期刊文献+
共找到1,335篇文章
< 1 2 67 >
每页显示 20 50 100
System log isolation for containers
1
作者 Kun WANG Song WU +3 位作者 Yanxiang CUI Zhuo HUANG Hao FAN Hai JIN 《Frontiers of Computer Science》 2025年第5期1-11,共11页
Container-based virtualization is increasingly popular in cloud computing due to its efficiency and flexibility.Isolation is a fundamental property of containers and weak isolation could cause significant performance ... Container-based virtualization is increasingly popular in cloud computing due to its efficiency and flexibility.Isolation is a fundamental property of containers and weak isolation could cause significant performance degradation and security vulnerability.However,existing works have almost not discussed the isolation problems of system log which is critical for monitoring and maintenance of containerized applications.In this paper,we present a detailed isolation analysis of system log in current container environment.First,we find several system log isolation problems which can cause significant impacts on system usability,security,and efficiency.For example,system log accidentally exposes information of host and co-resident containers to one container,causing information leakage.Second,we reveal that the root cause of these isolation problems is that containers share the global log configuration,the same log storage,and the global log view.To address these problems,we design and implement a system named private logs(POGs).POGs provides each container with its own log configuration and stores logs individually for each container,avoiding log configuration and storage sharing,respectively.In addition,POGs enables private log view to help distinguish which container the logs belong to.The experimental results show that POGs can effectively enhance system log isolation for containers with negligible performance overhead. 展开更多
关键词 container isolation system log cgroup NAMESPACE cloud computing
原文传递
Feedback⁃Aware Anomaly Detection Through Logs for Large⁃Scale Software Systems
2
作者 HAN Jing JIA Tong +2 位作者 WU Yifan HOU Chuanjia LI Ying 《ZTE Communications》 2021年第3期88-94,共7页
One particular challenge for large‑scale software systems is anomaly detection.System logs are a straightforward and common source of information for anomaly detection.Existing log‑based anomaly detectors are unusable... One particular challenge for large‑scale software systems is anomaly detection.System logs are a straightforward and common source of information for anomaly detection.Existing log‑based anomaly detectors are unusable in real‑world industrial systems due to high false‑positive rates.In this paper,we incorporate human feedback to adjust the detection model structure to reduce false positives.We apply our approach to two industrial large‑scale systems.Results have shown that our approach performs much better than state‑of‑the-art works with 50%higher accuracy.Besides,human feedback can reduce more than 70%of false positives and greatly improve detection precision. 展开更多
关键词 human feedback log‑based anomaly detection system log
