A Comparison Report on Efficient Types of Testing
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.195-202, Apr-2016
Abstract
In this paper, by comparing various types of testing, a framework was created for an efficient and cost effective testing. For the research, one of the largest digital marketing companies was considered. The company wanted to analyze their business to identify which website is generating more revenue. To analyze the business, the company has developed an analytical tool. To ensure the efficiency of the product and to compete with other analytical tool vendors in the market, they keep enhancing the product and release it frequently. To test these analytical product for frequent releases the company came up with an idea to compare the types of testing and decide the right testing methodology that will give the best output with less turnaround and reduced cost. In this approach four types of testing were considered, them being Priority based, Critical based, Risk based and Resource based testing.
Key-Words / Index Term
Comparision Testing,Priority Based Testing,Risk Based Testing,Critical Based Testing,Resource Based Testing
References
[1] T. Mens and T. Tourwe, “ A survey of software refactoring,” Software Engineering, IEEE Transactions on, vol.30, no. 2, pp. 126-139, Feb 2004
[2] http://www.webopedia.com/TERM/S/static_routing.html, date last viewed: 2016-1-17.
[3] A. Leitner, I. Ciupa and B. Meyer,“Reconciling Manual and Automated Testing: the AutoTest Experience”, Proc. 40th Hawaii International Conference on System Sciences, pp: 261-271, January 2007.
[4] M. Ali, S. Mushtaq and N. Arshad., “Priority-Based Automated Testing of Web Application”, Proc. IEEE Conference on Communication and Information Technology,2012.
[5] Felix Redmill in „Professional Tester“, April 2003. www.professional-tester.com
[6] Tom DeMarco and Tim Lister, "Waltzing with Bears: Managing Risk on Software Projects”, 2003.www.riskbasedtesting.com
[7] IEEE Standard 1044.1-2002: Guide to Classification for Software Anomalies
[8] IEEE Std. 16085 Standard for Software Engineering -Software Life Cycle Processes -Risk Management You find them at sales@ieee.org
[9] Information Systems Examinations Board. Practitioner Certificate in Software Testing - Guidelines and Syllabus. Version 1.1. British Computer Society, Swindon, 2001
[10] Gerrard P and Thompson N. Risk-Based E-Business Testing. Artech House, Norwood,2002.
[11] Kahneman D and Tversky A. Prospect Theory: An Analysis of Decision Under Risk.Econometrica, 47, 263-291, 1979.
[12] Redmill. Risk Analysis - a subjective process. Engineering Management Journal, 12, 2,91-96, 2002.
[13] Moseley, C. E., Gettings, R. M., & Cooper, R. (2002). Havingityourway: Under-standing state individual budgeting strategies . Washington, DC: National Associa-tion of State Directors of Developmental Disabilities Services.
[14] Campbell, E. M., Fortune, J. R., Frisch, J. K., Heal, L. W., Heinlein, K. B., Lynch, R. M., et al. (2005). Predictors of expenditures in western states. In R. J. Stancliffe and K.C. Lakin (Eds.), Costs and outcomes of community services for people withIntellectual disabilities (pp. 175–201). Baltimore, MD: Paul H. Brookes Publishing Co.
[15] Kaner, Cem and Walter P. Bond “Software Engineering Metrics: What Do They Measure and How Do We Know?.”
[16] Weinberg, Gerald M. “Quality Software Management, Volume 2: First-Order Measurement.”.
[17] P. Chitti Babu and K.C.K. Bharathi, “Assessment of Maintainability factor”, International Journal of Computer Science Engineering and Information Technology Research, Vol. 3, Issue.3,29-42, 2013
[18] C.Mallikarjuna and P.Chitti Babu,” A Report on the Analysis of Software Maintenance and Impact on Quality Factors”, International Journal of Engineering Sciences Research-IJESR, Vol.05,1485-89,2014
Citation
Thulasiram K, Ramakrishna.S and Chitti Babu.P, "A Comparison Report on Efficient Types of Testing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.195-202, 2016.
