AUTOMATIC TUNING AND SEMANTIC BASED CLONE DETECTION OF ANDROID APPLICATIONS
|
|
- Francis Owens
- 5 years ago
- Views:
Transcription
1 International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 10, October 2017, pp , Article ID: IJMET_08_10_020 Available online at ISSN Print: and ISSN Online: IAEME Publication Scopus Indexed AUTOMATIC TUNING AND SEMANTIC BASED CLONE DETECTION OF ANDROID APPLICATIONS Vishnu Priya T Department of Information Technology, Veltech University, Chennai, India Stephanie Vianna G Department of Information Technology, Veltech University, Chennai, India ABSTRACT A smart phone mainly depends on the app market. To avoid plagiarism and for detecting the similar Android application we use a tool named AnDarwin. It estimates various apps that have been collected from 17 markets. The AnDarwin includes major benefits as follows: it rejects evaluating apps pairwise, it examines only the app code. This can find both app that has partial and full similarities, and it can mechanically discover and eliminate library code from the similarity analysis. These indicate that the tool, AnDarwin is an effective tool to discover app which is rebranded and cloned and this could aid in developing the health of the market. However, the tool has various parameters based on the dataset the AnDarwin applied. Accurate selection of these parameter values would decrease the number of false positive and false negative rates. In order to increase the accuracy of the parameter selection, we use a method called Automatic Tuning and Semantic Based Clone Detection of Android Applications. Keywords: similar app detection, fully or partially cloned. Cite this Article: Vishnu Priya T and Stephanie Vianna G, Automatic Tuning and Semantic Based Clone Detection of Android Applications, International Journal of Mechanical Engineering and Technology 8(10), 2017, pp INTRODUCTION Android apps plays immense role in current world. The Android operating system is core for smart phone; most of the Android users depend on the Android market for their applications. The Android has both official and third-party markets which creates platform for users where they can download their application like social networking, games and many more apps. But in today s world the main issue is that the third-party markets do not provide healthy environment for developers. Many developers release their apps for paid or ad-supported version. The Hackers may crack the application s code and clone them and release them for editor@iaeme.com
2 Automatic Tuning and Semantic Based Clone Detection of Android Applications free. By plagiarizing the application hackers can get the revenue for that application. Thus the developers who actually choose to release the app for paid ones end up with financial crisis. Another threat to the application market is the low quality app called as spams. When the spam rate increases it will distort the healthy ecosystem. To ensure healthy market, an automatic tuning and semantic based clone detection method is followed. The apps can be compared for plagiarism using a tool called AnDARWIN. This tool rejects evaluating app pairwise, this increases scalability; it examines app code and does not depend on app s marketplace, signature; it can identify both full and partial cloned app; Further this tool is very efficient to discover cloned and rebranded apps. The AnDarwin tool compare the applications based on the parameter. Accurate selection of these parameter values would decrease the false positive and false negative rates. In order to increase the accuracy of the parameter selection, a method called Automatic Tuning and Semantic Based Clone Detection of Android Applications. In the proposed methodology, particle swarm optimization approach based automatic tuning of parameters has been introduced which will tune the parameter values in the optimized manner. The automatic tuning of parameters is done using the methodology called particle swarm optimization approach. Thus when the proposed technique of automatic tuning is introduced into the AnDarwin tool, the accuracy of the detection of App clones is increased by reducing the false positive and false negative rates. The paper is structured as follows: Section I illustrates a few introduction to AnDarwin tool and its need. Section II says about the background on the system. Section III highlights the threats faced in today s world and proposes a methodology in Section IV. The paper is concluded in Section V. 2. BACKGROUND 2.1 Android System Android users will get their apps from the app markets such as Google play store and other third party markets. The developer will get a developer key to upload his app to a market. But most of these markets are not efficient in finding the cloned apps, spams or malware. 2.2 Program Dependency Graph In a Program Dependency Graph each node is a statement and edge is the dependency between statements. Dependencies can be classified into two data and control dependency. If a variable in s2 depends on the value of s1 then those two statements are data dependent. If the second statement is controlled by the true value of the first statement then those two statements are controls dependent 3. THREAT MODEL Android applications though developed by different developers, share a huge amount of same code. Our goal is to find those cloned codes. The main targets are to find the plagiarists, spammers who release copied codes. These clones are detected only based on the codes, not by using meta data such as market, developer etc. The similarity is noted between the source code or the semantic of the application. 4. METHODOLOGY AnDarwin tool works by finding the parameter. Every application has several parameters which can be tuned with the dataset. These parameters which are used for LSH-Based clustering were found using trial and error method. In order to reduce the false positive and editor@iaeme.com
