IJARP Impact Factor(2018): 4.908

International Journal of Advanced Research and Publications!

Paper Details: An Approach Towards Designing A Prescriptive Analytical Logic Model for Software Application Root Cause Analysis

Volume 3 - Issue 11, November 2019 Edition
[Download Full Paper]

Author(s)
Hoo Meng Wong
Keywords
Application log analysis, Log file analysis, Analytic Hierarchy Process.
Abstract
Most of the business operations utilize software application heavily in today’s business world. Software application cannot afford to stop its functioning in the production environment during business hours. However, it is hard to restore the software application service without identifying the root cause. Software application error can occur either within the software application layer or any other factor outside the software application layer. With an enterprise level of software application, the complexity is high as it involves multiple tiers and many middleware are running in the environment. The root cause analysis of software application will be easily prolonged due to more than one log file required. The duration on restoring the software application service back to the users can be hard to determine whenever error is occurred. Therefore, the objective is to mitigate prolonging on conducting root cause analysis activity. Indeed to identify the root cause of software application error in a more accurate manner, and shorten the duration of root cause analysis activity conducting on software application error. A Prescriptive Analytical Logic Model incorporates with Analytic Hierarchy Process (AHP) is proposed. This logic model contributes a new knowledge in the area of log file analysis to shorten the total time spent on root cause analysis activity. At the same time it contributes the knowledge in AHP to close the knowledge gap.
References
[1] Hoo Meng W., Amalathas S.S. (2019). A New Approach Towards Developing a Prescriptive Analytical Logic Model for Software Application Error Analysis. In: Silhavy R., Silhavy P., Prokopova Z. (eds) Intelligent Systems Applications in Software Engineering. CoMeSySo 2019 2019. Advances in Intelligent Systems and Computing, vol 1046. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-30329-7_24. https://link.springer.com/chapter/10.1007/978-3-030-30329-7_24
[2] Hoo Meng Wong and Sagaya Sabestinal Amalathas. (2019). An Approach towards developing an Algorithm for Software Application Error Analysis. David Publishing Company. DOI:10.17265/2328-2185/2019.04.006. http://www.davidpublisher.com/index.php/Home/Article/index?id=39805.html
[3] Wikimedia Foundation Inc. 2017. Logfile. https://en.wikipedia.org/wiki/Logfile (Accessed on 19th February 2017).
[4] Loggly Inc. 2017. https://www.loggly.com/blog/measuring-the-impact-of-logging-on-your-application/ (Accessed on 19th February 2017).
[5] Archanaa Panda. 2011. High Performance And Smarter Logging. DZone. https://dzone.com/articles/high-performance-and-smarter (Accessed on 20th February 2017).
[6] Linda V. Ornelas. 2003. SANS Institute. Important of Event Logging. https://www.giac.org/paper/gsec/3297/importance-event-logging/105437 (Accessed on 23th February 2017).
[7] Edward Mercer, 2015. How Technology Affects Business Operations. OpposingViews.com. http://science.opposingviews.com/technology-affects-business-operations-1659.html (Accessed on 28th November 2015)
[8] SuccessFactors, 2015. Using Technology to Increase Your Business Productivity. https://www.successfactors.com/en_us/lp/articles/using-technology-to-increase-your-business-productivity.html (Accessed on 28th November 2015)
[9] Alex Bloom, 2014. The Cost of Application Downtime is Priceless. StatusCast. http://www.statuscast.com/cost-application-downtime-pricess/ (Accessed on 28th November 2015)
