Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation
|
|
- Amie Brown
- 5 years ago
- Views:
Transcription
1 Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation T.Mamatha A.BalaRam Asst.Prof. in Dept. of CSE Assoc.Prof. in Dept of CSE SreeNidhi Institute of Science & Technology CMR Institute of Technology Yamnampet, Ghatkesar,Hyderabad, TS,INDIA-5030 Medchal, Hyderabad,TS,India Dr. D.S.R. Murthy Prof. & Head of CSE Geethanjali College of Engg & Tech Hyderabad-5030-TS-INDIA ABSTRACT In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the information that the object is used for which purpose(whether for calculation, predicate or redefined) so we extend the representation for more understanding and also given the DFD for all possible situation for normal flow and anomaly flow. KEYWORDS:. Data Flow Testing, Data flow Anomaly Detection, Data flow model, control flow graph. INTRODUCTION Data-flow testing is the name given to a family of test strategies based on selecting paths through the program s control flow in order to explore sequences of events related to the status of data objects. For example, pick enough paths to assure that every data item has been initialized prior to its use, or that all objects have been used for something, if not then it is anomalous. Anomaly, it is an abnormal way of doing something. Example: x = f(y); x = f2(z); The second definition of x overrides the first Three types of abnormal situations with using variable. Type : Defined and then defined again N.Archana Asst.Prof. in Dept of CSE Sreenidhi Institute of Science & Technology Yamnampe, Ghatkesar, Hyderabad,TS,INDIA-30 archana.nagelli@gmail.com Type 2: Undefined but referenced Type 3: Defined but not referenced In such situations. When your representing Data Flow Anomalies for two letter sequence of actions. as below. We face some difficulties in understand the concept. dd : harmless, suspicious dk : probably a bug. du : normal kd : normal kk : harmless, but probably a bug ku : a bug ud : normal. Redefinition. uk : normal uu : normal When you consider the situation ud, here it indicates that the object is used and redefined. but we have to assume that the object is defined already. For dk, here the data object is defined and killed without using. ud, here object is used and refined but it is not showing whether object is defined or not. so assumption is eliminated in our paper. We elaborated the representation so that it is Page 292
2 very easy to understand and with a little practice, reasonably quick and straightforward to develop. Program actions are represented by d,k and u as below: Program Actions (d, k, u): Defined (created) - explicitly or implicitly(d) Killed (released ) - directly or indirectly (k) Used In a calculation - (c) In a predicate - (p) - directly(or)indirectly (u) 2. THREE LETTER SEQUENCE OF ACTIONS When your using data object for some purpose and representing using control flow graph or Data flow graph, It is not showing that whether the data object is used for calculation purpose, predicate purpose or for redefining. Here we extend the representation by using the notation as follows. D is for Defined, initialized or created (explicitlyor implicitly) o Redefined - Dr K is for killed or released (directly or indirectly) U for Usage o In calculation - Uc o In Predicate - Up Uc : Represents that object or variable is used for calculation purpose Up :Represents that object or variable is used for Predicate purpose. Dr : Represents that the object or variable is redefined The task or action to be performed on the object or variable is denoted by d,k and u( d for define, u for usage and k for killing). It follow sequence of task like first it should be defined then used for some purpose, lastly it can kill. indicates the nothing is happened on the current time Example: d-k indicates that object is defined and killed without using the object for any purpose. It giving more understanding of what happened to data object or variable. 2. Proposed Three letter sequence of Actions(d,u,k) : duk - normal duu - normal dku - Anomaly dkd - Probably a bug ddu - normal dud - normal udk - Anomaly ukd - Anomaly udd - Anomaly ukk - Anomaly uuk - Anomaly kdu - harmless, but suspicious kkk - Harmless kud - Anomaly kuu - Anomaly kdu - probably a Anomaly ddd - harmless but suspicious Leading dash and Trailing dash means, nothing happened form entry to current and trailing dash to mean nothing happened after that point. d- - - Harmless, Suspicious, defined but not used for any purpose after that point du- - Normal, Defined and used for some Purpose. d-k - Probably a Bug, Defined but Without using killed the object. -uk - Bug, Without Defining object is Used for calculation/predicate and killed 3. REPRESENTATION OF DATA OBJECT USING CONTROL FLOW GRAPH Constructing a simplified control flow graph from the given structured code is: Create a simplified flow graph for code given. For More understanding, Constructed flow graph for each data object and mentioned whether object is used for predicate purpose or Calculation Purpose. Example: an Z = b a - Page 293
