• Title/Summary/Keyword: log K

Search Result 4,633, Processing Time 0.027 seconds

Analysis of Microbial Contamination of Sprouts and Fresh-cut Salads in a Market (유통중인 즉석섭취 새싹채소와 샐러드의 세균오염 분석)

  • Kang, Tae-Mi;Cho, Sung-Kyung;Park, Ji-Yong;Song, Kyung-Bin;Chung, Myung-Soo;Park, Jong-Hyun
    • Korean Journal of Food Science and Technology
    • /
    • v.43 no.4
    • /
    • pp.490-494
    • /
    • 2011
  • Although bacterial outbreaks from ready-to-eat foods have increased, little information is available on microbial quality of sprouts in markets. Fifty sprouts and 30 salads were collected from wholesale markets. Total aerobic count (TAC), coliform, Escherichia coli, and some pathogens were detected. TAC for sprouts was 7.95 log CFU/g and 6.70 for salads, indicating that sprouts were more contaminated by 1 log CFU/g than that of salads. The numbers of coliform were 6.69 log CFU/g for sprouts and 5.42 for salads. E. coli was detected in 16 of 50 sprout samples at 2.38 log CFU/g and eight of 30 salads at 2.21 log CFU/g. Bacillus cereus was detected in 29 of 50 sprout samples and 16 of 30 salads, and the counts were mostly <3 log CFU/g. Salmonella, Staphylococcus aureus, Listeria monocytogenes, Campylobacter jejuni, and Clostridium perfringens were not detected. Therefore, although pathogens may not be a high risk for these foods, the high TAC and E. coli contamination require improved production and distribution methods, particularly for sprouts.

A Security Log Analysis System using Logstash based on Apache Elasticsearch (아파치 엘라스틱서치 기반 로그스태시를 이용한 보안로그 분석시스템)

  • Lee, Bong-Hwan;Yang, Dong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.382-389
    • /
    • 2018
  • Recently cyber attacks can cause serious damage on various information systems. Log data analysis would be able to resolve this problem. Security log analysis system allows to cope with security risk properly by collecting, storing, and analyzing log data information. In this paper, a security log analysis system is designed and implemented in order to analyze security log data using the Logstash in the Elasticsearch, a distributed search engine which enables to collect and process various types of log data. The Kibana, an open source data visualization plugin for Elasticsearch, is used to generate log statistics and search report, and visualize the results. The performance of Elasticsearch-based security log analysis system is compared to the existing log analysis system which uses the Flume log collector, Flume HDFS sink and HBase. The experimental results show that the proposed system tremendously reduces both database query processing time and log data analysis time compared to the existing Hadoop-based log analysis system.

Study of Korea-made drilling log form decision (한국형 시추주상도 형식 결정에 관한 연구)

  • Lee, Seung-Ho;Hwang, Young-Chul;Chun, Seong-Yul;Jeong, Ji-Su
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.1191-1198
    • /
    • 2005
  • To designer and builder because drilling log, last accomplishment of boring, is made by subsurface expbration of site person in charge base information intermediate delivered by unified style as is concise be. However, make and is using drilling log that is dissimilar in each engine without style or creation standard unified in the case of domestic. Civil engineers lose an opportunity that can get more informations thereby or problem of inappropriate design, construction often happens. In this study, analyzed drilling log style examination of inside and outside of the country and merits and demerits to solve problem of these design and construction. And study improvement item on recording contents and suggested consistent drilling log standard illustration plan.

