By Topic

Digital Information Management, 2006 1st International Conference on

Date 6-6 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 85
  • Assessment of Package Cohesion and Coupling Principles for Predicting the Quality of Object Oriented Design

    Publication Year: 2007 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB)  

    In determining the quality of design two factors are important, namely coupling and cohesion. This paper highlights the principles of package architecture from cohesion and coupling point of view and discusses the method for extracting metric associated with them. The method is supported with the help of case study. The results arrived at from the case study are discussed further for utilizing them for predicting the quality of software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Prototype Implementation using Aspect Oriented Software Development

    Publication Year: 2007 , Page(s): 6 - 12
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (185 KB)  

    Software design is an important activity in the development lifecycle but its benefits are often not realized. Scattering and tangling of cross-cutting behaviour with other elements causes problems of comprehensibility, traceability, evolvability, and reusability. Attempts have been made to address this problem in the programming domain but the problem has not been addressed effectively at earlier stages in the lifecycle. Composition patterns presents an approach to addressing this problem at the design stage. We take a case of a learning resource center and demonstrate how aspect oriented software development (AOSD) can be applied in software design. This paper describes the implementation of the various mechanisms according to the overall structure of the AOSDDL structure, the processing and test environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Component Metadata based on Dependency Relationships Matrix to improve the Testability of Component-based Software

    Publication Year: 2007 , Page(s): 13 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB)  

    Component-based software development technique and its intensive use in the industry has led to the wide research in various aspects of component-based systems. How to improve the testability of component-based software is an interesting and useful technique in the component-based software engineering. In this paper, we summarize eight types of dependency between two components in the CBSs and the notion of metadata. Then the definitions of component dependency graph (CDG) and component direct dependency graph(CDDG) are given. Based on these, gives the definition of dependency relationship matrix of the component Cm(CmDM) and detailed dependency relationship matrix of the component Cm(CmDM). And we further describe the structure of CmDDM. Based on these, we further present the approaches to find dependencies relationships: code-based approach and specification-based approach. Finally, we apply an application example implementing integration testing when a component named RegisterStuInformation is integrated into a CBS, and present a table with test coverage figure to illustrate the validity of our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Evolution in Software-Engineering Knowledge Management Systems

    Publication Year: 2007 , Page(s): 19 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (446 KB)  

    Knowledge is not static chunks of information, but dynamic in the sense that its value or relevance evolves based on continuously changing context. Traditional approaches in knowledge management systems rely on accumulating as much knowledge units as possible. However, less attention is paid to the evolution of captured knowledge while any change in the context of captured knowledge has to be reflected in the form of its relevance. This paper puts forth a framework for knowledge lifecycle and activation model to cater for the dynamic assessment of captured knowledge. This is maintained through the continuous knowledge assessment carried out collaboratively by respective knowledge workers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Organizational Changes Required and the Challenges Involved in Adopting Agile Methodologies in Traditional Software Development Organizations

    Publication Year: 2007 , Page(s): 25 - 28
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (173 KB)  

    Agile software development methodologies have recently gained widespread popularity. The Agile Manifesto states valuing "individuals, and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and responding to change over following apian" by M. Fowler (2005). Different organizations are transforming their traditional software development practices into agile ones. There have been several disparate anecdotal evidences in support of the changes required and the challenges involved. In this paper, we provide a consolidated picture of the important changes required and the challenges involved in such transformation projects. We also provide a conceptual framework that would help managers for focusing on the important changes required and the challenges involved in agile software development projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing With Software Concerns In Aspects

    Publication Year: 2007 , Page(s): 29 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (313 KB)  

    The actual realization of a design language form has been revealed to be non-trivial. Most of the design languages are very much tailored towards a specific application or application domain. Moreover, with the exception of very few hardly any of these language notations have been used outside their own research environment. The development of a more generic aspect oriented design language requires a wider and more thorough look at the requirements. This paper examines the design notation issues and discusses how it fulfils the requirements in principle and design and consequently would lead to a general purpose AOSD design language (AOSDDL) that will map AOSD design notations to the existing AOP languages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing

    Publication Year: 2007 , Page(s): 36 - 40
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (656 KB)  

