Dissertations / Theses on the topic 'Logging'

To see the other types of publications on this topic, follow the link: Logging.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Logging.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
2

Sluss, Richard Gordon. "Managerial and operational characteristics of "safety successful" logging contractors." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-09122009-040333/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Loving, Easton. "Components of logging costs." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10222009-124937/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sklar, Howard Fred. "Nuclear magnetic resonance logging." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1997.
Includes bibliographical references (leaves 119-121).
by Howard Fred Sklar.
M.S.
5

Mendelson, J. D. (James D. ). "Petroleum source rock logging." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miyata, Edwin S. "An investigation of the monocable system for cable yarding of small, low-value trees on steep, difficult sites /." Thesis, Connect to this title online; UW restricted, 1991. http://hdl.handle.net/1773/7061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pulls, Tobias. "Preserving Privacy in Transparency Logging." Doctoral thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-35918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service providers, and is a prerequisite for accountability: you cannot hold a controller accountable for what is unknown. We present three generations of PETs for transparency logging to which we contributed. We start with early work that defined the setting as a foundation and build upon it to increase both the privacy protections and the utility of the data sent through transparency logging. Our contributions include the first provably secure privacy-preserving transparency logging scheme and a forward-secure append-only persistent authenticated data structure tailored to the transparency logging setting. Applications of our work range from notifications and deriving data disclosures for the Data Track tool (an ex-post TET) to secure evidence storage.
8

Jun, Ho Huh Jun Ho. "Trustworthy logging for virtual organisations." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:7266bcda-a82b-4b4f-9ec5-d46f8f3573a0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In order to securely monitor user or system activities and detect malicious attempts across a distributed system, provision of trustworthy audit and logging services is necessary. Existing audit-based monitoring services, however, are often prone to compromise due to the lack of guarantees of log integrity, confidentiality, and availability. This thesis presents several use cases where these properties are essential, conducts a threat analysis on these use cases, and identifies key security requirements from the threats and their risks. Then, this thesis proposes a log generation and reconciliation infrastructure in which the requirements are satisfied and threats are mitigated. Applications usually expose a weak link in the way logs are generated and protected. In the proposed logging system, important application events are involuntarily recorded through a trustworthy logging component operating inside a privileged virtual machine. Virtual machine isolation makes it infeasible for applications to bypass the logging component. Trusted Computing attestation allows users to verify the logging properties of remote systems, and ensure that the collected logs are trustworthy. Despite ongoing research in the area of usable security for distributed systems, there remains a `trust gap' between the users' requirements and current technological capabilities. To bridge this `trust gap', this thesis also proposes two different types of distributed systems, one applicable for a computational system and the other for a distributed data system. Central to these systems is the configuration resolver which maintains a list of trustworthy participants available in the virtual organisation. Users submit their jobs to the configuration resolver, knowing that their jobs will be dispatched to trustworthy participants and executed in protected environments. As a form of evaluation, this thesis suggests how these ideas could be integrated with existing systems, and highlights the potential security enhancements.
9

Banchs, Rafael Enrique. "Time harmonic field electric logging /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brodbeck, Arnold M. "Timber industry consolidation and the need for scale appropriate harvesting mechanisms in Alabama's black belt." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/master's/BRODBECK_ARNOLD_5.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Jingang. "Optimal bucking hardwood species in central Appalachia." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains viii, 59 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 49-52).
12

Long, Charles R. "Production and cost analysis of two harvesting systems in central Appalachia." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=2877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S.)--West Virginia University, 2003.
Title from document title page. Document formatted into pages; contains vii, 80 p. : ill. Includes abstract. Includes bibliographical references (p. 62-67).
13