Exploiting Social Network for Forensic Analysis to Predict Civil Unrest
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.203-209, Apr-2016
Abstract
Big Data analytics is new trending research area in IT industry and social media provides tremendous data for Big Data analysis. Social media analysis mostly includes mining people's opinion because mostly people share their views on social media platform (such as Twitter, Facebook, etc.). The opinions can easily flow in the society using Twitter. It is the easiest way to pass the information in the society. Crimes, riots, unrest, public movements and every activity is being planned or shared on Twitter and it is being delivered to individual within a short span of time. The opinions regarding every situation change as the individual change, so the people's reactions are also different. Sometimes the reaction can change hundreds of people to think the same and react on that which can lead towards civil unrest such as strikes, riots, March etc. Tweets can be analysed to understand the behaviour of the individual and groups. By predicting civil unrest the investigators will get the help to take certain action to prepare for the situation or to stop certain activities. The prediction can also help to find out the persons responsible for initiating certain activity. In this paper we have presented a system where tweets are processed and analysed to predict up to what rate the civil unrest will happen or not. Firstly, the real time Twitter data is being fetched by using flume service in hadoop. Then the tweets are pre-processed. The pre-processed tweets are filtered by using Content based filtering algorithm to filter out the tweets which are related to civil unrest. The filtered tweets are clustered according to the category to which the tweet belong such terrorism, politics and social using K-means algorithm. Then sentiment analysis is being performed followed with prediction of the civil unrest.
Key-Words / Index Term
Big Data, Social Network Analytics, Hadoop, flume, Twitter, Sentiment Analysis, Prediction.
References
[1] I1-Chul Moon, Alice H. Oh and Kathleen M. Carley, ”Analyzing Social Media in Escalating Crisis Situations”,IEEE,2011.
[2] Marc Cheong, Sid Ray and David Green,”Interpreting the 2011 London Riots from Twitter Metadata”,IEEE, 2012.
[3] Ting Hua, Chang-Tien Lu, Naren Ramakrishnan, Feng Chen, Jaime Arredondo, David Mares, San Diego and Kristen Summers,” Analyzing Civil Unrest through Social Media”,IEEE,2013.
[4] Ryan Compton, Craig Lee, Tsai-Ching Lu, Lalindra De Silva and Michael Macy, ”Detecting future social unrest in unprocessed Twitter data”, IEEE, 2013.
[5] Elhadj Benkhelifa; Elliott Rowe; Robert Kinmond; Oluwasegun A Adedugbe and Thomas Welsh, ”Exploiting Social Networks for the prediction of social and civil unrest”, IEEE,2014.
[6] Ryan Compton, Craig Lee, Jiejun Xu, Luis Artieda- Moncada1, Tsai-Ching Lu, Lalindra De Silva and Michael Macy, ”Using publicly visible social media to build detailed forecasts of civil unrest”, Security Informatics,springeropen journal, 2014.
[7] Nasser Alsaedi and Pete Burnap, “Feature Extraction and Analysis for Identifying Disruptive Events from Social Media”, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015.
[8] Qian Yu, WeiTao Weng, Kai Zhang, Kai Lei and Kuai Xu, “Hot Topic Analysis and Content Mining in Social Media”, IEEE, 2015.
[9] Harvinder Jeet Kaur and Rajiv Kumar, “Sentiment Analysis from Social Media in Crisis Situations”, International Conference on Computing, Communication and Automation, 2015.
[10] Twitter Developer[Online]. Available: http://dev.twiiter.com/.
[11] Forensic data analysis[Online]. Available: https://en.wikipedia.org/wiki/For-
ensic-data-analysis
[12] Flume 1.6.0 User Guide[Online].Available:https:// ume.apache.org/FlumeUserGuide.html/.
[13] Acquiring Big Data Using Apache Flume[Online]. Available:///E:/00%20M.Tech%20Project/Acquiring%20Big%20Data%20Using%20Apache%20Flume%20%20Dr%20Dobb's.html/.
[14]Hadoop[Online]. Available: https://hadoop.apache.org/.
[15] Flume[Online]. Available: https://flume.apache.org/.
Citation
Ruchika Ganar and Shrikant B. Ardhapurkar , "Exploiting Social Network for Forensic Analysis to Predict Civil Unrest," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.203-209, 2016.
To Study the Various Attacks and Protocols in MANET
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.210-212, Apr-2016
Abstract
MANET is a network which has no central coordinator and the nodes are free to move in any direction because there is no fixed infrastructure. There are various types of attacks which can easily harm the security of the network. Sender sends a packet to the destination by using the best path with the help of routing protocols. In this review paper, numerous attacks will be discussed.
