• Title/Summary/Keyword: Log analysis

Search Result 2,168, Processing Time 0.039 seconds

Outlying Cell Identification Method Using Interaction Estimates of Log-linear Models

  • Hong, Chong Sun;Jung, Min Jung
    • Communications for Statistical Applications and Methods
    • /
    • v.10 no.2
    • /
    • pp.291-303
    • /
    • 2003
  • This work is proposed an alternative identification method of outlying cell which is one of important issues in categorical data analysis. One finds that there is a strong relationship between the location of an outlying cell and the corresponding parameter estimates of the well-fitted log-linear model. Among parameters of log-linear model, an outlying cell is affected by interaction terms rather than main effect terms. Hence one could identify an outlying cell by investigating of parameter estimates in an appropriate log-linear model.

A Study on the Endpoint Detection Algorithm (끝점 검출 알고리즘에 관한 연구)

  • 양진우
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1984.12a
    • /
    • pp.66-69
    • /
    • 1984
  • This paper is a study on the Endpoint Detection for Korean Speech Recognition. In speech signal process, analysis parameter was classification from Zero Crossing Rate(Z.C.R), Log Energy(L.E), Energy in the predictive error(Ep) and fundamental Korean Speech digits, /영/-/구/ are selected as date for the Recognition of Speech. The main goal of this paper is to develop techniques and system for Speech input ot machine. In order to detect the Endpoint, this paper makes choice of Log Energy(L.E) from various parameters analysis, and the Log Energy is very effective parameter in classifying speech and nonspeech segments. The error rate of 1.43% result from the analysis.

  • PDF

Web Log Analysis System Using SAS/AF

  • Koh, Bong-Sung;Lee, Gu-Eun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.2
    • /
    • pp.317-329
    • /
    • 2004
  • The Web log has caught much attraction for tracing of customer activity. So many researches have been carried on it. As a result, Web log analysis solutions has been developed and launched lately. It has been in the spotlight to the website administrators and people in practical marketing business. In this paper, we made an analysis on the various behavior patterns of customers in cooperation with SAS/AF and SCL modules, based on development of GUI from SAS package for disposal of statistical data.

  • PDF

Investigating Web Search Behavior via Query Log Analysis (로그분석을 통한 이용자의 웹 문서 검색 행태에 관한 연구)

  • 박소연;이준호
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.3
    • /
    • pp.111-122
    • /
    • 2002
  • In order to investigate information seeking behavior of web search users, this study analyzes transaction logs posed by users of NAVER, a major Korean Internet search service. We present a session definition method for Web transaction log analysis, a way of cleaning original logs and a query classification method. We also propose a query term definition method that is necessary for Korean Web transaction log analysis. It is expected that this study could contribute to the development and implementation of more effective Web search systems and services.

Capacity Analysis of Internet Servers Based on Log-Data Analysis (로그자료 분석을 통한 인터넷 서버의 용량 분석)

  • 김수진;윤복식;이용주;강금석
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.29-38
    • /
    • 2002
  • Due to the rapid increase In the Internet traffic volume, ISPs are faced with the definite need of the expansion of server capacity. In order to Provide prompt services for customers and still prevent excessive facility cost, it is critical to determine the optimum level of internet server capacity. The purpose of this Paper is to provide a simple but effective strategy on the expansion of servers capacity according to the increase in internet traffic. We model an internet server as an M/G/m/m queueing system and derive an efficient method to compute the loss probability which, In turn, Is used as a basis to determine proper server capacity. The Process of estimating the traffic parameter values at each server based on log data analysis is also given. All the procedures are numerically demonstrated through the process of analyzing actual log data collected from a game company.

A Comparative Study of Software Reliability Model Considering Log Type Mean Value Function (로그형 평균값함수를 고려한 소프트웨어 신뢰성모형에 대한 비교연구)

  • Shin, Hyun Cheul;Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.19-27
    • /
    • 2014
  • Software reliability in the software development process is an important issue. Software process improvement helps in finishing with reliable software product. Infinite failure NHPP software reliability models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this paper, proposes the reliability model with log type mean value function (Musa-Okumoto and log power model), which made out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on mean square error (MSE) and coefficient of determination($R^2$), for the sake of efficient model, was employed. Analysis of failure using real data set for the sake of proposing log type mean value function was employed. This analysis of failure data compared with log type mean value function. In order to insurance for the reliability of data, Laplace trend test was employed. In this study, the log type model is also efficient in terms of reliability because it (the coefficient of determination is 70% or more) in the field of the conventional model can be used as an alternative could be confirmed. From this paper, software developers have to consider the growth model by prior knowledge of the software to identify failure modes which can be able to help.

