Essays about: "Log Mining"

Showing result 1 - 5 of 13 essays containing the words Log Mining.

  1. 1. AI/ML Development for RAN Applications : Deep Learning in Log Event Prediction

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yuxin Sun; [2023]
    Keywords : LSTM; Anomaly Detection; Failure Prediction; Log Mining; Deep Learning; LSTM; Anomali Detection; Failure Prediction; Log Mining; Deep Learning;

    Abstract : Since many log tracing application and diagnostic commands are now available on nodes at base station, event log can easily be collected, parsed and structured for network performance analysis. In order to improve In Service Performance of customer network, a sequential machine learning model can be trained, test, and deployed on each node to learn from the past events to predict future crashes or a failure. READ MORE

  2. 2. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Ekblom; Jacob Karlén; [2023]
    Keywords : process mining; workflow mining; data mining; radiology; PACS;

    Abstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE

  3. 3. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Arvid Bergman Thörn; [2023]
    Keywords : Business Process Management; Imperative modelling; Declarative constraints; Conformance checking; Process querying; Process Mining;

    Abstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE

  4. 4. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE

  5. 5. Variations in depositional environments of the Paleogene Firkanten Formation across Adventdalen, from Operafjellet to Breinosa

    University essay from Göteborgs universitet/Institutionen för geovetenskaper

    Author : Anna Stella Guðmundsdóttir; [2021-03-18]
    Keywords : ;

    Abstract : The lowermost Paleogene clastic infill of the Central Spitsbergen Tertiary Basin, the coal bearing Firkanten Formation, has been the subject of study for researchers in the past but little focus has been on the northeast edge of the basin until now. Due to the economic potential of the coal seams in the formation, the Norwegian mining company, Store Norske Spitsbergen Grubekompani (SNSG), has for several years conducted core drilling in key locations in basin, and for decades, they have given an access to their core material to researchers. READ MORE