To see the other types of publications on this topic, follow the link: Log data.

Dissertations / Theses on the topic 'Log data'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Log data.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Olsson, Jakob, and Viktor Yberg. "Log data filtering in embedded sensor devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175367.

Full text
Abstract:
Data filtering is the disposal of unnecessary data in a data set, to save resources such as server capacity and bandwidth. The method is used to reduce the amount of stored data and thereby prevent valuable resources from processing insignificant information.The purpose of this thesis is to find algorithms for data filtering and to find out which algorithm gives the best effect in embedded devices with resource limitations. This means that the algorithm needs to be resource efficient in terms of memory usage and performance, while saving enough data points to avoid modification or loss of info
APA, Harvard, Vancouver, ISO, and other styles
2

Kurtz, Aaron D. "Determining Mineralogy from Traditional Well Log Data." Marietta College Honors Theses / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=marhonors1366902854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eriksson, Håkan. "Clustering Generic Log Files Under Limited Data Assumptions." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189642.

Full text
Abstract:
Complex computer systems are often prone to anomalous or erroneous behavior, which can lead to costly downtime as the systems are diagnosed and repaired. One source of information for diagnosing the errors and anomalies are log files, which are often generated in vast and diverse amounts. However, the log files' size and semi-structured nature makes manual analysis of log files generally infeasible. Some automation is desirable to sift through the log files to find the source of the anomalies or errors. This project aimed to develop a generic algorithm that could cluster diverse log files in a
APA, Harvard, Vancouver, ISO, and other styles
4

Grandi, Karam Samantha 1973. "Effects of borehole stability on well log data." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/30130.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 2003.<br>Includes bibliographical references (leaves 145-150).<br>In this thesis we analyze the effects of borehole irregularities on well logs and develop methods to obtain reliable formation properties from such logs. Data from a well in eastern Venezuela are analysed. Borehole irregularities in this well consist mainly of borehole enlargements perpendicular to the borehole axis due to rock failure under high horizontal stresses. They are observed in three forms: as small scale irregula
APA, Harvard, Vancouver, ISO, and other styles
5

Winn, Matthew F. "Analysis of Red Oak Timber Defects and Associated Internal Defect Area for the Generation of Simulated Logs." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/36181.

Full text
Abstract:
Log sawing simulation computer programs can be a valuable tool for training sawyers as well as for testing different sawing patterns. Most available simulation programs rely on databases from which to draw logs and can be very costly and time-consuming to develop. In this study, a computer program was developed that can accurately generate random, artificial logs and serve as an alternative to using a log database. One major advantage of using such a program is that every log generated is unique, whereas a database is finite.<p> Real log and external defect data was obtained from the Forest
APA, Harvard, Vancouver, ISO, and other styles
6

Selig, Henny. "Continuous Event Log Extraction for Process Mining." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210710.

Full text
Abstract:
Process mining is the application of data science technologies on transactional business data to identify or monitor processes within an organization. The analyzed data often originates from process-unaware enterprise software, e.g. Enterprise Resource Planning (ERP) systems. The differences in data management between ERP and process mining systems result in a large fraction of ambiguous cases, affected by convergence and divergence. The consequence is a chasm between the process as interpreted by process mining, and the process as executed in the ERP system. In this thesis, a purchasing proce
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xiaohan. "Designing and Evaluating a Visualization System for Log Data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279586.

Full text
Abstract:
In the engineering field, log data analysis has been conducted by most companies as it has become a significant step for discovering problems and obtaining insights into the system. Visualization which brings better comprehension of data could be used as an effective and intuitive method for data analysis. This study aims at applying a participatory design approach to develop a visualization system of log data, employed with design activities including interviews, prototyping, usability testing and questionnaires in the research process, along with a comparative study on the impacts of using n
APA, Harvard, Vancouver, ISO, and other styles
8

Radley, Johannes Jurgens. "Pseudo-random access compressed archive for security log data." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.

