A Hybrid Approach for User to Root and Remote to Local Attack
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.73-79, Jun-2017
Abstract
With the monstrous grow in the usage of computers and Internet for information sharing, success of applications running on various platforms causes a serious risk to the security policy. Complex behavior of malwares are also increase, the mechanism to catch malwares also needs improvement. The challenges grow towards the network security due to the introduction of new attacks. This paper emphasize on a hybrid data-mining approach based on ensemble classifier. This preferred approach gives a hybrid classifier which improves the overall detection rate. Preferred approach gives more accuracy and decrease the false positive rate. With this preferred approach the classification accuracy is 99.9894% and the false positive rate is about 0.00. The comparison of preferred approach is made with the single best classifier and it is perceived that the preferred approach gives better results for User to Root (U2R) and Remote to Local (R2L) attack that present in NSL KDD intrusion dataset. This approach gives better results for Root-kit attack.
Key-Words / Index Term
Intrusion detection system (IDS), false positive rate, NSL-KDD Data set
References
[1] R. Venkatesan, “A Survey on Wireless Intrusion Detection using Data Mining Techniques”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume. 1, Issue. 1, 2014.
[2] M. Gyanchandani, J.L.Rana, R.N.Yadav, “Taxonomy of Anomaly Based Intrusion Detection System: A Review”, International Journal of Scientific and Research Publications, Volume 2, Issue 12, 2012.
[3] N. V. Chawla, K. W. Bowyer, L. O. Hall, W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique”, Journal of Artificial Intelligence Research, Volume 16, pp. 321–357, 2002.
[4] S. L. Pundir, A. Amrit, “Feature Selection Using Random Forest In Intrusion Detection System”, International Journal of Advances in Engineering & Technology, Volume 6, Issue 3, pp. 1319-1324, 2013.
[5] Y. Yang, L. Gao, Y. B. Yuan, K. McLaughlin, S. Sezer, “Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks”, IEEE ,Volume 32, Issue 2, pp. 1068-1078, 2016.
[6] M. B. Shahbaz, X. Wang, A. Behnad and J. Samarabandu, “On Efficiency Enhancement of the Correlation-based Feature Selection for Intrusion Detection Systems” , In the proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference(IEMCON), Canada, pp. 1-7, 2016.
[7] M. A. Iftikhar, M. Hassan, H. Alquhayz, “A colon cancer grade prediction model using texture and statistical features SMOTE and MRMR”, In the proceeding of IEEE 2016 19th International Multi-Topic Conference(INMIC), Pakistan , pp.1-7, 2016.
[8] M. F. Naufal, S. Rochimah, “Software Complexity Metric-based Defect Classification Using FARM with Preprocessing Step CFS and SMOTE”, International Conference on Information Technology Systems and Innovation (ICITSI) ,Bandung – Bali, pp.16–19, 2015
[9] D. H. Deshmukh, T. Ghorpade, P. Padiya, “Improving Classification Using Preprocessing and Machine Learning Algorithms on NSL-KDD Dataset” International Conference on Communication, Information & Computing Technology (ICCICT), India, pp. 245 , 2015
[10] D.P.Gaikwad, R. C. Thool, “Intrusion Detection System Using Bagging Ensemble Method of Machine Learning”, In the proceeding of IEEE International Conference on Computing Communication Control and Automation, India, 2015
[11] S. Chaudhary, A. Bhowal, “Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection system”, In the proceeding of IEEE 2015International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), pp.89-95, 2015
[12] A. Tesfahun, D. L. Bhaskari, “Intrusion Detection using Random Forests Classifier with SMOTE and Feature Reduction”, In the proceeding of IEEE International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127-132, 2013
[13] D. K. Dagly, R.V. Gori, R.R. Kamath, D. Sharma, “Hybrid Intrusion Detection System Using K-Means Algorithm”, International Journal of Computer Science and Engineering, Volume 4, Issue 3, pp. 82-85,2016.
Citation
R. Richhariya, A.K. Manjhwar, R. R. Singh Makwana, "A Hybrid Approach for User to Root and Remote to Local Attack," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.73-79, 2017.
IOT based Industrial Module For SafteyMeasures
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.74-78, Jun-2017
Abstract
This Paper Represents The Design And Implementation Of Intelligent Systems In The Industries For Monitoring The Temperature, Gas And Humidity In The Environment Of Any Type Of Industrial Areas. This Project Can Be Implemented By Using The IOT Module And A Peripheral Interface Controller (PIC) Microcontroller. Here the wireless sensor devices will sense the area’s environment and transmits that information to the cloud AMAZON WEB SERVICES (AWS) to store that information for further analysis and immediately sends an alert to the Industry for the purpose of protecting themselves from unexpected disaster. We can see that stored data in cloud from any place of the world.
Key-Words / Index Term
IOT, PIC, AWS
References
[1] Al-Ali, A.R. ; Dept. of Comput. Eng., American Univ., United ArabEmirates ; AL-Rousan, M., "Java-based home automation system", Consumer Electronics, IEEE Transactions on (Volume:50 ,Issue: 2),May2004,IEEE2016 1st international Conference on Innovation and Challenges in Cyber Security (ICICCS 2016)
[2]Karandeep Kaur , “A study of the role of Cloud services in the implementation of Internet of Things (IoT)” International Journal of Recent Trends in Engineering & Research (IJRTER)Volume 02, Issue 04; April - 2016 ,ISSN: 2455-1457
[2] Golzar, M.G. ; AsanPardazan Co. ; Tajozzakerin, H.R., "A New Intelligent Remote Control System for Home automation and Reduce Energy Consumption", Mathematical/Analytical Modeling and Computer Simulation (AMS), 2010, IEEE.
ISSN(P): 2349-3968, ISSN (O): 2349-3976 Volume I, Issue VII, November - 2014
[3] Sandeep Patel, Punit Gupta, Mayank Kumar Goyal, "Low Cost HardwareDesign of a Web Server for Home Automation Systems", Conference on Advances in Communication and Control Systems(CAC2S), Jan2013
[4] S. Li, L. Xu, X. Wang, and J. Wang, “Integration of hybrid wireless networks in cloud services oriented enterprise information systems,” Enterp. Inf. Syst., vol. 6, no. 2, pp. 165–187, 2012.
