Search results

1 – 10 of over 31000
Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Open Access
Article
Publication date: 28 August 2020

Sean R. Aguilar, Vladik Kreinovich and Uyen Pham

In many real-life situations ranging from financial to volcanic data, growth is described either by a power law – which is linear in log-log scale or by a quadratic dependence in…

Abstract

Purpose

In many real-life situations ranging from financial to volcanic data, growth is described either by a power law – which is linear in log-log scale or by a quadratic dependence in the log-log scale. The purpose of this paper is to explain this empirical fact.

Design/methodology/approach

The authors use natural scale invariance requirements.

Findings

In this paper, the authors used natural scale invariance requirement to explain the ubiquity of quadratic log-log dependencies. The authors also explain what to do if quadratic log-log models turn out to be insufficiently accurate. In this case, scale-invariance requirements lead to dependencies which in the log-log scale take cubic, 4th order, etc. form.

Originality/value

To the best of authors’ knowledge, this is the first theoretical explanation of the empirical quadratic log-log dependence.

Details

Asian Journal of Economics and Banking, vol. 5 no. 1
Type: Research Article
ISSN: 2615-9821

Keywords

Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 6 February 2017

Se-Young Ju, Jin-Ju Ko, Hee-Sun Yoon, Su-Jin Seon, Yu-Ri Yoon, Da-In Lee, So-Yeon Kim and Hye-Ja Chang

The purpose of this paper is to examine the efficacy of microbial elimination using different sanitizers in raw vegetables (cherry tomatoes, spring onions, Chinese chives, and…

Abstract

Purpose

The purpose of this paper is to examine the efficacy of microbial elimination using different sanitizers in raw vegetables (cherry tomatoes, spring onions, Chinese chives, and chicory) and to analyze the efficacy of Escherichia coli O157:H7 reduction by type of sanitizer and vegetable.

Design/methodology/approach

To assess the sanitizing effects of microbial elimination by variety of vegetable, the samples were grouped into four different washing methods: control (no sanitizer), 100 ppm chlorine, 100 ppm electrolyzed water, and 200 ppm electrolyzed water after prewashing. Subsequently, quantitative microbiological experiments were conducted to assess aerobic mesophilic plate count (APC), coliform, E. coli, and Bacillus cereus, and sensory changes of the sanitized vegetables were tested. Thereafter, measurement of the sanitizing effects on bacterial reduction after inoculation with E. coli O157:H7 was conducted.

Findings

The microbial levels of four types of vegetables ranged from 3.37 to 5.24 log CFU/g for APC, 2.41 to 5.57 log CFU/g for E. coli, 0.25 to 5.40 log CFU/g for coliform, and 0.83 to 5.44 log CFU/g for B. cereus. After three types of sanitizing treatments, microbial reduction effects showed 0.94-1.84 log CFU/g for APC, 0.56-1.00 log CFU/g for E. coli, 0.18-1.26 log CFU/g for coliform, and 0.56-1.23 log CFU/g for B. cereus (p<0.05). In sensory evaluation, there were no significant differences in taste and flavor between with and without sanitizing treatments. Regarding bacterial reduction after inoculation with E. coli O157:H7, the microbial reduction on vegetables was shown to be in the range of 0.27-1.57 log CFU/g with 100 ppm sodium hypochlorite, 0.66-3.07 log CFU/g with 100 ppm electrolyzed water, and 0.79-2.55 log CFU/g with 200 ppm electrolyzed water. Chicory, cherry tomato, and spring onion showed significant reduction levels of E. coli O157:H7 after sanitation (p<0.05).

Originality/value

This study revealed that different sanitization methods are required for different types of vegetables. Electrolyzed water treatment (100 ppm) is a more effective and safe method of washing raw vegetables. Given that the main purpose of sanitizing fresh-cut produce is to maximally reduce microorganism levels, different methods of sanitizing fresh-cut produce with an adequate washing method should be used according to vegetable type.

