{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:11:20Z","timestamp":1766067080808,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018YFB1403400"],"award-info":[{"award-number":["2018YFB1403400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2957807","type":"journal-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T21:14:57Z","timestamp":1575580497000},"page":"179864-179879","source":"Crossref","is-referenced-by-count":9,"title":["Nowhere to Hide Methodology: Application of Clustering Fault Diagnosis in the Nuclear Power Industry"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5776-4517","authenticated-orcid":false,"given":"Cheng","family":"Zong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0599-7474","authenticated-orcid":false,"given":"Song","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1975-4905","authenticated-orcid":false,"given":"Erhu","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4532-1580","authenticated-orcid":false,"given":"Yongming","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Shi-Qi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"ref38","article-title":"Real time data access log analysis system of EAST tokamak based on spark","author":"wang","year":"2018","journal-title":"arXiv 1806 08489"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/CIS2018.2018.00073"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/SANER.2018.8330248"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/SANER.2018.8330197"},{"key":"ref30","first-page":"795","article-title":"Mochi: Visual log-analysis based tools for debugging Hadoop","author":"tan","year":"2010","journal-title":"Proc IEEE Int Conf Distrib Comput Syst Workshops"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICDCS.2018.00105"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/s11227-017-1990-1"},{"key":"ref35","first-page":"1011","article-title":"Distributed log analysis on the cloud using mapreduce","volume":"23","author":"aydin","year":"2016","journal-title":"Technical Gazette"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3167486.3167553"},{"key":"ref10","first-page":"1","article-title":"Listening to your cluster with LoGS","author":"prewett","year":"2004","journal-title":"Proc 5th Int'l Conf Linux Clusters The HPC Revolution"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/3132747.3132749"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/IV.2002.1028831"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1081870.1081972"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/S0306-4379(01)00008-4"},{"key":"ref14","first-page":"331","article-title":"C2P: Clustering based on closest pairs","author":"nanopoulos","year":"2001","journal-title":"Proc 27th Int Conf Very Large Data Bases"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IPOM.2003.1251233"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/DSN.2005.32"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/DSN.2011.5958210"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CCGRID.2008.107"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CLUSTR.2004.1392628"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ISSREW.2018.00-23"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/1735970.1736038","article-title":"SherLog: Error diagnosis by connecting clues from run-time logs","volume":"38","author":"yuan","year":"2010","journal-title":"ACM SIGARCH Comput Archit News"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/DSNW.2011.5958800"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACCESS.2019.2896129"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1629575.1629587"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/DSN.2018.00061"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICDM.2009.60"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/FTCS.1992.243597"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s11390-016-1678-7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ACCESS.2017.2706302"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11432-012-4747-8"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACCESS.2018.2843336"},{"key":"ref20","first-page":"4","article-title":"Mining console logs for large-scale system problem detection","author":"xu","year":"2008","journal-title":"Proc IEEE Conf Tackling Comput Syst Problems With Mach Learn Techn"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TST.2015.7085633"},{"key":"ref21","first-page":"4","article-title":"Error log processing for accurate failure prediction","author":"salfner","year":"2008","journal-title":"1st USENIX Workshop on the Analysis of System Logs"},{"year":"2010","author":"sigelman","article-title":"Dapper, a large-scale distributed systems tracing infrastructure","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/HIPC.2009.5433202"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/2815400.2815415"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/DSN.2007.103"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/JIOT.2019.2911669"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.jss.2018.05.016"},{"key":"ref43","first-page":"271","article-title":"X-trace: A pervasive network tracing framework","author":"fonseca","year":"2007","journal-title":"Proc of 4th USENIX Symposium on Networked System Design and Implementation (NSDI'07)"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ISPDC2018.2018.00031"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08924749.pdf?arnumber=8924749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:24:15Z","timestamp":1643275455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8924749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2957807","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}