Hue, Yik-Kiong. "Analysis of electromagnetic well-logging tools." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1143053776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Markantonakis, Constantinos. "Secure logging mechanisms for smart cards." Thesis, Royal Holloway, University of London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Franzén, Jonathan, Eric Jonsson, Marcus Nordstrom, and William Sandkvist. "Logging System for Air Quality Mapping." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
An urgent issue in today’s society is the large emissions of air pollutants and CO2. Aside from being extremely harmful to the environment, these emissions can also be particularly unhealthy for inhabitants of metropolitan areas. To help combat this issue, a system for measuring air quality over larger areas is required. In this project a system for mobile air quality mapping was developed, based on an earlier prototype. The system is able to log CO2 levels over large areas, and communicate the measurements to a server when connected to WiFi. The measurements are thereafter inserted into a database, where measurements of several sensors can be stored and accessed. The final version resulted in a system efficiently mapping and storing measurements in a database. This is done whenever a WiFi connection is available for a sensor tracker module. While connected, the module sends measurements to the server in real-time. When a tracker module initiates a WiFi connection, it also uploads any measurements taken while the module was offline. While the system lacks some aspects of scalability and easy configuration, the developed system is largely automated when configured.
Ett akut problem i dagens samhälle är stora utsläpp av luftföroreningar och CO2. Detta är inte bara extremt dåligt för miljön, utan kan också vara speciellt ohälsosamt för invånare i storstadsområden. För att bättre kunna lösa detta problem behövs ett system som kan mäta luftkvalitet över större områden. I detta projekt utvecklades ett system, som var baserat på en tidigare prototyp, för mobil kartläggning av luftkvalitet. Systemet kan logga, spara och kartlägga CO2. Med hjälp av GPS och WiFi-kommunikation kan systemet logga data över ett större område, jämfört med tidigare lösningar som använde sig av mätstationer på fasta platser. System kan logga CO2-nivåer över stora ytor och kommunicera mätvärdena till en server när enheten är ansluten till WiFi. Mätvärdena förs därefter in i databasen, där mätvärden från flera sensorer kan lagras och hämtas. Den slutgiltiga versionen resulterade i ett system som effectivt mappar och lagrar mätvärden i en databas. Detta görs vid de tillfällen en WiFi-anslutning finns tillängling för en sensor tracker modul. Medans modulen är ansluten skickar den mätvärden till en server i realtid. När en tracker modul initierar en WiFi-anslutning laddar den även upp de mätvärden som tagits medan modulen varit offline. Medans systemet saknar vissa aspekter av skalbarhet och enkel konfiguration, så är det utvecklade systemet till stor del automatiserat efter konfiguration.
16

Clark, Thomas K. "Logging Subsystem Performance: Model and Evaluation." PDXScholar, 1994. https://pdxscholar.library.pdx.edu/open_access_etds/4724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Transaction logging is an integral part of ensuring proper transformation of data from one state to another in modern data management. Because of this, the throughput of the logging subsystem can be critical to the throughput of an application. The purpose of this research is to break the log bottleneck at minimum cost. We first present a model for evaluating a logging subsystem, where a logging subsystem is made up of a log device, a log backup device, and the interconnect algorithm between the two, which we term the log backup method. Included in the logging model is a set of criteria for evaluating a logging subsystem and a system for weighting the criteria in order to facilitate comparisons of two logging subsystem configurations to determine the better of the two. We then present an evaluation of each of the pieces of the logging subsystem in order to increase the bandwidth of both the log device and log backup device, while selecting the best log backup method, at minimum cost. We show that the use of striping and RAID is the best alternative for increasing log device bandwidth. Along with our discussion of RAID, we introduce a new RAID algorithm that is designed to overcome the performance problems of small writes in a RAID log. In order to increase the effective bandwidth of the log backup device, we suggest the use of inexpensive magnetic tape drives and striping in the log backup device, where the bandwidth of the log backup device is increased to the point that it matches the bandwidth of the log device. For the log backup interconnect algorithm, we present the novel approach of backing up the log synchronously, where the log backup device is essentially a mirror of the log device, as well as evaluating other log backup interconnect algorithms. Finally, we present a discussion of a prototype implementation of some of the ideas in the thesis. The prototype was implemented in a commercial database system, using a beta version of INFORMIX-OnLine Dynamic Server™ version 6.0.
17

Inada, Tomoya. "Evaluation of the sustainability of a logging system consisting of selective logging and line planting in Indonesia." Kyoto University, 2015. http://hdl.handle.net/2433/199361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Kyoto University (京都大学)
0048
新制・課程博士
博士(農学)
甲第19037号
農博第2115号
新制||農||1031(附属図書館)
学位論文||H27||N4919(農学部図書室)
31988
京都大学大学院農学研究科森林科学専攻
(主査)教授 神﨑 護, 教授 北島 薫, 教授 北山 兼弘
学位規則第4条第1項該当
18

Kiss, Leslie. "A study of five timber harvesting systems used for streamside logging." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A survey of thirty-nine (39) industrial forest engineers was conducted to provide guidelines as to what harvesting system is best suited to specific stand and topographic variables when extracting streamside timber. The advantages and disadvantages of the operational characteristics of the standard highlead spar, mini spar, slackline, grapple yarder and rubber tire skidder are discussed both in terms of site disturbance and wood debris in British Columbia Coastal streams. Productivity and cost data are analyzed for the standard highlead spar, grapple yarder and rubber tire skidder for three selected streamside conditions. The extra cost incurred by the forest sector to comply with stream protection measures requested by fisheries personnel for pre and post harvesting treatments is also presented. Findings indicate that specific topographic and timber conditions, plus the limitations of each harvesting system dictate the selection of the system when logging adjacent to small British Columbia Coastal streams. The grapple yarder is shown to be the most cost effective and efficient system for streamside timber harvest and stream debris management. The stump to dump productivities for the highlead spar, grapple yarder and rubber tire skidder are found to differ. For the three terrain conditions cited, the grapple yarder is shown to be most productive, while the rubber tire skidder is the least costly. Stream protection costs for fisheries concerns were found to be a substantial extra cost to the forest sector. Debris clean-up costs in particular, ranged from $3.00 to $15.00 per lineal metre of stream. The recommendations of the survey respondents and current literature all clearly demonstrate that each area to be harvested having fish values must be dealt with on a site specific basis.
Forestry, Faculty of
Graduate
19

