Search results

11 – 20 of over 39000
Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 6 February 2017

Se-Young Ju, Jin-Ju Ko, Hee-Sun Yoon, Su-Jin Seon, Yu-Ri Yoon, Da-In Lee, So-Yeon Kim and Hye-Ja Chang

The purpose of this paper is to examine the efficacy of microbial elimination using different sanitizers in raw vegetables (cherry tomatoes, spring onions, Chinese chives, and…

Abstract

Purpose

The purpose of this paper is to examine the efficacy of microbial elimination using different sanitizers in raw vegetables (cherry tomatoes, spring onions, Chinese chives, and chicory) and to analyze the efficacy of Escherichia coli O157:H7 reduction by type of sanitizer and vegetable.

Design/methodology/approach

To assess the sanitizing effects of microbial elimination by variety of vegetable, the samples were grouped into four different washing methods: control (no sanitizer), 100 ppm chlorine, 100 ppm electrolyzed water, and 200 ppm electrolyzed water after prewashing. Subsequently, quantitative microbiological experiments were conducted to assess aerobic mesophilic plate count (APC), coliform, E. coli, and Bacillus cereus, and sensory changes of the sanitized vegetables were tested. Thereafter, measurement of the sanitizing effects on bacterial reduction after inoculation with E. coli O157:H7 was conducted.

Findings

The microbial levels of four types of vegetables ranged from 3.37 to 5.24 log CFU/g for APC, 2.41 to 5.57 log CFU/g for E. coli, 0.25 to 5.40 log CFU/g for coliform, and 0.83 to 5.44 log CFU/g for B. cereus. After three types of sanitizing treatments, microbial reduction effects showed 0.94-1.84 log CFU/g for APC, 0.56-1.00 log CFU/g for E. coli, 0.18-1.26 log CFU/g for coliform, and 0.56-1.23 log CFU/g for B. cereus (p<0.05). In sensory evaluation, there were no significant differences in taste and flavor between with and without sanitizing treatments. Regarding bacterial reduction after inoculation with E. coli O157:H7, the microbial reduction on vegetables was shown to be in the range of 0.27-1.57 log CFU/g with 100 ppm sodium hypochlorite, 0.66-3.07 log CFU/g with 100 ppm electrolyzed water, and 0.79-2.55 log CFU/g with 200 ppm electrolyzed water. Chicory, cherry tomato, and spring onion showed significant reduction levels of E. coli O157:H7 after sanitation (p<0.05).

Originality/value

This study revealed that different sanitization methods are required for different types of vegetables. Electrolyzed water treatment (100 ppm) is a more effective and safe method of washing raw vegetables. Given that the main purpose of sanitizing fresh-cut produce is to maximally reduce microorganism levels, different methods of sanitizing fresh-cut produce with an adequate washing method should be used according to vegetable type.

Details

British Food Journal, vol. 119 no. 2
Type: Research Article
ISSN: 0007-070X

Keywords

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1175

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 31 December 2018

Khuram Ali Khan, Tasadduq Niaz, Đilda Pečarić and Josip Pečarić

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and…

Abstract

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and hybrid Zipf’s–Mandelbrot law are used to estimate the Shannon entropy. The Abel–Gontscharoff Green functions and Fink’s Identity are used to construct new inequalities and generalized them for m-convex function.

Details

Arab Journal of Mathematical Sciences, vol. 26 no. 1/2
Type: Research Article
ISSN: 1319-5166

Keywords

Article
Publication date: 1 February 1993

Patricia Flaherty

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people…

Abstract

Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the automated library arena. Often only a few people within a library are aware of its existence, and even fewer have access to the transaction log data. This is unfortunate, since the concrete data garnered by transaction logs can provide bibliographic instructors, reference staff members, systems librarians, and system designers with unique and valuable insights into the patron/system interaction.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 December 2005

Hamid R. Jamali, David Nicholas and Paul Huntington

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

3204

Abstract

Purpose

To provide a review of the log analysis studies of use and users of scholarly electronic journals.

Design/methodology/approach

The advantages and limitations of log analysis are described and then past studies of e‐journals' use and users that applied this methodology are critiqued. The results of these studies will be very briefly compared with some survey studies. Those aspects of online journals' use and users studies that log analysis can investigate well and those aspects that log analysis can not disclose enough information about are highlighted.

Findings

The review indicates that although there is a debate about reliability of the results of log analysis, this methodology has great potential for studying online journals' use and their users' information seeking behaviour.

Originality/value

This paper highlights the strengths and weaknesses of log analysis for studying digital journals and raises a couple of questions to be investigated by further studies.

