SlideShare a Scribd company logo
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
24 Copyright © 2018. IJEMR. All Rights Reserved.
Volume-8, Issue-5, October 2018
International Journal of Engineering and Management Research
Page Number: 24-28
DOI: doi.org/10.31033/ijemr.8.5.5
Privacy Preserving Mining in Code Profiling Data
Meenakshi Kathayat
Assistant Professor, Department of Computer Science & Engineering, Birla Institute of Applied Sciences Bhimtal,
Uttarakhand, INDIA
Corresponding Author: meenakshik.kathayat4@gmail.com
ABSTRACT
Privacy preserving data mining is an important
issue nowadays for data mining. Since various organizations
and people are generating sensitive data or information these
days. They don’t want to share their sensitive data however
that data can be useful for data mining purpose. So, due to
privacy preserving mining that data can be mined usefully
without harming the privacy of that data. Privacy can be
preserved by applying encryption on database which is to be
mined because now the data is secure due to encryption. Code
profiling is a field in software engineering where we can
apply data mining to discover some knowledge so that it will
be useful in future development of software. In this work we
have applied privacy preserving mining in code profiling data
such as software metrics of various codes. Results of data
mining on actual and encrypted data are compared for
accuracy. We have also analyzed the results of privacy
preserving mining in code profiling data and found
interesting results.
Keywords-- Privacy preserving data mining, Code
Profiling, Correlation coefficient
I. INTRODUCTION
Software systems are mainly complex and hard to
conceptualize. This complexity, compounded by
complicated dependencies and different programming
practices, slows development and maintenance activities,
leads to faults and defects and finally increases the cost of
software [1]. Software engineering activities generate a
huge amount of data that, if harnessed properly through
data mining techniques, can help provide awareness into
many parts of software development processes. Privacy
preserving data mining is important because of the huge
amount of personal data generated nowadays. Privacy
preserving is an important issue in the data mining field.
Many applications are benefited from data sharing, mainly
data statistics and data mining. But the shared data may
contain private information of the owner of data. It has a
high risk of revealing data owner’s privacy [2]. Most of the
times people are not interested in sharing their private data,
they either not share their data or provide incorrect data.
Due to this problem in data collection phase, the results of
data mining techniques gets affected, which is based on
sufficient amounts of accurate data for producing
meaningful results or knowledge. Privacy preserving data
mining (PPDM) has become increasingly popular because
it allows sharing of private data for analysis purposes [3].
Code profiling is a form of dynamic program
analysis that measures, for example, the space (memory)
or time complexity of a program, the use of particular
instructions, or the frequency and duration of function
calls. Code profiling data of software can tell us about its
various attributes regarding its nature and performance and
is very important. It is a form of dynamic program analysis
that measures, for example, the space (memory) or time
complexity of a program, the use of particular instructions,
or the frequency and duration of function calls. There are
various software metrics which can come in code profiling
data. In software engineering, program profiling
or software profiling is a form of dynamic program
analysis (as opposed to static code analysis) or the
examination of a program’s behavior by gathered
information as the program executes. The usual purpose of
this analysis is to determine the sections of a program
needed to optimize - to increase its overall speed, decrease
its memory requirement or sometimes both.
In this work Code profiling data of a project or
code is very important to an organization. If it wants to
mine this data without risking its privacy then privacy
preserving mining is the best option for that purpose. We
have taken various software metrics as code profiling data.
Using this we create a model by learning existing
successful project’s software metrics and then for a new
project we can predict the value of an unknown metrics
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
25 Copyright © 2018. IJEMR. All Rights Reserved.
based on the generated model. This can help an
organization in 2 aspects-First, the privacy of the code
profiling data is preserved. Second, we can predict
unknown attribute for a new project using a model based
on successful projects and we can know the shortcomings
of the new project on that basis.
II. LITERATURE REVIEW
