• Title/Summary/Keyword: logs

Search Result 723, Processing Time 0.028 seconds

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

A New Latent Class Model for Analysis of Purchasing and Browsing Histories on EC Sites

  • Goto, Masayuki;Mikawa, Kenta;Hirasawa, Shigeichi;Kobayashi, Manabu;Suko, Tota;Horii, Shunsuke
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.335-346
    • /
    • 2015
  • The electronic commerce site (EC site) has become an important marketing channel where consumers can purchase many kinds of products; their access logs, including purchase records and browsing histories, are saved in the EC sites' databases. These log data can be utilized for the purpose of web marketing. The customers who purchase many product items are good customers, whereas the other customers, who do not purchase many items, must not be good customers even if they browse many items. If the attributes of good customers and those of other customers are clarified, such information is valuable as input for making a new marketing strategy. Regarding the product items, the characteristics of good items that are bought by many users are valuable information. It is necessary to construct a method to efficiently analyze such characteristics. This paper proposes a new latent class model to analyze both purchasing and browsing histories to make latent item and user clusters. By applying the proposal, an example of data analysis on an EC site is demonstrated. Through the clusters obtained by the proposed latent class model and the classification rule by the decision tree model, new findings are extracted from the data of purchasing and browsing histories.

Runtime Prediction Based on Workload-Aware Clustering (병렬 프로그램 로그 군집화 기반 작업 실행 시간 예측모형 연구)

  • Kim, Eunhye;Park, Ju-Won
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.56-63
    • /
    • 2015
  • Several fields of science have demanded large-scale workflow support, which requires thousands of CPU cores or more. In order to support such large-scale scientific workflows, high capacity parallel systems such as supercomputers are widely used. In order to increase the utilization of these systems, most schedulers use backfilling policy: Small jobs are moved ahead to fill in holes in the schedule when large jobs do not delay. Since an estimate of the runtime is necessary for backfilling, most parallel systems use user's estimated runtime. However, it is found to be extremely inaccurate because users overestimate their jobs. Therefore, in this paper, we propose a novel system for the runtime prediction based on workload-aware clustering with the goal of improving prediction performance. The proposed method for runtime prediction of parallel applications consists of three main phases. First, a feature selection based on factor analysis is performed to identify important input features. Then, it performs a clustering analysis of history data based on self-organizing map which is followed by hierarchical clustering for finding the clustering boundaries from the weight vectors. Finally, prediction models are constructed using support vector regression with the clustered workload data. Multiple prediction models for each clustered data pattern can reduce the error rate compared with a single model for the whole data pattern. In the experiments, we use workload logs on parallel systems (i.e., iPSC, LANL-CM5, SDSC-Par95, SDSC-Par96, and CTC-SP2) to evaluate the effectiveness of our approach. Comparing with other techniques, experimental results show that the proposed method improves the accuracy up to 69.08%.

Analysis of the Difference between Accident Type and Injury Type on Ski Resort (융·복합 시대 스키 리조트의 안전사고와 상해유형의 차이)

  • Kim, Sung-Duck;Lee, Yung-Kuk
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.461-467
    • /
    • 2018
  • The purpose of this study was to identify the analysis of the difference between accident type and injury type on ski resort. In order to achieve this purpose, a total of 522 persons recorded in the safety accident logs of two ski resorts located in Gyeonggi - do in 2016-2017 winter season by the purposeful sampling method. Frequency analysis, chi-square test were executed using SPSS Statistics 21.0 Version. As the results, the following conclusion was derived. First, injury part differ statistically and significantly according to both socio-demographic variables(lesson experience). Second, injury type differ statistically and significantly according to both socio-demographic variables(event, lesson experience, event${\times}$age, lesson experience${\times}$gender). Lastly, both injury part and injury type differ statistically and significantly according to Slope course.

Feeding Effect of Citrus Byproduct Pulp on the Quality Characteristics of Hanwoo (감귤박 펄프 급여가 한우육의 품질에 미치는 영향)

  • Moon, Yoon-Hee;Yang, Seung-Joo;Jung, In-Chul
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.2
    • /
    • pp.227-233
    • /
    • 2007
  • The purpose of this research was to study the effects of the feeding of dietary citrus byproducts on the physicochemical properties and palatability of Hanwoo rump (HR). The samples for experimental samples consisted of the HR not fed without citrus byproducts pulp (CBP-0) and the HR rump fed with citrus byproducts pulp during the fattening period (CBP-1). The control (CBP-0) HR rump was fed by general practical feeding (roughages and concentrates were fed separately), while the CBP-1 was fed in the same manners as CBP-0 until 17 months but with citrus byproducts then fed fer the next 10 months. There were no significant differences in the $L^*$ (tightness), $a^*$ (redness) and $b^*$ (yellowness) of the HR between the CBP-0 and CBP-1 fed groups. There were no significant differences in the pH, VBN content and EDA between the samples, but the TBARS value of the CBP-1 fed group was lower than that of the CBP-0 fed group (p<0.05). There were no significant differences in the water holding capacity, freezing loss, thawing loss, boiling and roasting logs between the CBP-0 and CBP-1 fed groups. There were no significant differences in the hardness, cohesiveness, chewiness and shear force between the samples, but the springiness of the CBP-1 fed group was higher than that of the CBP-0 fed group (p<0.05). There were no significant differences in the sensory scores for the roasted beef between the CBP-0 and CBP-1 fed groups. There were no significant differences in the taste, flavor, juiciness and palatability of roasted beef the between samples, but the tenderness of the CBP-1 fed group was superior to that of the CBP-0 fed group.

