Information Systems, Technology and Management -  Sushil K. Prasad,  Susmi Routray,  Reema Khurana,  Sartaj Sahni

Information Systems, Technology and Management (eBook)

Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009, Proceedings
eBook Download: PDF
2009 | 1. Auflage
XV, 381 Seiten
Springer-Verlag
978-3-642-00405-6 (ISBN)
Systemvoraussetzungen
32,05 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009 The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on storage and retrieval systems, data mining and classification, managing digital goods and services, scheduling and distributed systems, advances in software engineering, case studies in information management, algorithms and workflows, authentication and detection systems, recommendation and negotiation, secure and multimedia systems, as well as 14 extended poster abstracts.

Preface 5
Organization 7
Table of Contents 11
Keynotes 11
Embedded Sensor Networks 16
Future of Software Engineering 17
Seeing beyond Computer Science and Software Engineering 18
System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs 19
Session 1. Storage and Retrieval Systems 11
A Reduced Lattice Greedy Algorithm for Selecting Materialized Views 21
Introduction 21
Greedy Based Algorithms 22
Algorithm HRU 23
Algorithm RLGA 24
Complexity Analysis – RLGA 26
An Example 27
Comparison – RLGA vs. HRU 28
Conclusion 32
References 32
Improving Expression Power in Modeling OLAP Hierarchies 34
Introduction 34
Related Work 35
Motivating Example 36
The MultiDim Model 37
Hierarchies: Their Representation and Implementation 39
Balanced Hierarchies 39
Unbalanced Hierarchies 39
Recursive Hierarchies 40
Non-covering Hierarchies 41
Non-strict Hierarchies 42
Alternative Hierarchies 43
Parallel Hierarchies 44
Conclusions 44
References 45
A Hybrid Information Retrieval System for Medical Field Using MeSH Ontology 46
Introduction 46
Related Work 47
Proposed Approach 49
Applying Classic Information Retrieval Techniques to the Corpus 49
Semantic Annotation of Documents 49
Semantic Retrieval Algorithm 49
Combining Semantic and Syntactic Approaches 51
Experiment and Results 51
Discussion 53
Conclusion and Future Work 54
References 54
Session 2. Data Mining and Classification 11
Mining Rare Events Data for Assessing Customer Attrition Risk 56
Introduction 56
Data Structure for Events Prediction 57
Case-Based Sampling 58
Predictive Modeling 59
Results 60
References 61
Extraction and Classification of Emotions for Business Research 62
Introduction and Related Work 62
An Overview of Happiness Extraction 62
Classification 63
Conclusion and Future Work 67
References 68
Data Shrinking Based Feature Ranking for Protein Classification 69
Introduction 69
Related Work 71
Methodology 71
Data Shrinking 72
Proposed Shrinking Method 72
Proposed Feature Selection Method 75
Experiments and Results 76
Comparative Study 76
Conclusion 77
References 77
Session 3. Managing Digital Goods and Services 11
Value-Based Risk Management for Web Information Goods 79
Introduction 79
Related Work 80
Business Models 80
Information Goods 82
Value-Based Risk Identification 82
Risks Present after Transferring Right and Custody 83
Risks Associated with the Transfer of Custody 84
Risks Associated with Value Object Features 84
Risk Mitigation Instruments 85
Mitigating Risks Present after Transfer of Right and Custody 86
Mitigating Risks Associated with the Transfer of Custody 87
Mitigating Risks Associated with Value Object Features 87
Identifying New Processes 88
Conclusion 89
References 90
Quality and Business Offer Driven Selection of Web Services for Compositions 91
Introduction 91
Related Work 92
QoS of Web Services 92
QoS Aggregation for the Composition Patterns 93
Motivating Example 93
Business Offer Model for Web Services 94
Value Based Business Offers 94
Commodity Based Business Offers 94
Conditional and Probabilistic Business Offers 94
Composition Requirements on QoS and Business Offers 95
Composition Requirements 95
