Hidden Markov Model for it Service Based on Knowledge Engineering
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
Normally, IT service management is mainly worn for implementation and management of quality of IT services. IT services and information from different source is categorized as various, inadequate, dissimilar, and geologically dispersed. It is hard to consume these complicated services. The main aim of the project is to manage large scale information technology system process in easy manner. A systematic way is proposed to overcome the challenges of availability, financial loss and security. Hidden Markov Model (HMM) which utilizes knowledge engineering is developed to guarantee the engineering procedure. The process of Hidden Markov Model is to manage multiple IT services at a time and produce updated service with security to every user in the networks in service management.
Authors and Affiliations
V. Vijayalakshmi
[b]Design and Construction of a Model Sedimentaion Tank Using Existing Slow Sand Filter For NDA Treatment Plant[/b]
The treatment of water for human consumption involves various processes in which raw water passes through. This processes includes; screening, flocculation/coagulation, sedimentation, filtration and chlorination. Sedim...
Physics Motion Applied to a Ball Using OpenGL
In this paper, we show motion of ball with the help of computer graphics using OpenGL API.. The purpose is to adequately show a continuous and m camera. Here we create an object with vertex shader and fragment sh...
EMBEDDED SYSTEMS FOR IRIS RECOGNITION
Iris Recognition increasingly used method of biometric authentication that involves pattern-recognition techniques of images of irides to uniquely identify a person. In this paper, IRIS biometrics has been chosen...
[b]AN INSPECTION ON OFFLINE SIGNATURE AUTHENTICATION [/b][b][/b]
In the era of emergent technology, security is that the foremost anxiety to avoid replicas and counterfeits. There are diverse Biometric systems that enable in personal identification, amongst those verification s...
INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES
Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring g...