3 START INPUT a, b, n Z := 0 IF a = THEN Z := GOTO DONE r := c := POWER: c := c * a r := r + IF r <= n THEN Z := (c ) / (a ) DONE: Z := b + Z GO TO POWER END Fig : simplified flow graph for above program Fig 3: Control flow graph for the object c: c:= z:=(c-)/(a-), u c c:=c*a, u c Fig 4: Control flow graph for the object r: Read a,b,n Z=0 Z:= Z:=b+z 2 a:=? 5 6 P Y c:= r:= Z:=(c-)/ (a-) P2 Y r:=r+, c:=c*a r<n? r:= r:=r+ r<n, u p Fig 5: control flow graph for the object b: 3. Control Flow Graph for Each Data Object: Read b z:=b+z Fig 2: control flow graph for the object Z: u c hgfhf z=0 z:= z :=b+z Z:= (c -)/(a-), u c 3 4 Fig 6: control flow graph for the object n: Page 294
4 Read n Fig 7:control flow graph for the object a: r<n, u p 5. CONCLUSION The main objective of this enhancement is for better understanding of the data object usage. When the object is defined(d), but not yet used(u) or killed(k) It becomes anomalous, this kind of representation with two letter sequence have not proper understanding. So we extend the representation for more understanding. We propose flow graph for each data object to show how the object is used after it is defined. And finally we depict State graph, shows the anomalous states and some Normal states. Read a a:= 6. REFERENCES c:=c*a, u c z:=(c-)/(a-), u c 4. DATA FLOW ANOMALY STATE GRAPH u u u ukk udd udk uuk ukd duu duk dkd kdu ddu dud udk dku []. Software Testing Techniques, Boris Beizer, 2 nd Edition,Dream Tech Press. [2]LEE J. WHITE, BOGDAN WISZNIEWSKI Path Testing of Computer Programs withloops using a Tool for Simple Loop Patterns - SOFTWARE PRACTICE AND EXPERIENCE, VOL. 2(0) (OCTOBER 99) [3] Philipp Hoschka, Christian Huitema Control flow graph analysis for automatic fast path implementation Published in: Proceedings «Second IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems», Williamsburg, Virginia Sep [3] Bender, R.A., and Potorff, E.L. Basic testing: a dataflow analysis techniques. IBM System Development Division, Poughkeepsie Laboratory. [4] Clarke, L.A., Podgurski, A.,Richardson, D.J., and Zeil, S.J.A Comparison of data flow path selection criteria. IEEE Transactions on Software Engineering(985) [5]. Clarke, L.A., Podgurski, A.,Richardson, D.J., and Zeil, S.J.An Investigation of data flow path selection criteria. Workshop on Software Testing, Banff, Canada,986 [6] Fran Berman, Andrew Chien, Keith Cooper, Jack Dongarra, Ian Foster, Dennis Gannon, Lennart Johnsson, Ken Kennedy, Carl Kesselman, John Mellor-Crummey, Dan Reed, Linda Torczon, and Rich Wolski. The grads project: Software support for high-level grid application Development. Inernational Journal of High Performance Computing Applications, 5(4), Winter Page 295
5 [7]. Preston Briggs. Drawing control-flow graphs with style. July 994. Authors Mrs. N.Archana, Working as an Assistant Professor in Dept of C.S.E of sreenidhi Institute of Science & Technology. M.Tech in Software Engineering from JNTU, Hyderabad. B.Tech in C.S.E from JNTUH. She has more than 8 yrs of experience. Her Area of Interest is Wireless Sensor Network & Information Security Mrs. T.Mamatha, Working as an Assistant Professor in Dept of C.S.E of sreenidhi Institute of Science & Technology. M.Tech in Software Engineering from JNTU, Anantapur. B.Tech in C.S.E from JNTUH. Her Area of Interest is Software Engineering & Software Testing. Mr. A. Balaram working as Associate Professor in the Dept. Of Computer Science and Engineering, CMR Institute of Technology, Hyderabad, India. He has more than 0 years of teaching experience.. His research interests are Software Engineering, Image Processing, Net work Security and Cryptography. Dr. D. S. R. Murthy is currently working as a Professor & Head of the Dept of CSE in Geethanjali college of Engineering and Technology since June 204. Earlier he worked as a professor of Information Technology in Sreenidhi Institute of science and Technology from OCT 2004 to JUNE 20. Prior to that he was in NIT Warangal JNTUCE, Anantapur and ICFAI in different faculty positions of Computer Science. He is a Fellow of IETE, Senior Life Engineer (EI(I) & IETE). He published a text book on C Programming & Data Structures. His research interests are Image Processing, Image Cryptography and Data Mining. Page 296
