Development of a Network Configuration Management System Using Artificial Neural Networks

Size: px
Start display at page:

Download "Development of a Network Configuration Management System Using Artificial Neural Networks"

Transcription

1 Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department Department of Computer Communications School of Engineering and Information Sciences Middlesex University, The Burroughs, Hendon, London, NW4 4BT, UK {RR412, E.Gemikonakli, O.Gemikonakli}@mdx.ac.uk Abstract In this paper we present a structure for Network Monitoring based on a connectionist inference model based on graph theory operating in conjunction with an information base to create a self-managing system in order to automatically detect and analyse network problems, and take necessary corrective actions. Identifying malfunctions in networks is challenging but crucial to ensuring secured communication. Connectionist Associative Memory Model (CAMM) is used to analyse corrupted network management information as it uses simple set operations leading to minimal computation and furthermore it is memory efficient due to its self-organising and dynamic structure. The simplicity and efficiency of CAMM are key properties to resolving network management issues and this paper elaborates on the studies being performed in this area. The proposed approach can be further extended to address various network security concerns. Keywords: network management and security; fault identification and recovery; CAMM N I. INTRODUCTION etwork Configuration management is not only a daily and essential requirement in computer network systems but it also forms part of a vast field of research and development. Computer networks change at every moment to fulfil the operational and security requirements of the services running and of the users being serviced. Therefore rigorous verifications and maintenance need to be carried out to ensure optimum network performance and security. Throughout the years, the task of Network Managers has shifted from tedious and time consuming monitoring, configurations and troubleshooting to mostly monitoring and less human intervention for configuration and troubleshooting. The need for a shift in the scope of work of Network Managers is seen to be towards a higher level interaction with the network components whereby the complexity of the networks are to be mostly handled by Artificial Intelligence (AI) entities. In an attempt to understand existing systems in place and current research and development relating to Network Configuration Management, studies relating to similar applications have been carried out and concepts have been dissected to evaluate their possible contributions into the development of a Network Configuration Management System Using Neural Networks. Such studies included those of biological nervous systems whereby the links and communications between the components have been transposed to those of artificial neural networks, networks that consist of artificial neurons or nodes are called Artificial Neural Networks [7]. In Artificial Neural Networks, a good internal representation plays significant role to efficiently storing and retrieving information. In traditional connectionist models the internal representation forms distributed representation of data, which is completely connected. This causes many unnecessary connections that give rise to ambiguity and noise [3]. Neural networks can be effectively used in the recognition of sequences, such as biological data. Biological data (e.g. protein and DNA sequences) generally contain significant levels of noise and overlapping subsequences. When we transpose such data to computer networks we have Object Identifiers (OIDs) and Management Information Base (MIB). OIDs are strings of numbers allocated in a hierarchical manner used in a variety of protocols. One of the most widely used approach to network monitoring and management is the Simple Network Management Protocol (SNMP). A MIB is a collection of management objects (OIDs) maintained on a network entity that may be remotely manipulated to achieve remote network management [4]. The MIB has a tree structure with

