Recent Trends in Network Security and Applications -  Natarajan Meghanathan,  Selma Boumerdassi,  Nabendu Chaki,  Dhinaharan Nagamalai

Recent Trends in Network Security and Applications (eBook)

Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010Proceedings
eBook Download: PDF
2010 | 1. Auflage
654 Seiten
Springer-Verlag
978-3-642-14478-3 (ISBN)
Systemvoraussetzungen
95,23 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book constitutes the proceedings of the Third International Conference on Network Security and Applications held in Chennai, India, in July 2010.

Preface 5
Organization 6
Workshop Preface 9
Workshop Organization 11
Table of Contents 13
The Third International Conference on Network Security and Applications (CNSA 2010) 19
Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks 19
Introduction 19
Preliminaries 20
Related Work 20
Key Pre-distribution Schemes 21
Revocation of Keys 21
Secure Data Aggregation Schemes 21
SDAKM Scheme 22
Secure Data Aggregation Scheme 23
Efficient Key Management Scheme 23
Performance Evaluation 24
Security Analysis of IHC 24
Security Analysis of Key Management Scheme 25
Conclusion 27
References 27
Data Security in Local Area Network Based on Fast Encryption Algorithm 29
Introduction 29
Review on the Symmetrical-Encryption Algorithms 30
The New Symmetrical Algorithm 32
Key Generation 32
Encryption 34
Decryption 35
Applications 35
The Results 41
Conclusion 43
References 44
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer 45
Introduction 45
Architecture of the Fasids 46
Fuzzy Component for Non-intrusive Traffic 47
Working of Fuzzy Cognitive Mapper in Ids 47
Fuzzy Associative Memory by Fuzzy Rules 48
Algorithm for Fuzzy Intrusion Detection System 49
Results and Analysis 51
Conclusion 53
References 53
Trust Models in Wireless Sensor Networks: A Survey 55
Introduction 55
Security in WSNs 56
Notion of Trust 57
Trust in Sensor Networks 58
References 60
Load Balancing in Distributed Web Caching 65
Introduction 65
Issues 66
Solutions 67
Desirable Properties of Distributed Web Caching 67
Fast access 67
Robustness 67
Transparency 67
Scalability 67
Efficiency 68
Adaptivity 68
Stability 68
Load balancing 68
Simplicity 68
Problems in Distributed Web Caching 68
Extra Overhead 68
Size of Cache 68
Cache Coherence Problem 68
Scalability 68
Proposed Solution for Distributed Web Caching 68
The Proposed Caching System 69
Structure of Network 69
Proposed Architecture 69
Proposed Algorithm 70
Conclusions 72
References 72
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups 73
Introduction 73
Related Work 74
Notations and Terminology 75
Broadcast Ring Based Group Communication 75
Join Protocol 75
Leave Protocol 76
Group Communication Using the Combination of Ring and Tree 77
Join Protocol 78
Leave Protocol 79
Analysis 81
Number of Keys at Each Member 81
Cost of Join 81
Cost of Leave 81
Conclusion 82
References 82
Image Classification for More Reliable Steganalysis 84
Introduction 84
Notations 85
Classification of Images for More Reliable Steganalysis 85
Experimental Results 89
Identification of Images Which Give Highly Inaccurate Results 89
Identification of Images Which Give Accurate Results 90
Conclusion 91
References 91
Security for High-Speed MANs/WANs 93
Introduction 93
Security Threats 95
Threat Identification 97
Security Concerns and TCP/ IP 98
Physical Security 99
Security Services and Mechanisms 99
Why a New Approach Is Needed 99
References 100
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel 101
Introduction 101
Covert Communication 102
Importance of Covertness and Layers of Attack 103
Covert Channel Variants 104
Transport Layer Based Hybrid Covert Channel 105
NCT - SNCC Implementation 106
SCSL Implementation 108
Conclusion and Future Work 109
References 110
Efficient Encryption of Intra and Inter Frames in MPEG Video 111
Introduction 111
MPEG Coding Methodology 112
Video Security Algorithms 112
Proposed Encryption Method 114
Secret Sharing 114
Shamir’s Secret Sharing Scheme 115
Decryption of Intra and Inter Frames 116
Security Analysis 117
Key Space Analysis 117
Statistical Analysis 117
Experiments and Results 120
Conclusion 122
References 122
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 123
Introduction 123
