2009 First International Workshop on Database Technology and Applications, 2009
Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In r... more Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provides a wide survey of different privacy preserving data mining algorithms and analyses the representative techniques for privacy preserving data mining, and points out their merits and demerits. Finally the present problems and directions for future research are discussed.
Location message still from peripatetic users, wittingly and unconsciously, can concede way over ... more Location message still from peripatetic users, wittingly and unconsciously, can concede way over only a user’s ordinate and abscissa. Within this report, we survey bordering k nearest adjoin queries whither the peripatetic user queries the neighborhood positioned firm through bordering k nearest sights occupying on his stream whereabouts. To weigh the assurance in our solutions, we construe a safecracker create web hosting in queries. The security reasoning has proven our solutions ensures both scene penetralium sense the user doesn't expose any fine points roughly his neighborhood to the LBS worker and interrogate separateness spirit the user doesn't expose whichever kind of POIs he's excited to the LBS worker. We consider that the mobile user can buy his position from satellites unnamed, and the central administration and the LBS laborer taboo plot to involve the user scene concealment or competent is an unnamed siphon. RSA isn't a probabilistic file encryption pla...
In the vast literature Software architecture has been recovered through graphs. During Software A... more In the vast literature Software architecture has been recovered through graphs. During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the phase in which we will find the same sub graph which is present in source graph and query graph. In most of the papers, it was stated that graph matching is complete. But in reality matching between the graphs is not appropriately complete. We call this an error in matching. In this paper we investigate the applicability of error correcting graph matching algorithm, Graph Isomorphism by Decision Tree to compensate the Software Architecture Recovery.
Mobile Computing and Sustainable Informatics, 2021
Computer security is a significant issue in the present networking conditions. These days, with t... more Computer security is a significant issue in the present networking conditions. These days, with the improvement of Web advances administrations on the planet, the gatecrashers have been expanded promptly. Consequently, the need for an intrusion detection system (IDS) framework in the security of the organization field keeps interlopers from approaching the data. IDS is a gadget or programming application that screens the organization or framework for malevolent action or strategy infringement and sends caution to framework and managers at a legitimate time. IDS screens both inbound and outbound traffics and is used to recognize potential interruptions. In this article, IDSs are assembled utilizing machine learning (ML) methods. IDSs dependent on ML techniques are viable and exact in identifying network assaults. In any case, the presentation of these frameworks diminishes for high-dimensional information spaces. It is necessary to perform a fitting component extraction strategy that can prune a portion of the highlights that does not have an incredible effect in the characterization cycle. Feature choice is expected to choose the ideal subset of highlights that delivers to the whole dataset to expand the precision and the characterization execution of IDS. In this work, the UNSW-NB15 interruption discovery dataset is examined to prepare and test the models. Additionally, a covering-based element is applied to decrease the strategy by utilizing the SVM-RFE calculation for IDS to choose the best subset of highlights. At that point, the two ML approaches are executed to utilize the diminished component space such as decision tree and support vector machine (SVM). The outcomes exhibited that the support vector machine RFE-based component determination strategy takes into consideration techniques; for example, the decision tree is build to test the exactness from 98.89 to 99.99% for the twofold order plot. The investigation results affirmed the adequacy of the proposed feature determination strategy in improving organization IDS.
Mobile Computing and Sustainable Informatics, 2021
Computer security is a significant issue in the present networking conditions. These days, with t... more Computer security is a significant issue in the present networking conditions. These days, with the improvement of Web advances administrations on the planet, the gatecrashers have been expanded promptly. Consequently, the need for an intrusion detection system (IDS) framework in the security of the organization field keeps interlopers from approaching the data. IDS is a gadget or programming application that screens the organization or framework for malevolent action or strategy infringement and sends caution to framework and managers at a legitimate time. IDS screens both inbound and outbound traffics and is used to recognize potential interruptions. In this article, IDSs are assembled utilizing machine learning (ML) methods. IDSs dependent on ML techniques are viable and exact in identifying network assaults. In any case, the presentation of these frameworks diminishes for high-dimensional information spaces. It is necessary to perform a fitting component extraction strategy that can prune a portion of the highlights that does not have an incredible effect in the characterization cycle. Feature choice is expected to choose the ideal subset of highlights that delivers to the whole dataset to expand the precision and the characterization execution of IDS. In this work, the UNSW-NB15 interruption discovery dataset is examined to prepare and test the models. Additionally, a covering-based element is applied to decrease the strategy by utilizing the SVM-RFE calculation for IDS to choose the best subset of highlights. At that point, the two ML approaches are executed to utilize the diminished component space such as decision tree and support vector machine (SVM). The outcomes exhibited that the support vector machine RFE-based component determination strategy takes into consideration techniques; for example, the decision tree is build to test the exactness from 98.89 to 99.99% for the twofold order plot. The investigation results affirmed the adequacy of the proposed feature determination strategy in improving organization IDS.