Topics in Data-Flow Testing
Dependable Software Systems Topics in Data-Flow Testing Material drawn from [Beizer] Courtesy Spiros Mancoridis Data-Flow Testing Data-flow testing uses the control flowgraph to explore the unreasonable
More informationHigh Performance Computing. Without a Degree in Computer Science
High Performance Computing Without a Degree in Computer Science Smalley s Top Ten 1. energy 2. water 3. food 4. environment 5. poverty 6. terrorism and war 7. disease 8. education 9. democracy 10. population
More informationComponent Architectures
Component Architectures Rapid Prototyping in a Networked Environment Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/lacsicomponentssv01.pdf Participants Ruth Aydt Bradley Broom Zoran
More informationGrid Application Development Software
Grid Application Development Software Department of Computer Science University of Houston, Houston, Texas GrADS Vision Goals Approach Status http://www.hipersoft.cs.rice.edu/grads GrADS Team (PIs) Ken
More informationK Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39
A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup
More informationEFFECTIVE EFFICIENT BOOLEAN RETRIEVAL
EFFECTIVE EFFICIENT BOOLEAN RETRIEVAL J Naveen Kumar 1, Dr. M. Janga Reddy 2 1 jnaveenkumar6@gmail.com, 2 pricipalcmrit@gmail.com 1 M.Tech Student, Department of Computer Science, CMR Institute of Technology,
More informationBiological Sequence Alignment On The Computational Grid Using The Grads Framework
Biological Sequence Alignment On The Computational Grid Using The Grads Framework Asim YarKhan (yarkhan@cs.utk.edu) Computer Science Department, University of Tennessee Jack J. Dongarra (dongarra@cs.utk.edu)
More informationToward a Framework for Preparing and Executing Adaptive Grid Programs
Toward a Framework for Preparing and Executing Adaptive Grid Programs Ken Kennedy α, Mark Mazina, John Mellor-Crummey, Keith Cooper, Linda Torczon Rice University Fran Berman, Andrew Chien, Holly Dail,
More informationDataflow Testing. Definitions 2
Dataflow Testing Dataflow Analysis Can reveal interesting bugs Dataflow Testing Chapter 9 Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases Testing All-Paths in a
More informationDataflow Testing. Dataflow Testing. Dataflow Analysis. Definitions. Definitions 2. Definitions 3
Dataflow Testing Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases Testing All-Paths in a control flow graph is often too timeconsuming Chapter 9
More informationWhy Performance Models Matter for Grid Computing
Why Performance Models Matter for Grid Computing Ken Kennedy 1 Rice University ken@rice.edu 1 Introduction Global heterogeneous computing, often referred to as the Grid [5, 6], is a popular emerging computing
More informationDataflow Testing. Chapter 9!
Dataflow Testing Chapter 9! Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases! Testing All-Paths in a control flow graph is often too timeconsuming!
More informationExperiments with Scheduling Using Simulated Annealing in a Grid Environment
Experiments with Scheduling Using Simulated Annealing in a Grid Environment Asim YarKhan Computer Science Department University of Tennessee yarkhan@cs.utk.edu Jack J. Dongarra Computer Science Department
More informationSecure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.
Secure data accumulation by ant agents in wireless sensor network using randomized dispersive routing Mechanism U.Moulali 1 2 N.Sainath 1 Sr.Asst Prof, Dept. of CSE, QISCET, Ongole, India moulali.u@gmail.com
More informationA Novel Architecture of Parallel Multiplier Using Modified Booth s Recoding Unit and Adder for Signed and Unsigned Numbers
International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 8, August 2015, PP 55-61 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Architecture of Parallel
More informationA Distributed k-secure Sum Protocol for Secure Multi-Party Computations
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ A Distributed k-secure Sum Protocol for Secure Multi-Party Computations Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra 68 Abstract Secure sum computation
More informationDesign of Dual Port SDRAM Controller with Time Slot Register
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 2 (August 2013), PP.76-81 Design of Dual Port SDRAM Controller with Time
More informationDataflow Testing. Chapter 10!
