A Comparative Study of Software Metrics for Analysis and Its Impact on Predictability
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.134-138, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.134138
Abstract
Quality assurance is one of the important non-functional software requirements which many software products fail to satisfy. Current software market is driven mostly by urgency and competition. One of the methods to ensure software quality is a metrics-based approach. Software metrics have been used to quantitatively evaluate software products. Software metrics play an important role in developing high quality software as well as to improve the developer’s productivity. Metrics can help quantify previous work in a way that can directly guide future efforts. For example, projects of different sizes can require vastly different levels of effort, organizational structure, and management discipline. There is an increasing need for metrics adapted to the Object-Oriented (OO) paradigm to help manage and foster quality in software development. Object-oriented design patterns are an emergent technology: they are reusable micro-architectures, high level building blocks. A major benefit of object-oriented software development is the support for reuse provided by object-oriented and object-based languages. The usefulness of metrics is reviewed. The reliability is one of the most important attributes of software quality. The presumed objective of the estimation of the reliability consists in the analysis of the risk and of the reliability of the software-based systems. This paper presents the study of different suite in object-oriented (OO) design metric.
Key-Words / Index Term
Software metrics; Object-oriented; MOOD; CK metric
References
[1] W. Li and S. Henry, “ Maintenance Metrics for the Object-Oriented Paradigm”, In Proceedings of the First International Software Metrics Symposium, Baltimore Maryland, pp. 52-60, 1993.
[2] L. Etzkorn, J. Bansiya, C. Davis, “Design and Code Complexity Metrics for OO Classes”, Journal of Object- Oriented Programming, pp. 35-40, 1999.
[3] K. K. Aggarwal, Y. Singh, A. Kaur, R. Malhotra, “Software Reuse Metrics for Object - Oriented Systems”, In Proceedings of ACIS Third International conference on Software Engineering Research, Management and Applications, 2005.
[4] P. Gandhi, P. K. Bhatia, “Reusability Metrics for Object - Oriented System: An Alternative Approach”, International Journal of Software Engineering (IJSE), Vol. 1, No 4, pp. 63 – 72, 2010.
[5] Taylor, D. (1992): Object-Oriented Information Systems: Planning and Implementation. New York, US: John Wiley & Sons, Inc.
[6] W. Frakes and C. Terry, “Reuse Level Metrics”, Proceedings of the 3rd International Conference on Software Reuse: Advances in Software Reusability, IEEE, 1994.
[7] J. Guo, Luqui, “A Survey of Software Reuse Repositories”, 7th IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 92-100, 2000.
[8] Kaur, S. Singh and K. S. Kahlon, “Evaluation and Metrication of Object Oriented System”, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, I IMECS 2009, Hong Kong, 2009.
[9] Dr B.R. Sastry, M.V. Vijaya Saradhi, “Impact of software metrics on Object Oriented Software Development life cycle”, International Journal of Engineering Science and Technology, Vol. 2, No. 2, pg 67-76, 2010.
[10] Y. Singh, A. Kaur, R. Malhotra, “Software fault proneness prediction using support vector machines”, Proceedings of the World Congress on Engineering, vol. 1, pp. 1–3, 2009.
[11] G.J. Pai, J.B. Dugan, “Empirical analysis of software fault content and fault proneness using Bayesian methods”, IEEE Trans. Softw. Eng. 33 pp. 675–686, 2007.
[12] H.M. Olague, L.H. Etzkorn, S. Gholston, S. Quattlebaum, “Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes”, IEEE Trans. Software. Vol. 33, pp. 402–419.2007.
[13] Y. Zhou, H. Leung, “Empirical analysis of object-oriented design metrics for predicting high and low severity faults”, IEEE Transactions on software engineering, Vol. 32, pp. 771–789, 2006.
[14] R. Subramanyam and M.S. Krishnan, “Empirical Analysis of CK metrics for Object Oriented Design Complexity: Implications of Software defects”, IEEE transactions on Software Engineering, Vol. 29, No. 4, 2003.
[15] S.R.Chidamber and C.F.Kemerer. “A metrics suite for object oriented design”. IEEE Transactions on Software Engieneering, pp. 476 – 493, 1994.
Citation
G.Yamini, Gopinath Ganapathy, "A Comparative Study of Software Metrics for Analysis and Its Impact on Predictability," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.134-138, 2019.
Software Effort Estimation Techniques
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.139-142, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.139142
Abstract
One of the major concern of every software organization is software effort estimation. As size and complexity of software increases, it becomes very difficult to estimate the cost of efforts needed to built the software. This has attracted many researchers. Software estimation techniques applied by some of them gave good results and some did the opposite but none of the techniques has given accurate results in every situation. This paper focuses on literature review on research studies done in this field in the past few years. Comparative analysis of those techniques is also done.
