1,766 Result(s)
-
Chapter and Conference Paper
GemCode: An expert system generating mnemonic codes for data elements and data items
Databases are a widely prevalent technology in today's industries and are not without problems. One of the major problems in managing data has been the problem of synonyms and various ways of abbreviating data...
-
Chapter and Conference Paper
Design and analysis of a grouped swee** scheme for multimedia storage management
This paper presents an efficient grouped swee** scheme (GSS) for disk scheduling to support multimedia applications. The GSS scheme provides a formulation for balancing the two conflicting requirements: on t...
-
Chapter and Conference Paper
Analysis of binary relationships within ternary relationships in ER modeling
In this paper, we discuss which binary relationship cardinalities are permitted within ternary relationships, during ER modeling. We develop an implicit Binary Cardinality (IBC) rule, which states that, in any...
-
Chapter and Conference Paper
Binary representation of ternary relationships in ER conceptual modeling
Our paper seeks to provide an analysis of ternary relationship logic with an objective of identifying whether they can be decomposed given only the constructs and constraints provided during conceptual entity ...
-
Chapter and Conference Paper
Automated Instructional Design Advising
This chapter describes two different approaches to simplifying the complexities of courseware design. The first approach is called the Guided Approach to Instructional Design Advising (GAIDA). GAIDA provides g...
-
Chapter and Conference Paper
A High-Performance Spatial Storage System Based on Main-Memory Database Architecture
Newly emerging spatial applications such as the intelligent transportation system require high-performance access to databases. Although research prototypes and spatial extensions on top of commercial DBMSs ha...
-
Chapter and Conference Paper
Data Warehouse Design for E-Commerce Environments
Data warehousing and electronic commerce are two of the most rapidly expanding fields in recent information technologies. In this paper, we discuss the design of data warehouses for e-commerce environments. We...
-
Chapter and Conference Paper
A Taxonomy of Recursive Relationships and Their Structural Validity in ER Modeling
In this paper, we present the complete classification of recursive relationships and the criteria that contribute to the structural validity of modeling recursive relationships within the entity-relationship (...
-
Chapter and Conference Paper
Digital Sound Watermarks Based on Improved Sinusoidal Analysis/Synthesis Model
In this paper, a simple and efficient algorithm for designing digital sound watermark is presented. The main idea is by hiding the secret information in the amplitude of a certain frequency under 20Hz. This ap...
-
Chapter and Conference Paper
An Integrated Classification Rule Management System for Data Mining
Classification rule mining plays significant roles in practical applications. While how to mine classification rules from a database efficiently is an important issue, how to manage and apply the mined rules e...
-
Chapter and Conference Paper
Constructing a Data Map of Korea Telecom
Successful business marketing depends on how the information to be maintained, integrated, and extracted from the large scale of data systems. Though CRM, SCM, and ERP are the representative efforts to make re...
-
Chapter and Conference Paper
An Efficient High-Dimensional Index Structure Using Cell Signatures for Similarity Search
In this paper, we propose an efficient high-dimensional index structure using cell signatures for similarity search in multimedia database applications. Our index structure partitions a high-dimensional featur...
-
Chapter and Conference Paper
A Fast Descriptor Matching Algorithm for Exhaustive Search in Large Databases
In order to find the best match to a query image in a database, conventional content-based image retrieval schemes need the exhaustive search, where the descriptor of the query, e.g., histogram, must be compar...
-
Chapter and Conference Paper
Hashing Moving Objects
In many real-life applications, objects need to be both spatially and temporally referenced.With the advancements of wireless communication and positioning technologies, the demand for storing and indexing mov...
-
Chapter and Conference Paper
A QoS Negotiation Scheme for Efficient Failure Recovery in Multi-resolution Video Servers
In this paper, we present a Quality of Service (QoS) negotiation scheme for efficient failure recovery in multi-resolution video servers with disk arrays. This scheme exploits multi-resolution property of vide...
-
Chapter and Conference Paper
Develo** Sequence Diagrams in UML
The UML (Unified Modeling Language) has been widely accepted as a standard language for object-oriented analysis and design. Among the UML diagrams, one of the most difficult and time-consuming diagrams to dev...
-
Chapter and Conference Paper
Three Novel Models of Threshold Estimator for Wavelet Coefficients
The soft-thresholding and the hard-thresholding method to estimate wavelet coefficients in wavelet threshold denoising are firstly discussed. To avoid the discontinuity in the hard-thresholding and biased esti...
-
Chapter and Conference Paper
Image-Feature Based Second Generation Watermarking in Wavelet Domain
An image-feature based second generation watermarking scheme is proposed in this paper. A host image is firstly transformed into wavelet coefficients and features are extracted from the lowest approximation. T...
-
Chapter and Conference Paper
An Application of Extended Simulated Annealing Algorithm to Generate the Learning Data Set for Speech Recognition System
In this paper, we suggest a method of data extraction for constructing the speech recognition system. The proposed algorithm is based on the Extended Simulated Annealing(ESA) algorithm. We have used Korean tex...
-
Chapter and Conference Paper
Digital Watermarking for Forgery Detection in Printed Materials
Forgery prevention and detection are of great social importance.This paper attempts to apply digital watermarking into forgery prevention.To embed a watermark,the wavelet transformation is first applied to the...