Data is considered to be the important element in the field of Data Science and Machine Learning.... more Data is considered to be the important element in the field of Data Science and Machine Learning. Performance of Machine Learning and Data Mining algorithms greatly influenced by the characteristics of data and data with missing values. Performance of all these Machine Learning algorithms greatly improved and they can give accurate results when the data is in full without missing values. So before applying these algorithms; dataset and its missing values are completely filled. To impute these missing values in the dataset there are numerous methods were proposed. In this paper we used micro array gene expression dataset; by introducing various percentages of missing values a new methodology is proposed to impute these missing values in the data set. The nature of micro array gene expression dataset is huge in dimensionality, so at first, we used recursive feature elimination method to select the best features which contributes much for model was selected then we apply the Ridge Regr...
Testing is one of the important phase in software development. Main Purpose of testing is to iden... more Testing is one of the important phase in software development. Main Purpose of testing is to identify the number of errors present in the software. In the history of software development several testing techniques and methods are used in finding out the errors. Module testing is one of the sophisticated testing technique. Software release problem is the one of oldest of problem in which managers could find a time at which testing is be to stopped such that released software should have more quality. During the testing many resources are consumed; every manager’s intension is to find efficient method of allocating resources during software module testing such that it saves time and resource. In this paper we have combined the software release problem with resource allocation with software reliability growth model with imperfect-debugging phenomenon. Experiments are conducted on datasets. The results show our proposed model fits better than other. General Terms
Resource control and resource maintenance during the software testing is one of the finest optimi... more Resource control and resource maintenance during the software testing is one of the finest optimization problems. During the software testing many of the resources like time, effort and budget were consumed. The main aim of the manager is allocate the resources in a constrained manner such that the effort can be optimally allocated and overall budget is minimized. In this paper we proposed a imperfect debugging SRGM during testing and resource allocation is done based on optimizing the effort and reliability. An experimental result shows the proposed model well fitted for software testing.
Resource control and resource maintenance during the software testing is one of the finest optimi... more Resource control and resource maintenance during the software testing is one of the finest optimization problems. During the software testing many of the resources like time, effort and budget were consumed. The main aim of the manager is allocate the resources in a constrained manner such that the effort can be optimally allocated and overall budget is minimized. In this paper we proposed a imperfect debugging SRGM during testing and resource allocation is done based on optimizing the effort and reliability. An experimental result shows the proposed model well fitted for software testing.
Computer networks are ubiquitous in nature with a plethora of networking models that are suited t... more Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network mana...
Computer networks are ubiquitous in nature with a plethora of networking models that are suited t... more Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network mana...
The skyline of a multidimensional point set is a subset of interesting points that are not domina... more The skyline of a multidimensional point set is a subset of interesting points that are not dominated by others. In this paper, We are introducing the Analyze and Update data Method which enhances the constrained Skyline query processing against distributed data sites approach and user centric approach. User can easly compares the result data dynamically. we follow constrained skyline queries in a large-scale unstructured distributed environment, where relevant data are distributed among geographically scattered sites.A partition algorithm that divides all data sites into incomparable groups such that the skyline computations in all groups can be parallelized without changing the final result, then develop a novel algorithm framework called PaDSkyline for parallel skyline query processing among partitioned site groups. The method also employ intragroup optimization and multifiltering technique to improve the skyline query processes within each group. In particular, multiple (local) s...
Software reliability is one important factor for software quality. Measuring the software quality... more Software reliability is one important factor for software quality. Measuring the software quality and its reliability is one complex task. Many papers are published in the history of reliability which answers the software reliability and related problems. Determining the cost of the software is another issue. In this paper we have determined the total cost of the software under given warranty period. During the warranty period the company will give the maintenance support. The optimal release time is determined for software under reliability, cost and given warranty period with two types of imperfect debugging software reliability growth models. Numeric calculations were done to support our phenomenon. 1.
2009 First International Workshop on Database Technology and Applications, 2009
Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In r... more Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provides a wide survey of different privacy preserving data mining algorithms and analyses the representative techniques for privacy preserving data mining, and points out their merits and demerits. Finally the present problems and directions for future research are discussed.