Dataflow Testing Chapter 10! Dataflow Testing Testing All-Nodes and All-Edges in a control flow graph may miss significant test cases! Testing All-Paths in a control flow graph is often too timeconsuming!
More informationISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationDr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India
Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),
More informationGrid Computing: Application Development
Grid Computing: Application Development Lennart Johnsson Department of Computer Science and the Texas Learning and Computation Center University of Houston Houston, TX Department of Numerical Analysis
More informationRouting Scheme in Energy efficient based Protocols for Wireless Sensor Networks
Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF
More informationRecoverable Timestamping Approach For Concurrency Control In Distributed Database
Recoverable Timestamping Approach For Concurrency Control In Distributed base Rinki chauhan iknirs@gmail.com Suman Malik suman.sheoran14@gmail.com R K Rathy rathy.citm@yahoo.co.in Preeti Bhati versatilepreeti@yahoo.com
More informationDynamic Load Sharing Policy in Distributed VoD using agents
270 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 Dynamic Load Sharing Policy in Distributed VoD using agents H S Guruprasad Asst Prof & HOD Dept of ISE,
More informationFaculty Profile. Educational Qualification
Mr. Mr. Subhrajit Nag HOD subhrajit.nag@gnindia.dronacharya.info Faculty Profile M.Tech in Computer Science & Engg from Indian School of Mines, Dhanbad, in 2014 B.Tech in Computer Science & Engg from Abcus
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationINTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN
CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS 1 VEMULA GANESH, 2 B. VAMSI KRISHNA 1 M.Tech CSE Dept, MRCET, Hyderabad, Email: vmlganesh@gmail.com. 2
More informationLatency Hiding by Redundant Processing: A Technique for Grid enabled, Iterative, Synchronous Parallel Programs
Latency Hiding by Redundant Processing: A Technique for Grid enabled, Iterative, Synchronous Parallel Programs Jeremy F. Villalobos University of North Carolina at Charlote 921 University City Blvd Charlotte,
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 7, July ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 445 Clusters using High Dimensional Data for Feature Subset Algorithm V. Abhilash M. Tech Student Department of
More informationBio-Data. : Lavanya Kampa. Narayana Engineering College, Nellore JNTU College of Engineering, JNTUA, Anantapur
Bio-Data NAME : Lavanya Kampa DESIGNATION : Sr.Assit. Professor AREAS OF RESEARCH : Data Mining & Cloud EMAIL : lavanya.kk2005@gmail.com PHONE : 8499097990 DATE OF JOINING : 14/12/2008 DATE OF BIRTH :
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationEFFECTIVE SYSTEM ARCHITECTURE BASED RISC STRATEGY
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE SYSTEM ARCHITECTURE BASED RISC STRATEGY Charitha Devi Arika 1, V. Koteswara Rao 2 1 M.Tech Student, Dept of ECE, QIS
More informationCompiler Technology for Problem Solving on Computational Grids
Compiler Technology for Problem Solving on Computational Grids An Overview of Programming Support Research in the GrADS Project Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/gridcompilers.pdf
More informationAPPLICATION OF GRAPH THEORY IN COMMUNICATION NETWORKS
APPLICATION OF GRAPH THEORY IN COMMUNICATION NETWORKS Suman Deswal 1 and Anita Singhrova 2 1,2 Deenbandhu Chottu Ram University of Sc. & Tech., Murthal, Sonipat. Haryana, India. ABSTRACT The use of mathematics
More informationCURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela
CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)
More informationA New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 130-136 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Encryption and Decryption Algorithm
More informationCompilers and Run-Time Systems for High-Performance Computing
Compilers and Run-Time Systems for High-Performance Computing Blurring the Distinction between Compile-Time and Run-Time Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/compilerruntime.pdf
More informationImproved Remote User Authentication Scheme Preserving User Anonymity
62 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 28 Improved Remote User Authentication Scheme Preserving User Anonymity Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar
More informationMeasuring Height of an Object using Accelerometer and Camera in ios and Android Devices
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.380