[10] Hasan, Mohamad K., 2010. A Framework for Intelligent Decision Support System for Traffic Congestion Management System. Kuwait city, Kuwait. http://www.umsl.edu/divisions/business/pdfs/Mohamad%20Hasan%20IDSS.pdf (Accessed on 13th November 2015)
[11] Kristof Horvath, 2015. Using Root Cause Analysis to Drive Process Improvement. Intland Software. http://intland.com/blog/safety-engineering/using-root-cause-analysis-to-drive-process-improvement/ (Accessed on 28th November 2015)
[12] Management Logic, 2012. Root-Cause Analysis. http://www.management-logic.com/toolbox/sales/Root-Cause%20Analysis/Index.html (Accessed on 28th November 2015)
[13] Margulius, David. 2006. Tech jobs take stress to whole new levels. InfoWorld, Inc. http://www.infoworld.com/article/2655363/techology-business/tech-jobs-take-stress-to-whole-new-levels.html (Accessed on 13th November 2015)
[14] REDDIT. 2015. Experienced Dev's: How much of your time do you spend troubleshooting? https://www.reddit.com/r/webdev/comments/3sldcc/experienced_devs_how_much_of_your_time_do_you/ (Accessed on 14th November 2015)
[15] StackOverflow. 2015. How much time do you spend in production troubleshooting? http://stackoverflow.com/questions/1425069/how-much-time-do-you-spend-in-production-troubleshooting (Accessed on 14th November 2015)
[16] Wikipedia, 2015. Analytic hierarchy process. Wikimedia Foundation, Inc. https://en.wikipedia.org/wiki/Analytic_hierarchy_process (Accessed on 13th November 2015)
[17] www.evolven.com, Labels: Data Center, Downtime. 2014. Downtime, Outages and Failures - Understanding Their True Costs. Evolven Software. http://www.evolven.com/blog/downtime-outages-and-failures-understanding-their-true-costs.html (Accessed on 13th November 2015)
[18] SANS Institute. 2001. Importance of Understanding Logs from an Information Security Standpoint. https://www.sans.org/reading-room/whitepapers/logging/importance-understanding-logs-information-security-standpoint-200 (Accessed on 6th March 2017)
[19] Andreas Grabner. 2012. Dynatrace LLC. Top Performance Mistakes when moving from Test to Production: Excessive Logging. https://www.dynatrace.com/blog/top-performance-mistakes-when-moving-from-test-to-production-excessive-logging/ (Accessed on 6th March 2017)
[20] Robert Rinnan. 2005. Benefits of Centralized Log File Correlation. Gjøvik University College. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.8787&rep=rep1&type=pdf (Accessed on 16th March 2017)
[21] Wikimedia, 2016. Electronic data processing. Wikimedia Foundation, Inc. https://en.wikipedia.org/wiki/Electronic_data_processing (Accessed on 4th March 2018)
[22] Wikimedia, 2017. Service-level agreement. Wikimedia Foundation, Inc. https://en.wikipedia.org/wiki/Service-level_agreement (Accessed on 21st August 2017)
[23] ResearchGate. 2019. How would you define a "model" within a theoretical research? https://www.researchgate.net/post/How_would_you_define_a_model_within_a_theoretical_research (Accessed on 13th February 2019)
[24] WhatIs.com. 2019. framework. TechTarget. https://whatis.techtarget.com/definition/framework (Accessed on 17th February 2019)
[25] Collins English Dictionary. 2019. Definition of 'model'. https://www.collinsdictionary.com/dictionary/english/model (Accessed on 17th February 2019)
[26] David B. Stewart, PhD. 2012. Troubleshooting real-time software issues using a logic analyzer. InHand Electronics, Inc. http://www.embedded.com/design/debug-and-optimization/4236800/Troubleshooting-real-time-software-issues-using-a-logic-analyzer (Accessed on 12th December 2015)
[27] Felix Salfner and Steffen Tschirpke. 2015. Error Log Processing for Accurate Failure Prediction. www.usenix.org. https://www.usenix.org/legacy/event/wasl08/tech/full_papers/salfner/salfner_html/ (Accessed on 12th December 2015)