3 Vishnu Priya T and Stephanie Vianna G false negative rate accurate selection of parameter should be done. Particle Swarm Optimization algorithm can be used for automatic tuning of parameter in a optimized manner. These parameters are considered as Read external storage, read call log, Delete packages, Wake lock and so on. Extrema can be found using this algorithm in dimensional search space using swarm intelligence. Each particle consist of position xt, velocity vt. In AnDarwin parameters are considered as particles and change of parameters in each phase is the velocity. The factor K is used here to maintain the reasonable velocity as in Eq.1: K=2/ 2-φ-φ 2-4φ (1) Where, φ=c1+c2; φ>4. The AnDarwin tool consist of four stages as shown in Figure 1, first extracting semantic vectors form the apk files by using PDG Graphs, second is the identification of similar code by using LSH algorithm, third excluding the library code for simplicity and finally detecting the application similarity. a) Extraction of Semantic Vectors AnDarwin computes Program Dependence Graphs (PDG) for extracting the semantic vectors. In these graphs, each node becomes a statement along with edge that gives a dependency for those statements. PDG dependencies can be classifies into two, one is data PDG and the other is control PDG. If one statement s2 depends on s1 for its value then it is data dependent. Likewise, if the statement is executed on the true evaluation of other statement then it is said to be control dependent. Each PDG can be further split into numerous components that remain connected, where multiple computations whose data is independent, will occur in the similar method. Components that are connected and are called as semantic blocks. This represents the semantic information that are stored in dependency graph. AnDarwin calculates semantic vector for each of the semantic block. This information is gathered by calculating the node frequency from which semantic vectors are found. The threshold is set manually by analyzing all the apps and then discovering the similarities. Even a few lines of code can result in fairly large semantic blocks. Figure 1 System design editor@iaeme.com
4 Automatic Tuning and Semantic Based Clone Detection of Android Applications b) Parameter Selection PSO algorithm The Optimization algorithm, Particle Swarm Optimization is used to calculate the extrema in a very large dimensional search space using the swarm intelligence. The position of each particle is given a parameter set for the tool and its the change in the parameter set among generations is represented as velocity. There is a memory of previous fitness value and parameter value, pi that is highest among particles. The swarm algorithm is already alert of the fitness value. The velocity of the particle is focused on its parameters that is best, by a factor denoted as cognitive component, c1, and the best of swarm s parameters is its social component, c2. With an aim to reduce the effect when it is travelling in a velocity that is constant and to explore the search space in better way, the velocity contributions are increased by a random factor, r. in addition, the premature convergence is prevented and maintained in a reasonable velocity. This is referred to as a constriction factor. It serves in governing the velocity change between generations in the form of overall weight as shown in Eq.2: K= Where, φ = c1 + c2; φ > 4. At last, the velocity and parameter vector for each particle at each generation, t, after the first is computed as: v =K(v +c r (p x +c r (p x x =x +v c) Similar Code Identification by LSH In this, when two semantic blocks are checked and found the code to be clones, then they will share common nodes and, hence, their semantic vectors will remain same. From this, nearest neighbors for a semantic vector is found, potential code clones are identified. The Locality Sensitive Hashing (LSH) is an algorithm that can efficiently find approximate nearest neighbors even when there is a huge number of vectors. This is achieved by LSH by hashing the vectors using various hash functions from a special family. If the vectors are similar, then there is a high probability of collision. In order to find nearest neighbors, firstly LSH will hash all vectors using a special hash function and then will look for nearest neighbors within the hash collisions. Through this LSH is able to identify clusters approximately which AnDarwin will use to detect apps that are similar. By this way, LSH