More informationGeneration of High Performance Domain- Specific Languages from Component Libraries. Ken Kennedy Rice University
Generation of High Performance Domain- Specific Languages from Component Libraries Ken Kennedy Rice University Collaborators Raj Bandypadhyay Zoran Budimlic Arun Chauhan Daniel Chavarria-Miranda Keith
More informationSHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS
SHORTEST PATH ALGORITHM FOR QUERY PROCESSING IN PEER TO PEER NETWORKS Abstract U.V.ARIVAZHAGU * Research Scholar, Sathyabama University, Chennai, Tamilnadu, India arivu12680@gmail.com Dr.S.SRINIVASAN Director
More informationANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS
ANALYZING THE EFFICIENCY OF PROGRAM THROUGH VARIOUS OOAD METRICS MR. S. PASUPATHY 1 AND DR. R. BHAVANI 2 1 Associate Professor, Dept. of CSE, FEAT, Annamalai University, Tamil Nadu, India. 2 Professor,
More informationTesting Theory. Agenda - What will you learn today? A Software Life-cycle Model Which part will we talk about today? Theory Lecture Plan
heory Lecture Plan 2 esting heory Lecture 8 Software Engineering DDC88/DDC93 autumn 28 Department of Computer and Information Science Linköping University, Sweden L - Course Introduction and Overview L2
More informationPNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS
PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor,
More informationREDUCTION IN RUN TIME USING TRAP ANALYSIS
REDUCTION IN RUN TIME USING TRAP ANALYSIS 1 Prof. K.V.N.Sunitha 2 Dr V. Vijay Kumar 1 Professor & Head, CSE Dept, G.Narayanamma Inst.of Tech. & Science, Shaikpet, Hyderabad, India. 2 Dr V. Vijay Kumar
More informationWhy Performance Models Matter for Grid Computing
Why Performance Models Matter for Grid Computing Ken Kennedy 1 Rice University ken@rice.edu 1 Introduction Global heterogeneous computing, often referred to as the Grid [5, 6], is a popular emerging computing
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationDesign Implementation of Composite Field S-Box using AES 256 Algorithm
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2016, PP 43-51 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design Implementation of Composite Field
More informationCOCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D
More informationTEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING
TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING Shalini Kapoor CSE Deptt, GNI, Mullana get_shalini@rediffmail.com Abstract--- Effectiveness means how good a test case is in finding faults. Traditional
More informationDirectory Compaction Techniques for Space Optimizations in ExFAT and FAT File Systems for Embedded Storage Devices
IJCSI International Journal of Computer Science Issues, Vol. 11, Issue 1, o, January 1 ISS (Print): 19-81 ISS (Online): 19-78 www.ijcsi.org 1 Compaction Techniques for Space Optimizations in EFAT and FAT
More informationBiodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),
Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date
More informationISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationFAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL
FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL A.Krishna Mohan Associate professor Dept. CSE (IT) UCEK JNTU Kakinada Abstract: In this paper investigate the problem of discovering the set of
More informationV e l a m m a l E n g i n e e r i n g C o l l e g e Department of Information Technology
V e l a m m a l E n g i n e e r i n g C o l l e g e Department of Information Technology Name & Photo : MRs.C.M.NALAYINI Designation: Assistant Professor II Qualification : M.Tech,(Ph.D) Area of Specialization
More informationLoad balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4
RESEARCH ARTICLE International Journal of Computer Techniques - Volume 3 Issue 1, Jan- Feb 2015 Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar
More informationADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS
ADAPTIVE SLOT ALLOCATION AND BANDWIDTH SHARING FOR PRIORITIZED HANDOFF CALLS IN MOBILE NETWOKS S.Malathy G.Sudhasadasivam K.Murugan S.Lokesh Research Scholar Professor, CSE Department Lecturer, IT Dept
More informationUNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK
UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG
More informationPerformance of Static Networks for Power Saving Mode
Performance of Static Networks for Power Saving Mode B. Rama Devi Department of E.C.E., Kakatiya Institute of Technology and Science, Warangal, Telangana, INDIA Prof. M. Asha Rani Department of E.C.E.,
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationRavindranagar Colony, Habsiguda, : Department of Computer Science & Engineering, University College of Engineering(A),
