International Journal of Recent Technology and Engineering (IJRTE), 2019
Pattern mining is a technique, which discovers interesting, hidden, unpredicted and useful patter... more Pattern mining is a technique, which discovers interesting, hidden, unpredicted and useful patterns of data from the database. Most of the research work in pattern mining has been focused on the traditional way of Frequent Itemset Mining (FIM) and Association Rule Mining (ARM) for pattern-discovery. Patterns in frequent itemset mining are based on the occurrence frequency of items. Although frequent pattern mining is useful, the assumption that ‘frequent patterns are interesting,’ doesn’t hold for numerous applications. High Utility Itemset Mining (UIM) overcomes this limitation of frequent itemset mining. The aim of HUIM is to find the patterns based on a utility function where the utility can be measured in terms of revenue, profit, weight, frequency, interestingness or time spent on some webpage, etc. Mining patterns with high utility can be seen as a generalization of FIM where the transaction database is the input and every item is having a utility factor representing its impor...
International Journal of Advanced Research in Computer Science
Software testing is a prominent area of research as it ensures the quality and reliability of the... more Software testing is a prominent area of research as it ensures the quality and reliability of the software. Testing an aspect-oriented software is also the latest area of research. Although, research in aspect-oriented software testing has reported a couple of new testing techniques. But, there is no work yet indicated in the literature as studied, to focus on the relationship of aspect-oriented software testing techniques with traditional software testing techniques. Therefore, this position paper handles this shortcoming and presents the basic concepts of aspect-oriented programming, phases of aspect-oriented software development life cycle and testing phases for new researchers to gather the information on the subject. This paper also presents comprehensive details about the relationship of aspect-oriented software testing techniques with other traditional testing techniques.
Software metrics are used to assess and improve the quality of Software Product. Class Cohesion i... more Software metrics are used to assess and improve the quality of Software Product. Class Cohesion is degree of relatedness of class members and important measurement attribute of quality of a software product. But most of the existing cohesion tools and approaches do not consider inherited elements. But to measure overall design of product it is necessary to include all inherited elements. In this paper we calculate all existing metrics on implemented elements as well as on inherited elements to measure quality of design.
Today software system is an integral part of each and every business model, be it core product ma... more Today software system is an integral part of each and every business model, be it core product manufacturing, banking, healthcare, insurance, aviation, hospitality, social networking, shopping, e-commerce, education or any other domain. If any business has to be leveraged and simplified then software has to be integrated with the main stream business of any organization. Designing and development of any software system requires huge capital, a lot of time, intellectuals, domain expertise, tools and infrastructure. Though the software industry has matured quiet a lot in past decade, however percentage of software failure has also increased, which led to the loss of capital, time, good-will, loss of information and in some cases severe failures of critical applications also lead to the loss of lives. Software could fail due to faults injected in various stages of software or product development life cycle starting from project initiation until deployment. This paper describes the case...
Journal of emerging technologies and innovative research, 2018
This effort shows the idea to avoid collision among vehicles in rural zones with the help of Inte... more This effort shows the idea to avoid collision among vehicles in rural zones with the help of Internet. It furnishes the diverse situations with development of vehicles. It considers the issue of crash shirking at vehicular crossing points for an arrangement of vehicles that are connected by remote correspondence. The security of driver is turning into a critical issue in the present time. The task is to diminish number of injuries on our roadways by collision. For this, it presents a controlling element utilizing approach of fuzzy logic for controlling the development of vehicles that keeps up a separation between vehicles. The fundamental piece of the work is to complete a practicality consider on vehicle crash evasion framework utilizing remote correspondence. The issue has real necessities: wellbeing, i.e. vehicular crashes must be dodged; non-blockingness, i.e. vehicles did not ought gridlock and must achieve their last goals, which for this situation implies they should totally...
Cloud computing has become an integral part of IT industry. As it becomes prevalent, more and mor... more Cloud computing has become an integral part of IT industry. As it becomes prevalent, more and more sensitive information are being centralized in the cloud. A user stores his files in a cloud, and retrieves them whenever he wants to use them. This avoids the cost of maintaining as there is no need to personally install them on one’s computer. But there is an extreme need for privacy of the data and the ability to search it without losing privacy. The users search their documents through keyword in plaintext. There is a cloud service provider (CSP), whose purpose is to provide more and more security and privacy. To keep user data confidential against an unfrosted CSP, an easy way is to apply cryptographic approaches, by disclosing the data decryption key only to authorized users. Thus the keyword privacy is maintained. In this paper, we define different types of keyword searching techniques.
