5 research outputs found
HEURISTIC ALGORITHM FOR FRAGMENTATION AND ALLOCATION IN DISTRIBUTED OBJECT ORIENTED DATABASE
Class fragmentation and allocation is an important technique to improve the performance of a distributed object oriented database system. The class fragmentation is to split a class into smaller pieces in distributed databases aims to reduce the access to unnecessary data, the allocation is to locate fragmented classes into the sites in the connected network properly to reduce the cost of data transmission. Classes in object databases include attributes describing the characteristics of the object, methods describing the behavior, and relationships with objects with other classes, including relations inheritance. With such characteristics, class fragmentation and allocation in the distributed object oriented database system is more complex than fragmentation technique and design of relational databases. Fragmentation techniques applied in the design of distributed object-oriented database today often do not use cost between the sites, fragments are allocated to the site after getting a fragmentation method of data objects. This paper proposes an algorithm of fragmentation and allocation simultaneously, including the cost of data communication between the sites used for fragmentation to reduce communication costs when processing and querying distributed data
THUẬT TOÁN PHÂN MẢNH DỌC VÀ CẤP PHÁT TRONG CƠ SỞ DỮ LIỆU HƯỚNG ĐỐI TƯỢNG PHÂN TÁN
Các hệ thống thông tin ngày nay thường được yêu cầu xây dựng dựa trên những kiến trúc hướng đối tượng và phân tán trên mạng, bao gồm từ nhiều cơ sở tính toán đa dạng, không thuần nhất. Trong các môi trường như thế, hệ thống có sở dữ liệu hướng đối tượng phân tán cung cấp những cơ chế rất tin cậy và hiệu quả để tổ chức lưu trữ, xử lý và truy vấn khối lượng rất lớn các đối tượng khác nhau. Với các đặc tính cơ bản của hướng đối tượng như đóng gói, kế thừa, phân cấp lớp, bài toán thiết kế trong cơ sở dữ liệu hướng đối tượng phân tán phát sinh thêm nhiều vấn đề phức tạp so với bài toán thiết kế trong cơ sở dữ liệu quan hệ. Thiết kế trong cơ sở dữ liệu hướng đối tượng phân tán được chia thành hai giai đoạn: Phân mảnh lớp đối tượng và cấp phát lớp. Mục tiêu của phân mảnh và cấp phát là nâng cao hiệu năng xử lý và giảm việc truyền dữ liệu. Thông thường hai giai đoạn này là tách biệt, phân mảnh xong mới thực hiện cấp phát. Bài báo này đề cập tới một thuật toán trong đó việc phân mảnh và cấp phát trong cơ sở dữ liệu hướng đối tượng phân tán được thực hiện đồng thời, đối với trường hợp các thuộc tính và phương thức đều thuộc loại đơn giản
Biometric Systems
Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study
A tree grammar-based visual password scheme
A thesis submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy. Johannesburg, August 31, 2015.Visual password schemes can be considered as an alternative to alphanumeric
passwords. Studies have shown that alphanumeric passwords
can, amongst others, be eavesdropped, shoulder surfed, or
guessed, and are susceptible to brute force automated attacks. Visual
password schemes use images, in place of alphanumeric characters,
for authentication. For example, users of visual password schemes either
select images (Cognometric) or points on an image (Locimetric)
or attempt to redraw their password image (Drawmetric), in order
to gain authentication. Visual passwords are limited by the so-called
password space, i.e., by the size of the alphabet from which users can
draw to create a password and by susceptibility to stealing of passimages
by someone looking over your shoulders, referred to as shoulder
surfing in the literature. The use of automatically generated highly
similar abstract images defeats shoulder surfing and means that an almost
unlimited pool of images is available for use in a visual password
scheme, thus also overcoming the issue of limited potential password
space.
This research investigated visual password schemes. In particular,
this study looked at the possibility of using tree picture grammars to
generate abstract graphics for use in a visual password scheme. In this
work, we also took a look at how humans determine similarity of abstract
computer generated images, referred to as perceptual similarity
in the literature. We drew on the psychological idea of similarity and
matched that as closely as possible with a mathematical measure of
image similarity, using Content Based Image Retrieval (CBIR) and
tree edit distance measures. To this end, an online similarity survey
was conducted with respondents ordering answer images in order
of similarity to question images, involving 661 respondents and 50
images. The survey images were also compared with eight, state of
the art, computer based similarity measures to determine how closely
they model perceptual similarity. Since all the images were generated
with tree grammars, the most popular measure of tree similarity, the
tree edit distance, was also used to compare the images. Eight different
types of tree edit distance measures were used in order to cover
the broad range of tree edit distance and tree edit distance approximation
methods. All the computer based similarity methods were
then correlated with the online similarity survey results, to determine
which ones more closely model perceptual similarity. The results were
then analysed in the light of some modern psychological theories of
perceptual similarity.
This work represents a novel approach to the Passfaces type of visual
password schemes using dynamically generated pass-images and their
highly similar distractors, instead of static pictures stored in an online
database. The results of the online survey were then accurately
modelled using the most suitable tree edit distance measure, in order
to automate the determination of similarity of our generated distractor
images. The information gathered from our various experiments
was then used in the design of a prototype visual password scheme.
The generated images were similar, but not identical, in order to defeat
shoulder surfing. This approach overcomes the following problems
with this category of visual password schemes: shoulder surfing,
bias in image selection, selection of easy to guess pictures and infrastructural
limitations like large picture databases, network speed and
database security issues. The resulting prototype developed is highly
secure, resilient to shoulder surfing and easy for humans to use, and
overcomes the aforementioned limitations in this category of visual
password schemes