Name Designation Father Name : Dr.V.B.Narsimha : Assistant Professor : V.Raghavulu Date of Birth : 20-06-1969 Residence Address : Flat No.101, SR Apartment, Ravindranagar Colony, Habsiguda, Hyderabad,
More informationMULTI-NODE DATABASE APPLICATION DEPLOYMENT ON LAMP ARCHITECTURE
MULTI-NODE DATABASE APPLICATION DEPLOYMENT ON LAMP ARCHITECTURE M. M. Chavan and Y. V. Dongre Department of Computer Engineering, Vishwakarma Institute of Information Technology, Pune ABSTRACT Recent trends
More informationImplementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation
Implementation of ON/OFF and PID controller using TCP Protocol Based on Virtual Instrumentation Abhyarthana Bisoyi 1, Umesh Chandra Pati 2 Postgraduate Scholar, NIT Rourkela, India 1 Associate Professor,
More informationLocking and Tracking of Stolen Vehicles
Locking and Tracking of Stolen Vehicles S.Pradeep PG Scholar, Dept of ECE (ES), CMRCET, JNTUH, Medchal, Hyderabad, TS, India. Mrs.K.Jyothi Assistant Professor, Dept of ECE, CMRCET, JNTUH, Medchal, Hyderabad,
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationSupport and Confidence Based Algorithms for Hiding Sensitive Association Rules
Support and Confidence Based Algorithms for Hiding Sensitive Association Rules K.Srinivasa Rao Associate Professor, Department Of Computer Science and Engineering, Swarna Bharathi College of Engineering,
More informationAn Improved Run Length Encoding Scheme for Image Compression Ch.Samson 1, VUK Sastry 2
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 3 March 2017, Page No. 20716-20720 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i3.57
More informationPrivacy-Preserving k-secure Sum Protocol Rashid Sheikh, Beerendra Kumar SSSIST, Sehore, INDIA
Privacy-Preserving k-secure Rashid Sheikh, Beerra Kumar SSSIST, Sehore, INDIA rashidsheikhmrsc@yahoo.com, beerucsit@gmail.com (IJCSIS) International Journal of Computer Science and Information Security,
More informationC.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan
Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.
More informationSoftware design simulation for quick and qualitative application development
IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.8, August 2009 89 Software design simulation for quick and qualitative application development P.K. Suri 1 Gurdev Singh
More informationComparing Tesseract results with and without Character localization for Smartphone application
Comparing Tesseract results with and without Character localization for Smartphone application Snehal Charjan 1, Prof. R. V. Mante 2, Dr. P. N. Chatur 3 M.Tech 2 nd year 1, Asst. Professor 2, Head of Department
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationA Image Steganography based on Non-uniform Rectangular Partition
A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala 1, Y. Dasradh Ram Reddy 2, G. Srinivasa Reddy 3 Asst.Prof of CSE department BVSR, Chimakurthy, A.P, India Abstract:
More informationGUI Controlled Robot with MATLAB
Rajender M.Tech (Digital Electronics and Communication Systems), Siddhartha Institute of Engineering and Technology. GUI Controlled Robot with MATLAB Pushpalatha, M.Tech Associate Professor, Siddhartha
More informationSystematic Detection And Resolution Of Firewall Policy Anomalies
Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this
More informationSmart Test Case Quantifier Using MC/DC Coverage Criterion
Smart Test Case Quantifier Using MC/DC Coverage Criterion S. Shanmuga Priya 1, Sheba Kezia Malarchelvi 2 Abstract Software testing, an important phase in Software Development Life Cycle (SDLC) is a time
More informationArm Microcontroller Implementation of Des Using Concept with Time-Variable Key
Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,
More informationNTS A NAVIGATION TRACKER SYSTEM
NTS A NAVIGATION TRACKER SYSTEM Nitin Tooteja 1, Prerna Ahuja 2, Shanu Sharma 3 1 Student, Computer Science & Engineering, Amity University, Uttar Pradesh, India, ntooteja_30@yahoo.co.in 2 Student, Computer
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationISSN (Online) ISSN (Print)
Accurate Alignment of Search Result Records from Web Data Base 1Soumya Snigdha Mohapatra, 2 M.Kalyan Ram 1,2 Dept. of CSE, Aditya Engineering College, Surampalem, East Godavari, AP, India Abstract: Most
More informationAdaptive Power Control for Quality of Service Improvement in WCDMA Wireless Networks
Adaptive Power Control for Quality of Service Improvement in WCDMA Wireless Networks Vandana Khare Associate Prof. ECE department, CMR College of Engineering & Technology, Hyderabad, India. & Research