[28] Gerald Stermsek, Mark Strembeck, Gustaf Neumann. A User Profile Derivation Approach based on Log-File Analysis. Institute of Information Systems, New Media Lab Vienna University of Economics and BA, Austria. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.141.6449&rep=rep1&type=pdf (Accessed on 20th February 2017)
[29] James H. Andrews. 1998. Theory and practice of log file analysis. Dept. of Computer Science, University of Western Ontario. London, Ontario, Canada. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.44.292&rep=rep1&type=pdf (Accessed on 20th February 2017)
[30] James H. Andrews. A Framework for Log File Analysis. Dept. of Computer Science, University of Western Ontario. London, Ontario, Canada. https://pdfs.semanticscholar.org/9d1a/97988d8b41354cd4bf85ace96648d1684555.pdf (Accessed on 20th February 2017)
[31] Jan Valdman. 2001. Log File Analysis. https://www.kiv.zcu.cz/site/documents/verejne/vyzkum/publikace/technicke-zpravy/2001/tr-2001-04.pdf (Accessed on 18th January 2017)
[32] Júlia Murínová. 2015. Application Log Analysis. http://is.muni.cz/th/374567/fi_m/thesis_murinova.pdf (Accessed on 18th January 2017)
[33] Reyha Verma and Jasbir Singh. 2015. A Comparative Analysis of Deterministic Sorting Algorithms based on Runtime and Count of Various Operations. Department of Computer Science, National Institute of Technology, Srinagar, India. Department of Computer Science & IT, University of Jammu, Jammu, India. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/detail/detail?vid=13&sid=9b1c93a9-f593-45b7-ba91-47543dbb05d4%40sessionmgr4001&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=111599948&db=iih (Accessed on 18th January 2017)
[34] Stephen G. Eick, Michael C. Nelson, and Jeffery D. Schmidt. 1994. Graphical Analysis of Computer Log Files. Communications of the ACM. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.43.4832&rep=rep1&type=pdf (Accessed on 12th December 2015)
[35] Samreen Laghari and Muaz A. Niazi. 2014. Modeling the Internet of Things, Self-Organizing and Other Complex Adaptive Communication Networks: A Cognitive Agent-Based Computing Approach. Computer Science Department, Islamabad Model College for Girls, Street #25, F-6/2, Islamabad, Pakistan. Computer Science Department, COMSATS Institute of IT, Park Road, Islamabad, Pakistan. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/pdfviewer/pdfviewer?sid=44857e1c-62af-4109-8c98-da19baece96a%40sessionmgr4005&vid=9&hid=4104 (Accessed on 14th November 2016)
[36] Shigeru Oyanagi, Kazuto Kubota and Akihiko Nakase. Application of Matrix Clustering to Web Log Analysis and Access Prediction. Shigeru Oyanagi, Kazuto Kubota and Akihiko Nakase. Parallel Application TOSHIBA Laboratory, Real World Computing Partnership. R&D Center, Toshiba Corp., Komukai Toshiba-cho, Saiwai-ku, Kawasaki, 212-8582, Japan. http://robotics.stanford.edu/users/ronnyk/WEBKDD2001/shigeru.pdf (Accessed on 14th November 2016)
[37] Software Testing Help. 2017. 15 Best Bug Tracking Software: Top Defect/Issue Tracking Tools of 2017. Software Testing Help. http://www.softwaretestinghelp.com/popular-bug-tracking-software/ (Accessed on 25th October 2017)
[38] Wendy W. Peng and Dolores R. 1993 Wallace. Software Error Analysis. NIST Special Publication. http://www.geocities.ws/itopsmat/SoftwareErrorAnalysis.pdf (Accessed on 12th December 2015)
[39] Wikipedia. 2015. Analytic Hierarchy Process. https://en.wikipedia.org/wiki/Analytic_hierarchy_process (Accessed on 12th December 2015)
[40] Alberto Gutierrez. 2009. Debugging: 7 steps to fix an error. Software Development Theory. http://www.makinggoodsoftware.com/2009/06/14/7-steps-to-fix-an-error/ (Accessed on 12th December 2015)
[41] Colin Eberhardt. 2014. The Art of Logging. CodeProject. https://www.codeproject.com/Articles/42354/The-Art-of-Logging (Accessed on 12th December 2015)
[42] Brian Kirsch. 2018. How CPU and memory affect application performance. TechTarget. http://searchservervirtualization.techtarget.com/tip/How-CPU-and-memory-affect-application-performance (Accessed on 12th December 2015)