2 OIDs branching out representing their relationships throughout the tree. OIDs uniquely identify each node of the tree starting from the root as depicted in the Fig.1. Since OID sequences used in MIB browsers have similar patterns and characteristics as DNA sequences, studies relative to the latter are relevant. Although a number of artificial neural network-inspired sequence recognition models have been used in identifying protein and DNA sequences and in classifying biological data, these models are inclined to produce a single output and totally ignore the possibility of a fragment belonging to more than one sequence. A major drawback of existing models is their incapability to capture multiple associations. Furthermore conventional approaches can be both uninteresting and computationally expensive to carry out an unambiguous identification of an OID which is derived from incomplete information. Although Self-Organising Feature Map attempts to simulate some partial connectivity while remaining a fully connected model, it still has the drawback of having unrelated connections that are considered to be redundant [9]. Fig. 1. Tree structure of a MIB with its corresponding OID In the case of Network Configuration Management we believe it is possible to develop new learning strategies to make the existing models capable of dealing with the classification of OID sequences and using these classifications for identifying OIDs. The Connectionist Associative Memory Model (CAMM) relies on a two phase learning process using Hebbian learning on a feed-forward type of network. The project involves the development of strategies that will accommodate lateral connections and thus expected to produce a flexible framework for solving different applications. We have adopted this approach to make the model capable of dealing with OIDs and developing cognitive models [1]. The next step was the development of learning algorithms for an existing connectionist associative memory model and devising a dynamic database that will act as the information base that will store the OIDs in different required formats used in sequence recognition and agent based applications. Furthermore, we attempted to create and manage the network topology and relate the objects to the different components of the network in the same database. The information base is designed to enable the use of relationships between components that will determine the overall structure of the network topology. Thus should any component affecting the operations of other sub components fail to work as per specifications, the failure is generalised to this specific part of the network. II. THEORETICAL BACKGROUND AND RESEARCH Expert systems effectively use knowledge bases. One example for such a case can be given as the knowledge bases mostly built using the knowledge taken out from the human experts and the pertinent network information. This information is usually obtained from a network itself. Expert system techniques, which can be classified as knowledge-based and rule-based, are probably one of the very first AI techniques that were used to create an automatic and intelligent network management system. In the network management area, especially at the application level, it is hard to model a significant part of the problems that may occur. Lower layer problems are well-understood while problems at the application layer are complex, application dependent, and distinct from one another. The reason of this may be the difficulties encountered in modelling the reasoning relating to a collection of knowledge, or the nature of the problem to be solved [6]. A network sometimes uses a finite state machine model in order to display certain nondeterministic behaviour [1]. However, some faults do exist in the implementation machine, but they cannot be successfully located and therefore are not able to be corrected [8]. The advanced database techniques design is aimed at having the network operators interacting only with the database. If an operator requires a change in network functioning, like changing a routing scheme, the operator makes these changes in the relevant database. This approach allows the operator to focus on what has to be done, while the database automatically implements the changes and deals with other such mechanics. The advanced database design is also considered a bottom-up design and not just a modified version of other commercial database systems. Therefore, a system architecture that is made specifically for network management is the result. Finally, to efficiently determine the required Management Information Base function, we did everything to identify and use to our advantage the

3 special characteristics of network management data and transactions [5]. Although high level models include expert systems, finite state machines, and advanced database techniques attempt to address these points by correlating the low-level information at the node in order to take sequential relationships into account, they need fault specification to set the essential concept up [1]. Approaches such as expert systems, finite state machines, and advanced database techniques do not point out the abnormal information which is not available in most cases. Additionally the accuracy of high-level models decreases as the network evolves [6]. Pattern recognition is an attempt to solve real world problems that are not especially unambiguous. However, pattern recognition techniques tend to be much better at solving problems which include more information than either expert systems or rule based systems [2]. The monitoring hierarchy contains CAMM and neural networks. The CAMM employs only partial connectivity information to store sequences and retrieve them based on set-theoretic operation. The model has two stages. At the beginning of the first stage, each input string is represented as partially connected set of sub-strings and encapsulated in a topology to constitute a multi-graph. After representing each input string as partially connected, the i k connection sets v +, (shortly known as v-sets) which i j collect the internal relations in the sequence and represent the connections between node ( i + k) v i, j and the nodes in the th layer formed by the data elements in the input data sequences, are completely formed to describe the nodes and the neighbouring layers. The v-set representation for five sets hat, hate, data, date and rare are shown in Figure 2 [1]. Fig. 2. Architecture of Stage 1 for five strings At the end of the first stage a partially connected network representation is produced where sub-strings are superimposed and therefore share the same storage space. Fig. 3. Graph created at the end of stage 1 & Topology of Stage 2 In training part of Stage 2 (see Figure 3), the gradient descent technique is used for those nodes that have been activated by the training set, to set the connection to exact values. All possible paths produced in Stage 1 are represented and therefore the l-paths are calculated. Consequently, the sequence is accepted if it accumulates to unity, otherwise it is rejected [1]. Neural networks are used to learn the normal behaviour of the network. The state probabilities are determined at each level in the monitoring hierarchy, where a full picture of a node s health is provided, so that the network manager can then determine whether the alarm points at any problem more accurately [1]. Existing Network Management Systems offer many different services and a lot of information because of its complex system. This has triggered the development of network management applications using various approaches incorporating neural networks, artificial intelligence etc. In Ref. [10], structure of intelligent network management systems is provided by using expert systems. The resulting mechanism is called as ExNet and discussed in detail. In this work a Connectionist Inference Model shown in Fig. 4 has been incorporated into an existing architecture based on the use of expert systems. The model incorporates CAMM instead of expert systems in order to manage the system used for the analysis of the entire network and its services, and proper performance management. The architecture shown in Fig. 4 has four main Modules. These are Monitor module, the Network Interface module, the Network Manager Interface module and the Connectionist Inference module respectively and each one is explained in Ref. [1].