Key-Words / Index Term
Delphi, COCOMO, Neural network, k-nearest tree, Regression tree
References
[1]. Ali BouNassif, Luiz Fernando Capretz Danny Ho “Software Estimation in the early stages of the software”:International conference on emerging Trends in computer science, communications and information technology nanded, Maharashtra, India,9-11 January 2010
[2]. Vu Nguyen “Improved sized and effort estimation models for software maintenance”:26th IEEE international conference on software maintenance in Timisoara, Romania 978-1-4244-8628-1/10/$26.00@2010 IEEE
[3]. MagneJørgensen and Martin Shepperd“ A Systematic Review of Software Development Cost Estimation Studies”:IEEE Transactions on Software Engineering, Vol,33 No.1, ISSN:2319-7323 Vol. 3 No.01 January 2007
[4]. Rosa,Wilson; Madachy,Ray; Boehma,Barry; Clark, Brad “Simple Empirical Software Effort Estimation Model”:ESEM’14, September 18-19,2014,Torino, Italy
[5]. Rshmachawala; Deepak Ahlawat, Mukesh kumar “Software Development effort Estimation Techniques: A Review”:“International Journal of Electronics communication and computer Engineering” volume 5,Issue 5, ISSN (online):2249-071X,ISSN(Print):2278-4209
[6]. AmidKhatrib, Bardsiri; Seyyed Mohsen Hashemi: “A Servey of Well-Know approaches”: International Journal of computer Science Engineering(IJCSE) ISSN:2319-7323,Vol.3 No.01 Jan. 2014
[7]. Mohammed Aljohani, Rizwan Qureshi: “Comparative Study of Software Estimation Techniques”: International Journal of Software Engineering & Applications (IJSEA), Vol.8, No.6, November 2017
[8]. KjetilMoløkken, MagneJørgensen: “A Review of Surveys on Software on Software Effort Estimation”:Proceedings of the 2003 International Symposium on Empirical Software Engineering (ISESE’03)0-7695-2002-2/03 $ 17.00 © 2003 IEEE
[9]. Jack E. Matson, Bruce E. Barrett, and Joseph M. Mellichamp; “Software Development Cost Estimation Using Function Points”;IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL.20,NO.4, APPRIL 1994
[10].Mehwish Nasir; “A Survey of Software Estimation Techniques and Project Planning Practices”:Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing SNPD’06) 0-7695-2611-X/06 $20.00 © 2006 IEEE
[11].Younghee Kim, Keumsuk Lee; “A Comparison of Techniques for Software Development Effort Estimating”:SYSTEM INTEGRATION 2005
[12]. KjetilMoløkken and MagneJørgensen: “A Review of Surveys on Software Effort Estimation”; Proceedings of the 2003 International Symposium on Empirical Software Engineering (ISESE’03) 0-7695-2002-2/03 $ 17.00 © 2003 IEEE
[13].P.KSuri, PallaviRanjan, “Comparative Analysis of Software Effort Estimation Techniques”: International Journal of Computer Applications (0975 – 8887) Volume 48– No.21, June 2012
[14]. HimaniRastogi; Swati Dhankar, “A Survey on Software Effort Estimation Techniques”: 5th International Conference- Confluence The Next Generation Information Technology Summit (Confluence) 978-1-4799-4236-7/14/$31.00_c 2014 IEEE
[15]. Tim Menzies, Zhihao Chen, JairusHihn and Karen Lum,: “Best Practices in Software Effort Estimation ”, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 1, NO. 1, JANUARY 1901 1
[16]. Om ParkashTalilor, Jyoti Saini, Mrs. PoonamRijwani: “Comparative Analysis of Software Cost and Effort Estimation Methods: A Review”; IJCSMC, Vol. 3, Issue. 4, April 2014, pg.1364 – 1374
Citation
Neeraj kumar, Yogesh kumar, Rahul Rishi, "Software Effort Estimation Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.139-142, 2019.
Multi-Path Routing Protocol to Control Congestion for Load Balancing in Mobile Adhoc Networks
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.143-147, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.143147
Abstract
The multi-path routing protocol is one of the approaches used to have less overhead, better bandwidth cost through the load distribution among a set of paths. However, due to the interference of the paths during the communication, it increases the end to end delay and do not work well under a highly congested network. We have proposed the congestion aware multi-path routing protocol with load balancing. The paper explains the problem associated with the end-to-end delay. It deals with the problem of channel interference during the Multi-path communication. It suggests the congestion control mechanisms to improve the protocol performance. It proposes an additive increase/ multiplicative decrease and fast retransmits and recovery process and also it suggest the algorithm for load balancing scheme. In order to minimize the congestion formation, it selects the node disjoint paths for communication. The correlation factor among the selected multiple paths are calculated. It calculates the congestion formation in the network. It compares the proposed MPR protocol with ordinary DSR through the simulation and the simulation results are discussed.
Key-Words / Index Term
Multi-Path Routing, Congestion, Correlation Factor, Load Balance, Disjoint Path
References
[1] Elizabeth M Royer., and Chai-Keong Toh. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, Apr. 2003, 46-55.
[2] Sung-Ju Lee and Mario Gerla, "Split Multipath Routing With Maximally Disjoint Paths in Ad Hoc Networks", Proceedings of IEEE ICC`01, June 2001, vol 10, 3201-3205.
[3] Ye, Z., Krishnamurthy, S.V., Tripathi, S.K.: A Framework for Reliable Routing in Mobile Ad Hoc Networks. IEEE INFOCOM 2003, vol 1, 270-280.