[43] John B. Bowen. 1980. Standard error classification to support software reliability assessment. Hughes-Fullerton, Fullerton, California. National Computer Conference. https://www.computer.org/csdl/proceedings/afips/1980/5088/00/50880697.pdf (Accessed on 12th Decenber 2015)
[44] SoftwareTestingHelp.com. 2018. 7 Types of Software Errors That Every Tester Should Know. Basics of Software Testing. http://www.softwaretestinghelp.com/types-of-software-errors/ (Accessed on 8th March 2018)
[45] Ben Stegner. 2017. The 5 Most Common Windows Errors and How to Fix Them. MOU. https://www.makeuseof.com/tag/common-windows-errors-fixes/ (Accessed on 8th March 2018)
[46] MariaDB. 2018. Operating System Error Codes. https://mariadb.com/kb/en/library/operating-system-error-codes/ (Accessed on 8th March 2018)
[47] Amy Echeverri and Sadequl Hussain. 2018. Troubleshooting with Linux Logs. The Ultimate Guide to Logging. https://www.loggly.com/ultimate-guide/troubleshooting-with-linux-logs/ (Accessed on 8th March 2018)
[48] SparkTrust. 2018. How to Fix High CPU Usage. http://www.sparktrust.com/fix-high-cpu-usage/?gclid (Accessed on 9th March 2018)
[49] Wikipedia. 2018. Database application. Wikimedia Foundation, Inc. https://en.wikipedia.org/wiki/Database_application (Accessed on 9th March 2018)
[50] Rafay Ansari 2017. How to Fix Error Establishing a Database Connection Error. Design Bombs. https://www.designbombs.com/how-to-fix-error-establishing-a-db-connection-error/ (Accessed on 9th March 2018)
[51] Wikipedia. 2018. Multitier architecture. Wikimedia Foundation, Inc. https://en.wikipedia.org/wiki/Multitier_architecture (Accessed on 22nd March 2018)
[52] Microsoft TechNet. 2018. Troubleshooting Server and Database Connection Problems. Microsoft Inc. https://technet.microsoft.com/en-us/library/ms156468(v=sql.105).aspx (Accessed on 22nd March 2018)
[53] EventLog Analyzer 2018. Syslog & Windows Event Log Analysis. ManageEngine. https://www.manageengine.com/products/eventlog/eventlog-analysis.html?cam=279894757&loc=&kwd=log%20file%20analysis&gclid=EAIaIQobChMI7euVn4OC2gIVDX69Ch06UQS5EAAYASAAEgKM3PD_BwE (Accessed on 22nd March 2018)
[54] IBM Knowledge Center. 2018. Introduction to message queuing. IBM. https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_9.0.0/com.ibm.mq.pro.doc/q002620_.htm (Accessed on 27th March 2018)
[55] Pinal Dave. 2016. 2 Common Errors and Reasons for SQL Server Login Failures. LogicalRead. https://logicalread.com/errors-sql-server-login-failures-pd01/#.Wrr8Ba2k1zU (Accessed on 28th March 2018)
[56] Microsoft 2018. View a List of Databases on an Instance of SQL Server. Microsoft Crop. https://docs.microsoft.com/en-us/sql/relational-databases/databases/view-a-list-of-databases-on-an-instance-of-sql-server (Accessed on 28th April 2017)
[57] Oracle Documentation. 2018. Defining Database Services. Oracle. https://docs.oracle.com/cd/B28359_01/server.111/b28310/create007.htm#ADMIN11125 (Accessed on 28th March 2018)
[58] Modeling the Internet of Things, Self-Organizing and Other Complex Adaptive Communication Networks: A Cognitive Agent-Based Computing Approach. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/pdfviewer/pdfviewer?sid=44857e1c-62af-4109-8c98-da19baece96a%40sessionmgr4005&vid=9&hid=4104 (Accessed on 25th April 2017)
[59] Social Cognitive Theory and Individual Reactions to Computing Technology. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/pdfviewer/pdfviewer?sid=44857e1c-62af-4109-8c98-da19baece96a%40sessionmgr4005&vid=15&hid=4104 (Accessed on 22th March 2017)
[60] A Comparative Analysis of Deterministic Sorting Algorithms based on Runtime and Count of Various Operations. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/detail/detail?vid=13&sid=9b1c93a9-f593-45b7-ba91-47543dbb05d4%40sessionmgr4001&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=111599948&db=iih (Accessed on 12th December 2015)
