Earticle

현재 위치 Home

International Journal of Database Theory and Application

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJDTA) [Science & Engineering Research Support Center, Republic of Korea(IJDTA)]
  • pISSN
    2005-4270
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.6 No.2 (11건)
No
1

Stream Time Series Approach for Supporting Business Intelligence

Van Vo, Luo Jiawei, Bay Vo

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.1-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Business intelligence has an important role in effective decision making to improve the business performance and opportunities by understanding the organization’s environments through the systematic process of information. This paper proposes a novel framework based on data mining technologies for making a prediction of business environment. We present a business intelligence model to predict the business performance by using dimensionality reduction as preprocessing data then applying Sequential Minimal Optimization based on the Support Vector Machine algorithm to generate future data. To examine the approach, we apply them on stock price data set obtained from Yahoo Finance.

2

Fuzzy System Modeling and Representation Based on Linguistic Variable Ontology and SWRL

Yiduo Liang, Jun Zhai, Jianfeng Li

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.19-30

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Ontology is an important tool on the semantic web, for ontology has a powerful expressive ability on knowledge representation. However, it has no ability to represent the imprecise information as well as the uncertainty. In order to share and deal with the fuzzy knowledge between homogeneous systems on the semantic web, in this paper, the concept of linguistic variable ontology is proposed as the basis of Fuzzy System. Taking a flu fuzzy diagnosis case for example, fuzzy system is modeled. For fuzzy knowledge representation and further inference, the fuzzy rule base is constructed, which constitutes a part of fuzzy system. A tool of protégé is used to realize the fuzzy system and a plugin of SWRLTab for the fuzzy rule. Also, SWRL/OWL is used to represent the rules formally for facilitating machine understanding and process. Comparisons are made between two fuzzy tools to illustrate the advantages of SWRLTab. The paper concludes that linguistic variable ontology-based diagnosis system can achieve the fuzzy knowledge sharing between homogeneous systems correctly.

3

Design of the Database of Library Information

XueLian Feng, HaiYan Liu

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.31-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper we designed a database of library information which is suitable for the higher vocational college library.It is with ASP.NET as interface programming language,SQL Server as DBMS to save database.It has realized the processing of book purchasing, book cataloging, book circulating, book retrieval and journal management automation.This system connects to the Internet to make the reader search information conveniently. It greatly improves the efficiency of library management and the utilization of books.

4

Online and Mobile Cross Platform Technology for using 3D Resources on 2D Mobile Systems using a CM3D Engine

Sungkwan Kang, Joonseub Cha, Jimin Lee, Jongan Park

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.39-50

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

These days, game and contents have been served in PC, game consoles, smart phones, and media system and interconnection between platforms of such systems is an important task to be resolved. Although the development of systems to support 3D is increasing, a considerable amount of 2D-based system has been still used. As existing 3D engines are optimized for the 3D supporting system, there is a difficulty in executing contents in the only 2D-based system. Also, we have to develop online and mobile cross platform technology to compensate for lack of the content elements while sharing the benefits of online contents and mobile contents. This study developed a CM3D engine (Cross Mobile 3D), online and mobile sharing platform system based on a software renderer which can execute 3D content on a 2D mobile system. The CM3D engine was designed to access 3D content in the systems which normally only support 2D content. Following this, functionality was added to support the reuse of resources through automatic re-processing of existing PC-based content for the online and mobile use. As a result of tests using a 2D mobile phone which does not support 3D, it was discovered that the CM3D engine has similar performance to an existing 3D engine.

5

Stock Price Forecasting under Fuzzy Value Clustering Analysis

Jianfeng Li, Jun Zhai, Junfeng Guo

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.51-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new approach is proposed according to values analysis to forecast the stock price through fuzzy clustering method. Firstly, some common hypothesis are brought forward in order to establish a frame of value analysis for stock forecasting, then, the algorithm of fuzzy clustering is introduced to judge the relative value of stocks as the rule of forecasting stock price under value analysis, and at last, a case choosing ten telecommunication companies is analyzed to prove the key points of view of this paper. The results of paper are useful for further research on value investment and wise decision-making in practice.

