Consideration about the Preservation Method in the Log Files

Author(s):  
Takashi Sakuma
2019 ◽  
Vol 7 (1) ◽  
pp. 12-22
Author(s):  
Ratu Mutia Fajarani ◽  
Yopi Handoyo ◽  
Raden Hengki Rahmanto

Cooling is the best preservation method than others because the food that has been cooled will remain fresh and will not experience a change in taste, color and aroma, besides all the activities that cause decay will stop so that the cooled food will last longer. (Hartanto, 1984). With the proper cooling engine planning, it can help with spatial adjustments, adjustments to loading, estimation of the power to be used, and budget plans. That is what is commonly called the cooling load calculation. Calculation of cooling load needs to be carried out before planning. This is necessary because the magnitude of the pending load is very influential on the selection of the cooling engine so that the freezing point for preserving food can be accurate. Pendiginan burden is influenced by external and internal factors. With the experimental method, it is obtained the results of the external cooling load as the external cooling load is 11.6 kW, the inner cooling load is 138.8 kW and the performance work coefficient (COP) is 2.


Author(s):  
Richard Landis ◽  
Han Hua ◽  
Xin Yin ◽  
Lisa Axe ◽  
Scott Morgan

2021 ◽  
Vol 11 (13) ◽  
pp. 5944
Author(s):  
Gunwoo Lee ◽  
Jongpil Jeong

Semiconductor equipment consists of a complex system in which numerous components are organically connected and controlled by many controllers. EventLog records all the information available during system processes. Because the EventLog records system runtime information so developers and engineers can understand system behavior and identify possible problems, it is essential for engineers to troubleshoot and maintain it. However, because the EventLog is text-based, complex to view, and stores a large quantity of information, the file size is very large. For long processes, the log file comprises several files, and engineers must look through many files, which makes it difficult to find the cause of the problem and therefore, a long time is required for the analysis. In addition, if the file size of the EventLog becomes large, the EventLog cannot be saved for a prolonged period because it uses a large amount of hard disk space on the CTC computer. In this paper, we propose a method to reduce the size of existing text-based log files. Our proposed method saves and visualizes text-based EventLogs in DB, making it easier to approach problems than the existing text-based analysis. We will confirm the possibility and propose a method that makes it easier for engineers to analyze log files.


Author(s):  
Jozef Kapusta ◽  
Michal Munk ◽  
Dominik Halvoník ◽  
Martin Drlík

If we are talking about user behavior analytics, we have to understand what the main source of valuable information is. One of these sources is definitely a web server. There are multiple places where we can extract the necessary data. The most common ways are to search for these data in access log, error log, custom log files of web server, proxy server log file, web browser log, browser cookies etc. A web server log is in its default form known as a Common Log File (W3C, 1995) and keeps information about IP address; date and time of visit; ac-cessed and referenced resource. There are standardized methodologies which contain several steps leading to extract new knowledge from provided data. Usu-ally, the first step is in each one of them to identify users, users’ sessions, page views, and clickstreams. This process is called pre-processing. Main goal of this stage is to receive unprocessed web server log file as input and after processing outputs meaningful representations which can be used in next phase. In this pa-per, we describe in detail user session identification which can be considered as most important part of data pre-processing. Our paper aims to compare the us-er/session identification using the STT with the identification of user/session us-ing cookies. This comparison was performed concerning the quality of the se-quential rules generated, i.e., a comparison was made regarding generation useful, trivial and inexplicable rules.


Sign in / Sign up

Export Citation Format

Share Document