Objectives: To make comparative performance evaluation of "BA-TPF" technique for regression test ... more Objectives: To make comparative performance evaluation of "BA-TPF" technique for regression test case optimization on "Online Shopping", "Order Management", "ATM System" and "Telephone System". Methods: "BA-TPF" focuses on generation of optimized test sequences using bat algorithm and then producing the optimized and prioritized test suite by calculating the prioritized test suite possessing the highest path fitness. This study carries out the comparative evaluation of the recently proposed "BA-TPF" technique for optimized test sequence generation and prioritization. Three metrics namely TCP ("Test Suite Percentage required for Complete Path Coverage"), PRT ("Percentage of Repeated Transitions") and APPC ("Average Percentage of Path Covered") have been used for performance measurement of the proposed technique. Findings: The proposed technique "BA-TPF" demonstrates its competence on all the three parameters. It could achieve highest path coverage with minimized repetitions and minimized test suite in comparison to contemporary techniques for regression test optimization. Improvements: This approach basically generates the test path sequences using the bat algorithm and then calculates the test path fitness on the generated sequences. The prioritized test sequences are generated by arranging the test sequences in descending order from highest to lowest path fitness values.
International Journal of Engineering and Technology, 2017
Nowadays, Aspect-Oriented Programming paradigm (AOPP) is getting a lot of popularity because it i... more Nowadays, Aspect-Oriented Programming paradigm (AOPP) is getting a lot of popularity because it is capable to handle all concerns which are required for developing complex software. In order to develop complex software, AOPP provides new constructs such as join-points, pointcuts, advices etc. These constructs bring new types of programming faults such as incorrect strength of pointcuts, incorrect advice type and incorrect order of aspect precedence etc. In this paper, a tool is developed for generating the automated test case sequences which is based on UML integrated activity diagram and also verifies the execution of the selected test sequences. The proposed approach is based on several coverage criterion such as action path coverage criteria, modified advice type coverage criteria and incorrect-aspects precedence coverage criteria.
International Journal of Computer Applications, 2016
Mobile ad hoc networks(MANETs) is an infrastructure-less dynamic network consisting of collection... more Mobile ad hoc networks(MANETs) is an infrastructure-less dynamic network consisting of collection of wireless mobile nodes that communicate with each other without using any centralized authority. MANETs are considered vulnerable to several kinds of security attacks like worm-hole attacks, black hole attacks, denial-of-service attacks and rushing attack etc. The routing protocol specifies a set of rules using which routers in network share information with each other and report updates to neighbourhood routers. The routing protocol enables a network to make dynamic adjustment to its conditions. Moreover, routing decisions need not to be predetermined and static. Different security mechanisms have been developed by numerous researchers so far in order to prevent such security threats in a network. In this regard, this paper discusses the existing security mechanisms and routing protocols in Mobile Ad-hoc Network in detail.
Objectives: The novel test case prioritization technique "m-ACO" ("Modified Ant Colony Optimizati... more Objectives: The novel test case prioritization technique "m-ACO" ("Modified Ant Colony Optimization") for regression testing has been comparatively evaluated. Methods: "m-ACO" prioritize the test cases by altering the food source selection criteria of natural ants to enhance fault diversity. The code for the proposed technique for prioritizing test case "m-ACO" has been implemented in Perl language. This paper makes a comparative evaluation of proposed "m-ACO" technique for prioritization of test cases with GA ("Genetic Algorithm"), BCO ("Bee Colony Optimization") Algorithms and ACO ("Ant Colony Optimization") Algorithms using three case studies. Two metrics namely APFD ("Average Percentage of Faults Detected") and PTR ("Percentage of Test Suite Required for Complete Fault Coverage") have been used to measure the effectiveness of the proposed "m-ACO" technique. Findings: The proposed technique "m-ACO" produced optimal or near optimal solutions. The proposed "m-ACO" technique proves its efficiency in comparison to GA, BCO and ACO methods individually. Improvements: The proposed technique improves the ACO method by altering food source selection criteria of natural ants. The future work in this direction will comparatively evaluate the proposed "m-ACO" technique using some well known software testing problems and open source software. An automated tool for the proposed technique is being developed.
International Journal of Computer Applications, 2015
An era has come where technology plays a very dominant role in every one's life. Communication is... more An era has come where technology plays a very dominant role in every one's life. Communication is one such aspect which is crucial for any business to flourish on day to day basis. An upcoming trend changer in terms of technology is Big Data technology which makes the organizations achieve competitive edge over others through big data which helps in exploiting values from available data. All organizations prefer networking system for communicating with their consumers or clients at a faster rate compared to earlier years and achieve success in dynamic environment. This requires an infrastructure that can manage exploding volumes of unstructured and structured data in rest as well as in motion and protect data privacy and security. Most critical aspect of big data technology lies in security. Leak of security can prove to be dangerous for any business success considering data confidentiality.
While quantum dots (QDs) are useful as fluorescent labels, their application in biosciences is li... more While quantum dots (QDs) are useful as fluorescent labels, their application in biosciences is limited due to the stability and hydrophobicity of their surface. In this study, we tested two types of proteins for use as a cover for spherical QDs, composed of cadmium selenide. Pumilio homology domain (Puf), which is mostly α-helical, and leucine-rich repeat (LRR) domain, which is rich in β-sheets, were selected to determine if there is a preference for one of these secondary structure types for nanoparticle covers. The protein sequences were optimized to improve their interaction with the surface of QDs. The solubilization of the apoproteins and their assembly with nanoparticles required the application of a detergent, which was removed in subsequent steps. Finally, only the Puf-based cover was successful enough as a QD hydrophilic cover. We showed that a single polypeptide dimer of Puf, PufPuf, can form a cover. We characterized the size and fluorescent properties of the obtained QD:protein assemblies. We showed that the secondary structure of the Puf proteins was not destroyed upon contact with the QDs. We demonstrated that these assemblies do not promote the formation of reactive oxygen species during illumination of the nanoparticles. The data represent advances in the effort to obtain a stable biocompatible cover for QDs.
