• Title/Summary/Keyword: well log data

Search Result 247, Processing Time 0.033 seconds

Respiration rate of the Fuji apple according to the ULO storage conditions (ULO 저장에서의 사과 Fuji의 호흡속도)

  • Gang, Jun-Su;Lee, Ho-Jae;Choe, Jong-Uk
    • Food Science and Preservation
    • /
    • v.1 no.2
    • /
    • pp.87-92
    • /
    • 1994
  • For the measurement of the change of respiration rate caused by the gas content of storage atmosphere which furnishes important data for the interpretation of ULO storage, GC was used. It has been shown that the respiration rate and respiratory heat generation rate of Fuji apple is more than doubled in normal low temperature storage when compared with ULO storage, and that in ULO storage the respiration rate and respiratory heat generation rate directly proportional to the concentration of O2 in storage atmosphere as well as inversely proportional to that of CO2. It was possible to establish a functional formula for the respiratory heat generation rate of Fuji apple in all the storage conditions in terms of u=-0.7638+0.0003 O2-0.0007 log(CO2)+0.1369 log(Tb) concerning temperature and the concentration of O2 and CO2

  • PDF

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Analysis on Geo-stress and casing damage based on fluid-solid coupling for Q9G3 block in Jibei oil field

  • Ji, Youjun;Li, Xiaoyu
    • Geomechanics and Engineering
    • /
    • v.15 no.1
    • /
    • pp.677-686
    • /
    • 2018
  • Aimed at serious casing damage problem during the process of oilfield development by injecting water, based on seepage mechanics, fluid mechanics and the theory of rock mechanics, the multi-physics coupling theory was also taken into account, the mathematical model for production of petroleum with water flooding was established, and the method to solve the coupling model was presented by combination of Abaqus and Eclipse software. The Q9G3 block in Jibei oilfield was taken for instance, the well log data and geological survey data were employed to build the numerical model of Q9G3 block, the method established above was applied to simulate the evolution of seepage and stress. The production data was imported into the model to conduct the history match work of the model, and the fitting accuracy of the model was quite good. The main mechanism of casing damage of the block was analyzed, and some wells with probable casing damage problem were pointed out, the displacement of the well wall matched very well with testing data of the filed. Finally, according to the simulation results, some useful measures for preventing casing damage in Jibei oilfield was proposed.

Attribute-Rich Log-Structured Filesystem for Semantic File Search on SSD (SSD에서의 시맨틱 파일 검색을 위한 확장된 속성 제공의 로그기반 파일시스템)

  • Ki, An-Ho;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.241-252
    • /
    • 2011
  • During the last decades, other parts of operating systems, storage devices, and media are changed steadily, whereas filesystem is changed little. As data is grown bigger, the number of files to be managed also increases in geometrically. Researches about new filesystem schemes are being done widely to support these files efficiently. In web document search area, there are many researches about finding meaningful documents using semantic search. Many researches tried to apply these schemes, which is been proven in web document search previously, to filesystems. But they've focused only on higher layer of filesystem, that is not related seriously to storage media. Therefore they're not well tuned to physical characteristics of new flash memory based SSD which has different features against traditional HDD. We enhance log structured filesystem, that is already well known to work better in SSD, by putting semantic search scheme to and with multi logging point.

Evaluating Commercial Spray Applications of Lactic Acid, Hot Water, and Acidified Sodium Chlorite for the Reduction of Escherichia coli on Beef Carcasses

  • Kang, Dong-Hyun;Lee, Sun-Young
    • Food Quality and Culture
    • /
    • v.2 no.1
    • /
    • pp.55-60
    • /
    • 2008
  • This study examined the effects of lactic acid spray, hot water spray, or their combined treatment, as well as the effects of acidified sodium chlorite (ASC), for the decontamination of Escherichia coli on beef carcass surfaces using a commercial intervention system. With this system, the effects of 2 or 4% lactic acid (v/v), hot water ($89{\pm}1^{\circ}C$), or their combined treatment, were examined in terms of reducing inoculated E. coli. ASC (266 ppm), which was adjusted to pH 2.5 using acetic acid or citric acid, was applied using a hand-held spray system. When the beef carcasses were treated with 2 or 4% lactic acid for 10.4 s, less than 1 log reductions of inoculated E. coli were observed. A hot water spray treatment for 9.8 s resulted in a 2.1 log reduction of inoculated E. coli. However, when the hot water was followed with either 2 or 4% lactic acid, no difference in E. coli reduction was found between the hot water alone or the combined treatment with lactic acid. When ASC was adjusted to pH 2.5 with acetic acid and citric acid, 3.8 and 4.1 log reductions of E. coli were observed, respectively. Overall, the lactic acid spray treatment was least effective, and the ASC treatment was most effective, for the E. coli decontamination of beef carcasses. Therefore, these data suggest that ASC would be a more effective intervention against E. coli than most of the methods currently being used. However, more research is required to evaluate the effects of ASC on other organisms, as well as to identify application methods that will not affect meat quality.