    Digital piracy is the major driving force behind the research in the field of watermarking. In this paper a watermarking scheme is proposed to protect the digital images from illegal copying. The proposed scheme uses chaotic mixing based on Torus Automorphism (TA) to scramble the watermark image, applies the watermark by modifying the wavelet coefficients of the image and requires original host image for extraction of the watermark. The scheme is robust to several signal distortions. A comparison of our scheme with other transform domain schemes is also provided along with the simulation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Concurrency Control for MLS/DDBSs

    Publication Year: 2007 , Page(s): 41 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3116 KB)  

    Multilevel security requirements introduce a new dimension to traditional database concurrency control protocol as they cause covert channels. To prevent covert channels, concurrency control protocol for multilevel secure database should ensure that transactions at low security level are never delayed by high security level transactions in the event of a data conflict. This may subjected to an indefinite delay if it is forced to abort repeatedly to high security level transactions and making the secure concurrency control protocol unfair towards high security level transactions (Kaur et al., 2005). This paper proposes secure multiversion database concurrency control protocol that is free from covert channels without starving the high security level transactions that may often occur in pervious works. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A System to test malafide intension based on privacy violation detection

    Publication Year: 2007 , Page(s): 47 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB)  

    As a response to serious privacy concerns, various approaches have been proposed on privacy policy driven databases. However it is very difficult to provide robust privacy implementation. Privacy violation can still take place with some masquerading. In such a scenario, it is important to detect the violation. A solution for privacy violation detection based on malafide intension has been proposed recently. In this paper, we propose an architecture and implementation of a system to test the robustness of malafide intension based privacy violation detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management

    Publication Year: 2007 , Page(s): 55 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB)  

    Computer crimes have affected almost all sectors of international business. The legal sector is no exception to this trend. In years legal firms have reported many kinds of computer crime. One particular area that has attracted attention is the security of trust accounts operated within law firms. This paper examines the purpose of trust accounts within law firms, the ways in which they are vulnerable to abuse through computer crime and the ways in which the ICT industry can promote their security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled EHR access in secured health information system

    Publication Year: 2007 , Page(s): 63 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (241 KB)  

    Health care systems are vulnerable to many possible attacks leading to challenge the data security. While designing information systems, this problem is addressed by proposing and testing various designs. Through this paper, we describe a two-tier architecture to access electronic health records (HER) data with the use of interactive trust negotiation. The preliminary results suggest that security measures are not confined to systems alone but data correlations offer much promise for developing a secured health care information system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exposing Web Services to Business Partners: Security and Quality of Service Issue

    Publication Year: 2007 , Page(s): 69 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1150 KB)  

    Delivering QoS and ensuring security of Web services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature. This paper provides solutions to manage security and QoS problems when exposing Web services to business partners. Based on a real case study, we first discuss the security issue in the context of an open industrial information system. Then an approach is presented to deal with the QoS issue in such systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Dynamic Content Adaptation in Distributed Multimedia Systems

    Publication Year: 2007 , Page(s): 75 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB)  

    Distributed multimedia presentation mechanisms lending to self- content adaptation are required in order to support heterogeneous devices and to incorporate user preferences in the presentations prior to their play-out. In this paper, we propose a proxy-based architectural framework where several services are available for content adaptation as the content may have to be converted into several intermediate forms before being transformed into its final adapted form. We also propose a new graph-based content adaptation algorithm able to decide about the availability of the services on the basis of the length of the queue associated with each service. To avoid an inefficient use of the set of services, an adaptation tree is generated in our algorithm which helps to determine the best set of services to employ, in order to deliver the requested content effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic Maps Management in Spatial-Temporal Multimedia Blog

    Publication Year: 2007 , Page(s): 81 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (601 KB)  

    With the breakthrough of Web blog, this easy way to publish information increases exponentially the data volume and its related complexity. Spatial-temporal information (about where and when) contained inside multimedia postings need to be better understood by search engines or by end-users as it lacks semantics. The semantic web community has promoted topic maps paradigm as a technology to increase the semantic regarding the optimization of information creation, navigation, their merge and dissemination. This paper introduces a new layer that combines blog feed standards (e.g. RSS, Atom) with the topic map data model for semantic-augmented and interoperable information exchange. In addition, the paper carries out a case study on Isfahan (Iran city) using the topic maps layer to bridge the semantic gap in this context. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Wide Web Centric Digital Information System for Indian Banks

    Publication Year: 2007 , Page(s): 89 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (473 KB)  