Full text
Abstract:
We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compresse
APA, Harvard, Vancouver, ISO, and other styles
9

Lövenvald, Frans-Lukas. "FINDING ANOMALOUS TIME FRAMES IN REAL-WORLD LOG DATA." Thesis, Umeå universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-163311.

Full text
Abstract:
Anomaly detection is a huge fi€eld of research focused on the task of €finding weird or outlying points in data. Th‘is task is useful in all fi€elds that handle large amounts of data and is therefore a big topic of research. Th‘e focus of research often lies in fi€nding novel approaches for €finding anomalies in already labeled and well-understood data. ‘This thesis will not focus on a novel algorithm but instead display and discuss the power of an anomaly detection process that focuses on feature engineering and feature exploration. Th‘e thesis will also compare two unsupervised anomaly class
APA, Harvard, Vancouver, ISO, and other styles
10

Granlund, Oskar. "Unsupervised anomaly detection on log-based time series data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-265534.

Full text
Abstract:
Due to a constant increase in the number of connected devices and there is an increased demand for confidentiality, availability, and integrity on applications. This thesis was focused on unsupervised anomaly detection in data centers. It evaluates how suitable open source state-of-the-art solutions are at finding abnormal trends and patterns in log-based data streams. The methods used in this work are Principal component analysis (PCA), LogCluster, and Hierarchical temporal memory (HTM). They were evaluated using F-score on a real data set from an Apache access log. The data set was carefully
APA, Harvard, Vancouver, ISO, and other styles
11

Leibold, Markus. "Web Log Mining als Controllinginstrument der PR." [S.l. : s.n.], 2004. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11675715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Otten, Frederick John. "Using semantic knowledge to improve compression on log files." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1660/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pereira, Janaina Luiza Lobato. "Permeability prediction from well log data using multiple regression analysis." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3368.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.<br>Title from document title page. Document formatted into pages; contains xiii, 82 p. : ill. (some col.), maps. Vita. Includes abstract. Includes bibliographical references (p. 41).
APA, Harvard, Vancouver, ISO, and other styles
14

Ellingsæter, Jenny Marie, and Frode Sandholtbråten. "Algorithms and Approaches for Configuration-less Log Analysis." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9095.

Full text
Abstract:
<p>System logs contain messages from a wide range of applications. They are the natural starting point when troubleshooting a system. The usual approach for analysing system logs is to write a number of regular expressionsto match specific keywords and events. When the number of expressions grows large, the analysis solution becomes unmaintainable. In addition, the use of regular expressions requires the system administrator to have extensive knowledge of the system at hand. This thesis presents methods for performing log analysis without regular expressions. This is an area of system adminis
APA, Harvard, Vancouver, ISO, and other styles
15

Wong, Kok W. "A neural fuzzy approach for well log and hydrocyclone data interpretation." Thesis, Curtin University, 1999. http://hdl.handle.net/20.500.11937/1281.

Full text
Abstract:
A novel data analysis approach that is automatic, self-learning and self-explained, and which provides accurate and reliable results is reported. The data analysis tool is capable of performing multivariate non-parametric regression analysis, as well as quantitative inferential analysis using predictive learning. Statistical approaches such as multiple regression or discriminant analysis are usually used to perform this kind of analysis. However, they lack universal capabilities and their success in any particular application is directly affected by the problem complexity.The approach employs
APA, Harvard, Vancouver, ISO, and other styles
16

Michel, Hannes. "Visualizing audit log events at the Swedish Police Authority to facilitate its use in the judicial system." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75244.

Full text
Abstract:
Within the Swedish Police Authority, physical users’ actions within all systems that manage sensitive information, are registered and sent to an audit log. The audit log contains log entries that consist of information regarding the events that occur by the performing user. This means that the audit log continuously manages massive amounts of data which is collected, processed and stored. For the police authority, the audit log may be useful for proving a digital trail of something that has occurred. An audit log is based upon the collected data from a security log. Security logs can collect
APA, Harvard, Vancouver, ISO, and other styles
17

Ekman, Niklas. "Handling Big Data using a Distributed Search Engine : Preparing Log Data for On-Demand Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222373.