  • PDF

Depositional Facies Analysis from Seismic Attributes: Implication of Reservoir Characterization

  • Park Yong-Joon
    • 한국석유지질학회:학술대회논문집
    • /
    • autumn
    • /
    • pp.2-16
    • /
    • 1999
  • This study includes structural analysis of the northern Pattani Basin, areal description of depositional facies, and their spatial relationships using 3-D seismic and well data. Well log data indicate that the representative depositional facies of the studied intervals are sandy, fluvial, channel-fill facies encased in shaly floodplain deposits. Seismic responses were predicted from a synthetic seismogram using a model of dominant depositional facies. Peak-to-trough amplitude and instantaneous frequency seismic attributes are used in depositional facies interpretation. Three Intervals A, B and C are interpreted on the successive stratal surfaces. The shallowest interval, A, is the Quaternary transgressive succession. Each stratal surface showed flow pattern variation of fluvial channel facies. Two transgressive cycles were identified in interval A. Interval B also indicated fluvial facies. Depositional facies architectures are described by interpreting seismic attributes on the successive stratal surfaces.

  • PDF

Settlement Characteristics of Large Drilled Shafts Embedded in Bed Rocks (암반에 근입된 대구경 현장타설말뚝의 침하특성)

  • Hong Won-Pyo;Yea Geu-Guwen;Nam Jung-Man;Lee Jae-Ho
    • Journal of the Korean Geotechnical Society
    • /
    • v.21 no.5
    • /
    • pp.111-122
    • /
    • 2005
  • The data on the pile load tests performed on 35 large drilled shafts are analyzed to investigate the load-settlement characteristics of large drilled shafts embedded in bed rocks. Generally, the settlement of large drilled shafts embedded in bed rocks is too small to determine the ultimated load with application of the regulation in design code for either the total settlement or the residual settlement. Therefore, to determine the yield load of large drilled shafts embedded in bed rocks, p(load)-logS (settlement) curve method, which has been proposed originally for the driven pile, was applied to the investigation on the data of the pile load tests. This technique shows that the yield load can be determined accurately and easily rather than other conventional techniques such as P-S, logp-logS, S-logt, and P-S curve methods. An empirical equation is proposed to represent the relationship between pile load and settlement before the yield loading condition. And the settlement of piles was related with the depth embedded in rock as well as rock properties. Based on the investigation on the data of pile load tests, the resonable regulations f3r both the total settlement and the residual settlement are proposed to determine the yield load of large drilled shafts embedded in bed rocks.

Design of Log Analysis System for Enterprise IDS/Firewall/Router (IDS/Firewall/Router 통합 로그 분석기 설계)

  • 정우식;도경화;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.37-43
    • /
    • 2003
  • The growing Internet business has required the acceleration of the development of security components. There are many different kinds of security components that have been developed in accordance with the appearance of various logs. Therefore, it is important that after the logs are collected they become integrated and need to Once the data from the logs have been collected form the IDS/Firewall/Router logs. It needs to be analyzed and formatted for standardization. This paper suggests designs that the log analyzation system could use in analyzing, detecting, and preventing intrusion in the various systems. Once the data has been analyzed it would be possible to Prevent further intrusion as well as trace the intrusion back to the source.

  • PDF

A research on improving client based detection feature by using server log analysis in FPS games (FPS 게임 서버 로그 분석을 통한 클라이언트 단 치팅 탐지 기능 개선에 관한 연구)

  • Kim, Seon Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1465-1475
    • /
    • 2015
  • Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.