    To achieve maximum business benefits and customer satisfaction, it is prerequisite for banks to have an instant access to the entire banks' transaction level data for decision support and adept business processes. Precisely for this reason, the banks in India have started using extensively technology based solutions. In this context, it is crucial to look into what legacy digital systems the banks typically have, what they should retain, any add-ons needed , reengineer the business processes in the current context and evolve an enterprise level architectural framework that can integrate all these digital information systems as components to accomplish the desired goals. In this paper one such enterprise level digital enterprise information system model that is easy to implement, and also efficient cost and time wise is proposed. A comprehensive assessment carried out on representative banks was used in building this system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User interface design pattern Management System Support for Building Information System

    Publication Year: 2007 , Page(s): 96 - 101
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5127 KB)  

    In the software development process, designing and deploying user interfaces take a lot of time while there are some kinds of user interface used over and over again in every application. The development of applications will be more effective if we can reuse the user interface among them. In this paper, we introduce an approach to enhance the reusability of user interface. By generalizing the user interfaces into patterns - user interface design pattern, we consider each user interface of a particular application is an instance of a suitable pattern. Basing on this rule to classify and manage user interfaces, we have developed a system called "User interface design pattern management system support for building information system ". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating an Historical Archive Ontology: Guidelines and Evaluation

    Publication Year: 2007 , Page(s): 102 - 109
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (410 KB)  

    Ontologies have been proven invaluable tools both for the semantic Web and for personal information management. In the context of a historical archive an ontology may provide meaningful and efficient support for search tasks as well as be used as a tool for storage and presentation of historical data. The creation however of such an ontology is complex, since the digitized archive documents are not in text format and the concepts that must be captured may vary among different time periods. This work presents a user-centric methodological approach for extracting the ontology of an historical archive focusing on the evaluation issues related to this process. The approach is exemplified through cases from its application in the University of Athens Historical Archive. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Schema Mapping based on Ontology: An Approach for GML Storage

    Publication Year: 2007 , Page(s): 110 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1255 KB)  

    The heterogeneous nature of geospatial data makes them almost non-sharable across organization boundaries. As a standard means of geospatial data encoding, geography markup language (GML), an XML based data encoding standard, has been proposed by OGC. With the proliferation of GML in many geospatial application and support from the standard DBMS, the need arises for the efficient storage mechanism of GML data. This paper analyses approaches for XML data storage in traditional DBMS and finds alternatives for GML. We propose an approach for GML storage based on the analysis of the underlying application schema. A semi-automatic mapping mechanism is proposed for the application schema to relational schemas of standard database with the utilization of common concepts for the domain i.e. the domain ontology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Integration and Semantic Security Policy Ontology Mapping for Semantic Web Services (SWS)

    Publication Year: 2007 , Page(s): 116 - 120
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB)  

    Agent ontology systems interact with other agents via automated service discovery to share data and provide services on-the-fly. Resources need to be annotated with meta-data so that they can be correctly discovered and invoked. Ontologies provide shared conceptualization of a domain but it's not easy for everyone to agree on the same ontology for a domain. As such, ontology mapping becomes important to achieve compatibility. This is also true for security policies and so a refined algorithm for ontology mapping is very much desired; especially for WS-security. This paper highlights two semantic mapping frameworks for security policy ontologies i.e. SPD Ml framework and the dynamic MAFRA2 framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology Matching Using Weighted Graphs

    Publication Year: 2007 , Page(s): 121 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB)  

    In this paper, we present a new way towards ontology matching. Using the graph representation for ontologies and schemas we proceed to calculate the weights for each node of the graph using the lexical similarity of the ancestors. With the guiding intuition that, if the parent nodes match then their children are likely to match as well. This simple observation helps on to build a fast and efficient algorithm for matching different graphs (which represent ontology or schema). Since the algorithm is very fast it can be used as a quickly and dirty method to do initial matching of a large dataset and then drill down to the exact match with other algorithms. The algorithm is not dependent on the method used for calculating the lexical similarity so the best lexical analysis can be used to derive the weights. Once the weights are in place we can calculate the matching in just a single traversal of the graphs. No other algorithm that we know of can give such fast response time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptively Automated Five-Class Fingerprint Classification Scheme Using Kohonens Feature Map and fuzzy ant clustering by centroid positioning