Key-Words / Index Term
MANET, Attacks, DSR, infrastructure-less
References
[1] Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”, IEEE, 2009
[2] Amandeep Singh Bhatia and Rupinder Kaur Cheema,“Analyzing and Implementing the Mobility over MANETS using Random Way Point Model”,International Journal of Computer Applications (0975 – 8887) Volume 68– No.17, April 2013
[3] Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security, Volume-9, No- 4 (2011): 106-110.
[4] Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014, E-ISSN: 2347-2693
[5] Caimu Tang,Dapeng Oilver “An Efficient Mobile Authentication Scheme for Wireless Networks”,IEEE, 2011
[6] Dr. A.K Verma, “Mobile Adhoc Networks: An Introduction”, 2003
[7] Erik G. Nilsson and Ketil Stølen, “Ad Hoc Networks and Mobile Devices in Emergency Response – a Perfect Match”
[8] Sharma, Pradeep Kumar, Shivlal Mewada, and Pratiksha Nigam. "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network." International Journal of Scientific Research in Network Security and Communication, Volune-1. Issue-4 (2013): 8-11.
[9] Ian D. Chakeres and Elizabeth M. Belding-Royer , “AODV Routing Protocol Implementation Design”, In C. E. Perkins, editor, Ad hoc Networking, pages 173.219. Addison-Wesley, 2004
Citation
Harkiranpreet Kaur and Rasneet Kaur, "To Study the Various Attacks and Protocols in MANET," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.210-212, 2016.
Survey on Continuous Integration, Deployment and Delivery in Agile and DevOps Practices
Survey Paper | Journal Paper
Vol.4 , Issue.4 , pp.213-216, Apr-2016
Abstract
Innovations pick up the leap and customers desire quick change, business turning out to be progressively more responsive. Ready end product delivery to market is the solution, and to smooth the progress of the overall business aspiration, software life cycle process needs to be fast. Over the years the transition from waterfall model to agile methodology has come into the era. Progressions of these development operations are moving towards the downstream with the evolution of DevOps. Deployment of software applications in a trustworthy, repeatable, and reliable approach meet up the demands of an agile development which can only be completely achieved by embracing automation. Several DevOps main beliefs are supported by Amazon Web Services (AWS) which every IT departments can profit fromand thus business agility is improved. In this paper, we focus on delivering the principles of DevOps and Continuous Integration, Deployment and Delivery practices supported by them.
Key-Words / Index Term
Amazon Web Service, Continuous Integration,Continuous Deployment, Continuous Delivery, DevOps, Software Life Cycle.
References
[1] Alexander Eck, Falk Uebernickel, and Walter Brenner, “Fit For Continuous Integration: How Organizations Assimilate An Agile Practice,” 2014.
[2] Amit Deshpande and Dirk Riehle, “Continuous Integration in Open Source Software Development,” 2008.
[3] Daniel Ståhl and Jan Bosch, “Experienced Benefits of Continuous Integration in Industry Software Product Development: A Case Study,” 2015.
[4] David Chapman, “Introduction to DevOps on AWS”, Amazon Web Service, December 2014.
[5] FazreilAmreen Abdul and MenselyCheahSiowFhang, “Implementing Continuous Integration towards Rapid Application Development,” May, 2012.
[6] Gerry Claps, Richard BerntssonSvensson, and Aybüke Aurum, “On the Journey to Continuous Deployment: Technical and Social Challenges Along the Way,” 2014.
[7] Hanna Salopaasi, “The Role of Continuous Integration in Software Business,” 2014.
[8] Manish Virmani, “Understanding DevOps & Bridging The Gap From Continuous Integration To Continuous Delivery,” 2015.
[9] Martin Fowler, “Continuous Integration,” 2006. [Online]. Available: http://www.martinfowler.com/articles/continuousintegration.html
[10] Mathias Meyer, “Continuous Integration and Its Tools”, IEEE Software, 2014.
[11] Martin Brandtner, Emanuel Giger and Harald Gall “SQA-Mashup: A Mashup Framework for Continuous Integration,” Information and Software Technology 65, October 2014.
[12] Sean Stolberg, “Enabling Agile Testing Through Continuous Integration,” 2009.