4 Fig. 4. General Architecture of Intelligent Network Monitoring [1] III. WORK DONE & RESULTS Following the general architecture and having undergone an exhaustive literature review of various sequence recognition procedures and understood the requirements, we have developed an application in Java using existing algorithms developed by authors of Ref. [1] and modifying them and incorporating components that will ensure the interaction with the database and furthermore manipulate the data in the database to create different formats of the said data to be used most efficiently by the main application. Also as mentioned the database used along side with the main application (modified CAMM), has been created using Microsoft Office Access database. The different components added to the main application are essential to generate formats of the OIDs stored in the database such that it has increased the dimension size of the sequences which have been proven to provide improved results through exhaustive testing. Therefore the main application has also been tweaked to make optimal use of the newly generated sequences as inputs. Throughout our development, three main formats of the sequences have been analysed, tested and used as input to the main application. The reason for that is simply because the characteristics of traditional OIDs (e.g ) are such that it does not use the full performance of sequence recognition, therefore different versions of the OIDs has been generated so as to increase the dimension size of the sequences. First the OIDs have been converted from their string format to their hexadecimal format, e.g. (2e312e332e362e312e322e312e252e362e332e312e31), and finally the 2e s representing the. s in hexadecimal has been changed randomly to ensure a larger dimension of the sequences e.g. (ek31wx33mc36eu31be32mn31fh25pa36ps33fx31gm31). The database has not only been devised to store OIDs in different formats but the same database has also been used to record faults messages and to store the topology of the network and relationships between the components i.e. Routers, Switches, PCs (Personal Computers) and links have been established such that queries which have also been created can run and clearly define the connectivity status of each component and status of the overall network thus ensuring the proper operation and security of the latter. The results of the queries will act as reports to Network Managers stored as the network records. The main application reads faults messages sequences from the database (normally generated by traps set for network monitoring) and uses the modified CAMM algorithm to resolve the faults message. Till now we have been able to achieve results that optimally use the modified CAMM algorithm to resolve faults messages by achieving a reduced number of probabilities. The following example will illustrate the results we have been able to achieve. A faults message is read from the database e.g. (qw--fa33vm36ys31ub32ju--qz--rf36wo33xf31) The - represents missing information from the fault message. The fault message serves as an input to the modified CAMM which trains the fault free set of OID sequences from the database and generates connections representing the links between the components of the sequences as depicted and explained in the simple CAMM example through Figure 2 and Figure 3. The results are in the form of colour labels showing the probability of components that could fit the missing information [-]. The results of the fault message used as input above are as follows: Level affected 3 3 R 4 1 R 23 3 R 24 1 R 27 1 R 2 R 3 R 28 0 R 5 R Component & Colour Table 1. Test Results of the modified CAMM Where the level affected represent the position of the -