SHA-512 Implementation 123
Preprocessing 124
Hash Computation 124
Proposed Model 126
Performance Analysis 129
Security Analysis 129
Conclusion 130
References 131
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks 132
Introduction 132
Multicasting Protocols in MANET 133
Experimental Setup and Performance Metrics 135
Simulation Result 135
Conclusion and Future Work 138
References 140
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks 141
Introduction 141
Security Attacks in MANET 142
Related Works 143
Other Related Work 144
The Proposed Scheme 144
Nature of Association between Neighbouring Nodes in an Ad Hoc Network 144
Association Estimator Technique 145
Routing Mechanism 145
Simulation Set Up 146
Results and Discussions 146
Conclusion 147
References 148
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks 150
Introduction 150
Admission of Voice Calls Using Delay Analysis Method in Differentiated Services 151
Components of the Qos-Provisioning System 152
Design of a Call Admission Control Agent (CACA) 153
Utilization-Based Deterministic Delay Analysis 154
Utilization-Based Statistical Delay Analysis 155
Proposed Method for Securing ARP Cache Poisoning Attack 155
Secure ARP Request and Response between LAN 156
Experimental Results for Admission of Voice Calls Using Delay Analysis Method 157
Performance of Authenticated Voice User Admission Procedure in VOIP Network 157
Verification of Prevented ARP Cache Poisoning Attack Using MessageIntegrity and Message Authentication 158
Conclusion 159
References 160
Wireless Mesh Networks: Routing Protocols and Challenges 161
Introduction 161
Routing Layer Challenges 162
Routing Metrics 162
Hop Count 163
Blocking Metric 163
Expected Transmission Count (ETX) 163
Expected Transmission Time (ETT) 163
Routing Protocols 163
Optimized Link State Routing (OLSR) Protocol 164
Fish-Eye State Routing Protocol 164
Destination Sequenced Distance Vector (DSDV) 165
The Wireless Routing Protocol (WRP) 165
Clusterhead Gateway Switching Routing Protocol (CGSR) 165
Zone Based Hierarchical Link State Routing Protocol (ZHLS) 166
Ad Hoc On Demand Distance Vector Routing (AODV) 166
Temporally-Ordered Routing Algorithm- TORA 166
Dynamic Source Routing- DSR 167
Application Scenarios 167
Wireless Broadband Home Networking 168
Enterprise Networking 168
Broadband Community Networking 168
Conclusion 168
References 168
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification 170
Introduction 170
Two Approaches for Protocol Verification 170
Formal Verification of Security Protocols 171
Belief Logics 171
Theorem Proving Based Approaches 172
State Exploration 172
Model Checking Tools 173
Protocol Verification Using Scyther 177
Comparative Analysis of Formal Method Model Checking Tools 179
Conclusion 180
References 180
Secured Paradigm for Mobile Databases 182
Introduction 182
Related Works 183
Encryption 183
Issues 183
Architecture 184
Proposed Architecture 184
Server Side Security 186
Client Side Security 186
Security during Data Transmission 187
Advantages of the Proposed Architecture 187
Conclusion 188
References 188
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks 190
Introduction 190
Cryptography for WSN 191
Need of Asymmetric Key Cryptosystem 192
Crypt Algorithms for WSN 192
RSA Algorithm 192
ELGAMAL Algorithm 194
Simulation Results 194
ELGAMAL Algorithm-Energy Diagram 195
RSA Algorithm-Energy Diagram 196
Comparison of RSA and ELGAMAL 197
Conclusion 197
References 198
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET 199
Introduction 199
Related Work 200
Trust Based Multipath DSR 201
Route Discovery at Source Node 201
RREQ Processing at Intermediate Nodes 202
RREP at Destination Node 202
RREP Processing at Intermediate Nodes 202
Path Decision at Source Node 202
Extended - Trust Based Multi-path Dynamic Source Routing(E-TMDSR) 203
Discovery of Multiple Paths 203
Path Selection 203
Traffic Allocation 204
Route Maintenance 204
Security Analysis of E-TMDSR 204
Protection against Malicious Colluding Nodes 204
Black Hole and Gray Hole Attacks 205
Cache Poisoning 205
Performance Analysis of E-TMDSR 205
Metrics 205
Discussion of Results 205
Conclusions and Future Work 207
References 207
A Flow Based Slow and Fast Scan Detection System 209