[13] K. ReshmaRevathi, Dr. S. Kirubakaran, "A Survey on Automatic Bug Triage Using Data Mining Concepts", International Journal of Science and Research (IJSR), ijsr.net, Volume 5 Issue 3, March 2016, 184 - 186
[14] D. Cubranic and G. C. Murphy, “Automatic bug triage using text categorization,” in Proc. 16th Int. Conf. Softw. Eng. Knowl. Eng., Jun. 2004, pp. 92–97.
Citation
K. Sree Poornalinga, P. Rajkumar, "Survey on Continuous Integration, Deployment and Delivery in Agile and DevOps Practices," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.213-216, 2016.
Enhanced Load Balanced Min-Min Algorithm in Cloud Computing
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.217-223, Apr-2016
Abstract
Cloud computing provides the applications and services presented over the Internet. These services are offered from the data-center all over the world. By using the environments of cloud computing many tasks are requires to be executed by available resources to achieve best performance, to reduce minimum response time, minimum completion time and utilization of resources etc. This paper focuses on the task scheduling and load balancing based on the different kinds of services and results .Using the environments of cloud computing the major problems are task scheduling and load balancing. This paper relates to benefits improved algorithms under the environment of Static & Dynamic cloud computing. According to the different types of scheduling, we define here the priority, efficiency and balances between the tasks respectively. Here proposed algorithm increases the resource utilization and reduces the makespan. In this paper, the experimental results shows the better algorithm from previous and fulfill the requirements of users.
Key-Words / Index Term
Cloud Computing, Load Balancing, Min-Min Algorithm, Meta Task Scheduling.
References
[1] Salim Bitam, “Bees Life algorithms for job scheduling in cloud computing”, International Conference on computing and Information Technology, 2012.
[2] Saeed Parsa and Reza Entezari-Maleki, “RASA: A New Grid Task Scheduling Algorithm”, International Journal of Digital Content Technology and its Applications, Vol.3, pp. 91-99, 2009.
[3] Rajiv Ranjan, RajkumarBuyya, Cesar A.F.De Rose, Anton Beloglazov, Rodrigo N. Calheiros, “CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms”, unpublished.
[4] Tracy D. Braun, Howard Jay Siegel and Noah Beck , “A Comparison of Eleven Static Heuristics for Mapping a Class of Independent Tasks onto Heterogeneous Distributed Computing Systems”, Journal of Parallel and Distributed Computing 61, 810-837 (2001)
[5] Thomas A. Henzinger , Anmol V. Singh, Vasu Singh, Thomas Wies, “Static Scheduling in Clouds”.
[6] T.Casavant and J.Kuhl, “A Taxonomy of Scheduling in General Purpose Distributed Computing Systems”, “IEEE Trans. On Software Engineering”, vol.14, no.3, February 1988,pp.141-154.
[7] M.Arora, S.K.Das, R.Biswas, “A Decentralized Scheduling and Load Balancing Algorithm for Heterogeneous Grid Environments”.
[8] Henri Casanova, Arnauld Legrand, DmitriiJagorodnov and Francine berman, "Heuristics for scheduling parameter Sweep Applications in Grid Environments".
[9] O. M. Elzeki, M. Z. Reshad and M. A. Elsoud, "Improved Max-Min Algorithm in Cloud Computing", International Journal of Computer Applications (0975 – 8887).
[10] FatosXhafa, Ajith Abraham, “Computational models and heuristic methods for Grid scheduling problems”, “Future Generation Computer Systems 26”, 2010, pp.608-621.
[11] Shu-Ching Wang, Kuo-Qin Yan *(Corresponding author), Wen-Pin Liao and Shun-Sheng Wang, “Towards a Load Balancing in a Three-level Cloud Computing Network”, Institute of Electrical and Electronics Engineers - 2010.
[12] Hak Du Kim and Jin Suk Kim, “An On-line Scheduling Algorithm for Grid Computing Systems”, Electronics and Telecommunications Research Institute, Taejon, Korea, November 2003.
[13] D.Maruthanayagam and Dr.R.Umarani, “Enhanced Ant Colony Algorithm for grid scheduling”, International Journal Comp.Tech.Appl, Vol 1 (1) 43-53, November 2010.
[14] Saeed Parsa and Reza Entezari-Maleki, “RASA: A New Grid Task Scheduling Algorithm”, International Journal of Digital Content Technology and its Applications, Vol.3, pp. 91-99, 2009.