  • PDF

Evaluation of Sanitation Management Practices and Microbiological Quality of Foods in Kindergarten Foodservice Settings (유치원 급식의 위생관리 실태조사 및 미생물적 품질평가)

  • Lee, Joo-Eun;Choi, Kyung-Sook;Kang, Young-Jae;Kwak, Tong-Kung
    • Korean journal of food and cookery science
    • /
    • v.28 no.5
    • /
    • pp.515-530
    • /
    • 2012
  • This research aims to audit foodservice sanitation management practices and to assess microbiological quality of foods and their food contact environments in kindergartens. Sanitation auditing was conducted in 10 kindergartens in Seoul, Gyeonggi, and Incheon areas to assess the levels of safety practices. Results revealed that the surveyed kindergartens scored 41.4 out of 100 points, on average. The average scores of each category were 6.4/11 (58.1%) for facilities sanitation, 4.2/12 (35.0%) for equipment sanitation, 2.4/10 (24.0%) for personal hygiene, 5.1/10 (51.0%) for food ingredients management, 6.0/17 (35.3%) for production process, 5.4/10 (54.0%) for environmental sanitation, 2.0/6 (33.3%) for kitchen utensils sanitation, and 2.2/6 (96.7%) for safety management. Microbiological quality of raw, prepared foods, personal sanitation (hands), environmental sanitation, and drinking water were assessed. Total plate counts (TPC) of the following menus exceeded the critical limit: seasoned leek (5 log CFU/g), cucumber (5.0 log CFU/g), panbroiled fish paste (TNTC at $10^4$), tangpyeongchae (5.3 log CFU/g), egg rolls (6.1 log CFU/g), panbroiled sausage (TNTC at $10^4$), and soft tofu pot stew (TNTC at $10^4$). Coliform which exceeded the standard limit were detected from seasoned leek (2 log CFU/g), cucumber (2.5 log CFU/g), panbroiled fish paste (2.0 log CFU/g), egg roll (3.8 log CFU/g), tangpyeongchae (4.0 log CFU/g), panbroiled sausage (2.3 log CFU/g), and soft tofu pot stew (3.7 log CFU/g). For seasoned foods (muchim), S. aureus ranged 2.2~2.9 log CFU/g. In food workers' hands, microbial profiles ranged 3.8~7.9 log CFU/hand for TPC, ND~4.5 log CFU/hand for coliforms, ND~4.7 log CFU/hand for S. aureus, and ND~5.3 log CFU/hand for Enterobacteriaceae. Microbiological profiles of food contact surface of knives, cutting boards, dish-clothes, and trays showed possibilities of cross-contamination. General bacteria were 2.1~4.5 logCFU/ml in 4 purified water samples and E. coli were found in the kitchen of one kindergarten. These results suggested that environmental sanitation management practices need more strict improvement: effective sanitation education methods and practices were strongly required, and more strict sanitation management for cooking utensils and equipment were required.

Bioaccumulation and Baseline Toxicity of Hydrophobic Chemicals: Molecular Size Cutoff, Kinetic Limitations, and Chemical Activity Cut-off (소수성화학물질의 생물축적과 기저독성: 분자크기, 반응속도, 화학적 활성도에 따른 제약)

  • Kwon, Jung-Hwan
    • Environmental Analysis Health and Toxicology
    • /
    • v.23 no.2
    • /
    • pp.67-77
    • /
    • 2008
  • It has been observed that the linear relationship between the logarithm of bioconcentration factor (log BCF) of highly hydrophobic chemicals and their log $K_{ow}$ breaks when log $K_{ow}$ becomes greater than 6.0. Consequently, super hydrophobic chemicals were not thought to cause baseline toxicity as a single compound. Researchers often call this phenomenon as "hydrophobicity cutoff" meaning that bioconcentration or corresponding baseline toxicity has a certain cutoff at high log $K_{ow}$ value of hydrophobic organic pollutants. The underlying assumption is that the increased molecular size with increasing hydrophobicity prohibits highly hydrophobic compounds from crossing biological membranes. However, there are debates among scientists about mechanisms and at which log $K_{ow}$ this phenomenon occurs. This paper reviews three hypotheses to explain observed "cutoff": steric effects, kinetic or physiological limitations, and chemical activity cutoff. Although the critical molecular size that makes biological membranes not permeable to hydrophobic organic chemicals is uncertain, size effects in combination with kinetic limitation would explain observed non-linearity between log BCF and log $K_{ow}$. Chemical activity of hydrophobic chemicals generally decreases with increasing melting point at their aqueous solubility. Thus, there may be a chemical activity cutoff of baseline toxicity if there is a critical chemical activity over which baseline effects can be observed.