Folegatti, Bruno da Silveira Smidt Mathew F. "The application of precision forestry technologies in logging operations." Auburn, Ala., 2009. http://hdl.handle.net/10415/1975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hameed, Muhammad Muzaffar, and Muhammad Zeeshan ul Haq. "DefectoFix : An interactive defect fix logging tool." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Despite the large efforts made during the development phase to produce fault free system, most of the software implementations still require the testing of entire system. The main problem in the software testing is the automation that could verify the system without manual intervention. Recent work in software testing is related to the automated fault injection by using fault models from repository. This requires a lot of efforts, which adds to the complexity of the system. To solve this issue, this thesis suggests DefectoFix framework. DefectoFix is an interactive defect fix logging tools that contains five components namely Version Control Sysem (VCS), source code files, differencing algorithm, Defect Fix Model (DFM) creation and additional information (project name, class name, file name, revision number, diff model). The proposed differencing algorithm extracts detailed information by detecting differences in source code files. This algorithm performs comparison at sub-tree levels of source code files. The extracted differences with additional information are stored as DFM in repository. DFM(s) can later be used for the automated fault injection process. The validation of DefectoFix framework is performed by a tool developed using Ruby programming language. Our case study confirms that the proposed framework generates a correct DFM and is useful in automated fault injection and software validation activities.
21

Rosenqvist, Simon. "Developing pause thresholds for keystroke logging analysis." Thesis, Umeå universitet, Institutionen för psykologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-105870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Research on the process of writing uses bursts and pauses as key artifacts of underlying cognitive processes. However, the definition of a pause in writing is primarily based on tradition and ease of comparison between studies. This study explores keystroke logging data collected from middle school pupils (N=46) in northern Sweden, Norway and Finland and questions the traditionally defined pause’s usefulness, comparability and validity for investigating the underlying cognitive processes during writing. By examining the raw computer keystroke log data it was revealed that the group had a large variance in typing speed between participants and that different textual contexts had big variances compared to each other. Through exploration of different pause definitions’ effects on the text it was concluded that the twice the median length of pause (median x 2) was a good measurement for investigating pauses in sentences. Further, the 1.5 times the median (median x 1.5) for pauses between keystrokes within words proved useful for investigating the production of individual words.
Forskning på skrivprocesser har länge använt kaskader och pauser som nyckelartefakter av underliggande kognitiva processer. Definitionen av en paus i skrivande är dock främst baserade på tradition och direkt jämförbarhet mellan studier. Denna studie utforskar loggade tangenttrycknings data insamlade från elever (N=46) i mellanstadiet i skolor i norra Sverige, Norge och Finland och ifrågasätter den traditionellt definerade pausens användbarhet, jämförbarhet och validitet för att utforska underliggande kognitiva processer under skrivande. Genom att granska rå-data visade det sig att gruppen som helhet hade stora skillnader i skrivhastighet mellan deltagarna och att olika textuella kontext hade stora skillnader jämfört med varandra. Genom en undersökning av olika paus definitioners effekter på text kom det fram att dubbla längden på medianen för pauser (medianen x 2) var ett bra mått för att undersöka pauser i meningar. Dessutom var 1.5 gånger medianen (medianen x 1.5) i inom-ords kontexter ett användbart mått för att studera produktionen av individuella ord.
22

Tang, Xiaoming. "Acoustic logging in fractured and porous formations." Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/57730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Sc. D.)--Massachusetts Institute of Technology, Dept. of Earth, Atmospheric, and Planetary Sciences, 1990.
Includes bibliographical references (leaves 202-210).
by Xiaoming Tang.
Sc.D.
23

Sharp, Jayson. "A logging service as a universal subscriber." Thesis, Kansas State University, 2014. http://hdl.handle.net/2097/18223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Master of Science
Department of Computing and Information Sciences
Eugene Vasserman
As medical systems expand to allow for the increase the number of devices, new ways to protect patient safety have be developed. The Integrated Clinical Environment, ICE, standard sets up a set of standards that define what an integrated hospital system is. Within the specification is a direct call for a forensic logger that can be used to review patient and system data. The MDCF is one implementation of the ICE standard, but it lacked a key component the ICE standard requires, a logger. Many loggers exist in industry, with varying rates of success and usefulness. A medically sound logger has to be able to completely retell exactly what happened during an event, including patient, device, and system information, so that the right medical professional can provide the best care. Several loggers have been built for MDCF, but few were practical due to the invasiveness of the service. A universal subscriber, a service that is able to connect to all publishing data streams, logging service was built for the MDCF which has the ability to record all information that passes over the MDCF messaging service. This implementation was then stress tested with varying numbers of devices and amounts of data. A reviewing tool was also built that allows for replay of device data that is similar to the original device UI. Future work will include looking into storing system information such as state changes within MDCF and system health. There is also a push to further integrate the forensic reviewer into the core MDCF UI.
24

