• 제목/요약/키워드: application log

검색결과 438건 처리시간 0.026초

A Log Management Service Model based on AOP for Efficient Development of Android Applications

  • Choi, Yun-seok
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권3호
    • /
    • pp.39-45
    • /
    • 2016
  • In this paper, we propose a log management service model for efficient developments of android applications. The proposed model consists of two major parts which are the log collector and the log manager service. The log collector can capture the log information of a target application without modifications, because the collector is composed by aspect-oriented programming. The collected logs are transformed to chunk of data, and the chunk of data is sent to the log management service. The log management service is an android service component and an independent application in another process. So, the log management service can reduce the workload of logging in the target application. Through a case study, we show that the proposed log management service model can reduce the log processing time compared to other models without modifications of a target application.

분산 환경에서 SysLog기반의 방화벽 통합로그관리시스템 개발 (Development of the SysLog-based Integrated Log Management system for Firewalls in Distributed Network Environments)

  • 이동영;서희석;이을석
    • 디지털산업정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.39-45
    • /
    • 2011
  • Application log files contain error messages; operational data and usage information that can help manage applications and servers. Log analysis system is software that read and parse log files, extract and aggregate information in order to generate reports on the application. In currently, the importance of log files of firewalls is growing bigger and bigger for the forensics of cyber crimes and the establishment of security policy. In this paper, we designed and implemented the SILAS(SysLog-based Integrated Log mAanagement System) in distribute network environments. It help to generate reports on the the log fires of firewalls - IP and users, and statistics of application usage.

A Real-time Remote Logging Model for Development of Location-Based Mobile Applications

  • Choi, Yun-seok
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권10호
    • /
    • pp.69-76
    • /
    • 2016
  • In this paper, we propose a real-time remote logging model for development of android applications using LBS(Location based Service). The model has two major parts: Mobile Log Management Service and Remote Log Server. Mobile Log Management Service consists of the log collector and the remote log manager. The log collector is an aspect of AOP which can collect logs from the target application without modifications of source codes. The remote log manager has a background service component so that it can receive logs whenever the log collector captures logs from the target application. Remote Log Server communicates with Mobile Log Management Service by socket interface. Therefore, Remote Log Server can show logs in real-time. To validate the efficiency of the proposed model, we show a case study, and compare the model with other models.

플라즈마 공정에 대한 소독 모델 적용 (Application of Disinfection Models on the Plasma Process)

  • 백상은;김동석;박영식
    • 한국환경과학회지
    • /
    • 제21권6호
    • /
    • pp.695-704
    • /
    • 2012
  • The application of disinfection models on the plasma process was investigated. Nine empirical models were used to find an optimum model. The variation of parameters in model according to the operating conditions (first voltage, second voltage, air flow rate, pH) were investigated in order to explain the disinfection model. In this experiment, the DBD (dielectric barrier discharge) plasma reactor was used to inactivate Ralstonia Solanacearum which cause wilt in tomato plantation. Optimum disinfection models were chosen among the nine models by the application of statistical SSE (sum of squared error), RMSE (root mean sum of squared error), $r^2$ values on the experimental data using the GInaFiT software in Microsoft Excel. The optimum model was shown as Weibull+talil model followed by Log-linear+ Shoulder+Tail model. Two models were applied to the experimental data according to the variation of the operating conditions. In Weibull+talil model, Log10($N_o$), Log10($N_{res}$), ${\delta}$ and p values were examined. And in Log-linear+Shoulder+Tail model, the Log10($N_o$), Log10($N_{res}$), $k_{max}$, Sl values were calculated and examined.

Framework for One Account Log-in From Multi Device On Mobile Application

  • Aulya, Rafinno;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.759-762
    • /
    • 2015
  • Many applications require users to log-in, some applications can allow users to use the same account is active on multiple devices at the same time. On location-based application that serves to record the movement of the position, account is active on multiple devices could not be permitted because it causes a different location data from multiple devices, so the location of the users become ambiguous. This paper describes a simple protocol to prevent users from using their accounts on multiple devices at the same time. This Protocol will turn off one account on a device when the account log-in on new devices.

