• Title/Summary/Keyword: application log

Search Result 442, Processing Time 0.032 seconds

A Log Management Service Model based on AOP for Efficient Development of Android Applications

  • Choi, Yun-seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.39-45
    • /
    • 2016
  • In this paper, we propose a log management service model for efficient developments of android applications. The proposed model consists of two major parts which are the log collector and the log manager service. The log collector can capture the log information of a target application without modifications, because the collector is composed by aspect-oriented programming. The collected logs are transformed to chunk of data, and the chunk of data is sent to the log management service. The log management service is an android service component and an independent application in another process. So, the log management service can reduce the workload of logging in the target application. Through a case study, we show that the proposed log management service model can reduce the log processing time compared to other models without modifications of a target application.

Development of the SysLog-based Integrated Log Management system for Firewalls in Distributed Network Environments (분산 환경에서 SysLog기반의 방화벽 통합로그관리시스템 개발)

  • Lee, Dong Young;Seo, Hee Suk;Lee, Eul Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.39-45
    • /
    • 2011
  • Application log files contain error messages; operational data and usage information that can help manage applications and servers. Log analysis system is software that read and parse log files, extract and aggregate information in order to generate reports on the application. In currently, the importance of log files of firewalls is growing bigger and bigger for the forensics of cyber crimes and the establishment of security policy. In this paper, we designed and implemented the SILAS(SysLog-based Integrated Log mAanagement System) in distribute network environments. It help to generate reports on the the log fires of firewalls - IP and users, and statistics of application usage.

A Real-time Remote Logging Model for Development of Location-Based Mobile Applications

  • Choi, Yun-seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.69-76
    • /
    • 2016
  • In this paper, we propose a real-time remote logging model for development of android applications using LBS(Location based Service). The model has two major parts: Mobile Log Management Service and Remote Log Server. Mobile Log Management Service consists of the log collector and the remote log manager. The log collector is an aspect of AOP which can collect logs from the target application without modifications of source codes. The remote log manager has a background service component so that it can receive logs whenever the log collector captures logs from the target application. Remote Log Server communicates with Mobile Log Management Service by socket interface. Therefore, Remote Log Server can show logs in real-time. To validate the efficiency of the proposed model, we show a case study, and compare the model with other models.

Application of Disinfection Models on the Plasma Process (플라즈마 공정에 대한 소독 모델 적용)

  • Back, Sang-Eun;Kim, Dong-Seog;Park, Young-Seek
    • Journal of Environmental Science International
    • /
    • v.21 no.6
    • /
    • pp.695-704
    • /
    • 2012
  • The application of disinfection models on the plasma process was investigated. Nine empirical models were used to find an optimum model. The variation of parameters in model according to the operating conditions (first voltage, second voltage, air flow rate, pH) were investigated in order to explain the disinfection model. In this experiment, the DBD (dielectric barrier discharge) plasma reactor was used to inactivate Ralstonia Solanacearum which cause wilt in tomato plantation. Optimum disinfection models were chosen among the nine models by the application of statistical SSE (sum of squared error), RMSE (root mean sum of squared error), $r^2$ values on the experimental data using the GInaFiT software in Microsoft Excel. The optimum model was shown as Weibull+talil model followed by Log-linear+ Shoulder+Tail model. Two models were applied to the experimental data according to the variation of the operating conditions. In Weibull+talil model, Log10($N_o$), Log10($N_{res}$), ${\delta}$ and p values were examined. And in Log-linear+Shoulder+Tail model, the Log10($N_o$), Log10($N_{res}$), $k_{max}$, Sl values were calculated and examined.

Framework for One Account Log-in From Multi Device On Mobile Application

  • Aulya, Rafinno;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • Many applications require users to log-in, some applications can allow users to use the same account is active on multiple devices at the same time. On location-based application that serves to record the movement of the position, account is active on multiple devices could not be permitted because it causes a different location data from multiple devices, so the location of the users become ambiguous. This paper describes a simple protocol to prevent users from using their accounts on multiple devices at the same time. This Protocol will turn off one account on a device when the account log-in on new devices.

CASCADES OF TORIC LOG DEL PEZZO SURFACES OF PICARD NUMBER ONE

  • DongSeon Hwang
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.5
    • /
    • pp.837-851
    • /
    • 2024
  • We classify toric log del Pezzo surfaces of Picard number one by introducing the notion, cascades. As an application, we show that if such a surface admits a Kähler-Einstein metric, then it should admit a special cascade and it satisfies the equality of the orbifold Bogomolov-Miyaoka-Yau inequality, i.e., K2 = 3eorb. Moreover, we provide an algorithm to compute a toric log del Pezzo surfaces of Picard number one for a given input of singularity types.