    Publication Year: 2007 , Page(s): 125 - 130
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1165 KB)  

    In this paper we present a novel adaptively automated fingerprint classification scheme, which is computationally efficient and resolves both intra- class diversities and inter-class similarities. Initially, preprocessing of fingerprint images is carried out to enhance the image. As part of preprocessing scheme the denoising algorithm used endows better performance of system even in case of bad quality image. Directional image is computed to classify based on global shape. Principal component analysis is employed for dimensionality reduction and to get feature space that accounts for as much of the total variation as possible. Self-organizing maps are involved for further dimension reduction and data clustering. The learning process takes into account the large intra class diversity and the continuum of fingerprint pattern types. Finally a swarm intelligence based maps the class separated fingerprint images into their respective class resolving the inter-class similarities. The proposed approach achieves an accuracy of around 93% for five-class classification tested on NIST 4 without rejection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm

    Publication Year: 2007 , Page(s): 131 - 136
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6198 KB)  

    Differentiating anomalous audio document (stego audio) from pure audio document (cover audio) is difficult and tedious. Steganalytic techniques strive to detect whether an audio contains a hidden message or not. This paper presents a genetic algorithm (GA) based approach to audio steganalysis. The basic idea is that, the various audio quality metrics calculated on cover audio signals and on stego audio signals vis-avis their denoised versions, are statistically different. GA is employed to derive a set of classification rules from audio data using these audio quality metrics, and the support-confidence framework is utilized as fitness function to judge the quality of each rule. The generated rules are then used to detect or classify the audio documents in a real-time environment. Unlike most existing GA-based approaches, because of the simple representation of rules and the effective fitness function, the proposed method provides flexibility to generally detect any new steganography technique. The implementation of the GA based audio steganalyzer relies on the choice of these audio quality metrics and the construction of a two-class classifier, which will discriminate between the adulterated and the untouched audio samples. Experimental results show that the proposed technique provides promising detection rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Development of Content-Based Image Retrieval Systems

    Publication Year: 2007 , Page(s): 137 - 144
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (957 KB)  

    Generic systems for content-based image retrieval (CBIR), such as QB1C [7] cannot be used to solve domain-specific retrieval problems, as for example, the identification of manuscript writers based in the visual characteristics of their handwriting. Domain-specific CBIR systems currently have to be implemented bottom up, i.e. almost from scratch, each time a new domain-specific solution is sought. Driven by the recognition that CBIR systems, although developed for different domain-problems, have similar building blocks and architecture, we propose a framework model for the development of CBIR systems. The aim of the framework model is to support the design of domain- specific CBIR-systems on a conceptual level by reusing architectural design and building blocks. The model-driven development of CBIR systems can thus be realized by software components for modeling the data structures and the update, storage and retrieval operations using the predefined framework model, and by components for mapping this model onto a specific implementation platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the Dance Video Annotations

    Publication Year: 2007 , Page(s): 145 - 150
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB)  

    This paper presents a dance video content model (DVCM) to represent the semantics of the dance videos at multiple granularity levels. The DVCM is designed based on the concepts such as video, shot, segment, event and object, which are the components of MPEG- 7 MDS. This paper introduces a new relationship type called, Temporal Semantic Relationship to infer the semantic relationships between the dance video objects. Inverted file based index is created to reduce the search time of the dance video queries. An interactive query processor is designed using J2SE1.5 and JMF2.0 to perform the semantic search. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-feature Integration on 3D Model Similarity Retrieval

    Publication Year: 2007 , Page(s): 151 - 156
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB)  

    In this paper, we describe several 3D shape descriptors for 3D model retrieval and integrate them in order to obtain higher performance than single descriptor may yield. We analyze four feature vector (FV) integration approaches: Pure FV Integration (PFI), Reduced FV Integration (RFI), Distance Integration (DI), and Rank Integration (RI). We observe which weighting factor might be the best for each approach. Our experiments show that the weighting factors consistently enhance the retrieval performance on not only training dataset, but also another extended dataset. Our experiments also highlight that RFI, which is obviously useful for processing unknown query object, is the best among the others. In another side, DI provides faster processing as it uses pre-computed distance, but does not have a capability of processing unknown query object. Hence, both approaches could be combined in order to obtain higher efficiency and effectiveness of 3D model retrieval system for either known or unknown query object. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.