[61] A Novel Algorithm for Independent Component Analysis with Reference and Methods for Its Applications. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/detail/detail?vid=18&sid=9b1c93a9-f593-45b7-ba91-47543dbb05d4%40sessionmgr4001&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=96281979&db=fsr (Accessed on 12th December 2015)
[62] John P. Rouillard. Real-time Log File Analysis Using the Simple Event Correlator (SEC). https://www.usenix.org/legacy/publications/library/proceedings/lisa04/tech/full_papers/rouillard/rouillard_html/ (Accessed on 12th December 2015)
[63] Gerald Stermsek, Mark Strembeck, Gustaf Neumann. A User Profile Derivation Approach based on Log-File Analysis. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.141.6449&rep=rep1&type=pdf (Accessed on 22th March 2017)
[64] K. R. Suneetha and Dr. R. Krishnamoorthi. Identifying User Behavior by Analyzing Web Server Access Log File. https://www.researchgate.net/profile/Krishnamoorthi_R/publication/255583124_Identifying_User_Behavior_by_Analyzing_Web_Server_Access_Log_File/links/56a5ab8208ae1b65113382aa.pdf (Accessed on 22th March 2017)
[65] James H. Andrews. 1998. Theory and practice of log file analysis. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.44.292&rep=rep1&type=pdf (Accessed on 16th June 2017)
[66] Dileepa Jayathilake. A mind map based framework for automated software log file analysis. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.456.4146&rep=rep1&type=pdf (Accessed on 16th June 2017)
[67] Method and apparatus for graphically analzying a log-file. https://www.google.com/patents/US5847972 (Accessed on 7th July 2017)
[68] Mark Guzdial, Paulo Santos, Albert Badre, Scott Hudson, Mark Gray. Analyzing and Visualizing Log Files: A Computational Science of Usability. https://smartech.gatech.edu/bitstream/handle/1853/3586/94-08.pdf?sequence=1&isAllowed=y (Accessed on 7th July 2017)
[69] System and method for analyzing web-server log files. https://www.google.com/patents/US6317787 (Accessed on 5th September 2017)
[70] G. Castellano, A. M. Fanelli, M. A. Torsello. LODAP: A Log Data Preprocessor for mining Web browsing patterns. http://www.wseas.us/e-library/conferences/2007corfu/papers/540-274.pdf (Accessed on 5th September 2017)
[71] Log file analysis and evaluation tool. https://www.google.com/patents/US20090144699 (Accessed on 5th September 2017)
[72] Mark Guzdial. Deriving Software Usage Patterns from Log Files. https://smartech.gatech.edu/bitstream/handle/1853/3650/93-41.pdf?sequence=1&isAllowed=y (Accessed on 5th September 2017)
[73] Table-based error log analysis. https://www.google.com/patents/US6598179 (Accessed on 19th August 2017)
[74] James E. Prewett. Analyzing cluster log files using Logsurfer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.5.8610&rep=rep1&type=pdf (Accessed on 19th August 2017)
[75] Method, system, and program for merging log entries from multiple recovery log files. https://www.google.com/patents/US7076508 (Accessed on 15th October 2017)
[76] System using footprints in system log files for monitoring transaction instances in real-time network. US 7908365 B2. https://www.google.com/patents/US7908365 (Accessed on 15th October 2017)
[77] Method using footprints in system log files for monitoring transaction instances in real-time network. US 7912946 B2. https://www.google.com/patents/US7912946 (Accessed on 15th October 2017)
[78] An overview of preprocessing of web log files for web usage mining. http://etms-eg.org/cms/upload/1354650330.pdf (Accessed on 15th October 2017)
[79] Event Logs for the Analysis of Software Failures: A Rule-Based Approach. http://web.b.ebscohost.com.proxy.unitar.my:8080/ehost/pdfviewer/pdfviewer?sid=6bf25055-2122-4a13-bf98-5169a4c9ff0b%40sessionmgr103&vid=8&hid=102 (Accessed on 15th October 2017)
