SlideShare a Scribd company logo
1 of 3
GLOBALSOFT TECHNOLOGIES 
REPENT: Analyzing the Nature of Identifier Renamings 
Abstract 
Source code lexicon plays a paramount role in software quality: poor lexicon can lead to poor 
comprehensibility and even increase software fault-proneness. For this reason, renaming a program 
entity, i.e., altering the entity identifier, is an important activity during software evolution. Developers 
rename when they feel that the name of an entity is not (anymore) consistent with its functionality, or 
when such a name may be misleading. A survey that we performed with 71 developers suggests that 39 
percent perform renaming from a few times per week to almost every day and that 92 percent of the 
participants consider that renaming is not straightforward. However, despite the cost that is associated 
with renaming, renamings are seldom if ever documented-for example, less than 1 percent of the 
renamings in the five programs that we studied. This explains why participants largely agree on the 
usefulness of automatically documenting renamings. In this paper we propose REanaming Program 
ENTities (REPENT), an approach to automatically document-detect and classify-identifier renamings in 
source code. REPENT detects renamings based on a combination of source code differencing and data 
flow analyses. Using a set of natural language tools, REPENT classifies renamings into the different 
dimensions of a taxonomy that we defined. Using the documented renamings, developers will be able 
to, for example, look up methods that are part of the public API (as they impact client applications), or 
look for inconsistencies between the name and the implementation of an entity that underwent a high 
risk renaming (e.g., towards the opposite meaning). We evaluate the accuracy and completeness of 
REPENT on the evolution history of five open-source Java programs. The study indicates a precision of 88 
percent and a recall of 92 percent. In addition, we report an exploratory study investigating and 
discussing how identifiers are renamed in the five programs, according to our taxonomy. 
Existing system 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Source code lexicon plays a paramount role in software quality: poor lexicon can lead to poor 
comprehensibility and even increase software fault-proneness. For this reason, renaming a program 
entity, i.e., altering the entity identifier, is an important activity during software evolution. Developer s 
rename when they feel that the name of an entity is not (anymore) consistent with its functionality, or 
when such a name may be misleading. A survey that we performed with 71 developers suggests that 39 
percent perform renaming from a few times per week to almost every day and that 92 percent of the 
participants consider that renaming is not straightforward. However, despite the cost that is associated 
with renaming, renamings are seldom if ever documented-for example, less than 1 percent of the 
renamings in the five programs that we studied. This explains why participants largely agree on the 
usefulness of automatically documenting renamings. 
Proposed system 
we propose REanaming Program ENTities (REPENT), an approach to automatically document -detect and 
classify-identifier renamings in source code. REPENT detects renamings based on a combination of 
source code differencing and data flow analyses. Using a set of natural language tools, REPENT classifies 
renamings into the different dimensions of a taxonomy that we defined. Using the documented 
renamings, developers will be able to, for example, look up methods that are part of the public API (as 
they impact client applications), or look for inconsistencies between the name and the implementation 
of an entity that underwent a high risk renaming (e.g., towards the opposite meaning). We evaluate the 
accuracy and completeness of REPENT on the evolution history of five open-source Java programs. The 
study indicates a precision of 88 percent and a recall of 92 percent. In addition, we report an exploratory 
study investigating and discussing how identifiers are renamed in the five programs, according to our 
taxonomy. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

More Related Content

What's hot

Is Text Search an Effective Approach for Fault Localization: A Practitioners ...
Is Text Search an Effective Approach for Fault Localization: A Practitioners ...Is Text Search an Effective Approach for Fault Localization: A Practitioners ...
Is Text Search an Effective Approach for Fault Localization: A Practitioners ...Debdoot Mukherjee
 
Ontology model for c overflow vulnerabilities attack
Ontology model for c overflow vulnerabilities attackOntology model for c overflow vulnerabilities attack
Ontology model for c overflow vulnerabilities attackNurul Haszeli Ahmad
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
Defect Prediction: Accomplishments and Future Challenges
Defect Prediction: Accomplishments and Future ChallengesDefect Prediction: Accomplishments and Future Challenges
Defect Prediction: Accomplishments and Future ChallengesYasutaka Kamei
 
QUICKAR-ASE2016-Singapore
QUICKAR-ASE2016-SingaporeQUICKAR-ASE2016-Singapore
QUICKAR-ASE2016-SingaporeMasud Rahman
 
Christian Valenti Resume 01_31_2015
Christian Valenti Resume 01_31_2015Christian Valenti Resume 01_31_2015
Christian Valenti Resume 01_31_2015Christian D. Valenti
 