Lee, Hwa Ok. "Numerical Modeling of Electromagnetic Well-Logging Sensors." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1274981676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Michels, Owen Robert Smidt Mathew F. "GPS and GIS application and analysis of timber harvesting operations on steep terrain." Auburn, Ala, 2009. http://hdl.handle.net/10415/1741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Waddell, David Andrew. "A practical system for determining optimal tree bucking at the stump." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/27740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The objective of this study is to develop a practical system for determining optimal bucking patterns at the stump. The log bucking system was developed for implementation on an IBM-PC micro-computer using data for western hemlock (Tsuga heterophylla (Raf.) Sarg.). The log bucking system is based on a two-phase optimization algorithm which utilizes dynamic programming-to determine the optimal bucking pattern with the objective of maximizing potential tree value. The first phase determines the ultimate bucking pattern within the tree such that potential gross value of derived products is maximized. This pattern reflects log lengths that would be cut if the tree were at the mill. The second phase determines which of the first phase optimal cuts should be made at the stump at the time of tree felling such that extraction costs are minimized. The solution to these two phases yields a bucking pattern that maximizes potential net value from the tree. The log bucking system incorporates assessment of log grade, assignment of value based on log grade and premium log lengths, consideration of standard product lengths, and consideration of extraction costs. The log bucking system includes an algorithm for evaluating unusual bucking situations when there are practical constraints imposed on saw cut locations. For a set of test data, the potential net value of logs bucked using the optimization algorithm within the log bucking system showed an increase of 4.2% over the potential net value of trees bucked using present industry bucking practices. A two way analysis of variance for paired observations determined that this increase was significant at a 0.05% level of significance.
Forestry, Faculty of
Graduate
27

Campbell, Steven P. "The Long-term Effects of a Group-selection Timber Harvest on the Bird Community of an Oak-Pine Forest in Maine." Fogler Library, University of Maine, 2007. http://www.library.umaine.edu/theses/pdf/CampbellSP2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Politi, Natalia. "Selective Logging in Subtropical Montane Forests of the Andes: Its Effect on Avian Cavity Nesters." Fogler Library, University of Maine, 2008. http://www.library.umaine.edu/theses/pdf/PolitiN2008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Grahn, Christian. "Implementing Transparency Logging for an Issue Tracking System." Thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
On the Internet today, users are accustomed to disclosing personal information when accessing a new service. When a user does so, there is rarely a system in place which allows the user to monitor how his or her information is actually shared or used by services. One proposed solution to this problem is to have services perform transparency logging on behalf of users, informing them how their data is processed as processing is taking place. We have recently participated in a collaboration to develop a privacy-preserving secure logging scheme that can be used for the purpose of transparency logging. As part of that collaboration we created a proof of concept implementation. In this thesis, we elaborate on that implementation and integrate it with a minimalistic open source issue-tracking system. We evaluate the amount of work required to integrate the logging system and attempt to identify potential integration problems. Using this issue-tracking system we then design and implement a scenario that demonstrates the value of the logging system to the average user.
30

Mitchell, Dana L. Gallagher Thomas Vincent Taylor Steven E. "Extended working hours in the southeastern logging industry." Auburn, Ala, 2008. http://repo.lib.auburn.edu/EtdRoot/2008/SUMMER/Forestry_and_Wildlife_Sciences/Dissertation/Mitchell_Dana_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Keen, John Sidney 1962. "Logging and recovery in a highly concurrent database." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/36450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Sc. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1994.
Includes bibliographical references (p. 179-183).
by John Sidney Keen.
Sc.D.
32

Blanz, Martin, Thomas Kruspe, Holger Frank Thern, and Gerhard Alfons Kurz. "Nuclear Magnetic Resonance Logging While Drilling (NMR-LWD)." Universitätsbibliothek Leipzig, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-186302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
NMR T2 distribution measurement is our chosen everyday method for NMR logging while drilling oil and gas wells. This method yields straightforward preparation and execution of the job as well as a normally easy interpretation of the measured data. For instance, gas and light oil discrimination against water is feasible by direct observation of the T2 distribution. A condition for this measurement method is a NMR logging tool that hardly moves while drilling and in addition uses a small static magnetic field gradient and short inter-echo time TE to be motion tolerant. Using data compression techniques, we can transmit by mud pulse telemetry the T2 distribution in real time from the borehole to the surface. This enables the drilling operator to use the NMR data for real-time decisions such as geosteering.
33

Gao, Shen. "Transaction logging and recovery on phase-change memory." HKBU Institutional Repository, 2013. http://repository.hkbu.edu.hk/etd_ra/1549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

LeBel, Luc. "Production capacity utilization in the southern logging industry." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07292009-090336/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