  • PDF

Effect of Irradiation on the Microbial Content of Ready-to-Use Cooked Carrot

  • Byun, Myung-Woo;Lee, Na-Young;Jo, Cheo-Run;Lee, Eun-Young;Kim, Hee-Jeong;Shin, Dong-Hwa
    • Food Science and Biotechnology
    • /
    • v.16 no.1
    • /
    • pp.138-141
    • /
    • 2007
  • The aim of this study was to investigate the effect of irradiation treatment on the inactivation of pathogens in ready-to-use cooked carrot. The pathogens tested were Salmonella typhimurium, Escherichia coli, Staphylococcus aureus, and Listeria inocua. Following the inoculation of these organisms into cooked carrot (about $10^6-10^8\;CFU/g$), the growth of each was inhibited due to irradiation for 24 hr of storage at $20^{\circ}C$. S. typhimurium and E. coli inoculated into cooked carrot were not detected following irradiation with 3 kGy. S. aureus and L. inocua inoculated into the cooked carrot decreased by 5 logs (CFU/g) following 2 kGy irradiation. The range of $D_{10}$ values was from 0.30-0.50. The Hunter color, $L^*-,\;a^*-$, and $b^*-values$, and the hardness of the cooked carrot were not effected by irradiation treatment. The sensory score of irradiated cooked carrot was not statistically different from that of non-irradiated samples (p>0.05). These results indicate that low dose irradiation can enhance the microbial safety and extend the shelf-life of ready-to-eat foods such as cooked carrot.

A Study on the Storytelling of Web-based MMORTS 'Tribal War' (웹 기반 MMORTS <부족전쟁>의 스토리텔링 연구)

  • Lyou, Chul-Gyun;Lim, Su-Mi
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.15-24
    • /
    • 2010
  • Web-based MMORTS has features that distinguish it from traditional client-based games. First, Web-based MMORTS is represented by the combination of graphics and texts. Second, there is parallax agent which has a player and a base town character. This paper written for the purpose of analyzing the storytelling of web-based MMORTS, and from Innogames selected as the subjects of the study. In view of the results so far achieved, the fact, when the player logs in web-based MMORTS, the player takes the experience after some time which had taken by the AI character instead of the player logged out and User Generated Storytelling created from this process, become known. This paper has a meaning for Web-based virtual world which can juxtaposition with routine tasks and can be linked with other platforms.

Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server (Microsoft SQL Server의 원본 수집 방식에 따른 삭제 데이터의 복구 가능성 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.859-868
    • /
    • 2018
  • Previous research related to recovering deleted data in database has been mainly based on transaction logs or detecting and recovering data using original source files by physical collection method. However there was a limit to apply if the transaction log does not exist in the server or it is not possible to collect the original source file because a database server owner does not permit stopping the database server because of their business loss or infringement at the scene. Therefore it is necessary to examine various collection methods and check the recoverability of the deleted data in order to handling the constraints of evidence collection situation. In this paper we have checked an experiment that the recoverability of deleted data in the original database source according to logical and physical collection methods on digital forensic investigation of Microsoft SQL Server database.

WebCam : A Web-based Remote Recordable Surveillance System using Index Search Algorithm (웹캠 : 새로운 인데스검색 알고리듬을 이용한 웹기반 원격 녹화 보안 시스템)

  • Lee, Myeong-Ok;Lee, Eun-Mi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.9-16
    • /
    • 2002
  • As existing analog video surveillance systems could save and retrieve data only in a limited space within short distance, it had many constraints in developing into various application systems. However, on the back of development of the Internet and computer technologies, digital video surveillance systems can be controlled from a remote location by web browser without space limits. Moreover, data compression and management technologies with Index Search algorithm make it possible to efficiently handling, storing, and retrieving a large amount of data and further motion detection algorithm enhances a recording speed and efficiency for a practical application, that is, a practical remote recordable video surveillance system using our efficient algorithms as mentioned, called WebCam. The WebCam server system can intelligently record and save video images digitized through efficient database management, monitor and control cameras in a remote place through user authentication, and search logs.

Log processing using messaging system in SSD Storage Tester (SSD Storage Tester에서 메시징 시스템을 이용한 로그 처리)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1531-1539
    • /
    • 2017
  • The existing SSD storage tester processed logs in a 1-N structure between server and client using TCP and network file system. This method causes some problems for example, an increase in CPU usage and difficulty in exception handling, etc. In this paper, we implement a log processing message layer that can deal with asynchronous distributed processing using open source messaging system such as kafka, RabbitMQ and compare this layer with existing log transmission method. A log simulator was implemented to compare the transmission bandwidth and CPU usage. Test results show that the transmission using the message layer has higher performance than the transmission using the message layer, and the CPU usage does not show any significant difference The message layer can be implemented more easily than the conventional method and the efficiency is higher than that of the conventional method.