Full text
Abstract:
Big data are datasets that is very large and computational complex. With an increasing volume of data the time a trivial processing task can be challenging. Companies collects data at a fast rate but knowing what to do with the data can be hard. A search engine is a system that indexes data making it efficiently queryable by users. When a bug occurs in a computer system log data is consulted in order to understand why, but processing big log data can take a long time. The purpose of this thesis is to investigate, compare and implement a distributed search engine that can prepare log data for a
APA, Harvard, Vancouver, ISO, and other styles
18

Goel, Prateek. "Integrated system for subsurface exploration data collection and borehole log generation." Thesis, Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/20967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wong, Kok W. "A neural fuzzy approach for well log and hydrocyclone data interpretation." Curtin University of Technology, School of Electrical and Computer Engineering, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10344.

Full text
Abstract:
A novel data analysis approach that is automatic, self-learning and self-explained, and which provides accurate and reliable results is reported. The data analysis tool is capable of performing multivariate non-parametric regression analysis, as well as quantitative inferential analysis using predictive learning. Statistical approaches such as multiple regression or discriminant analysis are usually used to perform this kind of analysis. However, they lack universal capabilities and their success in any particular application is directly affected by the problem complexity.The approach employs
APA, Harvard, Vancouver, ISO, and other styles
20

Heng, Li. "A SRAM-Based Log Buffer Flash Translation Layer for Solid State Disk using Fully-Associative Sector Translation." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1232126802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shun, Yeuk Kiu. "Web mining from client side user activity log /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20SHUN.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.<br>Includes bibliographical references (leaves 85-90). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
22

Ameyaw, Debrah Eric. "UPSCALING OF WELL LOG DATA FOR A TRANSVERSE ISOTROPIC EFFECTIVE MEDIUM." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for petroleumsteknologi og anvendt geofysikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22879.

Full text
Abstract:
We develop two methods to determine; (1) net to gross and hydrocarbon saturation in a mixture of sand and shale. (2) effective properties versus tilt in sand. Backus (1962) and Schoenberg and Muir (1989) averaging are used for the horizontally layered transversely isotropic medium with vertical symmetry axis (VTI), horizontal symmetry axis (HTI) and tilted symmetry axis (TTI) test respectively. A mixture of two points representing sand and shale are picked from Intrabasalt 2 formation (North Sea data) and the effective properties and anisotropic parameters (epsilon, delta and gamma) are comput
APA, Harvard, Vancouver, ISO, and other styles
23

Rewari, Gaurav. "Parametric inversion from well log data : a performance and robustness analysis." Thesis, Massachusetts Institute of Technology, 1993. http://hdl.handle.net/1721.1/12754.

Full text
Abstract:
Thesis (Elec. E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1993.<br>Includes bibliographical references (leaves 138-139).<br>by Gaurav Rewari.<br>Elec.E.
APA, Harvard, Vancouver, ISO, and other styles
24

Alasbali, Abdulaziz Farraj. "Intrinsic and scattering attenuation from borehole seismic and well log data." Thesis, Curtin University, 2016. http://hdl.handle.net/20.500.11937/2390.

Full text
Abstract:
Seismic attenuation is a major factor affecting seismic amplitudes. It is important to understand its spatial distribution in the overburden to correctly image seismic horizons and use qualitative interpretation techniques. Presence of free gas or overpressure in reservoir can significantly increase the attenuation. This study examines the magnitudes, mechanisms and spatial distribution of seismic attenuation from VSP and log data using wells in the North West shelf of Australia and the Middle East.
APA, Harvard, Vancouver, ISO, and other styles
25

Graciolli, Vinicius Medeiros. "A novel classification method applied to well log data calibrated by ontology based core descriptions." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/174993.