[80] Distributed Log Analysis on The Cloud using MapReduce. http://web.a.ebscohost.com.proxy.unitar.my:8080/ehost/pdfviewer/pdfviewer?sid=7f05d220-a895-41e3-bd1e-7482e8c6b86e%40sessionmgr4008&vid=10&hid=4204 (Accessed on 29th October 2017)
[81] Implementing an error log analysis model to facilitate faster problem isolation and repair. US 7872982 B2. https://www.google.com/patents/US7872982 (Accessed on 29th October 2017)
[82] Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gandhi, Priya Narasimhan. Mochi: Visual Log-Analysis Based Tools for Debugging Hadoop. http://static.usenix.org/events/hotcloud09/tech/full_papers/tan.pdf (Accessed on 29th November 2017)
[83] Object oriented processing log analysis tool framework mechanism. US 6144967 A. https://www.google.com/patents/US6144967 (Accessed on 29th November 2017)
[84] A Framework for Log file Analysis. https://pdfs.semanticscholar.org/9d1a/97988d8b41354cd4bf85ace96648d1684555.pdf (Accessed on 29th November 2017)
[85] Tao Li, Sheng Ma, Feng Liang and Wei Peng. An Integrated Framework on Mining Logs Files for Computing System Management. http://users.cis.fiu.edu/~taoli/tenure/p776-li.pdf (Accessed on 29th November 2017)
[86] Mislav Šimunić, Željko Hutinski and Mirko Čubrilo. Log File Analysis and Creation of More Intelligent Web Sites. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=13&ved=0ahUKEwjZztKT8cPSAhVMrY8KHSkQC4A4ChAWCCAwAg&url=http%3A%2F%2Fhrcak.srce.hr%2Ffile%2F116374&usg=AFQjCNEo2GBP9vRjBxZ_HthVBv-gt08L6Q&bvm=bv.148747831,d.c2I (Accessed on 29th November 2017)
[87] Robert Rinnan. 2005. Benefits of Centralized Log file Correlation. Gjøvik University College. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.8787&rep=rep1&type=pdf (Accessed on 29th November 2017)
[88] StorageCraft. 2018. Which Hardware Fails the Most and Why. StorageCraft Technology Corporation. https://blog.storagecraft.com/hardware-failure/ (Accessed on 8th April 2018)
[89] Wikipedia. 2018. Hard disk drive failure. https://en.wikipedia.org/wiki/Hard_disk_drive_failure. Wikimedia Foundation, Inc. (Accessed on 8th April 2018)
[90] Eassos. 2018. How to fix "Windows detected a hard disk problem"? Eassos Ltd. http://www.eassos.com/how-to/windows-detected-a-hard-disk-problem.php (Accessed on 9th April 2018)
[91] TechRepublic. 2018. Using smartctl to get SMART status information on your hard drives. CBS Interactive. https://www.techrepublic.com/blog/linux-and-open-source/using-smartctl-to-get-smart-status-information-on-your-hard-drives/ (Accessed on 9th April 2018)
[92] ArchLinux. 2018. S.M.A.R.T. https://wiki.archlinux.org/index.php/S.M.A.R.T. (Accessed on 9th April 2018)
[93] Backblaze. 2018. What SMART Stats Tell Us About Hard Drives. https://www.backblaze.com/blog/what-smart-stats-indicate-hard-drive-failures/ (Accessed on 9th April 2018)
[94] WikiBooks. 2015. Minimizing Hard Disk Drive Failure and Data Loss/Detecting an Impending Drive Failure. https://en.wikibooks.org/wiki/Minimizing_Hard_Disk_Drive_Failure_and_Data_Loss/Detecting_an_Impending_Drive_Failure (Accessed on 9th April 2018)
[95] Superuser. 2018. Is it possible to access the Windows event log if the system is unbootable? https://superuser.com/questions/76340/is-it-possible-to-access-the-windows-event-log-if-the-system-is-unbootable (Accessed on 9th April 2018)
[96] ITPro Today. 2018. How can we relocate the event log files of our Windows Server 2003 and Windows Server 2008 file servers to a different drive? http://www.itprotoday.com/management-mobility/q-how-can-we-relocate-event-log-files-our-windows-server-2003-and-windows-server (Accessed on 9th April 2018)
[97] VPSie. 2018. Where to find Windows 2012/2012 R2 Log Files? https://vpsie.com/knowledge-base/where-to-find-windows-20122012-r2-log-files/ (Accessed on 9th April 2018)
