• Title/Summary/Keyword: 데이터 로깅

Search Result 67, Processing Time 0.022 seconds

Performance Analysis of Disconnected Operation on Mobile Computing (비연결 수행 이동컴퓨팅 태스크의 성능 분석)

  • 정승식;김재훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3B
    • /
    • pp.202-211
    • /
    • 2002
  • Because wireless links are subject to disturbances and failures, it is important to support disconnected operations in mobile computing. Many schemes have been proposed to support the efficient disconnected operations. In this paper, we analyze and measure the computation time including disconnected operations to evaluate the performance of mobile computing on error prone wireless links. Mobile computation consists of three states: data hoarding, disconnected operation, and block states. We estimate the computation time using various parameters; error rate and recovery rate of wireless link, hoarding overhead, logging overhead, and reintegration overhead, etc. We can choose efficient strategies for disconnected operations and predict the performance using the results of this analysis.

Buying vs. Using: User Segmentation & UI Optimization through Mobile Phone Log Analysis (구매 vs. 사용 휴대폰 Log 분석을 통한 사용자 재분류 및 UI 최적화)

  • Jeon, Myoung-Hoon;Na, Dae-Yol;Ahn, Jung-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.460-464
    • /
    • 2008
  • To improve and optimize user interfaces of the system, the accurate understanding of users' behavior is an essential prerequisite. Direct questions depend on user' s ambiguous memory and usability tests depend on the researchers' intention instead of users'. Furthermore, they do not provide with natural context of use. In this paper we described the work which examined users' behavior through log analysis in their own environment. 50 users were recruited by consumer segmentation and they were downloaded logging-software in their mobile phone. After two weeks, logged data were gathered and analyzed. The complementary methods such as a user diary and an interview were conducted. The result of the analysis showed the frequency of menu and key access, used time, data storage and several usage patterns. Also, it was found that users could be segmented into new groups by their usage patterns. The improvement of the mobile phone user interface was proposed based on the result of this study.

  • PDF

A Study on Implementation of Real-Time Multiprocess Trace Stream Decoder (실시간 다중 프로세스 트레이스 스트림 디코더 구현에 관한 연구)

  • Kim, Hyuncheol;Kim, Youngsoo;Kim, Jonghyun
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.67-73
    • /
    • 2018
  • From a software engineering point of view, tracing is a special form of logging that records program execution information. Tracers using dedicated hardware are often used because of the characteristics of tracers that need to generate and decode huge amounts of data in real time. Intel(R) PT uses proprietary hardware to record all information about software execution on each hardware thread. When the software execution is completed, the PT can process the trace data of the software and reconstruct the correct program flow. The hardware trace program can be integrated into the operating system, but in the case of the window system, the integration is not tight due to problems such as the kernel opening. Also, it is possible to trace only a single process and not provide a way to trace multiple process streams. In this paper, we propose a method to extend existing PT trace program to support multi - process stream traceability in Windows environment in order to overcome these disadvantages.

  • PDF

IoT Platform System for Electric Fire Prediction and Prevention (전기화재 예측 및 예방을 위한 IoT 플랫폼 시스템)

  • Yang, Seungeui;Lee, Sungock;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.223-229
    • /
    • 2022
  • During the winter season, when the weather gets colder every year, electricity consumption increases rapidly. The occurrence of fires is increasing due to a short circuit in electrical facilities of buildings such as markets, bathrooms, and apartments with high population density while using a lot of electricity. The cause of these short circuit fires is mostly due to the aging of the wires, the usage increases, and the excessive load cannot be endured, and the wire sheath is melted and caused by nearby ignition materials. In this paper, the load and overheat generated in the electric wire are measured through a complex sensor composed of an overload sensor, a VoC sensor, and an overheat sensor. Based on this, big data analysis is carried out to develop a platform capable of predicting, alerting, and blocking electric fires in real time, and a simulator capable of simulated fire experiments.

Event Log Analysis Framework Based on the ATT&CK Matrix in Cloud Environments (클라우드 환경에서의 ATT&CK 매트릭스 기반 이벤트 로그 분석 프레임워크)

  • Yeeun Kim;Junga Kim;Siyun Chae;Jiwon Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.263-279
    • /
    • 2024
  • With the increasing trend of Cloud migration, security threats in the Cloud computing environment have also experienced a significant increase. Consequently, the importance of efficient incident investigation through log data analysis is being emphasized. In Cloud environments, the diversity of services and ease of resource creation generate a large volume of log data. Difficulties remain in determining which events to investigate when an incident occurs, and examining all the extensive log data requires considerable time and effort. Therefore, a systematic approach for efficient data investigation is necessary. CloudTrail, the Amazon Web Services(AWS) logging service, collects logs of all API call events occurring in an account. However, CloudTrail lacks insights into which logs to analyze in the event of an incident. This paper proposes an automated analysis framework that integrates Cloud Matrix and event information for efficient incident investigation. The framework enables simultaneous examination of user behavior log events, event frequency, and attack information. We believe the proposed framework contributes to Cloud incident investigations by efficiently identifying critical events based on the ATT&CK Framework.

