• Title/Summary/Keyword: Log System

Search Result 1,504, Processing Time 0.034 seconds

Calculation and Analysis of Hydrophobicity of the Dyes Synthesized for Unmodified Polypropylene Fibers Using Molecular Descriptors

  • Kim, Tae-Kyeong;Jang, Kyung-Jin;Jeon, Seon-Hee
    • Textile Coloration and Finishing
    • /
    • v.21 no.5
    • /
    • pp.21-26
    • /
    • 2009
  • In order to analyze numerically the hydrophobicity of the new dyes synthesized for unmodified pure polypropylene fibers, the octanol-water partition coefficient (logP), which is one of molecular descriptors representing hydrophobicity of organic compounds, was obtained by a semi-empirical method using Chem3D software. For the dyes of higher logP than around 5, the affinity of the dyes towards unmodified polypropylene fiber was substantial. In contrast to the new dyes for polypropylene, conventional disperse dyes have logP values lower than 5 and exhibited poor affinity.

Improved Integrated Monitoring System Design and Construction (개선된 통합모니터링 시스템 설계 및 구축)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.25-33
    • /
    • 2017
  • In order to prevent information leakage, companies are monitoring the information leakage by internal staff by building individual security system and integrated monitoring system of firewall and DLP function. Especially, many log data of the integrated monitoring system cause time and money, and it is difficult to detect information leak of fast malicious personnel due to system slowdown. It is necessary to speed up the system by digitizing large log data for each day and person for fast information leakage detection and there is a need to develop and manage a continuous monitoring program for the information leakage indications personnel. Therefore, we propose an improved integrated monitoring system using log data by date and individual data.

Utilization Pattern Analysis of an Enterprise Information System using Event Log Data (로그 데이터를 이용한 기업 정보 시스템의 사용 패턴 분석)

  • Han, Kwan Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.723-732
    • /
    • 2022
  • The success of enterprise information system(EIS) is crucial to align with corporate strategies and eventually attain corporate goals. Since one of the factors to information system success is system use, managerial efforts to measure the level of EIS utilization is vital. In this paper, the EIS utilization level is analyzed using system access log data. In particular, process sequence patterns and clustering of similar functions are identified in more detail based on a process mining method, in addition to basic access log statistics. The result of this research can be used to improve existing information system design by finding real IS usage sequences and function clusters.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

Design of Log Management System based on Document Database for Big Data Management (빅데이터 관리를 위한 문서형 DB 기반 로그관리 시스템 설계)

  • Ryu, Chang-ju;Han, Myeong-ho;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2629-2636
    • /
    • 2015
  • Recently Big Data management have a rapid increases interest in IT field, much research conducting to solve a problem of real-time processing to Big Data. Lots of resources are required for the ability to store data in real-time over the network but there is the problem of introducing an analyzing system due to aspect of high cost. Need of redesign of the system for low cost and high efficiency had been increasing to solve the problem. In this paper, the document type of database, MongoDB, is used for design a log management system based a document type of database, that is good at big data managing. The suggested log management system is more efficient than other method on log collection and processing, and it is strong on data forgery through the performance evaluation.

Development of Database System for Ground Exploration (지반조사자료 정보화 시스템 구축)

  • 우철웅;장병욱
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 1998.10a
    • /
    • pp.395-400
    • /
    • 1998
  • This paper presents a geotechnical information system(HGIS) developed for Korea Highway Corporation. To make a database for boring information, characterization study of boring data is carried out. Based on tile study, the HGIS database is developed as a relational database. The HGIS database consists of 23 tables including 13 reference tables. For an effective database management, a boring log program called GEOLOG is developed. GEOLOG can print boring log and store those data to tile HGIS database.

  • PDF

Computational Reduction in Keyword Spotting System Based on the Bucket Box Intersection (BBI) Algorithm

  • Lee, Kyo-Heok;Kim, Hyung-Soon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.2E
    • /
    • pp.27-31
    • /
    • 2000
  • Evaluating log-likelihood of Gaussian mixture density is major computational burden for the keyword spotting system using continuous HMM. In this paper, we employ the bucket box intersection (BBI) algorithm to reduce the computational complexity of keyword spotting. We make some modification in implementing BBI algorithm in order to increase the discrimination ability among the keyword models. According to our keyword spotting experiments, the modified BBI algorithm reduces 50% of log-likelihood computations without performance degradation, while the original BBI algorithm under the same condition reduces only 30% of log-likelihood computations.

  • PDF

Log Analysis System Design using RTMA

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.04a
    • /
    • pp.225-236
    • /
    • 2004
  • Every web server comprises a repository of all actions and events that occur on the server. Server logs can be used to quantify user traffic. Intelligent analysis of this data provides a statistical baseline that can be used to determine server load, failed requests and other events that throw light on site usage patterns. This information provides valuable leads on marketing and site management activities. In this paper, we propose a method of design for log analysis system using RTMA(realtime monitoring and analysis) technique.

  • PDF

A Design and Implementation A Software Profiling Tool based on XML for Embedded System (내장형 시스템 소프트웨어를 위한 XML 기반의 프로파일링 도구의 설계 및 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.143-151
    • /
    • 2010
  • According to increasing requirements in embedded systems. embedded software has been more complicated then before. a optimum software is difficult in embedded system. software developer make a difficult optimum software. this paper suggests a software profiling tool with which a software developer can easily profiling the embedded system software in cross-development environments. the suggested tool is designed based on host/target architecture. this tool insert program source for make profiling log to target program. a target program executed in target system. a target system communicate profiling log to host system. this tool in host system analyze profiling log data. and make a XML of profiling log and a profiling report. a profiling report is graphic viewer based GUI. a target system in this tool needs a few computing power. and XSLT can conversion of profile log XML to other format data. and suggested tool based on eclipse plug-in, therefore developer can use operates in eclipse.

Affine-Invariant Image normalization for Log-Polar Images using Momentums

  • Son, Young-Ho;You, Bum-Jae;Oh, Sang-Rok;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1140-1145
    • /
    • 2003
  • Image normalization is one of the important areas in pattern recognition. Also, log-polar images are useful in the sense that their image data size is reduced dramatically comparing with conventional images and it is possible to develop faster pattern recognition algorithms. Especially, the log-polar image is very similar with the structure of human eyes. However, there are almost no researches on pattern recognition using the log-polar images while a number of researches on visual tracking have been executed. We propose an image normalization technique of log-polar images using momentums applicable for affine-invariant pattern recognition. We handle basic distortions of an image including translation, rotation, scaling, and skew of a log-polar image. The algorithm is experimented in a PC-based real-time vision system successfully.

  • PDF