Details

British Food Journal, vol. 119 no. 2
Type: Research Article
ISSN: 0007-070X

Keywords

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1061

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 31 December 2018

Khuram Ali Khan, Tasadduq Niaz, Đilda Pečarić and Josip Pečarić

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and…

Abstract

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and hybrid Zipf’s–Mandelbrot law are used to estimate the Shannon entropy. The Abel–Gontscharoff Green functions and Fink’s Identity are used to construct new inequalities and generalized them for m-convex function.

Details

Arab Journal of Mathematical Sciences, vol. 26 no. 1/2
Type: Research Article
ISSN: 1319-5166

Keywords

Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 December 2005

Hamid R. Jamali, David Nicholas and Paul Huntington

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

3171

Abstract

Purpose

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

Design/methodology/approach

The advantages and limitations of log analysis are described and then past studies of e‐journals' use and users that applied this methodology are critiqued. The results of these studies will be very briefly compared with some survey studies. Those aspects of online journals' use and users studies that log analysis can investigate well and those aspects that log analysis can not disclose enough information about are highlighted.

Findings

The review indicates that although there is a debate about reliability of the results of log analysis, this methodology has great potential for studying online journals' use and their users' information seeking behaviour.

Originality/value

This paper highlights the strengths and weaknesses of log analysis for studying digital journals and raises a couple of questions to be investigated by further studies.

Details

Aslib Proceedings, vol. 57 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 1 June 2005

Georgi Dimitrov

The very headline of this presentation hints at least two things. First, what is meant is the history of American sociology, though it is some what awkward to say so outright…

Abstract

The very headline of this presentation hints at least two things. First, what is meant is the history of American sociology, though it is some what awkward to say so outright. Second, the history of American sociology is accomplished, in an impor tant sense, but one should not say that so out‐right, either. In philosophy, as Wittgenstein advised, whereof we can not speak, thereof we must be silent. A different rule reigns in sociology: whereof we can hint at, thereof we must prove. My first task, there fore, is to prove that no matter how embarrassing it may seem one canspeak of a his tory of American sociology after all. My second task is to prove that it has already been on a course of development specifically characteristic of it. And, finally, my last point will be that this specific course is brought to its desired end. Every thing in its own time. Talking about the history of American sociology is extremely risky. But it is the risk that it makes it worth trying. Part of the risk stems from the issue if there is a history of sociology at all, as well as from the issue if there is American sociology in the proper sense of the word. Apart from this, there is the consideration that it may be the American nature proper of that sociology that makes it the least likely to have its own history. First things first.

Details

Managerial Law, vol. 47 no. 3/4
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 13 March 2019

Yuan Ding, TongChun Li, LanHao Zhao, MinZhe Zhou and ChaoNing Lin

Multi-level intake structures are used to take the surface water of reservoirs. The changed boundary conditions will certainly make the water hammer phenomenon more complicated…

Abstract

Purpose

Multi-level intake structures are used to take the surface water of reservoirs. The changed boundary conditions will certainly make the water hammer phenomenon more complicated. This paper aims to find out the influence and law of the water hammer pressure after setting the stop log gates.

Design/methodology/approach

The authors use the computational fluid dynamics method with the adaptive grid technology to stimulate the water hammer phenomenon of the multi-level intake hydropower station. In the analysis, we set several different heights of stop log gates and two representative times in the starting up and shutdown processes to reflect the impact of multi-level intake structures.

Findings

The authors find that the setting of the stop log gates will reduce the pressure during the normal operation and will increase the period and amplitude of the water hammer wave, but will not necessarily increase the maximum water hammer pressure during the shutdown process. The relationship between the height of the stop log gates and the amplitude of the water hammer wave is affected by the shutdown time. After setting stop log gates, the depression depth and wave height of the water level in front of the dam increase when the load changes.

Originality/value

The authors study in this paper the water pressure of the multi-level intake hydropower station that has never been studied before and obtain some laws.

Details

Engineering Computations, vol. 36 no. 3
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of over 31000