[4] Shekhar H. M. P. and K.S Ramanatha. Mobile Agents based Congestion Aware Routing in Mobile Ad Hoc Networks. In Proceedings of o IEE International Conference on "3G & Beyond", 3G 2005, November 2005), pp. 47-53.
[5] L. Shrivastava, S. S. Bhadoria, and G. S. Tomar, “A load-balancing approach for congestion adaptivity in MANET,” in Proceedings of the International Conference on Computational Intelligence and Communication Networks (CICN `11), pp. 32–36, October 2011.
[6] L. Shrivastava, S. S. Bhadauria, and G. S. Tomar, “Influence of traffic load on the performance of AODV, DSR and DSDV in MANET,” International Journal of Communication Systems and Network Technologies, vol. 1, no. 1, pp. 22–34, 2013.
[7] B. Ramesh and D. Manjula, “Congestion adaptive AODV routing protocol for streaming video in mobile ad hoc networks,” International Journal of Communications, Network and System Sciences, vol. 4, pp. 285–385, 2008.
[8] A. Valarmathi and R. M. Chandrasekaran, “Congestion aware and adaptive dynamic source routing algorithm with load-balancing in MANETs,” International Journal of Computer Applications, vol. 8, no. 5, article 1, 2010.
[9] A. Gaba, S. Voulgaris, and M. van Steen, “Towards congestion-aware all-to-all information dissemination in mobile ad-hoc networks,” in Proceedings of the 2010 IEEE Globecom Workshops (GC `10), pp. 1690–1695, Miami, Fla, USA, December 2010.
[10] S. Soundararajan and R. S. Bhuvaneswaran, “Adaptive multi-path routing for load balancing in mobile Ad Hoc networks,” Journal of Computer Science, vol. 8, no. 5, pp. 648–655, 2012.
[11] S. Jain, S. Kokate, P. Thakur, and S. Takalkar, “A study of congestion aware adaptive routing protocols in MANET,” Computer Engineering and Intelligent Systems, vol. 3, no. 4, p. 64, 2012.
Citation
M.V.Narayana, J Rajeshwar, "Multi-Path Routing Protocol to Control Congestion for Load Balancing in Mobile Adhoc Networks," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.143-147, 2019.
Finite Element Method to Study Elasto-Thermodiffusive Response inside a Hollow Cylinder with Three-Phase-Lag Effect
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.148-156, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.148156
Abstract
In this article, we deal with a problem of generalized elasto-thermo-diffusion interaction inside an isotropic hollow cylinder in the context of three-phase-lag model. Initially the medium is in rest and undisturbed so that all the state functions are assumed to be zero. Employing Laplace transform as a tool, the governing equations have been expressed in transformed domain, which are then solved by Galerkin finite element technique. The inversion of the transformed solution is carried out by applying a method of Bellman et al. The stresses, temperature, displacement, concentration and chemical potential are computed numerically and presented graphically in a number of figures for copper material. A comparative study for different theories (three-phase-lag model, Green-Naghdi model with energy dissipation and Lord-Shulman model) are presented. The results corresponding to thermoelastic medium (in absence of diffusion) are also carried out in a particular case. The significant points are highlighted.
Key-Words / Index Term
Thermoelastic diffusion, Three-phase-lag model, Green-Naghdi model, Lord-Shulman model, Galerkin finite element method
References
[1] W. Nowacki, “Dynamical problems of thermoelastic diffusion in solids I”, Bulletin of Polish Academy of Science and Technology, Vol.22, pp.55-64, 1974.
[2] W. Nowacki, “Dynamical problems of thermoelastic diffusion in solids II”, Bulletin of Polish Academy of Science and Technology, Vol.22, pp.129-135, 1974.
[3] W. Nowacki, “Dynamical problems of thermoelastic diffusion in solids II”, Bulletin of Polish Academy of Science and Technology, Vol.22, pp.257-266, 1974.
[4] W. Nowacki, “Dynamical problems of thermoelastic diffusion in elastic solids”, Proc Vib Prob, Vol.15, pp.105-128, 1974.
[5] H.W. Lord, Y. Shulman, “A generalized dynamical theory of thermoelasticity”, Journal of Mechanics and Physics of Solid, Vol.15, pp.299-309, 1967.
[6] H.H. Sherief, F.A. Hamza, H.A. Saleh, “The theory of generalized thermoelastic diffusion”,. International Journal of Engineering Science, Vol. 42, pp.591-608, 2004.
[7] H.H. Sherief, H.A. Saleh, “A half-space problem in the theory of generalized thermoelastic diffusion”, International Journal of Solids and Structure, Vol.42, pp.4484-4493, 2005.
[8] M. Aouadi, “Uniqueness and reciprocity theorems in the theory of generalized thermoelastic diffusion”, Journal of Thermal Stresses, Vol.30, pp.665-678, 2007.
[9] M. Aouadi, “A generalized thermoelastic diffusion problem for an infinitely long solid cylinder”, International Journal of Mathematics and mathematical sciences, Vol.2006, pp.1-15, 2006.