Full text
Abstract:
Um método para a detecção automática de tipos litológicos e contato entre camadas foi desenvolvido através de uma combinação de análise estatística de um conjunto de perfis geofísicos de poços convencionais, calibrado por descrições sistemáticas de testemunhos. O objetivo deste projeto é permitir a integração de dados de rocha em modelos de reservatório. Os testemunhos são descritos com o suporte de um sistema de nomenclatura baseado em ontologias que formaliza extensamente uma grande gama de atributos de rocha. As descrições são armazenadas em um banco de dados relacional junto com dados de p
APA, Harvard, Vancouver, ISO, and other styles
26

Buys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Full text
Abstract:
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Fur
APA, Harvard, Vancouver, ISO, and other styles
27

Nines, Shawn D. "Predicting a detailed permeability profile from minipermeameter measurements and well log data." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1690.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2000.<br>Title from document title page. Document formatted into pages; contains ix, 111 p. : ill. (some col.), map. Includes abstract. Includes bibliographical references (p. 110-111).
APA, Harvard, Vancouver, ISO, and other styles
28

Gunnarsson, Emil. "Log In or Sign Up." Thesis, Linnéuniversitetet, Institutionen för design (DE), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96368.

Full text
Abstract:
This thesis details the theoretical framework, methods, and results of the design project “Log In or Sign up”. The result of this project is an ebook sharing the same title. It consists of short stories and poems that revolve around digital surveillance and its effects on the self and society. The writings explore how the digital sur- veillance ecosystem affects our behavior and self-image in ways that we might not even realize. The context is our digital lives in a time where we rely more and more on the internet for our daily activities. The writings attempt to portray the emo- tions we go t
APA, Harvard, Vancouver, ISO, and other styles
29

Yamane, Danilo Ricardo [UNESP]. "Nutrient diagnosis of orange crops applying compositional data analysis and machine learning techniques." Universidade Estadual Paulista (UNESP), 2018. http://hdl.handle.net/11449/180576.

Full text
Abstract:
Submitted by Danilo Ricardo Yamane (danilo_yamane@yahoo.com.br) on 2019-01-28T17:15:40Z No. of bitstreams: 1 Tese Yamane (2018).pdf: 2814108 bytes, checksum: f2e102e5809427e8d3d26d0a59971542 (MD5)<br>Approved for entry into archive by Tatiana Camila Gricio (tatiana.gricio@unesp.br) on 2019-01-28T17:32:17Z (GMT) No. of bitstreams: 1 yamane_dr_dr_jabo.pdf: 2814108 bytes, checksum: f2e102e5809427e8d3d26d0a59971542 (MD5)<br>Made available in DSpace on 2019-01-28T17:32:17Z (GMT). No. of bitstreams: 1 yamane_dr_dr_jabo.pdf: 2814108 bytes, checksum: f2e102e5809427e8d3d26d0a59971542 (MD5) Previ
APA, Harvard, Vancouver, ISO, and other styles
30

Yamane, Danilo Ricardo. "Nutrient diagnosis of orange crops applying compositional data analysis and machine learning techniques /." Jaboticabal, 2018. http://hdl.handle.net/11449/180576.

Full text
Abstract:
Orientador: Arthur Bernardes Cecílio Filho<br>Resumo: O manejo eficiente de nutrientes é crucial para atingir alta produtividade de frutos. Resultados da análise do tecido são comumente interpretados usando faixas críticas de concentração de nutrientes (CNCR) e Sistema Integrado de Diagnose e Recomendação (DRIS) em culturas de laranja. No entanto, ambos os métodos ignoram as propriedades inerentes à classe dos dados composicionais, não considerando adequadamente as interações de nutrientes e a influência varietal na composição nutricional da planta. Portanto, ferramentas eficazes de modelagem
APA, Harvard, Vancouver, ISO, and other styles
31

Björnerud, Philip. "Anomaly Detection in Log Files Using Machine Learning." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85261.

