently, the sequence is accepted if it accumulates to unity, otherwise it is rejected [1]. Neural networks are used to learn the normal behaviour of the network. The state probabilities are determined at each level in the monitoring hierarchy, where a full picture of a node s health is provided, so that the network manager can then determine whether the alarm points at any problem more accurately [1]. Existing Network Management Systems offer many different services and a lot of information because of its complex system. This has triggered the development of network management applications using various approaches incorporating neural networks, artificial intelligence etc. In Ref. [10], structure of intelligent network management systems is provided by using expert systems. The resulting mechanism is called as ExNet and discussed in detail. In this work a Connectionist Inference Model shown in Fig. 4 has been incorporated into an existing architecture based on the use of expert systems. The model incorporates CAMM instead of expert systems in order to manage the system used for the analysis of the entire network and its services, and proper performance management. The architecture shown in Fig. 4 has four main Modules. These are Monitor module, the Network Interface module, the Network Manager Interface module and the Connectionist Inference module respectively and each one is explained in Ref. [1].
4 Fig. 4. General Architecture of Intelligent Network Monitoring [1] III. WORK DONE & RESULTS Following the general architecture and having undergone an exhaustive literature review of various sequence recognition procedures and understood the requirements, we have developed an application in Java using existing algorithms developed by authors of Ref. [1] and modifying them and incorporating components that will ensure the interaction with the database and furthermore manipulate the data in the database to create different formats of the said data to be used most efficiently by the main application. Also as mentioned the database used along side with the main application (modified CAMM), has been created using Microsoft Office Access database. The different components added to the main application are essential to generate formats of the OIDs stored in the database such that it has increased the dimension size of the sequences which have been proven to provide improved results through exhaustive testing. Therefore the main application has also been tweaked to make optimal use of the newly generated sequences as inputs. Throughout our development, three main formats of the sequences have been analysed, tested and used as input to the main application. The reason for that is simply because the characteristics of traditional OIDs (e.g ) are such that it does not use the full performance of sequence recognition, therefore different versions of the OIDs has been generated so as to increase the dimension size of the sequences. First the OIDs have been converted from their string format to their hexadecimal format, e.g. (2e312e332e362e312e322e312e252e362e332e312e31), and finally the 2e s representing the. s in hexadecimal has been changed randomly to ensure a larger dimension of the sequences e.g. (ek31wx33mc36eu31be32mn31fh25pa36ps33fx31gm31). The database has not only been devised to store OIDs in different formats but the same database has also been used to record faults messages and to store the topology of the network and relationships between the components i.e. Routers, Switches, PCs (Personal Computers) and links have been established such that queries which have also been created can run and clearly define the connectivity status of each component and status of the overall network thus ensuring the proper operation and security of the latter. The results of the queries will act as reports to Network Managers stored as the network records. The main application reads faults messages sequences from the database (normally generated by traps set for network monitoring) and uses the modified CAMM algorithm to resolve the faults message. Till now we have been able to achieve results that optimally use the modified CAMM algorithm to resolve faults messages by achieving a reduced number of probabilities. The following example will illustrate the results we have been able to achieve. A faults message is read from the database e.g. (qw--fa33vm36ys31ub32ju--qz--rf36wo33xf31) The - represents missing information from the fault message. The fault message serves as an input to the modified CAMM which trains the fault free set of OID sequences from the database and generates connections representing the links between the components of the sequences as depicted and explained in the simple CAMM example through Figure 2 and Figure 3. The results are in the form of colour labels showing the probability of components that could fit the missing information [-]. The results of the fault message used as input above are as follows: Level affected 3 3 R 4 1 R 23 3 R 24 1 R 27 1 R 2 R 3 R 28 0 R 5 R Component & Colour Table 1. Test Results of the modified CAMM Where the level affected represent the position of the -