Location message still from peripatetic users, wittingly and unconsciously, can concede way over ... more Location message still from peripatetic users, wittingly and unconsciously, can concede way over only a user’s ordinate and abscissa. Within this report, we survey bordering k nearest adjoin queries whither the peripatetic user queries the neighborhood positioned firm through bordering k nearest sights occupying on his stream whereabouts. To weigh the assurance in our solutions, we construe a safecracker create web hosting in queries. The security reasoning has proven our solutions ensures both scene penetralium sense the user doesn't expose any fine points roughly his neighborhood to the LBS worker and interrogate separateness spirit the user doesn't expose whichever kind of POIs he's excited to the LBS worker. We consider that the mobile user can buy his position from satellites unnamed, and the central administration and the LBS laborer taboo plot to involve the user scene concealment or competent is an unnamed siphon. RSA isn't a probabilistic file encryption pla...
In the vast literature Software architecture has been recovered through graphs. During Software A... more In the vast literature Software architecture has been recovered through graphs. During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the phase in which we will find the same sub graph which is present in source graph and query graph. In most of the papers, it was stated that graph matching is complete. But in reality matching between the graphs is not appropriately complete. We call this an error in matching. In this paper we investigate the applicability of error correcting graph matching algorithm, Graph Isomorphism by Decision Tree to compensate the Software Architecture Recovery.
Mobile Computing and Sustainable Informatics, 2021
Computer security is a significant issue in the present networking conditions. These days, with t... more Computer security is a significant issue in the present networking conditions. These days, with the improvement of Web advances administrations on the planet, the gatecrashers have been expanded promptly. Consequently, the need for an intrusion detection system (IDS) framework in the security of the organization field keeps interlopers from approaching the data. IDS is a gadget or programming application that screens the organization or framework for malevolent action or strategy infringement and sends caution to framework and managers at a legitimate time. IDS screens both inbound and outbound traffics and is used to recognize potential interruptions. In this article, IDSs are assembled utilizing machine learning (ML) methods. IDSs dependent on ML techniques are viable and exact in identifying network assaults. In any case, the presentation of these frameworks diminishes for high-dimensional information spaces. It is necessary to perform a fitting component extraction strategy that can prune a portion of the highlights that does not have an incredible effect in the characterization cycle. Feature choice is expected to choose the ideal subset of highlights that delivers to the whole dataset to expand the precision and the characterization execution of IDS. In this work, the UNSW-NB15 interruption discovery dataset is examined to prepare and test the models. Additionally, a covering-based element is applied to decrease the strategy by utilizing the SVM-RFE calculation for IDS to choose the best subset of highlights. At that point, the two ML approaches are executed to utilize the diminished component space such as decision tree and support vector machine (SVM). The outcomes exhibited that the support vector machine RFE-based component determination strategy takes into consideration techniques; for example, the decision tree is build to test the exactness from 98.89 to 99.99% for the twofold order plot. The investigation results affirmed the adequacy of the proposed feature determination strategy in improving organization IDS.
Mobile Computing and Sustainable Informatics, 2021
Computer security is a significant issue in the present networking conditions. These days, with t... more Computer security is a significant issue in the present networking conditions. These days, with the improvement of Web advances administrations on the planet, the gatecrashers have been expanded promptly. Consequently, the need for an intrusion detection system (IDS) framework in the security of the organization field keeps interlopers from approaching the data. IDS is a gadget or programming application that screens the organization or framework for malevolent action or strategy infringement and sends caution to framework and managers at a legitimate time. IDS screens both inbound and outbound traffics and is used to recognize potential interruptions. In this article, IDSs are assembled utilizing machine learning (ML) methods. IDSs dependent on ML techniques are viable and exact in identifying network assaults. In any case, the presentation of these frameworks diminishes for high-dimensional information spaces. It is necessary to perform a fitting component extraction strategy that can prune a portion of the highlights that does not have an incredible effect in the characterization cycle. Feature choice is expected to choose the ideal subset of highlights that delivers to the whole dataset to expand the precision and the characterization execution of IDS. In this work, the UNSW-NB15 interruption discovery dataset is examined to prepare and test the models. Additionally, a covering-based element is applied to decrease the strategy by utilizing the SVM-RFE calculation for IDS to choose the best subset of highlights. At that point, the two ML approaches are executed to utilize the diminished component space such as decision tree and support vector machine (SVM). The outcomes exhibited that the support vector machine RFE-based component determination strategy takes into consideration techniques; for example, the decision tree is build to test the exactness from 98.89 to 99.99% for the twofold order plot. The investigation results affirmed the adequacy of the proposed feature determination strategy in improving organization IDS.