Introduction 209
Related Work 210
ProposedSystem 211
Architecture 211
Detection Methods 213
Experiments 215
Test Set-Up 215
Result 215
Result Analysis 216
Fast Scan Detection 216
Slow Scan Detection 216
Conclusion 217
References 218
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices 219
Introduction 220
Problems in the Traditional Method 220
Related Work 221
Authentication 222
Authentication Factors 222
Indirect Authentication 222
Proposed Authentication Scheme 223
Initial Phase 223
Registration Phase 223
Login Phase 223
Authentication Phase 224
Security Analysis of Our Scheme 225
Denial of Service Attack 225
Forgery Attack 225
Password Guessing Attack 225
Parallel Session Attack 225
Mutual Authentication 225
Security Analysis 225
Implementation Results and Discussions 226
Experimental Setup 227
Time Complexity 227
Energy Requirements 228
Conclusion 230
References 230
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker 232
Introduction 232
Related Work 233
Overview of Software Model Checking 234
The SPIN Model Checker 234
Concurrent Usage Control Authorization Implementation Verification 234
Verification Using the SPIN 235
Case Study 236
Safe Usage Control Authorization Model Design 236
Usage Control Implementation Verification 237
Conclusion 240
References 240
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory 242
Introduction 242
AES (Advanced Encryption Standard) 243
Pipelining of AES Encryption 243
Search Based Memory 244
Pipelining of Key Schedule Algorithm 245
Pipelined Architecture for Key Expansion Module 245
Comparison of Hardware Utilization 245
Conclusion 248
References 248
A SAT Based Verification Framework for Wireless LAN Security Policy Managemen Supported by STRBAC Model 250
Introduction 250
Related Work 251
WLAN Security Policy Management System 252
Proposed Spatio-temporal RBAC Model for WLAN Policy Management 253
Modeling Basic RBAC Entities in the Proposed System 254
Modeling of Global Policy 255
SAT Based Security Property Verification 256
Boolean Modeling STRBAC Entities and Policy Configurations 256
SAT Solver and SAT Query Formulation 257
Conclusion 258
References 258
Detection and Classification of DDoS Attacks Using Fuzzy Inference System 260
Introduction 260
Review of Literature 261
System Architecture 262
Anomaly Detection Dataset 263
Alert Generation 263
Alert Preprocessing 263
Alert Classification Using Fuzzy Inference System 265
Implementation Details 266
Results and Discussion 267
Key Findings of the Research 269
Conclusion 269
References 270
Detection and Recognition of File Masquerading for E-mail and Data Security 271
Introduction 271
Problem Definition 272
Design Goals 272
File Type Detection Methods 272
Literature Survey 274
Byte Frequency Distribution Techniques 274
Metric Based Techniques 275
Proposed Technique 275
File Header/Trailer Analysis 276
Multiple Discriminant Analysis/Compound File Type Detection 277
Tested Environment 277
Conclusion 278
Future Work 279
References 279
Privacy Preserving Mining of Distributed Data Using Steganography 281
Introduction 281
Related Works 283
Proposed Approach: Steganography 284
Conclusions 286
References 286
First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P 288
Proxy Re-signature Scheme That Translates OneType of Signature Scheme to Another Type of Signature Scheme 288
Introduction 288
Definition of Proxy Re-signature Scheme 289
Proxy Re-signature Scheme to Translate One Type of Signature Scheme to Another Type 290
Schnorr Signature Scheme to RSA Signature Scheme 290
ElGamal Signature to RSA Signature Scheme 292
Proxy Signer Revocation 294
Properties of the New Proxy Re-signature Schemes 295
Security of Our Schemes 295
Conversion of One Type of Signature to Another Type:Applications 296
Conclusion 296
References 297
Efficient Region-Based Key Agreement for Peer -to - PeerInformation Sharing in Mobile Ad Hoc Networks 298
Introduction 298
Proposed Scheme 299
System Model 299
Network Dynamics 301
Communication Protocol 303
Applying Elliptic Curve Based Diffie-Hellman Key Exchange 304
Tree-Based Group Elliptic Curve Diffie-Hellman Protocol 306
Experimental Results and Discussion 308
Searching for Information [4,5,6] 308
Normal Search 309
Content Search 309
Performance Analysis 310
