• Title/Summary/Keyword: Log analysis

Search Result 2,179, Processing Time 0.037 seconds

Microbial Risk Assessment for Mixed Vegetable Salad and Fresh and Frozen Fruits Distributed in Korea (국내 유통 중인 혼합채소샐러드 및 신선·냉동과일의 미생물 오염실태 조사)

  • Park, Hyun-Jin;Lee, Jeong-Eun;Kim, Sol-A;Shim, Won-Bo
    • Journal of Food Hygiene and Safety
    • /
    • v.36 no.4
    • /
    • pp.324-330
    • /
    • 2021
  • In this study, the microbial levels on mixed vegetable salads, fresh fruits, and frozen fruits distributed in Korea were comparatively analyzed by food group, region, and quarter. Samples were collected from big markets in large cities from 2018 to 2019 and used for microbiological analysis. The levels of aerobic bacteria for mixed vegetable salads, fresh fruits, and frozen fruits were 6.48, 5.07, and 3.78 log CFU/g, respectively. As a result of analyzing the quarterly contamination levels of aerobic bacteria, the first quarter contamination level was 5.12 log CFU/g while the second quarter showed 6.26 log CFU/g, the third quarter 5.73 log CFU/g, and the fourth quarter 4.42 log CFU/g. A higher number of aerobic bacteria was observed in the second and third quarters when the temperature was higher. There was no difference in the number of bacteria by region. The levels of the coliform group were 1.98 - 3.93 log CFU/g in all samples, and Escherichia coli was detected at 1.38 log CFU/g in 3 out of 27 mixed vegetable salads. Since the mixed vegetable salad and fresh fruit used in this study exceeded the standard (3 log CFU/g) for unheated foods and E. coli was detected in three fresh fruits, stricter hygiene management in the manufacturing stage of salads and fresh fruit is required.

Microbial Hazard Analysis of Manufacturing Processes for Starch Noodle (당면의 제조공정별 미생물학적 위해요소 분석)

  • Cheon, Jin-Young;Yang, Ji Hye;Kim, Min Jeong;Lee, Su-Mi;Cha, Myeonghwa;Park, Ki-Hwan;Ryu, Kyung
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.4
    • /
    • pp.420-426
    • /
    • 2012
  • The purpose of this study was to identify control points through microbiological hazard analysis in the manufacturing processes of starch noodles. Samples were collected from the ingredients, manufacturing processes, equipment and environment. Microbiological hazard assessments were performed using aerobic plate counts (APC), Enterobacteriaceae (EB), E. coli and five pathogens including B. cereus, E. coli O157:H7, L. monocytogenes, Salmonella spp., and S. aureus. The APC levels in raw materials were from 2.12 to 3.83 log CFU/g. The contamination levels after kneading were 4.31 log CFU/g for APCs and 2.88 log CFU/g for EB counts. APCs decreased to 1.63 log CFU/g and EB were not detected after gelatinization, but their levels slightly increased upon cooling, cutting, ripening, freezing, thawing, and separating. The reuse of cooling and coating water would be a critical source of microbial increase after cooling. After drying, APCs and EB counts decreased to 5.05 log CFU/g and 2.74 log CFU/g, respectively, and the levels were maintained to final products. These results suggest that the cooling process is a critical control point for microbiological safety, and the cooling water should be treated and controlled to prevent cross contamination by pre-requisite program.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

Brain activity analysis by using chaotic characteristics (카오스 특성에 의한 뇌의 활동도 분석)

  • 김택수;김현술;박상희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.1844-1847
    • /
    • 1997
  • Assuming that EEG(electroencephalogram), which is generated by a nonlinear electrical of billions of neurons in the brain, has chaotic characteristics, it is confirmend by frequency spectrum analysis, log frequency spectrum analysis, correlation dimension analysis and Lyapunov exponents analysis. Some chaotic characteristics are related to the degree of brain activity. The slope of log frequency spectrum increases and the correlation dimension decreasess with respect to the activities, while the largest Lyapunov exponent has only a rough correlation.

  • PDF

A study on log diameter classes of Korean softwood log (국산 침엽수 원목의 경급구분 기준에 관한 연구)

  • Park, Jung-Hwan;Kim, Kwang-Mo;Eom, Chang-Deuk;Jung, Doo-Jin
    • Journal of the Korean Wood Science and Technology
    • /
    • v.41 no.4
    • /
    • pp.337-345
    • /
    • 2013
  • Log grading rules are essential tools to ensure the quality of logs in distribution structure. The rules should reflect the long experience and accepted usage practice in the market. A gap between the rules and market should be improved based on analysis of log qualities that produced and market demand. In this study more than ten millions logs which were produced by 5 Regional Forest Services in 2010~2011 period, were analyzed in their qualities including diameters and lengths by species. A proposal was driven to improve the current log grading rules in terms of log diameter classes and length. The followings are the summary of this study. Most of domestic softwood logs are belong to small diameter class of 100~160 mm, which imply the diameter classes of current log grading rules are immoderate. Distributions of log diameter shows distinctive patterns by species, which indicate a necessity of differentiated diameter classes by species in an improved rules. Lengths of logs in productions do not corresponding to the demands and preferences in sawmills. Therefore it is highly recommended to include log length term in an improved log grading system. Based on these findings, 6 log grading systems for 3 species groups of softwood are newly proposed to improve current log grading rules. Limits of log diameter and log length are also proposed for each log grading system.

