{"title":"GN-DTD: Graphical Notations for Describing XML Documents","authors":"Z. Zainol, Bing Wang","doi":"10.1109/DBKDA.2010.29","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.29","url":null,"abstract":"This paper presents a graphical approach to model XML documents based on a Data Type Documentation called Graphical Notations-Data Type Documentation (GN-DTD). GN-DTD allows us to capture syntax and semantic of XML documents in a simple way but precise. Using various notations, the important features of XML documents such as elements, attributes, relationship, hierarchical structure, cardinality, sequence and disjunction between elements or attribute are visualize clearly at the schema level. We believe, by having GN-DTD as tool, helps the user to arrange the content of XML documents in order to give a better undertanding of DTD structures, to improve XML design and normalization process. In this paper we presented also the transformation rules to convert from GN-DTD to DTD.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank","authors":"Nhien-An Le-Khac, S. Markos, Mohand Tahar Kechadi","doi":"10.1109/DBKDA.2010.27","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.27","url":null,"abstract":"Today, money laundering poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché, of drug trafficking to financing terrorism and surely not forgetting personal gain. Most international financial institutions have been implementing anti-money laundering solutions to fight investment fraud. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting money laundering activities. Within the scope of a collaboration project for the purpose of developing a new solution for the anti-money laundering Units in an international investment bank, we proposed a simple and efficient data mining-based solution for anti-money laundering. In this paper, we present this solution developed as a tool and show some preliminary experiment results with real transaction datasets.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. B. Viana, Thiago Vinicius Freire de Araujo Ribeiro, Glêdson Elias da Silveira
{"title":"Indexing Semi-structured Data for Efficient Handling of Branching Path Expressions","authors":"T. B. Viana, Thiago Vinicius Freire de Araujo Ribeiro, Glêdson Elias da Silveira","doi":"10.1109/DBKDA.2010.15","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.15","url":null,"abstract":"One of the major challenges in development of indexing techniques for semi-structured data is related to how to index the data structural properties. The main issue is how to efficiently handle branching path expressions without suffering from undesired growth of query processing costs and index file sizes. Several proposals for indexing semi-structured data can be found in the literature. However, in order to reduce index file sizes, most of them do not index or handle branching path expressions. Considering those ones that do that, they usually suffer from high query processing costs and large index file sizes. In such a context, this paper proposes a path-based indexing technique for semi-structured data, which deals with a well-defined class of branching path expressions. As evinced by experimental evaluation, the adoption of the proposed technique results in excellent query processing time and generates index file sizes close to data input file sizes.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Class-Based Reasoning to Improve the Accuracy of Symbolic Rules in a Hybrid Possibilistic Approach","authors":"Myriam Bounhas, K. Mellouli","doi":"10.1109/DBKDA.2010.39","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.39","url":null,"abstract":"A common strategy used in rule inductive algorithms is to assign an unseen example, not covered by any rule, to a static default class fixed at the inductive time and not updated thereafter. This paper presents a rule-based system using a Hybrid Possibilistic Inference Mechanism, which combines a Possibilistic Rule-based with a Class-based Reasoning. The inference process gives pre-eminence to Possibilistic Rule-based Reasoning, which selects the most suitable rule used to reach a conclusion in response to input facts. The proposed approach encodes relationship dependencies existing between facts and rules through Possibilistic Networks and quantifies these relationships by means of two measures: possibility and necessity. If the Possibilistic Rule-based Reasoning is blocked due the lack of satisfied rules, the Hybrid Possibilistic Inference Mechanism favours the Possibilistic Class-based Reasoning, which is the main contribution of this paper as it dynamically assigns a default class to each specific fact base not covered by any rule. To do so, we use a possibilistic network which searches for the most plausible class by quantifying relationship between facts and classes through a distance measure. Experimentation results demonstrate that the hybrid approach leads to accuracy improvement of the system.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Mouza, Elisabeth Métais, Nadira Lammari, J. Akoka, T. Aubonnet, I. Comyn-Wattiau, Hammou Fadili, S. Cherfi
{"title":"Towards an Automatic Detection of Sensitive Information in a Database","authors":"C. Mouza, Elisabeth Métais, Nadira Lammari, J. Akoka, T. Aubonnet, I. Comyn-Wattiau, Hammou Fadili, S. Cherfi","doi":"10.1109/DBKDA.2010.17","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.17","url":null,"abstract":"In order to validate user requirements, tests are often conducted on real data. However, developments and tests are more and more outsourced, leading companies to provide external staff with real confidential data. A solution to this problem is known as Data Scrambling. Many algorithms aim at smartly replacing true data by false but realistic ones. However, nothing has been developed to automate the crucial task of the detection of the data to be scrambled. In this paper we propose an innovative approach - and its implementation as an expert system - to achieve the automatic detection of the candidate attributes for scrambling. Our approach is mainly based on semantic rules that determine which concepts have to be scrambled, and on a linguistic component that retrieves the attributes that semantically correspond to these concepts. Since attributes can not be considered independently from each other we also address the challenging problem of the propagation of the scrambling among the whole database. An important contribution of our approach is to provide a semantic modelling of sensitive data. This knowledge is made available through production rules, operationalizing the sensitive data detection","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126712226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pooya Monshizadeh Naini, S. M. Fakhraie, A. Avanaki