is able to cluster group quickly, because the individual group is smaller than the vectors set. Moreover, LSH computation is independent in each case which allows all the groups to be run in parallel. From LSH, AnDarwin is able to identify various number of clusters of semantic vectors blocks that could be code clones. Specifically, an index value is assigned to each clone and then represent it with a binary vector where the dimension is 1. This value says that the semantic vector is a member of the semantic block and 0 otherwise. This binary vector has many dimensions, each one to represent different code clones. d) Exclusion of Library Codes Using the clustered values, AnDarwin was able to find the libraries automatically. These libraries map to semantic vectors using the semantic blocks. When a single app contains a library then it will inherit all the semantic vectors resultant from that library code. These features derived from library code will tend to collide with other feature vectors too. In addition to that, features which represent boilerplate code and compiler-generated constructs will look much more frequent. These uncharacteristic features are excluded in AnDarwin by omitting the feature that appear in more than a threshold value that is set. (2) editor@iaeme.com
5 Vishnu Priya T and Stephanie Vianna G e) Detection of Similar Applications The characteristic features are used to find the similarities using two approaches, one for finding full app similarity and the other to find partial app similarity. Full app similarity detection, AnDarwin groups each app into a feature sets. In a simpler way, the feature sets for two very similar apps will be overlapping in most cases. Whereas in dissimilar apps, the feature sets will have a very little overlapping. This similarity among apps feature sets F A and F B can be found in the Jaccard Similarity, which reduces the problem of finding similar app to that of finding similar sets using (Eq.3) (,=! # (3)! # Partial app similarity detection: the tool, AnDarwin figures out all set of apps and their features. If two features are found to be similar between the app sets, based on the Jaccard similarity, these those features are said to be common for the apps set. It was able to find a non-trivial code, if a significant number of features share a same app. AnDarwin can detect partial cluster by creating clusters of features and comparing the similarities. Next is to find sets that are similar; this requires similarity stets. A comparison is performed among pair of sets. MinHash is a Locality Sensitive Hashing algorithm that starts initially by working out a signature for each and every feature set based on hashing and random permutations. Next the nearest neighbors are found that have a hash collision. Using Minhash, AnDarwin can efficiently detect both full and partial similarities among apps. The output of MinHash is a list of sets that pairs similar sets. With each set, a rapid cluster merging and element lookup is initialized, with each set in a cluster by itself. Each pair is processed, say (X, Y) and they get merged to the set, if they are not present previously. By repeating this process, the average similarity between sets and each cluster gets decreased with each pair processed. f) Detecting Commonly Injected Code Once the clustering is done, AnDarwin was able to detect for similarities among apps, if any code was injected into other app. Introduction of two concepts: cores and Diffs is done. Each and every cluster will contain a core that represents code that remain similar to all apps. AnDarwin will find the core by calculating the feature sets that intersect in the app cluster. This core is made as reference, and difference between sets are found by subtracting from the feature sets. The new set that was found behaves as a superset of the code that is modified. AnDarwin computes the cluster cores and their corresponding diffs among apps in each app cluster to detect both full and partial similarities. Later it clusters the app based on the MinHash to invade the apps that have similar code. g) Online Clone Detection Online clone detection methodology works in three steps. Firstly, it defines feature vector for each app. Among the semantic blocks, the semantic vector may or may not be seen. In case a semantic vector was already seen before, then no further processing is done for that particular vector which is already known. If a semantic vector is new then, LSH is used to figure out all nearest neighbors for that vector. It neither merges the semantic vector into an existing cluster based on its neighbors nor thus assign it to a feature, nor, if it has no close neighbors, it creates a new feature. The process is applies to each semantic vector and it forms a new app for that vector value. Once AnDarwin determines the feature vector for each app, it then eliminates those features that were previously identified as library features. Finally, the tool is able to find apps that exhibit either full or partial similarities editor@iaeme.com
