Abstract:
A computer-implemented method for generating patterns from a set of heterogeneous log messages is presented. The method includes collecting the set of heterogenous log messages (101) from arbitrary or unknown systems or applications or sensors or instruments, splitting the log messages into tokens based on a set of delimiters (102), identifying datatypes of the tokens, identifying a log structure (103) of the log messages by generating pattern-signatures of all the tokens and the datatypes based on predefined pattern settings, generating a pattern (104) for each of the log structures, and enabling users to edit the pattern for each of the log structures based on user requirements.
Abstract:
A computer-implemented method executed on a processor (214) for automatically analyzing log contents received via a network (803) and detecting content-level anomalies is presented. The computer-implemented method includes building a statistical model (103) based on contents of a set of training logs and detecting, based on the set of training logs, content-level anomalies (106) for a set of testing logs. The method further includes maintaining an index and metadata, generating attributes for fields, editing model capability to incorporate user domain knowledge, detecting anomalies using field attributes, and improving anomaly quality by using user feedback (107).
Abstract:
Systems and methods are disclosed for handling log data from one or more applications, sensors or instruments by receiving heterogeneous logs from arbitrary/unknown systems or applications; generating regular expression patterns from the heterogeneous log sources using machine learning and extracting a log pattern therefrom; generating models and profiles from training logs based on different conditions and updating a global model database storing all models generated over time; tokenizing raw log messages from one or more applications, sensors or instruments running a production system; transforming incoming tokenized streams are into data-objects for anomaly detection and forwarding of log messages to various anomaly detectors; and generating an anomaly alert from the one or more applications, sensors or instruments running a production system.
Abstract:
Systems and methods for implementing content-level anomaly detection for devices having limited memory are provided. At least one log content model is generated (130) based on training log content of training logs obtained from one or more sources associated with the computer system. The at least one log content model is transformed (140) into at least one modified log content model to limit memory usage. Anomaly detection is performed (170) for testing log content of testing logs obtained from one or more sources associated with the computer system based on the at least one modified log content model. In response to the anomaly detection identifying one or more anomalies associated with the testing log content, the one or more anomalies are output (170).
Abstract:
A computer-implemented method, computer program product, and computer processing system are provided. The method includes preprocessing, by a processor, a set of heterogeneous logs by splitting each of the logs into tokens to obtain preprocessed logs. Each of the logs in the set is associated with a timestamp and textual content in one or more fields. The method further includes generating, by the processor, a set of regular expressions from the preprocessed logs. The method also includes performing, by the processor, an unsupervised parsing operation by applying the regular expressions to the preprocessed logs to obtain a set of parsed logs and a set of unparsed logs, if any. The method additionally includes storing, by the processor, the set of parsed logs in a log analytics database and the set of unparsed logs in a debugging database.
Abstract:
Methods and systems for log management include pre-processing heterogeneous logs and performing a log management action (112) on the pre-processed plurality of heterogeneous logs. Pre-processing the logs includes performing a fixed tokenization (104) of the heterogeneous logs based on a predefined set of symbols, performing a flexible tokenization (106) of the heterogeneous logs based on a user-defined set of rules, converting timestamps (108) in the heterogeneous logs to a single target timestamp format, and performing structural log tokenization (110) of the heterogeneous logs based on user-defined structural information.
Abstract:
A method for free flow fever screening is presented. The method includes capturing (801) a plurality of frames from thermal data streams and visual data streams related to a same scene to define thermal data frames and visual data frames, detecting and tracking (803) a plurality of individuals moving in a free-flow setting within the visual data frames, and generating (805) a tracking identification for each individual of the plurality of individuals present in a field-of-view of the one or more cameras across several frames of the plurality of frames. The method further includes fusing (807) the thermal data frames and the visual data frames, measuring (809), by a fever-screener, a temperature of each individual of the plurality of individuals within and across the plurality of frames derived from the thermal data streams and the visual data streams, and generating (811) a notification when a temperature of an individual exceeds a predetermined threshold temperature.
Abstract:
Methods and systems for video analysis and response include detecting (304) face images within video streams. Noisy images are filtered (306) from the detected face images. Batches of the remaining detected face images are clustered (602) to generate mini-clusters, constrained by temporal locality. The mini-clusters are globally clustered (606) to generate merged clusters formed of face images for respective people, using camera-chain information to constrain a set of the video streams being considered. Analytics (204) are performed on the merged clusters to identify a tracked individual's movements through an environment. A response (206) is performed to the tracked individual's movements.
Abstract:
Methods and systems for detecting and predicting anomalies include processing (204) frames of a video stream to determine values of a feature corresponding to each frame. A feature time series is generated (206) that corresponds to values of the identified feature over time. A matrix profile is generated (208) that identifies similarities of sub-sequences of the time series to other sub-sequences of the feature time series. An anomaly is detected (210) by determining that a value of the matrix profile exceeds a threshold value. An automatic action is performed (212) responsive to the detected anomaly.
Abstract:
A computer-implemented method executed by at least one processor for detecting tattoos on a human body is presented. The method includes inputting (701) a plurality of images into a tattoo detector, selecting (703) one or more images of the plurality of images including tattoos, extracting (705), via a feature extractor, tattoo feature vectors from the tattoos found in the one or more images of the plurality of images including tattoos, applying (707) a deep learning tattoo matching model to determine potential matches between the tattoo feature vectors and preexisting tattoo images stored in a tattoo training database, and generating (709) a similarity score between the tattoo feature vectors and one or more of the preexisting tattoo images stored in the tattoo training database.