slugBe Secure with Analytics
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Once the data has been captured, monitored and analyzed properly, it can be used to understand security threats which enterprises were not able to detect earlier. Today every organization have security information and event management technology at the place which provides real time analysis of security alerts generated by network hardware and applications.
Authors and Affiliations
Anu Taneja
Stock Market Price Trend Forecasting using Machine Learning
support vector machine is a machine learning technique used in to forecast stock prices. Stock market price forecasting is the process of determining the future value of a company’s stock. This study uses daily closing...
Special Rectangles and Narcissistic Numbers of Order 3 And 4
We search for infinitely many rectangles such that x2 y2 3A S 2 k2 SK Narcissistic numbers of order 3 and 4 respectively, in which x, y represents the length and breadth of the rectangle. Also the total num...
Secure Dynamic Source Routing Using Node’s Faith Value in Mobile Ad-Hoc Network
A mobile ad-hoc network is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly over time, because the nodes are mobile. The network is decentra...
Online News Article Temporal Phrase Extraction for Causal Linking
This research proposes a method to detect temporal links between news articles using phrase extraction and position analysis. The words from the information feed were split into tokens using special character as the del...
Heat Transfer Enhancement of Shell and Tube Heat Exchanger
Heat exchanger is a device which provides a flow of thermal energy between two or more fluids at different temperatures. There are many problems created in the segmental heat exchanger during and after the work. The maj...