McDonald, Heather Noel. "The impact of logging on aquatic salamander communities." [Johnson City, Tenn. : East Tennessee State University], 2001. http://etd-submit.etsu.edu/etd/theses/available/etd-0711101-121822/unrestricted/mcdonaldh0730.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (M.S.)--East Tennessee State University, 2001.
Title from electronic submission form. ETSU ETD database URN: etd-0711101-121822 Includes bibliographical references. Also available via Internet at the UMI web site.
36

Sodhi, Bir Apaar Singh. "DATA MINING: TRACKING SUSPICIOUS LOGGING ACTIVITY USING HADOOP." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this modern rather interconnected era, an organization’s top priority is to protect itself from major security breaches occurring frequently within a communicational environment. But, it seems, as if they quite fail in doing so. Every week there are new headlines relating to information being forged, funds being stolen and corrupt usage of credit card and so on. Personal computers are turned into “zombie machines” by hackers to steal confidential and financial information from sources without disclosing hacker’s true identity. These identity thieves rob private data and ruin the very purpose of privacy. The purpose of this project is to identify suspicious user activity by analyzing a log file which then later can help an investigation agency like FBI to track and monitor anonymous user(s) who seek for weaknesses to attack vulnerable parts of a system to have access of it. The project also emphasizes the potential damage that a malicious activity could have on the system. This project uses Hadoop framework to search and store log files for logging activities and then performs a ‘Map Reduce’ programming code to finally compute and analyze the results.
37

Kleinschroth, Fritz. "Roads in the rainforests : legacy of selective logging in Central Africa : evaluating the temporal and spatial dynamics of logging road networks." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/roads-in-the-rainforests-legacy-of-selective-logging-in-central-africa(4df4f3b6-76e1-4ec0-b2e2-eb29bbae94a4).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Selective logging prevails in tropical forests around the world, posing urgent questions about how to reconcile timber extraction with biodiversity conservation. Roads are those elements of selective logging that are most costly, most visible and they probably have the most far-reaching environmental impacts. While many studies have outlined road related threats to forest ecosystems, little is known about the persistence of logging roads in the forest landscape. This is especially important in Central Africa, where selective logging is the most important type of land use, both in terms of spatial extent and financial yield. In this thesis I analyze the temporal and spatial dynamics of logging road networks in a part of the Congo Basin and apply these findings to make suggestions for forest management. In five chapters I am approaching the subject from different angles and on different scales: In the introductory chapter, I compare the content and the orientation of scientific literature on logging roads in tropical forests. In general I identified two strains in the literature, one focusing specifically on road related impacts on forest ecosystems and the other giving technical advice in road planning, building and maintenance in order to improve efficiency and reduce impacts. A third, partially distinct direction of research is oriented on the characterization of the spatial distribution and coverage of forest road networks on larger scale to monitor forest exploitation and related degradation. The second chapter presents a methodology to identify roads in CentralAfrican forests based on remote sensing with LANDSAT images. In a time series approach, I used survival analysis to evaluate the temporal dynamics of secondary logging roads over the last 30 years and showed how road persistence differs depending on environmental variables such as geological substrates. The third chapter approaches the persistence of logging roads from a field based perspective. I carried out vegetation inventories on a chronosequence of roads abandoned between 1985 and 2015. The results showed that road tracks and edges are suitable habitats for commercial species regeneration with rapid changes in the environmental conditions occurring over time. During 30 years after abandonment about one third of the biomass lost for road building has re-captured in subsequent vegetation development. The fourth chapter analyses the extent of logging road networks in the overall forest landscape. I used the mathematically well-defined Empty Space Function as a novel way to calculate roadless space. I demonstrated how roadless space in intact forest landscapes (declared in 2000) has diminished in general but in particular in FSC-certified logging concessions. I recommend that forest management should make the preservation of large connected forest areas a top priority by effectively monitoring - and limiting - the occupation of space by roads that are accessible at the same time. The concluding chapter develops management suggestions to apply the findings. I showed that re-opening logging roads in subsequent harvests is rather the exception than the rule. Evaluating benefits, opportunities, costs and risks, I conclude that re-opening roads should be given a higher priority in forest management. Re-using logging roads can spare forests within the same area by avoiding new forest clearing in the vicinity and at a larger scale by sparing unlogged forests from new logging disturbance by intensifying operations on previously logged forests. As a vision for road management, I suggest to actively manage logging roads as transient elements in the landscape until they are reopened. Permanent access roads should only be built in the periphery of continuous forest blocks. As a perspective for further research, I discuss the trade-offs between the need of roads for development and the environmental impacts. As an example for this, I present evidence for the first major road corridor crossing the Congo Basin that is already under construction. To limit the impacts on the forest, large-scale conservation corridors have to be established, requiring supra-regional landscape planning.
38