Statistical debuging for programs written in dynamic programming language ruby
Statistical debuging for programs written in dynamic programming language   rubyStatistical debuging for programs written in dynamic programming language   ruby
Statistical debuging for programs written in dynamic programming language rubyAdeel Akhter
 
A New Metric for Code Readability
A New Metric for Code ReadabilityA New Metric for Code Readability
A New Metric for Code ReadabilityIOSR Journals
 
An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
 
Ko tse06-developers behaviour
Ko tse06-developers behaviourKo tse06-developers behaviour
Ko tse06-developers behaviourPtidejPoly
 
Prioritization of Code Anomalies Based on Architecture Sensitiveness
Prioritization of Code Anomalies Based on Architecture SensitivenessPrioritization of Code Anomalies Based on Architecture Sensitiveness
Prioritization of Code Anomalies Based on Architecture Sensitivenessroberta arcoverde
 
A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...ijseajournal
 
Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...IJECEIAES
 
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...Fabio Palomba
 
Mining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software RepositoriesMining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software RepositoriesMarco Aurelio Gerosa
 
Change management and version control of Scientific Applications
Change management and version control of Scientific ApplicationsChange management and version control of Scientific Applications
Change management and version control of Scientific Applicationsijcsit
 
Sebrina_Malone_Resume10202016
Sebrina_Malone_Resume10202016Sebrina_Malone_Resume10202016
Sebrina_Malone_Resume10202016Sebrina Malone
 

What's hot (20)

Icsm19.ppt
Icsm19.pptIcsm19.ppt
Icsm19.ppt
 
Is Text Search an Effective Approach for Fault Localization: A Practitioners ...
Is Text Search an Effective Approach for Fault Localization: A Practitioners ...Is Text Search an Effective Approach for Fault Localization: A Practitioners ...
Is Text Search an Effective Approach for Fault Localization: A Practitioners ...
 
Ontology model for c overflow vulnerabilities attack
Ontology model for c overflow vulnerabilities attackOntology model for c overflow vulnerabilities attack
Ontology model for c overflow vulnerabilities attack
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Defect Prediction: Accomplishments and Future Challenges
Defect Prediction: Accomplishments and Future ChallengesDefect Prediction: Accomplishments and Future Challenges
Defect Prediction: Accomplishments and Future Challenges
 
QUICKAR-ASE2016-Singapore
QUICKAR-ASE2016-SingaporeQUICKAR-ASE2016-Singapore
QUICKAR-ASE2016-Singapore
 
Christian Valenti Resume 01_31_2015
Christian Valenti Resume 01_31_2015Christian Valenti Resume 01_31_2015
Christian Valenti Resume 01_31_2015
 
An Efficient Approach for Requirement Traceability Integrated With Software ...
An Efficient Approach for Requirement Traceability Integrated  With Software ...An Efficient Approach for Requirement Traceability Integrated  With Software ...
An Efficient Approach for Requirement Traceability Integrated With Software ...
 
Statistical debuging for programs written in dynamic programming language ruby
Statistical debuging for programs written in dynamic programming language   rubyStatistical debuging for programs written in dynamic programming language   ruby
Statistical debuging for programs written in dynamic programming language ruby
 
A New Metric for Code Readability
A New Metric for Code ReadabilityA New Metric for Code Readability
A New Metric for Code Readability
 
An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...An Efficient Approach for Requirement Traceability Integrated With Software R...
An Efficient Approach for Requirement Traceability Integrated With Software R...
 
Ko tse06-developers behaviour
Ko tse06-developers behaviourKo tse06-developers behaviour
Ko tse06-developers behaviour
 
Prioritization of Code Anomalies Based on Architecture Sensitiveness
Prioritization of Code Anomalies Based on Architecture SensitivenessPrioritization of Code Anomalies Based on Architecture Sensitiveness
Prioritization of Code Anomalies Based on Architecture Sensitiveness
 
A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...A methodology to evaluate object oriented software systems using change requi...
A methodology to evaluate object oriented software systems using change requi...
 
Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...Automated server-side model for recognition of security vulnerabilities in sc...
Automated server-side model for recognition of security vulnerabilities in sc...
 
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...
Smells Like Teen Spirit: Improving Bug Prediction Performance using the Inten...
 