[10] M. Aouadi, “A problem for an infinite elastic body with a spherical cavity in the theory of generalized thermoelastic diffusion”, International Journal of Solids Structure, Vol.44, pp.5711-5722, 2007.
[11] D. Bhattacharya, M. Kanoria, “The influence of two temperature generalized thermoelastic diffusion inside a spherical shell”, International Journal of Engineering and Technical Research, Vo.2, Issue.5, pp.151-159, 2014.
[12]A.A. Allam, K.T. Ramadan, M.A. Omar, “A stochastic thermoelastic diffusion interaction in an infinitely long annular cylinder”, Acta Mechanica, Vol.227, pp.1429-1443, 2016.
[13] M. Aouadi, M. Ciarletta, V. Tibullo, “A thermoelastic diffusion theory with microtemperatures and microconcentrations.” Journal of Thermal Stresses, Vol.40, pp. 486-501, 2017.
[14]J.J. Tripathi, P.M. Keder, K.C. Deshmukh, “Generalized thermoelastic diffusion in a thick circular plate including heat source”, Alexandria Engineering Journal, Vol.55, pp.2241-2249, 2016.
[15] A.E. Green, P.M. Nagdhi, “A Re-examination of the Basic Postulates of Thermomechanics”, Proceeding of the Royal Society of London. Series A, Vol.432, pp.171-194, 1991.
[16] A.E. Green, P.M. Nagdhi, “On undamped heat waves in an elastic solid”, Journal of Thermal Stresses, Vol.15, pp.252-264, 1992.
[17] A.E. Green, P.M. Nagdhi, “Thermoelasticity without energy dissipation”, Journal of Elasticity, Vol.31, pp.189-208, 1993.
[18] D.S. Chandrasekharaiah, “Hyperbolic thermoelasticity: A review of recent literature”, 1998.
[19] P. Puri, “Plane thermoelastic wave in a rotating medium”, Bulletin of Polish Academy of Science and Technology, Vol.24, pp.137-144, 1974.
[20] R. Singh, V. Kumar, “Eigen value approach to two dimensional problem in generalized magneto micropolar thermoelastic medium with rotation effect”, International Journal of Applied Mechanics and Engineering, Vol.21, Issue.1, pp.205-219, 2016.
[21] S.K. Roychoudhuri, “On a thermoelastic three-phase-lag model”, Journal of Thermal stresses, Vol.30, pp.231-238, 2007.
[22] R. Quintanilla, R. Racke, “A note on stability in three-phase-lag heat conduction”, International Journal of Heat and mass transfer, Vol.51, pp.24-29, 2008.
[23] A. Kar, M. Kanoria, “Analysis of thermoelastic response in a fiber reinforced thin annular disc with three-phase-lag effect”, European Journal of Applied Mathematics, Vol.32, pp.1315-1332, 2011.
[24] P. Das, A. Kar, M. Kanoria, “Analysis of magneto-thermoelastic responce in a transversely isotropic hollow cylinder under thermal shock with three-phase-lag effect”, Journal of Thermal Stresses, Vol.36, pp.239-258, 2013.
[25]P. Pal, M. Kanoria, “Finite element method to study magneto-thermo-elastic wave in a transversely isotropic hollow cylinder”, International Journal of Mathematical Science and Engineering Applications, Vol.10, Issue.1, pp.147-175, 2016.
[26] P. Pal, D. Bhattacharya, M. Kanoria, “Two-temperature elasto-thermo diffusive response inside a spherical shell with three -phase-lag effect,” International Journal of Engineering Research and Application, Vol.5, Issue.8, pp.1-10, 2015.
[27] S.M. Said, “Influence of gravity on generalized magneto-thermoelastic medium for three phase lag effect”, Journal of Computational and Applied Mathematics, Vol.291, pp.142-157, 2016.
[28] S. Biswas, B. Mukhopadhyay, S. Shaw, “Rayleigh surface wave propagation in orthotropic thermoelastic solids under three-phase-lag model”, Journal of Thermal stresses, Vol.40, Issue.4, pp.403-419, 2017.
[29] R. Bellman, R.E. Kolaba, J.A. Lockette, “Numerical inversion of the Laplace transform”, American Elsevier, New York, 1966.
Citation
Debarghya Bhattacharya, Prashanta Pal, Mridula Kanoria, "Finite Element Method to Study Elasto-Thermodiffusive Response inside a Hollow Cylinder with Three-Phase-Lag Effect," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.148-156, 2019.
Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.157-163, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.157163
Abstract
Mobile Agents (MA) represents a comparatively new computing pattern which is used in numerous verticals as a means for anatomy disseminated applications. These Mobile Agents are programs which work in such a way that it will work independently by moving from one node to another in order to perform the assigned tasks on behalf of its owner in a distributed network. During which the mobile agents will communicate with the other agents or the hosts in the network and preserves the data when routing between one node and another. But it is difficult for the agents to transfer the preserved data to the home node due to lack of reliability. Thus in this Paper, it is discussed about how the mobile agents can preserve the collected data through a Trusted server or node by allocating a protected space in the trusted node and what are the measures are used for securing the data.