Sokol, Kerry Ann. "Implications of Longterm Diameter-Limit Harvesting: Effects on Radial Growth of Red Spruce (Picea rubens) and Genetic Diversity of White Pine (Pinus strobus)." Fogler Library, University of Maine, 2001. http://www.library.umaine.edu/theses/pdf/SokolKA2001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kimble, Matthew Sidney. "Variation of aquatic and terrestrial riparian biodiversity in response to watershed condition /." Thesis, Connect to this title online; UW restricted, 1999. http://hdl.handle.net/1773/5527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Derr, Katharyn Dianne. "Forest dynamics in mesic northern hardwoods following windthrow and salvage logging." [Ames, Iowa : Iowa State University], 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Milburn, Jason S. Jr. "Injuries on Mechanized Logging Operations in the Southeastern United States." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/36830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A random sample of injuries to employees of mechanized logging operations in the piedmont and coastal plain regions of the Southeastern U.S. was taken from the 1996-1997 claims records of three cooperating Worker's Compensation Insurance carriers. For each claim, information was gathered about the accident. Additional information on equipment, labor, and operations was gathered for each firm reporting a sample claim. All data was recorded in a spreadsheet program for sorting and analysis.

The deckhand was the crew member most frequently injured (34% of claims), followed by equipment operators (28%) and truck drivers (24%). The delimbing/topping job function resulted in 24% of injuries, followed by maintenance/repair of equipment (19%), operating equipment (15%), and mounting/dismounting equipment (9%). The injuries occurred on the log deck (41%), in the woods (29%), and at a shop (11%). Most injuries were "struck by" type (50%), but 21% were "falls". The mean claims cost was $10,920 and the median claims cost was $1,200. On fully mechanized operations, 24% of total injuries are still a result of chainsaw delimbing or felling. Equipment operator injuries occur during maintenance/repair (29%) and while mounting/dismounting the equipment (23%). One-third of injuries to truck drivers was the result of motor vehicle accidents.

Conclusions:

* A worker performing equipment maintenance or repair, or a worker felling or delimbing a tree not processed by a feller-buncher or delimbing device, has the greatest risk of injury on fully-mechanized operations.

* Mechanization of the delimbing function will reduce but not eliminate the most costly injuries, where a worker on the ground is "struck-by" a tree, limb, or log.

* Equipment maintenance or repair should be performed in the controlled environment of a shop, rather than in the field, in order to decrease injuries.

* Operating a chainsaw is still a very dangerous logging job function, even on mechanized operations. All employees that use a chainsaw should undergo extensive training, and only trained employees should use a chainsaw.
Master of Science

42

Achet, Shiva Hari. "An integrated approach to modeling : the impact of timber harvest on streamflow : a GIS based hydrologic model /." Thesis, Connect to this title online; UW restricted, 1997. http://hdl.handle.net/1773/5545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Peisert, Sean Philip. "A model of forensic analysis using goal-oriented logging." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3246091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2007.
Title from first page of PDF file (viewed March 9, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 156-165).
44

Mead, Claire. "The effects of logging on understorey birds in Borneo." Thesis, Manchester Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.486961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Studies have established that birds are affected by logging and largely adversely. However, which species are affected, and to what degree, remains unanswered. In particular there is a need to establish why birds decline. Studies show insectivores to be the most vulnerable, but factors affecting insectivorous bird survival are unknown. The purpose of this study is to confirm which species are vulnerable, and the reason why. This study demonstrates the high proportion of understorey bird species which are affected by logging and the large extent by which most species are adversely affected. Not only did the majority (about 80%) decline, but two-thirds of species were severely affected (declined by 50% or more), and a third exhibited acute decline (of over 75%). Only generalists and nectivores are not adversely affected by logging. The abundance of understorey invertebrates also declines following logging. Howwever, pertinent to insectivorous birds, this decline is more significant for the prey groups. It is dependent on substrate, and becomes more severe in drought. For this reason temporal changes in prey availability are likely to be as important as determinants of local bird densities as mean prey availability in logged forest. The lower range of prey availability is likely to be a critical factor in bird persistence in logged forest. Results indicate that drought is the mechanism through which habitat disturbance causes a decline in prey abundance. This decline in arthropods appears to directly impact on insectivorous birds such as babblers. Arthropods (at least those that are bird prey) and babblers are associated with microhabitats that are uncommon in logged forest. The response of three arthropod communities (foliage, ground and suspended litter) to disturbance depends upon how the logged microhabitats available approximate the natural microhabitats they prefer. Skids and gaps are avoided, and arthropod abundance depends directly upon the availability of preferred and usable microhabitats. Such microhabitat becomes increasingly rare with increased severity of disturbance. Insectivorous birds decline because optimium foraging sites are rarely available, and they experience a decline in prey availability. The decline in density of babblers is due at least in part to prey scarcity. The foraging success of babblers declines in logged forest, on average by 80%. Logged attack rates are universally lower (for all 15 species) than those of undisturbed forest. Arboreal, low level and terrestrial babblers all have a lower attack yield in logged forest, which suggests that babblers consume less prey in logged forest than in primary forest. Foraging preferences also explain the relative decline of babblers. The foraging strategy of babblers dictates how vulnerable they will be to logging, and it is clear that it is specialisation specifically that causes species decline. This graduated response to logging can also be predicted on the basis of microhabitat use, and is also explained by the magnitude of disturbance. Understorey birds show greatest decline in abundance where the degree of disturbance is most severe. This implies that forest management could greatly affect bird survival.
45