6 Automatic Tuning and Semantic Based Clone Detection of Android Applications 5. CONCLUSION The problem of plagiarism in android application has to be resolved and it can be performed using the AnDarwin tool. This enhances the originality of android applications that is been developed at rapid speed. The advantage of the system is that it can find both full and partial similarities among the applications using semantics. REFERENCES [1] G. Eason, B. Noble, and I.N. Sneddon, On certain integrals of Lipschitz-Hankel type involving products of Bessel functions, Phil. Trans. Roy. Soc. London, vol. A247, pp , April [2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp [3] I.S. Jacobs and C.P. Bean, Fine particles, thin films and exchange anisotropy, in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp [4] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, Electron spectroscopy studies on magneto-optical media and plastic substrate interface, IEEE Transl. J. Magn. Japan, vol. 2, pp , August 1987 [Digests 9 th Annual Conf. Magnetics Japan, p. 301, 1982]. [5] M. Young, The Technical Writer s Handbook. Mill Valley, CA: University Science, 1989 [6] Namrata A. Patel, Vijay Ukani and Nilay Mistry, A Novel Methodology for Analyzing Malicious Behavior of the Android Applications, International Journal of Advanced Research In Engineering And Technology (IJARET), Volume 5, Issue 4, April (2014), pp [7] Kirandeep and Anu Garg, Implementing Security on Android Application, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, March April (2013), pp editor@iaeme.com
Genetic Algorithm Utilizing Image Clustering with Merge and Split Processes Which Allows Minimizing Fisher Distance Between Clusters
Genetic Algorithm Utilizing Image Clustering with Merge and Split Processes Which Allows Minimizing Fisher Distance Between Clusters Kohei Arai 1 Graduate School of Science and Engineering Saga University
More informationSyntax Agnostic Semantic Validation of XML Documents using Schematron
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2014 Syntax Agnostic Semantic Validation of XML Documents using Schematron Amer Ali and Lixin Tao Seidenberg School of CSIS,
More informationA Modified Algorithmic Approach of DSDV Routing Protocol for Wireless Ad Hoc Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 4 (Sep. - Oct. 2013), PP 49-54 A Modified Algorithmic Approach of DSDV Routing Protocol for Wireless
More informationSample IJAETMAS Paper for A4 Page Size
Sample IJAETMAS Paper for A4 Page Size 1st author name 1, 2 nd author name 2, 3 rd author name 3 ¹Department & university, Country ²Department & university, Country ³Department & university, Country 1
More informationParallelization for Multi-dimensional Loops with Non-uniform Dependences
Parallelization for Multi-dimensional Loops with Non-uniform Dependences Sam-Jin Jeong Abstract This paper presents two enhanced partitioning algorithms in order to improve parallelization of multidimensional
More informationBFPA CONFERENCE- POWERPOINT PRESENTATION FORMAT
BFPA CONFERENCE- POWERPOINT PRESENTATION FORMAT These guidelines are designed to help you prepare a successful conference presentation. PREPARING YOUR POWERPOINT PRESENTATION Please note the following:
More informationVisualization of Learning Processes for Back Propagation Neural Network Clustering
Visualization of Learning Processes for Back Propagation Neural Network Clustering Kohei Arai 1 Graduate School of Science and Engineering Saga University Saga City, Japan Abstract Method for visualization
More informationDevelopment of web applications using Google Technology
International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16 Development of web applications using Google Technology Vaibhavi Nayak 1, Vinuta V Naik 2,Vijaykumar
More informationPaper Template in One-Column Format
Submitted for publication in proceedings of National Conference on Recent Trends in Technology and Management 2016 (NCRTTM 2016) Paper Template in One-Column Format Author's Name a and Author's Name b
More informationGuidelines for Paper Presentation
Standard Rules Guidelines for Paper Presentation Structure of the Paper : o The paper should be drafted in IEEE Format that is in two column format. o The Text format should be in Times New Roman and the
More informationShort Message Service (SMS) Applications for Disease Prevention and Awareness in Palestine
Short Message Service (SMS) Applications for Disease Prevention and Awareness in Palestine Asma H Sbeih and Haitham W Hijazi IT dept. PAU-University, Palestine al-ahlya University, PAU, asma_sbeih@paluniv.edu,
More informationPaper Title* (use style: paper title)
Paper Title* (use style: paper title) Subtitle as needed (paper subtitle) Authors Name/s per 1st Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms
More informationImage Enhancement using Rigdelets
Image Enhancement using Rigdelets Sachin S G 1, Renuka Prasad S B 2 Assistant Professor, Dept. of ECE, Shri Pillappa College of Engg, Bengaluru, Karnataka, India 1 Assistant Professor, Dept. of CSE, Shri
More informationEnergy Efficient Ethernet for Real-Time Industrial Networks
Energy Efficient Ethernet for Real-Time Industrial Networks Gudipalli Vedavyas M.Tech. (Embedded Systems) A.Ranga Rao Head of Department Abstract: To increase the energy efficiency of Ethernet networks,
More informationAsst. Professor, Dept. of MCA, Siddaganga Institute of Technology, Tumakuru, Karnataka
