Essays about: "System logs"
Showing result 1 - 5 of 133 essays containing the words System logs.
-
1. Data analysis for predictive maintenance and potential challenges associated with the technology integration of steel industry machines.
University essay from Högskolan i Gävle/ElektronikAbstract : The recharge is the focus of data analysis of the different situations with the integration of the system and development of the two-stage 2/2 proportional cartridge valve for the steel industry machine. Using the statistical analysis technique to visualize the valve signal data behavior identify the accuracy of the machine data and apply the statistical feature extracting model using classification and clustering algorithms of real-time data analysis for the manufacturing. READ MORE
-
2. Towards Automated Log Message Embeddings for Anomaly Detection
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Log messages are implemented by developers to record important runtime information about a system. For that reason, system logs can provide insight into the state and health of a system and potentially be used to anticipate and discover errors. READ MORE
-
3. Log Frequency Analysis for Anomaly Detection in Cloud Environments
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE
-
4. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View
University essay from Uppsala universitet/DatorteknikAbstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE
-
5. Characterizing the performance of a Real-Timesystem with task execution times
University essay from Uppsala universitet/Institutionen för elektroteknikAbstract : The purpose of this project work was to assist Hitachi Energy by analyzingdata logs from their MACH control system. The system itself operates athigh speeds, resulting in a huge amount of data each second. By writingtwo scripts in Python, statistical analysis was applied to the data followedby comparisons across multiple data logs. READ MORE