• Title/Summary/Keyword: Log management

Search Result 734, Processing Time 0.025 seconds

A Study on the Intrusion Detection Method using Firewall Log (방화벽 로그를 이용한 침입탐지기법 연구)

  • Yoon, Sung-Jong;Kim, Jeong-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF

Behavior analysis of entrance applicants using web log data (웹 로그데이터를 이용한 대학입시 지원자 행태 분석)

  • Choi, Seung-Bae;Kang, Chang-Wan;Cho, Jang-Sik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.3
    • /
    • pp.493-504
    • /
    • 2009
  • The web log data analysis is to analysis traces which visitors remain while they drop by a web-site. Ultimately it can help to obtain a lot of useful information that can efficiently manage homepage and perform CRM(customer relationship management) using obtained information. In this paper, we provide a basic information to manage efficiently homepage of D university and to establish strategy for invitation of new pupil, as analyzing web log data for D university.

  • PDF

Validation of Sanitation Management Standards for Vegetable Preparation with No-Cook Step Based on Microbiological Analysis (미생물 분석에 의한 채소류 비가열 조리공정의 위생관리 기준 유효성 평가)

  • Kim, Won-Kyeong;Ryu, Kyung
    • Journal of the Korean Dietetic Association
    • /
    • v.27 no.1
    • /
    • pp.45-58
    • /
    • 2021
  • This study evaluated the sanitation management standards for vegetable preparation processes without a cooking stage. The aerobic plate counts (APC), coliform counts, and Escherichia coli of the samples at each production step were analyzed, and microbial growth of the samples stored at different temperatures was measured. The validation was judged in accordance with the microbial criteria stipulated by the British PHLS. After washing and disinfection, the APCs of the two samples decreased to 3~4 log CFU/g in both seasons. Compared to the purchasing stage, the decrease in coliform counts was approximately 0~3 log CFU/g in both seasons; E. coli was not detected. The initial APC and coliform levels of two vegetable samples were 4~5 log CFU/g in both seasons, with an increase of 1 log CFU/g taking more than 6 h at 25℃ and 2 h at 35℃. More than 10 h at 25℃ and 6 h at 35℃ were required to increase the E. coli O157:H7 count by 1~2 log CFU/g for two seasoned samples. In conclusion, washing and disinfection effects and changes in microbial growth during room temperature storage were similar in the two vegetables. Despite the low sanitizing effect of the two vegetables, when cut vegetables were stored under the critical limit within 2 h at two different room temperatures, seasoned lettuce and chicory were at the 'satisfactory' or 'acceptable' levels of PHLS regardless of the storage temperatures. The validation of sanitation management standards applied to vegetable preparation with the no-cook step was approved.

Monitoring of Microorganism Contamination of Ice for Foods in the Store and Hygienic Management Methods (식품접객업소 얼음에 대한 미생물학적 오염도 조사 및 관리방안)

  • Jang, Hong Keun;Lee, Ho
    • Journal of Food Hygiene and Safety
    • /
    • v.30 no.4
    • /
    • pp.309-314
    • /
    • 2015
  • The purpose of this study is to monitor the microbial contamination of ice collected from food stores or restaurants from all over the country. From the ice collected on a regional basis, it was observed that the average number of total aerobic bacteria (TAB) of samples from Seoul was the highest, showing 2.31 log CFU/g, while that of samples from Jeolla-do was the lowest, showing 1.83 log CFU/g. The food-borne pathogens (Staphylococcus aureus, Listeria monocytogenes) were not detected from the ice. Also the average number of TAB of packaged ice (commercial ice) was 0.45 log CFU/g lower than that of ice from ice-making machine. Among three types of stores (the bakery, the dessert store and the beverage store), ice from dessert store showed the highest number of TAB (2.37 log CFU/g). This study suggests that the hygienic management of the ice from the stores is necessary. Therefore, to ensure the hygienic management of ice, not only the ice-making machine should be sanitized on a regular basis but also a thorough individual hygiene is required from food manufacturing workers.