[15] T.Kokilavani, Dr. D.I. George Amalarethinam,”Load Balanced Min-min Algorithm for Static Meta-task Scheduling in Grid Computing", International Journal of Computer Application (0975-8887), Volume 20- No.2,April-2011.
[16] RajkumarBuyya, Rajiv Ranjan, Rodrigo N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities”, International Conference on High Performance Computing and Simulation, HPCS2009, pp.1-11, 2009.
[17] Ghalem, B., Fatima Zohra, T., and Wieme, Z. “Approaches to Improve the Resources Management in the Simulator CloudSim” in ICICA 2010, LNCS 6377, DOI: 10.1007/978-3-642-16167-4_25, pp. 189–196, 2010.
[18] L. Wang, G. Laszewski, M. Kunze and J. Tao, “Cloud computing: a perspective study, J New Generation Computing”, 2010, pp. 1-11
[19] Sun Microsystems, “Introduction to cloud computing architecture”. White Paper, Sun Microsystems, June 2009.
[20] MythryVuyyuru, Pulipati Annapurna, K. Ganapathi Babu, A.S.K Ratnam, "An Overview of Cloud Computing Technology", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 22312307, Volume-2, Issue-3, July 2012.
[21] Salim Bitam, “Bees Life algorithms for job scheduling in cloud computing”, International Conference on computing and Information Technology, 2012.
[22] www.google.co.in
Citation
RiddhiVarude, Ishita Shah, Mukesh Bhandari, "Enhanced Load Balanced Min-Min Algorithm in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.217-223, 2016.
Node Attestation for Reliable Communication in WSN
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.224-228, Apr-2016
Abstract
The wireless sensor network (WSN) is a mix of sensing, computation, and communication into a solitary small gadget. A sensor system comprises of a variety of various sensor systems of differing sorts interconnected by a wireless communication network. Sensor information is shared between these sensor nodes and utilized as data to a circulated estimation framework. The framework extricates important data from the accessible data. In this paper represent briefly various attacks and approaches to used for WSN.
Key-Words / Index Term
WSN, attestation algorithm, routing strategy
References
[1] Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016, E-ISSN: 2347-2693.
[2] AbuHmed, T “Software-Based Remote Code Attestation in Wireless Sensor Network” IEEE Conference on Global Telecommunications Conference, pp- 1 – 8, 2009.
[3] Dazhi Zhang “DataGuard: Dynamic data attestation in wireless sensor networks” IEEE Conference on Dependable Systems and Networks (DSN), pp. 261 – 270, June 28 2010-July 1 2010.
[4] Yong-Sik Choi “A study on sensor nodes attestation protocol in a Wireless Sensor Network” IEEE Conference on Advanced Communication Technology (ICACT), pp. 574 – 579, 7-10 Feb. 2010.
[5] Rohit Aggarwal and Khushboo Bansal , "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (64-68), Apr -2016, E-ISSN: 2347-2693
[6] Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)" International Journal of Computer Science and Information Security, Vol-9 (4), (2011): 106-111.
[7] I.. R. Chen “Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation” IEEE Conference on IEEE Communications Letters, pp. 1640 – 1643, 2012.
[8] Doo Seop Yun “A study on the vehicular wireless base-station for in-vehicle wireless sensor network system” IEEE Conference on Information and Communication Technology Convergence (ICTC), pp-609 – 610, 2014.
[9] Tseng-Yi Chen “An Efficient Routing Algorithm to Optimize the Lifetime of Sensor Network Using Wireless Charging Vehicle” IEEE Conference on Mobile Ad Hoc and Sensor Systems (MASS),pp- 501 – 502, 2014.
[10] Mitra, S “Energy aware fault tolerant framework in Wireless Sensor Network” IEEE Conference on Applications and Innovations in Mobile Computing (AIMoC), pp- 139 – 145, 2014.
[11] Makhdoom, I. “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks” IEEE Conference on Software Engineering Conference (NSEC) ,pp- 1 – 6, 2014.
[12] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014, E-ISSN: 2347-2693
[13] Vinolia A, Jagajothi G, "Estimating Localization for intruder detection in WSN", International Journal of Computer Sciences and Engineering, Volume-02, Issue-06, Page No (33-38), Jun -2014, E-ISSN: 2347-2693
[14] Makhdoom, I “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks” IEEE Conference on Software Engineering Conference (NSEC), 2014, pp- 1 – 6.
