• 제목/요약/키워드: Log management

검색결과 734건 처리시간 0.024초

성장곡선 모형 적용을 통한 기술수준평가 사례 연구 : 특정 수산과학기술 분야를 중심으로 (Case Study on Measuring Technology Level Applying Growth Curve Model: Three Core Areas of Fishery Science and Technology)

  • 김완민;박주찬;박병무
    • 수산경영론집
    • /
    • 제46권3호
    • /
    • pp.103-118
    • /
    • 2015
  • The purpose of this paper is to discuss possibilities of applying growth curve models, such as Logistic, Log-Logistic, Log-Normal, Gompertz and Weibull, to three specific technology areas of Fishery Science and Technology in the process of measuring their technology level between Korea and countries with the state-of-the art level. Technology areas of hazard control of organism, environment restoration, and fish cluster detect were selected for this study. Expert panel survey was conducted to construct relevant panel data for years of 2013, 2016, and a future time of approaching the theoretical maximum technology level. The size of data was 70, 70 and 40 respectively. First finding is that estimation of shape and location parameters of each model was statistically significant, and lack-of-fit test using estimated parameters was statistically rejected for each model, meaning all models were good enough to apply for measuring technology levels. Second, three models other than Pearl and Gompertz seemed very appropriate to apply despite the fact that previous case studies have used only Gompertz and Pearl. This study suggests that Weibull model would be a very valid candidate for the purpose. Third, fish cluster detect technology level is relatively higher for both Korea and a country with the state-of-the-art among three areas as of 2013. However, all three areas seem to be approaching their limits(highest technology level point) until 2020 for countries with the state-of-the-art. This implies that Korea might have to speed up her research activities in order to catch up them prior to 2020. Final suggestion is that future study may better apply various and more appropriate models respectively considering each technology characteristics and other factors.

PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구 (A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures)

  • 이익준;염흥열
    • 한국전자거래학회지
    • /
    • 제23권4호
    • /
    • pp.137-152
    • /
    • 2018
  • 기존 금융정보유출 행위를 탐지하기 위해 보안솔루션에서 생성한 행위 로그를 수집하여 패턴분석으로 정보유출 이상행위를 탐지하고 차단하는 활동에서 발생되는 한계점을 극복하고, 효과적으로 대응하기 위한 방안으로 첫 번째, PC에서 정보유출 경로(외부에서 읽기, 외부로 저장하기, 외부로 전송하기 등)로 이용되는 PC내 실행 프로그램들을 실시간으로 모니터링하고 두 번째, 해당 프로그램이 실행하는 시점에 연관된 보안 통제 프로세스와 상호 연동하여 정상 통제예외 통제우회 행위인지를 파악한 다음 마지막 단계인 시나리오 기반으로 생성한 처리 절차를 통해 금융정보유출 위험을 통제할 수 있는 위험 관리 모델을 제안함으로서 정보 보호 측면의 보안성 강화 및 업무 효율성 향상의 기대효과를 창출하고자 한다.

Real-time prediction on the slurry concentration of cutter suction dredgers using an ensemble learning algorithm

  • Han, Shuai;Li, Mingchao;Li, Heng;Tian, Huijing;Qin, Liang;Li, Jinfeng
    • 국제학술발표논문집
    • /
    • The 8th International Conference on Construction Engineering and Project Management
    • /
    • pp.463-481
    • /
    • 2020
  • Cutter suction dredgers (CSDs) are widely used in various dredging constructions such as channel excavation, wharf construction, and reef construction. During a CSD construction, the main operation is to control the swing speed of cutter to keep the slurry concentration in a proper range. However, the slurry concentration cannot be monitored in real-time, i.e., there is a "time-lag effect" in the log of slurry concentration, making it difficult for operators to make the optimal decision on controlling. Concerning this issue, a solution scheme that using real-time monitored indicators to predict current slurry concentration is proposed in this research. The characteristics of the CSD monitoring data are first studied, and a set of preprocessing methods are presented. Then we put forward the concept of "index class" to select the important indices. Finally, an ensemble learning algorithm is set up to fit the relationship between the slurry concentration and the indices of the index classes. In the experiment, log data over seven days of a practical dredging construction is collected. For comparison, the Deep Neural Network (DNN), Long Short Time Memory (LSTM), Support Vector Machine (SVM), Random Forest (RF), Gradient Boosting Decision Tree (GBDT), and the Bayesian Ridge algorithm are tried. The results show that our method has the best performance with an R2 of 0.886 and a mean square error (MSE) of 5.538. This research provides an effective way for real-time predicting the slurry concentration of CSDs and can help to improve the stationarity and production efficiency of dredging construction.