A primal-dual log barrier algorithm of interior point methods for linear programming (선형계획을 위한 내부점법의 원문제-쌍대문제 로그장벽법)

  • 정호원
    • Korean Management Science Review
    • /
    • v.11 no.3
    • /
    • pp.1-11
    • /
    • 1994
  • Recent advances in linear programming solution methodology have focused on interior point methods. This powerful new class of methods achieves significant reductions in computer time for large linear programs and solves problems significantly larger than previously possible. These methods can be examined from points of Fiacco and McCormick's barrier method, Lagrangian duality, Newton's method, and others. This study presents a primal-dual log barrier algorithm of interior point methods for linear programming. The primal-dual log barrier method is currently the most efficient and successful variant of interior point methods. This paper also addresses a Cholesky factorization method of symmetric positive definite matrices arising in interior point methods. A special structure of the matrices, called supernode, is exploited to use computational techniques such as direct addressing and loop-unrolling. Two dense matrix handling techniques are also presented to handle dense columns of the original matrix A. The two techniques may minimize storage requirement for factor matrix L and a smaller number of arithmetic operations in the matrix L computation.

  • PDF

Development of App Analysis System and CMS System Open API (APP 분석 시스템 및 CMS시스템 오픈API 개발)

  • Kim, Sung Rim;Park, Hyeong Rok;Chun, Soojin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.23-33
    • /
    • 2014
  • The smart phone are changing the way people communicate. And, the mobile app marketplace is greatly fast-growing. The app store continues its rapid growth, there are already more than 900,000 mobile apps on AppStore. We anticipate to see gained momentum throughout the business. Mobile is also becoming popular for marketers. Therefore, specialized app analysis systems are becoming important to how marketers and app developers invest, analyze and market their apps. App analysis systems enable users to discover and analyze behavior through data observations and meaningful patterns. In this paper, we introduce app analysis system and CMS System Open API, NugaLog. The NugaLog acquires users data and engages with them in a variety of ways. It will be essential for us to understand how users interact with and move through the app. The NugaLog will be able to see the number of users, smart phone model, smart phone OS, resolution, page views, and app version.

The Comparative Study of Software Optimal Release Time of Finite NHPP Model Considering Half-Logistic and Log-logistic Distribution Property (반-로지스틱과 로그로지스틱 NHPP 분포 특성을 이용한 소프트웨어 최적방출시기 비교 연구)

  • Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.1-10
    • /
    • 2013
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. In the course of correcting or modifying the software, finite failure non-homogeneous Poisson process model, presented and was proposed release policies of the life distribution, half-logistic and log-logistic distributions model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, the parameter estimation using maximum likelihood estimation of failure time data make out, and software optimal release time was estimated.

Test of Fit for the Log-Normalness of the Post Dialling Delay

  • Won, Hyung-Gyoo
    • Journal of Korean Society for Quality Management
    • /
    • v.22 no.2
    • /
    • pp.79-88
    • /
    • 1994
  • Delay has influenced customer satisfaction while using a telephone. It has been ranked second after transmission impairments in annoyance to customers. Therefore, it is important to analyze its behavior not only to increase the quality of service for the customers, but to provide its information to network planners and administrators and to designers of equipment and systems. In this paper, we consider a log-normal model as a candidate for describing the statistical behavior of the post dialling delay, i.e., the time to connect a call to the telephone network after dialling. Based on the real data, the log-normalness of the post dialling delays are convinced for the long distance calls, but not supported for the local calls. Uses of graphical plotting paper and statistical test of fit art discussed.

  • PDF

The Comparative Study of NHPP Software Reliability Model Exponential and Log Shaped Type Hazard Function from the Perspective of Learning Effects (지수형과 로그형 위험함수 학습효과에 근거한 NHPP 소프트웨어 신뢰성장모형에 관한 비교연구)

  • Kim, Hee Cheul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The finite failure nonhomogeneous Poisson process models presented and the life distribution applied exponential and log shaped type hazard function. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than autonomous errors-detected factor that is generally efficient model could be confirmed. This paper, a failure data analysis of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and coefficient of determination.