• Title/Summary/Keyword: logs

Search Result 716, Processing Time 0.025 seconds

Mining Social Networks from business process log (비즈니스 프로세스 수행자들의 Social Network Mining에 대한 연구)

  • Song, Min-Seok;Aalst, W.M.P Van Der;Choe, In-Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.544-547
    • /
    • 2004
  • Current increasingly information systems log historic information in a systematic way. Not only workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called 'event log'. Unfortunately, the information in these event logs is rarely used to analyze the underlying processes. Process mining aims at improving this problem by providing techniques and tools for discovering process, control, data, organizational, and social structures from event logs. This paper focuses on the mining social networks. This is possible because event logs typically record information about the users executing the activities recorded in the log. To do this we combine concepts from workflow management and social network analysis. This paper introduces the approach and presents a tool to mine social networks from event logs.

  • PDF

Volatile Organic Compounds of Black Locust Logs Heated at $250^{\circ}C$

  • Lu, Jianxiong;Park, Sang-Bum;Lee, Hee-Young;Kang, Ho-Yang
    • Journal of the Korea Furniture Society
    • /
    • v.20 no.3
    • /
    • pp.198-204
    • /
    • 2009
  • Less used small diameter logs of black locust were heated at $250^{\circ}C$ for improving utilization. The volatile compounds emitted by the heated logs were analyzed. Their effect of formaldehyde absorption was evaluated with PB. Ester and acid compounds were dominant in content. Especially, methyl acetate and acetic acid showed the highest contents. The total content of aromatic compounds decreased as heating time increased. Amoung ketone compounds, The contents of 2-propanone, 2-pentanone, 3-petanone, 3-hexanone and cyclopentenone decreased with the increase of heating time, but the others did not. The contents of the chemicals, furfural and 3-pentanol, increased with heating time, while that of 2-methyl butanal decreased. It was hard to say that formaldehyde was absorbed by the heated black locust samples. Some decorative goods were designed with the heated logs.

  • PDF

A Real-time Remote Logging Model for Development of Location-Based Mobile Applications

  • Choi, Yun-seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.69-76
    • /
    • 2016
  • In this paper, we propose a real-time remote logging model for development of android applications using LBS(Location based Service). The model has two major parts: Mobile Log Management Service and Remote Log Server. Mobile Log Management Service consists of the log collector and the remote log manager. The log collector is an aspect of AOP which can collect logs from the target application without modifications of source codes. The remote log manager has a background service component so that it can receive logs whenever the log collector captures logs from the target application. Remote Log Server communicates with Mobile Log Management Service by socket interface. Therefore, Remote Log Server can show logs in real-time. To validate the efficiency of the proposed model, we show a case study, and compare the model with other models.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Identification and Characterization of Trichoderma Species Damaging Shiitake Mushroom Bed-Logs Infested by Camptomyia Pest

  • Kim, Jun Young;Kwon, Hyuk Woo;Yun, Yeo Hong;Kim, Seong Hwan
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.5
    • /
    • pp.909-917
    • /
    • 2016
  • The shiitake mushroom industry has suffered from Camptomyia (gall midges) pest, which feeds on the mycelium of shiitake mushroom during its cultivation. It has been postulated that fungal damage of shiitake bed-logs is associated with infestation by the insect pest, but this is not well understood. To understand the fungal damage associated with Camptomyia pest, various Trichoderma species were isolated, identified, and characterized. In addition to two previously known Trichoderma species, T. citrinoviride and T. deliquescens, two other Trichoderma species, T. harzianum and T. atroviride, were newly identified from the pestinfested bed-log samples obtained at three mushroom farms in Cheonan, Korea. Among these four species, T. harzianum was the most evident. The results of a chromogenic media-based assay for extracellular enzymes showed that these four species have the ability to produce amylase, carboxyl-methyl cellulase, avicelase, pectinase, and ß-glucosidase, thus indicating that they can degrade wood components. A dual culture assay on PDA indicated that T. harzianum, T. atroviride, and T. citrinoviride were antagonistic against the mycelial growth of a shiitake strain (Lentinula edodes). Inoculation tests on shiitake bed-logs revealed that all four species were able to damage the wood of bed-logs. Our results provide evidence that the four green mold species are the causal agents involved in fungal damage of shiitake bed-logs infested by Camptomyia pest.

