Essays about: "log file"

Showing result 11 - 15 of 36 essays containing the words log file.

  1. 11. Advanced Algorithms for Classification and Anomaly Detection on Log File Data : Comparative study of different Machine Learning Approaches

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Filip Wessman; [2021]
    Keywords : Machine Learning ML ; K-Means; Principal Component Analysis PCA ; XGBoost; Log data; Anomaly Detection; Outlier Detection; Clustering.;

    Abstract : Background: A problematic area in today’s large scale distributed systems is the exponential amount of growing log data. Finding anomalies by observing and monitoring this data with manual human inspection methods becomes progressively more challenging, complex and time consuming. This is vital for making these systems available around-the-clock. READ MORE

  2. 12. NB-IoT Coverage : Development of a measuring instrument for NB-IoT

    University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)

    Author : Albin Blom; [2021]
    Keywords : NB-IoT; Mobile; IoT;

    Abstract : This report is an exposition of the development of a measuring instrument whosetask is to map the physical coverage of the NB-IoT network. The measuringinstrument was developed on TietoEvry's initiative, as it was in their interest to obtaina measuring instrument that can be used to map the coverage in parts of VarmlandsNB-IoT network. READ MORE

  3. 13. Evaluation of text classification techniques for log file classification

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Per Olin; [2020]
    Keywords : Text classification; machine learning; NLP; natural language processing; log file; doc2vec; CNN; LSTM; LSTM-CNN;

    Abstract : System log files are filled with logged events, status codes, and other messages. By analyzing the log files, the systems current state can be determined, and find out if something during its execution went wrong. READ MORE

  4. 14. Forensic Analysis of the Nintendo Switch

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jelle van den Berg; Filip Lagerholm; [2020]
    Keywords : Nintendo Switch; forensic analysis; hardware vulnerability; network capture;

    Abstract : In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. READ MORE

  5. 15. DETECTION of INFRASTRUCTURE ANOMALIES in BUILD LOGS USING MACHINE LEARNINGText classification on Continous Integration log files.

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Didrik Lindqvist; [2019]
    Keywords : ;

    Abstract : Continuous integration is a practice where software developers integrate their code to a bigger codebase multiple times per day. Before the integration, the code is built and tested by e.g open source build tools such as Jenkins, and the information produced during this process is stored in a log file. READ MORE