5 starting from 1. Key Letter BL W G B R Colour Black White Green Blue Red Black has the lowest probability and Red has the highest probability. From the set of OIDs in the database it is known that the corresponding OID to the faulty one is (qw31fa33vm36ys31ub32ju31qz25rf36wo33xf31). Therefore we can see that the modified CAMM has been able to resolve the levels 3, 4, 23 and 24 reaching to the appropriate component and has 3 possibilities at level 27 and 2 possibilities at level 28. We can also find that the components missing at levels 27 and 28 i.e. 2 and 5 respectively are present in the probable components and have the highest probability. Different versions of the application have been developed and perfected based on the results achieved. Throughout the development process regular tests have been carried out to ensure that the application performs the required set of tasks and that the database to read from and write to effectively and efficiently. Since the application cannot work without the database, the connection created using an Open Database Connectivity Connection is vital and has been tested alongside with the other tests. IV. FUTURE WORKS Having achieved promising results, the next step is to incorporate an additional component in the form of an algorithm that will eliminate the noisy parts to reach single outputs at each level thus allowing the complete resolution of fault messages such that the application can run completely on its own and be incorporated in networks to serve as dynamic resolution modules. Candidate concepts under study include artificial neural network whereby Hebbian based learning algorithm calculates and assigns weights between nodes and eliminate noisy parts based on the weights achieved. The work can be extended to cover not only fault management but also network security. Well defined access and usage patterns can be used for training the system and then make decisions. along with the optimization of OIDs format, have had an important impact on the resolution of sequential information. The developed system is capable of storing and retrieving multiple associations of OIDs and opens itself to parallel or distributed implementation. The strength of pattern recognition used by the modified CAMM provides a better solution compared to rule based systems which do not use all of the information available for processing. Furthermore the learning process with the modified CAMM is on-going and a best-match approach can be taken to try and solve problems for which there is no exact information available compared to rule based systems which are usually cumbersome. The database incorporated in the system provides capabilities for further improvement of systems and also can help Network Managers to have concise information on their network and enables them to picture and understand the complex network easier. Furthermore, the topologies and systems achieved enables new components to be added without major alterations of the existing system. REFERENCES [1] E.Gemikonakli, O.Gemikonakli, S.Bavan, (2008), Intelligent Network Monitoring Using a Connectionist Inference Model. [2] G.A. Halse, Novel Approaches to the Network to the Monitoring of Computer Networks, Master Thesis, Computer Science, Grahamstown, South Africa, [3] I. Mitchell, A.S.Bavan. (2000). A Connectionist Inference Model for Pattern-Directed Knowledge Representation. Expert Systems, [4] J. D. Case, C. Partridge. Case Diagrams: A First Step to Diagrammed Management Information Bases, p13. [5] J.R.Haritsa, M.O.Ball and N.Roussopoulos, A. Datta and S.Baras, Managing Networks using Database Technology, Selected Areas incommunication, IEEE Journal, vol.11, pp , December [6] N. Nuansri, T.S. Dillon and S.Singh, An Application of Neural Network and Rule-Based System for Network Management: Application Level Problems, Proceeding of the 30th Hawaii International Conference on System Sciences, vol.6, pp , January [7] P. Picton, (2000). Neural Network. New York: PALGRAVE. [8] Rouvellou and G.W.Hart, Inference of a Probabilistic Finite State Machine from its Output, Systems, Man and Cybernetics, IEEE Trans., vol.25, pp , March [9] S. Bavan, M. Ford, Melina Kalaatzi. (2000). Genomic and Proteomic Sequence Recognition Using a Connectionist Inference Model. Society of Chemical Industry, [10] Y. Kim and S.Hariri, ExNet: An Intelligent Network Management System, WebNet98-World Conference of the WWW, Internet and Intranet, Orlando, November V. CONCLUSION A solution to tackle security issues in network configuration management has been developed to achieve intelligent and secure network management. With reference to the results achieved, it is seen that the modified CAMM

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

A Time Efficient Algorithm for Web Log Analysis

A Time Efficient Algorithm for Web Log Analysis A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

Neural Networks in Data Mining

Neural Networks in Data Mining IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Effective Data Mining Using Neural Networks

Effective Data Mining Using Neural Networks IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

CHAPTER THREE, Network Services Management Framework

CHAPTER THREE, Network Services Management Framework CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7

More information

Operations Research and Knowledge Modeling in Data Mining

Operations Research and Knowledge Modeling in Data Mining Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 koda@sk.tsukuba.ac.jp

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

A Mind Map Based Framework for Automated Software Log File Analysis

A Mind Map Based Framework for Automated Software Log File Analysis 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION 1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

NEURAL NETWORKS IN DATA MINING

NEURAL NETWORKS IN DATA MINING NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,

More information

Stabilization by Conceptual Duplication in Adaptive Resonance Theory

Stabilization by Conceptual Duplication in Adaptive Resonance Theory Stabilization by Conceptual Duplication in Adaptive Resonance Theory Louis Massey Royal Military College of Canada Department of Mathematics and Computer Science PO Box 17000 Station Forces Kingston, Ontario,

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

The best network information. COPA-DATA know-how: SNMP with zenon

The best network information. COPA-DATA know-how: SNMP with zenon The best network information COPA-DATA know-how: SNMP with zenon The best network information COPA-DATA know-how: SNMP with zenon A control system for Energy Automation always has many different IT devices.