Berry, Nicholas J. "Impacts of selective logging on biodiversity in Bornean rainforest." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.496551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nortcliffe, Anne. "Anti-logging approach to pH control of chemical effluent." Thesis, University of Sheffield, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Johnson, Erik D. Ph D. Massachusetts Institute of Technology. "High-energy photon transport modeling for oil-well logging." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering, 2009.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 121-122).
Nuclear oil well logging tools utilizing radioisotope sources of photons are used ubiquitously in oilfields throughout the world. Because of safety and security concerns, there is renewed interest in shifting to electronically-switchable accelerator sources. Investigation of accelerator sources opens up the opportunity to study higher-energy sources. In this thesis, sources with a 10 MeV endpoint are examined, a several-fold increase over traditional techniques. The properties of high-energy photon transport are investigated for potential new or improved well logging measurements. Two obvious processes available with a high-energy photon source are pair production and photo neutron emission. A new measurement of formation density is proposed based on the annihilation radiation produced after the pair production of high-energy source photons in the rock formation. With a detector spacing of 55 cm, this measurement exhibits a sensitivity to density with a dynamic range of 10 across a typical range of formation density (2.0 - 3.0 g/cc), the same as traditional measurements. Increases in depth of investigation for these measurements can substantially improve the sampling of the formation and thus the quality and relevance of the measurement. Being distributed in angle and space throughout the formation, a measurement based on anni-hilation photons exhibits a greater depth of investigation than traditional methods. For a detector spacing of 39 cm (equivalent to a typical spacing for one detector in traditional approaches), this measurement has a depth of investigation of 8.0 cm while the traditional measurement has a depth of investigation of 3.6 cm.
(cont.) For the 55 cm spacing, this depth is increased to 9.4 cm. Concerns remain for how to implement an accelerator source in which energy spectroscopy, essential for identifying an annihilation peak, is possible. Because pair production also depends on formation lithology, the effects of chemical composition on annihilation photon flux are small (<20 %) for the studied geometry. Additionally, lithology measurements based on attenuation at high energies show too small an effect to be likely to produce a useful measurement. Photoneutron production cross sections at this energy are too small to obtain a measurement based on this process.
by Eric D. Johnson.
Ph.D.
48

Liao, Guangzhi, Lizhi Xiao, and Ranhong Xie. "Method and experimental study of 2-D NMR logging." Universitätsbibliothek Leipzig, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-192367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Two-dimension (2D) NMR measurements have been performed to provide more information for qualitative identification and quantitative evaluation of the reservoir-fluids both in numerical simulation and in laboratory experiments. The data acquired with variable echo spacing and waiting time was inverted by multi-exponential inversion method. We use these 2D inversion results to identify fluid types and calculate fluid-saturation. We also detect the distribution of internal field gradients of core samples which contain paramagnetic minerals.
49