  • PDF

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권5호
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

절단된 자료가 있는 병렬형 시스템의 단계적 충격수명검사 (The Step Stress Life Testing for the Parallel System with Censored Data)

  • 박희창;이석훈
    • 품질경영학회지
    • /
    • 제23권1호
    • /
    • pp.15-28
    • /
    • 1995
  • We consider a step-stress life testing which is devised for a two-component parallel system with considerably long life time. To describe such a system, we use an exponential distribution as the survival function. The lift distribution is assumed between the log mean life time and the stress with the cumulative exposure model. The criterion for optimality is to minimize the sum of the variances of the maximum likelihood estimators of the mean life times of each part under the normal stress.

  • PDF

Implementation of Real-Time Wireless Web Server Load Monitoring System

  • Park, Hong-Jin;Kwon, Chang-Hee
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2004년도 International Conference on Digital Policy & Management
    • /
    • pp.211-219
    • /
    • 2004
  • Due to rapid increases in Internet users, it becomes essential to provide well-established web services and monitor web server's load for the sake of reliable web server management. The existing web server load monitoring has been based on such cable methods as RPC, RMI, CORBA and etc. But it has the limitation in bringing information both anywhere and anytime over the Internet. This thesis is aimed to realize real-time wireless web server monitoring system based on Wireless Application Protocol (WAP). As any user can log on wirelessly to the Internet at any time through wireless terminals like PDA, the realization will make possible instant and real-time web server monitoring.

  • PDF

H/W 정보의 인증을 통한 내부정보유출 방지 기법 (A Authentication technique of Internal Information Hacking Protection based on H/W Information)

  • 양선옥;최낙귀;박재표;최형일
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

B2B에서 구매의도 파악을 위한 웹 로그 분석 (Web Log Analysis for Studying the Intend to Purchasing Under B2B Environment)

  • 고재문;서준용;김운식
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2005년도 춘계공동학술대회 발표논문
    • /
    • pp.601-613
    • /
    • 2005
  • 일반적으로 B2C가 불특정 다수에 대한 서비스라면 B2B는 특정 소수에 대한 서비스라고 할 수 있다. 이러한 특성으로 B2C와 B2B에서 고객의 구매의도는 다르게 평가되어야 한다. 또한 B2B는 협상이라는 단계가 있고, 이것은 B2C와 B2B의 구매의도 평가기준에 영향을 미치게 된다. 본 연구에서는 B2B에서 구매의도 파악을 위한 웹 로그 분석 모형을 제시한다. 제시된 모형을 통해 구매의도 파악을 위한 웹 로그 분석 데이터를 추출하고, 추출된 데이터를 기업의 레거시 시스템 데이터와 통합하는 과정을 보여준다. 또한 분석 데이터를 추출하기 위한 웹마이닝 과정과 추출된 분석 데이터가 데이터베이스에 저장되는 과정을 보여준다.

  • PDF

신뢰성 성장모형에 대한 소프트웨어 신뢰성 메트릭 추정량의 민감도 분석 (Sensitivity analysis of software reliability metric estimator for Software Reliability Growth Models)

  • 김대경
    • 품질경영학회지
    • /
    • 제37권3호
    • /
    • pp.33-38
    • /
    • 2009
  • When we estimate the parameters of software reliability models, we usually use maximum liklihood estimator(MLE). But this method is required a large data set. In particular, when we want to estimate it with small observed data such as early stages of testing, we give rise to the non-existence of MLE. Therefore, it is interesting to look into the influence of parameter estimators obtained using MLE. In this paper, we use two non-homogenous poisson process software reliability growth model: delayed S-shaped model and log power model. In this paper, we calculate the sensitivity of estimators about failure intensity function for two SRGMs respectively.

사용조건에서 스트레스를 가하고 스트레스한계가 있는 램프시험의 최적설계 (An Optimum Design of Ramp Test with Stress Loading from Use Condition and Upper Bound of Stress)

  • 전영록
    • 품질경영학회지
    • /
    • 제27권3호
    • /
    • pp.79-93
    • /
    • 1999
  • The common accelerated life test(ALT) consists of test methods applying a constant stress, higher than the use condition stress, to items. There we, however, situations for which a progressive stress ALT, in which the stress on a test item is continuously increased with time, Is more convenient to perform testing and simpler in analyzing data than a constant stress ALT. When a product under constant stress s follows a Weibull distribution with parameters $\theta$(5) and $\beta$, maximum likelihood(ML) estimators of parameters involved in the model are obtained and their asymptotic distributions are derived under stress bounded ramp tests in which the stress is increased linearly from use condition stress to the stress upper bound. The optimum test plans are also found which minimize the asymptotic variance of the ML estimator of the log mean life at design constant stress. For selected values of the design parameters, tables useful for finding optimal test plans are given. The effect of the pre-estimates of design parameters is studied.

  • PDF