Full text
Abstract:
Logs generated by the applications, devices, and servers contain information that can be used to determine the health of the system. Manual inspection of logs is important, for example during upgrades, to determine whether the upgrade and data migration were successful. However, manual testing is not reliable enough, and manual inspection of logs is tedious and time-­consuming. In this thesis, we propose to use the machine learning techniques K­means and DBSCAN to find anomaly sequences in log files. This research also investigated two different kinds of data representation techniques, feature
APA, Harvard, Vancouver, ISO, and other styles
32

Hatzinger, Reinhold, and Walter Katzenbeisser. "Log-linear Rasch-type models for repeated categorical data with a psychobiological application." Department of Statistics and Mathematics, WU Vienna University of Economics and Business, 2008. http://epub.wu.ac.at/126/1/document.pdf.

Full text
Abstract:
The purpose of this paper is to generalize regression models for repeated categorical data based on maximizing a conditional likelihood. Some existing methods, such as those proposed by Duncan (1985), Fischer (1989), and Agresti (1993, and 1997) are special cases of this latent variable approach, used to account for dependencies in clustered observations. The generalization concerns the incorporation of rather general data structures such as subject-specific time-dependent covariates, a variable number of observations per subject and time periods of arbitrary length in order to evaluate treatm
APA, Harvard, Vancouver, ISO, and other styles
33

Yan, Jun. "Improved rock physical models for the integration of core, log and seismic data." Thesis, University of Edinburgh, 2003. http://hdl.handle.net/1842/11633.

Full text
Abstract:
In this thesis, I propose the following: - The P and S-wave velocities can provide a suitable link between reservoir parameters and rock properties using core, log and seismic data. - The pore aspect ratios as key parameters of rock geometry can be used to explain the different responses of elastic properties in clay-sand rocks (especially for thin and varying lithology formations). The use of fixed aspect ratio for physical velocity models will result in obvious errors in the prediction of elastic moduli and velocities (in particular for formations at shallow depth, or in loose and thin layer
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Wendai. "Fitting the Weibull and lognormal log-linear models to accelerated life test data." Diss., The University of Arizona, 1999. http://hdl.handle.net/10150/284924.

Full text
Abstract:
Accelerated life tests, in which more than one stress is often involved, have become widely used in today's industries to obtain the time-to-failure and reliability information at normal use conditions. Tests are conducted at higher than normal levels of stresses to shorten the test duration. A physical-statistical model is needed to extrapolate the results from test conditions to usage conditions. The generalized Weibull and lognormal log-linear models, as two general ALT families, cover almost all ALT models which are current in use in reliability engineering for this purpose. However, the d
APA, Harvard, Vancouver, ISO, and other styles
35

Ile, Charlene Omeniem Keletso. "The use of well log data in the creation of 3D geological maps." University of the Western Cape, 2021. http://hdl.handle.net/11394/8294.

Full text
Abstract:
>Magister Scientiae - MSc<br>Three-dimensional (3D) graphic representations of geographic environments have become commonplace in a range of elds. These representations are often an attempt to represent both geographic forms, as well as the relationships that exist between them. In contrast to other elds, the use of 3D geological models in the visualisation of the subsurface environment is relatively new. Additionally, these 3D geological models are traditionally created through the painstaking process of manual development methods. As such, the models developed are unable to fully uti
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Chang. "Data Analysis of Minimally-Structured Heterogeneous Logs : An experimental study of log template extraction and anomaly detection based on Recurrent Neural Network and Naive Bayes." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191334.

Full text
Abstract:
Nowadays, the ideas of continuous integration and continuous delivery are under heavy usage in order to achieve rapid software development speed and quick product delivery to the customers with good quality. During the process ofmodern software development, the testing stage has always been with great significance so that the delivered software is meeting all the requirements and with high quality, maintainability, sustainability, scalability, etc. The key assignment of software testing is to find bugs from every test and solve them. The developers and test engineers at Ericsson, who are worki
APA, Harvard, Vancouver, ISO, and other styles
37

Lobos, Cristian Marcelo Villegas. "Modelos log-Birnbaum-Saunders mistos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/45/45133/tde-05112010-114755/.