6

A Two-level Application Transparent Checkpointing Scheme in Cloud Computing Environment

He Hui, Zhang Zhan, Wang Bai-Ling, Zuo De-Cheng, Yang Xiao-Zong

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.61-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cloud computing has been widely applied to a wide variety of computing environments, with the traditional distributed computing environment, cloud computing using virtual machines to achieve dynamic resource partitioning. Checkpoint recovery technology is a low-cost method to improve the system availability. This paper analyzes the characteristics of cloud computing, virtualization technology and the checkpoint/recovery technology, a mechanism for integration of virtualization technology and checkpoint/recovery technology has been proposed, this mechanism uses coordinated checkpoint protocols at node level, while uses communication-induced protocols at system level. This scheme is transparent to applications with small performance overhead.

7

Mobility Prediction Based on Data mining

Rachida Aoudjit, Malika Belkadi, Mehammed Daoui, Lynda Chamek, Sofiane Hemrioui, Mustapha Lalam

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.71-78

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a mobility prediction technique based on one of the most used Data mining technique which is the association rules. Our solution can be implemented on a next-generation mobile networks by exploiting the data available on existing infrastructure (roads, locations of base stations ...etc.) and the users’ displacements history. Simulations carried out using a realistic model of movements showed that our strategy can accurately predict up to 90% of the users’ movements by knowing only their last two movements.

8

Performance Evaluation of Robot Design based on AHP

Wen-li Geng, Ying-song Hu

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.79-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to improve the efficiency and reliability of robot design, the performance evaluation becomes more and more important. A new comprehensive method was proposed based on the analytic hierarchy process which is a structured approach for solution of complex decision making problems. In this method, the decision tree was built with three or more layers. The factors which affect the target layer were proposed and optimized partly. The weights of different layer criterion were calculated through AHP, the value of different alternatives was evaluated and the performance of different robot design was obtained. The feasibility of this method was validated by an example. It’s proved that the method can make a qualitative evaluation on the performance of robot design and can applies to both the theory study of robot and the application of robot design engineering.

9

Study of Database Management and Multimedia System Infrastructure for Micro Grid

Sunguk Lee

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.89-96

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper provides discussion of multimedia system infrastructure and database management for the micro grid. The micro grid is energy system that has power generator with renewable energy resources and load. The micro grid is an ideal power system for using renewable energy resources for isolated area. This paper provides a brief overview of micro grid and discussion of communication system infrastructure and database management for the micro grid. The Energy Management System (EMS) interacts with all subsystems through communication channel and status information like metering data from all subsystems is stored at data base system in the EMS. With this information EMS manages and operates the micro grid. The Powerline communication and ZigBee are one of ideal communication infrastructure for local communication and the cellular network like MiMAX and LTE can be a good choice for the backhaul of the micro grid.

10

An Improved Reversible Data Hiding Scheme Using Extra Space Modulation for Color Palette Image

Munkhbaatar Doyoddorj, Chul Sur, Youngho Park, Kyung-Hyune Rhee

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.97-108

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a reversible data hiding scheme for color palette image is proposed. The technique of data embedding is used to hide the secret data into multimedia such as text contents, audio, video, and images. The reversibility of data hiding is an important requirement in some applications such as distance medical treatment and military industrial applications. In recent years, many researchers have proposed reversible techniques that work on grayscale images, but these methods cannot be applied directly to color images, which have increased in popularity and have more redundant space available for embedding the secret data. Moreover, the size of color image can be reduced by sorting the stored palette based format. Some researchers have proposed data hiding techniques for palette based images. While their methods successfully achieve the purpose of secret data delivery, they do not achieve reversibility. In our scheme, we make use of the differences between a center index and its neighboring indexes in each sub-blocks of indexed table by using a palette color replacement. The proposed scheme can enhance the embedding capacity for color palette images and recover the embedded data from the stego image without causing perceptible distortions to the cover image. Moreover, we can embed up to bytes into a color image, which provides much more embedding capacity than the existing reversible data hiding schemes. The experimental results confirm the effectiveness of our scheme in term of hiding capacity of embedding data and visual quality of stego image.

11

Data Clustering and Analyzing Techniques Using Hierarchical Clustering Method

Wen Hu, Qing he Pan

보안공학연구지원센터(IJDTA) International Journal of Database Theory and Application Vol.6 No.2 2013.04 pp.109-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Data clustering and analyzing techniques are studied by using hierarchical clustering method. A matrix of words is constructed with a randomly chosen RSS list. By collecting data from this list a matrix is built. In the matrix each row corresponds to a article and each column represents a word. Based on the matrix a hierarchical clustering algorithm is designed. In this algorithm the Pearson correlation coefficient is used to compute the distances among different contents. The dendrogram is used to describe the hierarchical relationship of contents and words. And the 2-D graph also is used to represent the dendrogram in another format.

 
페이지 저장