Key-Words / Index Term
Mobile Agent, Trusted Server or Node, DSA, Public Key, Host Node
References
[1] Karnik, N. “Protection in mobile agent systems” Technical report University of Minnesota, pp.1-12, 2000
[2] PAhich P.. K. Dutta, and M.C. Govil,“Security Issues in Mobile Agents”, International Journal of Computer Applications, Vol. 11, pp 1-7, December 2010.
[3] D.M. Chess, “ Security issues in mobile code systems".mobile agents and security, Vol 3. LNCS1419. Springer-Verlag 1998.
[4] S.M.S.I. Rizvi, Z. Sultana, B. Sun, and Md. W. Islam,“Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”, World Academy of Science,Engineering and Technology PP.70-75 2010.
[5] S. M.. Moussa, G.A. Agha, “Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management”, Journal of Software, Vol. 5, Jun 2010.
[6] Amro, Belal, Mobile Agent Systems, Recent Security Threats and Counter Measures. International Journal of Computer Science Issues (IJCSI). 11. 146-151,2014
[7] L.Kathirvelkumaran, R.Muralidharan “A Standard Framework And Migration Process of Mobile Agents Using Preprocessing Techniques”, International Research Journal of Computer Science (IRJCS), Vol. 4 , Issue No 06, pp.40-43, June 2017
[8] L.Kathirvelkumaran, R.Muralidharan A Framework for Network Monitoring Performance Management of Mobile Agents Using Pre-Processing Techniques In Distributed Environment International Journal of Pure and Applied Mathematics Vol.119 No. 12, , ISSN: 1314-3395,pp. 13641-13650, 2018
[9] Rajdeep Bhanot and Rahul Hans A Secure and Fault Tolerant Platform for Mobile Agent Systems International Journal of Security and Its Applications Vol. 9, No. 5,ISSN: 1738-9984 IJSIA ,2015
[10] A.K. Sharma, Atul Mishra, Vijay Singh An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, January 2012
Citation
L. Kathirvelkumaran, R. Muralidharan, "Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.157-163, 2019.
A Study of Research Papers on Punjabi stemming with special reference to Brute Force approach
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.164-167, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.164167
Abstract
For processing a natural language, the individual words of the text need to be processed. But the suffixes and prefixes attached to the words arises ambiguity problems and make the process more difficult. Stemming is the process of removing any suffixes or prefixes from the word to get the root word. Global languages like English took the advantage that much research has been done for stemming. Punjabi is an Asian language used by people of India’s Punjab state and Pakistani Punjab state. Shahmukhi script is used in Pakistan and Gurumukhi script is used in India to write Punjabi. Although there are limited resources available for this language, yet some efforts have been made to develop stemmers for Punjabi language. This paper puts a light on those research papers which are published on Punjabi stemming with a special reference to Brute Force approach since it is used in almost all the research papers discussed here.
Key-Words / Index Term
Punjabi Stemmer, Brute Force Approach, Rule Based Stemming, Suffix Striping
References
[1] Anany Levitin, “Introduction to the Design & Analysis of Algorithms”, 2nd ed., Pearson Addison-Wesley, Chapter 3, 2007
[2] Dinesh Kumar, Prince Rana, “Design and Development of a Stemmer for Punjabi”, International Journal of Computer Applications (ISSN: 0975 – 8887) Volume 11– No.12, pp. 18-23, December 2010
[3] Dinesh Kumar, Prince Rana, “Stemming of Punjabi Words by using Brute Force Technique”, International Journal of Engineering Science and Technology (IJEST) ISSN : 0975-5462, Vol. 3 No. 2, 1351-1358, Feb 2011
[4] Vishal Gupta, Gurpreet Singh Lehal, “Punjabi Language Stemmer for nouns and proper names”, Proceedings of the 2nd Workshop on South and Southeast Asian Natural Language Processing (WSSANLP), IJCNLP 2011, Chiang Mai, Thailand, pp. 35–39, November 8, 2011
[5] Chandni Dhawan, Jashanpreet Singh, Kamaldeep Garg, Hybrid Approach for Stemming in Punjabi, International Journal of Computer Science & Communication Networks (ISSN:2249-5789),Vol 3(2), pp. 101-104, 2013
[6] Vishal Gupta, “Automatic Stemming of Words for Punjabi Language”, Advances in Signal Processing and Intelligent Recognition Systems-Vol. 264, Springer International Publishing Switzerland, DOI: 10.1007/978-3-319-04960-1_7, pp. 73-84, 2014
[7] Garima Joshi, Kamal Deep Garg, “Enhanced Version of Punjabi Stemmer Using Synset”, International Journal of Advanced Research in Computer Science and Software Engineering (ISSN: 2277-128X), Volume 4, Issue 5, pp. 1060-1065, May 2014
[8] Puneet Thapar, “A Hybrid Approach used to Stem Punjabi Words”, International Journal of Computer Science and Mobile Computing (ISSN 2320–088X), Vol. 3, Issue. 11, pp.1 – 9, November 2014
[9] Rajeev Puri, R. P. S. Bedi, Vishal Goyal, “Punjabi Stemmer Using Punjabi WordNet Database”, Indian Journal of Science and Technology, Vol 8(27), DOI:10.17485/ijst/2015/v8i27/82943, pp. 1-5, October 2015
[10] Abdul Mateen, M. Kamran Malik, Zubair Nawaz, H. M. Danish, M. Hassan Siddiqui, Qaiser Abbas, “A Hybrid Stemmer of Punjabi Shahmukhi Script”, International Journal of Computer Science and Network Security, Vol.17 No.8, pp. 90-97, August 2017
Citation
Harjit Singh, "A Study of Research Papers on Punjabi stemming with special reference to Brute Force approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.164-167, 2019.
