Performing Complex Searches and Reporting on Application Log Files

2010 ◽  
pp. 181-210
Keyword(s):  
2021 ◽  
Vol 11 (13) ◽  
pp. 5944
Author(s):  
Gunwoo Lee ◽  
Jongpil Jeong

Semiconductor equipment consists of a complex system in which numerous components are organically connected and controlled by many controllers. EventLog records all the information available during system processes. Because the EventLog records system runtime information so developers and engineers can understand system behavior and identify possible problems, it is essential for engineers to troubleshoot and maintain it. However, because the EventLog is text-based, complex to view, and stores a large quantity of information, the file size is very large. For long processes, the log file comprises several files, and engineers must look through many files, which makes it difficult to find the cause of the problem and therefore, a long time is required for the analysis. In addition, if the file size of the EventLog becomes large, the EventLog cannot be saved for a prolonged period because it uses a large amount of hard disk space on the CTC computer. In this paper, we propose a method to reduce the size of existing text-based log files. Our proposed method saves and visualizes text-based EventLogs in DB, making it easier to approach problems than the existing text-based analysis. We will confirm the possibility and propose a method that makes it easier for engineers to analyze log files.


Author(s):  
Jozef Kapusta ◽  
Michal Munk ◽  
Dominik Halvoník ◽  
Martin Drlík

If we are talking about user behavior analytics, we have to understand what the main source of valuable information is. One of these sources is definitely a web server. There are multiple places where we can extract the necessary data. The most common ways are to search for these data in access log, error log, custom log files of web server, proxy server log file, web browser log, browser cookies etc. A web server log is in its default form known as a Common Log File (W3C, 1995) and keeps information about IP address; date and time of visit; ac-cessed and referenced resource. There are standardized methodologies which contain several steps leading to extract new knowledge from provided data. Usu-ally, the first step is in each one of them to identify users, users’ sessions, page views, and clickstreams. This process is called pre-processing. Main goal of this stage is to receive unprocessed web server log file as input and after processing outputs meaningful representations which can be used in next phase. In this pa-per, we describe in detail user session identification which can be considered as most important part of data pre-processing. Our paper aims to compare the us-er/session identification using the STT with the identification of user/session us-ing cookies. This comparison was performed concerning the quality of the se-quential rules generated, i.e., a comparison was made regarding generation useful, trivial and inexplicable rules.


2017 ◽  
Vol 3 (2) ◽  
pp. 735-738
Author(s):  
Wolfgang Doneit ◽  
Jana Lohse ◽  
Kristina Glesing ◽  
Clarissa Simon ◽  
Monika Fischer ◽  
...  

AbstractIn the project I-CARE a technical system for tablet devices is developed that captures the personal needs and skills of people with dementia. The system provides activation content such as music videos, biographical photographs and quizzes on various topics of interest to people with dementia, their families and professional caregivers. To adapt the system, the activation content is adjusted to the daily condition of individual users. For this purpose, emotions are automatically detected through facial expressions, motion, and voice. The daily interactions of the users with the tablet devices are documented in log files which can be merged into an event list. In this paper, we propose an advanced format for event lists and a data analysis strategy. A transformation scheme is developed in order to obtain datasets with features and time series for popular methods of data mining. The proposed methods are applied to analysing the interactions of people with dementia with the I-CARE tablet device. We show how the new format of event lists and the innovative transformation scheme can be used to compress the stored data, to identify groups of users, and to model changes of user behaviour. As the I-CARE user studies are still ongoing, simulated benchmark log files are applied to illustrate the data mining strategy. We discuss possible solutions to challenges that appear in the context of I-CARE and that are relevant to a broad range of applications.


2017 ◽  
Vol 2017 ◽  
pp. 1-4
Author(s):  
Vojtech Vigner ◽  
Jaroslav Roztocil

Comparison of high-performance time scales generated by atomic clocks in laboratories of time and frequency metrology is usually performed by means of the Common View method. Laboratories are equipped with specialized GNSS receivers which measure the difference between a local time scale and a time scale of the selected satellite. Every receiver generates log files in CGGTTS data format to record measured differences. In order to calculate time differences recorded by two receivers, it is necessary to obtain these logs from both receivers and process them. This paper deals with automation and speeding up of these processes.


2014 ◽  
Vol 489 ◽  
pp. 012068 ◽  
Author(s):  
Sankar Arumugam ◽  
Aitang Xing ◽  
Claire Pagulayan ◽  
Lois Holloway
Keyword(s):  

Open Praxis ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 469
Author(s):  
Judy Corinne Noeline Pullenayegem ◽  
K. Radhika M. De Silva ◽  
Buddhini Gayathri Jayatilleke

This paper presents the results of a study conducted to ascertain the extent to which participants studying in an open and distance learning context utilized the mediation tools provided in an Advanced Writing Skills course, conducted in a blended-learning mode in Sri Lanka. Sixty-four participants engaged in the online component of the writing course using the Process Approach. The course consisted of seven sessions; four addressing the stages of the Process Approach to writing an essay, and three practice sessions. Data were gathered from log-files of the Learning Management System, questionnaires, and interviews related to five mediation tools provided to learners. The data were analyzed utilizing Engeström’s activity theory framework (1987); with focus on the contradictions that emerged in the use of each tool. First, the contradictions that emerged in participants’ engagement with the tools is presented, secondly, the factors that need to be taken into account to ensure greater engagement.


Sign in / Sign up

Export Citation Format

Share Document