Ontology Based Annotation of Text Segments
Ontology Based Annotation of Text SegmentsOntology Based Annotation of Text Segments
Ontology Based Annotation of Text Segments
 
Mining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software RepositoriesMining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software Repositories
 
Change management and version control of Scientific Applications
Change management and version control of Scientific ApplicationsChange management and version control of Scientific Applications
Change management and version control of Scientific Applications
 
Sebrina_Malone_Resume10202016
Sebrina_Malone_Resume10202016Sebrina_Malone_Resume10202016
Sebrina_Malone_Resume10202016
 

Similar to 2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of identifier renamings

Software Refactoring Under Uncertainty: A Robust Multi-Objective Approach
Software Refactoring Under Uncertainty:  A Robust Multi-Objective ApproachSoftware Refactoring Under Uncertainty:  A Robust Multi-Objective Approach
Software Refactoring Under Uncertainty: A Robust Multi-Objective ApproachWiem Mkaouer
 
Automating And Validating Program Annotations
Automating And Validating Program AnnotationsAutomating And Validating Program Annotations
Automating And Validating Program AnnotationsAndrew Molina
 
Rankingtherefactoring techniques
Rankingtherefactoring techniquesRankingtherefactoring techniques
Rankingtherefactoring techniquesijseajournal
 
Pldi09 semantics aware trace analysis
Pldi09 semantics aware trace analysisPldi09 semantics aware trace analysis
Pldi09 semantics aware trace analysisckamdem
 
Automating and Validating Semantic Annotations.pdf
Automating and Validating Semantic Annotations.pdfAutomating and Validating Semantic Annotations.pdf
Automating and Validating Semantic Annotations.pdfKathryn Patel
 
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...acijjournal
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...acijjournal
 
Gene Based Software Refactoring Location Identification and Rectification For...
Gene Based Software Refactoring Location Identification and Rectification For...Gene Based Software Refactoring Location Identification and Rectification For...
Gene Based Software Refactoring Location Identification and Rectification For...IJCSIS Research Publications
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Effect of refactoring on software quality
Effect of refactoring on software qualityEffect of refactoring on software quality
Effect of refactoring on software qualitycsandit
 
Class Diagram Extraction from Textual Requirements Using NLP Techniques
Class Diagram Extraction from Textual Requirements Using NLP TechniquesClass Diagram Extraction from Textual Requirements Using NLP Techniques
Class Diagram Extraction from Textual Requirements Using NLP Techniquesiosrjce
 
Query expansion using novel use case scenario relationship for finding featur...
Query expansion using novel use case scenario relationship for finding featur...Query expansion using novel use case scenario relationship for finding featur...
Query expansion using novel use case scenario relationship for finding featur...IJECEIAES
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...ijseajournal
 
SRGM Analyzers Tool of SDLC for Software Improving Quality
SRGM Analyzers Tool of SDLC for Software Improving QualitySRGM Analyzers Tool of SDLC for Software Improving Quality
SRGM Analyzers Tool of SDLC for Software Improving QualityIJERA Editor
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsIRJET Journal
 
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...csandit
 
Overlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsOverlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsIAEME Publication
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 

Similar to 2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of identifier renamings (20)

Software Refactoring Under Uncertainty: A Robust Multi-Objective Approach
Software Refactoring Under Uncertainty:  A Robust Multi-Objective ApproachSoftware Refactoring Under Uncertainty:  A Robust Multi-Objective Approach
Software Refactoring Under Uncertainty: A Robust Multi-Objective Approach
 
Automating And Validating Program Annotations
Automating And Validating Program AnnotationsAutomating And Validating Program Annotations
Automating And Validating Program Annotations
 
Rankingtherefactoring techniques
Rankingtherefactoring techniquesRankingtherefactoring techniques
Rankingtherefactoring techniques
 
Pldi09 semantics aware trace analysis
Pldi09 semantics aware trace analysisPldi09 semantics aware trace analysis
Pldi09 semantics aware trace analysis
 
Automating and Validating Semantic Annotations.pdf
Automating and Validating Semantic Annotations.pdfAutomating and Validating Semantic Annotations.pdf
Automating and Validating Semantic Annotations.pdf
 
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
A Model To Compare The Degree Of Refactoring Opportunities Of Three Projects ...
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
 
Gene Based Software Refactoring Location Identification and Rectification For...
Gene Based Software Refactoring Location Identification and Rectification For...Gene Based Software Refactoring Location Identification and Rectification For...
Gene Based Software Refactoring Location Identification and Rectification For...
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Effect of refactoring on software quality
Effect of refactoring on software qualityEffect of refactoring on software quality
Effect of refactoring on software quality
 