Implementation of Email System With Steganography
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.168-173, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.168173
Abstract
Email Systems are widely used as the means of communication. Organizations in order to seek more security tend to lean towards more secure ways of communication. This project facilitates the means of communication in a more secure format. The system being developed uses the technique called ‘Steganography’. Steganography hides the data behind an image so any intruder or hacker can only see the image and not the critical data. This is the secure means of sending information. To make it even more secure the steganographic image is then protected by a password using the technique called ‘Cryptography’. This can be implemented by developing 3 tools, first of which will hide data behind image, then the next tool encrypts it with a password and the final tool is used to send it over internet. This system will not only provide the best secure communication of data but it also makes the use of three different tools embedded in a single system.
Key-Words / Index Term
AES,LSB,Steganography,Cryptography
References
[1] Stephen Thomas, ‘SSL and TLS essentials’, Securing the web, 2000.
[2] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.
[3] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.
[4] Wang, H. and Wang, S, ‘Cyber warfare: steganography vs. steganalysis’. Communications of the ACM, 47(10), pp.76-82, 2004
[5] Currie III, D. L., & Irvine, C. E. ‘Surmounting the effects of lossy compression on Steganography’,NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF COMPUTER SCIENCE, 1996.
[6] Artz, D, ‘Digital steganography: hiding data within data’, internet computing, IEEE, 5(3), pp. 75-80, 2001.
[7] Ahsan, K., and Kundur, D, ‘Practical data hiding in TCP/IP’, InProc. Workshop on Multimedia Security at ACM Multimedia (Vol. 2, No. 7) December, 2002.
[8] K. Nandhini, B. Gomathi, ‘Open Access Article Implementation of LSB Based Steganography Algorithms in FPGA, Research Paper Journal (IJSRNSC), Vol.6 , Issue.5 pp.32-37, Oct-2018
[9] Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., & Whiting, D, ‘Improved cryptanalysis of Rijndael’. In Fast software encryption January pp. 213-230,2001.
[10] Garfinkel, S. L, ‘Public key cryptography’, Computer, 29(6), pp.101-104, 1996.
[11] Sarmah, D. K., and Bajpai, N. ‘Proposed System for data hiding using Cryptography and Steganography’, in International Journal of Computer Applications, 8(9), pp. 7-10, 2010.
[12] Johnson, N. F., and Jajodia, S. ‘Exploring steganography: Seeing the unseen’, Computer, 31(2), pp. 26-34, 1998.
[13] Geer, D, ‘Taking steps to secure web services’, Computer, 36(10), pp. 14-16, 2003.
[14] Sunner, M, ‘Email security best practice’, Network Security, pp. 4-7, 2005.
[15] Levi, A., and Koç, Ç. K, ‘Inside risks: Risks in email security’, .Communications of the ACM, 44(8), 112, 2001.
[16] JJTC, Steganography. Technical Report [online] available from http://www.jjtc.com/pub/tr_95 _11_nfj/sec401.html 29 November 2015.
[17] Salomon, D, ‘Data privacy and security: encryption and information hiding’. Springer Science & Business Media, 2003.
[18] Katzenbeisser, S., and Petitcolas, F, ‘Information hiding techniques for steganography and digital watermarking’. Artech house, 2000.
[19] Westfeld, A, ‘Steganography for radio amateurs—A DSSS based approach for slow scan television’. In Information Hiding January pp. 201-215, 2007.
[20] Codr, J. (2009). ‘Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide’. Retrieved January, 8, 2010.
[21] Anderson, R.J. and Petitcolas, F.A, ‘On the limits of steganography’. Selected Areas in Communications, IEEE Journal on, 16(4), pp.474-481, 1998.
[22] Harshal V. Patil1, B. H. Barhate, ‘Open Access Article A Review Paper on Data Hiding Techniques: Stegnography, Review Paper Journal Paper (IJSRCSE), Vol.06 , Special Issue.01, pp.64-67, Jan-2018.
Citation
Uzair Nisar, Craig Stewart, "Implementation of Email System With Steganography," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.168-173, 2019.
