• Title/Summary/Keyword: network log analysis

Search Result 129, Processing Time 0.024 seconds

An Artificial Neural Network Based Phrase Network Construction Method for Structuring Facility Error Types (설비 오류 유형 구조화를 위한 인공신경망 기반 구절 네트워크 구축 방법)

  • Roh, Younghoon;Choi, Eunyoung;Choi, Yerim
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.21-29
    • /
    • 2018
  • In the era of the 4-th industrial revolution, the concept of smart factory is emerging. There are efforts to predict the occurrences of facility errors which have negative effects on the utilization and productivity by using data analysis. Data composed of the situation of a facility error and the type of the error, called the facility error log, is required for the prediction. However, in many manufacturing companies, the types of facility error are not precisely defined and categorized. The worker who operates the facilities writes the type of facility error in the form with unstructured text based on his or her empirical judgement. That makes it impossible to analyze data. Therefore, this paper proposes a framework for constructing a phrase network to support the identification and classification of facility error types by using facility error logs written by operators. Specifically, phrase indicating the types are extracted from text data by using dictionary which classifies terms by their usage. Then, a phrase network is constructed by calculating the similarity between the extracted phrase. The performance of the proposed method was evaluated by using real-world facility error logs. It is expected that the proposed method will contribute to the accurate identification of error types and to the prediction of facility errors.

Context Extraction and Analysis of Video Life Log Using Bayesian Network (베이지안 네트워크를 이용한 동영상 기반 라이프 로그의 분석 및 의미정보 추출)

  • Jung, Tae-Min;Cho, Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.414-418
    • /
    • 2010
  • 최근 라이프 로그의 수집과 관리에 관련된 연구가 많이 진행 중에 있다. 또 핸드폰 카메라, 디지털 카메라, 캠코더 등의 발전으로 자신의 일상생활을 비디오로 저장하고, 인터넷을 통해 공유하는 사람도 증가하고 있다. 비디오 데이터는 많은 정보를 포함하고 있는 라이프 로그의 한 예로. 동영상의 촬영 및 수집이 활발해짐에 따라 동영상의 메타정보를 생성하고, 이를 이용해 동영상 검색과 관리에 이용하려는 연구들이 진행 중이다. 본 논문에서는 라이프 로그를 수집하고 수집된 동영상과 라이프 로그를 이용하여 의미정보를 추출하는 시스템을 제안한다. 의미정보란 사용자의 행동을 나타내는 정보로써 컴퓨터 사용, 식사, 집안일, 이동, 외출, 독서, 휴식, 일, 기타로 9가지의 의미정보를 추출한다. 제안하는 방법은 사용자로부터 GPS, 가속도센서, 캠코더를 이용해 실제 데이터를 수집하고, 전처리 과정을 통하여 특징을 추출한다. 이때 추출될 특징은 위치정보와 사용자의 상태정보 그리고 영상처리릍 통한 RGB와 HSL 색공간의 요소와 MPEG-7의 EHD(Edge Histogram Descriptor). CLD(Color Layout Descriptor)이다. 추출된 특징으로부터 사람 행동과 같은 불안정한 상황에서 강점을 보이는 확률모델 네트워크인 베이지안 네트워크를 이용하여 의미정보를 추출한다. 제안하는 방법의 유용성을 보이기 위해 실제 데이터를 수집하고 추론하고 10-Fold Cross-validation을 이용하여 데이터를 검증한다.

  • PDF

Well Log Analysis using Intelligent Reservoir Characterization (지능형 저류층 특성화 기법을 이용한 물리검층 자료 해석)

  • Lim Song-Se
    • Geophysics and Geophysical Exploration
    • /
    • v.7 no.2
    • /
    • pp.109-116
    • /
    • 2004
  • Petroleum reservoir characterization is a process for quantitatively describing various reservoir properties in spatial variability using all the available field data. Porosity and permeability are the two fundamental reservoir properties which relate to the amount of fluid contained in a reservoir and its ability to flow. These properties have a significant impact on petroleum fields operations and reservoir management. In un-cored intervals and well of heterogeneous formation, porosity and permeability estimation from conventional well logs has a difficult and complex problem to solve by conventional statistical methods. This paper suggests an intelligent technique using fuzzy logic and neural network to determine reservoir properties from well logs. Fuzzy curve analysis based on fuzzy logics is used for selecting the best related well logs with core porosity and permeability data. Neural network is used as a nonlinear regression method to develop transformation between the selected well logs and core analysis data. The intelligent technique is demonstrated with an application to the well data in offshore Korea. The results show that this technique can make more accurate and reliable properties estimation compared with previously used methods. The intelligent technique can be utilized a powerful tool for reservoir characterization from well logs in oil and natural gas development projects.

An Study of Operational Strategy for Special Libraries on Social Network Service (SNS) (전문도서관의 소셜네트워크서비스 운영방안 연구 - 해양과학도서관 사례를 중심으로 -)

  • Han, Jong Yup;Lee, Seungmin;Seo, Man Deok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.3
    • /
    • pp.335-351
    • /
    • 2014
  • This study proposes a customized SNS operational strategy for special libraries based on a case study on the Ocean Science Library (OSL) of South Korea. The study conducted an in-depth analysis on an organizational structure, manpower, contents, and promotion. The outcome of SNS operational strategy deducted from this study can be categorized into several items, including: (1) a selection of an appropriate SNS channel, which meets the objective of the operation; (2) a formal division of works for SNS operation; (3) a designation of full-time managers and an establishment of a task force team; (4) a specialization of contents according to specific subjects; (5) on/off-line promotions focused on events, which encourage participations; (6) an improvement of contents through regular log analyses; and (7) a promotion of library website access through SNS, and so on. This research also suggested the strategies for the development of SNS operation: strengthening of communication and cooperation among librarians; distribution of academic and research outcomes of the umbrella organization; enhancement of a role as a communication channel between librarians and users, and carry out a role as a 'social curator.'

