In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In...In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level.展开更多
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe...With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.展开更多
With the rapid growth of E-logistics in the global logistics industry,it is important to get insight into E-logistics system in Chinese logistics industry.Regarding the current situation of E-logistics of Chinese logi...With the rapid growth of E-logistics in the global logistics industry,it is important to get insight into E-logistics system in Chinese logistics industry.Regarding the current situation of E-logistics of Chinese logistics industry,there are still many problems to be concerned and resolved.This paper will review the concepts and theoretical background of E-logistics System from previous researches.After acknowledging the essential issues on E-logistics System,a research model is designed and tested based on the Theory Acceptance Model.This research aims to provide theoretical and practical contributions for Chinese logistics companies to enhance understanding on E-logistics System.It also provides some useful theoretical implication and practical guidelines for the development of E-logistics System in Chinese logistics industry.展开更多
In recent years, as the exploration practices extend into more complicated formations, conventional well log interpretation has often shown its inaccuracy and limitations in identifying hydrocarbons. The Permian Wuton...In recent years, as the exploration practices extend into more complicated formations, conventional well log interpretation has often shown its inaccuracy and limitations in identifying hydrocarbons. The Permian Wutonggou Formation hosts typical clastic reservoirs in the Eastern Junggar Basin. The sophisticated lithology characteristics cause complex pore structures and fluid properties. These all finally cause low well testing agreement rate using conventional methods. Eleven years' recent statistics show that 12 out of 15 water layers have been incorrectly identified as being oil or oil/water layers by conventional well log interpretation. This paper proposes a methodology called intelligent prediction and identification system (IPIS). Firstly, parameters reflecting lithological, petrophysical and electrical responses which are greatly related to reservoir fluids have been selected carefully. They are shale content (Vsh), numbered rock type (RN), porosity (φ), permeability (K), true resistivity (RT) and spontaneous-potential (SP). Secondly, Vsh, φ and K are predicted from well logs through artificial neural networks (ANNs). Finally, all the six parameters are input into a neuro-fuzzy inference machine (NFIM) to get fluids identification results. Eighteen new layers of 145.3 m effective thickness were examined by IPIS. There is full agreement with well testing results. This shows the system's accuracy and effectiveness.展开更多
Search logs in a timely and efficient manner are an important part of SRE (Site Reliability Engineer). Logs help us solve the problems during our development work. In this paper, we will introduce you a way how to bui...Search logs in a timely and efficient manner are an important part of SRE (Site Reliability Engineer). Logs help us solve the problems during our development work. In this paper, we will introduce you a way how to build an efficient logs analysis system based on kafka and Elastic Search. We hope you can learn something through the iteration of the Version and get some inspiration with your own log analysis system.展开更多
Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehous...Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehouse and OLAP to explore workflow logs and create complex analysis reports for enterprise performance measurement is proposed. Three key points of this scheme are studied: 1) the measure set; 2) the open and flexible architecture for workflow logs analysis system; 3) the data models in WFMS and data warehouse. A case study that shows the validity of the scheme is also provided.展开更多
With the rapid development of the Internet,many enterprises have launched their network platforms.When users browse,search,and click the products of these platforms,most platforms will keep records of these network be...With the rapid development of the Internet,many enterprises have launched their network platforms.When users browse,search,and click the products of these platforms,most platforms will keep records of these network behaviors,these records are often heterogeneous,and it is called log data.To effectively to analyze and manage these heterogeneous log data,so that enterprises can grasp the behavior characteristics of their platform users in time,to realize targeted recommendation of users,increase the sales volume of enterprises’products,and accelerate the development of enterprises.Firstly,we follow the process of big data collection,storage,analysis,and visualization to design the system,then,we adopt HDFS storage technology,Yarn resource management technology,and gink load balancing technology to build a Hadoop cluster to process the log data,and adopt MapReduce processing technology and data warehouse hive technology analyze the log data to obtain the results.Finally,the obtained results are displayed visually,and a log data analysis system is successfully constructed.It has been proved by practice that the system effectively realizes the collection,analysis and visualization of log data,and can accurately realize the recommendation of products by enterprises.The system is stable and effective.展开更多