Blomgren, Axel. "Influence of logging residues on MeHg accumulation in soil." Thesis, KTH, Hållbar utveckling, miljövetenskap och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-234263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Forestry has been found to increase the accumulation of methyl mercury (MeHg), a highly neurotoxic compound, in forest soils. However, little is known about how forestry influences catchment processes that governs the mercury (Hg) methylation process. Logging residues are used in harvested catchments in stick roads to reduce soil disturbances caused by forestry machinery. Logging residues left on site after harvest have been suggested to act as a source of high-quality organic matter that stimulates the activity of the microorganisms that carry out the methylation of Hg. In addition, logging residues might influence the activity and abundance of methylating bacteria by reducing the temperature fluctuations in soils below residues and by increasing the soil moisture content. To evaluate the impact of logging residues on the accumulation of MeHg, an experimental field study was carried out in three sites, one in Uppland and two in Västerbotten. The concentration of MeHg was compared between soils covered with residues and soils without residues, and between the lower and upper parts residue piles. Logging residues were not found to influence the levels of MeHg in soils. However, an increased accumulation of MeHg was found in the lower part of residue piles. The accumulation of MeHg in the lower parts was accompanied by a reduced temperature amplitude and an increased water content compared to the upper part of the piles. The increased formation of MeHg might have been mediated by an increased water content in the lower part of the residue piles, possibly by increasing the abundance and activity of Hgmethylating microorganisms due to suboxic/anoxic conditions within biofilms around decomposing needles. The dissolved organic matter composition in soil water differed in soils below residues compared to without residues, but the organic matter signature in soil water under residues was not found to be compliant with an elevated mercury methylation rate. As MeHg accumulated in the lower part of residue piles could become mobilized and transferred to surface water, the suitability of using logging residues in stick roads depends on the location within the catchment. The removal of logging residues could prevent the potential mobilization of MeHg from residue piles. Though, as soil disturbances may cause an increased Hg methylation rate and mediate MeHg export to surface waters, other form of protection, e.g. logging mats, should be used if logging residues are not used to protect soils.
Mänsklig aktivitet har lett till förhöjda halter av kvicksilver (Hg) i atmosfären. Genom långväga transport och deposition har detta orsakat förhöjda halter i svensk natur. Den huvudsakliga exponeringsvägen av Hg för människan sker genom konsumtion av fisk. Halterna av Hg i svensk insjöfisk överstiger EU:s gränsvärden för god kemisk status samt Världshälsoorganisationens riktlinjer för konsumtion i majoriteten av svenska vatten. Ackumuleringen av Hg i biota sker främst i form av metylkvicksilver (MeHg) som är starkt neurotoxiskt. Avverkning av skog tros bidra till en ökad bildning av MeHg i skogsmark genom att skapa miljöer som gynnar etableringen och aktiviteten av de mikroorganismer som omvandlar icke-organiskt kvicksilver (Hg(II)) till organiskt kvicksilver (MeHg). Dessutom kan skogsbruk bidra till en ökad export av MeHg till följd av ändrade hydrologiska förhållanden samt markskador. En ökad bildning av MeHg är oönskad då mobilisering sedermera kan ske till vattendrag där MeHg kan ackumuleras i akvatisk biota. Dock är kunskapen om hur skogsbruk påverkar specifika processer som är av betydelse för metyleringen av Hg begränsad. Inom skogsbruk används avverkningsrester, bestående av till exempel grenar och toppar, i rishögar för att skydda marken mot körskador. Avverkningsrester som lämnas kvar på området efter avverkning tros bidra till en ökad metylering genom att utgöra en källa av högkvalitativt organiskt material vilket kan stimulera bakteriell aktivitet. Dessutom kan avverkningsrester bidra till en ökad metylering av Hg genom att minska temperaturfluktuationerna i mark täckt med ris samt öka markens vattenhalt, vilket kan bidra till en ökad etablering samt att stimulera aktiviteten av Hg-metylerande mikroorganismer. För att utvärdera effekten av avverkningsrester på ackumuleringen av MeHg genomfördes en experimentell fältstudie där koncentrationen av MeHg jämfördes i mark täckt med ris och mark utan ris. Dessutom undersöktes huruvida en ökad metylering kan ske i den nedre delen av riset, vilket skulle kunna möjliggöras av bakterier i biofilmer kring ris under nedbrytning. Koncentrationen MeHg var högre i den nedre delen av rishögarna jämfört med den övre delen. I den nedre delen av riset var temperaturfluktuationerna lägre och vattenhalten högre än i den övre delen av riset. Ackumuleringen av MeHg kan ha skett via biofilmer i de nedre delarna av riset, där tillgången till hög kvalitativt organiskt material samt mer syrefria förhållanden kan ha gynnat etableringen och aktiviteten av de bakterier som utför metyleringen av Hg. Däremot hade typen av marktäcke, dvs mark täckt med ris och mark utan ris, inte någon påverkan på metyleringen av Hg. Karaktären av organiskt material i markvatten skiljde sig mellan typ av marktäcke, men visar inte på att avverkningsrester utgör en källa av högkvalitativt organiskt material. Vattenhalten i mark under rishögar skiljde sig inte jämfört med mark utan ris, men temperaturen var lägre med mindre variation i mark under rishögar. Därmed visar resultatet på att avverkningsrester kan bidra till en ökad bildning av MeHg. En potentiell mobilisering av MeHg som bildats i rishögarna skulle därför kunna bidra till en ökad export av MeHg från avverkade områden. Användningen av avverkningsrester, för att skydda marken vid körning med skogsmaskiner, anses ändå vara fördelaktig för att minimera utläckage av MeHg. Körskador kan skapa stående vattensamlingar där MeHg kan bildas samt kompaktera mark och skapa snabba ytliga flödesvägar i området. Däremot tyder resultatet på att användningen bör ske med hänsyn till att förhindra eventuell transport av MeHg till vattendrag. Ifall avverkningsrester inte används för att motverka markskador bör ett substitut användas, exempelvis stock-mattor, då körskador kan bidra till en ökad metylering och mobilisering av MeHg. Dock saknas kunskap om eventuell mobilisering av MeHg från rishögar till vattendrag och detta bör utvärderas i framtida studier.
50

Liao, Guangzhi, Lizhi Xiao, and Ranhong Xie. "Method and experimental study of 2-D NMR logging." Diffusion fundamentals 10 (2009) 28, S. 1-4, 2009. https://ul.qucosa.de/id/qucosa%3A14120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Two-dimension (2D) NMR measurements have been performed to provide more information for qualitative identification and quantitative evaluation of the reservoir-fluids both in numerical simulation and in laboratory experiments. The data acquired with variable echo spacing and waiting time was inverted by multi-exponential inversion method. We use these 2D inversion results to identify fluid types and calculate fluid-saturation. We also detect the distribution of internal field gradients of core samples which contain paramagnetic minerals.

To the bibliography