[5] Alkar, A.Z., Hacettepe Univ; Roach, J. ; Baysal, D., "IP based home automation system", Consumer Electronics, IEEE Transactions on(Volume:56 ,Issue: 4), November 2010, IEEE
[6] Bert Bos, Lukasz ChmielewskiJaap-Henk Hoepman1 Thanh Son Nguyen, ”Remote Management and Secure Application Development for Pervasive Home Systems Using JASON”, Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007)
Citation
D. Janardhan Reddy, S. Phani Kumar, "IOT based Industrial Module For SafteyMeasures," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.74-78, 2017.
I2SPhybrid pulse shape: Modified I2SP pulse by using weighting technique and it’s impact on SC-FDMA system
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.85-89, Jun-2017
Abstract
Pulse shaping plays a crucial role in spectral shaping in the modern wireless communication to reduce the spectral bandwidth. Pulse shaping is a spectral processing technique by which fractional out of band power is reduced for low cost, reliable, power and spectrally efficient mobile radio communication systems. The Multipath channel has two main considerations spectral efficient transmission and reduced ISI both these requirement of Spectral efficient transmission and reduced ISI are satisfied by pulse shaping the transmitted signal. I2SPhybrid pulse shape introduced in this research work by using weighting techniques has better spectral characteristics and shows improved OBR performance when used with SC-FDMA system.
Key-Words / Index Term
pulse shape, ISP, OBR, SC-FDMA, companding
References
[1] H.G. Myung, J. Lim, and D.J. Goodman, Peak-to-Average Power Ratio of Single Carrier FDMA Signals with Pulse Shaping, 17th Annual IEEE
International Symposium on Personal, Indoor and Mobile RadioCommunications (PIMRC „06), Helsinki, Finland, Sep. 2006.
[2] H. G. Myung, J. Lim, & D. J. Goodman, “Single Carrier FDMA for
Uplink Wireless Transmission,” IEEE Vehic. Tech. Mag., vol. 1,no. 3,
Sep. 2006.
[3]B. Gaffney, A. D. Fagan, “ WALSH HADAMARD TRANSFORMPRECODED MB-OFDM: AN IMPROVED HIGH DATA RATE ULTRAWIDEBAND SYSTEM”, The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC‟06),2006.
[4] Ishu,” PAPR Reduction in Wavelet based SCFDMA using Pulse Shaping Filters for LTE Uplink Transmission”, International Journal of Applied Engineering Research, Volume 9, Number 20, 2014, pp. 6481-6492.
[5] Faisal S. Al-Kamali, Bassiouny M. Sallam, Farid Shawki,” A New Single Carrier FDMA System Based On The Discrete Cosine Transform”, IEEE International Conference Computer Engineering & Systems, ICCES 2009, pp 555 – 56
[6] Li Peng, Yu Zhu, Zongxin Wang, Naibo Wang, Peak-to-Average Power Ratio of SC-FDMA Systems with Localized Subcarrier Mapping,Global Mobille Congress (GMC), 2010,pp 1-6..
[7] T. Frank, A. Klein and E. Costa, IFDMA - a scheme combining theadvantages of OFDMA and CDMA," Special Issue on "Next GenerationCDMA vs. OFDMA for 4G Wireless Applications" IEEE Wireless Communications Magazine, 2007.
[8] Divyangna Gandhi, Shilpi Gupta, Upena Dalal, Implementation of Pulse Shaping Techniques in OFDM System, International Journal of
Computer Applications (0975 – 8887) Volume 68– No.10, April 2013.
[9] A S KNG, Vishal Sharma, Data Communication using Pulse Shaping
techniques in wireless signal processing approach-In depth review,
International Journal of Computational Engineering & Management,
Vol. 12, April 2011.
[10] A. S Kang , Vishal Sharma, Pulse Shape Filtering in WirelessCommunication-A Critical Analysis, (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 2, No.3, March 2011.
[11]G. Bhandari, S. Vijay, “An Improved pulse shape combined with companding transform to optimize SC-FDMA performance”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016, pp 461-470
Citation
G. Bhandari, S. Vijay, "I2SPhybrid pulse shape: Modified I2SP pulse by using weighting technique and it’s impact on SC-FDMA system," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.85-89, 2017.
An Efficient Approach for Image Retrieval using Particle Swarm Optimization
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.90-99, Jun-2017
Abstract
Image retrieval systems are used to search and browse the images from large digital image databases and retrieval of these images. Content-Based Image Retrieval (CBIR) gives an efficient approach to browse and retrieve images from these large databases, but the semantic gap between low-level and high-level features is a big issue. To overcome this issue Particle Swarm Optimization is used with a new combination of low-level features. Moments can be used to characterize the color distribution of an image. A color feature of an image is extracted by calculating color moments which are unique and invariant to rotation and scaling. Rotated Local Binary Pattern is used to extract texture information from the image, it is invariant to rotation and scaling. Edges give the object representation of an image and used as a feature descriptor for image retrieval, Here Edge Histogram Descriptor is used to find out the abruptly changes in the pixel value of the image. Edge Histogram Descriptor (EHD) provides the spatial information about five types of edges of an image. For performance evaluation, we simply used weighted Euclidian distance with optimal weights and calculate Average precision, recall and accuracy. Experiment result shows that the proposed method gives improved precision and recall in comparison to existing method. The efficiency of proposed system is tested for three types of datasets: WANG dataset, LI dataset and Caltech-101 image dataset.
Key-Words / Index Term
CBIR, feature extraction, color Moments, RLBP, EHD, PSO
References
[1] J. Kennedy and R. Eberhart. Particle swarm optimization. In Proceedings of IEEE International Conference on Neural Networks, volume IV, pages 1942{1948, Perth, Australia, 1995.
[2] Y. Shi and R.C. Eberhart. A modified particle swarm optimizer, In Proceedings of 1998 IEEE International Conference on Evolutionary Computation, pages 69{73, Anchorage, AK, USA, 1998.
[3] Zeyad Safaa Younus et al., “Content-based image retrieval using PSO and k-means clustering algorithm,” springer, Saudi Society for Geosciences 2014.
[4] Chatzichristofis, S., Boutalis, Y.: A Hybrid Scheme for Fast and Accurate Image Retrieval Based on Color Descriptors. In: De Mallorca, P. (ed.) IASTED International Conference on Artificial Intelligence and Soft Computing (ASC 2007), Spain 2007.
[5] Rakesh Mehta, Karen Egiazarian, "Dominant Rotated Local Binary Patterns (DRLBP) for Texture Classification", Pattern Recognition Letters, © Elsevier 2015.
[6] R. Gali, M. Dewal, and R. Anand, "Genetic Algorithm for Content-Based Image Retrieval," Fourth International Conference on Computational Intelligence, Communication Systems and Networks, 2012.
[7] Savvas A. Chatzichristofis and Yiannis S. Boutalis, “CEDD: Color and Edge Directivity Descriptor. A Compact Descriptor for Image Indexing and Retrieval,” © Springer-Verlag Berlin Heidelberg pp. 312–322, 2008.
[8] S. Sankar Ganesh and K. Ramar, "Content-Based Image Retrieval using heuristic Particle Swarm Optimization," Asian Journal of Information Technology ISSN: (1682-3915), 2016.
[9] Ekta Gupta, and Rajendra Singh Kushwah, “Combination of Global and Local Features using DWT with SVM for CBIR”, IEEE 978-1-4673-7231-2/15/$31.00, @ 2015.
[10] Saeed Sadri et al. , An Efficient content-based image retrieval with ant colony optimization feature selection scheme based on wavelet and color features" International Symposium on Artificial Intellegence and Signal Processing, 2015.
[11] Ojala, T., Pietikainen, M., and Maenpaa, T. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE TPAMI, 24(7):971 –987, 2000.
[12] G. Saranya, K. Anitha, A. Chilambuchelvan, “AN EFFICIENT APPROACH TO AN IMAGE RETRIEVAL USING PARTICLE SWARM OPTIMIZATION”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, pg. 1053-106, April- 2014.
[13] Raj Singh, Dr. Shruti Kohli, "Enhanced CBIR using Color Moments, HSV Histogram, Color Auto Correlogram, and Gabor Texture", International Journal of Computer Systems (ISSN: 2394-1065), Volume 02– Issue 05, May 2015.
[14] Sawat Somnugpong, and Kanokwan Khiewwan, ”Content- Based Image Retrieval Using a Combination of Color Correlograms and Edge Direction Histogram,” 978-1-5050-2033-1/16/©2016 IEEE.
[15] R. Choudhary, N. Raina, N. Chaudhary and R Chauhan, "An integrated Approach to Content-Based Image Retrieval", IEEE, pp. 2404-2410, Sept. 2014.
[16] Amit Singla, Meenakshi Garg,” CBIR Approach Based On Combined HSV, Auto Correlogram, Color Moments and Gabor Wavelet", International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3, Issue 10 October 2014.
[17] A. Ananth, Dr. K. Mala and S. Sauganya, "Content-Based Image Retrieval System based on Semantic Information using Color, Texture and Shape Features", IEEE 978-1-4673-8437-7/16/$31.00 © 2016.
[18] Mohd. Aquib Ansari, and Manish Dixit, “An Image Retrieval Framework: A Review”, International Journal of Advanced Research in Computer Science, ISSN No. 0976-5697, Volume 8, No. 4, May – June 2017.
[19] Diksha Kurchaniya, and Punit Kumar Johari, "Analysis of Different Similarity Measures in Image Retrieval Based on Texture and Shape”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 04, e-ISSN: 2395-0056, p-ISSN: 2395-0072, Apr -2017.
Citation
D. Kurchaniya, P. K. Johari, "An Efficient Approach for Image Retrieval using Particle Swarm Optimization," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.90-99, 2017.
A Technique for Improving Software Quality using Support Vector Machine
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.100-105, Jun-2017
Abstract
Today software has reformed the key element on every environment. Quality of software is connected with the number of faults as well as it determinate by time and cost. Software is a process and maintains continuous change to improve the functionality and effectiveness of the software quality. During the life cycle of software various problems arises like advanced planning, well documentation and proper process control. Software defects are expensive in specification of cost and quality. Software defect prediction improves quality framework predictive techniques and software metrics to provide fault-prone module description. This paper main feature is the concept of change proneness and software prediction model used to control the classes of software which are often to change. We have two aspects to be inscribed Parameters like Accuracy, Precision, Recall and Receiver operating characteristics (ROC). Machine learning algorithms are used for predicting software. This paper is proposing to relate and compare all machine learning techniques interrelated to performance parameters.
Key-Words / Index Term
Software Quality, Support Vector Machine, Software Defect Prediction, Faults Prone, Change Proneness
References
[1]. K. Chandra, "Improving software quality using machine learning”, Innovation and Challenges in Cyber Security, India, pp.115-118, 2016.
[2]. B. Tang, "Toward optimal feature selection in naive Bayes for text categorization”, IEEE Transactions on Knowledge and Data Engineering, vol.5, issue.9, pp.2508-2521, 2016.
[3]. S. Choudhury, "Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection”, Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials IEEE, India, pp.89-95, 2015.
[4]. L. Zhao, "Quality Evaluation of College Foreign Language Textbook Based on SVM”, Intelligent Computation Technology and Automation IEEE, China, pp.670-673, 2015.
[5]. L. Zhao, "Quality Evaluation of College Foreign Language Textbook Based on SVM”, Intelligent Computation Technology and Automation IEEE, China, pp.670-673, 2015.
[6]. C. Izurieta, "Preemptive management of model driven technical debt for improving software quality”, Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, USA, pp.31-36, 2015.
[7]. A.D Lipitakis, "On machine learning with imbalanced data and research quality evaluation methodologies”, Computational Science and Computational Intelligence International Conference IEEE, USA, pp.451-457, 2014.
[8]. G. Vitello, "A Novel Technique for Fingerprint Classification based on Fuzzy C-Means and Naive Bayes Classifier", Complex, Intelligent and Software Intensive Systems IEEE, UK, pp.155-166, 2014.
[9]. T.M Khoshgoftaar, "Improving software quality estimation by combining feature selection strategies with sampled ensemble learning”, Information Reuse and Integration 15th International Conference on IEEE, USA, pp.428-433, 2014.
[10]. Y. Yibo, "Scalable svm-based classification in dynamic graphs”, Data Mining IEEE International Conference on. IEEE, China, pp.650-659, 2014.
[11]. Y. Chen, "Effective Part Localization in Latent-SVM Training”, Pattern Recognition 22nd International Conference on. IEEE, Sweden, pp.4269-4274, 2014.
[12]. S. Mahajan, “Hierarchical Reinforcement Learning in Complex Learning Problems: A Survey”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.72-78, 2014.
[13]. E. Shihab, "Practical software quality prediction" Software Maintenance and Evolution IEEE International Conference on. IEEE, Canada, pp.639-644, 2014.
[14]. M. Shepperd, "Researcher bias: The use of machine learning in software defect prediction", IEEE Transactions on Software Engineering, vol.40, issue.6, pp.603-613, 2014.
[15]. P. A Selvaraj, "Support Vector Machine for Software Defect Prediction", International Journal of Engineering & Technology Research, pp.68-76, 2013.
[16]. D. Gray, “The misuse of the NASA metrics data program data sets for automated software defect prediction" , Evaluation & Assessment in Software Engineering 15th Annual Conference on IET, UK, pp.603-613, 2011.
[17]. Q. Song, "A general software defect-proneness prediction framework" IEEE Transactions on Software Engineering, vol.37, issue.3, pp.356-370, 2011.
[18]. N. Gayatri, "Performance analysis of data mining algorithms for software quality prediction”, Advances in Recent Technologies in Communication and Computing International Conference on. IEEE, India, pp.393-395, 2009.
[19]. Y. Zhao, "Comparison of decision tree methods for finding active objects”, Advances in Space Research, vol.12, issue.14, pp.1955-1959, 2008.
[20]. I. Gondra, "Applying machine learning to software fault-proneness prediction”, Journal of Systems and Software, vol.81, issue.2, pp.186-195, 2008.
[21]. M. Hall,"A decision tree-based attribute weighting filter for naive Bayes”, Knowledge-Based Systems, vol.20, issue.2, pp.120-126, 2007.
[22]. C.J Du, "Learning techniques used in computer vision for food quality evaluation: a review”, Journal of food engineering, vol.72, issue.1, pp.39-55, 2006.
[23]. J. Huang, "Using AUC and accuracy in evaluating learning algorithms”, IEEE Transactions on knowledge and Data Engineering, vol.17, issue.3, pp.299-310, 2005.
[24]. M. R Boutell, "Learning multi-label scene classification", Pattern recognition, vol.37, issue.9, pp.1757-1771, 2004.
[25]. J. Huang, "Comparing naive Bayes, decision trees, and SVM with AUC and accuracy" Data Mining Third IEEE International Conference on IEEE, USA, pp.553-556, 2003.
[26]. D. Zhang, "Question classification using support vector machines”, Proceedings of the 26th annual international ACM SIGIR conference on Research and development in information retrieval, USA, pp.26-32 2003.
[27]. D. Zhang, "Machine learning and software engineering”, Tools with Artificial Intelligence, 2002. (ICTAI 2002). Proceedings. 14th IEEE International Conference on. IEEE, 2002.
[28]. I. Kononenko, "Machine learning for medical diagnosis: history, state of the art and perspective”, Artificial Intelligence in medicine vol. 23, issue.1, pp.89-109, 2001.
[29]. A.K Jain, "Classification of text documents", Pattern Recognition, Fourteenth International Conference on IEEE, Australia, pp.1051-4651, 1998.
[30]. A.P Bradley, "The use of the area under the ROC curve in the evaluation of machine learning algorithms" Pattern recognition, vol.30, issue.7, pp-1145-1159, 1997.
[31]. S.W Wilson, “Classifier fitness based on accuracy", Evolutionary computation, vol.3, issue.2, pp.149-175, 1995.
Citation
J. Devi, N. Sehgal, "A Technique for Improving Software Quality using Support Vector Machine," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.100-105, 2017.
A Novel Web Usage Mining Technique Analyzing Users Behaviour Using Dynamic Web log
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.106-111, Jun-2017
Abstract
WWW-world wide web is one of the most required resource for getting information and knowledge. Several organizations rely on websites to get new customers and to hold the existing one. The customer’s surfing pattern can be obtained by web log record. This is a kind of work in the arena of web usage mining. The paper proposed the novel methodology by mining the usage of patters from web log records of real time. Ontology of the web content including user profiles and external data can be developed by Web usage mining. In this paper a method is proposed for discovering and tracking the growing user profiles along with domain specific information facets. To judge the quality of the obtained profiles after mining an objective validation plan is also used. Through this research organizations can take better decision by getting better recommendation
Key-Words / Index Term
Data-mining, web-mining, web usage mining
References
[1] Soren E. Jespersen, JesperThorhauge, TorbenBachPederson, A Hybrid
Approach to Web Usage Mining,Technical Report 02-5002, Department of
Computer ScienceAalborg University, July 2002.
[2] Jespersean S.E., Throhauge J., and Bach T., A hybridapproach to Web
Usage Mining, Data Warehousing andKnowledge Discovery, (DaWaK’02),
LNCS 2454, SpringerVerlag Germany, pp73-82, 2002.
[3] BamshadMobasher, Robert Cooley, Jaideep Srivastava, Creating Adaptive Web Sites Through Usage-Based Clustering of URLs, in Proceedings of the 1999 IEEEKnowledge and Data Engineering Exchange Workshop(KDEX`99), November 1999.
[4] Smith K.A. and Ng A., Web page clustering using a self-organizing map
of user navigation patterns, Decision Support Systems, Volume 35 , Issue 2
(May 2003) Special issue: Web data mining, Pages: 245 – 256.
[5] Chi E.H., Rosien A. and Heer J., Lumber Jack: Intelligent Discovey and Analysis of Web User Traffic Composition. In Proceedings of ACM-SIGKDD Workshop on Web Mining for Usage Patterns and User Profiles, Canada, ACM press, 2002.
[6] Joshi K. P., Joshi A., Yesha Y., Krishnapuram, R.,Warehousing and
Mining We Logs, Proceedings of the 2ndACM CIKM Workshop on Web
Information and DataManagement, pp. 63-68, 1999.
[7] Robert Cooley, BamshadMobasher, and Jaideep Srivastava, Web Mining: Information and Pattern Discovery on the World Wide Web (A Survey Paper) (1997), in Proceedings of the 9th IEEE International Conference on Tools with Artificial Intelligence (ICTAI`97), November 1997.
[8] NeeruMago, “Web Mining: Intelligent way of mining Web based data”, Apeejay Journal of Computer Science And Applications, Vol. (3), January, 2015.
[9] Mohinder Singh and NavjotKaur, “A Review on Various Web mining Techniques with Purposed Algorithm of K-means Web Ranking”, International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2, Issue. 4, April 2013.
[10] Monika Yadav and Mr. Pradeep Mittal, “Web Mining: An Introduction”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013.
[11] Ketul B. Patel ,Jignesh A. Chauhan , Jigar D. Patel “Web Mining in E-Commerce: Pattern Discovery, Issues and Applications” International Journal of P2P Network Trends and Technology- Volume1Issue3- 2011.
[12] Dr.S.Vijiyarani and Ms. E. Suganya, “RESEARCH ISSUES IN WEB MINING”, International Journal of Computer-Aided Technologies (IJCAx) Vol.2, No.3, July 2015.
[13] Kun Chang Lee and Sangjae Lee, “ Interpreting the web-mining results by cognitive map and association rule approach”, Information Processing and Management 47 (2011) .
[14] WenlongRen and Jianzhuo Yan, “ An Improved CMAC Neural Network Model for Web Mining”, 2015 8th International Symposium on Computational Intelligence and Design.
[15] NyomanKarna, IpingSupriana, NurMaulidevi, “Social CRM using Web Mining for Indonesian Academic Institution”, 2015 International Conference on Information Technology Systems and Innovation (ICITSI) Bandung – Bali, November 16 – 19, 2015.
[16] RoyaHassanian-esfahani and Mohammad-javadKargar, “A Survey on Web News Retrieval and Mining”, 2016 Second International Conference on Web Research (ICWR).
[17] Dr. Sanjay Kumar Dwivedi and BhupeshRawat, “A Review Paper on Data Preprocessing: A Critical Phase in Web Usage Mining Process”, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[18]Khushbu Patel, AnuragPunde, KavitaNamdev, Rudra Gupta and MohitVyas,” Detailed study of Web Mining approach- A survey”, International Journal of Engineering Science & Research Technology, Patel 4(2) : February 2015
[19] S.chakarbarti .” Data Mining for Hypertext- A tutorial survey”, ACM SIGKDD Explorations , 1(2): 1-11-2000.
[20] M.N Garofalakis, R. Rastogi, S. Seshadri and K Shim, “ Data Mining and the web: Past, Present and Future”, In Workshop of Web Information and Data Management, 1999 pp 43-47, 1999.
[21] Broder, A., R. Kumar, F. Maghoul, P. RaghavanandS. Rajagopalan et al., 2000.Graph structure in the web Computing.
[22] Xing, W. and A. Ghorbani, 2004. Weighted PageRank algorithm. Proceeding of the 2nd Annual Conference on Communication Networks and Services Research, May 19-21, IEEE Computer Society, Washington DC., USA., pp: 305-314. DOI: 10.1109/DNSR.2004.1344743.
[23] Web usage mining by B.Mobasher. Page No 449-483.
[24] A.G. Büchner, M. Baumgarten, S.S. Anand, M.D. Mulvenna, J. G. Hughes, Navigation Pattern Discovery fromInternet Data, in WEBKDD, San Diego, CA 1999.
Citation
Priyanka Sharma, R.K. Gupta, "A Novel Web Usage Mining Technique Analyzing Users Behaviour Using Dynamic Web log," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.106-111, 2017.
An Efficient Approach to Optimize the Performance of Massive Small Files in Hadoop MapReduce Framework
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.112-120, Jun-2017
Abstract
The most popular open source distributed computing framework called Hadoop was designed by Doug Cutting and his team, which involves thousands of nodes to process and analyze huge amounts of data called Big Data. The major core components of Hadoop are HDFS (Hadoop Distributed File System) and MapReduce. This framework is the most popular and powerful for store, manage and process Big Data applications. But drawback with this tool related to stability and performance issues for small file applications in storage, manage and processing the data. Existing approaches deals with small files problem are Hadoop archives and SequenceFile. However, existing approaches doesn’t give an optimized performance to solve small files problems on Hadoop. In order to improve the performance in storing, managing and processing small files on Hadoop, we proposed an approach for Hadoop MapReduce framework to handle the small files applications. Experimental result shows that proposed framework optimizes the performance of Hadoop in handling of massive small files as compared to existing approaches.
Key-Words / Index Term
Hadoop, Hadoop Distributed File System (HDFS), MapReduce, Hadoop Archives, Sequence File, Small Files
References
[1] Sagiroglu S, Sinanc, D, “Big Data: A Review”, IEEE,2013, pp. 42-47.
[2] Mukhtaj Khan , Yong Jin, Maozhen Li, Yang Xiang, and Changjun Jiang “Hadoop Performance Modeling for Job Estimation and Resource Provisioning” IEEE transactions on parallel and distributed systems, vol. 27, no. 2, february 2016, pp 441-454
[3] Fang Zhou, Hai Pham , Jianhui Yue, Hao Zou ,Weikuan Yu. "SFMapReduce: An Optimized MapReduce Framework for Small Files." IEEE ,2015, pp. 23-32.
[4] Xiaoyong Zhao, Yang Yang, Li-li Sun, Han Huang. "Metadata-Aware Small Files Storage Architecture on Hadoop." Springer ,2012, pp. 136–143.
[5] KunGao, Xuemin Mao. "Research on Massive Tile Data Management based on Hadoop." IEEE ,2016, pp. 01-05.
[6] Parth Gohil, Bakul Panchal,1. S. Dhobi. "A Novel Approach to Improve the Performance of Hadoop in Handling of Small Files." IEEE ,2015, pp. 1-5.
[7] Tanvi Gupta, SS Handa. "An Extended HDFS with an AVATAR NODE to handle both small files and to eliminate single point of failure." 2015 International Conference on Soft Computing Techniques and Implementations- (ICSCTI). Faridabad: IEEE, 2015. pp. 67-71.
[8] Aishwarya K, Arvind Ram A, Sreevatson M C, Chitra Babu, and Prabavathy B. "Efficient Prefetching Technique for Storage of Heterogeneous small files in Hadoop Distributed File System Federation." Fifth International Conference on Advanced Computing (ICoAC). IEEE, 2013. 523-530.
[9] Yanfei Guo et al “ iShuffle: Improving Hadoop Performance with Shuffle-on-Write” IEEE Transactions on Parallel and Distributed Systems, 2016, pp 1-12
[10] Guru Prasad M S, Nagesh H R and Swathi Prabhu “High Performance Computation of Big Data: Performance Optimization Approach towards a Parallel Frequent Item Set Mining Algorithm for Transaction Data based on Hadoop MapReduce Framework”, International Journal of Intelligent Systems and Applications,2017, pp75-84
[11] Guru Prasad M S, Raju K and Nagesh H R “Novel Approaches for Performance Optimization of Hadoop Multi Node Cluster Architecture”, Elsevier Publications, 2014, pp 391-399
[12] Katayoun Neshatpour, Maria Malik, Mohammad Ali Ghodrat, Avesta Sasan, and Houman Homayoun “ Energy-Efficient Acceleration of Big Data Analytics Applications Using FPGAs” , IEEE International Conference on Big Data, 2015,pp115-123
[13] Ran Zheng, Qing Liu, Hai Jin. "Memory Data Management System for Rendering Applications." Second International Conference on Mathematics and Computers in Sciences and in Industry. IEEE, 2015. 302-308.
[14] Yang Zhang, Dan Liu. "Improving the Efficiency of Storing for Small Files in HDFS." International Conference on Computer Science and Service System. IEEE, 2012. 2239-2242.
[15] Yizhi Zhang, Heng Chen, Zhengdong Zhu, Xiaoshe Dong, Honglin Cui. "Small Files Storing and Computing Optimization." 11th International Conference on Natural Computation (ICNC). IEEE, 2015. 1269-1274.
[16] Bo Dong, Jie Qiu, Qinghua Zheng, Xiao Zhong, Jingwei Li, Ying Li. "A Novel Approach to Improving the Efficiency of Storing and Accessing Small Files on Hadoop: a Case Study by PowerPoint Files." 2010 IEEE International Conference on Services Computing. IEEE, 2010. 65-72.
[17] Chandrasekar S, Dakshinamurthy R, Seshakumar P G, Prabavathy B, Chitra Babu. "A Novel Indexing Scheme for Efficient Handling of Small Files in Hadoop Distributed File System." International Conference on Computer Communication and Informatics (ICCCI -2013). Coimbatore, INDIA: IEEE, 2013. 01-08.
[18] ChatupornVorapongkitipun, Natawut Nupairoj. "Improving Performance of Small-File Accessing in Hadoop." 11th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2014. 200-205.
[19] Neethu Mohandas, Sabu M. Thampi. "Improving Hadoop Performance in Handling Small Files." Springer (2011): 187-194.
[20] Grant Mackey, Saba Sehrish, Jun Wang. "Improving Metadata Management for Small Files in." IEEE, ,2009,pp.01- 04.
[21] J. W. Jiangling Yin, D. H. Jian Zhou, Tyler Lukasiewicz, and J. Zhang, “Opass: Analysis and optimization of parallel data access on distributed file systems,” in IEEE International Parallel & Distributed Processing Symposium (IPDPS), IEEE,2015.
[22] R. Din, Prabadevi B.,” Data Analyzing using Big Data (Hadoop) in Billing System ”, International Journal of Computer Sciences and Engineering, volume-5,Issue-5,2017,pp 84-88.
Citation
Guru Prasad M.S., Nagesh H.R., Swathi Prabhu, "An Efficient Approach to Optimize the Performance of Massive Small Files in Hadoop MapReduce Framework," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.112-120, 2017.
Monitoring Driver Distraction in Real Time using Computer Vision System
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.121-128, Jun-2017
Abstract
Driver tiredness is one of the most important causes of road accidents. This article presents a real-time non disturbance drowsiness monitoring scheme which exploits the driver’s facial appearance to identify and aware tired drivers. This presented work worn the Viola-Jones Algorithm to identify the driver’s facial appearance. Continuously Adaptive Mean Shift algorithm has been used for continuous face tracing of driver. With this uncomplicated and not expensive execution, the whole scheme achieved an accuracy of 99.5%, outperforming other developed schemes adopting expensive hardware to arrive at the similar objective.
Key-Words / Index Term
Image processing; Face recognition and tracing; Fatigue level; Ada-boost learning classifier; Circular Hough Transform; Continuous Mean shift algorithm; Viola Jones algorithm for Face recognition
References
[1] T. Chen, P. Yuen, M. Richardson, G. Liu, and Z. She, “Detection of Psychological Stress Using a Hyper-spectral Imaging Technique”, IEEE Transactions on Affective Computing, Vol. 5, Issue. 4, pp. 1949-3045, 2014. For Journal
[2] C.T.Lin, C.H.Chuang, C.S. Huang, , S.F. Tsai, S.W. Lu, Y.H. Chen, and L.K.Ko,” Wireless and Wearable EEG System for Evaluating Driver Vigilance”, IEEE Transactions on Biomedical Circuits and Systems, Vol. 8, Issue. 2, pp.1932-4545, 2014. For Journal
[3] L. Yekhshatyan and J.D. Lee,” Changes in the Correlation between Eye and Steering Movements Indicate Driver Distraction”, IEEE Transactions on Intelligent Transportation Systems, Vol. 14, Issue. 1, pp. 1524-9050, 2013. For Journal
[4] S. Abtahi, S. Shirmohammadi, B. Hariri, D. Laroche, and L. Martel,” A Yawning Measurement Method Using Embedded Smart Cameras”, Instrumentation and Measurement Technology Conference 2013, Minneapolis, MN, USA , pp. 1091-5281, 2013. For Conference
[5] M.H. Sigari, M.R. Pourshahabi, M.Soryani and M.Fathy, “A Review on Driver Face Monitoring Systems for Fatigue and Distraction Detection”, International Journal of Advanced Science and Technology, Vol.64, pp.73-100, 2014. For Journal
[6] S.J. Lee, J. Jo, H.G. Jung, K.R. Park, and J. Kim, “Real-Time Gaze Estimator Based on Driver’s Head Orientation for Forward Collision Warning System”, IEEE Transactions on Intelligent Transportation Systems, Vol. 12, Issue. 1, pp. 1524-9050, 2011. For Journal
[7] R.C. Coetzer and G.P. Hancke,” Eye Detection for a Real-Time Vehicle Driver Fatigue Monitoring System”, 2011 IEEE Intelligent Vehicles Symposium (IV) Baden-Baden, Germany, pp. 978-1-4577, 2011. For Conference
[8] F. Vicente, Z. Huang, X. Xiong, F.D.Torre, W. Zhang, and D. Levi, “Driver Gaze Tracking and Eyes Off the Road Detection System”, IEEE Transactions on Intelligent Transportation Systems, Vol. 16, Issue. 4, pp. 2014-2027, 2015. For Journal
[9] M. Sacco, R.A. Farrugi, “Driver Fatigue Monitoring System using Support Vector Machines”, Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, ISCCSP 2012, Rome, Italy, pp. .978-1-4673-0276, 2012 For Conference
[10] Y. Pang, J. Cao, and X. Li, “Learning Sampling Distributions for Efficient Object Detection”, IEEE Transactions on Cybernetics, Vol. 47, Issue. 1, pp. 2168-2267, 2017. For Journal
[11] C.T. Lin, L.W. Ko, I.F. Chung, T.Y. Huang, Y.C Chen, T.P Jung, and S.F. Liang, “Adaptive EEG-Based Alertness Estimation System by Using ICA-Based Fuzzy Neural Network”, IEEE Transactions on Circuits and Systems, Vol. 53, Issue. 11, pp.1057-7122, 2006. For Journal
[12] C. Ching, M.H.Yap, I.costen and B. li, “Wrinkle Detection Using Hessian Line Tracking, IEEE Access, Manchester Metropolitan University, Manchester, U.K., pp. 1079-1088, 2015. For Conference
[13] IJCSE, International Virtual Conference on Computer Science, Engineering and Technology, Computing for Sustainable Global Development, India, 2016. For Conference
Citation
A.S. Kulkarni, S.B. Shinde, "Monitoring Driver Distraction in Real Time using Computer Vision System," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.121-128, 2017.
Fracture detection in X-ray images of long bone
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.129-133, Jun-2017
Abstract
Image processing used in wide variety of applications such as Image restorations, satellite, and medical etc. With enrichments of the image processing libraries especially of openCV and Matlab, many applications are being developed day by day in computer vision or image processing domain. We have designed the bone fracture detection method using “Image Processing” toolbox in Matlab. Aim of the project is to locate exact fracture area in inputted X-ray image. We will check bone integrity to detect any crack or disjoint of two cartilages. The professed algorithm is divided in few step namely pre-processing, Segmentation and ROI search and detection. Features like area, length and pixel locations of the segments are used to identify fracture in X-ray image. Algorithm has been simulated on various X-ray images which show good results to locate fracture in image. Also, in this approach we found that canny edge detection works far better than any other edge detection for segmenting the fractured part.
Key-Words / Index Term
Atutomatic, Bone, Canny, Fracture, Image Processing, Preprocessing,Segmentation, X-Ray
References
[1] Jacob, Nathanael E., and M. V. Wyawahare. "Survey of Bone Fracture Detection Techniques." International Journal of Computer Applications 71.17, 2013.
[2] Jia,Y.,and Y.Jiang. "Active contour model with shape constraints for bone fracture detection." International Conference on Computer Graphics, Imaging and Visualisation. IEEE, 2006.
[3] Liang, Jian, et al. "Fracture identification of X-ray image." International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), IEEE, 2010.
[4] Donnelley, Martin William. “Computer aided long-bone segmentation and fracture detection.” Diss. Flinders University, Faculty of Science and Engineering, 2008.
[5] Syiam, Mostafa, Mostafa Abd El-Aziem, and Mohamed El-Menshawy. "AdAgen: Adaptive Interface Agent for X-Ray Fracture Detection." International Journal of Computing & Information Sciences 2.3, 2004.
[6] Wei, Zheng, and Zhang Liming. "Study on recognition of the fracture injure site based on X-ray images." 3rd International Congress on Image and Signal Processing (CISP), Vol. 4. IEEE, 2010.
[7] Smith, Rebecca, et al. "Detection of fracture and quantitative assessment of displacement measures in pelvic X-RAY images." International Conference on Acoustics Speech and Signal Processing (ICASSP), IEEE, 2010
[8] Linda, C. Harriet, and G. Wiselin Jiji. "Crack detection in X-ray images using fuzzy index measure." International Journal of Applied Soft Computing 11.4, pp.3571-3579, 2011
[9] M P Deshmukh, P. Deshmukh, “Development of Automatic Fracture Detection System using Image Processing and Classification Methods for Femur Bone X-Ray Images”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 4, Issue.1, pp.56-60, 2016.
[10] Shrivakshan, G. T., and C. Chandrasekar. "A comparison of various edge detection techniques used in image processing." IJCSI International Journal of Computer Science Issues 9.5, pp.272-276, 2012.
Citation
B. Gajjar, S. Patel, A.Vaghela, "Fracture detection in X-ray images of long bone," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.129-133, 2017.
A Genetic Algorithm for Regression Test Case Prioritization
Research Paper | Journal Paper
Vol.5 , Issue.6 , pp.134-137, Jun-2017
Abstract
Regression testing is used to retest the modified version of software. Regression testing is expensive but still an important process. In regression testing, test case prioritization is used to improve the efficiency of the regression test suite by executing the most critical test cases first. As retesting of entire program is not possible with adequate time and cost i.e. only subset of all test cases will execute for regression testing. In this paper, we introduce a technique for regression test case prioritization based on supervised machine learning. We use Genetic Algorithm to make test case description processable for machine learning. In our approach we have consider machine learning classification model logistic regression to evaluate and calculate the prioritization quality. Our result indicates that our technique gives more accurate result as compare to other techniques. We use hybrid combination of genetic algorithm and logistic regression to improve the test case prioritization technique.
Key-Words / Index Term
Regression testing, test cases, prioritization techniques, Genetic Algorithm, Logistic Regression
References
[1] K. K. Ranga, "Analysis and Design of Test Case Prioritization Technique for Regression Testing", International Journal for Innovative Research in Science and Technology, vol. 2, pp. 248-252, 2015.
[2] S. Yoo and M. Harman, "Regression testing minimization, selection and prioritization: a survey", Software Testing, Verification and Reliability, vol. 22, pp. 67-120, 2012.
[3] T. Hall, S. Beecham, D. Bowes, D. Gray and S. Counsell, "A systematic literature review on fault prediction performance in software engineering", Software Engineering, IEEE Transactions on, vol. 38, pp. 1276-1304, 2012.
[4] L.Briand, “Novel applications of machine learning in software testing”, International Conference of Software Quality, pages 3-10, 2008.
[5] D. Marijan, A. Gotlieb and S. Sen, "Test case prioritization for continuous regression testing: An industrial case study", in Software Maintenance (ICSM), 2013 29th IEEE International Conference on, pp. 540-543, 2013.
[6] G. Chen and P.-Q. Wang. Test case prioritization in a specification-based testing environment. 9(8), 2014.
[7] M. Harman, P. McMinn, M. Shahbaz and S. Yoo, "A comprehensive survey of trends in oracles for software testing", University of Sheffield, Department of Computer Science, Tech. Rep. CS-13-01, 2013.
[8] K. Zhai, B. Jiang and W. Chan, "Prioritizing test cases for regression testing of location-based services: metrics, techniques and case study", Services Computing, IEEE Transactions on, vol. 7, pp. 54-67, 2014.
[9] J. Petke, S. Yoo, M. B. Cohen and M. Harman, "Efficiency and early fault detection with lower and higher strength combinatorial interaction testing", in Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp. 26-36, 2013.
[10] A. Orso and G. Rothermel, "Software testing: a research travelogue (2000–2014)," in Proceedings of the on Future of Software Engineering, pp. 117-132, 2014.
[11] M. J. Harrold, "Testing: a roadmap", in Proceedings of the Conference on the Future of Software Engineering, pp. 61-72, 2000..
[12] M. Grindal, B. Lindström, J. Offutt and S. F. Andler, "An evaluation of combination strategies for test case selection", Empirical Software Engineering, vol. 11, pp. 583-611, 2006.
[13] G. Rothermel, R. H. Untch, C. Chu and M. J. Harrold, "Prioritizing test cases for regression testing", Software Engineering, IEEE Transactions on, vol. 27, pp. 929-948, 2001.
[14] S. Elbaum, A. G. Malishevsky and G. Rothermel, "Test case prioritization: A family of empirical studies", Software Engineering, IEEE Transactions on, vol. 28, pp. 159-182, 2002.
[15] M. Gligoric, A. Groce, C. Zhang, R. Sharma, M. A. ALIPOUR and D. Marinov, "Guidelines for coverage-based comparisons of non-adequate test suites", Space, vol. 6, pp. 1,142, 2014.
[16] H. Do, S. Mirarab, L. Tahvildari and G. Rothermel, "An empirical study of the effect of time constraints on the cost-benefits of regression testing", in Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, pp. 71-82, 2008.
[17] E. Engstrom, P.Runeson, and A.Ljung, “Improving regression testing transparency and efficiency with history based prioritization- an industrial case study”, in Proceedings of International Conference of Software Testing, Verification and validation, IEEE, pp.367-376, 2011.
[18 A. Perini, A. Susi, and P.Avesani, “A machine learning approach to software requirement prioritization”,IEEE Transaction of Software Engg, pp.445-461, 2013.
[19] Y.-C. Huang, K.-L. Peng and C.-Y. Huang, "A history-based cost-cognizant test case prioritization technique in regression testing", Journal of Systems and Software, vol. 85, pp. 626-637, 2012.
[20] I. H. Witten, E. Frank, and M. A. Hall, “Data Mining: Practical Machine Learning Tools and Techniques”, Morgan Kaufmann Publishers Inc.,2011.
[21] X. Devroey, G. Perrouin, M. Cordy, P.-Y. Schobbens, A. Legay and P. Heymans, "Towards statistical prioritization for software product lines testing", in Proceedings of the Eighth International Workshop on Variability Modelling of Software-Intensive Systems, p. 10, 2014.
[22] D. D. Nardo, N. Alshahwan, L. Briand and Y. Labiche, "Coverage‐based regression test case selection, minimization and prioritization: a case study on an industrial system", Software Testing, Verification and Reliability, vol. 25, pp. 371-396, 2015.
Citation
Neeraj Kumar Saklani, Parulpreet Singh, "A Genetic Algorithm for Regression Test Case Prioritization," International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.134-137, 2017.