slugBe Secure with Analytics
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
Once the data has been captured, monitored and analyzed properly, it can be used to understand security threats which enterprises were not able to detect earlier. Today every organization have security information and event management technology at the place which provides real time analysis of security alerts generated by network hardware and applications.
Authors and Affiliations
Anu Taneja
Stochastic Model to Find the Testosterone Therapy on Functional Capacity in CHF Patients Using Stochastic Analysis
Heart failure is a serious cardiovascular condition leading to life threatening events, poor prognosis, and degradation of quality of life. According to the present evidences suggesting association between low testoster...
Automatic Engagement and Disengagement of Handbrake System Using Pneumatic system
One of the most important safety features in an automobile is brake. A typical automobile consists of two types of brakes, one for retarding the speed of vehicle while it is in motion and other is to hold the vehicle in...
Earlier Detection of Glaucoma using Empirical Wavelet Transform
Glaucoma is an ocular disorder caused due to increased fluid pressure in the optic nerve. It damages the optic nerve subsequently causes loss of vision. The available scanning methods are Heidelberg Retinal Tomography (...
Review of Vision Based Robot Navigation System in Dynamic Environment
This paper is proposed for the review of robot navigation in the dynamic environment using vision based approach. Vision-based robot navigation has long been a fundamental goal in both robotics and computer vision resea...
Optimized Association Rule Mining with Maximum Constraints using Genetic Algorithm
Association rule mining is to find out association rules that satisfy the predefined minimum support and confidence from a given database.. In this paper initially we applied Apriori algorithm in order to generate frequ...