A Survey on Hidden Markov Model for IT Service Management
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 1
Abstract
Network management refers to the actions, techniques, proceedings, and tools that are related to the process, governance, upholding, and stipulating of networked systems. Network management is vital to rule and manage practices and is normally conceded out of a network operations axis. Governance deals with observing the path of resources in the network and how they are allocated. It includes all the maintenance that is needed to keep the network under control. This paper presents a survey of various techniques used in network management and Hidden Markov Model (HMM) that is utilized for IT service management in detail.
Authors and Affiliations
V. Vijayalakshmi , P. Mahalakshmi , S. Thamizharasan
Analysis of Trust in Wireless Sensor Networks
Trust is an important factor in Wireless Sensor Network (WSN) that enables the sensor node to cooperate each other for their application. It makes the nodes in the wireless sensor networks to cope with uncertainty caused...
Detecting Denial of Service Attack Using Principal Component Analysis with Random Forest Classifier
Nowadays, computer network systems plays gradually an important role in our society and economy. It became a targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is the reason th...
An Approach to Memory management in Wireless Sensor Networks
In recent years, wireless sensor network has become an important research domain. A typical WSN is a multi-hop wireless network consisting of hundreds or thousands of small sensor devices that are capable of sensing, pro...
Enhanced Double Layer Security using RSA over DNA based Data Encryption System
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that us...
“MOBILE MALWARE DETECTION TECHNIQUES”
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet acc...