Attribute-Rich Log-Structured Filesystem for Semantic File Search on SSD (SSD에서의 시맨틱 파일 검색을 위한 확장된 속성 제공의 로그기반 파일시스템)

  • Ki, An-Ho;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.241-252
    • /
    • 2011
  • During the last decades, other parts of operating systems, storage devices, and media are changed steadily, whereas filesystem is changed little. As data is grown bigger, the number of files to be managed also increases in geometrically. Researches about new filesystem schemes are being done widely to support these files efficiently. In web document search area, there are many researches about finding meaningful documents using semantic search. Many researches tried to apply these schemes, which is been proven in web document search previously, to filesystems. But they've focused only on higher layer of filesystem, that is not related seriously to storage media. Therefore they're not well tuned to physical characteristics of new flash memory based SSD which has different features against traditional HDD. We enhance log structured filesystem, that is already well known to work better in SSD, by putting semantic search scheme to and with multi logging point.

Framework and Tools for Rapid M&S Component Development and Reusability (M&S 컴포넌트의 신속 개발과 재사용을 위한 프레임워크 및 도구 개발)

  • Lee, Yong Heon;Cho, Kyu Tae;Lee, Seung Young;Hwang, Keun Chul;Kim, Sae Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.29-38
    • /
    • 2013
  • Modeling and simulation technology is being used in various fields. Especially in the field of military, Simulation-Based Acquisition (SBA) is recognized as a essential policy. To effectively carry out SBA, modeling and simulation techniques should be applied in the whole life-cycle for the weapon system development, and the framework and tools which can help the rapid component development and reusability are needed. In this research, we use the simulation framework based on modeling formalism for enhancement of reusability and a GUI-based modeling environment for rapid M&S component development. The Proposed framework can act as plug-in components on the basis of XML-based object model, so that the flexible design is possible for the change of the model and simulation structure. In addition, our methods are effective to implement the functions for supporting simulation such as the model data logging and communication with external systems. In this paper, we describe an architecture and functions for the framework and tools.

Borehole Heater Test at KAERI Underground Research Tunnel (지하처분연구시설(KURT)에서의 시추공 히터 시험)

  • Kwon, S.;Lee, C.;Yoon, C.H.;Jeon, S.W.;Cho, W.J.
    • Tunnel and Underground Space
    • /
    • v.21 no.3
    • /
    • pp.225-234
    • /
    • 2011
  • In this study, an in situ heater test for investigating the thermo-mechanical behavior related to heat flow was carried out. It was the first in situ heater test in Korea. For the test, an adequate design of heater, observation sensors, and data logging system was developed and installed with a consideration of the site condition and the test purposes. It was possible to observe that steep joints are overwhelmingly developed in the test area from a joint survey. The major rock and rock mass properties at the test site could be determined from the thermal and mechanical laboratory tests using the rock cores from the site. From the measured rock temperature distribution, it was possible to observe the influence of the rock joints and the heat flow through tunnel wall. When the heater temperature was maintained as $90^{\circ}C$, the rock temperature at 0.3 m from the heater hole was increased up to $40^{\circ}C$.

A Study on Improving the Direction of Moving Image Material Descriptions (영상기록물 기술의 개선 방향 연구)

  • Shim, Bomee;Chang, Yunkeum
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.1
    • /
    • pp.325-344
    • /
    • 2018
  • Since the year 2000, the need for an improvement of archival descriptions has been an increasing issue, due to the growing usage and amount of archival materials. Unlike the development of descriptions for paper records, however, the technological development and research for moving image descriptions has been limited due to its diversity and specificity. This research investigated the current status and the specificity of the moving image descriptions and also examined major international archival description cases. In-depth interviews with archival professionals were also conducted. Based on the findings, this study suggested the need for redefinition of and continuous research on the fundamental values of moving image information, moving image description and management based on digilog view points, the development of user-centric description and search aides, the creation of moving image values using a relevant information management system, and the improvement of moving image description elements throughout the life-cycle of the material.

A Energy Theft Traceback Protocol in a Smart Grid Environment (스마트 그리드 환경에서 에너지 도둑 추적 프로토콜)

  • Jeong, Eun-Hee;Lee, Byung-Kwan;Ahn, Hui-Hak
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.534-543
    • /
    • 2015
  • This paper proposes an Energy Theft Traceback Protocol(ETTP) based on Logging and Marking that can trace Energy Theft back in Smart Grid Environment. The ETTP consists of the following three phases. First, it classifies Energy Theft Type into Measurement Rejection and Data Fabrication by generating an Energy Theft Tree. Second, it detects an Energy Theft by using the Energy Theft Tree. Finally, it trace an Energy Theft back by using the Logging Table of a Router and the Marking Information of a Packet. The result of its simulation shows that the Detection Ratio of Energy Theft is estimated at 92% and the Success Ratio of Energy Theft Traceback at 93%. Therefore, the ETTP not only reduces such risk factors as Forgery and Tampering about Billing information but also provides safe and reliable Smart Grid environment.