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS TW72 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS MODULE NO: EEM7010 Date: Monday 11 th January 2016

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Application of Neural Network in User Authentication for Smart Home System

Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

Domain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible

Domain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable The Internet continues

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research An Implementation Scheme For Software Project Management With Event-Based Scheduler Using Ant Colony Optimization Roshni Jain 1, Monali Kankariya

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

Spatial Data Mining Methods and Problems

Spatial Data Mining Methods and Problems Spatial Data Mining Methods and Problems Abstract Use summarizing method,characteristics of each spatial data mining and spatial data mining method applied in GIS,Pointed out that the space limitations

More information

A Color Placement Support System for Visualization Designs Based on Subjective Color Balance

A Color Placement Support System for Visualization Designs Based on Subjective Color Balance A Color Placement Support System for Visualization Designs Based on Subjective Color Balance Eric Cooper and Katsuari Kamei College of Information Science and Engineering Ritsumeikan University Abstract:

More information

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP -overview. Based on: W.Stallings Data and Computer Communications SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use

More information

CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD

CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD Acta Electrotechnica et Informatica No. 2, Vol. 6, 2006 1 CLASSIFICATION AND CLUSTERING METHODS IN THE DECREASING OF THE INTERNET COGNITIVE LOAD Kristína MACHOVÁ, Ivan KLIMKO Department of Cybernetics

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Web Mining using Artificial Ant Colonies : A Survey

Web Mining using Artificial Ant Colonies : A Survey Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Cisco Performance Visibility Manager 1.0.1

Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing

More information

USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION

USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION USING SELF-ORGANISING MAPS FOR ANOMALOUS BEHAVIOUR DETECTION IN A COMPUTER FORENSIC INVESTIGATION B.K.L. Fei, J.H.P. Eloff, M.S. Olivier, H.M. Tillwick and H.S. Venter Information and Computer Security

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

Topics. Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs

Topics. Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs SNMP Workshop Topics Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs CSS // COMSOFT Satellite Services GmbH / page 2 // Topic Generals SNMP CSS

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Natural Language to Relational Query by Using Parsing Compiler

Natural Language to Relational Query by Using Parsing Compiler Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server

Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server Configuring Dell OpenManage IT Assistant 8.0 to Monitor SNMP Traps Generated by VMware ESX Server Amresh Singh Dell Virtualization Solutions Engineering January 2007 Dell Inc. 1 www.dell.com/vmware Contents

More information

PROFINET IO Diagnostics 1

PROFINET IO Diagnostics 1 PROFINET IO is a very cost effective and reliable technology. However, extensive installations can have thousands of PROFINET IO devices operating on many networks. The reliable operation of these networks

More information

Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances

Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Comparing Support Vector Machines, Recurrent Networks and Finite State Transducers for Classifying Spoken Utterances Sheila Garfield and Stefan Wermter University of Sunderland, School of Computing and

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

Simple Network Management Protocol

Simple Network Management Protocol A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org

More information

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

More information

Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I

Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

Pattern-Aided Regression Modelling and Prediction Model Analysis

Pattern-Aided Regression Modelling and Prediction Model Analysis San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2015 Pattern-Aided Regression Modelling and Prediction Model Analysis Naresh Avva Follow this and

More information

ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)

ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING) Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Preliminaries Classification and Clustering Applications

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS

REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS REQUIREMENTS FOR AUTOMATED FAULT AND DISTURBANCE DATA ANALYSIS Mladen Kezunovic *, Texas A&M University Tomo Popovic, Test Laboratories International, Inc. Donald R. Sevcik, CenterPoint Energy Aniruddha

More information

OSIX Real-time network performance monitoring.

OSIX Real-time network performance monitoring. OSIX Real-time network performance monitoring. Polystar s OSIX system offers the telecommunications market innovative monitoring solutions for maximising network performance and managing advanced real-time

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Building a Scalable Numbering Plan

Building a Scalable Numbering Plan Building a Scalable Numbering Plan Scalable Numbering Plan This topic describes the need for a scalable numbering plan in a VoIP network. Dial Plans Dial plans contain specific dialing patterns for a user

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

Data Mining Techniques Chapter 7: Artificial Neural Networks

Data Mining Techniques Chapter 7: Artificial Neural Networks Data Mining Techniques Chapter 7: Artificial Neural Networks Artificial Neural Networks.................................................. 2 Neural network example...................................................

More information

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,

More information

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net

Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling

More information

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2

More information

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

A GENERALIZED APPROACH TO CONTENT CREATION USING KNOWLEDGE BASE SYSTEMS

A GENERALIZED APPROACH TO CONTENT CREATION USING KNOWLEDGE BASE SYSTEMS A GENERALIZED APPROACH TO CONTENT CREATION USING KNOWLEDGE BASE SYSTEMS By K S Chudamani and H C Nagarathna JRD Tata Memorial Library IISc, Bangalore-12 ABSTRACT: Library and information Institutions and

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

IBM Tivoli Network Manager software

IBM Tivoli Network Manager software Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services

More information