Details

Aslib Proceedings, vol. 57 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 1 June 2005

Georgi Dimitrov

The very headline of this presentation hints at least two things. First, what is meant is the history of American sociology, though it is some what awkward to say so outright…

Abstract

The very headline of this presentation hints at least two things. First, what is meant is the history of American sociology, though it is some what awkward to say so outright. Second, the history of American sociology is accomplished, in an impor tant sense, but one should not say that so out‐right, either. In philosophy, as Wittgenstein advised, whereof we can not speak, thereof we must be silent. A different rule reigns in sociology: whereof we can hint at, thereof we must prove. My first task, there fore, is to prove that no matter how embarrassing it may seem one canspeak of a his tory of American sociology after all. My second task is to prove that it has already been on a course of development specifically characteristic of it. And, finally, my last point will be that this specific course is brought to its desired end. Every thing in its own time. Talking about the history of American sociology is extremely risky. But it is the risk that it makes it worth trying. Part of the risk stems from the issue if there is a history of sociology at all, as well as from the issue if there is American sociology in the proper sense of the word. Apart from this, there is the consideration that it may be the American nature proper of that sociology that makes it the least likely to have its own history. First things first.

Details

Managerial Law, vol. 47 no. 3/4
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 13 March 2019

Yuan Ding, TongChun Li, LanHao Zhao, MinZhe Zhou and ChaoNing Lin

Multi-level intake structures are used to take the surface water of reservoirs. The changed boundary conditions will certainly make the water hammer phenomenon more complicated…

Abstract

Purpose

Multi-level intake structures are used to take the surface water of reservoirs. The changed boundary conditions will certainly make the water hammer phenomenon more complicated. This paper aims to find out the influence and law of the water hammer pressure after setting the stop log gates.

Design/methodology/approach

The authors use the computational fluid dynamics method with the adaptive grid technology to stimulate the water hammer phenomenon of the multi-level intake hydropower station. In the analysis, we set several different heights of stop log gates and two representative times in the starting up and shutdown processes to reflect the impact of multi-level intake structures.

Findings

The authors find that the setting of the stop log gates will reduce the pressure during the normal operation and will increase the period and amplitude of the water hammer wave, but will not necessarily increase the maximum water hammer pressure during the shutdown process. The relationship between the height of the stop log gates and the amplitude of the water hammer wave is affected by the shutdown time. After setting stop log gates, the depression depth and wave height of the water level in front of the dam increase when the load changes.

Originality/value

The authors study in this paper the water pressure of the multi-level intake hydropower station that has never been studied before and obtain some laws.

Details

Engineering Computations, vol. 36 no. 3
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 1 February 2008

R. Liddiard, P. Jones, A.R. Day and D. Kelly

This paper seeks to establish the level of usage and how building log books are perceived within the UK non‐domestic buildings sector, and to identify potential benefits resulting…

Abstract

Purpose

This paper seeks to establish the level of usage and how building log books are perceived within the UK non‐domestic buildings sector, and to identify potential benefits resulting from the use of building log books and internet‐based building information systems.

Design/methodology/approach

The method employed was the distribution and analysis of market survey questionnaires, distributed primarily via a professional body.

Findings

There is limited use of building log books, plus varying degrees of perceived usefulness, especially between the designer/contractor sector and the facilities management sector. Internet‐based information management systems appear to be largely acceptable. The quality of building information is likely to depend on who provides it. There is a significant perception within the designer/contractor sector that building regulations are not enforcing the availability of building log books in relevant buildings.

Research limitations/implications

Only a limited literature review was undertaken, and there may be limitations due to the nature of the distribution of the surveys and sample sizes. More research into the effective provision, management and utilisation of useful building information is required.

Practical implications

The paper demonstrates that regulations may not necessarily lead to practical implementation and that there is significant room for improvement in the provision and maintenance of building information which is useful to those operating buildings.

Originality/value

The paper expands understanding of the need for useful building information and proper management of that information, both for the facilities manager and as a means of feeding forward into new building designs.

Details

Facilities, vol. 26 no. 1/2
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 1 October 2006

Gi Woong Yun, Jay Ford, Robert P. Hawkins, Suzanne Pingree, Fiona McTavish, David Gustafson and Haile Berhe

This paper seeks to discuss measurement units by comparing the internet use and the traditional media use, and to understand internet use from the traditional media use…

Abstract

Purpose

This paper seeks to discuss measurement units by comparing the internet use and the traditional media use, and to understand internet use from the traditional media use perspective.

Design/methodology/approach

Benefits and shortcomings of two log file types will be carefully and exhaustively examined. Client‐side and server‐side log files will be analyzed and compared with proposed units of analysis.

Findings

Server‐side session time calculation was remarkably reliable and valid based on the high correlation with the client‐side time calculation. The analysis result revealed that the server‐side log file session time measurement seems more promising than the researchers previously speculated.

Practical implications

An ability to identify each individual user and low caching problems were strong advantages for the analysis. Those web design implementations and web log data analysis scheme are recommended for future web log analysis research.

Originality/value

This paper examined the validity of the client‐side and the server‐side web log data. As a result of the triangulation of two datasets, research designs and propose analysis schemes could be recommended.

Details

Internet Research, vol. 16 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

11 – 20 of over 39000