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF

A Design of Turbo Decoder for 3GPP using Log-MAP Algorithm (Log-MAP을 사용한 3GPP용 터보 복호기의 설계)

  • Kang, Heyng-Goo;Jeon, Heung-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.533-536
    • /
    • 2005
  • MAP algorithm is known for optimal decoding algorithm of Turbo codes, but it has very large computational complexity and delay. Generally log-MAP algorithm is used in order to overcome the defect. In this paper we propose modified scheme of the state metric calculation block which can improve the computation speed in log-MAP decoder and simple linear offset unit without using LUT. The simulation results show that the operation speed of the proposed scheme is improved as compared with that of the past scheme.

  • PDF

Bioequivalence Evaluation of Two brands of Cetirizine HCl 10 mg Tablets (Zyrix and Zyrtec) in Healthy Male Volunteers

  • Im, Ho-Taek;Won, Jong-Hoen;Cho, Sung-Hee;Lee, Heon-Woo;Park, Wan-Su;Rew, Jae-Hwan;Lee, Kyung-Tae
    • Journal of Pharmaceutical Investigation
    • /
    • v.35 no.5
    • /
    • pp.355-360
    • /
    • 2005
  • The purpose of the present study was to evaluate the bioequivalence of two cetirizine HCl tablets, Zyrtec tablet (UCB Pharm. Co., Ltd. Korea, reference product) and Zyrix tablet (Kukje Pharm. Co., Ltd., Korea, test product), according to the guidelines of Korea Food and Drug Administration (KFDA). After adding an internal standard (diazepam), plasma samples were extracted using 1 mL of dichloromethane. Compounds extracted were analyzed by reverse-phase HPLC with ultra-violet detector. This method for determination cetirizine is proved accurate and reproducible with a limit of quantitation of 10 ng/mL in male plasma. Twenty-four healthy male Korean volunteers received each medicine at the cetirizine HCl dose of 10 mg in a $2{\times}2$ crossover study. There was a one-week wash out period between the doses. Plasma concentrations of cetirizine were monitored for over a period of 24 hr after the administration. AUC (the area under the plasma concentration-time curve) was calculated by the linear trapezoidal rule. $C_{max}$ (maximum plasma drug concentration) and $T_{max}$ (time to reach $C_{max}$) were compiled from the plasma concentration-time data. Analysis of variance was carried out using logarithmically transformed AUC and $C_{max}$. No significant sequence effect was found for all of the bioavailability parameters indicating that the crossover design was properly performed. The 90% confidence intervals for the log transformed data were acceptable range of log 0.8 to log 1.25 $(e.g.,\;log\;0.93-log\;1.08\;for\;AUC_{0-t},\;log\;0.91-log\;1.08\;for\;AUC_{0-{\infty}}\;and\;log\;1.01-log\;1.11\;for\;C_{max})$. The major parameters, AUC and $C_{max}$ met the criteria of KFDA for bioequivalence indicating that Zyrix tablet is bioequivalent to Zyrtec tablet.

An Efficient Log Data Processing Architecture for Internet Cloud Environments

  • Kim, Julie;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.

Messaging System Analysis for Effective Embedded Tester Log Processing (효과적인 Embedded Tester Log 처리를 위한 Messaging System 분석)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.645-648
    • /
    • 2017
  • The existing embedded tester used TCP and shared file system for log processing. In addition, the existing processing method was treated as 1-N structure. This method wastes resources of the tester for exception handling. We implemented a log processing message layer that can be distributed by messaging system. And we compare the transmission method using the message layer and the transmission method using TCP and the shared file system. As a result of comparison, transmission using the message layer showed higher transmission bandwidth than TCP. In the CPU usage, the message layer showed lower efficiency than TCP, but showed no significant difference. It can be seen that the log processing using the message layer shows higher efficiency.

  • PDF