Objectives: Algorithms analogous to the natural processes have been employed to optimize the faul... more Objectives: Algorithms analogous to the natural processes have been employed to optimize the fault detection efficiency and reduce software testing time. Test case selection for software testing is the most critical and time consuming part as exhaustive software testing is not possible. Recently, a novel compound technique BCO-m-GA for test case selection has been proposed based on non-sequential combination of stratified sampling, BCO (Bee Colony Optimization) and GA (Genetic Algorithm). This paper makes a performance evaluation of the proposed BCO-m-GA technique. Methods: This paper attempts to analyse the performance of the BCO-m-GA technique for test case selection against individual non-compounded algorithms GA and BCO. Findings: The results underline the improved performance of BCO-m-GA in comparison to GA and BCO in terms of differential of number of Decision Nodes Covered (DNC) and rate of change of Fitness Score (FS) of the optimal solution. Improvements: The insights obtained in this study would help researchers in improved framing of test case selection procedures.
International Journal of Computer Applications, 2013
Software testing is the most important phase of software development life cycle which ensures the... more Software testing is the most important phase of software development life cycle which ensures the quality of software systems. This paper proposes a novel approach for generation of test cases from "Unified Modeling Language" (UML). The Test Case Selection and Reduction is done by using Stratified Sampling, Bee Colony Optimization and Genetic Algorithm. This aims to save cost, time and effort by efficiently minimizing the test suite to ensure maximum coverage. We have applied this technique to a module of a Card Administration System project taken from Software Company. The result shows that the proposed approach effectively detects all the flaws by covering all possible paths of the system. The proposed software testing technique (BCO-mGA) ensures maximum coverage in minimum possible timeframe by executing the final minimized test suite.
International Journal of Computer Applications, 2012
Software Testing is an important area of research in the field of software engineering because it... more Software Testing is an important area of research in the field of software engineering because it is the deciding factor for successful project release and directly proportion to software quality and reliability. A lot of research has been already done in this field, likely to be leveraged in future as software has become integral part of each and every domain to make it faster, easier and smarter. Software testing is regarded as the most important phase of software development process, as without testing it is impossible to diagnose errors. This paper explains the phases, principles and limitations of software testing. We tried to accumulate principles after detailed analysis of phases of testing, based on available methodologies, users involved & importance of software testing. All the terms which are considered as building blocks of software testing are discussed in this paper to enhance the overall quality of a system and to ensure successful project release.
International Journal of Computer Applications, 2014
Mobile adhoc network is self configurable and adaptive. Due to node mobility we cannot predict lo... more Mobile adhoc network is self configurable and adaptive. Due to node mobility we cannot predict load on the network which leads to congestion, one of the widely researched area in manets. A lot of congestion control techniques and metrics have been proposed to overcome it before its occurrence or after it has occurred. In this survey we identify the currently used congestion control metrics. Through this survey we also propose a congestion control metric RFR(resource free ratio) which considers the three most important parameters to provide congestion free route discovery. Further we show the results of node selection based on fuzzy logic calculations using the proposed metric.
Impact of m-ACO-Based Test Suite Prioritization on Software Quality
Algorithms for Intelligent Systems, 2021
Meeting the customer’s expectations and delivering quality software are the utmost important and ... more Meeting the customer’s expectations and delivering quality software are the utmost important and crucial task for software development organizations. The performance and quality of testing ultimately affect the quality of the developed software. Regression testing occupies a significant portion of the entire software testing life cycle. Regression testing is even considered a necessary evil by the researchers as it consumes more than fifty percent of the time and resources required for software development. Recently, authors have formulated the “m-ACO” technique for prioritizing the test suite for regression testing. The projected m-ACO technique enriches the ACO-based test suite prioritization by fluctuating the selection procedure employed by natural ants in ACO. Performance analysis of m-ACO demonstrates its efficacy in terms of improved fault discovery rate and improved fault diversity among captured faults. This paper discusses the impact of the m-ACO technique on software quality of large and medium-size software modules.
Utility Itemset Mining (UIM) is a fundamental technique to find out various itemsets with interes... more Utility Itemset Mining (UIM) is a fundamental technique to find out various itemsets with interestingness measures in addition to their quantity. It helps in finding valuable items that cannot be tracked with frequent itemset mining. There are many techniques to mine the itemsets based on their utilities, but the need of the hour is to mine them from larger datasets. This paper presents a brief overview of various approaches for utility mining, which mine using the parallel framework to enhance the pace of computation. The paper is concluded with a discussion on various challenges and openings in the field of parallel mining and provides away for further development of the prevailing methodologies of big data.
Uploads
Papers by Sandeep Dalal