Selective Inference in Modular Bayesian Networks for Lightweight Context Inference in Cell Phones (휴대폰에서의 경량 상황추론을 위한 모듈형 베이지안 네트워크의 선택적 추론)

  • Lee, Seung-Hyun;Lim, Sung-Soo;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.736-744
    • /
    • 2010
  • Log data collected from mobile devices contain diverse and meaningful personal information. However, it is not easy to implement a context-aware mobile agent using this personal information due to the inherent limitation in mobile platform such as memory capacity, computation power and its difficulty of analysis of the data. We propose a method of selective inference for modular Bayesian Network for context-aware mobile agent with effectiveness and reliability. Each BN module performs inference only when it can change the result by comparing to the history module which contains evidences and posterior probability, and gets results effectively using a method of influence score of the modules. We adopt memory decay theory and virtual linking method for the evaluation of the reliability and conservation of casual relationship between BN modules, respectively. Finally, we confirm the usefulness of the proposed method by several experiments on mobile phones.

Research on Design of DDS-based Conventional Railway Signal Data Specification for Real-time Railway Safety Monitoring and Control (실시간 철도 안전관제를 위한 DDS 기반의 일반철도 신호 데이터 규격 설계 연구)

  • Park, Yunjung;Lim, Damsub;Min, Dugki;Kim, Sang Ahm
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.739-746
    • /
    • 2016
  • The real-time railway safety monitoring and control system is for prevention of safety accidents, and this system adopts DDS (Data Distribution Service) standard based data transmission method to support integrated management of data from existing on-site safety detection devices. In this paper, we introduce the design of DDS-based data specification from on-site signal equipment on the conventional railway. For this, we (1) design UML data model of KRS SG 0062 standard which defines existing data specification, (2) define DDS Topics for DDS transmission and map KRS model to DDS Topic model, (3) suggest data transformation rules and (4) design network control QoS polices. In addition, we analysis actual on-site log data and validate our data specification design. DDS-based data transmission enables data compatibility among on-site devices and the real-time railway safety monitoring and control system, and allows efficient network management for a large amount of data transfer.

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.

Prognostic biomarkers and molecular pathways mediating Helicobacter pylori-induced gastric cancer: a network-biology approach

  • Farideh Kamarehei;Massoud Saidijam;Amir Taherkhani
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.8.1-8.19
    • /
    • 2023
  • Cancer of the stomach is the second most frequent cancer-related death worldwide. The survival rate of patients with gastric cancer (GC) remains fragile. There is a requirement to discover biomarkers for prognosis approaches. Helicobacter pylori in the stomach is closely associated with the progression of GC. We identified the genes associated with poor/favorable prognosis in H. pylori-induced GC. Multivariate statistical analysis was applied on the Gene Expression Omnibus (GEO) dataset GSE54397 to identify differentially expressed miRNAs (DEMs) in gastric tissues with H. pylori-induced cancer compared with the H. pylori-positive with non-cancerous tissue. A protein interaction map (PIM) was built and subjected to DEMs targets. The enriched pathways and biological processes within the PIM were identified based on substantial clusters. Thereafter, the most critical genes in the PIM were illustrated, and their prognostic impact in GC was investigated. Considering p-value less than 0.01 and |Log2 fold change| as >1, five microRNAs demonstrated significant changes among the two groups. Gene functional analysis revealed that the ubiquitination system, neddylation pathway, and ciliary process are primarily involved in H. pylori-induced GC. Survival analysis illustrated that the overexpression of DOCK4, GNAS, CTGF, TGF-b1, ESR1, SELE, TIMP3, SMARCE1, and TXNIP was associated with poor prognosis, while increased MRPS5 expression was related to a favorable prognosis in GC patients. DOCK4, GNAS, CTGF, TGF-b1, ESR1, SELE, TIMP3, SMARCE1, TXNIP, and MRPS5 may be considered prognostic biomarkers for H. pylori-induced GC. However, experimental validation is necessary in the future.

Customer Intangible Value in a Social Network (사회적 네트워크에서의 고객무형가치에 대한 연구)

  • Han, Sangman;Lee, Jieun
    • Asia Marketing Journal
    • /
    • v.10 no.4
    • /
    • pp.99-121
    • /
    • 2009
  • Social networks can be a powerful force in marketing because they provide new ways to market to young generation. Though many studies on evaluation of customer lifetime value have been conducted, it is not clear how to assess the value of members within social networks. The purpose of this study is to evaluate members based on customer intangible value as well as customer lifetime value. Customer network value in terms of the power and influence within a network is analyzed through network structure analysis. Using Cyworld log file data, this study have shown that high percentage of members are very influential in terms of spreading or withholding information even though their CLV is low. It is expected that the findings of this research contribute to understand the interactive behaviors of members within networks and to provide valuable implications on new product launching and customer management strategies to marketers.

  • PDF

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1129-1135
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on december in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attacks(Advanced Persistent Threat Attacks) thus far. We will use big data analytics to analyze whether or not APT attacks has occurred. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean Defense System. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attacks. Lastly, we will present an effective response method to address a detected APT attacks.