• 제목/요약/키워드: Log analysis

검색결과 2,179건 처리시간 0.027초

Outlying Cell Identification Method Using Interaction Estimates of Log-linear Models

  • Hong, Chong Sun;Jung, Min Jung
    • Communications for Statistical Applications and Methods
    • /
    • 제10권2호
    • /
    • pp.291-303
    • /
    • 2003
  • This work is proposed an alternative identification method of outlying cell which is one of important issues in categorical data analysis. One finds that there is a strong relationship between the location of an outlying cell and the corresponding parameter estimates of the well-fitted log-linear model. Among parameters of log-linear model, an outlying cell is affected by interaction terms rather than main effect terms. Hence one could identify an outlying cell by investigating of parameter estimates in an appropriate log-linear model.

끝점 검출 알고리즘에 관한 연구 (A Study on the Endpoint Detection Algorithm)

  • 양진우
    • 한국음향학회:학술대회논문집
    • /
    • 한국음향학회 1984년도 추계학술발표회 논문집
    • /
    • pp.66-69
    • /
    • 1984
  • This paper is a study on the Endpoint Detection for Korean Speech Recognition. In speech signal process, analysis parameter was classification from Zero Crossing Rate(Z.C.R), Log Energy(L.E), Energy in the predictive error(Ep) and fundamental Korean Speech digits, /영/-/구/ are selected as date for the Recognition of Speech. The main goal of this paper is to develop techniques and system for Speech input ot machine. In order to detect the Endpoint, this paper makes choice of Log Energy(L.E) from various parameters analysis, and the Log Energy is very effective parameter in classifying speech and nonspeech segments. The error rate of 1.43% result from the analysis.

  • PDF

Web Log Analysis System Using SAS/AF

  • Koh, Bong-Sung;Lee, Gu-Eun
    • Journal of the Korean Data and Information Science Society
    • /
    • 제15권2호
    • /
    • pp.317-329
    • /
    • 2004
  • The Web log has caught much attraction for tracing of customer activity. So many researches have been carried on it. As a result, Web log analysis solutions has been developed and launched lately. It has been in the spotlight to the website administrators and people in practical marketing business. In this paper, we made an analysis on the various behavior patterns of customers in cooperation with SAS/AF and SCL modules, based on development of GUI from SAS package for disposal of statistical data.

  • PDF

로그분석을 통한 이용자의 웹 문서 검색 행태에 관한 연구 (Investigating Web Search Behavior via Query Log Analysis)

  • 박소연;이준호
    • 정보관리학회지
    • /
    • 제19권3호
    • /
    • pp.111-122
    • /
    • 2002
  • 본 연구에서는 웹 검색 이용자들의 전반적인 검색 행태를 이해하기 위하여 국내에서 널리 사용되고 있는 웹 검색 서비스 네이버에서 생성된 검색 트랜잭션 로그를 분석하였다. 본 연구에서는 웹 검색 트랜잭션 로그 분석에 필요한 세션 정의 방법을 설명하고 로그 정제 및 질의 유형 분류방법을 제시하였으며, 한글 검색 트랜잭션 로그 분석에 필수절인 검색어 정의 방법을 제안하였다. 본 연구의 결과는 보다 효과적인 국내 웹 검색 시스템 개발과 서비스 구축에 기여할 것으로 기대된다.

로그자료 분석을 통한 인터넷 서버의 용량 분석 (Capacity Analysis of Internet Servers Based on Log-Data Analysis)

  • 김수진;윤복식;이용주;강금석
    • 경영과학
    • /
    • 제19권1호
    • /
    • pp.29-38
    • /
    • 2002
  • Due to the rapid increase In the Internet traffic volume, ISPs are faced with the definite need of the expansion of server capacity. In order to Provide prompt services for customers and still prevent excessive facility cost, it is critical to determine the optimum level of internet server capacity. The purpose of this Paper is to provide a simple but effective strategy on the expansion of servers capacity according to the increase in internet traffic. We model an internet server as an M/G/m/m queueing system and derive an efficient method to compute the loss probability which, In turn, Is used as a basis to determine proper server capacity. The Process of estimating the traffic parameter values at each server based on log data analysis is also given. All the procedures are numerically demonstrated through the process of analyzing actual log data collected from a game company.

로그형 평균값함수를 고려한 소프트웨어 신뢰성모형에 대한 비교연구 (A Comparative Study of Software Reliability Model Considering Log Type Mean Value Function)

  • 신현철;김희철
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.19-27
    • /
    • 2014
  • Software reliability in the software development process is an important issue. Software process improvement helps in finishing with reliable software product. Infinite failure NHPP software reliability models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this paper, proposes the reliability model with log type mean value function (Musa-Okumoto and log power model), which made out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on mean square error (MSE) and coefficient of determination($R^2$), for the sake of efficient model, was employed. Analysis of failure using real data set for the sake of proposing log type mean value function was employed. This analysis of failure data compared with log type mean value function. In order to insurance for the reliability of data, Laplace trend test was employed. In this study, the log type model is also efficient in terms of reliability because it (the coefficient of determination is 70% or more) in the field of the conventional model can be used as an alternative could be confirmed. From this paper, software developers have to consider the growth model by prior knowledge of the software to identify failure modes which can be able to help.

