Volume 2 Number 1 February 2011


Web Visualization System for Monitoring e-Government Web Pages

Ho Si Meng, Simon Fong

https://doi.org/

Abstract Recently the reliability and dependability of the e-Government web pages is increasing as they not only provide news but also offer online services. is responsible to provide news, information and services to citizens, merchants and tourists in a reliable way. earlier we proposed a Web Monitoring System (WMS) that monitors the performance of a web portal in realtime [1] and... Read More


Hierarchical Clustering Model for Automatic OLAP Schema Generation

Muhammad Usman, Sohail Asghar, Simon Fong

https://doi.org/

Abstract The concept is viewed as an automated application of algorithms to discover hidden patterns and to extract knowledge from data. For querying huge datasets in interactive way, the Online Analytical Processing (OLAP) systems, are used. These OLAP systems are the predominant front-end tools used in data warehousing environments and the OLAP system’s market has developed rapidly during the last few... Read More


Enhanced Audio Watermarking Algorithm using Discrete Wavelets Transform and Singular Value Decomposition

Ali Al-Haj, Christina Twal, Ahmad Mohammad

https://doi.org/

Abstract Audio watermarking is gaiing momentum in the recent years to embed copyright information in audio signals as a proof of their ownership. The significance of audio watermarking has enabled to protect the illegal manipulation of genuine audio sources. An efficient and scalable audio watermarking algorithm is designed and proposed in this study. The discrete wavelets transform (DWT) and the singular... Read More


Formal Contextual Security Model for Pervasive Computing Applications

Yehia ElRakaiby, Frederic Cuppens, Nora Cuppens-Boulahia

https://doi.org/

Abstract In this paper, we present a formal contextual security model for pervasive computing applications. This model is developed by addressing the required featurs such as - support of authorization and obligation policies, monitoring and dynamic revocation of access rights, support of personalized security rule contexts, and support of collaborative applications. Besides we design the model in a way to be... Read More


Level wise Search Algorithm Based on Action and Non-Action Type Data to Find Irregular Association Rules

Razan Paul, Abu Sayed Md. Latiful Hoque

https://doi.org/

Abstract Conventional positive association rules are frequently occuring patterns. The patterns represent what decisions are routinely made based on a set of facts. Irregular association rules are the patterns that represent what decisions are rarely made based on the same set of facts. The application domains by nature require the irregular association rules and hence we developed a level wise search... Read More