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

A Study on the Intrusion Detection Method using Firewall Log (방화벽 로그를 이용한 침입탐지기법 연구)

  • Yoon, Sung-Jong;Kim, Jeong-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF

Storage Stability of Raw Beef, Dry-Aging Beef, and Wet-Aging Beef at Refrigeration Temperature (냉장 온도에서 생육, 습식숙성육, 건식숙성육의 저장 안전성)

  • An, Seol Bin;Hwang, Sun Hye;Cho, Yong Sun
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.2
    • /
    • pp.170-176
    • /
    • 2020
  • We investigated the pH, volatile basic nitrogen (VBN), microbial changes and dominant microbes in raw beef, wet-aging beef, and dry-aging beef after the meat had been stored in a refrigerator. The count of mesophilic bacteria was 3.3-3.9 log CFU/g in raw beef and dry-aging beef, and 5.4 log CFU/g in wet-aging meat. After 18 days of refrigeration, the mesophilic bacterial count in raw and aging beef increased to 6.1-6.4 log CFU/g. In wet-aging beef, the number of lactic acid bacteria increased from 4.5 log CFU/g to 6.0 log CFU/g at refrigeration temperature. However, lactic acid bacteria were not detected in dry aging beef. Major foodborne pathogens such as Salmonella spp, Listeria monocytogenes, and Escherichia coli (EHEC) were not detected. Based on the legal standard for mesophilic bacteria count, the estimated shelf-life of aged beef was less than 12 days and the average VBN was 15 mg%. The dominant microorganisms varied between the different types of meat. In raw meat, Staphylococcus saprophyticus was the dominant microorganism, and as the VBN increased, Carnobacterium divergens dominated. In wet-aging beef, Carnobacterium divergens dominated during the initial days of refrigeration after which the number of Lactobacillus sakei increased. Dermacoccus nishinomiyaensis was initially the dominant microbe in dry-aging beef, after which Pseudomonas fragi dominated. In addition to the role of specific bacteria in the early stage of decay, it is thought that microorganisms can be utilized for safe distribution and storage of matured meats by conducting research on changes in rot, fragrance analysis, and changes of ingredients in matured meats.

Meta-Analysis of Limited Thymectomy versus Total Thymectomy for Masaoka Stage I and II Thymoma

  • Pulle, Mohan Venkatesh;Asaf, Belal Bin;Puri, Harsh Vardhan;Bishnoi, Sukhram;Kumar, Arvind
    • Journal of Chest Surgery
    • /
    • v.54 no.2
    • /
    • pp.127-136
    • /
    • 2021
  • Background: This meta-analysis aimed to evaluate the incidence of tumor recurrence, postoperative myasthenia gravis, postoperative complications, and overall survival after limited versus total thymectomy for Masaoka stage I and II thymoma. Methods: A systematic search of the literature was conducted using the PubMed, Embase, MEDLINE, and Cochrane databases to identify relevant studies that compared limited and total thymectomy in Masaoka stage I-II patients. The quality of the included observational studies was assessed using the Newcastle-Ottawa Scale. The results of the meta-analysis were expressed as log-transformed odds ratios (log ORs), with 95% confidence intervals (CIs). Results: Seven observational studies with a total of 2,310 patients were included in the meta-analysis. There was an overall non-significant difference in favor of total thymectomy in terms of tumor recurrence (pooled log OR, 0.40; 95% CI, -0.07 to 0.87; p=0.10; I2=0%) and postoperative myasthenia gravis (pooled log OR, 0.12; 95% CI, -1.08 to 1.32; p=0.85; I2=22.6%). However, an overall non-significant difference was found in favor of limited thymectomy with respect to postoperative complications (pooled log OR, -0.21; 95% CI, -1.08 to 0.66; p=0.64; I2=36.1%) and overall survival (pooled log OR, -0.01; 95% CI, -0.68 to 0.66; p=0.98; I2=47.8%). Conclusion: Based on the results of this systematic review and meta-analysis, limited thymectomy as a treatment for stage I and II thymoma shows similar oncologic outcomes to total thymectomy.