Jian Wang, Yongcheng Luo, Yan Zhao, and Jiajin
Le [3] have proposed a survey on privacy preserving data
mining. They have described several privacy preserving
data mining technologies clearly and then analyzed the
merits and shortcomings of these technologies. They have
discussed K-anonymity, the perturbation approach,
Cryptographic techniques. They have suggested to use the
Randomized Response techniques to solve the DTPD
problem and introduced a condensation approach, which
creates constrained clusters in the data set, and then
generates pseudo-data from the statistics of these clusters.
Pan Yang, Xiaolin Gui, Feng Tian, Jing Yao, and Jiancai
Lin [2] have proposed a privacy-preserving data
obfuscation scheme used in data statistics and data mining.
Yuriy Brun, and Michael D. Ernst [6] have introduced a
technique for finding latent code errors via machine
learning over program executions. Their technique
proposes a technique for identifying program properties
that indicate errors. This technique generates machine
learning models of program properties known to result
from errors, and applies these models to properties of
programs of code written to classify and rank properties
that may lead the user to errors. Quinn Taylor, and
Christophe Giraud-Carrier [9] have introduced applications
of data mining in software engineering. Since software
engineering activities are very complex, and the related
activities often produce a large number and variety of
artefacts, so that they are well-suited to data mining.
Recent years have seen an increase in the use of data
mining techniques on such artefacts with the aim of
analysing as well as improving software processes for a
given organisation or project.
Tu Honglei, Sun Wei, and Zhang Yanan [4] have
done a research on software metrics and software
complexity metrics. Their work respectively expounds
McCabe methods and C&K metric method for examples of
complexity metrics. They also introduced the software
metrics inclusive of the definition of metrics and the
history of this field; then brought up the complexity
metrics, such as McCabe complexity metrics and object
oriented metrics, with real world examples. C&K method
was brought up in 1994 by Chidamber and Kemerer.
Yuriy Brun, and Michael D. Ernst [5] have introduced a
technique for finding latent code errors via machine
learning over program executions. Their technique
proposes a technique for identifying program properties
that indicate errors. This technique generates machine
learning models of program properties known to result
from errors, and applies these models to properties of
programs of code written to classify and rank properties
that may lead the user to errors.
III. PROPOSED WORK
3.1 Proposed Algorithm
Input: Data Set, key1, key2.
Step 1. Generate Encrypted_Data Set using Encrypt (Data
Set, Key1, Key2).
Step 2. Apply k-means clustering (Data Set,
Encrypted_Data Set) and k-NN classification (Data Set,
Encrypted_Data Set).
Step 3. Compare the results of above two for correctness.
Step 4. Analyze mining results of the Data Set and
calculate Correlation_Coefficient (Data Set) between all
the attributes.
Step 5. If correlation coefficient weak  Remove
attributes.
Step 5. Apply k-means clustering and k-NN classification
again to get better results.
Output: Data Set_Class, Correlation_Coefficient.
Fig 3.1 Step wise block diagram of the proposed method.
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
26 Copyright © 2018. IJEMR. All Rights Reserved.
IV. EXPERIMENT AND RESULTS
The proposed method is tested by code profiling data of 25
software metrics and code coverage for 140 java codes.
Source codes are not mined directly in this work because it
is very complex to do that, that’s why we indirectly mined
them using their code profiling data. Some of the java
codes are written by us and some are taken from open
source libraries. For each java code we have generated 26
code profiling attributes, hence the database consists of
140 instances, each for code profiling data of a particular
code. We have generated this data by code profiling tools
namely Eclipse Metrics and CodePro Analytix. The
outputs generated by code profiling tools are as shown
below for a single java code.
Fig 4.1 Software metrics values generated by Eclipse Metrics tool
Fig 4.2 Code Coverage generated by CodePro Analytix tool
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
27 Copyright © 2018. IJEMR. All Rights Reserved.
As we can see this output is in GUI form and
cannot be directly mined. So we had to convert it into
concrete data form, so we extracted the XML file of this
data. Through JAXP (Java API for XML Processing) we
have converted this GUI data into actual data form and
saved it into MS Excel sheets. The privacy preserving data
mining techniques are applied on this data. Software
metrics are generated for the codes written in java using