Many locations with concentrated hydrates at vents have confirmed the presence of abundant thermogenic gas in the middle of the Qiongdongnan Basin(QDNB).However,the impact of deep structures on gasbearing fluids migra...Many locations with concentrated hydrates at vents have confirmed the presence of abundant thermogenic gas in the middle of the Qiongdongnan Basin(QDNB).However,the impact of deep structures on gasbearing fluids migration and gas hydrates distribution in tectonically inactive regions is still unclear.In this study,the authors apply high-resolution 3D seismic and logging while drilling(LWD)data from the middle of the QDNB to investigate the influence of deep-large faults on gas chimneys and preferred gasescape pipes.The findings reveal the following:(1)Two significant deep-large faults,F1 and F2,developed on the edge of the Songnan Low Uplift,control the dominant migration of thermogenic hydrocarbons and determine the initial locations of gas chimneys.(2)The formation of gas chimneys is likely related to fault activation and reactivation.Gas chimney 1 is primarily arises from convergent fluid migration resulting from the intersection of the two faults,while the gas chimney 2 benefits from a steeper fault plane and shorter migration distance of fault F2.(3)Most gas-escape pipes are situated near the apex of the two faults.Their reactivations facilitate free gas flow into the GHSZ and contribute to the formation of fracture‐filling hydrates.展开更多
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq...This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.展开更多
Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points.These logs are valuable for analyzing performance issues and understanding th...Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points.These logs are valuable for analyzing performance issues and understanding the status of the system.Anomaly detection plays an important role in service management and system maintenance,and guarantees the reliability and security of online systems.Logs are universal semi-structured data,which causes difficulties for traditional manual detection and pattern-matching algorithms.While some deep learning algorithms utilize neural networks to detect anomalies,these approaches have an over-reliance on manually designed features,resulting in the effectiveness of anomaly detection depending on the quality of the features.At the same time,the aforementioned methods ignore the underlying contextual information present in adjacent log entries.We propose a novel model called Logformer with two cascaded transformer-based heads to capture latent contextual information from adjacent log entries,and leverage pre-trained embeddings based on logs to improve the representation of the embedding space.The proposed model achieves comparable results on HDFS and BGL datasets in terms of metric accuracy,recall and F1-score.Moreover,the consistent rise in F1-score proves that the representation of the embedding spacewith pre-trained embeddings is closer to the semantic information of the log.展开更多
In order to optimize the wood internal quality detection and evaluation system and improve the comprehensive utilization rate of wood,this paper invented a set of log internal defect detection and visualization system...In order to optimize the wood internal quality detection and evaluation system and improve the comprehensive utilization rate of wood,this paper invented a set of log internal defect detection and visualization system by using the ultrasonic dry coupling agent method.The detection and visualization analysis of internal log defects were realized through log specimen test.The main conclusions show that the accuracy,reliability and practicability of the system for detecting the internal defects of log specimens have been effectively verified.The system can make the edge of the detected image smooth by interpolation algorithm,and the edge detection algorithm can be used to detect and reflect the location of internal defects of logs accurately.The content mentioned above has good application value for meeting the requirement of increasing demand for wood resources and improving the automation level of wood nondestructive testing instruments.展开更多
In this paper we have developed a data logging and monitoring system, we validated the system by comparing the result from it with the existing one and found that the system performs slightly better than the existing ...In this paper we have developed a data logging and monitoring system, we validated the system by comparing the result from it with the existing one and found that the system performs slightly better than the existing work in the same area. This implies that the data logger and monitoring system is good and can be used to monitor solar energy variables even at the comfort of our homes. We fitted a model to the generated data and found that the meteorological variables considered accounted for 99.88% of the power output in the rainy seasons while 0.12% of the variation was not explained due to other factors. Solar panels inclined at an angle of 5° (Tilt) and facing South Pole perform optimally.展开更多
One particular challenge for large‑scale software systems is anomaly detection.System logs are a straightforward and common source of information for anomaly detection.Existing log‑based anomaly detectors are unusable...One particular challenge for large‑scale software systems is anomaly detection.System logs are a straightforward and common source of information for anomaly detection.Existing log‑based anomaly detectors are unusable in real‑world industrial systems due to high false‑positive rates.In this paper,we incorporate human feedback to adjust the detection model structure to reduce false positives.We apply our approach to two industrial large‑scale systems.Results have shown that our approach performs much better than state‑of‑the-art works with 50%higher accuracy.Besides,human feedback can reduce more than 70%of false positives and greatly improve detection precision.展开更多
