2010 International Conference on Data Storage and Data Engineering

9-10 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for reuse | PDF file iconPDF (725 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):x - xi
    Request permission for reuse | PDF file iconPDF (48 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xii
    Request permission for reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xiii - xiv
    Request permission for reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Amalgamtion of Internet for Supervisory Control and Data Acquisition System (SCADA) Encompassing Security Issues

    Publication Year: 2010, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Supervisory Control And Data Acquisition (SCADA) systems have been widely used in industry applications. Due to their application specific nature, most SCADA systems are heavily tailored to their specific applications. Here in this paper an Internet based SCADA (Supervisory Control And Data Acquisition) system is presented. Using the Internet makes it simple to use standard Web browsers for data p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximation of the Node-Pair Reliability of Data Communication Networks

    Publication Year: 2010, Page(s):5 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Data communication networks are often analyzed for the estimation of their dependability and one of the most requirements is to calculate the reliability of the nodes. Since the time complexity of the reliability calculation algorithms is O(n<sup>2</sup>), this paper proposes a linear-time approximation technique to identify lower reliable node-pairs without calculation of the actual r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biotechnology Virtual Labs - Integrating Wet-lab Techniques and Theoretical Learning for Enhanced Learning at Universities

    Publication Year: 2010, Page(s):10 - 14
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    For enhanced education at the level of University courses such as those in biology or biotechnology, one of the key elements is the need of time and expertise to allow the student to familiarize laboratory techniques in par with regular theory. The Sakshat Amrita virtual biotechnology lab project focusing on virtualizing wet-lab techniques and integrating the learning experience has added a new di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random Access OFDMA Network with Dynamic Resource Allocation

    Publication Year: 2010, Page(s):15 - 19
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    In this paper we investigate the optimum power allocation in a random access wireless orthogonal frequency division multiple access (OFDMA) communication system with multiple source and multiple destination nodes. The multiple sources in the system each transmits information to multiple destinations at a fixed signal to noise ratio (SNR) target and cooperates via an orthogonal amplify and forward ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Load Balancing Algorithms in a Grid

    Publication Year: 2010, Page(s):20 - 23
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The ever changing demands on the computational resources have generated the need for solutions that are more flexible. Using a ¿bigger box¿ that has more and faster processors and permanent storage or more random access memory (RAM) is not a viable solution as the system usage patterns vary. A grid based distributed system can solve this problem by allowing multiple independent jobs to run over a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of Relational Algebra Interpreter Using Another Query Language

    Publication Year: 2010, Page(s):24 - 28
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Relational database systems have succeeded commercially because of their straightforwardness and well-built theoretical foundation. This paper ¿Implementation of Relational Algebra Interpreter using another query language¿ has been designed, implemented and tested in such a way so that queries written in relational algebra can be compiled into SQL and executed on a relational database system. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Algorithms in FCIM

    Publication Year: 2010, Page(s):29 - 33
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Frequent closed itemsets (FCI) is a condensed representation method for frequent item-sets. FCI reduces the redundant rules and increases the performance of mining. In recent years, a large number of algorithms have been proposed about frequent closed itemsets mining due to the importance of them In this paper, we generally review and compare the most important FCI algorithms with each other. Resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TC-GXML - A Transcoder for HTML to XML Grammar

    Publication Year: 2010, Page(s):34 - 38
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (873 KB) | HTML iconHTML

    This paper discusses a transcoder, TC-GXML, designed and developed by us as a part of an ongoing research project related to design and development of a speech based webbrowsing system for visually challenged. It is always easier to develop a visual application than a nonvisual application based on speech interface. There are issues like Non-Standard format of HTML, due to which it is difficult fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DWT Based Approach for Steganography Using Biometrics

    Publication Year: 2010, Page(s):39 - 43
    Cited by:  Papers (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Detected Deadlock Views of Distributed Database

    Publication Year: 2010, Page(s):44 - 48
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Deadlock is one of the most serious problems in multitasking concurrent programming systems. The deadlock problem becomes further complicated when the underlying system is distributed and when tasks have timing constraints. Deadlock detection and optimization is very difficult in a distributed database system because no controller has complete and current information about the system and data depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving Location Privacy in Peer-to-Peer Environments

    Publication Year: 2010, Page(s):49 - 53
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    In modern age portable handheld devices are changing the norms of traditional communication structure by introducing mobility and dynamism. In general when a mobile client wants services from a database server, the client has to continuously report its location to the server. With untrustworthy servers, location-based services (LBS) may pose a major privacy threat on its users. In this paper, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binary Classification Using Linear SVM Pyramidal Tree

    Publication Year: 2010, Page(s):54 - 58
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    This paper presents a linear SVM (Support Vector Machine) Pyramidal Tree (SVMPT) for binary classification tasks. SVMPT is a modified version of SVM based Tree Type Neural Networks (SVMTNN), reported earlier in the literature [1]. Both the algorithms use parameter-less SVM proposed by Mangasarian [2] for learning in each node. While SVMTNN insists on 100 percent training accuracy, linear SVMPT use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Structural Similarity with High Distinguishability

    Publication Year: 2010, Page(s):59 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Objective assessment of image quality is important for a number of image processing applications. Compare to the other existing algorithms, the greatest advantage of the structural similarity (SSIM) metric is that the algorithm is based on the structural distortion of image and highly matches human subjectivity. By deeply studying the SSIM, we find it difficult to locate the detailed part of an im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Data Mining in Predicting Cell Phones Subscribers Behavior Employing the Contact Pattern

    Publication Year: 2010, Page(s):63 - 68
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Following telecommunication services becoming competitive, client contract management in this sector has again much importance. Regarding the fact that a huge volume of telecommunication data especially details of the cell phone conversations exist, and they are practically not used, employment of data mining techniques on such data lead to exploring the hidden knowledge in them on the subscriber'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Fault Tree Based Complex Electronic Device Fault Diagnosis Expert System

    Publication Year: 2010, Page(s):69 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    Quick and accurate diagnosis and maintenance on complex electronic devices important issue that needs to be resolved urgently. Based on the construction of some type complex electronic device fault tree model and calculation methods of minimal cut sets importance degree and top event probability, the paper introduced fault tree into fault diagnosis expert system and solved key issues related to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Storage Architecture for Optimal Business Continuity

    Publication Year: 2010, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which shall ensure negligible data loss and quick recovery. The solution makes use of IP SAN, which are used for data management without burdening the application server, as well as replication techniques to replicate data to remote disaster recovery site. We have presented the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Learning Algorithm for Threshold of Decision Probability on Imbalanced Text Classification Based on Protein-Protein Interaction Documents

    Publication Year: 2010, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    The study of host pathogen protein-protein interactions (PPIs) is essential to understand the disease-causing mechanisms of human pathogens. A large number of scientific findings about PPIs are generated in the biomedical literatures. Building a document classification system can accelerate the process of mining and curation of PPI knowledge. With more and more imbalanced dataset appearing, how to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.