Quantitative Analysis of Coal Logging Data (석탄층 검층자료의 정량적 해석법 연구)

  • Kwon, Byung Doo;Son, Se Jo;Son, Jeong Woo
    • Economic and Environmental Geology
    • /
    • v.21 no.1
    • /
    • pp.85-96
    • /
    • 1988
  • Geophysical well logging at various coal fields were carried out to study the characteristic response of domestic coal seams. Also a computer program is developed for quantitative analysis of coal logging data. Most coal seams penetrated by the drill holes, where the well logging were carried out, showed poor thickness and quality, and were severely altered. Therefore, majority of log data are inadequate for detailed quantitative analysis. The logs show, however, typical characteristics with related to coal seams, but interpretation should be made with caution because certain log response of demestic coals, mostly anthracite, are quite different to those of foreign coals, mostly bituminous. The developed comuter program has been proved as an effective one for identification of coal seams and lithology anslysis, and is expected to be succesfully used for coal quality analysis in cases of more diversified log data of good quality being obtained.

  • PDF

User Information Needs Analysis based on Query Log Big Data of the National Archives of Korea (국가기록원 질의로그 빅데이터 기반 이용자 정보요구 유형 분석)

  • Baek, Ji-yeon;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.183-205
    • /
    • 2019
  • Among the various methods for identifying users's information needs, Log analysis methods can realistically reflect the users' actual search behavior and analyze the overall usage of most users. Based on the large quantity of query log big data obtained through the portal service of the National Archives of Korea, this study conducted an analysis by the information type and search result type in order to identify the users' information needs. The Query log used in analysis were based on 1,571,547 query data collected over a total of 141 months from 2007 to December 2018, when the National Archives of Korea provided search services via the web. Furthermore, based on the analysis results, improvement methods were proposed to improve user search satisfaction. The results of this study could actually be used to improve and upgrade the National Archives of Korea search service.

Windows based PC Log Collection System using Open Source (오픈소스를 이용한 윈도우 기반 PC 로그 수집 시스템)

  • Song, Jungho;Kim, Hakmin;Yoon, Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.332-337
    • /
    • 2016
  • System administrator or security managers need to collect logs of computing device (desktop or server), which are used for the purpose of cause-analysis of security incident and discover if damage to system was either caused by hacking or computer virus. Furthermore, appropriate log maintenance helps preventing security breech incidents through identification of vulnerability. In addition, it can be utilized for prevention of data leakage through the insider. In the paper, we present log collection system developed using open source supported by commands and basic methods of Windows. Furthermore, we aim to collect log information to enable search and analysis from diverse perspectives and to propose a way to integrate with open source-based search engine system.

Dynamic Modeling and Sensitivity Analysis for Predicting the Pseudomonas spp. Concentration in Alaska Pollack along the Distribution Path (명태 유통 중 Pseudomonas spp. 농도의 예측 모델링과 민감도 분석)

  • Shim, Soo-Dong;Sung, Jae-Ung;Lee, Jung-Young;Lee, Da-Sun;Kim, Seon-Bong;Hong, Kwang-Won;Lee, Yang-Bong;Lee, Seung-Ju
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.43 no.3
    • /
    • pp.205-210
    • /
    • 2010
  • Dynamic modeling was used to predict the Pseudomonas spp. concentration in Alaska pollack under dynamic temperature conditions in a programmable incubator using Euler's method. The model evaluation showed good agreement between the predicted and measured concentrations of Pseudomonas spp. In the simulation, three kinds of distribution path were assumed: consumers buying from a distribution center (A), manufacturer (B), or direct market (C). Each of these distribution paths consists of six phases: shipping, warehousing/shipment, warehousing/storing, processing, market exhibition, and sale/consumption. Sensitivity analysis of each phase was also implemented. The Pseudomonas concentrations and sensitivities ($S_k$) at the terminal phases of the three paths were estimated to be (A) 11.174 log CFU/g and 10.550 log $S_k$, (B) 10.948 log CFU/g and 10.738 log $S_k$, and (C) 8.758 log CFU/g and 9.602 log $S_k$, respectively. The sensitivities indicated that path A has the highest risk of failure in managing the relevant phases.

Wilson-Bappu Effect: Extended to Surface Gravity

  • Park, Sunkyung;Kang, Wonseok;Lee, Jeong-Eun;Lee, Sang-Gak
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.1
    • /
    • pp.59.2-59.2
    • /
    • 2013
  • Wilson and Bappu found a tight correlation between the stellar absolute visual magnitude (MV) and the width of the Ca II K emission line for late-type stars in 1957. Here, we revisit the Wilson-Bappu relationship (hereafter, WBR) to claim that WBR can be an excellent indicator of stellar surface gravity of late-type stars as well as a distance indicator. We have measured the width (W) of the Ca II K emission line in high resolution spectra of 125 late-type stars, which were obtained with Bohyunsan Optical Echelle Spectrograph (BOES) and adopted from the UVES archive. Based on our measurement of the emission line width (W), we have obtained a WBR of $M_V=33.76-18.00{\log}W$. In order to extend the WBR to be a surface gravity indicator, the stellar atmospheric parameters such as effective temperature ($T_{eff}$), surface gravity (logg), metallicity ([Fe/H]), and micro-turbulence (${\xi}_{tur}$) have been derived from the self-consistent detailed analysis using the Kurucz stellar atmospheric model and the abundance analysis code, MOOG. Using these stellar parameters and logW, we found that ${\log}g=-5.85\;{\log}W+9.97\;{\log}T_{eff}-23.48$ for late-type stars.

  • PDF