• Title/Summary/Keyword: Event log

Search Result 147, Processing Time 0.023 seconds

Design and Implementation of Event Analysis/Arrange Function for Mobile Device Simulator (모바일 디바이스 시뮬레이터용 이벤트 분석 및 배열 기능의 설계 및 구현)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1429-1434
    • /
    • 2010
  • Generally, the simulator for mobile device tests automatically an application software after instilling again the event, which is saved in log file according to an event generation sequence, into the application software of device. But, the simulator performance for mobile device can be different according to a extraction layer even if the events are same. And, the sequence of events extracted from an application is changeable in the environment that multiple applications are operated concurrently. Therefore, even though the same applications is executed to the same sequence, the generation sequence of events is revised in accordance with the state of mobile device system, and whether the errors occur according to circumstances or not. This kind of application software error is very difficult to perform a debugging operation. In this paper, the execution state of various applications is verifiable through the re-editing of events after analyzing the events which is generated in application, kernel, middleware layer, and the event arrange/editor is designed and implemented to understand efficiently the influence on application, kernel, and middleware layer for events.

A Method for Generating a Plant Model Based on Log Data for Control Level Simulation (제어시뮬레이션을 위한 생산시스템 로그데이터 기반 플랜트 모델 생성 방법)

  • Ko, Minsuk;Cheon, Sang Uk;Park, Sang Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.1
    • /
    • pp.21-27
    • /
    • 2013
  • Presented in the paper is a log data based modeling method for effective construction of a virtual plant model which can be used for the virtual PLC (Programmable Logic Controller) simulation. For the PLC simulation, the corresponding virtual plant, consisting of virtual devices, is required to interact with the input and output symbols of a PLC. In other words, the behavior of a virtual device should be the same as that of the real device. Conventionally, the DEVS (Discrete Event Systems Specifications) formalism has been used to represent the behavior a virtual device. The modeling using DEVS formalism, however, requires in-depth knowledge in the simulation area, as well as the significant amount of time and efforts. One of the key ideas of the proposed method is to generate a plant model based on the log data obtained from the production system. The proposed method is very intuitive, and it can be used to generate the full behavior model of a virtual device. The proposed approach was applied to an AGV (Automated Guided Vehicle).

Development of the Risk Assessment Model for Train Collision and Derailment (열차 충돌/탈선사고 위험도 평가모델 개발)

  • Choi, Don-Bum;Wang, Jong-Bae;Kwak, Sang-Log;Park, Chan-Woo;Kim, Min-Su
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1518-1523
    • /
    • 2008
  • Train collision and derailment are types of accident with low probability of occurrence, but they could lead to disastrous consequences including loss of lives and properties. The development of the risk assessment model has been called upon to predict and assess the risk for a long time. Nevertheless, the risk assessment model is recently introduced to the railway system in Korea. The classification of the hazardous events and causes is the commencement of the risk assessment model. In previous researches related to the classification, the hazardous events and causes were classified by centering the results. That classification was simple, but might not show the root cause of the hazardous events. This study has classified the train collision and derailment based on the relevant hazardous event including faults of the train related the accidents, and investigates the causes related to the hazardous events. For the risk assessment model, FTA (fault tree analysis) and ETA (event tree analysis) methods are introduced to assess the risk.

  • PDF

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

Hazardous Events and Causes for Train Collision and Derailment (열차 충돌/탈선사고의 위험사건 정의 및 원인 분류)

  • Park, Joo-Nam;Wang, Jong-Bae;Park, Chan-Woo;Kwak, Sang-Log
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1174-1179
    • /
    • 2007
  • Train collision and derailment are types of accident that happen with low probability of occurrence but could lead to disastrous consequences including multiple life losses. Risk assessment of the accidents are typically performed per their hazardous events, which are defined as events that cause accidents. This study classifies the train collision and derailment based on the relevant hazardous event, and investigates the causes related to the hazardous events. Finally, the relation of the causes, hazardous events, and the accidents are defined.