[98] RootUsers. 2018. Where Are Windows Server 2016 Log Files Stored? https://www.rootusers.com/where-are-windows-server-2016-log-files-stored/ (Accessed on 9th April 2018)
[99] Rakesh Kanojia. 2018. Are you spending too much time on Root Cause Analysis and IT Issue Triage? Service Berry Technologies. https://www.service-berry.com/are-you-spending-too-much-time-on-root-cause-analysis-and-it-issue-triagecheckout-micro-focus-operations-bridge-for-a-seamless-issue-triage-experience/ (Accessed on 2nd July 2018)
[100] Kishore Ramamurthy. 2016. The Importance of Root Cause Analysis. Optanix. https://www.optanix.com/blog/the-importance-of-root-cause-analysis (Accessed on 2nd July 2018)
[101] Solarwinds. 2018. Automate log analysis, improve IT operations, mitigate threats, and help ensure compliance. SolarWinds Worldwide, LLC. https://www.solarwinds.com/topics/event-log-analyzer-tool#step_benefit_1 (Accessed on 2nd July 2018)
[102] Logstash. 2018. Centralize, Transform & Stash Your Data. Elasticsearch. https://www.elastic.co/products/logstash (Accessed on 2nd July 2018)
[103] AppDynamics. 2018. Transform the way modern business is built and run. AppDynamics, Cisco. https://www.appdynamics.com/ (Accessed on 2nd July 2018)
[104] Evangelos Triantaphyllou and Stuart H. Mann. 1995. Using the Analytic Hierarchy Process for Decision Making in Engineering Applications: Some Challenges. Inter’l Journal of Industrial Engineering: Applications and Practice. http://bit.csc.lsu.edu/trianta/Journal_PAPERS1/AHPapls1.pdf (Accessed on 18th February 2019)
[105] Belton, V. and Gear, T. (1983). On a Short-coming of Saaty's Method of Analytic Hierarchies. Omega, 228-230. https://www.academia.edu/19364689/On_a_short-coming_of_Saatys_method_of_analytic_hierarchies (Accessed on 18th February 2019)
[106] Stephan Weißleder and Hartmut Lackner. 2013. Top-Down and Bottom-Up Approach for Model-Based Testing of Product Lines. https://arxiv.org/pdf/1303.1011.pdf (Accessed on 18th February 2019)
[107] Wikipedia. 2019. Top-down and bottom-up design. https://en.wikipedia.org/wiki/Top-down_and_bottom-up_design (Accessed on 18th February 2019)
[108] Atos. 2019. Applications As a Service. Atos SE. https://apprenda.com/library/software-on-demand/applications-as-a-service/ (Accessed on 20th February 2019)
[109] Unomaly. 2019. Root cause analysis: Using the right tools for the job. https://unomaly.com/product/root-cause-analysis/ (Accessed on 21st February 2019)
[110] John Flaig. 2013. The Risks in Root Cause Analysis. Quality Digest. https://www.qualitydigest.com/inside/quality-insider-article/risks-root-cause-analysis.html (Accessed on 21st February 2019)
[111] Jyoti Soni, Ujma Ansari, Dipesh Sharma and Sunita Soni. 2011. Predictive Data Mining for Medical Diagnosis: An Overview of Heart Disease Prediction. International Journal of Computer Applications (0975 – 8887). https://pdfs.semanticscholar.org/fbd6/5a18f6653b56138cd5196d20e2f39de189e3.pdf (Accessed on 21st February 2019)
[112] Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni and PeterFilzmoser. 2018. Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection. https://www.sciencedirect.com/science/article/pii/S0167404818306333/pdfft?md5=e114106f24719a22492bdc5df17f2742&pid=1-s2.0-S0167404818306333-main.pdf (Accessed on 21st February 2019)
[113] Sallam Osman Fageeri and Rohiza Ahmad. 2013. An Efficient Log File Analysis Algorithm Using Binary-based Data Structure. https://www.sciencedirect.com/science/article/pii/S1877042814028912/pdf?md5=5b0ef9817478b4ad8339553bd652fa84&pid=1-s2.0-S1877042814028912-main.pdf (Accessed on 21st February 2019)