Characterization of Xylanase from Lentinus edodes M290 Cultured on Waste Mushroom Logs

  • Lee, Jae-Won;Gwak, Ki-Seob;Kim, Su-Il;Kim, Mi-Hyang;Choi, Don-Ha;Choi, In-Gyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.17 no.11
    • /
    • pp.1811-1817
    • /
    • 2007
  • Extracellular enzymes from Lentinus edodes M290 on normal woods (Quercus mongolica) and waste logs from oak mushroom production were comparatively investigated. Endoglucanase, cellobiohydrolase, ${\beta}$-glucosidase, and xylanase activities were higher on waste mushroom logs than on normal woods after 1. edodes M290 inoculation. Xylanase activity was especially different, with a three times higher activity on waste mushroom logs. When the waste mushroom logs were used as a carbon source, a new 35 kDa protein appeared. After the purification, the optimal pH and temperature for xylanase activity were determined to be 4.0 and $50^{\circ}C$, respectively. More than 50% of the optimal xylanase activity was retained when the temperature was increased from 20 to $60^{\circ}C$, after a 240 min reaction. At $40^{\circ}C$, the xylanase maintained 93% of the optimal activity, after a 240 min reaction. The purified xylanase showed a very high homology to the xylanase family 10 from Aspergillus terreus by LC/MS-MS analysis. The highest Xcorr (1.737) was obtained from the peptide KWI SQGIPIDGIG SQTHLGSGGS WTVK originated from Aspergillus terreus, indicating that the 35 kDa protein was xylanase. This protein showed low homology to a previously reported L. edodes xylanase sequence.

Study on Mensurability of Internal Defect Prediction and of Classification of Log by NDE(Non-Destructive Evaluation) (I) - Focused on Cross Direction of Log - (비파괴 시험방법을 이용한 원목 내부결함 예측 및 분류의 계량화(計量化)에 관한 연구 (I) - 원목의 횡단방향을 중심으로 -)

  • Park, Heon;Gang, Eun-Chang;Chun, Sung-Jin;Yoon, Kyung-Seob
    • Journal of the Korean Wood Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.47-54
    • /
    • 1995
  • This study was to measure the properties of logs and classify them by non-destructive methods. The purpose of this experiment was focused at mensurability of logs by non-destructive methods. The non-destructive instrument, Stress-Wave Timer 239A which was made by Metriguard in U.S.A., was used. The stress wave velocities of log's cross direction were measured and compared with three different methods; 1. with hammer, 2. with hammer and D.B.H. meter, 3. with manufactured instrument. Number of used logs were seven logs, which were classified by naked eye into six groups; very severe rot, severe rot, mild rot & knot, mild rot & check, mild rot, sound log, and in diameter were into three groups; large(57.4cm), medium(36~41.2cm), small(28.9cm) log. The results, which were classified by mensurability with non-destructive methods, were followed; 1. The stress wave velocities were very different between rot and sound log. So it meant the possibility of mensurability of logs by non-destructive method even if high standard error. 2. The stress wave velocities decreased with checks more than with rots, which meant the checks affected speeds more. 3. The stress wave velocities increased with knot. 4. The velocities with manufactured instrument showed lower standard error, so more accurate results than other methods. Especially the required labour decreased from 3~4 to 2 persons. 5. Finally, the mensurability showed more accurate results and made the classification of logs scientific.

  • PDF

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

A Consistency Control of Method for Spatial Data Cached in Mobile Clients (모바일 클라이언트에 캐쉬된 공간 데이터의 일관성 제어 기법)

  • 안경환;차지태;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.31 no.3
    • /
    • pp.274-286
    • /
    • 2004
  • In mobile client-server environments, mobile clients usually are disconnected with their server because of high cost of wireless communication and keep their own local copies to provide efficient updating the cached map. The update of the server database leads to invalidation of the cached map in the client side. To solve the issues of invalidation of the cached map, it is not efficient to resend part of the updated server database to clients whenever the updating of the server database occurs. This paper proposes a log-based update propagation method to propagate the server's update into its relevant clients by using only update logs. Too many logs increasingly accumulate as the sever database is updated several times. The sequential search of the relevant log data for a specific client is time-consuming. Sending of unnecessary logs should be avoided for reducing the overhead of communication.'re solve these problems, we first define unnecessary logs and then suggest log reduction methods to avoid or cancel creating unnecessary logs. The update log index is used for quickly retrieving relevant logs.

An Analysis of Library User and Circulation Status based on Bigdata Logs A Case Study of National Library of Korea, Sejong (빅데이터 로그 기반 도서관 이용자 및 대출 현황 분석 - 국립세종도서관을 중심으로 -)

  • Kim, Tae-Young;Baek, Ji-Yeon;Oh, Hyo Jung
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.2
    • /
    • pp.357-388
    • /
    • 2018
  • This study aims to analyze library user and circulation status based on the bigdata logs to identify characteristics by user group and propose methods for efficient management of library. The logs to be analyzed consist of user information, circulation information, service usage information registered at the National Library of Korea, Sejong. The user information logs contain 107,369 age data, 106,918 gender data, 106,838 residential data. The circulation information logs contain 536,083 circulation user data, 6,509,369 circulation count data, and the service usage information logs contain 82,813 data. For the analysis of characteristics by user group, the data were used for analyzing user status by age, gender, residence and circulation status by year, month, day. In addition, this study conducts FGI(Focus Group Interview) and linkage analysis with external data to identify factors for analysis results. Based on analysis results, improvement methods for helping library make effective decision-making were proposed. This study analyze empirically user and circulation status based on bigdata logs, and it has significance for being different form proceeding researches with less analysis data.