Storage Overhead 311
Communication Overhead 312
Computation Overhead 312
Conclusion and Future Work 313
References 313
A Power Adjustment Approach for Multi-channelMulti-AP Deployment Using Cognitive Radio Concept 314
Introduction 314
Related Work 315
The Proposed Approach 315
Algorithm for Power Adjustment 318
Conclusion 318
References 319
Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise 320
Introduction 320
Related Work and Our Approach 321
Related Work 321
Our Unique Contributions 323
System Model 323
Protecting P2P Networks 325
Conscience Filters 325
Content Poisoning 326
Audit Trails 327
Circumventing Trust-Based Systems 327
Result Analysis 327
Creating Real-World Conscience 329
Conclusions and Future Work 330
References 330
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks 332
Introduction 332
Heuristic Cognitive Approach for IEEE 802.11 WLAN 333
IEEE 802.11 Architecture 333
Cognitive Radio 334
Proposed Heuristic Model 335
802.11 Based Cognitive Radio Network 337
Operation Principles of the System 337
Overview of IEEE 802.11 DCF 338
Proposed 802.11 Based Cognitive Design Spectrum Sensing 339
Conclusion 340
References 340
Privacy Layer for Business Intelligence 341
Introduction 341
Preserving Privacy 342
Our Approach 343
The Privacy Layer 344
Components of Privacy Layer 344
Conclusion 346
References 347
Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm 349
Introduction 349
Overview of Existing Backoff Algorithms 351
Proposed Probability Based Backoff Algorithm 352
Comparative Analysis of BEB Algorithm, MBEB Algorithm and Proposed PBB Algorithm 353
Conclusion 356
References 356
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing 358
Introduction 358
Related Work 359
Our Scheme 360
Setup Phase 360
SLA Details 360
Exposure Window 360
End of SLA Period 361
Destructor 361
Verifier 363
Proof of Destruction/Proof of Erasability 364
Analysis of Our Scheme 364
Conclusion 365
References 366
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies 367
Introduction 367
Related to This Work 368
Identity Management – A Survey 368
Selection of Vendors for the Survey 368
Selection of Evaluation Criteria 369
State-of-the-Art IdM Taxonomies 369
Review of Different IdMs 369
IBM Tivoli Identity Manager 369
Novell Identity Manager 370
Sun Java System Identity Manager 371
Oracle Identity Management 371
CA Identity Manager 372
Comparison Results 373
Future Work 375
Conclusion 375
References 375
BubbleTrust: A Reliable Trust Management for Large P2P Networks 377
Introduction 377
BasicConcept 378
Calculation 379
Basic Algorithm 382
Data Management 384
Provider and Evaluator Function 385
Optimized Algorithms 387
Algorithm with Cutting Off 387
Limiting Depth 388
Using Values from Previous Runs 388
Evaluation and Data Analysis 389
Conclusion and Future Work 390
References 391
Dynamic Policy Adaptation for Collaborative Groups 392
Introduction 392
System Model 394
Peer Behavior and Roles 394
Change of Roles 395
Detailed Working of the Framework 395
Group Discovery and Advertisement 396
Admission Request 396
Authentication 397
Key Management 397
PDTBAC- Policy Driven Trust Based Access Control for P$_2$P Applications 397
Trust Model in Presence of Malicious Peers 400
Context Sensitive Layered Reputation Model 401
Design of Trust Model 402
Modeling Dynamic Policies Using Prolog 403
Modeling Rules for Join 403
Modeling Rules for Level Update 403
Modeling Dynamic Rules 404
Overall Working of Framework with Prolog 404
Application Framework 404
Peer Behavior 405
Implementation Details 405
Simulations and Graphs 406
Related Work 410
Conclusion 411
References 411
A Deviation Based Outlier Intrusion Detection System 413
Introduction 413
Intruder 413
Intrusion 414
Intrusion Detection 414
IDS Classification 414
Contemporary Research 415
Proposed Approach 415
Approach 415
Model 415
Conclusion and Future Works 419
References 419
Privacy Preserving Ciphertext Policy Attribute Based Encryption 420
Introudction 420
Our Contribution 421
Related Work 421
Preliminaries 422
Bilinear Maps 422
Access Structure 422
Ciphertext Policy Attribute Based Encryption 423
Security Model for CP-ABE 423
Construction 424
Security Analysis 425
Conclusion 426
References 427
Reliable Timeout Based Commit Protocol 428
