Browsing by Discipline
Now showing items 1-17 of 17
-
A classification study of rough sets generalization
(2004)In the development of rough set theory, many different interpretations and formulations have been proposed and studied. One can classify the studies of rough sets into algebraic and constructive approaches. While algebraic ... -
Access control scheme for partially ordered set hierarchy with provable security
(2005)In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ... -
Agent-based workflow model for enterprise collaboration
(2005)Workflow management system supports the automation of business processes where a collection of tasks is organized between participants according to a defined set of rules to accomplish some business goals. The ... -
Building a semantic blog support system for gene Learning Objects on Web 2.0 environment / by Wei Yuan.
(2008)Blogging has become a popular practice on Internet in recent years, and it has been used as information publishing and participate platforms. In recent years, a style of blog called 'semantic blogs' have been introduced ... -
Cache performance of chronological garbage collection
(1999)This thesis presents cache performance analysis of the Chronological Garbage Collection Algorithm used in LVM system. LVM is a new Logic Virtual Machine for Prolog. It adopts one stack policy for all dynamic memory ... -
Database anonymization and protections of sensitive attributes
(2008)The importance of database anonymization has become increasingly critical for organizations that publish their database to the public. Current security measures for anonymization poses different manner of drawbacks. ... -
Designing a secure ubiquitous mammography consultation system
(2004)This thesis attempts to design and develop a prototype for mammography image consultation that can work securely within a ubiquitous environment. Mammogram images differ largely from other type of images and it requires ... -
Developing a generic academia mobile sport messaging system using the notion of design patterns
(2005)Designing reusable applications is vital area of research. Design patterns are an innovative notion that promotes reusability. This thesis attempts to develop generic and reusable Short Messaging Systems that can be used ... -
Indirect key derivation schemes for key management of access hierarchies
(2004)In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ... -
Inference in distributed multiagent reasoning systems in cooperation with artificial neural networks
(2007)This research is motivated by the need to support inference in intelligent decision support systems offered by multi-agent, distributed intelligent systems involving uncertainty. Probabilistic reasoning with graphical ... -
Neighborhood system in concept lattice
(2000)In this thesis, we apply and generalize the notion of neighborhood system from topology to study the relation between the concepts in a concept lattice. We classify all concepts in the concept lattice into various classes ... -
Results on perfect graphs
(2000)The chromatic number of a graph G is the least number of colours that can be assigned to the vertices of G such that two adjacent vertices are assigned different colours. The clique number of a graph G is the size of the ... -
Searching for incomplete self orthogonal latin squares : a targeted and parallel approach
(2003)The primary purpose of this dissertation is in the search for new methods in which to search for Incomplete Self Orthogonal Latin Squares. As such a full understanding of the structures involved must be examined, ... -
Secret sharing for mobile agent cryptography
(2003)A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ... -
The inference problem in multilevel secure databases
(2005)Conventional access control models, such as role-based access control, protect sensitive data from unauthorized disclosure via direct accesses, however, they fail to prevent unauthorized disclosure happening through ... -
Visual cryptography with cheating shares
(2006)Visual cryptography is a technique that applies the human visual system to decode encrypted information, such as text, image and number, without any sophisticated devices and computing capabilities. Therefore, compared ... -
Web services - agent based model for inter-enterprise collaboration
(2004)Web Services technology is an emerging paradigm in establishing a standard environment for legacy applications integration over the Internet. Using Web services and related technologies facilitate the implementation of ...