Process Recognizing Numerical Sarcasm in Tweets
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.174-178, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.174178
Abstract
In a world of social media, sentiment analysis has played a significant role in gathering useful trends and information on mass opinion towards any individual, product, organization, political group or any sports franchise. Sarcasm is one such unique sentiment, where the intended meaning is the opposite of written text (opinion). It can also be defined as concealed mockery through written or expressed remark which makes it complicated in sentiment detection systems. Numerical sarcasm is one such field that attracted researchers. Finding the sarcasm due to the presence of numerical data in the given statement can be concluded as numerical sarcasm detection. There are various computational systems in this paper that we tried to incorporate with Machine Learning and Deep learning approaches. We have used techniques such as SVM, K-NN, and LSTM for numerical sarcasm detection and incorporated sci-kit, numpy, tensor flow in our proposed work.
Key-Words / Index Term
Sentimental Analysis, Social Media, Machine Learning, DNN, Semantic features
References
[1] Lakshya Kumar, Arpan Somani, and Pushpak Bhattacharyya. “Having 2 hours to write a paper is fun!: Detecting Sarcasm in Numerical Portions of Text”, arXiv:1709.01950v1, 2017.
[2] Aditya Joshi, Pushpak Bhattacharyya, and Mark James Carman, “Automatic sarcasm detection: A survey”,arXiv:1602.03426, 2016.
[3] Paula Carvalho, Lus Sarmento, Mario J Silva, and Eugenio De Oliveira, “Clues for detecting irony in user-generated contents: oh...!!its so easy”, In Proceedings of the 1st international CIKM workshop on Topic- sentiment analysis for amass opinion, ACM page 5356.
[4] Dmitry Davidov, Oren Tsur, and Ari Rappoport, “Semi-supervised recognition of sarcastic sentences on Twitter and Amazon”, In Proceedings of the fourteenth conference on computational natural language learning. Association for Computational Linguistics pages107116, 2016.
[5] Roberto Gonzalez-Ibanez, Smaranda Muresan, and Nina Wacholder, “Identifying sarcasm in twitter: a closer look”, In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers-Volume 2, Association for Computational Linguistics pages 581586, 2016.
[6] Ellen Riloff, Ashequl Qadir, Prafulla Surve, Lalindra De Silva, Nathan Gilbert, and Ruihong Huang, “Sarcasm as the contrast between a positive sentiment and negative situation”, In EMNLP.Volume 13, pages 704714, 2013.
[7] Mondher Bouazizi and Tomoaki Otsuki Ohtsuki, “A pattern-based approach for sarcasm detection on twitter”, IEEE Access4:54775488, 2016.
[8] Aniruddha Ghosh and Tony Veale, Fracking “sarcasm using the aneural network”, In Proceedings of NAACL-HT. Pages 161169,2016.
[9] Haim Sak, Andrew Senior, Francoise Beaufays, “Long Short-Term Memory Recurrent Neural Network Architectures for Large-ScaleAcoustic Modeling”, arXiv.org.cs.arXiv:14021128.
[10] F.A. Gers, J. Schmidhuber, and F.Cummins “Learning to forget: Continual prediction with LSTM, Neural Computation”, vol. 12, no. 10, pp. 24512471,2000.
[11] F. A. Gers, N. N. Schraudolph, and J. Schmidhuber “Learning precise timing with LSTM recurrent networks”, Journal of Machine Learning Research, vol. 3, pp. 115143, Mar 2003.
Citation
Aakarsh Mehta, Sandeep Nigam, "Process Recognizing Numerical Sarcasm in Tweets," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.174-178, 2019.
Smart Vehicle Solution Kit for Advanced Driving Assistance
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.179-184, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.179184
Abstract
The following paper presents a noble model for solving the problems faced by the drivers while driving and thus provides them with advanced driving assistance. The solution demonstrated by our designed project is helpful in saving the lives of vehicle occupants. Automation is a key to solve day to day issues and reducing the complexities. The paper provides the solution for the major problems faced by the driver on road and also helping them in case of an accidents. The paper provides the information regarding the entire design of the automated system and its role in saving the lives and its broader aspects.
Key-Words / Index Term
Troxler’s fading , GPS , GSM , Headlight Dipping , ABS, SVM
References
[1] D. S. Smith and P. R. Jackman, "Optical sensors for automotive applications," IEE Colloquium on Automotive Sensors, Solihull, UK, 1992, pp. 2/1-2/3.
[2] P. Song, Y. Zhang, X. Wu and Y. Lan, "Design and Implementation of the Adaptive Control System for Automotive Headlights Based on CAN/LIN Network," 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, Shenyang, 2013, pp. 1598-1602.
[3] P.F. Alcantarilla, L. M. Bergasa, P. Jimenez, I. Parra, D. F. Llorca, M. A. Sotelo, S. S. Mayoral, "Automatic LightBeam Controller for driver assistance", Machine Vision and Applications.
[4] S. K. Agrawal and K. Sharma, "5G millimeter wave (mmWave) communications," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 3630-3634.
[5] B. B. Rhoades, J. P. Sabo and J. M. Conrad, "Enabling a National Instruments DaNI 2.0 robotic development platform for the Robot Operating System," SoutheastCon 2017, Charlotte, NC, 2017, pp. 1-5.
[6] G. M. Salim, H. Ismail, N. Debnath and A. Nadya, "Optimal light power consumption using LDR sensor," 2015 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS), Langkawi, 2015, pp. 144-148.
