Searched for: subject:"logging"
(1 - 20 of 43)

Pages

document
Proost, Rick (author)
Monitoring software behaviour is being done in various ways. Log messages are being output by almost any kind of running software system. Therefore, learning how software behaves from doing analysis over log data can lead to new insights about the system. However, the number of log messages in a computer system grow fast, and analysing the log...
master thesis 2020
document
Ómarsdóttir, Þórunn (author)
In this thesis, we study automatically generating explanatory reports for anomalous incidents in a train control system (TCS) using Natural Language Generation (NLG). A TCS is a type of safety-critical software that allows train controllers to correctly set the tracks for a train to pass. The goal of this research is to process the majority of...
master thesis 2020
document
Garcia Manso, A. (author)
In the oil and gas industry a crucial step for detecting and developing natural resources is to drill wells and measure miscellaneous properties along the well depth. These measurements are used to understand the rock and hydrocarbon properties and support oil/gas field development. The measurements are done at multiple times and using different...
master thesis 2020
document
Li, Yijing (author)
In history, Shunde is famous for its water village culture with dense water networks and a beautiful fish-pond system. After the reform and opening-up policy in 1978, the manufacturing industry is rapidly developed in Shunde. Followed by that, the water village culture is gradually declining. Instead, a large number of factories are scattered in...
master thesis 2020
document
Treur, Rutger (author)
In 1990, the 44/21a-6 well was drilled in the Southern North Sea. Core material was taken from the Westphalian A/B part of the core. Some of this core material was recently obtained by the TU Delft via the North Sea Core Initiative. Since the Westphalian A/B in the Pennine Basin is fluvio-deltaic in origin, it is highly variable both vertically...
bachelor thesis 2020
document
Mašović, Matti (author)
Port call efficiency (PCE) is an important factor in the port choice of shipping lines. This research strives to contribute to the current work on PCE optimization. This is done by applying relative new techniques on port call related data. A combination of process mining (PM) and discrete event simulation (DEVS) is explored, with the Port of...
master thesis 2019
document
van den Berg, Mario (author)
Design criteria for the stability of rock filters on river beds (i.e. rock bed protection) are extensively researched and successfully applied in practice. The most common stability criteria are the Izbash and Shields criteria. These methods define a critical flow (Izbash) or parameter (Shields). Rijkswaterstaat (RWS) wants to explore a more...
master thesis 2019
document
Urumovska, Bojana (author)
The Natural Language Generation field has advanced in generating human readable reports for domain experts in various fields. Nevertheless, Natural Language Generation and anomaly detection techniques have not been used in the rail domain yet. Currently, data analysis and incident reporting for log files from the train control system are...
master thesis 2019
document
Tsoni, Sofia (author)
Huge amounts of log data are generated every day by software. These data contain valuable information about the behavior and the health of the system, which is rarely exploited, because of their volume and unstructured nature. Manually going through log files is a time-consuming and labor-intensive procedure for developers. Nonetheless logging...
master thesis 2019
document
Stavroulakis, Alexandros (author)
Log data, produced from every computer system and program, are widely used as source of valuable information to monitor and understand their behavior and their health. However, as large-scale systems generate a massive amount of log data every minute, it is impossible to detect the cause of system failure by examining manually this huge size of...
master thesis 2019
document
Breunissen, Rens (author)
In this thesis the beta log-gas probability density function is discussed. It is shown that there is a strong link between this density function and Jacobi matrices. A change of variables exercise shows that the distribution of eigenvalues is exactly like the quadratic beta log-gas. The change of variables gives the normalization constant for...
bachelor thesis 2019
document
Plomp, Angela (author)
After several incident in which the privacy of patients was violated, the need for<br/>logging of access to medical data is evident. In this master thesis, the first prototype is presented for a blockchain-based access log for medical data. This prototype<br/>uses a novel blockchain to create a tamper-proof log. Patients each have their own...
master thesis 2019
document
Breurkes, Arthur (author), Kerkhof, Maikel (author), Jongerius, Ricardo (author), Westerborg, Ties (author)
Real-time processing of log data can give valuable insights in the behaviour of systems and processes. The Rabobank is a large bank and has several of these systems and processes, one of such is the QR device registration process. In order to monitor this process, an application was built which detects abnormal behaviour. The application reads...
bachelor thesis 2019
document
Schipper, Daan (author)
Logs are widely used as source of information to understand the activity of computer systems and to monitor their health and stability. As large-scale systems generate hundreds of millions of logs per hour reaching tens of terabytes, automated techniques exist to take advantage of the rich information present in logs. However, these techniques...
master thesis 2018
document
Lan, Yikai (author)
Monitoring the release logs of modern online software is a challenging topic because of the enormous amount of release logs and the complicated release process. The goal of this thesis is to develop a pipeline that can monitor the release logs and find anomalous logs, automating this step with anomaly detection and reducing the required manual...
master thesis 2018
document
Giesgen, Tobias (author)
The automatic interpretation of well logs has been the focus of research, especially in oil and gas industry, for more than 50 years and, aside from that, benefits from the fast developments of machine learning algorithms during the recent decades. Moreover, Bayesian inference is increasingly utilized to model geological data, enabling the...
master thesis 2018
document
Pan, Michel (author)
Digitalization of sensitive information such as bankaccounts enforces privacy to be ensured. Mathematical objects called elliptic curves have ensured exchange of this type of information due to their algebraic structure. The security relies on so called ECDLP and solving these types of problems, but there has yet to be found an efficient...
bachelor thesis 2018
document
Rubaij Bouman, Roland (author)
The formation of scour holes is a vital thread of retaining the water infrastructure of rivers. Nowadays, protective filters are used to prevent washing away of the underlying material. Rijkswaterstaat started the program 'Stroomlijn’, in which trees (logs) are cut from the floodplains and placed in a sheltered zone of the river to test whether...
master thesis 2018
document
Beulink, Laurens (author)
In the light of the waterframework directive, the dutch organisation of rijkswaterstaat has decided to investigate the application of logs as a biological alternative for the protection and cover of both naturally developing scour holes. In this research a laboratory model was created that was designed to develop a scour hole by gradually...
master thesis 2018
document
van der Veeken, Pieter (author)
In IT systems, a logfile provides administrators with an audit trail which can be used to review a system’s activities and a way to discover and diagnose problems which have occurred within that system. When an attacker penetrates an IT system, commonly one of their first actions is tampering with the logs, so that they can hide their malicious...
master thesis 2018
Searched for: subject:"logging"
(1 - 20 of 43)

Pages