[114] Omkarprasad S. Vaidya and Sushil Kumar, 2004. Analytic hierarchy process: An overview of applications. Department of Mechanical Engineering, Army Institute of Technology, Pune 411 015, India. National Institute of Industrial Engineering (NITIE), Vihar Lake, Mumbai 400 087, India. http://ac.els-cdn.com/S0377221704003054/1-s2.0-S0377221704003054-main.pdf?_tid=39850adc-5d78-11e7-b5bf-00000aab0f26&acdnat=1498815840_e0c9a10c99c46ad30db8da4ef17e817b (Accessed on 12th September 2018)
[115] Nathasit Gerdsri and Dundar F. Kocaoglu. 2007. Applying the Analytic Hierarchy Process (AHP) to build a strategic framework for technology roadmapping. ScienceDirect. ELSEVIER. http://ac.els-cdn.com/S0895717707001069/1-s2.0-S0895717707001069-main.pdf?_tid=e0165298-5d78-11e7-9000-00000aab0f6b&acdnat=1498816119_34b7b92d988eea0c318b8d23810e293a (Accessed on 21st February 2019)
[116] Razvan Serbu, Bogdan Marza and Sorin Borza. 2016. A Spatial Analytic Hierarchy Process for Identification of Water Pollution with GIS Software in an Eco-Economy Environment. MDPI. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0ahUKEwjTk9bz-cLbAhUFupQKHcXaCmAQFghkMAc&url=http%3A%2F%2Fwww.mdpi.com%2F2071-1050%2F8%2F11%2F1208%2Fpdf&usg=AOvVaw3k7wSGKCoC_Exqr0vJKHK7 (Accessed on 12th September 2018)
[117] Da-Yong Chang. 1996. Applications of the extent analysis method on fuzzy AHP. ELSEVIER. http://ac.els-cdn.com/0377221795003002/1-s2.0-0377221795003002-main.pdf?_tid=e251d09a-7732-11e7-b173-00000aacb35d&acdnat=1501644789_e6ae23503d2e2f883d2413693f63275a (Accessed on 12th September 2018)
[118] Thomas L. Saaty. 2008. Decision making with the analytic hierarchy process. Int. J. Services Sciences, Vol. 1, No. 1. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.409.3124&rep=rep1&type=pdf (Accessed on 12th September 2018)
[119] R. W. Saaty. 1987. The Analytic Hierarchy Process - What It Is And How It Is Used. Pergamon Journals Ltd. Great Britain. http://ac.els-cdn.com/0270025587904738/1-s2.0-0270025587904738-main.pdf?_tid=55956250-6b90-11e7-b75e-00000aab0f02&acdnat=1500365511_5a54a3ecf035ad3e45ab72b909b7632e (Accessed on 12th September 2018)
[120] Dr. Benito L. Teehankee and De La Salle University. 2009. The Analytic Hierarchy Process: Capturing Quantitative and Qualitative Criteria for Balanced Decision-Making. ResearchGate. https://www.researchgate.net/publication/256009323_The_Analytic_Hierarchy_Process_Capturing_Quantitative_and_Qualitative_Criteria_for_Balanced_Decision-Making (Accessed on 12th September 2018)
[121] Evangelos Triantaphyllou and Stuart H. Mann. 1995. Using the Analytic Hierarchy Process for Decision Making in Engineering Applications: Some Challenges. http://s3.amazonaws.com/academia.edu.documents/31754775/AHPapls1.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1498819440&Signature=iIMAp3tvmRbBTX8k6rUvRIorb7o%3D&response-content-disposition=inline%3B%20filename%3DUSING_THE_ANALYTIC_HIERARCHY_PROCESS_FOR.pdf (Accessed on 12th September 2018)
[122] Explorable.com. 2015. Experimental Research. https://explorable.com/experimental-research (Accessed on 31st December 2015)
[123] Thinking Dimensions. 2018. Reliability - Root Cause Analysis. Thinking Dimensions Global. http://www.thinkingdimensions.com/blog/industrial-problem-solving/reliability-root-cause-analysis (Accessed on 1st July 2018)
[124] CodeBetter.Com. 2018. Benefits of Root Cause Analysis. WordPress. http://codebetter.com/raymondlewallen/2008/12/20/benefits-of-root-cause-analysis/ (Accessed on 1st July 2018)
[125] Kristof Horvath. 2015. Using Root Cause Analysis to Drive Process Improvement. Intland Software.https://content.intland.com/blog/safety-engineering/using-root-cause-analysis-to-drive-process-improvement (Accessed on 2nd July 2018)
[126] Darrell Stiffler. 2009. Performing Root Cause Analysis on Personnel? Global Knowledge Training LLC.https://www.globalknowledge.com/blog/2009/05/11/performing-root-cause-analysis-on-personnel/ (Accessed on 2nd July 2018) Apparatus for log data collection and analysis. https://www.google.com/patents/US5819094 (Accessed on 5th September 2017)