[7] N. Maheswaran, K. Thamilan, P.S. Vijayakumar, D. Vadivel, "Automatic Light-DIM and DIP Control for Automobiles", IJETT, vol. 29
[8] Zhaoqing Shen, Yuhua Peng, Ning Shu, "A Road Damage Identification Method based on Scale-span Image and SVM", Geomatics and Information Science of Wuhan University, vol. 38, no. 8, pp. 993-997, Aug. 2013
Citation
Koustav Dutta, Rajendra Prasad, "Smart Vehicle Solution Kit for Advanced Driving Assistance," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.179-184, 2019.
Enhancement of Low-Quality Images using Bi-Histogram Equalization adaptive sigmoid function based on Shifted Gomphertz Distribution
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.185-191, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.185191
Abstract
Image enhancement participate crucial role in image processing area and its main agenda is improves visual quality of an image. Histogram equalization is most prevalent method in contrast enhancement. But its major drawback is over-enhancement, therefore, it generates abnormal appearance. In this paper, proposed a method that solve over brightness problem by separate two histograms based on mean values of V-channel or intensity channel of HSV image. To calculate cumulative density function for each sub-histogram with two sigmoid function with their origins placed on the medians of sub-histogram after Shifted Gomphertz Distribution applied for each sub-histogram and equalized independently using histogram equalization. Experimental results demonstrate that proposed method gives good results compare to other state-of-the-arts methods with respect to over-enhancement.
Key-Words / Index Term
BBHE, Sigmoid function, Shifted Gomphertz Distribution, Under-water images
References
[1] H. Yue, J. Yang, X. Sun et al., “Contrast enhancement based on intrinsic image decomposition”, IEEE Transactions on Image Processing, vol. 26, no. 8, pp. 3981–3994, 2017.
[2] M. Z. Iqbal, A. Ghafoor, and A. M. Siddiqui, “Satellite image resolution enhancement using dual-tree complex wavelet transform and nonlocal means”, IEEE Geoscience and Remote Sensing Letters, vol. 10, no. 3, pp. 451–455, 2013.
[3] M. M. Riaz, A. Ghafoor, and V. Sreeram, “Fuzzy C-means and principal component analysis based GPR image enhancement,” in Proceedings of IEEE International Conference on Radar, pp. 1–4, IEEE, Ottawa, ON, Canada, April 2013.
[4] W. Roller, A. Berger, and D. Szentes, “Technology based training for radar image interpreters,” in Proceedings of 2013 6th IEEE International Conference on Recent Advances in Space Technologies, pp. 1173–1177, IEEE, Istanbul, Turkey, June 2013.
[5] R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson, New Delhi, India, 3rd edition, 2009.
[6] Y. T. Kim, “Contrast enhancement using brightness preserving bi-histogram equalization,” IEEE trans. Consum. Electron., 43(1), pp. 1-8, Feb.1997.
[7] K. Singh and R. Kapoor, “Image enhancement using exposure based sub image histogram equalization,” Pattern Recognition Letters, vol. 36, pp. 10–14, 2014.
[8] Gonzalez, R.C. and Woods, R.E, “Digital image processing”, 2002.
[9] OnlineAvailable:https://github.com/agaldran/UnderWater/tree/master/Im2.
[10] A. Beghdadi and A. L. Negrate, " Contrast enhancement technique based on local detection of edges”, Computer Vision, Graphics and Image Process, vol. 46, no. 2, pp. 162–174, May 1989.
[11] S.D. Chen and A. Ramli, " Minimum mean brightness error bi-histogram equalization in contrast enhancement," IEEE Transaction, Vol. 49, No. 4, pp. 1310–1319, 2003.
[12] Agaian Sos, Karen Panetta and M. Artyom, Grigoryan, " A new measure of image enhancement", IASTED International Conference on Signal Processing & Communication, pp. 19-22, 2000.
[13] S. C Huang, F. C Cheng and Y. S Chiu, "Efficient contrast enhancement using adaptive gamma correction with weighting distribution", IEEE Transactions on Image Processing, 22(3), pp.1032-1041, 2013.
[14] K. S. Sim, C. P. Tso, and Y. Y. Tan, “Recursive sub-image histogram equalization applied to gray scale images,” pattern Recognition Letter, 28(10), pp. 1209-1221, Nov. 2007.
[15] A. Beghdadi and A. L. Negrate, " Contrast enhancement technique based on local detection of edges,” Computer Vision, Graphics and Image Process, vol. 46, no. 2, pp. 162–174, May 1989.
[16] Y. T. Kim, “Contrast enhancement using brightness preserving bi-histogram equalization,” IEEE trans. Consum. Electron., 43(1), pp. 1-8, Feb.1997.
[17] M. Suresha, Sandeep, 2017. Enhancement on low contrast bird images using image size dependent normalization technique, International Journal of Advanced Research in Computer Science 8(8), pp. 628-631.
Citation
Sandeep, M. Suresha, "Enhancement of Low-Quality Images using Bi-Histogram Equalization adaptive sigmoid function based on Shifted Gomphertz Distribution," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.185-191, 2019.