Composition Requirement Modeling 95
Broker Based Architecture for Compositions 96
Roles and Operations 96
Component Interactions 97
The Service Selection Model for Compositions 98
Evaluation of Business Offers 98
Business Offer (BO) Aggregation 98
Composition Structure 98
The Selection Algorithm 99
QoS and BO Computation 99
Illustration for Selection 100
Conclusion 101
References 102
Managing Sustainability with the Support of Business Intelligence Methods and Tools 103
Introduction 103
Sustainability and CSR Issues 104
BI (Business Intelligence) Methods and Tools 105
Looking for Information Planning Methods That Integrate Sustainability 106
Research Approach 107
Cases Selection 108
Data Collection 108
Data Analysis 109
Research Results from a Grounded Theory Approach 109
Discussion and Preliminary Conclusions 112
References 113
Session 4. Scheduling and Distributed Systems 12
A Novel Particle Swarm Optimization Approach for Grid Job Scheduling 115
Introduction 115
Problem Formulation 116
Particle Swarm Optimization 118
Proposed PSO Algorithm for Grid Job Scheduling 119
Position of Particles 119
Particles Velocity, $pbest$ and $nbest$ 119
Particle Updating 120
Fitness Evaluation 121
Proposed PSO Algorithm 121
Implementation and Experimental Results 121
Comparison of Results with the Method Proposed in [15] 122
Conclusions 124
References 124
Priority-Based Job Scheduling in Distributed Systems 125
Introduction 125
Related Work 126
Model 127
System Model 127
Communication Model 128
Enhance Sender Initiate Algorithm 129
Simulation Results 130
Conclusion 132
References 132
An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network 134
Introduction 134
Related Work 136
Problem Description 136
Proposed Schemes 137
Improved Selective Walk Searching 137
Experimental Study 139
Results and Analysis 140
Conclusions 141
References 142
Session 5. Advances in Software Engineering 12
Application of Neural Networks in Software Engineering: A Review 143
Introduction 143
Neural Network (NN) Methodology 144
Software Development Life Cycle (SDLC) and Application of NNs in Software Engineering 145
Application of NNs in Software Engineering 145
Software Project Effort Estimation 145
Software Metrics 147
Software Testing Activities 148
Other Software Metrics (Software Quality and Software Reliability) 149
Conclusions and Research Directions 150
References 150
Model-Based Software Regression Testing for Software Components 153
Introduction 153
UML and Regression Testing 154
The Proposed Approach 155
Construction of Sequence Diagram for Software Components 155
Construction of Control Flow Graph (CFG) to Store Sequence Diagram 156
Construction of ECFG for the Newer Version of Software Component 158
Traversal of Storage Graph to Generate Regression Test Suite 158
Case Study 159
Conclusions 163
References 163
An Approach towards Software Quality Assessment 165
Introduction 165
Background 166
Our Approach 167
Case Study 171
Conclusion and Future Work 175
References 175
Session 6. Case Studies in Information Management 12
A Study of the Antecedents and Consequences of Members’ Helping Behaviors in Online Community 176
Introduction 176
Helping Behavior in Online Communities 177
Information Sharing 177
Knowledge Contribution 178
The Influences of Social Capital on Helping Behaviors 178
The Influences of the Nature of Online Community on Helping Behaviors 179
The Sense of Community 181
Research Conceptual Framework 181
Empirical Results 182
Data Collection and Sample 182
Operationalization and Measurement 182
Data Analysis 183
Discussion and Managerial Implications 184
Further Research Directions 185
References 186
Mobile Forensics: An Introduction from Indian Law Enforcement Perspective 188
Introduction 188
The Need for Mobile Phone Handset Forensics 188
Use of Mobile Phones to Store and Transmit Personal and Corporate Information 189
Use of Mobile Phones in Online Transactions 189
Law Enforcement, Criminals and Mobile Phone Devices 189