these two tools. These tools generate output in GUI
(Graphical User Interface) format. Then we have extracted
XML file of this GUI format and through JAXP we have
extracted the software metrics values from XML file.
These values are saved as database for the codes and then
mining is applied on this database.
For preserving the privacy of code profiling data,
we have encrypted this data using simple encryption
algorithm with 2 keys. Then k-means clustering is applied
to create 5 clusters, on encrypted data as well as on actual
data. Comparison is made between both data for
confirming that privacy is preserved and at the same time
mining results do not vary.
After generating these clusters we know the class of each
instance. Through 10-fold cross validation and k-NN
classifier we have compared the actual and encrypted
results of classification technique. Privacy is preserved by
encryption and mining results are also very good and
correct. There is not any variation between actual and
encrypted data results. We analyzed these clusters with the
properties of our data and found that the clusters are
majorly based on two attributes: Code Coverage and LOC.
We found that some clusters lie in unexpected clusters. For
example, we made inheritance related codes and all of
them are in same clusters except one of them. Due to this
unexpected behavior of data we calculated correlation
coefficient between all the attributes of our dataset. For all
instances we calculated correlation coefficient for various
important attributes, then we removed all those attributes
which are not correlated positively and again clustering is
performed for better results with more accuracy and
precision. On analyzing we found that on removing weakly
correlated data, we improved the clustering method but at
the same time classifier’s accuracy is decreased.
Fig 4.3 Comparison graph between clusters before vs. after
So, it can be concluded that by removing weakly
correlated attributes of code profiling data we can improve
the clustering but at the same time they are resulting into
decrease in accuracy of classifier.
V. CONCLUSION AND FUTURE
SCOPE
We have pre processed 140 java codes to generate
their code profiling data using code profiling tools such as,
CodePro Analytix and Eclipse Metrics. After that we have
converted this GUI data through JAXP in the actual data
form. That’s how we get our pre processed database on
which we have applied privacy preserving mining. For
preserving privacy of this data we have applied encryption
technique on this data and generated its encrypted form.
Then we have applied k-means clustering and 10-fold
cross validation to find accuracy of k-NN classifier on this
data through Euclidean distance and analyzed the results
thereafter.
Privacy preserving mining is still an emerging
research area in the field of software engineering. Various
organizations have enormous amount of sensitive data
about their projects which can be mined to get knowledge
for future improvement in this field. Software generates
huge amount of data which can be mined to discover
knowledge. So, different combinations of encryption
0 50 100 150
A
B
C
D
E
Number of Instances
(After)
Number of Instances
(Before)
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
28 Copyright © 2018. IJEMR. All Rights Reserved.
methods and classification methods can be used to
improve the accuracy of privacy preserving mining in code
profiling data.
REFERENCES
[1] Quinn Taylor & Christophe Giraud-Carrier. (2010).
Applications of data mining in software engineering.
International Journal of Data Analysis Techniques and
Strategies, 2(3), 243-257.
[2] Antal, P., Fannes, G., Timmerman, D., Moreau, Y., &
De Moor, B. (2003). Bayesian applications of belief
networks and multilayer perceptrons for ovarian tumor
classification with rejection. Artificial Intelligence in
Medicine, 29, 39-60.
[3] Jian Wang, Yongcheng Luo, Yan Zhao, & Jiajin Le.
(2009). A survey on privacy preserving data mining. In 1st
International Workshop on Database Technology and
Applications, 111-114.
[4] Tu Honglei, Sun Wei, & Zhang Yanan. (2009). The
research on software metrics and software complexity
metrics. In International Forum on Computer Science-
Technology and Applications, 131-136.
[5] Yuriy Brun & Michael D. Ernst. (2004). Finding latent
code errors via machine learning over program executions.
In 26th
International Conference on Software Engineering
(ICSE), 480-490.
[6] R. Mitchell & R. Chen. (2014). Adaptive intrusion
detection of malicious unmanned air vehicles using
behavior rule specifications. IEEE Transactions on
Systems, Man, and Cybernetics: Systems, 44(5), 593–604.
[7] A.V.Krishna Prasad & Dr. S.Rama Krishna. (2010).
Data mining for secure software engineering – Source
code management tool case study. International Journal of
Engineering Science and Technology, 2(7), 2667-2677.