Full text
Abstract:
O objetivo principal deste trabalho é introduzir os modelos log-Birnbaum-Saunders mistos (log-BS mistos) e estender os resultados para os modelos log-Birnbaum-Saunders t-Student mistos (log-BS-t mistos). Os modelos log-BS são bastante conhecidos desde o trabalho de Rieck e Nedelman (1991) e particularmente receberam uma grande atenção nos últimos 10 anos com vários trabalhos publicados em periódicos internacionais. Contudo, o enfoque desses trabalhos tem sido em modelos log-BS ou log-BS generalizados com efeitos fixos, não havendo muita atenção para modelos com efeitos aleatórios. Inicialment
APA, Harvard, Vancouver, ISO, and other styles
38

Sköld, Martin. "Using NLP Techniques for Log Analysis to Recommend Activities For Troubleshooting Processes." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289408.

Full text
Abstract:
Continuous Integration is the practice of building and testing software every time a code change is merged into its entire codebase. At the merge, the source code is compiled, dependencies are resolved, and test cases are executed. Detecting a fault at an early stage implies that fewer resources need to be spent to find the fault since fewer merges need to be checked for errors. In this work, we analyze a dataset that comes from a Ericsson Continuous Integration flow that executes test cases daily. We create models to efficiently classify log events of interest in logs from failing test cases.
APA, Harvard, Vancouver, ISO, and other styles
39

Hanikat, Marcus. "Centralized log management for complex computer networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254292.

Full text
Abstract:
In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. In this thesis several different centralized log management systems are analyzed and evaluated to see if they match the requirements for security, performance and cost which was established. These requirements are designed to meet the stakeholder’s requirements of log management and allow for sca
APA, Harvard, Vancouver, ISO, and other styles
40

Svensson, Carl. "Automatic Log Analysis System Integration : Message Bus Integration in a Machine Learning Environment." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168837.

Full text
Abstract:
Ericsson is one of the world's largest providers of communications technology and services. Reliable networks are important to deliver services that live up to customers' expectations. Tests are frequently run on Ericsson's systems in order to identify stability problems in their networks. These tests are not always completely reliable. The logs produced by these tests are gathered and analyzed to identify abnormal system behavior, especially abnormal behavior that the tests might not have caught. To automate this analysis process, a machine learning system, called the Awesome Automatic Log An
APA, Harvard, Vancouver, ISO, and other styles
41

Deakin, Mark J. W. "Integration of core and log data for petrophysical analysis of Brae conglomerates, North Sea." Thesis, Imperial College London, 1989. http://hdl.handle.net/10044/1/7475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Hartung, Gunnar Richard [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Advanced Cryptographic Techniques for Protecting Log Data / Gunnar Richard Hartung ; Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2020. http://d-nb.info/1206646683/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Ka-lun, and 李嘉麟. "Newly modified log-map algorithms for turbo codes in mobile environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31224775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Messias, Ricardo Matioli. "Transformações em dados composicionais para a aplicação da análise de componentes principais." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/45/45133/tde-12072016-211056/.

Full text
Abstract:
A análise de dados composicionais está sendo amplamente utilizada nas diversas áreas do conhecimento como por exemplo na análise de sedimentos rochosos, na comparação de diferentes células e até na análise criminalística na comparação de evidências de crimes. Durante a história da análise deste tipo de dados existiram muitos tipos de ajustes utilizados para contornar o problema da soma constante das variáveis e ainda hoje não temos um consenso de qual a melhor solução a ser utilizada. Neste trabalho, temos como objetivo a enunciação das 7 transformações que mais foram utilizadas ao longo do te
APA, Harvard, Vancouver, ISO, and other styles
45

Pabarškaitė, Židrina. "Enhancements of pre-processing, analysis and presentation techniques in web log mining." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090713_142203-05841.