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 추계학술발표대회
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

방화벽 로그를 이용한 침입탐지기법 연구 (A Study on the Intrusion Detection Method using Firewall Log)

  • 윤성종;김정호
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF

냉장 온도에서 생육, 습식숙성육, 건식숙성육의 저장 안전성 (Storage Stability of Raw Beef, Dry-Aging Beef, and Wet-Aging Beef at Refrigeration Temperature)

  • 안설빈;황선혜;조용선
    • 한국식품위생안전성학회지
    • /
    • 제35권2호
    • /
    • pp.170-176
    • /
    • 2020
  • 생육, 습식 숙성육, 건식 숙성육을 종류별 3종을 구입하여 냉장 상태로 보관하면서 pH, 휘발성 염기질소(VBN), 미생물 정량, 우점균을 분석하였다. 초기 생육, 건식 숙성육의 중온균은 3.3-3.9 Log CFU/g, 습식 숙성육은 경우 5.4 Log CFU/g 이였으나, 냉장으로 18일 보관 후 생육과 건식 숙성육에 존재하는 중온균은 6.1-6.4 Log CFU/g로 증가하였다. 습식 숙성육의 경우 Lactic acid bacteria (LAB)는 냉장 보관시 4.5-6.0 Log CFU/g으로 나타났으나, 건식숙성육에서는 검출되지 않았다. 저장 기간이 길어짐에 따라 중온균, 저온균, LAB, 효모 및 곰팡이 수가 증가하였으나, 식품매개 병원성 미생물은 검출되지 않았다. 식육의 오염 및 부패 판단은 7 Log CFU/g 이상으로 규정하고 있어 본 연구 결과에 의하면 12일 이상 냉장 보관하였을 경우 6-7 Log CFU/g으로 기준을 초과하였다. 이 때 VBN이 평균 15 mg%으로 부패의 초기 단계로 판단 할 수 있었다. 냉장 보관에 따른 우점 미생물은 다양한 양상으로 나타냈다. 생육에서는 초기 우점균으로 S. saprophyticus가 분석되었으나, VBN이 증가함에 따라 Carnobacterium divergens가 우점하는 양상을 나타냈다. 습식 숙성육에서 Carnobacterium divergens가 냉장보관 초기에 우점 미생물로 분석되었으나, 이후 Lactobacillus sakei가 우점균으로 분석되었다. 건식 숙성육의 경우 Dermacoccus nishinomiyaensis가 냉장보관 초기에 우점하였으나 이후 Pseudomonas fragi가 우점균으로 변화하였다. 부패의 초기 단계에서 특정 박테리아의 역할 외에도 부패, 향기 분석 및 숙성 육류의 성분 변화에 대한 연구를 수행하여 숙성 육류의 안전한 유통 및 보관에 활용할 수 있다고 판단된다.

Meta-Analysis of Limited Thymectomy versus Total Thymectomy for Masaoka Stage I and II Thymoma

  • Pulle, Mohan Venkatesh;Asaf, Belal Bin;Puri, Harsh Vardhan;Bishnoi, Sukhram;Kumar, Arvind
    • Journal of Chest Surgery
    • /
    • 제54권2호
    • /
    • pp.127-136
    • /
    • 2021
  • Background: This meta-analysis aimed to evaluate the incidence of tumor recurrence, postoperative myasthenia gravis, postoperative complications, and overall survival after limited versus total thymectomy for Masaoka stage I and II thymoma. Methods: A systematic search of the literature was conducted using the PubMed, Embase, MEDLINE, and Cochrane databases to identify relevant studies that compared limited and total thymectomy in Masaoka stage I-II patients. The quality of the included observational studies was assessed using the Newcastle-Ottawa Scale. The results of the meta-analysis were expressed as log-transformed odds ratios (log ORs), with 95% confidence intervals (CIs). Results: Seven observational studies with a total of 2,310 patients were included in the meta-analysis. There was an overall non-significant difference in favor of total thymectomy in terms of tumor recurrence (pooled log OR, 0.40; 95% CI, -0.07 to 0.87; p=0.10; I2=0%) and postoperative myasthenia gravis (pooled log OR, 0.12; 95% CI, -1.08 to 1.32; p=0.85; I2=22.6%). However, an overall non-significant difference was found in favor of limited thymectomy with respect to postoperative complications (pooled log OR, -0.21; 95% CI, -1.08 to 0.66; p=0.64; I2=36.1%) and overall survival (pooled log OR, -0.01; 95% CI, -0.68 to 0.66; p=0.98; I2=47.8%). Conclusion: Based on the results of this systematic review and meta-analysis, limited thymectomy as a treatment for stage I and II thymoma shows similar oncologic outcomes to total thymectomy.