在线阅读 下载PDF
LogDA:Dual Attention-Based Log Anomaly Detection Addressing Data Imbalance
3
作者 Chexiaole Zhang Haiyan Fu 《Computers, Materials & Continua》 2025年第4期1291-1306,共16页
As computer data grows exponentially,detecting anomalies within system logs has become increasingly important.Current research on log anomaly detection largely depends on log templates derived from log parsing.Word em... As computer data grows exponentially,detecting anomalies within system logs has become increasingly important.Current research on log anomaly detection largely depends on log templates derived from log parsing.Word embedding is utilized to extract information from these templates.However,this method neglects a portion of the content within the logs and confronts the challenge of data imbalance among various log template types after parsing.Currently,specialized research on data imbalance across log template categories remains scarce.A dual-attention-based log anomaly detection model(LogDA),which leveraged data imbalance,was proposed to address these issues in the work.The LogDA model initially utilized a pre-trained model to extract semantic embedding from log templates.Besides,the similarity between embedding was calculated to discern the relationships among the various templates.Then,a Transformer model with a dual-attention mechanism was constructed to capture positional information and global dependencies.Compared to multiple baseline experiments across three public datasets,the proposed approach could improve precision,recall,and F1 scores. 展开更多
关键词 Anomaly detection system log deep learning transformer neural networks
在线阅读 下载PDF
Research on Establish an Efficient Log Analysis System with Kafka and Elastic Search 被引量:1
4
作者 Yuanzhou Wei Manman Li Binsen Xu 《Journal of Software Engineering and Applications》 2017年第11期843-853,共11页
Search logs in a timely and efficient manner are an important part of SRE (Site Reliability Engineer). Logs help us solve the problems during our development work. In this paper, we will introduce you a way how to bui... Search logs in a timely and efficient manner are an important part of SRE (Site Reliability Engineer). Logs help us solve the problems during our development work. In this paper, we will introduce you a way how to build an efficient logs analysis system based on kafka and Elastic Search. We hope you can learn something through the iteration of the Version and get some inspiration with your own log analysis system. 展开更多
关键词 log Analysis system Kafka ELASTIC SEARCH Software Applications SITE Reliability ENGINEER
在线阅读 下载PDF
Design and Construction of a Real-Time Temperature Logging System
5
作者 Ogidan Olugbenga Kayode Kolawole Michael.O +1 位作者 Bamisaye Ayodeji James Ewetumo Theophilus 《通讯和计算机(中英文版)》 2011年第9期780-783,共4页
关键词 人体温度 记录系统 实时 标准热电偶 施工 设计 测量设备 健康状况
在线阅读 下载PDF
云计算环境下基于Syslog网络安全监测系统研究 被引量:1
6
作者 苏志强 《成都工业学院学报》 2025年第5期44-49,共6页
针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数... 针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数据采集器和云计算处理器。在软件算法层面上,利用云计算技术采集并提取网络日志数据特征,计算网络日志数据特征的Syslog协议匹配度,采用特征匹配的方式获取网络安全状态监测结果。通过系统测试实验得出结论:与传统系统相比,优化设计监测系统的漏报率与误报率均被控制在10%以下。 展开更多