More Related Content

What's hot

Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
IJECEIAES
 
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET Journal
 
Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm
Bryan Guibijar
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET Journal
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
Amélie Gyrard
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
Ulf Mattsson
 
H1803044651
H1803044651H1803044651
H1803044651
IOSR Journals
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
Conference Papers
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IJECEIAES
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
IRJET Journal
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
 
Conducting Security Metrics for Object-Oriented Class Design
Conducting Security Metrics for Object-Oriented Class DesignConducting Security Metrics for Object-Oriented Class Design
Conducting Security Metrics for Object-Oriented Class Design
IJCSIS Research Publications
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW
Yayah Zakaria
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
Conference Papers
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET Journal
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
IRJET Journal
 
G1803044045
G1803044045G1803044045
G1803044045
IOSR Journals
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET Journal
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
Amélie Gyrard
 

What's hot (20)

Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
IRJET- Enhancement of 128-Bits Data Security through Steganography and Crypto...
 
Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm Usability of developed multiple file encryption using rijndael algorithm
Usability of developed multiple file encryption using rijndael algorithm
 
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
H1803044651
H1803044651H1803044651
H1803044651
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Conducting Security Metrics for Object-Oriented Class Design
Conducting Security Metrics for Object-Oriented Class DesignConducting Security Metrics for Object-Oriented Class Design
Conducting Security Metrics for Object-Oriented Class Design
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
 
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...IRJET-  	  Design an Approach for Prediction of Human Activity Recognition us...
IRJET- Design an Approach for Prediction of Human Activity Recognition us...
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
 
G1803044045
G1803044045G1803044045
G1803044045
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 

Similar to Privacy Preserving Mining in Code Profiling Data

Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
ijitjournal
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.doc
praveena06
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
ijdmtaiir
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
Digital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge GuideDigital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge Guide
feriuyolasyolas
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption DevelopmentRijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
ijtsrd
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
 
Phishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelPhishing Detection using Decision Tree Model
Phishing Detection using Decision Tree Model
IRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of Data
IRJET Journal
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET Journal
 
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptxGEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
Geetha982072
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
IOSR Journals
 
Malware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniquesMalware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniques
Md. Shohel Rana
 

Similar to Privacy Preserving Mining in Code Profiling Data (20)

Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
 
V1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.docV1_I2_2012_Paper3.doc
V1_I2_2012_Paper3.doc
 
Improvement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining TechniquesImprovement of Software Maintenance and Reliability using Data Mining Techniques
Improvement of Software Maintenance and Reliability using Data Mining Techniques
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
Digital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge GuideDigital Twin: A Complete Knowledge Guide
Digital Twin: A Complete Knowledge Guide
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption DevelopmentRijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Phishing Detection using Decision Tree Model
Phishing Detection using Decision Tree ModelPhishing Detection using Decision Tree Model
Phishing Detection using Decision Tree Model
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of Data
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
 
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptxGEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
Malware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniquesMalware analysis on android using supervised machine learning techniques
Malware analysis on android using supervised machine learning techniques
 

More from Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Dr. Amarjeet Singh
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
Dr. Amarjeet Singh
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Dr. Amarjeet Singh
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Dr. Amarjeet Singh
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Dr. Amarjeet Singh
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
Dr. Amarjeet Singh
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
Dr. Amarjeet Singh
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
Dr. Amarjeet Singh
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
Dr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Dr. Amarjeet Singh
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Dr. Amarjeet Singh
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Dr. Amarjeet Singh
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Dr. Amarjeet Singh
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
Dr. Amarjeet Singh
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Dr. Amarjeet Singh
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Dr. Amarjeet Singh
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
Dr. Amarjeet Singh
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
Dr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