In the paper, the problem of storing and replaying of HTTP requests to websites in order to improve their debugging efficiency during development and further support is considered. To solve this problem, the automatic...In the paper, the problem of storing and replaying of HTTP requests to websites in order to improve their debugging efficiency during development and further support is considered. To solve this problem, the automatic HTTP requests logging and replaying subsystem Dagger that provides storage and playback of the requests sent to a website, which is developed by CMS (content management system) Plone means, is offered. The subsystem consists of the three components: Detector, Logger and Player. Detector detects filters user's requests, creates a log and sends it to Logger. Logger is a daemon program that stores logs of user's work with a website. The logs are stored in the files in one of the supported formats: JSON, CSV, PICKLE. Player replays the GET and POST HTTP requests that users sent to a server.展开更多
The TRU-Vision system,developed by Baker Hughes,analyzes the gas extracted from drilling mud to estimate the hydrocarbons composition in drilled rock formations.Several separation processes had been surveyed in order ...The TRU-Vision system,developed by Baker Hughes,analyzes the gas extracted from drilling mud to estimate the hydrocarbons composition in drilled rock formations.Several separation processes had been surveyed in order to enhance the gas extraction at the gas trap,namely,mechanical stirring,vacuum,air sparging,membrane separation processes,ultrasounds,and cyclones.Mechanical stirring devices(one propeller,one flat-blade turbine,and two baffles sets),a vacuum generator,and an air bubble generator were designed and assembled to increase the efficiency and the response stability of TRU-Vision system.展开更多
Cloud applications are implemented on top of different distributed systems to provide online service.A service request is decomposed into multiple sub-tasks,which are dispatched to different distributed systems compon...Cloud applications are implemented on top of different distributed systems to provide online service.A service request is decomposed into multiple sub-tasks,which are dispatched to different distributed systems components.For cloud providers,monitoring the execution of a service request is crucial to promptly find problems that may compromise cloud availability.In this paper,we present AgamottoEye,to automatically construct request flow from existing logs.AgamottoEye addresses the challenges of analyzing interleaved log instances,and can successfully extract request flow spread across multiple distributed systems.Our experiments with Hadoop2/YARN show that AgamottoEye can analyze 25,050 log instances in 57.4s,and the extracted request flow information is helpful with error detection and diagnosis.展开更多
基金supported by the NSFC(Grant Nos.92046001,61962009)JSPS KAKENHI Grant Number JP20F20080+3 种基金the Natural Science Foundation of Inner Mongolia(2021MS06006)Baotou Kundulun District Science and technology plan project(YF2020013)Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020)the Scientific Research Foundation of North China University of Technology.
文摘In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level.
基金This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202101)NSFC(Grant Nos.62176273,61962009,U1936216)+3 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(No.2019BDKFJJ010,2019BDKFJJ014)the Fundamental Research Funds for Beijing Municipal Commission of Education,Beijing Urban Governance Research Base of North China University of Technology,the Natural Science Foundation of Inner Mongolia(2021MS06006)Baotou Kundulun District Science and technology plan project(YF2020013)Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020).
文摘With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others.
基金Supported by Youth Fellowship Training Program(12myQP06)
文摘With the rapid growth of E-logistics in the global logistics industry,it is important to get insight into E-logistics system in Chinese logistics industry.Regarding the current situation of E-logistics of Chinese logistics industry,there are still many problems to be concerned and resolved.This paper will review the concepts and theoretical background of E-logistics System from previous researches.After acknowledging the essential issues on E-logistics System,a research model is designed and tested based on the Theory Acceptance Model.This research aims to provide theoretical and practical contributions for Chinese logistics companies to enhance understanding on E-logistics System.It also provides some useful theoretical implication and practical guidelines for the development of E-logistics System in Chinese logistics industry.
基金financially supported by the National Science and Technology Major Demonstration Project 19 (2011ZX05062-008)
文摘In recent years, as the exploration practices extend into more complicated formations, conventional well log interpretation has often shown its inaccuracy and limitations in identifying hydrocarbons. The Permian Wutonggou Formation hosts typical clastic reservoirs in the Eastern Junggar Basin. The sophisticated lithology characteristics cause complex pore structures and fluid properties. These all finally cause low well testing agreement rate using conventional methods. Eleven years' recent statistics show that 12 out of 15 water layers have been incorrectly identified as being oil or oil/water layers by conventional well log interpretation. This paper proposes a methodology called intelligent prediction and identification system (IPIS). Firstly, parameters reflecting lithological, petrophysical and electrical responses which are greatly related to reservoir fluids have been selected carefully. They are shale content (Vsh), numbered rock type (RN), porosity (φ), permeability (K), true resistivity (RT) and spontaneous-potential (SP). Secondly, Vsh, φ and K are predicted from well logs through artificial neural networks (ANNs). Finally, all the six parameters are input into a neuro-fuzzy inference machine (NFIM) to get fluids identification results. Eighteen new layers of 145.3 m effective thickness were examined by IPIS. There is full agreement with well testing results. This shows the system's accuracy and effectiveness.
