7 research outputs found

    Deriving Conceptual Schema from XML Databases

    Get PDF
    In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of integrity constraints that have gained fundamental importance in relational database design. MAR is a class of patterns which has been studied rigorously in data mining. We employ MAR to mine the interesting rules from XML Databases. The mined interesting rules are considered as candidate FDs whose all confidence itemsets are 100%. To prune the weak rules, we pay attention to support and correlation itemsets. The final strong rules are used to generate an Object-Role Model conceptual schema diagram

    Sejauh mana komitmen pihak industri terhadap program latihan industri pelajar KUiTTHO

    Get PDF
    Program latihan industri merupakan satu komponen penting dalam pendidikan teknik dan vokasional bagi melahirkan tenaga kerja mahir dan separuh mahir yang terlatih dan berwibawa. Kajian Sejauh Mana Komitmen Pihak Industri Terhadap Program Latihan Industri Pelajar KUiTTHO adalah bertujuan untuk meninjau sejauh mana kerjasama dan komitmen yang diberikan oleh pihak industri terhadap program latiban industri pelajar KUiTTHO. Ini kerana tanpa komitmen dan kerjasama dari pihak industri program latihan industri tidak akan mencapai matlamatnya. Instrumen yang digunakan dalam kajian ini ialah borang soal selidik yang diedarkan kepada 4 buah kilang iaitu Fujitsu Component (M) Sdn. Bhd., Sharp Manufacturing Corporation (M) Sdn. Bhd., Matromatic Handling Systems (M) Sdn. Bhd. dan B.P Plastics Sdn. Bhd. dan 80 orang pelajar tahun akhir Ijazah Sarjana Muda Kejuruteraan Elektrik (Pengalatan dan Kawalan) yang telah menjalani Latihan Industri. Perisian SPSS digunakan dalam pemprosesan dan penganalisaan data bagi memperolehi kekerapan dan skor min. Hasil kajian ini mendapati bahawa komitmen yang diberikan oleh pihak industri adalah tinggi. Namun begitu terdapat beberapa aspek yang perlu diberi perhatian terutamanya dari segi kemudahan kepada pelajar dan komitmen pelajar terhadap program latihan industri itu sendir

    Botnet Reverse Engineering and Call Sequence Recovery

    Get PDF
    The focus on computer security has increased due to the ubiquitous use of Internet. Criminals mistreat the anonymous and insidious traits of Internet to commit monetary online fraud, theft and extortion. Botnets are the prominent vehicle for committing online crimes. They provide platform for a botmaster to control a large group of infected Internetconnected computers. Botmaster exploits this large group of connected computers to send spam, commit click fraud, install adware/spyware, flood specific network from distributed locations, host phishing sites and steal personal credentials. All these activities pose serious threat for individuals and organizations. Furthermore, the situation demands more attention since the research and the development of underground criminal industry is faster than security research industry. To cope up against the ever growing botnet threats, security researchers as well as Internet-users need cognizance on the recent trends and techniques of botnets. In this thesis, we analyze in-depth by reverse engineering two prominent botnets namely, Mariposa and Zeus. The findings of the analysis may foster the knowledge of security researchers in multiple dimensions to deal with the botnet issue.To enhance the abstraction and visualization techniques of reverse engineering, we develop a tool which is used for detailed outlook of call sequences

    Reverse engineering XML documents into DTD Graph with SAX

    No full text
    Abstract:- We propose a systematic approach to reverse engineer arbitrary XML documents to their conceptual schema, DTD Graphs. The necessity for doing so is due to the fact that XML documents are frequently used for storing structured data and their schemas, such as in Document Type Definition (DTD) format, are missing, especially for those existing historical XML documents. As such, it is difficult for software developers or end users to make use of them. Even the schemas exist, they are difficult to read and undetermined of the underlying relationships among the elements in the documents. In view of this, it is necessary to determine the data semantics from the XML documents. If the DTDs of the XML documents exist with the identifications of the ID/IDREF(S) type attributes, then more data semantics can be derived. Another application of the determined data semantics is to verify the linkages implemented by ID/IDREF(S). If the element is referring to an incorrect XML element type, an extra data semantic will be determined as a result, and such findings can be used for verification purposes. Furthermore, the approaches proposed in this paper use Simple API for XML (SAX) so that the algorithms are applicable to small to huge sized XML documents. Key-Words:- XML document, DTD Graph, reverse engineering, data semantics, ID/IDREF(S), cardinality, SA

    An overview of research on reverse engineering XML schemas into UML diagrams

    Full text link
    Extensible Markup Language (XML) has become a standardfor data representation and exchange over the Internet. XML schemas are often used to define vocabularies of XML document types and to validate whether the XML documents adhere to the rules defined i
    corecore