Privacy Preserving Mining in Code Profiling Data

  • 1. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 24 Copyright © 2018. IJEMR. All Rights Reserved. Volume-8, Issue-5, October 2018 International Journal of Engineering and Management Research Page Number: 24-28 DOI: doi.org/10.31033/ijemr.8.5.5 Privacy Preserving Mining in Code Profiling Data Meenakshi Kathayat Assistant Professor, Department of Computer Science & Engineering, Birla Institute of Applied Sciences Bhimtal, Uttarakhand, INDIA Corresponding Author: meenakshik.kathayat4@gmail.com ABSTRACT Privacy preserving data mining is an important issue nowadays for data mining. Since various organizations and people are generating sensitive data or information these days. They don’t want to share their sensitive data however that data can be useful for data mining purpose. So, due to privacy preserving mining that data can be mined usefully without harming the privacy of that data. Privacy can be preserved by applying encryption on database which is to be mined because now the data is secure due to encryption. Code profiling is a field in software engineering where we can apply data mining to discover some knowledge so that it will be useful in future development of software. In this work we have applied privacy preserving mining in code profiling data such as software metrics of various codes. Results of data mining on actual and encrypted data are compared for accuracy. We have also analyzed the results of privacy preserving mining in code profiling data and found interesting results. Keywords-- Privacy preserving data mining, Code Profiling, Correlation coefficient I. INTRODUCTION Software systems are mainly complex and hard to conceptualize. This complexity, compounded by complicated dependencies and different programming practices, slows development and maintenance activities, leads to faults and defects and finally increases the cost of software [1]. Software engineering activities generate a huge amount of data that, if harnessed properly through data mining techniques, can help provide awareness into many parts of software development processes. Privacy preserving data mining is important because of the huge amount of personal data generated nowadays. Privacy preserving is an important issue in the data mining field. Many applications are benefited from data sharing, mainly data statistics and data mining. But the shared data may contain private information of the owner of data. It has a high risk of revealing data owner’s privacy [2]. Most of the times people are not interested in sharing their private data, they either not share their data or provide incorrect data. Due to this problem in data collection phase, the results of data mining techniques gets affected, which is based on sufficient amounts of accurate data for producing meaningful results or knowledge. Privacy preserving data mining (PPDM) has become increasingly popular because it allows sharing of private data for analysis purposes [3]. Code profiling is a form of dynamic program analysis that measures, for example, the space (memory) or time complexity of a program, the use of particular instructions, or the frequency and duration of function calls. Code profiling data of software can tell us about its various attributes regarding its nature and performance and is very important. It is a form of dynamic program analysis that measures, for example, the space (memory) or time complexity of a program, the use of particular instructions, or the frequency and duration of function calls. There are various software metrics which can come in code profiling data. In software engineering, program profiling or software profiling is a form of dynamic program analysis (as opposed to static code analysis) or the examination of a program’s behavior by gathered information as the program executes. The usual purpose of this analysis is to determine the sections of a program needed to optimize - to increase its overall speed, decrease its memory requirement or sometimes both. In this work Code profiling data of a project or code is very important to an organization. If it wants to mine this data without risking its privacy then privacy preserving mining is the best option for that purpose. We have taken various software metrics as code profiling data. Using this we create a model by learning existing successful project’s software metrics and then for a new project we can predict the value of an unknown metrics