Op Amp 회로를 이용한, 모듈로 $({2^n}-1)$ 병렬 승산기의 설계 및 그 기술의 응용 (Designing Modulo $({2^n}-1)$ Parallel Multipliers and its Technological Application Using Op Amp Circuits)

  • 이훈규;김철
    • 대한전자공학회논문지SD
    • /
    • 제38권6호
    • /
    • pp.436-445
    • /
    • 2001
  • 본 논문은, Op Amp 회로를 이용한, 모듈로(modulo) (2ⁿ-1) 병렬처리(parallel-processing) 잉여(residue) 승산기(multipliers)의 설계 및 이진(binary) 승산기 설계에 대한 그 기술의 응용 방법에 관한 것이다. 전산처리에 있어서 승산속도의 제약은 집적회로(VLSI) 기술의 발전에 많은 지장을 초래한다. 본 연구는, 이러한 문제를 해결키 위해 (Op Amp 회로를 이용) 모듈로 (2ⁿ-1) 상에서, 시간복잡도(time complexity)가 O( log₂( log₂( log₂ⁿ)))보다 우수한, 일종의 모듈로 병렬 승산기를 구현함과 동시에, 그 기술의 이진 승산기 설계에 대한 응용방법을 모색한다. 이러한 병렬 승산기는 기존의 병렬 승산기들에 비해 에어리어복잡도 (area complexity) 및 시간복잡도(time complexity)에 있어 매우 우수한 성질들을 갖게 되며, 같은 효율을 갖는 이진 승산기의 제작에 쉽게 응용할 수 있어 그 학술적 이용 가치가 높다.

  • PDF

Accurate and Efficient Log Template Discovery Technique

  • Tak, Byungchul
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권10호
    • /
    • pp.11-21
    • /
    • 2018
  • In this paper we propose a novel log template discovery algorithm which achieves high quality of discovered log templates through iterative log filtering technique. Log templates are the static string pattern of logs that are used to produce actual logs by inserting variable values during runtime. Identifying individual logs into their template category correctly enables us to conduct automated analysis using state-of-the-art machine learning techniques. Our technique looks at the group of logs column-wise and filters the logs that have the value of the highest proportion. We repeat this process per each column until we are left with highly homogeneous set of logs that most likely belong to the same log template category. Then, we determine which column is the static part and which is the variable part by vertically comparing all the logs in the group. This process repeats until we have discovered all the templates from given logs. Also, during this process we discover the custom patterns such as ID formats that are unique to the application. This information helps us quickly identify such strings in the logs as variable parts thereby further increasing the accuracy of the discovered log templates. Existing solutions suffer from log templates being too general or too specific because of the inability to detect custom patterns. Through extensive evaluations we have learned that our proposed method achieves 2 to 20 times better accuracy.

클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계 (Design of Secure Log System in Cloud Computing Environment)

  • 이병도;신상욱
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

플라즈마 공정을 이용한 고추역병균(Phytophthora capsici) 불활성화 모델의 적용 (Application of Inactivation Model on Phytophthora Blight Pathogen (Phytophthora capsici) using Plasma Process)

  • 김동석;박영식
    • 한국환경과학회지
    • /
    • 제24권11호
    • /
    • pp.1393-1404
    • /
    • 2015
  • Ten empirical disinfection models for the plasma process were used to find an optimum model. The variation of model parameters in each model according to the operating conditions (first voltage, second voltage, air flow rate, pH, incubation water concentration) were investigated in order to explain the disinfection model. In this experiment, the DBD (dielectric barrier discharge) plasma reactor was used to inactivate Phytophthora capsici which cause wilt in tomato plantation. Optimum disinfection models were chosen among ten models by the application of statistical SSE (sum of squared error), RMSE (root mean sum of squared error), $r^2$ values on the experimental data using the GInaFiT software in Microsoft Excel. The optimum models were shown as Log-linear+Tail model, Double Weibull model and Biphasic model. Three models were applied to the experimental data according to the variation of the operating conditions. In Log-linear+Tail model, $Log_{10}(N_o)$, $Log_{10}(N_{res})$ and $k_{max}$ values were examined. In Double Weibull model, $Log_{10}(N_o)$, $Log_{10}(N_{res})$, ${\alpha}$, ${\delta}_1$, ${\delta}_2$, p values were calculated and examined. In Biphasic model, $Log_{10}(N_o)$, f, $k_{max1}$ and $k_{max2}$ values were used. The appropriate model parameters for the calculation of optimum operating conditions were $k_{max}$, ${\alpha}$, $k_{max1}$ at each model, respectively.

A Study of Web Usage Mining for eCRM

  • Hyuncheol Kang;Jung, Byoung-Cheol
    • Communications for Statistical Applications and Methods
    • /
    • 제8권3호
    • /
    • pp.831-840
    • /
    • 2001
  • In this study, We introduce the process of web usage mining, which has lately attracted considerable attention with the fast diffusion of world wide web, and explain the web log data, which Is the main subject of web usage mining. Also, we illustrate some real examples of analysis for web log data and look into practical application of web usage mining for eCRM.

  • PDF