Introduction 428
Proposed Solution: Reliable Timeout Based Commit Protocol 429
Transaction Execution at MH 430
Transaction Execution at Coordinator i.e. at BS 432
Recovery Model 433
Performance Analysis of Reliable Timeout Based Commit Protocol 434
Results 436
Conclusion and Future Work 436
References 436
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) 438
Introduction 438
IoT Objectives 439
Naming and Addressing 439
Device Discovery and Network Discovery 439
Content and Service Access 439
Communication 440
Security and Privacy 440
Security Requirements 440
Key Properties of IoT 440
Challenges 441
High Level Security Requirements 441
Security and Threat Taxonomy for IoT 442
Related Work 443
Identity Certificate Frameworks 444
Single Sign-On 444
Identity Federation 444
User-Centric Identity Management 444
Device Security 445
Proposed Security Model for IoT 445
Conclusion 445
References 446
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges 448
Introduction 448
Architectural Framework and Design Constraints 449
Identity Management 450
Related Work 451
OpenId 451
Liberty Alliance 452
Card-Space 452
Shibboleth 452
Higgins 452
Identity Modeling and Requirement Matrix 453
Proposed IdM Framework 455
Conclusion 456
References 456
Reputation Enhancement in a Trust Management System 458
Introduction 458
Related Work 459
Extended TUX-TMS Model 460
Architecture of TUX-TMS 460
Parameters 460
Partitioning of the Users 464
Results and Discussion 465
Performance against Malicious Users 466
Performance in a Distributed Environment 467
Conclusion 467
References 468
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks 470
Introduction 470
Usage Scenario and Functional Requirements 471
The A-Code Primitive 472
The Experimental Platform 474
Experimental Results 476
Related Work 479
Conclusions and Future Work 479
References 480
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks 481
Introduction 481
Related Work 482
Description of the Reliability-based Source Routing Protocol 483
Motivation 483
Attack Model 483
Reliability Metric Table and Beacon Broadcasts 484
Reliability Metric of a Path 485
Sequence of Steps for the RSR Protocol 485
Logic behind the Use of the Probe Packet and the Public Key Certificate 487
RSR Route Maintenance 487
Increment vs. Decrement Costs 487
Conclusions and Future Work 489
References 489
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks 491
Introduction 491
Attacks on Vehicular Networks 492
Sybil Attack and Classification 492
Simulation of Sybil Attack in VANET 493
Simulation Parameters and Performance Metrics 494
Simulation Results 495
Related Work of Sybil Attack Detection 498
Proposed Sybil Attack Detection Technique for VANETs 498
Conclusions 499
References 500
Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis 501
Introduction 501
Related Work 502
Proposed Methodology 502
Conclusion and Limitations 506
References 507
Knowledge Base Compound Approach towards Spam Detection 508
Introduction 508
Spammer Approaches and Their Attack 510
Related Work 511
Proposed Methodology 511
Implementation and Analysis 513
Conclusion and Limitation 516
References 516
Trust Management Framework for UbiquitousApplications 518
Introduction 518
Security Approach for Typical Ubiquitous Applications 519
Related Work 520
Proposed Architecture for Trust Management Framework 521
Trust Value Calculation Using Inference Engine 523
Conclusion and Future Work 525
References 525
A Hybrid Address Allocation Algorithm for IPv6 527
Introduction 527
Existing IPv6 Address Allocation Algorithms 528
Bisection Allocation Algorithm 528
Rate-Sparse Allocation Algorithm 529
Existing Proposals on IPv6 Address Allocation Algorithms 530
Growth-based Address Partitioning Algorithm (GAP) 530
Common Address Pool (CAP) 531
Proposed Hybrid IPv6 Address Allocation Algorithm 532
Evaluation 533
Conclusion 534
References 534
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols 536
Introduction 536
Related Literature Reviews 538
Proposed Model of Efficient and Dynamic Probabilistic Broadcasting Algorithm (EDPB) 539
Simulation Experimental Setup and Performance Metrics 540
Result Analysis 541
Conclusions 544
References 544
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network 546
