Network failure detection and diagnosis by analyzing syslog and SNS data: Applying big data analysis to network operations
T Kimura, K Takeshita, T Toyono… - NTT Technical …, 2013 - waseda.elsevierpure.com
We introduce two big data analysis methods for diagnosing the causes of network failures
and for detecting network failures early Syslogs contain log data generated by the system …
and for detecting network failures early Syslogs contain log data generated by the system …
[PDF][PDF] A methodology for the emulation of IPv4
I Mary Linda, D Vimala, KS Priya - International Journal of Innovative …, 2019 - academia.edu
Mobile configurations and wide-area net-works have garnered tremendous interest from
both cryptographers and electrical en-gineers in the last several years. In this paper, we …
both cryptographers and electrical en-gineers in the last several years. In this paper, we …
[PDF][PDF] A novel method improvement of rapid miner for the data mining applications
R Nayak, S Dinesh… - International Journal of …, 2019 - academia.edu
Information mining is a well known mechanical advancement that changes over heaps of
information into useful learning, which can help the information owners or clients settle on …
information into useful learning, which can help the information owners or clients settle on …
[PDF][PDF] Merkle hash tree with hash based digital signature for cloud data confidentiality and security
AR Arunachalam, G Michael… - Journal of Pure and …, 2018 - researchgate.net
It provides efficient processing power, an unbelievable computation speed and a wide array
of stage space. Basically, the cloud computing transfer the huge volume of data on the …
of stage space. Basically, the cloud computing transfer the huge volume of data on the …
[PDF][PDF] System Failure Recognition and Identification by Analyzing Syslog and SNS Data: Applying Big Data Analysis to Network Operations
D Vimala, P Nandhini, R Elankavi - researchgate.net
We present two major information examination strategies for diagnosing the reasons for
system disappointments and for identifying system disappointments early. Syslogs contain …
system disappointments and for identifying system disappointments early. Syslogs contain …
[PDF][PDF] An Exploration of Fiber-Optic Cables
C Geetha, I Mary Linda, R Elankavi - researchgate.net
International Journal of Engineering & Advanced Technology (IJEAT) Page 1 International
Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S8 …
Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S8 …
[PDF][PDF] Safeguard Clothing and Dive Decrease
D Jeyapriya, G Michael, R Elankavi, SA Jijo - researchgate.net
Conceptual—Security is one of the significant issues which the present progressed IoT
dangers require a point by point episode reaction methodology when complex hacking …
dangers require a point by point episode reaction methodology when complex hacking …
[PDF][PDF] Biometric Authentication in Cloud Computing
R Velvizhi, P Nandhini, R Elankavi - researchgate.net
The cloud clients are confronting serious issue of phony login and information robbery. So it
is extremely important to confirm the cloud client that demands access to a record for giving …
is extremely important to confirm the cloud client that demands access to a record for giving …
[PDF][PDF] Synthesizing Multicast Solutions using Heterogeneous Information
B Sundarraj, R Elankavi, S Sangeetha - researchgate.net
The producer-consumer problem and online algorithms, while natural in theory, have not
until recently been considered extensive. In this position paper, we confirm the development …
until recently been considered extensive. In this position paper, we confirm the development …
[PDF][PDF] Cloud Services for Device Utilization and Optimization of Hybrid Network
AR Arunachalam, G Michael, R Elankavi - researchgate.net
Network devices are labeled as one of the essentially hard tasked equipment. These
devices are dynamically taking part in the network based on the user demand. Thus the …
devices are dynamically taking part in the network based on the user demand. Thus the …