Earticle

현재 위치 Home

International Journal of Database Theory and Application

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJDTA) [Science & Engineering Research Support Center, Republic of Korea(IJDTA)]
  • pISSN
    2005-4270
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.3 no.2 (6건)
No
1

Towards the Preservation of Referential Constraints in XML Data Transformation for Integration

Md. Sumon Shahriar, Jixue Liu

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application vol.3 no.2 2010.06 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We investigate the transformation and the preservation of XML referential constraints in XML data transformation for integration purposes in this paper. In the transformation and the preservation, we consider XML inclusion dependencies and XML foreign keys. We show how XML referential constraints should be transformed and preserved using important transformation operators with sufficient conditions.

2

Soft Set Theoretic Approach for Dimensionality Reduction

Tutut Herawan, Rozaida Ghazali, Mustafa Mat Deris

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application vol.3 no.2 2010.06 pp.4-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A reduct is a subset of attributes that are jointly sufficient and individually necessary for preserving a particular property of a given information system. The existing reduct approaches under soft set theory are still based on Boolean-valued information system. However, in the real applications, the data usually contain non-Boolean values. In this paper, an alternative approach for attribute reduction in multi-valued information system under soft set theory is presented. Based on the notion of multi-soft sets and AND operation, attribute reduction can be defined. It is shown that the reducts obtained are equivalent with Pawlak’s rough reduction.

3

Data Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services

Toshiro Minami, Eunja Kim

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application vol.3 no.2 2010.06 pp.11-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Our society is rapidly changing into information society, where the needs and requests of the people on information access vary vigorously depending who they are. Library's mission has been and still is to provide its users, or patrons, with the most appropriate information. Libraries have to know the profiles of their patrons, in order to achieve such a role. The aim of library marketing is to develop methods based on the library data, such as circulation records, book catalogs, book-usage data, and so on. In this paper we discuss the methodology and importance of library marketing at the beginning. Then we demonstrate its usefulness through some examples of analysis methods applied to the circulation records in Kyushu University and Gwacheon Library, and some implication that obtained as the results of these methods. Our research is a big beginning toward the future when library marketing is an unavoidable tool.

4

Steganalysis for Reversible Data Hiding

Ho Thi Huong Thom, Ho Van Canh, Trinh Nhat Tien

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application vol.3 no.2 2010.06 pp.21-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent years, several lossless data hiding techniques have been proposed for images. Lossless data embedding can take place in the spatial domain or in the transform domain. They utilized characteristics of the difference image or the transform coefficient histogram and modify these values slightly to embed the data. However, after embedding message bits these steganography changed the nature of the difference image histogram or the transform coefficient histogram gradually. In this paper, we introduce two new steganalytic techniques based on the difference image histogram and the transform coefficient histogram. The algorithm can not only detect existence of secret messages in images which are embedded by above methods reliably, but also estimate the amount of hidden messages exactly.

5

Building Knowledge around Complex Objects using Inforbright Data Warehousing Technology

Julia Ann Johnson, Genevieve Marie Johnson

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application vol.3 no.2 2010.06 pp.31-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

There are considerable challenges in analysing and reporting on word-based data. Infobright data warehousing technology was used to build knowledge around qualitative data that are subject to human interpretation. Infobright was chosen as a system for implementing the data set because its rough set based intelligence appears to be extensible with moderate effort to implement the data warehousing requirements for automatic interpretation of word based data. An example of social sciences research data was used for illustration.

6

Bayesian network is a directed acyclic graph. Existing Bayesian network learning approaches based on search & scoring usually work with a heuristic search for finding the highest scoring structure. This paper describes a new data mining algorithm to learn Bayesian networks structures based on an immune binary particle swarm optimization (IB-PSO) method and the Minimum Description Length (MDL) principle. IBPSO is proposed by combining the immune theory in biology with particle swarm optimization (PSO). It constructs an immune operator accomplished by two steps, vaccination and immune selection. The purpose of adding immune operator is to prevent and overcome premature convergence. Experiments show that IBPSO not only improves the quality of the solutions, but also reduces the time cost.

 
페이지 저장