Data is considered to be the important element in the field of Data Science and Machine Learning.... more Data is considered to be the important element in the field of Data Science and Machine Learning. Performance of Machine Learning and Data Mining algorithms greatly influenced by the characteristics of data and data with missing values. Performance of all these Machine Learning algorithms greatly improved and they can give accurate results when the data is in full without missing values. So before applying these algorithms; dataset and its missing values are completely filled. To impute these missing values in the dataset there are numerous methods were proposed. In this paper we used micro array gene expression dataset; by introducing various percentages of missing values a new methodology is proposed to impute these missing values in the data set. The nature of micro array gene expression dataset is huge in dimensionality, so at first, we used recursive feature elimination method to select the best features which contributes much for model was selected then we apply the Ridge Regr...
Testing is one of the important phase in software development. Main Purpose of testing is to iden... more Testing is one of the important phase in software development. Main Purpose of testing is to identify the number of errors present in the software. In the history of software development several testing techniques and methods are used in finding out the errors. Module testing is one of the sophisticated testing technique. Software release problem is the one of oldest of problem in which managers could find a time at which testing is be to stopped such that released software should have more quality. During the testing many resources are consumed; every manager’s intension is to find efficient method of allocating resources during software module testing such that it saves time and resource. In this paper we have combined the software release problem with resource allocation with software reliability growth model with imperfect-debugging phenomenon. Experiments are conducted on datasets. The results show our proposed model fits better than other. General Terms
Resource control and resource maintenance during the software testing is one of the finest optimi... more Resource control and resource maintenance during the software testing is one of the finest optimization problems. During the software testing many of the resources like time, effort and budget were consumed. The main aim of the manager is allocate the resources in a constrained manner such that the effort can be optimally allocated and overall budget is minimized. In this paper we proposed a imperfect debugging SRGM during testing and resource allocation is done based on optimizing the effort and reliability. An experimental result shows the proposed model well fitted for software testing.
Resource control and resource maintenance during the software testing is one of the finest optimi... more Resource control and resource maintenance during the software testing is one of the finest optimization problems. During the software testing many of the resources like time, effort and budget were consumed. The main aim of the manager is allocate the resources in a constrained manner such that the effort can be optimally allocated and overall budget is minimized. In this paper we proposed a imperfect debugging SRGM during testing and resource allocation is done based on optimizing the effort and reliability. An experimental result shows the proposed model well fitted for software testing.
Computer networks are ubiquitous in nature with a plethora of networking models that are suited t... more Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network mana...
Computer networks are ubiquitous in nature with a plethora of networking models that are suited t... more Computer networks are ubiquitous in nature with a plethora of networking models that are suited to different organizations. However, security has been a concern in such networks besides managing network effectively. Mostly network security is based on the needs of the organization which used the network for secure communications. However, the actual implementation of security is achieved by defining policies that guide the policy management tool to take expert decisions. The policies when defined perfectly, the security can be most effective. Network administrators depend on traditional tools that can be used to monitor happenings in the network. However, when there are plenty of messages in the reports and network administrators need time to analyze and made decisions, they cannot prevent damage that has been caused already. Therefore a real time approach is desired for both network management and security in computer networks. We believe that policy based security and network mana...
The skyline of a multidimensional point set is a subset of interesting points that are not domina... more The skyline of a multidimensional point set is a subset of interesting points that are not dominated by others. In this paper, We are introducing the Analyze and Update data Method which enhances the constrained Skyline query processing against distributed data sites approach and user centric approach. User can easly compares the result data dynamically. we follow constrained skyline queries in a large-scale unstructured distributed environment, where relevant data are distributed among geographically scattered sites.A partition algorithm that divides all data sites into incomparable groups such that the skyline computations in all groups can be parallelized without changing the final result, then develop a novel algorithm framework called PaDSkyline for parallel skyline query processing among partitioned site groups. The method also employ intragroup optimization and multifiltering technique to improve the skyline query processes within each group. In particular, multiple (local) s...
Software reliability is one important factor for software quality. Measuring the software quality... more Software reliability is one important factor for software quality. Measuring the software quality and its reliability is one complex task. Many papers are published in the history of reliability which answers the software reliability and related problems. Determining the cost of the software is another issue. In this paper we have determined the total cost of the software under given warranty period. During the warranty period the company will give the maintenance support. The optimal release time is determined for software under reliability, cost and given warranty period with two types of imperfect debugging software reliability growth models. Numeric calculations were done to support our phenomenon. 1.
Uploads
Papers by shaheda Akthar