Class Diagram Extraction from Textual Requirements Using NLP Techniques
Class Diagram Extraction from Textual Requirements Using NLP TechniquesClass Diagram Extraction from Textual Requirements Using NLP Techniques
Class Diagram Extraction from Textual Requirements Using NLP Techniques
 
D017232729
D017232729D017232729
D017232729
 
Query expansion using novel use case scenario relationship for finding featur...
Query expansion using novel use case scenario relationship for finding featur...Query expansion using novel use case scenario relationship for finding featur...
Query expansion using novel use case scenario relationship for finding featur...
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
 
SRGM Analyzers Tool of SDLC for Software Improving Quality
SRGM Analyzers Tool of SDLC for Software Improving QualitySRGM Analyzers Tool of SDLC for Software Improving Quality
SRGM Analyzers Tool of SDLC for Software Improving Quality
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
 
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
 
Overlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammarsOverlapping optimization with parsing through metagrammars
Overlapping optimization with parsing through metagrammars
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 

More from IEEEBEBTECHSTUDENTSPROJECTS

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation systemIEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-imageIEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryptionIEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...IEEEBEBTECHSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...IEEEBEBTECHSTUDENTSPROJECTS
 

More from IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Localization of license plate numbe...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Image classification using multisca...
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Edge based ivd segmentation system
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Designing an-efficient-image
 
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of identifier renamings

  • 1. GLOBALSOFT TECHNOLOGIES REPENT: Analyzing the Nature of Identifier Renamings Abstract Source code lexicon plays a paramount role in software quality: poor lexicon can lead to poor comprehensibility and even increase software fault-proneness. For this reason, renaming a program entity, i.e., altering the entity identifier, is an important activity during software evolution. Developers rename when they feel that the name of an entity is not (anymore) consistent with its functionality, or when such a name may be misleading. A survey that we performed with 71 developers suggests that 39 percent perform renaming from a few times per week to almost every day and that 92 percent of the participants consider that renaming is not straightforward. However, despite the cost that is associated with renaming, renamings are seldom if ever documented-for example, less than 1 percent of the renamings in the five programs that we studied. This explains why participants largely agree on the usefulness of automatically documenting renamings. In this paper we propose REanaming Program ENTities (REPENT), an approach to automatically document-detect and classify-identifier renamings in source code. REPENT detects renamings based on a combination of source code differencing and data flow analyses. Using a set of natural language tools, REPENT classifies renamings into the different dimensions of a taxonomy that we defined. Using the documented renamings, developers will be able to, for example, look up methods that are part of the public API (as they impact client applications), or look for inconsistencies between the name and the implementation of an entity that underwent a high risk renaming (e.g., towards the opposite meaning). We evaluate the accuracy and completeness of REPENT on the evolution history of five open-source Java programs. The study indicates a precision of 88 percent and a recall of 92 percent. In addition, we report an exploratory study investigating and discussing how identifiers are renamed in the five programs, according to our taxonomy. Existing system IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Source code lexicon plays a paramount role in software quality: poor lexicon can lead to poor comprehensibility and even increase software fault-proneness. For this reason, renaming a program entity, i.e., altering the entity identifier, is an important activity during software evolution. Developer s rename when they feel that the name of an entity is not (anymore) consistent with its functionality, or when such a name may be misleading. A survey that we performed with 71 developers suggests that 39 percent perform renaming from a few times per week to almost every day and that 92 percent of the participants consider that renaming is not straightforward. However, despite the cost that is associated with renaming, renamings are seldom if ever documented-for example, less than 1 percent of the renamings in the five programs that we studied. This explains why participants largely agree on the usefulness of automatically documenting renamings. Proposed system we propose REanaming Program ENTities (REPENT), an approach to automatically document -detect and classify-identifier renamings in source code. REPENT detects renamings based on a combination of source code differencing and data flow analyses. Using a set of natural language tools, REPENT classifies renamings into the different dimensions of a taxonomy that we defined. Using the documented renamings, developers will be able to, for example, look up methods that are part of the public API (as they impact client applications), or look for inconsistencies between the name and the implementation of an entity that underwent a high risk renaming (e.g., towards the opposite meaning). We evaluate the accuracy and completeness of REPENT on the evolution history of five open-source Java programs. The study indicates a precision of 88 percent and a recall of 92 percent. In addition, we report an exploratory study investigating and discussing how identifiers are renamed in the five programs, according to our taxonomy. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 3. SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.