关键词 云计算环境 Syslog协议 网络安全 网络日志 安全监测系统
在线阅读 下载PDF
An ARM-based debugging system for multipole array acoustic logging tools
7
作者 Lu Junqiang Ju Xiaodong Men Baiyong 《Petroleum Science》 SCIE CAS CSCD 2014年第4期508-518,共11页
This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test eq... This paper presents a debugging system for multi-pole array acoustic logging (MPAL) tools. The debugging system proposed in this study can debug the MPAL tool system, sub-system and local electronics. In the test equipment, we have used principal and subordinate structures, and interconnected the host computer and the front-end machine via Ethernet. The front-end machine is based on the ARM7 (advanced reduced instruction set computing (RISC) machine) technique, the processor of which runs an embedded operating system, namely, uClinux OS. We have analyzed the system telecommunication, human-machine interface circuit, transmitter mandrel interface circuit, receiver mandrel interface circuit, and board-level test interface circuit. The software used in the system consists of the embedded front-computer software and the host application software. We have explained in detail the flow chart of the boot loader in the embedded front-computer software. The host application software is composed of four application subroutines, which match with the functional modules of the system hardware. A net communication program based on the server^client mode is implemented by means of socket programming and multi-thread programming. Test results indicate that the data transmission rate of the system is higher than 1 MB/s, which completely meets the current requirements of the data transmission rate between the tool system and the wireline telemetry device. Application of the debugging system, which includes multiple level test methods, shows that the proposed system can fully meet the test requirements of MPAL at various levels. 展开更多
关键词 Acoustic logging tool debug system advanced RISC machines embedded technique network interconnection
原文传递
Design and Implementation of a Photovoltaic Data Acquisition System for Some Meteorological Variables
8
作者 Nicholas N. Tasie Friday B. Sigalo +1 位作者 Valentine B. Omubo-Pepple Chigozie Israel-Cookey 《Energy and Power Engineering》 CAS 2022年第11期652-668,共17页
In this paper we have developed a data logging and monitoring system, we validated the system by comparing the result from it with the existing one and found that the system performs slightly better than the existing ... In this paper we have developed a data logging and monitoring system, we validated the system by comparing the result from it with the existing one and found that the system performs slightly better than the existing work in the same area. This implies that the data logger and monitoring system is good and can be used to monitor solar energy variables even at the comfort of our homes. We fitted a model to the generated data and found that the meteorological variables considered accounted for 99.88% of the power output in the rainy seasons while 0.12% of the variation was not explained due to other factors. Solar panels inclined at an angle of 5&deg; (Tilt) and facing South Pole perform optimally. 展开更多
关键词 Data logging and Monitoring system Circuit Design Development Chip Programming and Software Development Photovoltaic Cell Meteorological Parameters
在线阅读 下载PDF
Unsupervised Log Anomaly Detection Method Based on Multi-Feature 被引量:3
9
作者 Shiming He Tuo Deng +2 位作者 Bowen Chen R.Simon Sherratt Jin Wang 《Computers, Materials & Continua》 SCIE EI 2023年第7期517-541,共25页
Log anomaly detection is an important paradigm for system troubleshooting.Existing log anomaly detection based on Long Short-Term Memory(LSTM)networks is time-consuming to handle long sequences.Transformer model is in... Log anomaly detection is an important paradigm for system troubleshooting.Existing log anomaly detection based on Long Short-Term Memory(LSTM)networks is time-consuming to handle long sequences.Transformer model is introduced to promote efficiency.However,most existing Transformer-based log anomaly detection methods convert unstructured log messages into structured templates by log parsing,which introduces parsing errors.They only extract simple semantic feature,which ignores other features,and are generally supervised,relying on the amount of labeled data.To overcome the limitations of existing methods,this paper proposes a novel unsupervised log anomaly detection method based on multi-feature(UMFLog).UMFLog includes two sub-models to consider two kinds of features:semantic feature and statistical feature,respectively.UMFLog applies the log original content with detailed parameters instead of templates or template IDs to avoid log parsing errors.In the first sub-model,UMFLog uses Bidirectional Encoder Representations from Transformers(BERT)instead of random initialization to extract effective semantic feature,and an unsupervised hypersphere-based Transformer model to learn compact log sequence representations and obtain anomaly candidates.In the second sub-model,UMFLog exploits a statistical feature-based Variational Autoencoder(VAE)about word occurrence times to identify the final anomaly from anomaly candidates.Extensive experiments and evaluations are conducted on three real public log datasets.The results show that UMFLog significantly improves F1-scores compared to the state-of-the-art(SOTA)methods because of the multi-feature. 展开更多
关键词 system log anomaly detection semantic features statistical features TRANSFORMER
在线阅读 下载PDF
基于logs2intrusions与Web Log Explorer的综合取证分析研究 被引量:1
10
作者 杨晶 赵鑫 芦天亮 《信息网络安全》 CSCD 2017年第3期33-38,共6页
随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息... 随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息的文件,但目前来看网络日志文件的作用还有待进一步提升。文章分析了logs2intrusions、Web Log Explorer、光年SEO日志分析系统、逆火网站分析器这四种日志分析工具的特性,提出了基于logs2intrusions和Web Log Explorer两个工具优势的综合取证分析技术,实现了对大批量入侵攻击日志数据的快速分析处理,提高了对网络入侵攻击行为识别的准确率。 展开更多
关键词 网络入侵检测 logs2intrusions WeblogExplorer 系统日志