Computer Forensics v/s Mobile Phone Handset Forensics 190
Reproducibility of Evidence in the Case of Dead Forensic Analysis 190
Connectivity Options and Their Impact on Dead and Live Forensic Analysis 190
Operating Systems and File Systems 191
Hardware 192
Forensic Tools and Toolkits Available 193
Mobile Phone Data as Evidence 194
Definition of Digital Evidence 194
Principles of Electronic Evidence 194
Mobile Phone Evidence Guides 195
Concluding Remarks and Future Work 197
References 198
A Study to Identify the Critical Success Factors for ERP Implementation in an Indian SME: A Case Based Approach 200
Introduction 200
The Concept of ERP 201
The ERP Implementation Context 202
Identification of Critical Success Factors (CSFs) 204
Methodology 204
About the SME 205
Survey Methodology 206
Data Collection and Data Analysis 206
Recommendation and Limitations 209
References 209
Appendix 210
Session 7. Algorithms and Workflows 13
Hardware-Software Co-design of QRD-RLS Algorithm with Microblaze Soft Core Processor 212
Introduction 212
QRD-RLS Algorithm 214
QR Decomposition 214
Givens Rotations 214
QR Decomposition Based RLS 214
QRD-RLSArchitecture 215
CORDIC in QRD 215
Systolic Arrays 216
Back Substitution 217
Implementation Methodology 217
Profiling and Hardware-Software Partitioning 217
Hardware Flow 217
Software Flow 218
Implementation Results 219
MATLAB Results 219
Verification of Our Design 219
Analysis of Our Design 220
Conclusion 221
References 222
Classification of Palmprint Using Principal Line 223
Introduction 223
Related Work 225
Proposed Classification Procedure 226
Steps to Find the Finger Web Points 226
ROI Extraction 228
Feature Extraction 230
Classification 231
Experimental Results 232
Conclusion 233
References 234
Workflow Modeling Using Stochastic Activity Networks 235
Introduction 235
Related Works 236
Workflow Patterns 237
An Overview of Stochastic Activity Networks 238
Modeling Workflow Patterns in SANs 239
AND-Join Submodel 239
XOR-Split Submodel 240
Discriminator Submodel 240
Other Workflow Patterns 241
An Example of Workflow Modeling with SANs 241
Conclusions 245
References 245
Session 8. Authentication and Detection Systems 13
AIDSLK: An Anomaly Based Intrusion Detection System in Linux Kernel 247
Introduction 247
Related Works 249
Design and Implementation of Proposed Kernel Based IDS 249
Feature Selection 250
Evaluation 252
Kernels Variety Experiment 252
C-SVC Binary-Classification Experiment 253
Sequential Instances Experiment 256
Conclusion 257
References 257
New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication 259
Introduction 259
Review of Deepa Kundur and Rongsheng XIE Techniques [1,2] 261
Watermark Embedding 261
Quantization Process 262
Proposed Technique 263
Watermark Embedding 263
Results 266
Conclusions 268
References 268
A Taxonomy of Frauds and Fraud Detection Techniques 271
Introduction 271
Types of Fraud 271
Web Network Fraud 271
Internal Fraud 273
Insurance Fraud 273
Customs Fraud 273
Credit Fraud 273
Computer Intrusion 274
Telecommunication Fraud 274
Methods and Techniques 275
Supervised Methods 275
Semi-supervised Methods 276
Combining Multiple Algorithm 277
Unsupervised Methods 277
Real Time Approaches 278
Comparing Methods 279
Conclusions 279
References 280
Session 9. Recommendation and Negotiation 13
A Hybrid Approach for Knowledge-Based Product Recommendation 283
Introduction 283
Related Work 285
Hybrid Approach for Product Recommendation 285
An Illustrative Example for Hybrid Approach 286
Results of Recommendation 290
Product Clustering Based on CBR 290
Data Capture and Analysis 291
Conclusion 292
References 293
An Integrated Rule-Based and Case-Based Reasoning Approach for Selection of the Software Packages 295
Introduction 295
Related Work 296
An Integrated Approach for Selection of the Software Packages 297
Case Study: Selection of the Campus Management System 298
Evaluation of an Integrated RBR and CBR Approach 303
Conclusions 304
References 305
Learning Agents in Automated Negotiations 307