Full text
Abstract:
As Internet is becoming an important part of our life, more attention is paid to the information quality and how it is displayed to the user. The research area of this work is web data analysis and methods how to process this data. This knowledge can be extracted by gathering web servers’ data – log files, where all users’ navigational patters about browsing are recorded. The research object of the dissertation is web log data mining process. General topics that are related with this object: web log data preparation methods, data mining algorithms for prediction and classification tasks, web
APA, Harvard, Vancouver, ISO, and other styles
46

Saneifar, Hassan. "Locating Information in Heterogeneous log files." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20092/document.

Full text
Abstract:
Cette thèse s'inscrit dans les domaines des systèmes Question Réponse en domaine restreint, la recherche d'information ainsi que TALN. Les systèmes de Question Réponse (QR) ont pour objectif de retrouver un fragment pertinent d'un document qui pourrait être considéré comme la meilleure réponse concise possible à une question de l'utilisateur. Le but de cette thèse est de proposer une approche de localisation de réponses dans des masses de données complexes et évolutives décrites ci-dessous.. De nos jours, dans de nombreux domaines d'application, les systèmes informatiques sont instrumentés pou
APA, Harvard, Vancouver, ISO, and other styles
47

Flodin, Anton. "Leerec : A scalable product recommendation engine suitable for transaction data." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33941.

Full text
Abstract:
We are currently living in the Internet of Things (IoT) era, which involves devices that are connected to Internet and are communicating with each other. Each year, the number of devices increases rapidly, which result in rapid growth of data that is generated. This large amount of data is sometimes titled as Big Data, which is generated from different sources, such as log data of user behavior. These log files can be collected and analyzed in different ways, such as creating product recommendations. Product recommendations have been around since the late 90s, when the amount of data collected
APA, Harvard, Vancouver, ISO, and other styles
48

Kobezak, Philip D. "Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83375.

Full text
Abstract:
Challenges exist in higher education networks with host inventory and identification. Any student, staff, faculty, or dedicated IT administrator can be the primary responsible personnel for devices on the network. Confounding the problem is that there is also a large mix of personally-owned devices. These network environments are a hybrid of corporate enterprise, federated network, and Internet service provider. This management model has survived for decades based on the ability to identify responsible personnel when a host, system, or user account is suspected to have been compromised or is d
APA, Harvard, Vancouver, ISO, and other styles
49

Brown, Alexa. "A historical perspective on wind data: time, space and vector relationships between ship log data and Cape Royal Astronomical Observatory wind data between 1834 and 1854." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24453.

Full text
Abstract:
This dissertation assesses the extent to which data from the Climatological Database for the World's Oceans (CLIWOC) reflect newly digitized historical wind data captured at the Royal Astronomical Observatory (RAO) in Cape Town, South Africa from 1834-1854. This follows the historical precipitation reconstructions for Southern Africa by Hannaford et al. (2015), using wind data from the CLIWOC database. This project also forms part of a bigger project that is recovering and digitising historical instrumental meteorological data for Southern Africa that have never been analysed before. For South
APA, Harvard, Vancouver, ISO, and other styles
50

Olumide, Babajide Adelekan. "Characterization of the Germania Spraberry unit from analog studies and cased-hole neutron log data." Thesis, Texas A&M University, 2004. http://hdl.handle.net/1969.1/2795.

Full text
Abstract:
The need for characterization of the Germania unit has emerged as a first step in the review, understanding and enhancement of the production practices applicable within the unit and the trend area in general. Petrophysical characterization of the Germania Spraberry units requires a unique approach for a number of reasons ?? limited core data, lack of modern log data and absence of directed studies within the unit. In the absence of the afore mentioned resources, an approach that will rely heavily on previous petrophysical work carried out in the neighboring ET O??Daniel unit (6.2 miles away),
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!