Computer Science ›› 2018, Vol. 45 ›› Issue (4): 169-172.doi: 10.11896/j.issn.1002-137X.2018.04.028

Previous Articles     Next Articles

Study on Data Quality Based on Constraint in Computer Forensics

LIU Qin   

  • Online:2018-04-15 Published:2018-05-11

Abstract: To find clues and improve the quality of data,this paper proposed a data repairing algorithm based on constraint in the field of computer forensics.First,using the equivalence class,the algorithm initializes the data according to different constraints.Second,it repaires the problem data found in the initialization phase and gets different values according to the type of constraint.Third,the repaired collections are regenerated according to function dependence set and other constraint sets.If the problem data still exist,the algorithm continues to repair until there is no problem so far.Experiment proves the validity and high efficiency of the proposed method.

Key words: Computer forensics,Data repair,Functional dependency,Algorithm

[1] PIPINO L,YANG W,RICHARD Y.Data quality assessment[J].Communication of the ACM,2002,5(4):211-218.
[2] LIANG J S,LI T Y,WANG H X,et al.Research on Data Qua-lity Assessment Algorithm Based on Constraint[J].Science Technology and Engineering,2012,3(12):551-554.(in Chinese) 梁吉胜,李天阳,王惠霞,等.基于约束的数据质量评估算法研究[J].科学技术与工程,2012,3(12):551-554.
[3] KOLAHI S,LAKSHMANAN L V S.On approximating opti-mum repairs for functional dependency violations[C]∥Proc of ICDT.Petersburg,Russia:ACM Press,2009.
[4] CHIANG F,MILLER R J.A unified model for data and con-straint repair[C]∥Proceedings of the ICDE.Iscataway,NJ:IEEE Computer Society,2011.
[5] BOHANNON P,FLASTER M,FAN W F,et al.A cost-based model and effective heuristic for repairing constraints by value modicfication[C]∥Proceedings of the SIGMOD.New York:ACM Press,2005:143-154.
[6] JIN C Q,LIU H P,ZHOU A Y.Functional Dependency and Conditional Constraint Based Data Repari[J].Journal of Software,2016,7(7):1671-1684.(in Chinese) 金澈清,刘辉平,周傲英.基于函数依赖与条件约束的数据修复方法[J].软件学报,2016,7(7):1671-1684.
[7] BEKALES G,ILYAS I F,GOLAB L.Sampling the repairs offunctional dependency violations under hard constraints[C]∥Proceedings of the VLDB.Singapore:VLDB Endowment,2010:197-207.
[8] BESKALES G,ILYAS I F,GOLAB L,et al.Sampling from repairs of conditional functional dependency viloations[J].VLDB Journal,2014,3(1):103-128.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .