List of Knowledge and Data Engineering IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Knowledge and Data Engineering for the year 2015
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
List of Knowledge and Data Engineering IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Knowledge and Data Engineering for the year 2015
This document discusses data reduction techniques for improving bug triage in software projects. It proposes combining instance selection and feature selection to simultaneously reduce the scale of bug data on both the bug dimension and word dimension, while also improving the accuracy of bug triage. Historical bug data is used to build a predictive model to determine the optimal order of applying instance selection and feature selection for a new bug data set. The techniques are empirically evaluated on 600,000 bug reports from the Eclipse and Mozilla open source projects, showing the approach can effectively reduce data scale and improve triage accuracy.
This document presents an approach to populating a release history database from version control and bug tracking systems. It combines data from CVS version control and Bugzilla bug tracking for the Mozilla project to analyze software evolution. The paper describes related work, outlines the data import process, and evaluates the approach by examining timescales, release history, and coupling for the Mozilla project. It concludes that this approach provides insights into a project's evolutionary processes but that more formal integration with version control could improve the analysis.
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
This document summarizes a research paper that proposes a technique to improve the detection of duplicate bug reports using contextual information extracted from software engineering literature. It describes extracting word lists from software engineering textbooks and project documentation to measure contextual features of bug reports. The technique was evaluated on real bug report datasets and showed potential to significantly reduce manual effort in contextual bug deduplication while maintaining accuracy. Key findings indicate that leveraging domain knowledge from software engineering texts can help automate and enhance the identification of duplicate bug reports.
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUESShakas Technologies
This document summarizes an approach for data reduction in software bug triage. It combines instance selection and feature selection techniques to simultaneously reduce the number of bug reports (instances) and words (features) in bug datasets. This aims to create smaller, higher quality datasets that improve the accuracy of automatic bug triage while reducing labor costs. It evaluates different instance selection, feature selection, and their combination methods on large bug datasets from Eclipse and Mozilla projects. The results show the proposed data reduction approach can effectively shrink dataset sizes and boost bug triage accuracy.
1) The document discusses using data reduction techniques like instance selection and feature selection to reduce the scale and improve the quality of bug data for more effective bug triage.
2) It combines instance selection and feature selection to simultaneously reduce the number of bug reports (instances) and words (features) in bug data.
3) It evaluates the reduced bug data on two large open source projects and finds that combining the techniques can increase the accuracy of bug triage while reducing the data scale.
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
This document discusses methods for detecting fraud and malware in mobile applications on the Google Play Store. It proposes an incremental learning framework that aggregates evidence from an app's ratings, reviews, and rankings over time to detect suspicious changes that may indicate fraud. The framework characterizes large datasets of apps and can be extended with additional evidence sources. An experiment on real app data validated that the proposed approach more effectively detects fraud compared to existing methods. The framework provides accurate fraud assessments while being scalable to the large number of apps on Google Play.
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
List of Knowledge and Data Engineering IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Knowledge and Data Engineering for the year 2015
This document discusses data reduction techniques for improving bug triage in software projects. It proposes combining instance selection and feature selection to simultaneously reduce the scale of bug data on both the bug dimension and word dimension, while also improving the accuracy of bug triage. Historical bug data is used to build a predictive model to determine the optimal order of applying instance selection and feature selection for a new bug data set. The techniques are empirically evaluated on 600,000 bug reports from the Eclipse and Mozilla open source projects, showing the approach can effectively reduce data scale and improve triage accuracy.
This document presents an approach to populating a release history database from version control and bug tracking systems. It combines data from CVS version control and Bugzilla bug tracking for the Mozilla project to analyze software evolution. The paper describes related work, outlines the data import process, and evaluates the approach by examining timescales, release history, and coupling for the Mozilla project. It concludes that this approach provides insights into a project's evolutionary processes but that more formal integration with version control could improve the analysis.
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
This document summarizes a research paper that proposes a technique to improve the detection of duplicate bug reports using contextual information extracted from software engineering literature. It describes extracting word lists from software engineering textbooks and project documentation to measure contextual features of bug reports. The technique was evaluated on real bug report datasets and showed potential to significantly reduce manual effort in contextual bug deduplication while maintaining accuracy. Key findings indicate that leveraging domain knowledge from software engineering texts can help automate and enhance the identification of duplicate bug reports.
TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUESShakas Technologies
This document summarizes an approach for data reduction in software bug triage. It combines instance selection and feature selection techniques to simultaneously reduce the number of bug reports (instances) and words (features) in bug datasets. This aims to create smaller, higher quality datasets that improve the accuracy of automatic bug triage while reducing labor costs. It evaluates different instance selection, feature selection, and their combination methods on large bug datasets from Eclipse and Mozilla projects. The results show the proposed data reduction approach can effectively shrink dataset sizes and boost bug triage accuracy.
1) The document discusses using data reduction techniques like instance selection and feature selection to reduce the scale and improve the quality of bug data for more effective bug triage.
2) It combines instance selection and feature selection to simultaneously reduce the number of bug reports (instances) and words (features) in bug data.
3) It evaluates the reduced bug data on two large open source projects and finds that combining the techniques can increase the accuracy of bug triage while reducing the data scale.
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
This document discusses methods for detecting fraud and malware in mobile applications on the Google Play Store. It proposes an incremental learning framework that aggregates evidence from an app's ratings, reviews, and rankings over time to detect suspicious changes that may indicate fraud. The framework characterizes large datasets of apps and can be extended with additional evidence sources. An experiment on real app data validated that the proposed approach more effectively detects fraud compared to existing methods. The framework provides accurate fraud assessments while being scalable to the large number of apps on Google Play.
Slides of session I presensented to my folks at University of Calgary on research paper on Mudflow and Flowdroid.
Links given below:
https://www.st.cs.uni-saarland.de/appmining/mudflow/
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwik583ola7XAhUX6WMKHQYXCnoQFggoMAA&url=https%3A%2F%2Fblogs.uni-paderborn.de%2Fsse%2Ftools%2Fflowdroid%2F&usg=AOvVaw1t13BQnA07LA9FA3O5wNvN
The document describes an automated process for bug triage that uses text classification and data reduction techniques. It proposes using Naive Bayes classifiers to predict the appropriate developers to assign bugs to by applying stopword removal, stemming, keyword selection, and instance selection on bug reports. This reduces the data size and improves quality. It predicts developers based on their history and profiles while tracking bug status. The goal is to more efficiently handle software bugs compared to traditional manual triage processes.
Towards Effective Bug Triage with Software Data Reduction Techniques1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Nikhil Sharma has a Master of Science in Data Informatics from USC and a Bachelor of Engineering in Electronics and Communication from M.S. Ramaiah Institute of Technology in India. He has work experience as a Software Engineer Intern at Salesforce where he designed applications for database performance analysis using Python. Previously he was a Senior Systems Engineer at Infosys where he implemented IT infrastructure for banks in various countries. His academic projects involve machine learning, data mining, and information retrieval using technologies like Python, Solr, and Caffe.
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
This document discusses using machine learning techniques for automatic bug triage to reduce the time and costs associated with manually assigning software bugs to developers. It proposes using data reduction techniques like feature selection and instance selection to create a smaller, higher quality bug repository by removing redundant bug reports and words. This reduced dataset would then be used to train a classifier to automatically suggest the most suitable developer for a given new bug, aiming to improve prediction accuracy while reducing training and prediction time compared to using the full dataset.
A Survey on Bug Tracking System for Effective Bug ClearanceIRJET Journal
This document discusses bug tracking systems and methods for effective bug clearance. It describes how software organizations spend a large amount of resources handling bugs. It then summarizes an approach that uses instance selection and feature selection methods to classify bugs which are then assigned to bug solving experts based on their experience. A history of cleared bugs is also maintained to help resolve similar bugs faster. The goal is to reduce the time and costs involved in clearing bugs.
L injection toward effective collaborative filtering using uninteresting itemsKumar Dlk
We develop a novel framework, named as l-injection, to address the sparsity problem of recommender systems. By carefully injecting low values to a selected set of unrated user-item pairs in a user-item matrix secure computing in chennai
Generation of Search Based Test Data on Acceptability Testing Principleiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simseer - A Software Similarity Web ServiceSilvio Cesare
This document summarizes an overview talk on software similarity. It introduces the speaker and their research focus on malware detection and vulnerability detection. It then provides an overview of the core topics of software similarity, how it is approached in academia, and introduces a new web service that identifies software similarity. It discusses how software similarity can be used for malware detection, software theft detection, plagiarism detection, and software clone detection. It also provides taxonomy of different program features that can be analyzed and examples of how features like ASTs and control flow can be represented. Finally, it introduces resources like a wiki, book, and new web service called Simseer for software similarity.
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...ESEM 2014
Context: Duplicate detection is a fundamental part of issue management. Systems able to predict whether a new defect report will be closed as a duplicate, may decrease costs by limiting rework and collecting related pieces of information. Goal: Our work explores using Apache Lucene for large- scale duplicate detection based on textual content. Also, we evaluate the previous claim that results are improved if the title is weighted as more important than the description. Method: We conduct a conceptual replication of a well-cited study conducted at Sony Ericsson, using Lucene for searching in the public Android defect repository. In line with the original study, we explore how varying the weight- ing of the title and the description affects the accuracy. Results: We show that Lucene obtains the best results when the defect report title is weighted three times higher than the description, a bigger difference than has been previously acknowledged. Conclusions: Our work shows the potential of using Lucene as a scalable solution for duplicate detection.
Software Defect Trend Forecasting In Open Source Projects using A Univariate ...CSCJournals
Our objective in this research is to provide a framework that will allow project managers, business owners, and developers an effective way to forecast the trend in software defects within a software project in real-time. By providing these stakeholders with a mechanism for forecasting defects, they can then provide the necessary resources at the right time in order to remove these defects before they become too much ultimately leading to software failure. In our research, we will not only show general trends in several open-source projects but also show trends in daily, monthly, and yearly activity. Our research shows that we can use this forecasting method up to 6 months out with only an MSE of 0.019. In this paper, we present our technique and methodologies for developing the inputs for the proposed model and the results of testing on seven open source projects. Further, we discuss the prediction models, the performance, and the implementation using the FBProphet framework and the ARIMA model.
The document presents an approach for improving requirement traceability by integrating it with software repositories. It proposes a supervised link tracing approach called Trustrace that uses information retrieval (IR) techniques to generate baseline traceability links between requirements and source code. It then mines software repositories like version control systems to generate validating traceability links called "Histrace links" from experts. A trust model called DynWing is used to dynamically assign weights to different expert links in ranking the baseline links. The top ranked expert links are then fed to another trust model called Trumo, which validates the baseline links and finds the most trustable links, improving precision and recall over basic IR techniques.
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Chamila Wijayarathna
This was presented by me at the 28th annual gathering of Psychology of Programmers Interest Group (PPIG).
Usability issues that exist in security APIs cause programmers to embed those security APIs incorrectly to the applications they develop. This results in introduction of security vulnerabilities to those applications. One of the main reasons for security APIs to be not usable is currently there is no proper method by which the usability issues of security APIs can be identified. We conducted a study to assess the effectiveness of the cognitive dimensions questionnaire based usability evaluation methodology in evaluating the usability of security APIs. We used a cognitive dimensions based generic questionnaire to collect feedback from programmers who participated in the study. Results revealed interesting facts about the prevailing usability issues in four commonly used security APIs and the capability of the methodology to identify those issues.
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
Abstract: Traceability links between requirements of a system and its source code are helpful in reducing
system conception effort. During software updates and maintenance, the traceability links become invalid since
the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a
system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques
are applied on source code and requirements document to generate baseline traceability links. Concurrently,
software repositories are also mined to generate validating traceability links i.e. Histrace links which are then
called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing
dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed
to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the
trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking
the experts and finds most traceable links. The proposed approach is able to improve the precision and recall
values of the traceability links.
Index Terms: Traceability, requirements, features, source code, repositories, experts.
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...csandit
Android being a widely used mobile platform has witnessed an increase in the number of malicious samples on its market place. The availability of multiple sources for downloading
applications has also contributed to users falling prey to malicious applications. Classification of an Android application as malicious or benign remains a challenge as malicious applications maneuver to pose themselves as benign. This paper presents an approach which extracts various features from Android Application Package file (APK) using static analysis and subsequently classifies using machine learning techniques. The contribution of this work includes deriving, extracting and analyzing crucial features of Android applications that aid in efficient classification. The analysis is carried out using various machine learning algorithms
with both weighted and non-weighted approaches. It was observed that weighted approach depicts higher detection rates using fewer features. Random Forest algorithm exhibited high detection rate and shows the least false positive rate.
O documento deseja felicidades para a pessoa, enumerando vários aspectos da vida pelos quais deseja felicidade, como natal, ano novo, refeições, conversas, inspirações, entre outros. O autor espera que a pessoa sorria e encontre felicidade em cada momento.
Aakash Group Residential Project Echo Point Bhimrad SuratSettlers India.com
Settlers India is a premium channel partner of Aakash Group that has proudly launched their new project called Echo Point. Contact details are provided for Settlers India including their email, mobile number, and website so those interested can learn more about Echo Point.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of neurotransmitters and endorphins which elevate and stabilize mood.
The document is a holiday greeting from Helena wishing the recipient happiness in various moments throughout the year and holidays. It lists different types of happy moments like commuting, conversations, movies, and more. It concludes by wishing the recipient finds happiness in every little moment and hopes reading it caused a smile.
Sri maa anandamayi ashram, Omkareshwar Built attractively on the side of a hill and on bank of narmada, in ashram there are lots of sites for meditation
Slides of session I presensented to my folks at University of Calgary on research paper on Mudflow and Flowdroid.
Links given below:
https://www.st.cs.uni-saarland.de/appmining/mudflow/
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwik583ola7XAhUX6WMKHQYXCnoQFggoMAA&url=https%3A%2F%2Fblogs.uni-paderborn.de%2Fsse%2Ftools%2Fflowdroid%2F&usg=AOvVaw1t13BQnA07LA9FA3O5wNvN
The document describes an automated process for bug triage that uses text classification and data reduction techniques. It proposes using Naive Bayes classifiers to predict the appropriate developers to assign bugs to by applying stopword removal, stemming, keyword selection, and instance selection on bug reports. This reduces the data size and improves quality. It predicts developers based on their history and profiles while tracking bug status. The goal is to more efficiently handle software bugs compared to traditional manual triage processes.
Towards Effective Bug Triage with Software Data Reduction Techniques1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Nikhil Sharma has a Master of Science in Data Informatics from USC and a Bachelor of Engineering in Electronics and Communication from M.S. Ramaiah Institute of Technology in India. He has work experience as a Software Engineer Intern at Salesforce where he designed applications for database performance analysis using Python. Previously he was a Senior Systems Engineer at Infosys where he implemented IT infrastructure for banks in various countries. His academic projects involve machine learning, data mining, and information retrieval using technologies like Python, Solr, and Caffe.
IRJET- Data Reduction in Bug Triage using Supervised Machine LearningIRJET Journal
This document discusses using machine learning techniques for automatic bug triage to reduce the time and costs associated with manually assigning software bugs to developers. It proposes using data reduction techniques like feature selection and instance selection to create a smaller, higher quality bug repository by removing redundant bug reports and words. This reduced dataset would then be used to train a classifier to automatically suggest the most suitable developer for a given new bug, aiming to improve prediction accuracy while reducing training and prediction time compared to using the full dataset.
A Survey on Bug Tracking System for Effective Bug ClearanceIRJET Journal
This document discusses bug tracking systems and methods for effective bug clearance. It describes how software organizations spend a large amount of resources handling bugs. It then summarizes an approach that uses instance selection and feature selection methods to classify bugs which are then assigned to bug solving experts based on their experience. A history of cleared bugs is also maintained to help resolve similar bugs faster. The goal is to reduce the time and costs involved in clearing bugs.
L injection toward effective collaborative filtering using uninteresting itemsKumar Dlk
We develop a novel framework, named as l-injection, to address the sparsity problem of recommender systems. By carefully injecting low values to a selected set of unrated user-item pairs in a user-item matrix secure computing in chennai
Generation of Search Based Test Data on Acceptability Testing Principleiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simseer - A Software Similarity Web ServiceSilvio Cesare
This document summarizes an overview talk on software similarity. It introduces the speaker and their research focus on malware detection and vulnerability detection. It then provides an overview of the core topics of software similarity, how it is approached in academia, and introduces a new web service that identifies software similarity. It discusses how software similarity can be used for malware detection, software theft detection, plagiarism detection, and software clone detection. It also provides taxonomy of different program features that can be analyzed and examples of how features like ASTs and control flow can be represented. Finally, it introduces resources like a wiki, book, and new web service called Simseer for software similarity.
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...ESEM 2014
Context: Duplicate detection is a fundamental part of issue management. Systems able to predict whether a new defect report will be closed as a duplicate, may decrease costs by limiting rework and collecting related pieces of information. Goal: Our work explores using Apache Lucene for large- scale duplicate detection based on textual content. Also, we evaluate the previous claim that results are improved if the title is weighted as more important than the description. Method: We conduct a conceptual replication of a well-cited study conducted at Sony Ericsson, using Lucene for searching in the public Android defect repository. In line with the original study, we explore how varying the weight- ing of the title and the description affects the accuracy. Results: We show that Lucene obtains the best results when the defect report title is weighted three times higher than the description, a bigger difference than has been previously acknowledged. Conclusions: Our work shows the potential of using Lucene as a scalable solution for duplicate detection.
Software Defect Trend Forecasting In Open Source Projects using A Univariate ...CSCJournals
Our objective in this research is to provide a framework that will allow project managers, business owners, and developers an effective way to forecast the trend in software defects within a software project in real-time. By providing these stakeholders with a mechanism for forecasting defects, they can then provide the necessary resources at the right time in order to remove these defects before they become too much ultimately leading to software failure. In our research, we will not only show general trends in several open-source projects but also show trends in daily, monthly, and yearly activity. Our research shows that we can use this forecasting method up to 6 months out with only an MSE of 0.019. In this paper, we present our technique and methodologies for developing the inputs for the proposed model and the results of testing on seven open source projects. Further, we discuss the prediction models, the performance, and the implementation using the FBProphet framework and the ARIMA model.
The document presents an approach for improving requirement traceability by integrating it with software repositories. It proposes a supervised link tracing approach called Trustrace that uses information retrieval (IR) techniques to generate baseline traceability links between requirements and source code. It then mines software repositories like version control systems to generate validating traceability links called "Histrace links" from experts. A trust model called DynWing is used to dynamically assign weights to different expert links in ranking the baseline links. The top ranked expert links are then fed to another trust model called Trumo, which validates the baseline links and finds the most trustable links, improving precision and recall over basic IR techniques.
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Chamila Wijayarathna
This was presented by me at the 28th annual gathering of Psychology of Programmers Interest Group (PPIG).
Usability issues that exist in security APIs cause programmers to embed those security APIs incorrectly to the applications they develop. This results in introduction of security vulnerabilities to those applications. One of the main reasons for security APIs to be not usable is currently there is no proper method by which the usability issues of security APIs can be identified. We conducted a study to assess the effectiveness of the cognitive dimensions questionnaire based usability evaluation methodology in evaluating the usability of security APIs. We used a cognitive dimensions based generic questionnaire to collect feedback from programmers who participated in the study. Results revealed interesting facts about the prevailing usability issues in four commonly used security APIs and the capability of the methodology to identify those issues.
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
Abstract: Traceability links between requirements of a system and its source code are helpful in reducing
system conception effort. During software updates and maintenance, the traceability links become invalid since
the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a
system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques
are applied on source code and requirements document to generate baseline traceability links. Concurrently,
software repositories are also mined to generate validating traceability links i.e. Histrace links which are then
called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing
dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed
to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the
trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking
the experts and finds most traceable links. The proposed approach is able to improve the precision and recall
values of the traceability links.
Index Terms: Traceability, requirements, features, source code, repositories, experts.
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...csandit
Android being a widely used mobile platform has witnessed an increase in the number of malicious samples on its market place. The availability of multiple sources for downloading
applications has also contributed to users falling prey to malicious applications. Classification of an Android application as malicious or benign remains a challenge as malicious applications maneuver to pose themselves as benign. This paper presents an approach which extracts various features from Android Application Package file (APK) using static analysis and subsequently classifies using machine learning techniques. The contribution of this work includes deriving, extracting and analyzing crucial features of Android applications that aid in efficient classification. The analysis is carried out using various machine learning algorithms
with both weighted and non-weighted approaches. It was observed that weighted approach depicts higher detection rates using fewer features. Random Forest algorithm exhibited high detection rate and shows the least false positive rate.
O documento deseja felicidades para a pessoa, enumerando vários aspectos da vida pelos quais deseja felicidade, como natal, ano novo, refeições, conversas, inspirações, entre outros. O autor espera que a pessoa sorria e encontre felicidade em cada momento.
Aakash Group Residential Project Echo Point Bhimrad SuratSettlers India.com
Settlers India is a premium channel partner of Aakash Group that has proudly launched their new project called Echo Point. Contact details are provided for Settlers India including their email, mobile number, and website so those interested can learn more about Echo Point.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of neurotransmitters and endorphins which elevate and stabilize mood.
The document is a holiday greeting from Helena wishing the recipient happiness in various moments throughout the year and holidays. It lists different types of happy moments like commuting, conversations, movies, and more. It concludes by wishing the recipient finds happiness in every little moment and hopes reading it caused a smile.
Sri maa anandamayi ashram, Omkareshwar Built attractively on the side of a hill and on bank of narmada, in ashram there are lots of sites for meditation
Frame rate refers to the frequency at which consecutive images, called frames, are produced by an imaging device. It is commonly measured in frames per second (fps). Early silent films had frame rates between 14-24 fps, which gave the appearance of jerky motion. When recording or playing video, frame rate indicates the number of frames captured or displayed per second, with common rates being 25 fps in Europe and 30 fps in Japan and the US. Animation is often created at lower rates like 12 fps.
Screen ratios express the relationship between a screen's width and height as two numbers separated by a colon. Common screen ratios include 4:3, 16:9, and 1.77:1, with 16:9 being the standard for HDTV and computer monitors since 2009. Film aspect ratios for movie theaters are typically wider at 1.85:1 or 2.39:1. Regardless of size, the ratio defines how the width is divided into equal units that also measure the height.
The document discusses image resolution and its impact on image quality. Resolution refers to the number of pixels in an image and determines the clarity and sharpness. Higher resolutions like 4 megapixels and above provide better quality images that can be enlarged for printing. The standard resolution for screens is 72ppi while 300ppi is recommended for print.
Compression involves encoding video data into a file using a codec, which compresses the data during encoding and allows it to be decoded during playback. Codecs can be lossless, preserving all data, or lossy, losing some data during encoding. It is best to avoid transcoding to a lossy codec until the final output to prevent unnecessary data loss during a video workflow.
Corrugated boxes are made from corrugated paper or cardboard, and are stronger than regular cardboard boxes. Corrugated boxes are used to pack, store, and transport items such as food, clothes, toys, and appliances. Shipping cartons are also used to transport freight via water, railroad, and air.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Bug triage means to transfer a new bug to expertise developer. The manual bug triage is opulent in time
and poor in accuracy, there is a need to automatize the bug triage process. In order to automate the bug triage
process, text classification techniques are applied using stopword removal and stemming. In our proposed work
we have used NB-Classifiers to predict the developers. The data reduction techniques like instance selection
and keyword selection are used to obtain bug report and words. This will help the system to predict only those
developers who are expertise in solving the assigned bug. We will also provide the change of status of bug
report i.e. if the bug is solved then the bug report will be updated. If a particular developer fails to solve the bug
then the bug will go back to another developer.
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
In diverse industrial and academic environments, the quality of the software has been evaluated using
different analytic studies. The contribution of the present work is focused on the development of a
methodology in order to improve the evaluation and analysis of the reliability of web-based software
applications. The Personal Software Process (PSP) was introduced in our methodology for improving the
quality of the process and the product. The Evaluation + Improvement (Ei) process is performed in our
methodology to evaluate and improve the quality of the software system. We tested our methodology in a
web-based software system and used statistical modeling theory for the analysis and evaluation of the
reliability. The behavior of the system under ideal conditions was evaluated and compared against the
operation of the system executing under real conditions. The results obtained demonstrated the
effectiveness and applicability of our methodology
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now
seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using Map Reduce to make the classification speeds faster than the traditional approaches.[2].
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATIONIJNSA Journal
This document summarizes research on using MapReduce to classify websites as malicious or benign more efficiently than traditional approaches. The researchers used a dataset from Kaggle containing network and application features of websites to train and evaluate machine learning models. They preprocessed the data to handle missing values and encode categorical features. Models tested included neural networks, random forests, and decision trees. Random forests achieved 100% accuracy when trained on 30% of the data and were much faster than other models. Processing time was improved when using Apache Spark on two nodes compared to a single node or traditional programming, and further speedups could be gained with more nodes.
Software Defect Prediction Using Radial Basis and Probabilistic Neural NetworksEditor IJCATR
This document discusses using neural networks for software defect prediction. It examines the effectiveness of using a radial basis function neural network and a probabilistic neural network on prediction accuracy and defect prediction compared to other techniques. The key findings are that neural networks provide an acceptable level of accuracy for defect prediction but perform poorly at actual defect prediction. Probabilistic neural networks performed consistently better than other techniques across different datasets in terms of prediction accuracy and defect prediction ability. The document recommends using an ensemble of different software defect prediction models rather than relying on a single technique.
SBGC provides IEEE software projects for students in various domains including Java, J2ME, J2EE, .NET and MATLAB. It offers two categories of projects - projects with new ideas/papers and selecting from their project list. They ensure projects are implemented satisfactorily and students understand all aspects. SBGC provides latest 2012-2013 projects for various engineering and technology students as well as MBA students. It offers project support including abstracts, reports, presentations and certificates.
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
This document describes a study that uses fuzzy clustering and software metrics to predict faults in large industrial software systems. The study uses fuzzy c-means clustering to group software components into faulty and fault-free clusters based on various software metrics. The study applies this method to the open-source JEdit software project, calculating metrics for 274 classes and identifying faults using repository data. The results show 88.49% accuracy in predicting faulty classes, demonstrating that fuzzy clustering can be an effective technique for fault prediction in large software systems.
Unit testing focuses on testing individual software modules to uncover errors. Integration testing tests interfacing between modules incrementally to isolate errors. Testing objectives are to find errors, use high probability test cases, and ensure specifications are met. Reasons to test are for correctness, efficiency, and complexity. Test oracles verify expected outputs to increase automated testing efficiency and reduce costs, though complete automation has challenges.
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...IJCI JOURNAL
There has always been a struggle for programmers to identify the errors while executing a program- be it
syntactical or logical error. This struggle has led to a research in identification of syntactical and logical
errors. This paper makes an attempt to survey those research works which can be used to identify errors as
well as proposes a new model based on machine learning and data mining which can detect logical and
syntactical errors by correcting them or providing suggestions. The proposed work is based on use of
hashtags to identify each correct program uniquely and this in turn can be compared with the logically
incorrect program in order to identify errors.
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUESijaia
The purpose of software defect prediction is to improve the quality of a software project by building a
predictive model to decide whether a software module is or is not fault prone. In recent years, much
research in using machine learning techniques in this topic has been performed. Our aim was to evaluate
the performance of clustering techniques with feature selection schemes to address the problem of software
defect prediction problem. We analysed the National Aeronautics and Space Administration (NASA)
dataset benchmarks using three clustering algorithms: (1) Farthest First, (2) X-Means, and (3) selforganizing map (SOM). In order to evaluate different feature selection algorithms, this article presents a
comparative analysis involving software defects prediction based on Bat, Cuckoo, Grey Wolf Optimizer
(GWO), and particle swarm optimizer (PSO). The results obtained with the proposed clustering models
enabled us to build an efficient predictive model with a satisfactory detection rate and acceptable number
of features.
There have been reports such as ‘there is high rate of web application vulnerability’ as well as a range of ways in which web hackers attack web applications. Since the discovery that web applications convey the best content to users, there have been attempts to determine ways in which these systems can be hacked into through defacing, damage and defrauding. As the culture of conveying information across the internet continues to gain ground, there are increasing cases of vulnerabilities of these sites to cyber criminals.
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
This document discusses various machine learning methods for malware detection, including support vector machines (SVM), random forests, and decision trees. It provides an overview of each method and related works that have applied these techniques. Specifically, it examines analyses that used linear SVM, random forests on Android apps, and an improved decision tree algorithm to classify malware families. The document concludes that machine learning methods have become important for malware detection as signatures alone cannot keep up with new malware variants.
We are excited to announce that our new State of Software Security (SOSS) rep...Ampliz
We are excited to announce that our new State of Software Security (SOSS) report is officially available.
We encourage you to download the report and check out some of the key findings.
For instance, new Research Finds 20x Increase in Software Security Scanning Over the Past Decade.
New Veracode State of Software Security Report
Available Now: https://bit.ly/3tTHT2I
The State of Software Security 2022 SOSS - SolutionNeelKamalSingh8
We are excited to announce that our new State of Software Security (SOSS) report is officially available.
We encourage you to download the report and check out some of the key findings.
Available Now: https://bit.ly/3tTHT2I
The document discusses using data mining techniques to analyze crime data and predict crime trends. It describes collecting crime reports from various sources to create a database. Machine learning algorithms would then be applied to the crime data to discover patterns and relationships between different crimes. This analysis could help police identify crime hotspots and determine if a crime was committed in a known location. The proposed system aims to forecast crimes and trends based on past crime data, date and location to help prevent crimes. It discusses implementing the system using Python and testing it with sample input data.
Similar to Knowledge and Data Engineering IEEE 2015 Projects (20)
This document provides information on several 2015 IEEE Matlab projects related to signal processing and image analysis. It lists the project titles, languages, links, and abstracts for 10 different Matlab projects. The projects cover topics such as target source separation using deep neural networks, hyperspectral image classification using sparse representation, image denoising techniques, and cardiovascular biometrics.
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
List of Wireless Communication IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Wireless Communication for M.Phil Computer Science students.
M.E Computer Science Wireless Communication ProjectsVijay Karan
List of Wireless Communication IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Wireless Communication for M.E Computer Science students.
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.Phil Computer Science students.
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for M.E Computer Science students.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
1. Knowledge and Data Engineering IEEE 2015 Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/knowledge-and-data-engineering-ieee-2015-projects
Title :Malware Propagation in Large-Scale Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/malware-propagation-large-scale-networks
Abstract : Malware is pervasive in networks, and poses a critical threat to network security. However, we have very
limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagate
in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model
for malware propagation from network to network. Based on the proposed model, our analysis indicates that the
distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and
power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed
through two real-world global scale malware data sets, and the results confirm our theoretical findings.
Title :Discovery of Ranking Fraud for Mobile Apps
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/ranking-fraud-discovery-mobile-apps
Abstract : Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of
bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App developers to use
shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud. While the
importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in
this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection
system for mobile Apps. Specifically, we first propose to accurately locate the ranking fraud by mining the active
periods, namely leading sessions, of mobile Apps. Such leading sessions can be leveraged for detecting the local
anomaly instead of global anomaly of App rankings. Furthermore, we investigate three types of evidences, i.e.,
ranking based evidences, rating based evidences and review based evidences, by modeling Apps' ranking, rating and
review behaviors through statistical hypotheses tests. In addition, we propose an optimization based aggregation
method to integrate all the evidences for fraud detection. Finally, we evaluate the proposed system with real-world
App data collected from the iOS App Store for a long time period. In the experiments, we validate the effectiveness of
the proposed system, and show the scalability of the detection algorithm as well as some regularity of ranking fraud
activities.
Title :Towards Effective Bug Triage with Software Data Reduction Techniques
Language : Java
Project Link : http://kasanpro.com/p/java/bug-triage-software-data-reduction-techniques
Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of
fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in
manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the
problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine
instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word
dimension. To determine the order of applying instance selection and feature selection, we extract attributes from
historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the
performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and
Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of
bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and
high-quality bug data in software development and maintenance.
Title :Towards Effective Bug Triage with Software Data Reduction Techniques
Language : C#
2. Project Link : http://kasanpro.com/p/c-sharp/effective-bug-triage-software-data-reduction-techniques
Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of
fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in
manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the
problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine
instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word
dimension. To determine the order of applying instance selection and feature selection, we extract attributes from
historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the
performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and
Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of
bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and
high-quality bug data in software development and maintenance.