文摘Search logs in a timely and efficient manner are an important part of SRE (Site Reliability Engineer). Logs help us solve the problems during our development work. In this paper, we will introduce you a way how to build an efficient logs analysis system based on kafka and Elastic Search. We hope you can learn something through the iteration of the Version and get some inspiration with your own log analysis system.
文摘Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, a novel scheme that uses the technology of data warehouse and OLAP to explore workflow logs and create complex analysis reports for enterprise performance measurement is proposed. Three key points of this scheme are studied: 1) the measure set; 2) the open and flexible architecture for workflow logs analysis system; 3) the data models in WFMS and data warehouse. A case study that shows the validity of the scheme is also provided.
基金supported by the Huaihua University Science Foundation under Grant HHUY2019-24.
文摘With the rapid development of the Internet,many enterprises have launched their network platforms.When users browse,search,and click the products of these platforms,most platforms will keep records of these network behaviors,these records are often heterogeneous,and it is called log data.To effectively to analyze and manage these heterogeneous log data,so that enterprises can grasp the behavior characteristics of their platform users in time,to realize targeted recommendation of users,increase the sales volume of enterprises’products,and accelerate the development of enterprises.Firstly,we follow the process of big data collection,storage,analysis,and visualization to design the system,then,we adopt HDFS storage technology,Yarn resource management technology,and gink load balancing technology to build a Hadoop cluster to process the log data,and adopt MapReduce processing technology and data warehouse hive technology analyze the log data to obtain the results.Finally,the obtained results are displayed visually,and a log data analysis system is successfully constructed.It has been proved by practice that the system effectively realizes the collection,analysis and visualization of log data,and can accurately realize the recommendation of products by enterprises.The system is stable and effective.
基金supported by the National Natural Science Foundation of China(42376221,42276083)Director Research Fund Project of Guangzhou Marine Geological Survey(2023GMGSJZJJ00030)+2 种基金National Key Research and Development Program of China(2021YFC2800901)Guangdong Major Project of Basic and Applied Basic Research(2020B030103003)the project of the China Geological Survey(DD20230064).
文摘Many locations with concentrated hydrates at vents have confirmed the presence of abundant thermogenic gas in the middle of the Qiongdongnan Basin(QDNB).However,the impact of deep structures on gasbearing fluids migration and gas hydrates distribution in tectonically inactive regions is still unclear.In this study,the authors apply high-resolution 3D seismic and logging while drilling(LWD)data from the middle of the QDNB to investigate the influence of deep-large faults on gas chimneys and preferred gasescape pipes.The findings reveal the following:(1)Two significant deep-large faults,F1 and F2,developed on the edge of the Songnan Low Uplift,control the dominant migration of thermogenic hydrocarbons and determine the initial locations of gas chimneys.(2)The formation of gas chimneys is likely related to fault activation and reactivation.Gas chimney 1 is primarily arises from convergent fluid migration resulting from the intersection of the two faults,while the gas chimney 2 benefits from a steeper fault plane and shorter migration distance of fault F2.(3)Most gas-escape pipes are situated near the apex of the two faults.Their reactivations facilitate free gas flow into the GHSZ and contribute to the formation of fracture‐filling hydrates.
基金supported by National Science Foundation of China (61102102, 11134011, 11204380 and 11374371)Major National Science and Technology Projects (2011ZX05020-002)+2 种基金PetroChina Innovation Foundation (2014D-5006-0307)Science and Technology Project of CNPC (2014A-3912 and 2011B-4001)the Foundation of China University of Petroleum (KYJJ2012-05-07)
文摘This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels.
基金supported by the National Natural Science Foundation of China (Nos.62072074,62076054,62027827,61902054,62002047)the Frontier Science and Technology Innovation Projects of National Key R&D Program (No.2019QY1405)+1 种基金the Sichuan Science and Technology Innovation Platform and Talent Plan (No.2020TDT00020)the Sichuan Science and Technology Support Plan (No.2020YFSY0010).