  • PDF

A Process Mining using Association Rule and Sequence Pattern (연관규칙과 순차패턴을 이용한 프로세스 마이닝)

  • Chung, So-Young;Kwon, Soo-Tae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.2
    • /
    • pp.104-111
    • /
    • 2008
  • A process mining is considered to support the discovery of business process for unstructured process model, and a process mining algorithm by using the associated rule and sequence pattern of data mining is developed to extract information about processes from event-log, and to discover process of alternative, concurrent and hidden activities. Some numerical examples are presented to show the effectiveness and efficiency of the algorithm.

Conservative Neck Dissection in Oral Cancer Patients: a 5 Year Retrospective Study in Malaysia

  • Balasundram, Sathesh;Mustafa, Wan Mahadzir Wan;Ip, Jolene;Adnan, Tassha Hilda;Supramaniam, Premaa
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.8
    • /
    • pp.4045-4050
    • /
    • 2012
  • Objective: The impact of ablative oral cancer surgery was studied, with particular reference to recurrence and nodal metastasis, to assess survival probability and prognostic indicators and to elucidate if ethnicity influences the survival of patients. Methods: Patients who underwent major ablative surgery of the head and neck region with neck dissection were identified and clinical records were assessed. Inclusion criteria were stage I-IV oral and oropharyngeal malignancies necessitating resection with or without radiotherapy from 2004 to 2009. All individuals had a pre-operative assessment prior to the surgery. The post operative assessment period ranged from 1 year to 5 years. Survival distributions were analyzed using Kaplan-Meier curves. Results: 87 patients (males:38%; females:62%) were included in this study, with an age range of 21-85 years. Some 78% underwent neck dissections while 63% had surgery and radiotherapy. Nodal recurrence was detected in 5.7% while 20.5% had primary site recurrence within the study period. Kaplan-Meier survival analysis revealed that the median survival time was 57 months. One year overall survival (OS) rate was 72.7% and three year overall survival rate dropped to 61.5%. On OS analysis, the log-rank test showed a significant difference of survival between Malay and Chinese patients (Bonferroni correction p=0.033). Recurrence-free survival (RFS) analysis revealed that 25% of the patients have reached the event of recurrence at 46 months. One year RFS rate was 85.2% and the three year survival rate was 76.1%. In the RFS analysis, the log-rank test showed a significant difference in the event of recurrence and nodal metastasis (p<0.001). Conclusion: Conservative neck is effective, in conjunction with postoperative radiotherapy, for control of neck metastases. Ethnicity appears to influence the survival of the patients, but a prospective trial is required to validate this.

Simplified Forensic Analysis Using List of Deleted Files in IoT Envrionment (사물인터넷 환경에서 삭제된 파일의 목록을 이용한 포렌식 분석 간편화)

  • Lim, Jeong-Hyeon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.35-39
    • /
    • 2019
  • With the rapid development of the information society, the use of digital devices has increased dramatically and the importance of technology for analyzing them has increased. Digital evidence is stored in many places such as Prefetch, Recent, Registry, and Event Log even if the user has deleted it. Therefore, there is a disadvantage that the forensic analyst can not grasp the files used by the user at the beginning. Therefore, in this paper, we propose a method that the RemoveList folder exists so that the user can grasp the information of the deleted file first, and the information about the deleted file is automatically saved by using AES in RemoveList. Through this, it can be expected that the analyst can alleviate the difficulty of initially grasping the user's PC.

A Process Perspective Event-log Analysis Method for Airport BHS (Baggage Handling System) (공항 수하물 처리 시스템 이벤트 로그의 프로세스 관점 분석 방안 연구)

  • Park, Shin-nyum;Song, Minseok
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.181-188
    • /
    • 2020
  • As the size of the airport terminal grows in line with the rapid growth of aviation passengers, the advanced baggage handling system that combines various data technologies has become an essential element in order to handle the baggage carried by passengers swiftly and accurately. Therefore, this study introduces the method of analyzing the baggage handling capacity of domestic airports through the latest data analysis methodology from the process point of view to advance the operation of the airport BHS and the main points based on event log data. By presenting an accurate load prediction method, it can lead to advanced BHS operation strategies in the future, such as the preemptive arrangement of resources and optimization of flight-carrousel scheduling. The data used in the analysis utilized the APIs that can be obtained by searching for "Korea Airports Corporation" in the public data portal. As a result of applying the method to the domestic airport BHS simulation model, it was possible to confirm a high level of predictive performance.

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.