نتایج جستجو برای: log and long
تعداد نتایج: 16931936 فیلتر نتایج به سال:
Detailed log facies studies of Miocene succession in the well Rashidpur-04, Rashidpur structure, Surma Basin were carried out by integrating wireline log and limited core sample data in order to reconstruct the paleoenvironments of deposition. Based on the analysis of the log motifs, grain size, sand/shale ratio and major change in gamma ray log motifs, two major depositional sequences were ide...
Background: Tuber aestivum Vittad., known as black summer truffle, represents high-value food especially used as garnishment in nouvelle cuisine. The aim of this study was to investigate on the viable microbial populations associated with T. aestivum ascomata collected in different sites of Sicily and one locality of Umbria (Italy). Methods: The ripe ascomata of black summer truffles were coll...
Information extraction (IE) is a process of automatically providing a structured representation from an unstructured or semi-structured text. It is a long-standing challenge in natural language processing (NLP) which has been intensified by the increased volume of information and heterogeneity, and non-structured form of it. One of the core information extraction tasks is relation extraction wh...
We show that sorting a sufficiently long list of length N using Shellsort with m increments (not necessarily decreasing) requires at least N √ m comparisons in the worst case, for some constant c > 0. For m ≤ (log N/ log log N) we obtain an upper bound of the same form. We also prove that Ω(N(log N/ log log N)) comparisons are needed regardless of the number of increments. Our approach is gener...
let$ p_{n}(x)= sum_{i=0}^{n} a_{i}x^{i}$ be a random algebraicpolynomial, where $a_{0},a_{1}, cdots $ is a sequence of independent random variables belong to the domain of attraction of the normal law. thus $a_j$'s for $j=0,1cdots $ possesses the characteristic functions $exp {-frac{1}{2}t^{2}h_{j}(t)}$, where $h_j(t)$'s are complex slowlyvarying functions.under the assumption that th...
TAMPERE UNIVERSITY OF TECHNOLOGY Master’s Degree Programme in Information Technology ZAHRA ABBASZADEH: Supervised Fault Detection Using Unstructured Server-Log Data to Support Root Cause Analysis Master of Science Thesis, 48 pages November 2014 Major: Wireless Communication Circuits and Systems Examiner: Prof. Moncef Gabbouj, Prof. Mikko Valkama
We have observed the failure of RSVP to be widely accepted as the solution to resource reservation in the Internet. Because we are convinced of the need for resource reservation, in at least parts of the Internet, to support multimedia communications, we have set about trying to improve RSVP. By careful study of the protocol, we have identified areas for improvement, and propose REDO RSVP, a re...
A very useful technique a network administrator can use to identify problematic network behavior is careful analysis of logs of incoming and outgoing network flows. The challenge one faces when attempting to undertake this course of action, though, is that large networks tend to generate an extremely large quantity of network traffic in a very short period of time, resulting in very large traff...
System logs are almost the only data that records system operation information, so they play an important role in anomaly analysis, intrusion detection, and situational awareness. However, it is still a challenge to obtain effective from massive logs. On one hand, unstructured data, and, on other log cannot be directly analyzed calculated by computers. In order deal with these problems, current...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید