Papers by pratiksha gautam
Lecture notes in networks and systems, Jul 3, 2022
International Journal of Electrical and Electronics Research
Gait disorder is very common in neurodegenerative diseases and differentiating among the same kin... more Gait disorder is very common in neurodegenerative diseases and differentiating among the same kinematic design is a very challenging task. The muscle activity is responsible for the creation of kinematic patterns. Hence, one optimal way to monitor this issue is to analyse the muscle pattern to identify the gait disorders. In this paper, we will investigate the possibility of identifying GAIT disorders using EMG patterns with the help of various machine learning algorithms. Twenty-five normal persons (13 male and 12 females, age around 28 years of age) and 21 persons having GAIT disorders (11 male and 10 females, age around 67 years of age). Four different machine learning algorithms have been used to identify EMG patterns to recognize healthy and unhealthy persons. The results obtained so far have been used to distinguish between GAIT disorders and healthy patients. Our proposed system can also prove that Recurrent Neural Network has achieved the best accuracy with 91.3 % in the cas...
2017 Fourth International Conference on Image Information Processing (ICIIP), 2017
Software clone is a serious maintenance problem in software industry due to copying and pasting. ... more Software clone is a serious maintenance problem in software industry due to copying and pasting. Reusing a piece of source code from one place to another place is called copied code/ software clone and the process is called software cloning. However, various software clone detection techniques and tools have been proposed for software clone detection. In this paper, we present a directed acyclic graph (DAG) method for detection of type-2 software clones. Generally, directed acyclic graph is a syntax tree except that each node has unique value. DAG is used to eliminate common sub-expressions and dead code. Hence, we used to detect type-2 software clones.
International journal of scientific and research publications, 2017
Splitting up an image into multiple segments in order to change the representation of an image in... more Splitting up an image into multiple segments in order to change the representation of an image into something that is more meaningful and easier to analyze is known as image segmentation. For image segmentation many algorithms and techniques have been developed. This paper analyses different segmentation techniques to reduce the computational complexity of processor in the field of image segmentation, we are specially focusing on Mean Shift Algorithm. The composition of segmentation methodologies proposes for digital image processing is explained briefly. Various techniques are mentioned in this paper that are applied in very advance mission of identification of object or region image.
Mutation testing has become a prominent research area in the past few decades. The mutation testi... more Mutation testing has become a prominent research area in the past few decades. The mutation testing has been basically used in the testing society. It is a type of software testing where we mutate (small change, modification in the program) source code using mutant operators by introducing potential new bugs in the program code without changing its behavior. Analogously, mutant operators generate new clones by copy/paste editing activities. However, several software clone detection tools and techniques have been introduced by numerous scientists and a large number of tools comprises for a perceivable evaluation. Moreover, there have been a lot of efforts to empirically assess and analyze variant state-of-the-art tools. The current abstraction exhibits that various aspects that could leverage the legitimacy of the outcome of such assessment have been roughly anticipated due to lack of legitimized software clone benchmark. In this paper, we present a mutation testing-based automatic e...
2020 International Conference on Emerging Smart Computing and Informatics (ESCI), 2020
During last few years, development of bipedal robot has been increased in very rapid way. In this... more During last few years, development of bipedal robot has been increased in very rapid way. In this paper, we have tried to explain different Computational models from engineering viewpoints which helps us to understand Human Gait and the same is applied to bipedal robots for effective and fast, energy efficient walking. This involves from very basic models to large scale computational models for bipedal walking much like human being and tendency to regain original state if some external force is applied. This paper explains the historical journey of bipedal robots that can walk almost similar to human being. Paper further explores the possible research areas in bipedal robots walking and ways to balance bipedal robot against external forces like push recovery. Gait is used in Human recognitions, biometrics and to develop prosthetic limbs for physically disabled persons.
International Journal of Information Security and Privacy, 2019
Over the past few years, several software clone detection tools and techniques have been introduc... more Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.
International Journal of Information Security and Privacy, 2019
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient... more Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enf...
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017
Over the past few years, several software clone detection techniques have been developed. The sof... more Over the past few years, several software clone detection techniques have been developed. The software clones are the consequence of copied/pasted activity in software development which eventuates at different level of abstraction and may have different inception in a software system. This paper presents an efficient approach for the detection of type-1 software clones. The proposed detect type-1 software clones with high precision, recall, portability, and scalability. The type-1 clones generated by using mutation operator-based editing taxonomy.
International Journal of Open Source Software and Processes, 2018
Over the past few decades, many tools and methods have been proposed by several researchers to de... more Over the past few decades, many tools and methods have been proposed by several researchers to detect clones automatically in programs and software. Nevertheless, it is not yet clear how to evaluate these tools in terms of accuracy, scalability, and portability. However, all of these tools have some merits and limitations but the application of these tools depends on the user requirements, so it is necessary for the user that they should be aware of the tools and its distinguishing aspects. This article presents the performance of six clone detection tools in terms of accuracy, scalability, and portability. The aim of this study is to make the selection of tools easy for detection of copied code.
International Journal of Open Source Software and Processes, 2017
Code clones are copied fragments that occur at different levels of abstraction and may have diffe... more Code clones are copied fragments that occur at different levels of abstraction and may have different origins in a software system. This article presents an approach which shows the significant parts of source code. Further, by using significant parts of a source code, a control flow graph can be generated. This control flow graph represents the statements of a code/program in the form of basic blocks or nodes and the edges represent the control flow between those basic blocks. A hybrid approach, named the Program Dependence Graph (PDG) is also presented in this article for the detection of non-trivial code clones. The program dependency graph approach consists of two approaches as a control dependency graph and a data dependency graph. The control dependency graph is generated by using a control flow graph. This article proposes an approach which can easily generate control flow graphs and by using control flow graph and reduced flowgraph approach, the trivial software clone, a sim...
International Journal of Mobile Computing and Multimedia Communications, 2017
Over the past few decades ago, software developers analyzed robustly several forms of software pr... more Over the past few decades ago, software developers analyzed robustly several forms of software protection against illegal copying or piracy. With the expansion in digital technology, the risk of illegal copying of software also amplifies. The increasing piracy rate has posed a serious threat to software developers leading to the development of various software protection techniques. However, various techniques have been proposed for copyright protection such as software watermarking, obfuscation, tamper-proofing and diversity. The code transformation (obfuscation) is a method of transforming a program into a form which is more complicated for an adversary to understand or change the original code from an illegitimate process of reverse engineering. None of the current code obfuscation approaches provide resistance from reverse engineering attacks. The reverse engineering threat occurs due to the unconfined software code to the user. Malicious reverse engineering of software codes ca...
Communications in Computer and Information Science, 2016
In this paper, we have discussed several code replication detection methods and tools in differen... more In this paper, we have discussed several code replication detection methods and tools in different dimensions. This review has provided an extensive survey codec clone detection techniques and tools. Starting from clone perceptions, classification of clones and an overall assortment of selected techniques and tools is discussed. This paper covers the whole paradigm in clone detection and presents open research avenues in code clone detection.
2011 International Conference on Communication Systems and Network Technologies, 2011
Abstract The security of public key encryption such as RSA scheme relied on the integer factoring... more Abstract The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm based on positive integer N, which is the product of two prime numbers, the factorization of N is very intricate. In this paper a ...
Uploads
Papers by pratiksha gautam