在线阅读 下载PDF
基于系统LOG日志的预防性维护流程对Philips iU22彩超CPU温度及故障率的影响 被引量:1
11
作者 梁姚鑫 孙嘉增 +2 位作者 卢裕超 梁剑 何华 《医疗装备》 2021年第15期1-2,5,共3页
目的探讨基于系统LOG日志的预防性维护流程对Philips iU22彩超CPU温度及故障率的影响。方法将广东省第二人民医院2018年1月至2019年12月使用的30台Philips iU22彩超作为观察组,实施基于系统LOG日志的预防性维护流程;将医院2016年1月至2... 目的探讨基于系统LOG日志的预防性维护流程对Philips iU22彩超CPU温度及故障率的影响。方法将广东省第二人民医院2018年1月至2019年12月使用的30台Philips iU22彩超作为观察组,实施基于系统LOG日志的预防性维护流程;将医院2016年1月至2017年12月使用的30台Philips iU22彩超作为对照组,实施常规维护流程;比较两组设备使用期间的CPU温度、故障率及由CPU温度过高引起故障的情况。结果两组设备使用1个月的CPU温度比较,差异无统计学意义(P>0.05);观察组设备使用6、12个月的CPU温度均低于对照组,差异有统计学意义(P<0.05);观察组设备使用期间的故障率及由CPU温度过高引起故障率均低于对照组,差异有统计学意义(P<0.05)。结论基于系统LOG日志的预防性维护流程可以有效解决Philips iU22彩超CPU温度过高问题,降低设备故障率。 展开更多
关键词 系统log日志 预防性维护流程 彩超 CPU温度 故障
暂未订购
Log Gabor小波性能分析及其在相位一致性中应用 被引量:8
12
作者 肖志涛 于明 +2 位作者 李锵 唐红梅 国澄明 《天津大学学报(自然科学与工程技术版)》 EI CAS CSCD 北大核心 2003年第4期443-446,共4页
对Gabor函数与logGabor函数进行比较,构造了logGabor小波.从人类视觉系统认知特性的角度分析了该小波的性能,并与Gabor小波进行了比较,最后将logGabor小波应用在相位一致性的图像特征检测中.实验证明,使用logGabor小波不但可以提高特征... 对Gabor函数与logGabor函数进行比较,构造了logGabor小波.从人类视觉系统认知特性的角度分析了该小波的性能,并与Gabor小波进行了比较,最后将logGabor小波应用在相位一致性的图像特征检测中.实验证明,使用logGabor小波不但可以提高特征的定位精度,而且在检测效果相似的情况下,logGabor小波比Gabor小波可以节约一半的计算量. 展开更多
关键词 logGabor小波 logGabor函数 性能分析 相位一致性 图像处理 特征检测 人类视觉系统
在线阅读 下载PDF
Approach to Anomaly Detection in Microservice System with Multi-Source Data Streams
13
作者 ZHANG Qixun HAN Jing +2 位作者 CHENG Li ZHANG Baisheng GONG Zican 《ZTE Communications》 2022年第3期85-92,共8页
Microservices have become popular in enterprises because of their excellent scalability and timely update capabilities.However,while fine-grained modularity and service-orientation decrease the complexity of system de... Microservices have become popular in enterprises because of their excellent scalability and timely update capabilities.However,while fine-grained modularity and service-orientation decrease the complexity of system development,the complexity of system operation and maintenance has been greatly increased,on the contrary.Multiple types of system failures occur frequently,and it is hard to detect and diagnose failures in time.Furthermore,microservices are updated frequently.Existing anomaly detection models depend on offline training and cannot adapt to the frequent updates of microservices.This paper proposes an anomaly detection approach for microservice systems with multi-source data streams.This approach realizes online model construction and online anomaly detection,and is capable of self-updating and self-adapting.Experimental results show that this approach can correctly identify 78.85%of faults of different types. 展开更多
关键词 anomaly detection data stream microservice monitored indicator system log
在线阅读 下载PDF
一种新的INS/LOG组合导航算法
14
作者 高薪 卞鸿巍 刘文超 《舰船科学技术》 北大核心 2015年第2期53-57,共5页
针对电磁计程仪引入的海流速度可能会导致INS/LOG组合导航系统的卡尔曼滤波器输出发散问题,设计一种新的INS/LOG组合方式。以计程仪速度2次采样的差分值(即速度增量)作为系统观测量以抑制慢变海流的影响,采用基于延迟状态卡尔曼滤波算法... 针对电磁计程仪引入的海流速度可能会导致INS/LOG组合导航系统的卡尔曼滤波器输出发散问题,设计一种新的INS/LOG组合方式。以计程仪速度2次采样的差分值(即速度增量)作为系统观测量以抑制慢变海流的影响,采用基于延迟状态卡尔曼滤波算法,推导这种组合方式的观测方程,实现INS误差的最优估计。为抑制计程仪速度差分对其高频噪声的放大效应,采用巴特沃斯低通滤波器对其输出进行平滑处理。通过对3种INS/LOG组合方式的仿真比较,验证该算法的有效性。 展开更多