Introduction 546
Related Work 547
AODV and Modeling of the State Machine 548
Finite State Machine Model 548
The Proposed Algorithm 550
The Features of the Algorithm 550
The Detection Algorithm 551
Simulation Results 553
Conclusion and Future Work 554
References 555
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks 556
Introduction 556
Related Work 557
Trust Manager 558
The Monitoring Module 558
The Reputation Handling Module 558
Simulation 562
Conclusion 564
References 564
Towards Designing Application Specific Trust Treated Model 566
Introduction 566
Motivation 567
Literature Review 568
Trust Models 568
Aspect-Oriented Methodologies 569
Trust Treated Model 570
Overview 570
Trust Modeling Process 570
Reputation Service - A Running Example 572
Conclusions and Future Work 573
References 574
First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010 576
Security for Contactless Smart Cards Using Cryptography 576
Introduction 576
Methodology and Architecture 578
Implementation and Result 580
Evaluation and Limitations 581
Future Enhancements 583
Conclusion 584
References 584
A Novel Approach for Compressed Video Steganography 585
Introduction 585
Architecture 586
Embedding and Extraction Mechanism 587
Embedding Position Selection 587
Compressed Video Steganographic Algorithm 588
Adaptive Rules to Reduce Distortion 589
Pseudo-random Dithering 589
The Embedding Algorithm 590
The Extraction Algorithm 591
Experimental Result 591
Capacity and PSNR 591
Conclusion 593
References 593
Privacy Preserving Data Mining by Cyptography 594
Introduction 594
Privacy Preserving 595
Cryptography: Oblivious Transfer 595
Two Party Case 596
Two Multi Party Case 597
Conclusion 599
References 600
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure 601
Introduction 601
Proposed Framework 602
Proposed Algorithm 603
Analysis of Proposed Framework 604
Mining of Association Rules for Dense Dataset 605
Hyper-Linked Data Structure on Sparse Datasets 607
Performance Study and Experimental Results 609
Conclusion and Future Wok 610
References 610
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm 611
Introduction 611
Related Work 612
Proposed Approach 613
Approach Decomposition 613
Algorithm 614
Results and Discussion 617
Conclusion 619
References 619
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments 621
Introduction 621
Mobile Database System 622
Pessimistic Commit Protocols 623
Architecture of Mobile Transaction Management System 623
Mapping Functionality to Architecture 624
Design and Implementation of Pessimistic Commit Protocols 625
Mobility Management in Pessimistic Protocols 628
Data Structures 629
Conclusion 630
References 630
On Analyzing the Degree of Coldnessin Iowa, a North Central Region,United States: An XML Exploitation in Spatial Databases 631
Introduction 631
Approach 633
NC94 Dataset 633
Canonical Storage for XML (CanStoreX) 634
Common GUI 636
ParaSQL Query 637
Color Coding Scheme 638
Formulation 639
Algorithm to Calculate the Degree of Coldness 639
Model to Calculate the Darkness 640
Results 641
Related Work 641
Conclusion and Future Work 641
References 642
Implementation of MPEG-7 Document Management System Based on Native Database 643
Introduction 643
Related Works 644
MPEG-7 Data Clustering 645
Design of MDMS 646
General Structure of MDMS 647
Schema Management Subsystem 647
Document Management Subsystem 648
Implementation of MDMS 648
Implementation Environment 648
MDMS Packages 649
Storage Structure 649
Comparison of MPEG-7 Document Clustering Method 649
Conclusions and Future Work 651
References 652
Author Index 653

Erscheint lt. Verlag 1.1.2010
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Informatik Software Entwicklung User Interfaces (HCI)
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
ISBN-10 3-642-14478-0 / 3642144780
ISBN-13 978-3-642-14478-3 / 9783642144783
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 14,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Eine praxisorientierte Einführung mit Anwendungen in Oracle, SQL …

von Edwin Schicker

eBook Download (2017)
Springer Vieweg (Verlag)
34,99
Unlock the power of deep learning for swift and enhanced results

von Giuseppe Ciaburro

eBook Download (2024)
Packt Publishing (Verlag)
35,99