ANALYSIS OF SYSTEM ERROR LOG USING ASSOCIATION MINING
Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): KAMLESH KUMAR SHRIVASTAVA , RACHANA MISHRA , SHIRISH MOHAN DUBEY
Abstract: With the growth of communication networks, event logs are increasing in size at a fast rate. Today, our operating systems that generate tens of gigabytes of log data per day. Event Viewer maintains logs about program, security, and system events. You can obtain information about your hardware, software & system components. Apriori is frequently adopted to discover frequent item sets, from which strong association rules can be easily generated, from among massive amounts of transactional or relat
- Publication Date: 03-Jun-2011
- DOI: 10.15224/978-981-07-1847-3-1027
- Views: 0
- Downloads: 0
SIMULATION OF LOW POWER ARCHITECTURE OF FINITE STATE MACHINE
Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): DINESH CHANDRA , HIMANI MITTAL , SAMPATH KUMAR
Abstract: With the predominance of mobile devices, rising energy costs, and an awareness of green practices,power consumption has become a major concern for design engineers. When power consumption is analyzed, it breaks down into two main components: static or leakage power, which occurs naturally when components are idle and powered on; and dynamic power, which is the power consumed when components are switching
- Publication Date: 03-Jun-2011
- DOI: 10.15224/978-981-07-1847-3-1027
- Views: 0
- Downloads: 0