  • 2. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 25 Copyright © 2018. IJEMR. All Rights Reserved. based on the generated model. This can help an organization in 2 aspects-First, the privacy of the code profiling data is preserved. Second, we can predict unknown attribute for a new project using a model based on successful projects and we can know the shortcomings of the new project on that basis. II. LITERATURE REVIEW Jian Wang, Yongcheng Luo, Yan Zhao, and Jiajin Le [3] have proposed a survey on privacy preserving data mining. They have described several privacy preserving data mining technologies clearly and then analyzed the merits and shortcomings of these technologies. They have discussed K-anonymity, the perturbation approach, Cryptographic techniques. They have suggested to use the Randomized Response techniques to solve the DTPD problem and introduced a condensation approach, which creates constrained clusters in the data set, and then generates pseudo-data from the statistics of these clusters. Pan Yang, Xiaolin Gui, Feng Tian, Jing Yao, and Jiancai Lin [2] have proposed a privacy-preserving data obfuscation scheme used in data statistics and data mining. Yuriy Brun, and Michael D. Ernst [6] have introduced a technique for finding latent code errors via machine learning over program executions. Their technique proposes a technique for identifying program properties that indicate errors. This technique generates machine learning models of program properties known to result from errors, and applies these models to properties of programs of code written to classify and rank properties that may lead the user to errors. Quinn Taylor, and Christophe Giraud-Carrier [9] have introduced applications of data mining in software engineering. Since software engineering activities are very complex, and the related activities often produce a large number and variety of artefacts, so that they are well-suited to data mining. Recent years have seen an increase in the use of data mining techniques on such artefacts with the aim of analysing as well as improving software processes for a given organisation or project. Tu Honglei, Sun Wei, and Zhang Yanan [4] have done a research on software metrics and software complexity metrics. Their work respectively expounds McCabe methods and C&K metric method for examples of complexity metrics. They also introduced the software metrics inclusive of the definition of metrics and the history of this field; then brought up the complexity metrics, such as McCabe complexity metrics and object oriented metrics, with real world examples. C&K method was brought up in 1994 by Chidamber and Kemerer. Yuriy Brun, and Michael D. Ernst [5] have introduced a technique for finding latent code errors via machine learning over program executions. Their technique proposes a technique for identifying program properties that indicate errors. This technique generates machine learning models of program properties known to result from errors, and applies these models to properties of programs of code written to classify and rank properties that may lead the user to errors. III. PROPOSED WORK 3.1 Proposed Algorithm Input: Data Set, key1, key2. Step 1. Generate Encrypted_Data Set using Encrypt (Data Set, Key1, Key2). Step 2. Apply k-means clustering (Data Set, Encrypted_Data Set) and k-NN classification (Data Set, Encrypted_Data Set). Step 3. Compare the results of above two for correctness. Step 4. Analyze mining results of the Data Set and calculate Correlation_Coefficient (Data Set) between all the attributes. Step 5. If correlation coefficient weak  Remove attributes. Step 5. Apply k-means clustering and k-NN classification again to get better results. Output: Data Set_Class, Correlation_Coefficient. Fig 3.1 Step wise block diagram of the proposed method.
  • 3. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 26 Copyright © 2018. IJEMR. All Rights Reserved. IV. EXPERIMENT AND RESULTS The proposed method is tested by code profiling data of 25 software metrics and code coverage for 140 java codes. Source codes are not mined directly in this work because it is very complex to do that, that’s why we indirectly mined them using their code profiling data. Some of the java codes are written by us and some are taken from open source libraries. For each java code we have generated 26 code profiling attributes, hence the database consists of 140 instances, each for code profiling data of a particular code. We have generated this data by code profiling tools namely Eclipse Metrics and CodePro Analytix. The outputs generated by code profiling tools are as shown below for a single java code. Fig 4.1 Software metrics values generated by Eclipse Metrics tool Fig 4.2 Code Coverage generated by CodePro Analytix tool