{"title":"Sudoku Bit Arrangement for Combined Demosaicking and Watermarking in Digital Camera","authors":"Pooya Monshizadeh Naini, S. M. Fakhraie, A. Avanaki","doi":"10.1109/DBKDA.2010.43","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.43","url":null,"abstract":"In this paper, an enhanced combined demosaicking and watermarking (CDW) method is proposed. Such a combination leads to lower power and time consumption comparing with being performed separately. In the proposed method, bits are arranged in a special order employing a Sudoku pattern. Results indicate that this arrangement increases robustness against JPEG compression attack.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"97 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyoung-Sook Kim, K. Zettsu, Y. Kidawara, Y. Kiyoki
{"title":"Phenomena-Based Management of Geotime-Tagged Contents on the Web","authors":"Kyoung-Sook Kim, K. Zettsu, Y. Kidawara, Y. Kiyoki","doi":"10.1109/DBKDA.2010.38","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.38","url":null,"abstract":"Recently, Geoweb services help people easily create and share geo-spatiotemporal contents through Internet. As a result, it becomes an emerging issue to manage Geoweb contents in exploding lots of spatiotemporal information and to obtain comprehensive knowledge about the real world using web contents. This paper proposes a novel approach for managing geotime-tagged contents on the basis of moving phenomena, such as typhoons, earthquakes, and flooding. In this study, a moving phenomenon is represented by a predefined three-dimensional object in a spatiotemporal domain with predefined meanings, and we define a phenomena-based predicate template named Relates as a combination of spatial, temporal, and thematic constraints. By using the Relates predicate, we can dynamically aggregate geotime-tagged contents along three aspects: location, time, and topic. Moreover, we present an application of the phenomena-based contents management, called k-Sticker. k-Sticker allows users to find top-k terms related to their own moving phenomenon through a three-dimensional (two spatial dimensions and one temporal dimension) visualization method.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher Ireland, D. Bowers, M. Newton, K. Waugh
{"title":"Exploring the Use of Mixed Abstractions in SQL:1999 - A Framework-Based Approach","authors":"Christopher Ireland, D. Bowers, M. Newton, K. Waugh","doi":"10.1109/DBKDA.2010.13","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.13","url":null,"abstract":"SQL: 1999 introduced the capability to support object concepts. It is now possible to design an SQL database schema using relational and object models. Each model represents a different abstraction. We use a framework to understand the implications of this change and to explore the use of mixed abstractions in an SQL: 1999 schema. We describe two new kinds of schema. We find that current object-relational mapping strategies differ in terms of the kind of database schema they produce from the same class model.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Social Patterns in Mobile Data","authors":"P. Kasarapu, M. Saravanan, G. Prasad","doi":"10.1109/DBKDA.2010.37","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.37","url":null,"abstract":"To compete with other telecom providers, it is important to understand the behavior of the customers and predict their needs. In order to realize this, it is required to explore the customers details based on their mobile usage behavior into social patterns (segments) and target the suitable segments for advertising. In our approach, the usage data of the customers in association with their browsing behavior is used to form the segments considered to be an important addition. From the analysis of their usage rates with respect to a certain domain, the operator can drill down to the sub domain level interests and target them with specific customized services. This can be done by performing latent semantic analysis using Gibbs sampling algorithm and K-Means clustering on the description of their accessed web pages with their usage and spend data. The traditional method involves forming web communities using link based approach. Our method based on identifying social communities could produce an alternative approach for the mobile operators. The usage rates within a certain cluster, and the customers' interest towards a specific domain can help to determine their extent of willingness to spend in specific areas. Our approach produces better results than the traditional methods by enabling the telecom providers to target a specific group of consumers.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Alternative Extension of the FCM Algorithm for Clustering Fuzzy Databases","authors":"A. Touzi","doi":"10.1109/DBKDA.2010.35","DOIUrl":"https://doi.org/10.1109/DBKDA.2010.35","url":null,"abstract":"Several real applications need to manage fuzzy information. Among the languages proposed for this type of data, the Fuzzy SQL (FSQL) language had a great success, seen its great power of modeling and it’s an extension of the well-known SQL language. In this paper, we propose an alternative for FCM algorithm For Fuzzy Database describe with FSQL. The conventional fuzzy clustering algorithms form fuzzy clusters so as to minimize the total distance from cluster centers to data points. However, they cannot be applied in the case where the data vectors are described with FSQL is given. To concretize our approach we used the BDRF described with the GEFRED model, which is supporting the FSQL language.","PeriodicalId":273177,"journal":{"name":"2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications","volume":"303 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114029683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}