Volume-9 ~ Issue-3
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Performance Improvement Techniques for Customized Data Warehouse |
| Country | : | Bangladesh |
| Authors | : | Md. Al Mamun, Md. Humayun Kabir |
| : | 10.9790/0661-0930105 ![]() |
|
Abstract: In this paper, we present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and Online Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning etc. play vital role in efficient memory management. A comparison of data retrieval time for a particular query from a relational database as well as data warehouse database with and without indexing is performed. We show that the application of different database management techniques result faster query execution by reducing data retrieval time. This improved efficiency may increase the efficiency of OLAP operations, which results better data warehouse performance.
Keywords - Data Warehouse, Indexing, OLAP, Partitioning, Querying.
[1] M. Barrena, C. Pachon and E. Jurado, JISBD2007-04: Neighbors search in holey multidimensional spaces, IEEE Latin America
Transactions, Vol. 6, No. 4, Aug. 2008, pages 332-338.
[2] M. J. Suarez-Cabal, C. de la Riva and J. Tuya, JISBD04-Populating Test Databases for Testing SQL Queries, IEEE Latin America
Transactions, Vol. 8, No. 2, April 2010, pages 164-171.
[3] Mafruz Zaman Ashrafi, David Taniar, Kate Smith, ODAM: An Optimized Distributed Association Rule Mining Algorithm, Monash
University, IEEE Distributed Systems Online, IEEE Computer Society, Vol. 5, No. 3; March 2004.
[4] Bernd Reiner, Karl Hahn. Optimized Management of Large-Scale Data Sets Stored on Tertiary Storage System, IEEE Distributed
Systems Online, IEEE Computer Society, Vol. 5, No. 5; May 2004.
[5] S. Repp, A. Gross and C. Meinel, Browsing within Lecture Videos based on the chain index of speech transcription, IEEE
transactions on learning technologies, Vol. 1, Issue 3, 2008, pages 145-156.
[6] M. Al Mamun. Data Warehouse Performance Analysis for Online Analytical Processing, A Thesis Draft submitted for predefense of
MS, Department of Computer Science and Engineering, Jahangirnagar University, Savar, Dhaka-1342.
[7] V. Nebot and R. Berlanga, JISBD02-Populating Data Warehouses with Semantic Data, IEEE Latin America Transactions, Vol. 8,
No. 2, April 2010, pages 150-157.
[8] J.-N. Mazon and J. Trujillo, JISBD2007-02: Model-driven reverse engineering for data warehouse design, IEEE Latin America
Transactions, Vol. 6, No. 4, Aug. 2008, pages 317-323.
[9] E. Soler, J. Trujillo, E. Fernandez-Medina, and M. Piattini, JISBD2007-07: An extension of the relational metamodel of CWM to
represent secure data warehouse at the logical level, IEEE Latin America Transactions, Vol. 6, No. 4, Aug. 2008, pages 355-362.
[10] Morteza Zaker, Somnuk Phon-Amnuaisuk and Su-Cheng Haw, An Adequate Design for Large Datawarehouse systems: Bitmap
indexes versus B-tree index, International Journal of Computers and Communications, Vol. 2, Issue 2, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Handling missing attribute values is the greatest challenging process in data analysis. There are so many approaches that can be adopted to handle the missing attributes. In this paper, a comparative analysis is made of an incomplete dataset for future prediction using rough set approach and random tree generation in data mining. The result of simple classification technique (using random tree classifier) is compared with the result of rough set attribute reduction performed based on Rule induction and decision tree. WEKA (Waikato Environment for Knowledge Analysis), a Data Mining tool and ROSE2 (Rough Set Data Explorer), a Rough Set approach tool have been used for the experiment. The result of the experiment shows that the random tree classification algorithm gives promising results with utmost accuracy and produces best decision rule using decision tree for the original incomplete data or with the missing attribute values (i.e. missing attributes are simply ignored). Whereas in rough set approach, the missing attribute values are filled with the most common values of that attribute domain. This paper brings out a conclusion that the missing data simply ignored yields best decision than filling some data in the place of missing attribute value.
Keywords- Random Tree, WEKA, ROSE2, Missing attribute, Incomplete dataset, Classification, Rule Induction, Decision Tree
[1] Antony Rosewelt and Dr. Sampathkumar Vajeravelu, Mining Software Defects using Random tree, International Journal of
Computer Science & Technology, IJCST Vol. 2, Issue 4, ISSN : 0976-8491(Online) | ISSN : 2229-4333(Print), Oct - Dec 2011.
[2] Frederick Livingston, Implementation of Breiman's Random Forest Machine Learning Algorithm, ECE591Q Machine Learning
Journal Paper, Fall 2005.
[3] Grzymala-Busse, J.W. and Hu, M., A comparison of several approaches to missing attribute values in data mining. Proceedings of
the Second International Conference on Rough Sets and Current Trends in Computing RSCTC-2000, Banff, Canada, October 16–19,
2000, 340–347.