5 starting from 1. Key Letter BL W G B R Colour Black White Green Blue Red Black has the lowest probability and Red has the highest probability. From the set of OIDs in the database it is known that the corresponding OID to the faulty one is (qw31fa33vm36ys31ub32ju31qz25rf36wo33xf31). Therefore we can see that the modified CAMM has been able to resolve the levels 3, 4, 23 and 24 reaching to the appropriate component and has 3 possibilities at level 27 and 2 possibilities at level 28. We can also find that the components missing at levels 27 and 28 i.e. 2 and 5 respectively are present in the probable components and have the highest probability. Different versions of the application have been developed and perfected based on the results achieved. Throughout the development process regular tests have been carried out to ensure that the application performs the required set of tasks and that the database to read from and write to effectively and efficiently. Since the application cannot work without the database, the connection created using an Open Database Connectivity Connection is vital and has been tested alongside with the other tests. IV. FUTURE WORKS Having achieved promising results, the next step is to incorporate an additional component in the form of an algorithm that will eliminate the noisy parts to reach single outputs at each level thus allowing the complete resolution of fault messages such that the application can run completely on its own and be incorporated in networks to serve as dynamic resolution modules. Candidate concepts under study include artificial neural network whereby Hebbian based learning algorithm calculates and assigns weights between nodes and eliminate noisy parts based on the weights achieved. The work can be extended to cover not only fault management but also network security. Well defined access and usage patterns can be used for training the system and then make decisions. along with the optimization of OIDs format, have had an important impact on the resolution of sequential information. The developed system is capable of storing and retrieving multiple associations of OIDs and opens itself to parallel or distributed implementation. The strength of pattern recognition used by the modified CAMM provides a better solution compared to rule based systems which do not use all of the information available for processing. Furthermore the learning process with the modified CAMM is on-going and a best-match approach can be taken to try and solve problems for which there is no exact information available compared to rule based systems which are usually cumbersome. The database incorporated in the system provides capabilities for further improvement of systems and also can help Network Managers to have concise information on their network and enables them to picture and understand the complex network easier. Furthermore, the topologies and systems achieved enables new components to be added without major alterations of the existing system. REFERENCES [1] E.Gemikonakli, O.Gemikonakli, S.Bavan, (2008), Intelligent Network Monitoring Using a Connectionist Inference Model. [2] G.A. Halse, Novel Approaches to the Network to the Monitoring of Computer Networks, Master Thesis, Computer Science, Grahamstown, South Africa, [3] I. Mitchell, A.S.Bavan. (2000). A Connectionist Inference Model for Pattern-Directed Knowledge Representation. Expert Systems, [4] J. D. Case, C. Partridge. Case Diagrams: A First Step to Diagrammed Management Information Bases, p13. [5] J.R.Haritsa, M.O.Ball and N.Roussopoulos, A. Datta and S.Baras, Managing Networks using Database Technology, Selected Areas incommunication, IEEE Journal, vol.11, pp , December [6] N. Nuansri, T.S. Dillon and S.Singh, An Application of Neural Network and Rule-Based System for Network Management: Application Level Problems, Proceeding of the 30th Hawaii International Conference on System Sciences, vol.6, pp , January [7] P. Picton, (2000). Neural Network. New York: PALGRAVE. [8] Rouvellou and G.W.Hart, Inference of a Probabilistic Finite State Machine from its Output, Systems, Man and Cybernetics, IEEE Trans., vol.25, pp , March [9] S. Bavan, M. Ford, Melina Kalaatzi. (2000). Genomic and Proteomic Sequence Recognition Using a Connectionist Inference Model. Society of Chemical Industry, [10] Y. Kim and S.Hariri, ExNet: An Intelligent Network Management System, WebNet98-World Conference of the WWW, Internet and Intranet, Orlando, November V. CONCLUSION A solution to tackle security issues in network configuration management has been developed to achieve intelligent and secure network management. With reference to the results achieved, it is seen that the modified CAMM
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationA Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationHow To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
More informationHELP DESK SYSTEMS. Using CaseBased Reasoning
HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind
More informationNeural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
More informationAn Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
More informationEffective Data Mining Using Neural Networks
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,
More informationA HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
More informationCHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
More informationOperations Research and Knowledge Modeling in Data Mining
Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 koda@sk.tsukuba.ac.jp
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationA Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
More informationQuestions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu
More informationA Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
More informationNEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
More informationStabilization by Conceptual Duplication in Adaptive Resonance Theory
Stabilization by Conceptual Duplication in Adaptive Resonance Theory Louis Massey Royal Military College of Canada Department of Mathematics and Computer Science PO Box 17000 Station Forces Kingston, Ontario,
More informationENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
More informationD A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationVerifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
More informationIntroduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
More informationThe best network information. COPA-DATA know-how: SNMP with zenon
The best network information COPA-DATA know-how: SNMP with zenon The best network information COPA-DATA know-how: SNMP with zenon A control system for Energy Automation always has many different IT devices.
More informationIntrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationUNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS
TW72 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS MODULE NO: EEM7010 Date: Monday 11 th January 2016
More informationSimple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
More informationFoundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
More informationApplication of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
More informationDomain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible
Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable The Internet continues
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research An Implementation Scheme For Software Project Management With Event-Based Scheduler Using Ant Colony Optimization Roshni Jain 1, Monali Kankariya
More informationCommunications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)
Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:
More informationInternational Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationCHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
More informationSpatial Data Mining Methods and Problems
Spatial Data Mining Methods and Problems Abstract Use summarizing method,characteristics of each spatial data mining and spatial data mining method applied in GIS,Pointed out that the space limitations
More informationA Color Placement Support System for Visualization Designs Based on Subjective Color Balance
A Color Placement Support System for Visualization Designs Based on Subjective Color Balance Eric Cooper and Katsuari Kamei College of Information Science and Engineering Ritsumeikan University Abstract:
More informationIntroduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
More informationHow To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationA Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationSNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
More informationCLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD
Acta Electrotechnica et Informatica No. 2, Vol. 6, 2006 1 CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD Kristína MACHOVÁ, Ivan KLIMKO Department of Cybernetics
More informationSimple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
More informationDecision Trees for Mining Data Streams Based on the Gaussian Approximation
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu
More informationMonitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
More informationResearch on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
More informationWeb Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
More informationFundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
More informationResearch Article Volume 6 Issue No. 4
DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha
More informationCisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
More informationUSING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION
USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION B.K.L. Fei, J.H.P. Eloff, M.S. Olivier, H.M. Tillwick and H.S. Venter Information and Computer Security
More informationImproving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
More informationTopics. Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs
SNMP Workshop Topics Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs CSS // COMSOFT Satellite Services GmbH / page 2 // Topic Generals SNMP CSS
More informationFuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
More informationNatural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More information14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationConfiguring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server
Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server Amresh Singh Dell Virtualization Solutions Engineering January 2007 Dell Inc. 1 www.dell.com/vmware Contents
More informationPROFINET IO Diagnostics 1
PROFINET IO is a very cost effective and reliable technology. However, extensive installations can have thousands of PROFINET IO devices operating on many networks. The reliable operation of these networks
More informationComparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances
Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Sheila Garfield and Stefan Wermter University of Sunderland, School of Computing and
More informationReusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
More informationData quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
More informationSimple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
More informationFundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
More informationGerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
More informationIMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
More informationModeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
More informationPattern-Aided Regression Modelling and Prediction Model Analysis
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2015 Pattern-Aided Regression Modelling and Prediction Model Analysis Naresh Avva Follow this and
More informationARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)
ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications
More informationAssignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
More informationEffective Data Retrieval Mechanism Using AML within the Web Based Join Framework
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted
More informationA Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
More informationREQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS
REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS Mladen Kezunovic *, Texas A&M University Tomo Popovic, Test Laboratories International, Inc. Donald R. Sevcik, CenterPoint Energy Aniruddha
More informationOSIX Real-time network performance monitoring.
OSIX Real-time network performance monitoring. Polystar s OSIX system offers the telecommunications market innovative monitoring solutions for maximising network performance and managing advanced real-time
More informationA Software Architecture for a Photonic Network Planning Tool
A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More informationBuilding a Scalable Numbering Plan
Building a Scalable Numbering Plan Scalable Numbering Plan This topic describes the need for a scalable numbering plan in a VoIP network. Dial Plans Dial plans contain specific dialing patterns for a user
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationA FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
More informationData Mining Techniques Chapter 7: Artificial Neural Networks
Data Mining Techniques Chapter 7: Artificial Neural Networks Artificial Neural Networks.................................................. 2 Neural network example...................................................
More informationUsing LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.
White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,
More informationChapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net
Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling
More informationENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2
More informationSTUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationA GENERALIZED APPROACH TO CONTENT CREATION USING KNOWLEDGE BASE SYSTEMS
A GENERALIZED APPROACH TO CONTENT CREATION USING KNOWLEDGE BASE SYSTEMS By K S Chudamani and H C Nagarathna JRD Tata Memorial Library IISc, Bangalore-12 ABSTRACT: Library and information Institutions and
More informationProcess Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
More informationComponent visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu
More informationIBM Tivoli Network Manager software
Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services
More information