Designing Modulo $({2^n}-1)$ Parallel Multipliers and its Technological Application Using Op Amp Circuits (Op Amp 회로를 이용한, 모듈로 $({2^n}-1)$ 병렬 승산기의 설계 및 그 기술의 응용)

  • Lee, Hun-Giu;Kim, Chul
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.6
    • /
    • pp.436-445
    • /
    • 2001
  • In this paper, we introduce modulo ( 2$^n$-1) parallel-processing residue multipliers, using Op Amp circuits, and their technological application to designing binary multipliers. The limit of multiplying speed in computational processing is a serious harrier in the advances of VLSI technology. To solve this problem, we implement a class of modulo ( 2$^n$-1) parallel multipliers having superior time complexity to O( log$_2$( log$_2$( log$_2$$^n$))) by applying Op Amp circuits, while investigating their technological application to binary multipliers. Since they have excellent time & area complexity compared with previous parallel multipliers, and are applicable to designing binary multipliers of the same efficiency, such parallel multipliers possess high academic value. Indexing Terms Modular Multipliers. Binary Multipliers. Parallel Processing, Operational Amplifiers, Mersenne Numbers.

  • PDF

Accurate and Efficient Log Template Discovery Technique

  • Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.11-21
    • /
    • 2018
  • In this paper we propose a novel log template discovery algorithm which achieves high quality of discovered log templates through iterative log filtering technique. Log templates are the static string pattern of logs that are used to produce actual logs by inserting variable values during runtime. Identifying individual logs into their template category correctly enables us to conduct automated analysis using state-of-the-art machine learning techniques. Our technique looks at the group of logs column-wise and filters the logs that have the value of the highest proportion. We repeat this process per each column until we are left with highly homogeneous set of logs that most likely belong to the same log template category. Then, we determine which column is the static part and which is the variable part by vertically comparing all the logs in the group. This process repeats until we have discovered all the templates from given logs. Also, during this process we discover the custom patterns such as ID formats that are unique to the application. This information helps us quickly identify such strings in the logs as variable parts thereby further increasing the accuracy of the discovered log templates. Existing solutions suffer from log templates being too general or too specific because of the inability to detect custom patterns. Through extensive evaluations we have learned that our proposed method achieves 2 to 20 times better accuracy.

Design of Secure Log System in Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계)

  • Lee, Byung-Do;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

Application of Inactivation Model on Phytophthora Blight Pathogen (Phytophthora capsici) using Plasma Process (플라즈마 공정을 이용한 고추역병균(Phytophthora capsici) 불활성화 모델의 적용)

  • Kim, Dong-Seog;Park, Young-Seek
    • Journal of Environmental Science International
    • /
    • v.24 no.11
    • /
    • pp.1393-1404
    • /
    • 2015
  • Ten empirical disinfection models for the plasma process were used to find an optimum model. The variation of model parameters in each model according to the operating conditions (first voltage, second voltage, air flow rate, pH, incubation water concentration) were investigated in order to explain the disinfection model. In this experiment, the DBD (dielectric barrier discharge) plasma reactor was used to inactivate Phytophthora capsici which cause wilt in tomato plantation. Optimum disinfection models were chosen among ten models by the application of statistical SSE (sum of squared error), RMSE (root mean sum of squared error), $r^2$ values on the experimental data using the GInaFiT software in Microsoft Excel. The optimum models were shown as Log-linear+Tail model, Double Weibull model and Biphasic model. Three models were applied to the experimental data according to the variation of the operating conditions. In Log-linear+Tail model, $Log_{10}(N_o)$, $Log_{10}(N_{res})$ and $k_{max}$ values were examined. In Double Weibull model, $Log_{10}(N_o)$, $Log_{10}(N_{res})$, ${\alpha}$, ${\delta}_1$, ${\delta}_2$, p values were calculated and examined. In Biphasic model, $Log_{10}(N_o)$, f, $k_{max1}$ and $k_{max2}$ values were used. The appropriate model parameters for the calculation of optimum operating conditions were $k_{max}$, ${\alpha}$, $k_{max1}$ at each model, respectively.