  • 4. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 27 Copyright © 2018. IJEMR. All Rights Reserved. As we can see this output is in GUI form and cannot be directly mined. So we had to convert it into concrete data form, so we extracted the XML file of this data. Through JAXP (Java API for XML Processing) we have converted this GUI data into actual data form and saved it into MS Excel sheets. The privacy preserving data mining techniques are applied on this data. Software metrics are generated for the codes written in java using these two tools. These tools generate output in GUI (Graphical User Interface) format. Then we have extracted XML file of this GUI format and through JAXP we have extracted the software metrics values from XML file. These values are saved as database for the codes and then mining is applied on this database. For preserving the privacy of code profiling data, we have encrypted this data using simple encryption algorithm with 2 keys. Then k-means clustering is applied to create 5 clusters, on encrypted data as well as on actual data. Comparison is made between both data for confirming that privacy is preserved and at the same time mining results do not vary. After generating these clusters we know the class of each instance. Through 10-fold cross validation and k-NN classifier we have compared the actual and encrypted results of classification technique. Privacy is preserved by encryption and mining results are also very good and correct. There is not any variation between actual and encrypted data results. We analyzed these clusters with the properties of our data and found that the clusters are majorly based on two attributes: Code Coverage and LOC. We found that some clusters lie in unexpected clusters. For example, we made inheritance related codes and all of them are in same clusters except one of them. Due to this unexpected behavior of data we calculated correlation coefficient between all the attributes of our dataset. For all instances we calculated correlation coefficient for various important attributes, then we removed all those attributes which are not correlated positively and again clustering is performed for better results with more accuracy and precision. On analyzing we found that on removing weakly correlated data, we improved the clustering method but at the same time classifier’s accuracy is decreased. Fig 4.3 Comparison graph between clusters before vs. after So, it can be concluded that by removing weakly correlated attributes of code profiling data we can improve the clustering but at the same time they are resulting into decrease in accuracy of classifier. V. CONCLUSION AND FUTURE SCOPE We have pre processed 140 java codes to generate their code profiling data using code profiling tools such as, CodePro Analytix and Eclipse Metrics. After that we have converted this GUI data through JAXP in the actual data form. That’s how we get our pre processed database on which we have applied privacy preserving mining. For preserving privacy of this data we have applied encryption technique on this data and generated its encrypted form. Then we have applied k-means clustering and 10-fold cross validation to find accuracy of k-NN classifier on this data through Euclidean distance and analyzed the results thereafter. Privacy preserving mining is still an emerging research area in the field of software engineering. Various organizations have enormous amount of sensitive data about their projects which can be mined to get knowledge for future improvement in this field. Software generates huge amount of data which can be mined to discover knowledge. So, different combinations of encryption 0 50 100 150 A B C D E Number of Instances (After) Number of Instances (Before)
  • 5. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 28 Copyright © 2018. IJEMR. All Rights Reserved. methods and classification methods can be used to improve the accuracy of privacy preserving mining in code profiling data. REFERENCES [1] Quinn Taylor & Christophe Giraud-Carrier. (2010). Applications of data mining in software engineering. International Journal of Data Analysis Techniques and Strategies, 2(3), 243-257. [2] Antal, P., Fannes, G., Timmerman, D., Moreau, Y., & De Moor, B. (2003). Bayesian applications of belief networks and multilayer perceptrons for ovarian tumor classification with rejection. Artificial Intelligence in Medicine, 29, 39-60. [3] Jian Wang, Yongcheng Luo, Yan Zhao, & Jiajin Le. (2009). A survey on privacy preserving data mining. In 1st International Workshop on Database Technology and Applications, 111-114. [4] Tu Honglei, Sun Wei, & Zhang Yanan. (2009). The research on software metrics and software complexity metrics. In International Forum on Computer Science- Technology and Applications, 131-136. [5] Yuriy Brun & Michael D. Ernst. (2004). Finding latent code errors via machine learning over program executions. In 26th International Conference on Software Engineering (ICSE), 480-490. [6] R. Mitchell & R. Chen. (2014). Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 44(5), 593–604. [7] A.V.Krishna Prasad & Dr. S.Rama Krishna. (2010). Data mining for secure software engineering – Source code management tool case study. International Journal of Engineering Science and Technology, 2(7), 2667-2677.