Automated Testing for the Graphical User Interface of Android Applications Using an Open Source Mobile Testing Tool Appium Vinay. S. Pattanshetti 1, Mr. Ramesh C N 2 1 Dept. of MCA, Siddaganga Institute
More informationFinding Similar Items:Nearest Neighbor Search
Finding Similar Items:Nearest Neighbor Search Barna Saha February 23, 2016 Finding Similar Items A fundamental data mining task Finding Similar Items A fundamental data mining task May want to find whether
More informationA NEW FRAMEWORK FOR SOFTWARE LIBRARY INVESTMENT METRICS
A NEW FRAMEWORK FOR SOFTWARE LIBRARY INVESTMENT METRICS Mohammed Q. Shatnawi 1, Ismaeil Hmeidi 2, Anas Shatnawi 3 Jordan University of Science and Technology, Jordan 1 mshatnawi@just.edu.jo, 2 hmeidi@just.edu.jo,
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 FACE RECOGNITION IN ANDROID K.M. Sanghavi 1, Agrawal Mohini 2,Bafna Khushbu
More informationDoor Automation Security System Using OTP
Door Automation Security System Using OTP Snehalata Raut 1, Dimple chapke 2, Akash Sontakke 3, Nayan Pounikar 4, Prof. Neha Israni 5 1234 Final Year Students, 5 Assistant professor of Department of Information
More informationA Study of Random Forest Algorithm with implemetation using Weka
A Study of Random Forest Algorithm with implemetation using Weka 1 Dr. N.Venkatesan, Associate Professor, Dept. of IT., Bharathiyar College of Engg. & Technology, Karikal, India 2 Mrs. G.Priya, Assistant
More informationTautology based Advanced SQL Injection Technique A Peril to Web Application
IJIRST National Conference on Latest Trends in Networking and Cyber Security March 2017 Tautology based Advanced SQL Injection Technique A Peril to Web Application Kritarth Jhala 1 Shukla Umang D 2 2 Department
More informationOptimization of Curve Tracing Algorithm for Automated Analysis of Cargo Transport in Axons
Optimization of Curve Tracing Algorithm for Automated Analysis of Cargo Transport in Axons Wenjun Xie per Department of Chemistry, Stanford University Stanford, USA xwj@stanford.edu SaiSravanBharadawaj
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationEnhanced Ration Distribution System using RFID and Finger-Vein Recognition
Enhanced Ration Distribution System using RFID and Finger-Vein Recognition S. Sathya, N.Nivetha, A.Tamilazhagan, S.Vasan, M.Thangavel Department of Electronics & Communication Engineering Knowledge Institute
More informationHandling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,
More informationAn Inertial Pen With Dynamic Time Warping Recognizer for Handwriting and Gesture Recognition
An Inertial Pen With Dynamic Time Warping Recognizer for Handwriting and Gesture Recognition Ms.A.Elakya.ME., Assistant Professor, Department of Electrical and Electronic Engineering, Sri Krishna College
More informationCOMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,
More informationMOBILE DEFEND. Powering Robust Mobile Security Solutions
MOBILE DEFEND Powering Robust Mobile Security Solutions Table of Contents Introduction Trustlook SECURE ai Mobile Defend Who Uses SECURE ai Mobile Defend? How it Works o Mobile Device Risk Score o Mobile
More informationResearch Article QOS Based Web Service Ranking Using Fuzzy C-means Clusters
Research Journal of Applied Sciences, Engineering and Technology 10(9): 1045-1050, 2015 DOI: 10.19026/rjaset.10.1873 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More informationEnhanced Vulnerability Analysis For Clickjacking Web Attack And Providing Security Using Whitelisting URL Analyzer
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 6 June 2015, Page No. 12652-12657 Enhanced Vulnerability Analysis For Clickjacking Web Attack And Providing
More informationIndustrial Automation Using PSOC 5LP
Industrial Automation Using PSOC 5LP Shreekrupa PG Student Department of Electronics and Communication Engineering GSSSIETW, Mysuru Sushma S J Associate professor Department of Electronics and Communication
More informationSentiment Analysis using Weighted Emoticons and SentiWordNet for Indonesian Language
Sentiment Analysis using Weighted Emoticons and SentiWordNet for Indonesian Language Nur Maulidiah Elfajr, Riyananto Sarno Department of Informatics, Faculty of Information and Communication Technology
More informationElection Analysis and Prediction Using Big Data Analytics
Election Analysis and Prediction Using Big Data Analytics Omkar Sawant, Chintaman Taral, Roopak Garbhe Students, Department Of Information Technology Vidyalankar Institute of Technology, Mumbai, India
More informationDensity Based Clustering using Modified PSO based Neighbor Selection
Density Based Clustering using Modified PSO based Neighbor Selection K. Nafees Ahmed Research Scholar, Dept of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli, India nafeesjmc@gmail.com
More informationNear Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri
Near Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri Scene Completion Problem The Bare Data Approach High Dimensional Data Many real-world problems Web Search and Text Mining Billions
More informationA Novel Technique for Optimizing the Hidden Layer Architecture in Artificial Neural Networks N. M. Wagarachchi 1, A. S.