[4] Grzymala-Busse, J.W., Rough set strategies to data with missing attribute values, Workshop Notes, Foundations and New Directions
of Data Mining, The 3rd International Conference on Data Mining, Melbourne, FL, USA, November 19–22, 2003, 56–63.
[5] Hongyi Peng and Siming Zhu, Handling of incomplete data sets using ICA and SOM in data mining, Received: 2 September 2005 /
Accepted: 24 April 2006 / Published online: 30 May 2006, Springer-Verlag London Limited 2006.
[6] http://idss.cs.put.poznan.pl/site/rose.html.
[7] J. Han and M. Kamber, Data Mining: Concepts and Techniques (Morgan Kaufmann, 2000).
[8] Jerzy W. Grzymala-Busse and Sachin Siddhaye, Rough Set Approaches to Rule Induction from Incomplete Data, Proceedings of the
IPMU'2004, the 10th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based
Systems, Perugia, Italy, July 4–9, 2004, vol. 2, 923–930.
[9] Kash Barker et al, Learning From Student Data, Proceedings of the 2004 Systems and Information Engineering Design
Symposium, Mathew H. Jones, Stephen D. Patek, and Barbara E. Towney eds. 2004. pp79-86.
[10] Marzena Kryszkiewicz, Rules in incomplete Information Systems, Information Science 113(1999), 271-292.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Execution of Critical Application in Corrupted Environment Using Vmm |
| Country | : | India |
| Authors | : | S.Valarmathi, Mr.S.Sathishkumar |
| : | 10.9790/0661-0931115 ![]() |
|
Abstract: A resilient execution environment can be developed for a critical application even in the presence of corrupted OS kernel. The attacker tries to capture the application content by corrupting the OS when an application is executing. In previous case the attacker corrupts the OS by injecting code then the application terminates immediately without executing it. In this current system even in the presence of corruption the application is executed with out any interception and it provide a resilient authenticated execution of critical application in entrusted environment by using Virtual Machine Monitor (VMM). VMM is a monitoring technique to monitor all the activities during execution and it is one of the online based recovery schemes to identify any such corruption. It repairs the memory corruption and allows the process for normal execution. VMM solutions generally broadcast into two categories they are memory authentication and memory duplication. Memory authentication is to check the integrity of an application and memory duplication is to rectify the corruption. The proposed system is applied for military application, hospitals, and colleges and for all critical applications. Keywords- Memory corruption, operating systems, security, Virtual machine monitors (VMM).
[1] Azab.A.M,Ning.P,Wang.Z,Jiang.X,Zhang.X and Skalsky.N.C, "Hypersentry: Enabling Stealthy In-Context Measurement of
Hypervisor Integrity," Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 38-49, 2010.
[2] Huang.R,Deng.D.Y and Suh.G.E, "Orthrus: Efficient SoftwareIntegrity Protection on Multi -Cores," Proc. Architectural Support for
Programming Languages and Operating Systems (ASPLOS), pp. 371-384, 2010.
[3] Kirkpatrick.M.S,Ghinita.G and Bertino.E,"Resilient Authenticated Execution of Critical Applications in Untrusted
Environments,"IEEETransation on dependable and secure computing,july/august 2012.
[4] Litty.L,Lagar-Cavilla.H.A and Lie.D,"Hypervisor Support for Identifying Covertly Executing Binaries," Proc.17th USENIX Conf.
SecuritySymp., pp.243-258,2008.
[5] Piromsopa.K and Enbody.R.J,"SecureBit:Transparent,Hardware Buffer Overflow Protection," IEEE Trans.Dependable and Secure
Computing, vol.3,no.4,pp.365-376,Oct.-Dec.2006.
[6] Rhee.J,Riley.R,Xu.D and Jiang.X,s"Defeating Dynamic Data Kernel RootkitAttacks via VMM-Based Guest-Transparent Monitoring," Proc.Fifth Int'l Conf.Availability,Reliability and Security(ARES), 2009.
[7] Riley.R,Jiang.X and Xu.D, "Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing," Proc.11th Int'l
Symp. Recent Advances in Intrusion Detection (RAID),pp. 1-20, 2008.
[8] Rinard.M,Cadar.C,Dumitran.D,Roy.D.M,Leu.T and Beebee.W.S,"Enhancing Server Availability and Security Through Failure-
Oblivious Computing," Proc. Sixth Conf. Symp. Operating Systems Design and Implementation (OSDI), pp. 21 -21, 2004.
[9] Salamat.B, Gal.A, Jackson.T, Manivannan.K, Wagner.G, and Franz.M, "Multi-Variant Program Execution: Using Multi-Core
Systems to Defuse Buffer-Overflow Vulnerabilities," Proc. Int'l Conf. Complex, Intelligent and Software Intensive Systems, pp. 843 -
848, 2008.
[10] Salamat.B,Jackson.T,Gal.A and Franz.M, "Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program
Variants in User-Space," Proc. Fourth ACM European Conf.Computer Systems (Eurosys), pp. 33 -46, 2009.