Introduction 307
The Proposed Approach 309
Motivation for This Work 309
Context of the Proposed Work 309
The Proposed Negotiation Procedure 310
The Proposal Construction Algorithm 311
Experiments 313
Discussion of Results 316
Limitations and Future Work 316
Conclusions 316
References 317
Session 10. Secure and Multimedia Systems 13
On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications 318
Introduction 318
Signal Model 319
Multirate Schemes 320
Multi-modulation Systems 320
Multi Processing Gain System 321
Multi Channel Systems 321
Multi-processing Gain Schemes in Linear Multiuser Detection 321
Results and Conclusion 323
References 326
A Trust Based Clustering Framework for Securing Ad Hoc Networks 328
Introduction 328
Related Works 329
Protocol Details 330
Notation 331
Secure Distributed Leader Election Algorithm 332
Node Join or Registration 332
Intra Cluster Routing 333
Inter Cluster Routing 335
Node Unjoin 335
Trust Evalutaion 336
Dempster Shafer Theory of Combining Evidences and Its Application to Trust Prediction 336
Conclusion and Future Work 338
References 339
Security Enhancement in Data Encryption Standard 340
Introduction 340
Data Encryption Standard 341
Modifications in DES 342
Cryptographic Analysis 345
Conclusion 348
References 348
Extended Abstracts of Posters 14
A Novel Framework for Executing Untrusted Programs 350
Introduction 350
Framework 351
References 351
Comparative Analysis of Decision Trees with Logistic Regression in Predicting Fault-Prone Classes 352
Introduction 352
Goal and Hypothesis 353
Conclusion 353
Software Security Factors in Design Phase 354
Mathematical Modelling of SRIRE Approach to Develop Search Engine Friendly Website 356
Introduction 356
Experiment and Conclusion 357
References 357
Personalized Semantic Peer Selection in Peer-to-Peer Networks 358
References 359
An Ant Colony Optimization Approach to Test Sequence Generation for Control Flow Based Software Testing 360
Software Testing and ACO 360
Conclusion 361
Reference 361
Component Prioritization Schema for Achieving Maximum Time and Cost Benefits from Software Testing 362
Non-homogenous Poisson Process Based Cumulative Priority Model 362
Component Prioritization Schema 363
Priority Weight Calculation 363
Conclusion 364
Reference 364
Optimization of Software Testing Using Genetic Algorithm 365
Test Data Generation Using GA 365
Algorithm Implemented 365
Conclusion 366
Reference 366
Study and Analysis of Software Development and User Satisfaction Level 367
Introduction 367
Methodology 367
Observations 368
Conclusion 368
References 368
Influence of Hot Spots in CDMA Macro Cellular Systems 369
References 370
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data 371
Extended Abstract 371
References 372
PCNN Based Hybrid Approach for Suppression of High Density of Impulsive Noise 373
Introduction 373
Improved Peak-and-Valley 373
Proposed Variant of Peak-and-Valley Filter Based on PCNN 374
Conclusion 374
References 374
An Overview of a New Multi-formalism Modeling Framework 375
Extended Abstract 375
References 376
Association Rule Based Feature Extraction for Character Recognition 377
Introduction 377
Proposed Methodology 377
Results 378
Conclusion 378
References 379
Author Index 380

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Mathematik / Informatik Informatik Grafik / Design
Informatik Software Entwicklung User Interfaces (HCI)
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Schlagworte algorithms • ant colony • CDMA • cellular systems • Character Recognition • classification • Data Mining • decision trees • Distributed Systems • feature extraction • fraud detection • genetic algotithms • Information • Multimedia • object oriented design • P2P • pcnn • security • software development • Software engineering • Software Testing • spike detection • trust management
ISBN-10 3-642-00405-9 / 3642004059
ISBN-13 978-3-642-00405-6 / 9783642004056
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
49,90