American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
More informationRochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm
Rochester Institute of Technology Making personalized education scalable using Sequence Alignment Algorithm Submitted by: Lakhan Bhojwani Advisor: Dr. Carlos Rivero 1 1. Abstract There are many ways proposed
More informationOFFLINE SIGNATURE VERIFICATION
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2
More informationLOAD BALANCING IN CLOUD COMPUTING USING ANT COLONY OPTIMIZATION
International Journal of Computer Engineering & Technology (IJCET) Volume 8, Issue 6, Nov-Dec 2017, pp. 54 59, Article ID: IJCET_08_06_006 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=8&itype=6
More informationANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining
ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, 2014 ISSN 2278 5485 EISSN 2278 5477 discovery Science Comparative Study of Classification Algorithms Using Data Mining Akhila
More informationDATA POOL: A STRUCTURE TO STORE VOLUMINOUS DATA
International Journal of Computer Engineering & Technology (IJCET) Volume 9, Issue 5, September-October 2018, pp. 167 180, Article ID: IJCET_09_05_020 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=9&itype=5
More informationPRE HADOOP AND POST HADOOP VALIDATIONS FOR BIG DATA
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 10, October 2017, pp. 608 616, Article ID: IJMET_08_10_066 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=10
More informationTemplate Extraction from Heterogeneous Web Pages
Template Extraction from Heterogeneous Web Pages 1 Mrs. Harshal H. Kulkarni, 2 Mrs. Manasi k. Kulkarni Asst. Professor, Pune University, (PESMCOE, Pune), Pune, India Abstract: Templates are used by many
More informationMALICIOUS URL DETECTION AND PREVENTION AT BROWSER LEVEL FRAMEWORK
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 12, December 2017, pp. 536 541, Article ID: IJMET_08_12_054 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=12
More informationFinding Similar Sets. Applications Shingling Minhashing Locality-Sensitive Hashing
Finding Similar Sets Applications Shingling Minhashing Locality-Sensitive Hashing Goals Many Web-mining problems can be expressed as finding similar sets:. Pages with similar words, e.g., for classification
More informationShingling Minhashing Locality-Sensitive Hashing. Jeffrey D. Ullman Stanford University
Shingling Minhashing Locality-Sensitive Hashing Jeffrey D. Ullman Stanford University 2 Wednesday, January 13 Computer Forum Career Fair 11am - 4pm Lawn between the Gates and Packard Buildings Policy for
More informationAmerican International Journal of Research in Science, Technology, Engineering & Mathematics
American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
More informationRECOGNITION OF DRIVING MANEUVERS BASED ACCELEROMETER SENSOR
International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 11, November 2018, pp. 1542 1547, Article ID: IJCIET_09_11_149 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=11
More informationEfficient Migration of Service Agent in P-Grid Environments based on Mobile Agent
Efficient Migration of Service Agent in P-Grid Environments based on Mobile Agent Youn-gyou Kook, Woon-yong Kim, Young-Keun Choi Dept. of Computing Science, Kwangwoon University Wolgye-dong, Nowon-gu,
More informationEvaluation of Communication Overheads in Wireless Sensor Networks
Evaluation of Communication Overheads in Wireless Sensor Networks Shiv Prasad Kori 1, Dr. R. K. Baghel 2 1 Deptt. of ECE, JIJA Mata Govt. Women Polytechnic College, Burhanpur (MP)- INDIA 2 Electronics
More informationDesign and Implementation of Search Engine Using Vector Space Model for Personalized Search
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationEFFICIENT ALGORITHM FOR MINING ON BIO MEDICAL DATA FOR RANKING THE WEB PAGES
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 2017, pp. 1424 1429, Article ID: IJMET_08_08_147 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=8
More informationNORMALIZATION INDEXING BASED ENHANCED GROUPING K-MEAN ALGORITHM
NORMALIZATION INDEXING BASED ENHANCED GROUPING K-MEAN ALGORITHM Saroj 1, Ms. Kavita2 1 Student of Masters of Technology, 2 Assistant Professor Department of Computer Science and Engineering JCDM college
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) NEED FOR DESIGN PATTERNS AND FRAMEWORKS FOR QUALITY SOFTWARE DEVELOPMENT
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationAPPLICATION OF BPSO IN FLEXIBLE MANUFACTURING SYSTEM SCHEDULING
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 5, May 2017, pp. 186 195, Article ID: IJMET_08_05_020 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtyp
More informationTOWARDS AN ENHANCED EFFICIENT CROSS LAYER PROTOCOL (EECLAP) FOR WIRELESS SENSOR NETWORKS
International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 11, November 2017, pp. 394 402, Article ID: IJMET_08_11_044 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=8&itype=11
More informationComparison of Online Record Linkage Techniques
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.