More informationKeyless Car Entry Authentication System Based on A Novel Face-Recognition Structure
Keyless Car Entry Authentication System Based on A Novel Face-Recognition Structure I.Amulya M.Tech VLSI System Design, AITS, Rajampet, Kadapa (DT) Mr. K. Sreenivasa Rao, Associate Professor, Dept: ECE,
More informationAdaptive Buffer size routing for Wireless Sensor Networks
Adaptive Buffer size routing for Wireless Sensor Networks Kalyani Upputhoola 1, Narasimha Rao Sirivella 2 Student, M.Tech (CSE), QIS College of Engineering and Technology, Hyderabad, AP, India 1 Assistant
More informationCryptanalysis of Blind Signature Schemes
IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering
More informationCompiler Architecture for High-Performance Problem Solving
Compiler Architecture for High-Performance Problem Solving A Quest for High-Level Programming Systems Ken Kennedy Rice University http://www.cs.rice.edu/~ken/presentations/compilerarchitecture.pdf Context
More informationDecreasing End-to Job Execution Times by Increasing Resource Utilization using Predictive Scheduling in the Grid
Decreasing End-to to-end Job Execution Times by Increasing Resource Utilization using Predictive Scheduling in the Grid Ioan Raicu Computer Science Department University of Chicago Grid Computing Seminar
More informationDelegating Auditing Task to TPA for Security in Cloud Computing
Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper
More informationA New Approach of Forward Error Correction For Packet Loss Recovery
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationCompilers for High Performance Computer Systems: Do They Have a Future? Ken Kennedy Rice University
Compilers for High Performance Computer Systems: Do They Have a Future? Ken Kennedy Rice University Collaborators Raj Bandypadhyay Zoran Budimlic Arun Chauhan Daniel Chavarria-Miranda Keith Cooper Jack
More informationA study on Congestion Control of Wireless Communication Network applying ML and FL Techniques
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 3, Ver. III (May - June 2017), PP 10-16 www.iosrjournals.org A study on Congestion
More information2015, IJARCSSE All Rights Reserved Page 133
Volume 5, Issue 11, November 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient
More informationIdentifying Misuse of Data In Cloud
Identifying Misuse of Data In Cloud K.S.R. Chaitanya #1, T.Rajendra Prasad *2, # Department of IT, Kakinada Institute of Engineering and Technology korangi,ap,india 1 ksaichaitanya007@gmail.com 2 rajendraprasad.tanukula@gmail.com
More informationFaculty Profile. Educational Qualifications. Work Experience. : Dr. K.V.S.S.S.S.Sairam. : Contact No.
Faculty Profile Name Designation Email : Dr. K.V.S.S.S.S.Sairam : Professor : drsairam@nitte.edu.in Contact No. : +91-9731809851 Joining Date : 05-01-2015 Educational Qualifications Ph.D. on Optical Communication
More informationI. INTRODUCTION II. RELATED WORK.
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A New Hybridized K-Means Clustering Based Outlier Detection Technique
More informationKCG College of Technology, Chennai
, Chennai-600 097 faculty member : S SANKAR Department : COMPUTER SCIENCE AND ENGINEERING Present Designation : ASSOCIATE PROFESSOR Residential Address : B22, SHANTINIKETAN ALTAIR APARTMENT KELAMBAKKAM,
More informationOPTIMAL ALLOCATION FOR RELIABILITY ANALYSIS OF SERIES PARALLEL SYSTEM USING DYNAMIC PROGRAMMING
OPTIMAL ALLOCATION FOR RELIABILITY ANALYSIS OF SERIES PARALLEL SYSTEM USING DYNAMIC PROGRAMMING D. RAVI KUMAR 1, V. SANKAR 2 LMISTE, Asst. Professor, EEE Dept., VNR Vignana Jyothi Institute of Engg. &
More informationDISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
More informationFACULTY PROFILE INTRODUCTION PERSONAL PROFILE. Amanpreet Kaur. Designation:- Lecturer. Specialization:- Wireless Communication Engineering
FACULTY PROFILE INTRODUCTION Amanpreet Kaur B.Tech. (Honors), M.Tech Designation:- Lecturer Specialization:- Wireless Communication Engineering Contact Information:- Department of Electronics and Communication
More informationHistogram Difference Methods Using Colour Models
Histogram Difference Methods Using Colour Models Priyanks S 1, Dr. Jharna Majumdar 2, Santhosh Kumar K L 3 Post Graduate Student, Dept. of CSE, NMIT, Bangalore, Karnataka, India 1 Dean R&D, HOD CSE (PG),
More informationNavigation Cost Modeling Based On Ontology
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 3 (Sep.-Oct. 2012), PP 34-39 Navigation Cost Modeling Based On Ontology 1 Madala Venkatesh, 2 Dr.R.V.Krishnaiah 1 Department
More information