首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 656 毫秒
1.
介绍了J2EE的两种开源框架Spring和log4j,以及它们对基于Struts框架的Web应用系统的日志管理功能的实现。以Struts整合Spring的AOP技术以及log4j框架成功地实现了对Web应用系统的日志管理模块,通过上述技术在Web应用程序中的实际应用,说明了利用上述技术可以提高Web应用程序的开发效率,构造出的系统具有良好的可维护性和可扩展性。  相似文献   

2.
计算机日志分析与管理方法的研究   总被引:3,自引:0,他引:3  
文章先从计算机日志文件的种类着手,分析了各类计算机日志的特点和日志的属性,提出了对各类系统的日志文件进行集中式统一管理的日志管理方法,讨论并设计了在对日志进行集中管理时对所收集的日志进行的处理方法.  相似文献   

3.
基于Apache Flume的开源日志收集系统,设计并实现了一个适用于异构网站平台间的分布式日志收集系统。该系统将多个网站的日志集中存储,为进行下一步的日志分析提供了数据支持,也为云平台下的网站日志收集方案提供了参考依据。  相似文献   

4.
系统日志文件记录着系统中特定事件的相关活动信息,系统日志文件是计算机取证最重要的信息来源。Windows系统对日志文件进行保护不允许对日志文件进行修改,只允许对日志进行清空操作以保证日志文件的完整性。详尽描述了日志文件的格式,在此基础上找到了手工修改和删除日志记录的方法,并在Windows XP SP3下得到了验证。  相似文献   

5.
雷东升  郭振英 《现代情报》2016,36(7):101-106
校外访问图书馆电子资源在方便读者的同时也出现一些异常访问行为,利用EZproxy代理服务器日志信息分析异常访问行为特征,设计并开发EZproxy日志分析系统,完成对电子资源访问日志的预处理、上传、统计和分析,从访问特征发掘读者的异常访问行为,对异常行为情况分类处理,基本避免了异常访问行为导致图书馆电子资源被数据库商临时封掉IP的现象出现,维护图书馆读者的合法权利,提高资源访问效率。  相似文献   

6.
通过对当前网络学习监控现状的分析,提出了网络学习监控系统的设计思路,详细介绍了系统开发的4个主要功能模块,即学习日志模块、信息采集模块、信息统计模块和反馈强化模块。  相似文献   

7.
图书馆网络中的入侵检测系统   总被引:7,自引:0,他引:7  
王福生 《现代情报》2007,27(7):35-36
借助Internet通信技术,高校图书馆网络可以为用户提供越来越多的数字资源,但是其网络也存在越来越多的安全问题.本文根据防火墙工作原理,结合防火墙的日志信息,建立了一个日志处理服务器.根据对防火墙日志信息的分析,建立了一个可以应用于图书馆网络的入侵检测系统.在新的入侵检测系统的应用过程中发现,系统可以检测到图书馆网络中的所有异常行为,并给出报警提示.  相似文献   

8.
内存数据库存在于易失性内存中,数据较易丢失,故障恢复部件至关重要。考虑系统环境限制,设计了一种利用日志与影子页面技术相结合的系统恢复模型,讨论了日志协议、模糊检查点策略、重装算法、恢复技术等模块的实现方法。该方法无需额外硬件的支持,日志记录数量少,检查点与事务处理并发执行,重装和恢复过程快速,极大地提高了内存数据库的恢复效率。  相似文献   

9.
目前对电力信息通信系统运维质量的评价手段单一,根据电力信息通信系统中各种组件的特性以及组件的日志,通过日志异常分析提出了一套能够准确反映运维质量的指标体系;同时利用机器学习算法实现电力信息通信系统综合评价。  相似文献   

10.
李玲 《科技风》2014,(18):45-45
本文阐述了web日志挖掘应用到个性化推荐系统中的研究的意义,并从Web日志数据挖掘技术理论知识展开分析研究,对进行研究个性化推荐系统的研究提供理论支持。  相似文献   

11.
曾子明  王峰 《情报杂志》2012,31(4):117-121
在移动环境下让用户对博客进行直接评分有很多弊端.因此,如何获取用户对博客的评分信息已成为一个亟待解决的问题.基于隐性评分技术,通过分析用户阅读博客时的阅读速度和阅读文章的比例,计算出用户对博客的偏好信息,进而将传统的基于项目的协同过滤技术应用到博客推荐中,提出了移动环境下基于隐性评分的协同过滤博客推荐技术.最后,通过实验证明该技术可以在移动环境下有效地为用户推荐符合其兴趣的博客.  相似文献   

12.
To obtain high performances, previous works on FAQ retrieval used high-level knowledge bases or handcrafted rules. However, it is a time and effort consuming job to construct these knowledge bases and rules whenever application domains are changed. To overcome this problem, we propose a high-performance FAQ retrieval system only using users’ query logs as knowledge sources. During indexing time, the proposed system efficiently clusters users’ query logs using classification techniques based on latent semantic analysis. During retrieval time, the proposed system smoothes FAQs using the query log clusters. In the experiment, the proposed system outperformed the conventional information retrieval systems in FAQ retrieval. Based on various experiments, we found that the proposed system could alleviate critical lexical disagreement problems in short document retrieval. In addition, we believe that the proposed system is more practical and reliable than the previous FAQ retrieval systems because it uses only data-driven methods without high-level knowledge sources.  相似文献   