文摘Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points.These logs are valuable for analyzing performance issues and understanding the status of the system.Anomaly detection plays an important role in service management and system maintenance,and guarantees the reliability and security of online systems.Logs are universal semi-structured data,which causes difficulties for traditional manual detection and pattern-matching algorithms.While some deep learning algorithms utilize neural networks to detect anomalies,these approaches have an over-reliance on manually designed features,resulting in the effectiveness of anomaly detection depending on the quality of the features.At the same time,the aforementioned methods ignore the underlying contextual information present in adjacent log entries.We propose a novel model called Logformer with two cascaded transformer-based heads to capture latent contextual information from adjacent log entries,and leverage pre-trained embeddings based on logs to improve the representation of the embedding space.The proposed model achieves comparable results on HDFS and BGL datasets in terms of metric accuracy,recall and F1-score.Moreover,the consistent rise in F1-score proves that the representation of the embedding spacewith pre-trained embeddings is closer to the semantic information of the log.
文摘In order to optimize the wood internal quality detection and evaluation system and improve the comprehensive utilization rate of wood,this paper invented a set of log internal defect detection and visualization system by using the ultrasonic dry coupling agent method.The detection and visualization analysis of internal log defects were realized through log specimen test.The main conclusions show that the accuracy,reliability and practicability of the system for detecting the internal defects of log specimens have been effectively verified.The system can make the edge of the detected image smooth by interpolation algorithm,and the edge detection algorithm can be used to detect and reflect the location of internal defects of logs accurately.The content mentioned above has good application value for meeting the requirement of increasing demand for wood resources and improving the automation level of wood nondestructive testing instruments.
文摘In this paper we have developed a data logging and monitoring system, we validated the system by comparing the result from it with the existing one and found that the system performs slightly better than the existing work in the same area. This implies that the data logger and monitoring system is good and can be used to monitor solar energy variables even at the comfort of our homes. We fitted a model to the generated data and found that the meteorological variables considered accounted for 99.88% of the power output in the rainy seasons while 0.12% of the variation was not explained due to other factors. Solar panels inclined at an angle of 5° (Tilt) and facing South Pole perform optimally.
基金ZTE Industry-University-Institute Cooperation Funds under Grant No.20200492.
文摘One particular challenge for large‑scale software systems is anomaly detection.System logs are a straightforward and common source of information for anomaly detection.Existing log‑based anomaly detectors are unusable in real‑world industrial systems due to high false‑positive rates.In this paper,we incorporate human feedback to adjust the detection model structure to reduce false positives.We apply our approach to two industrial large‑scale systems.Results have shown that our approach performs much better than state‑of‑the-art works with 50%higher accuracy.Besides,human feedback can reduce more than 70%of false positives and greatly improve detection precision.
文摘In the paper, the problem of storing and replaying of HTTP requests to websites in order to improve their debugging efficiency during development and further support is considered. To solve this problem, the automatic HTTP requests logging and replaying subsystem Dagger that provides storage and playback of the requests sent to a website, which is developed by CMS (content management system) Plone means, is offered. The subsystem consists of the three components: Detector, Logger and Player. Detector detects filters user's requests, creates a log and sends it to Logger. Logger is a daemon program that stores logs of user's work with a website. The logs are stored in the files in one of the supported formats: JSON, CSV, PICKLE. Player replays the GET and POST HTTP requests that users sent to a server.
文摘The TRU-Vision system,developed by Baker Hughes,analyzes the gas extracted from drilling mud to estimate the hydrocarbons composition in drilled rock formations.Several separation processes had been surveyed in order to enhance the gas extraction at the gas trap,namely,mechanical stirring,vacuum,air sparging,membrane separation processes,ultrasounds,and cyclones.Mechanical stirring devices(one propeller,one flat-blade turbine,and two baffles sets),a vacuum generator,and an air bubble generator were designed and assembled to increase the efficiency and the response stability of TRU-Vision system.
文摘Cloud applications are implemented on top of different distributed systems to provide online service.A service request is decomposed into multiple sub-tasks,which are dispatched to different distributed systems components.For cloud providers,monitoring the execution of a service request is crucial to promptly find problems that may compromise cloud availability.In this paper,we present AgamottoEye,to automatically construct request flow from existing logs.AgamottoEye addresses the challenges of analyzing interleaved log instances,and can successfully extract request flow spread across multiple distributed systems.Our experiments with Hadoop2/YARN show that AgamottoEye can analyze 25,050 log instances in 57.4s,and the extracted request flow information is helpful with error detection and diagnosis.