More informationCloud-Based Multimedia Content Protection System
Cloud-Based Multimedia Content Protection System Abstract Shivanand S Rumma Dept. of P.G. Studies Gulbarga University Kalaburagi Karnataka, India shivanand_sr@yahoo.co.in In day to day life so many multimedia
More informationFiltering Unwanted Messages from (OSN) User Wall s Using MLT
Filtering Unwanted Messages from (OSN) User Wall s Using MLT Prof.Sarika.N.Zaware 1, Anjiri Ambadkar 2, Nishigandha Bhor 3, Shiva Mamidi 4, Chetan Patil 5 1 Department of Computer Engineering, AISSMS IOIT,
More informationGraph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network
Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity
More informationJournal of Industrial Engineering Research
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Mammogram Image Segmentation Using voronoi Diagram Properties Dr. J. Subash
More informationHow to Configure IPS Policies
IPS policies control the behavior of the IPS when an attack is detected. You can define multiple IPS policies and apply them to individual firewall rules as needed. In this article: Default IPS Policy
More informationDeep Web Content Mining
Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased
More informationWriter Recognizer for Offline Text Based on SIFT
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1057
More informationAdvances in Natural and Applied Sciences. Information Retrieval Using Collaborative Filtering and Item Based Recommendation
AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Information Retrieval Using Collaborative Filtering and Item Based Recommendation
More informationS. Sreenivasan Research Scholar, School of Advanced Sciences, VIT University, Chennai Campus, Vandalur-Kelambakkam Road, Chennai, Tamil Nadu, India
International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 10, October 2018, pp. 1322 1330, Article ID: IJCIET_09_10_132 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=10
More informationKeywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred
More informationFITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION
Suranaree J. Sci. Technol. Vol. 19 No. 4; October - December 2012 259 FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Pavee Siriruk * Received: February 28, 2013; Revised: March 12,
More informationImproved Signature-Based Antivirus System
Improved Signature-Based Antivirus System Osaghae E. O. Department of Computer Science Federal University, Lokoja, Kogi State, Nigeria Abstract: The continuous updating of antivirus database with malware
More informationA Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique
A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique 1 Syed MohdFazalulHaque, 2 Dr. V Srikanth, 3 Dr. E. Sreenivasa Reddy 1 Maulana Azad National Urdu University, 2 Professor,
More informationBig Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2017)
Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2017) Week 9: Data Mining (3/4) March 7, 2017 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo These slides
More informationA Powerful Tool for Intrusion Detection & Clustering Techniques and Methodology
A Powerful Tool for Intrusion Detection & Clustering Techniques and Methodology 1 Sonal R.Chakole, 2 Vijaya Balpande, 3 Vyenktesh Giripunge 1, 2, 3 Computer Department, Nagpur University, Professor in
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationCHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES
70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically
More informationSOFTWARE DEFECT PREDICTION USING IMPROVED SUPPORT VECTOR MACHINE CLASSIFIER
International Journal of Mechanical Engineering and Technology (IJMET) Volume 7, Issue 5, September October 2016, pp.417 421, Article ID: IJMET_07_05_041 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=7&itype=5
More informationCollaborative Filtering using Euclidean Distance in Recommendation Engine
Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102074, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Collaborative Filtering using Euclidean Distance
More informationImproving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm
Improving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm Majid Hatami Faculty of Electrical and Computer Engineering University of Tabriz,
More informationBig Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016)
Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Week 9: Data Mining (3/4) March 8, 2016 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo These slides
More informationAn Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
More informationRobust PDF Table Locator
Robust PDF Table Locator December 17, 2016 1 Introduction Data scientists rely on an abundance of tabular data stored in easy-to-machine-read formats like.csv files. Unfortunately, most government records
More informationAn Edge-Based Approach to Motion Detection*
An Edge-Based Approach to Motion Detection* Angel D. Sappa and Fadi Dornaika Computer Vison Center Edifici O Campus UAB 08193 Barcelona, Spain {sappa, dornaika}@cvc.uab.es Abstract. This paper presents
More informationEvaluation Measures. Sebastian Pölsterl. April 28, Computer Aided Medical Procedures Technische Universität München
Evaluation Measures Sebastian Pölsterl Computer Aided Medical Procedures Technische Universität München April 28, 2015 Outline 1 Classification 1. Confusion Matrix 2. Receiver operating characteristics
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS46: Mining Massive Datasets Jure Leskovec, Stanford University http://cs46.stanford.edu /7/ Jure Leskovec, Stanford C46: Mining Massive Datasets Many real-world problems Web Search and Text Mining Billions
More informationReliability Measure of 2D-PAGE Spot Matching using Multiple Graphs
Reliability Measure of 2D-PAGE Spot Matching using Multiple Graphs Dae-Seong Jeoune 1, Chan-Myeong Han 2, Yun-Kyoo Ryoo 3, Sung-Woo Han 4, Hwi-Won Kim 5, Wookhyun Kim 6, and Young-Woo Yoon 6 1 Department
More informationSMART ELECTRIC CONTROL SYSTEM USING PLC & HMI
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 4, April 2018, pp. 548 555, Article ID: IJMET_09_04_062 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=4
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationAutomation the process of unifying the change in the firewall performance
Automation the process of unifying the change in the firewall performance 1 Kirandeep kaur, 1 Student - Department of Computer science and Engineering, Lovely professional university, Phagwara Abstract
More informationSIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION
SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION Kamil Zakwan Mohd Azmi, Zuwairie Ibrahim and Dwi Pebrianti Faculty of Electrical
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationR. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking
More informationOptimized Algorithm for Particle Swarm Optimization
Optimized Algorithm for Particle Swarm Optimization Fuzhang Zhao Abstract Particle swarm optimization (PSO) is becoming one of the most important swarm intelligent paradigms for solving global optimization
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationIntegrating User Preference with Theft Identification and Profile Changer in LBSNs Divya. M, V.R.Balasaraswathi, A. Abirami, G.
2016 IJSRST Volume 2 Issue 2 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Integrating User Preference with Theft Identification and Profile Changer in LBSNs Divya.
More informationMobile Robot Path Planning in Static Environments using Particle Swarm Optimization
Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers
More informationLECTURE 16: SWARM INTELLIGENCE 2 / PARTICLE SWARM OPTIMIZATION 2
15-382 COLLECTIVE INTELLIGENCE - S18 LECTURE 16: SWARM INTELLIGENCE 2 / PARTICLE SWARM OPTIMIZATION 2 INSTRUCTOR: GIANNI A. DI CARO BACKGROUND: REYNOLDS BOIDS Reynolds created a model of coordinated animal
More informationObject Recognition Algorithms for Computer Vision System: A Survey
Volume 117 No. 21 2017, 69-74 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Object Recognition Algorithms for Computer Vision System: A Survey Anu
More informationIntroduction. Can we use Google for networking research?
Unconstrained Profiling of Internet Endpoints via Information on the Web ( Googling the Internet) Ionut Trestian1 Soups Ranjan2 Aleksandar Kuzmanovic1 Antonio Nucci2 1 Northwestern 2 Narus University Inc.
More informationPREVENTING FROM PHISHING ATTACK BY IMPLEMENTING URL PATTERN MATCHING TECHNIQUE IN WEB
International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 9, September 2017, pp. 1200 1208, Article ID: IJCIET_08_09_135 Available online at http://http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=8&itype=9
More information