13.
Several studies of Web server workloads have hypothesized that these workloads are self-similar. The explanation commonly advanced for this phenomenon is that the distribution of Web server requests may be heavy-tailed. However, there is another possible explanation: self-similarity can also arise from deterministic, chaotic processes. To our knowledge, this possibility has not previously been investigated, and so existing studies on Web workloads lack an adequate comparison against this alternative. We conduct an empirical study of workloads from two different Web sites: one public university, and one private company, using the largest datasets that have been described in the literature. Our study employs methods from nonlinear time series analysis to search for chaotic behavior in the web logs of these two sites. While we do find that the deterministic components (i.e. the well-known “weekend effect”) are significant components in these time series, we do not find evidence of chaotic behavior. Predictive modeling experiments contrasting heavy-tailed with deterministic models showed that both approaches were equally effective in modeling our datasets.  相似文献   

14.
The anonymization of query logs is an important process that needs to be performed prior to the publication of such sensitive data. This ensures the anonymity of the users in the logs, a problem that has been already found in released logs from well known companies. This paper presents the anonymization of query logs using microaggregation. Our proposal ensures the k-anonymity of the users in the query log, while preserving its utility. We provide the evaluation of our proposal in real query logs, showing the privacy and utility achieved, as well as providing estimations for the use of such data in data mining processes based on clustering.  相似文献   

15.
During the mid-1960s, Peter R. Vail at Exxon Production Research Co. led a group working with the new, greatly improved generation of multifold seismic reflection data being shot along the continental margins of the world. The work of this group, inspired by Vail, brought the worlds of stratigraphy and seismic interpretation together in developing the original concepts of seismic stratigraphy.Later these concepts were applied by Vail and his co-workers to well logs, cores, and outcrops, broadening seismic stratigraphy into what is known today as sequence stratigraphy. Using these data the group was documenting and interpreting large-scale, basin-wide depositional patterns, stratal configurations, and unconformities in basins around the world. They proposed a chronology of global sea-level fluctuation as a framework for global correlation, resulting in a world sea-level curve. This further led to a new eustatic sea-level model. The results of these studies impacted on many scientific disciplines, but its implications for the petroleum industry have been extensive.A review of 19th- and 20th-Century stratigraphic thought on unconformities and unconformity-bounded stratal units suggests that Peter Vail followed in the footsteps of the eminent stratigraphers Charles Lyell, T. C. Chamberlain, and L. L. Sloss, his former teacher.For his contributions to sequence stratigraphy and the world sea-level curve, Peter R. Vail was awarded the 2005 Benjamin Franklin Medal in Earth and Environmental Science.  相似文献   

16.
本文的目的是希望通过研究长三角制造业企业国际化竞争优素潜在竞争力水平的现状,为在“十一五”过程中具有较强国际竞争力的优势企业的发展提供政策建议。本文在对长三角地区569家制造业企业进行问卷调研的基础上,对影响制造业企业国际化竞争力的“技术水平”、“创新能力”、“管理体制”等十项竞争优素进行了研究,分析了长三角制造业企业在不同的竞争优素潜在竞争力水平上的优势与劣势,指出了需要进一步改进的问题。  相似文献   

17.
监督项目管理在河50丛式井组进行实施,取得了良好的效果。对开发钻井的现场综合管理、特别是丛式井组的监督管理取得了一些成功的经验及研究成果。质量和开发效果显著提高,是胜利油田在开发井组监督项目管理方面的首个运行模式。为油田在整体开发项目中监督工作的普及与发展,探索出了一条新路子,打下了坚实的基础。  相似文献   

18.
王伊蕾  李涛  王福生  钟丽 《情报科学》2008,26(5):698-700
提出了一种新的基于数据挖掘技术和存储理论的图书订购策略,该策略主要思想是先利用数据挖掘技术对图书馆系统的日志文件进行分析,得到学生比较感兴趣的图书种类,然后针对这些图书应用库存理论进行分析,得到最佳的订购策略,最后用实例说明了该订购策略的有效性。  相似文献   

19.
Abstract

The developing countries, although not homogeneous, share a growing recognition of the importance of information technology for fostering the development process. Rapid advancements in computer and telecommunications technologies offer new opportunities for improved resource management and for the successful employment of these tools in rural areas. Although developing nations have responded enthusiastically to the advantages of modem information technology, they are equally cognizant of the negative impact that reliance on foreign technology and services may have. As a result, developing countries are taking a number of actions—at the national, regional, and international levels—to ensure their active participation in the emerging Information Age.  相似文献   

20.
Recent years have seen a profound change in how most users interact with search engines: the majority of search requests now come from mobile devices, which are used in a number of distracting contexts. This use of mobile devices in various situational contexts away from a desk presents a range of novel challenges for users and, consequently, possibilities for interface improvements. However, there is at present a lack of work that evaluates interaction in such contexts to understand what effects context and mobility have on behaviour and errors and, ultimately, users’ search performance.Through a controlled study, in which we simulate walking conditions on a treadmill and obstacle course, we use a combination of interaction logs and multiple video streams to capture interaction behaviour as participants (n = 24) complete simple search tasks. Using a bespoke tagging tool to analyse these recordings, we investigate how situational context and distractions impact user behaviour and performance, contrasting this with users in a baseline, seated condition. Our findings provide insights into the issues these common contexts cause, how users adapt and how such interfaces could be improved.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号