关键词 组合导航 惯导 电磁计程仪 速度增量 延迟状态卡尔曼滤波
在线阅读 下载PDF
Drilog与Welleader系统的应用研究 被引量:14
15
作者 邓晓清 王智明 彭劲勇 《煤矿机械》 2017年第6期139-142,共4页
自主研发的Drilog随钻测井系统由随钻测量仪、工程参数测量仪及随钻电阻率伽马一体化测井仪组成;自主研发的Welleader旋转导向钻井系统由涡轮发电机短节、有线柔性短节、以及导向短节组成。2个系统配合用于勘探开发中,对提高钻遇率有重... 自主研发的Drilog随钻测井系统由随钻测量仪、工程参数测量仪及随钻电阻率伽马一体化测井仪组成;自主研发的Welleader旋转导向钻井系统由涡轮发电机短节、有线柔性短节、以及导向短节组成。2个系统配合用于勘探开发中,对提高钻遇率有重要作用。介绍了2套系统组合在某油田X井8.5英寸井段的使用过程,通过实时数据研究,分析了轨迹控制、动态轨迹测量、导向工具时效、随钻测井质量等应用效果。统计结果显示系统的钻进效率高,测量数据准确,证明了2套系统在定向井作业中的测井质量优良,实时地质导向效果良好。本次高难度作业为2套系统推广积累了应用经验。 展开更多
关键词 随钻测井系统 旋转导向钻井系统 地质导向 油田应用
原文传递
Drilog~随钻测井系统深度跟踪关键技术研究 被引量:2
16
作者 邓晓清 蒋荻南 卢华涛 《石油矿场机械》 2017年第3期18-22,共5页
中海油服自主研发的随钻测井系统Drilog~已进入商业化应用阶段。从随钻测井的深度跟踪基本原理与分布式系统架构入手,阐述了其深度跟踪子系统的关键技术。通过公式论证,研究了大钩高度和大钩载荷的测量原理和标定方法,分析了钩载滤波... 中海油服自主研发的随钻测井系统Drilog~已进入商业化应用阶段。从随钻测井的深度跟踪基本原理与分布式系统架构入手,阐述了其深度跟踪子系统的关键技术。通过公式论证,研究了大钩高度和大钩载荷的测量原理和标定方法,分析了钩载滤波算法的优化方法。介绍了深度跟踪系统在测量手段改进、算法优化、系统设计优化等方面的工作,总结了该系统在现场的应用成果及未来发展方向。 展开更多
关键词 随钻测井 深度跟踪 分布式系统设计 技术
在线阅读 下载PDF
HiLog:OpenHarmony的高性能日志系统 被引量:1
17
作者 吴圣垚 王枫 +4 位作者 武延军 凌祥 屈晟 罗天悦 吴敬征 《软件学报》 EI CSCD 北大核心 2024年第4期2055-2075,共21页
日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而Op... 日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而OpenHarmony的开源特性使第三方开发者可以为其贡献核心代码.为了解决Open Harmony日志系统缺乏的问题,主要开展如下工作:(1)分析当今主流日志系统的技术架构和优缺点;(2)基于OpenHarmony操作系统的异构设备互联特性设计HiLog日志系统模型规范;(3)设计并实现第1个面向OpenHarmony的日志系统HiLog,并贡献到OpenHarmony主线;(4)对HiLog日志系统的关键指标进行测试和对比试验.实验数据表明,在基础性能方面,HiLog和Log的日志写入阶段吞吐量分别为1500 KB/s和700 KB/s,相比Android日志系统吞吐量提升114%;在日志持久化方面,HiLog可以3.5%的压缩率进行持久化,并且丢包率小于6‰,远低于Log.此外,HiLog还具备数据安全、流量控制等新型实用能力. 展开更多
关键词 操作系统 日志系统 开源软件 数据安全 流量控制
在线阅读 下载PDF
EILog成套测井装备地面系统自检装置研制
18
作者 严正国 张家田 +1 位作者 秦力 张秋建 《石油仪器》 2008年第1期12-14,101,共3页
EILog成套测井装备地面系统自检装置是对EILog成套测井装备功能有益的补充和完善,自检装置通过模拟井下仪器接收地面系统指令,模拟各种井下仪器数据和声波波形并向地面系统发送,以确知的井下仪器状态来检验地面系统软硬件工作是否正常... EILog成套测井装备地面系统自检装置是对EILog成套测井装备功能有益的补充和完善,自检装置通过模拟井下仪器接收地面系统指令,模拟各种井下仪器数据和声波波形并向地面系统发送,以确知的井下仪器状态来检验地面系统软硬件工作是否正常。自检装置可用于EILog成套测井装备的日常自检、维护、故障检测/定位,也可用于地面系统操作人员培训。自检装置的研制成功,对确保EILog成套测井装备工作正常、测井曲线准确可靠有非常重要的作用和意义。 展开更多
关键词 测井装备 地面系统 自检装置
在线阅读 下载PDF
Linux环境下syslog日志管理系统研究 被引量:3
19
作者 孙鹏程 周利华 《电子科技》 2007年第7期72-74,共3页
随着Internet和网络应用系统的发展和普及,网络攻击行为不断升级,严重影响了系统的正常运行,系统安全问题已引起人们的高度重视。多数应用系统通常采用Linux作为服务器操作系统,日志是Linux系统重要的安全特性,对于系统安全极为重要。... 随着Internet和网络应用系统的发展和普及,网络攻击行为不断升级,严重影响了系统的正常运行,系统安全问题已引起人们的高度重视。多数应用系统通常采用Linux作为服务器操作系统,日志是Linux系统重要的安全特性,对于系统安全极为重要。通过它可以方便地查找出系统错误或受到的攻击。基于对Linux Red Hat9.0的研究,文中对syslog协议、日志服务器的建立以及使用logrotate对日志进行轮循管理进行了详细说明,还对Syslog日志管理系统的安全性进行了简要分析,提出了现有Syslog机制存在的问题和未来的发展方向。 展开更多
关键词 分布式环境 日志管理系统 SYSlog 系统安全
在线阅读 下载PDF
EILog-05测井系统在长庆油田的应用 被引量:7
20
作者 张炳军 牟金东 +3 位作者 陈木银 范永维 冯相君 周扬 《测井技术》 CAS CSCD 2007年第2期173-177,共5页
介绍了中国石油测井集团有限公司研制的EILog-05测井系统的组成及技术性能特点,重点分析了在长庆油田的推广、应用情况。实际推广与应用证明,该成套装备具有良好的一致性、重复性和稳定性,各项技术性能参数达到仪器设计要求,符合质量控... 介绍了中国石油测井集团有限公司研制的EILog-05测井系统的组成及技术性能特点,重点分析了在长庆油田的推广、应用情况。实际推广与应用证明,该成套装备具有良好的一致性、重复性和稳定性,各项技术性能参数达到仪器设计要求,符合质量控制标准。资料解释所得到的储层参数与岩心分析结果具有良好的一致性,在16口油(气)井(24层)试油(气)结果中,解释符合率高达91.7%。 展开更多
关键词 石油测井装备 快速与成像测井系统 测井解释 岩性识别 地层参数
在线阅读 下载PDF
上一页 1 2 67 下一页 到第
使用帮助 返回顶部