[15] Deshpande, P. “Techniques improving throughput of wireless sensor network: A survey” IEEE Conference on Circuit, Power and Computing Technologies (ICCPCT), pp- 1 – 5, 2015.
Citation
Ranjeet Kaur and Khushboo Bansal, "Node Attestation for Reliable Communication in WSN," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.224-228, 2016.
HACE retrieval Technique Usage in Big data to get particular Pattern
Review Paper | Journal Paper
Vol.4 , Issue.4 , pp.229-232, Apr-2016
Abstract
To take care of the directing void issue in geographic steering, high control overhead and transmission postponement are as a rule taken in remote sensor systems. Roused by the structure made out of edge hubs around which there is no steering void, a proficient bypassing void steering convention in light of virtual directions is proposed in this paper. The fundamental thought of the convention is to change an irregular structure made out of void edges into a general one by mapping edge hubs directions to a virtual circle. By using the virtual circle, the covetous sending can be kept from falling flat, so that there is no directing void in sending process from source to destination and control overhead can be lessened. Besides, the virtual circle is helpful to lessen normal length of steering ways and abatement transmission delay. Reproductions demonstrate the proposed convention has higher conveyance proportion, shorter way length, less control parcel overhead, and vitality utilization. Enormous Data concern huge volume, mind boggling, developing information sets with various, self-sufficient sources. With the quick improvement of systems administration, information stockpiling, and the information accumulation limit, Big Data are presently quickly growing in all science and building areas, including physical, organic and biomedical sciences. This paper shows a HACE hypothesis that portrays the components of the Big Data upheaval, and proposes a Big Data handling model, from the information mining point of view. This information driven model includes request driven accumulation of data sources, mining and investigation, client enthusiasm demonstrating, and security and protection contemplations. We investigate the testing issues in the information driven model furthermore in the Big Data unrest.
Key-Words / Index Term
HACE, Big Data
References
[1] M. Buck and J. Lieb. ChIP-chip: considerations for the design, analysis, and application of genome-wide chromatin immunoprecipitation experiments. Genomics, 83(3):349-360, 2004
[2] E. Candès, J. Romberg, and T. Tao. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. Information Theory, IEEE Transactions on, 52(2):489-509, 2006
[3] C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm.
[4] C. Cortes and V. Vapnik. Support-vector networks. Machine learning, 20(3):273-297, 1995.
[5] C. Ding, T. Li, and M. I. Jordan. Nonnegative matrix factorization for combinatorial optimization: Spectral clustering, graph matching, and clique finding. ICDM, pages 183-192, 2008.
[6] C. Ding, Y. Zhang, T. Li, and S. R. Holbrook. Biclustering protein complex interactions with a biclique finding algorithm. ICDM, pages 178-187, 2006.
[7] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. Ann. Statist., 32(2):407-499, 2004.
Citation
Sandhya A, T. Hanumantha Reddy, "HACE retrieval Technique Usage in Big data to get particular Pattern," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.229-232, 2016.
3D Android game Hide-n-Seek
Technical Paper | Journal Paper
Vol.4 , Issue.4 , pp.233-236, Apr-2016
Abstract
The project is about 3D game development based on android operating system. 3D game development is an exciting activity for many student. The game is all about “3D Hide N Seek”.The purpose of this project is to provide students with entertainment and fun. The goal of our project is to develop a game with 3D graphics with good performance. An essential objective is its a “multi-player” feature. Player can connect via bluetooth. The other feature is “leaders board” over the globe playing this 3D game using Database SQL lite. 3D game is being developed using unity 3 software as it required graphics. Graphics using openGL es or photo shop for clean and realistic objects. The game is all bout there will be a diner and other 4 player will hide (as max. 5 players can play at a time).the diner will find all the other players in minimum time as possible. There will be different areas like school, garden , etc. player can select area of his/her choice. Minimum time required to find all players will be player's(diner) high score(only in single player mode where 4 other players will be bots).
Key-Words / Index Term
References
[1] Robert Green, Mario Zechner Beginning Android Games 2nd ed. 2012 Edition, ISBN-13: 978-1430246770
[2] Android Game,http://it-ebooks.info/book/3841,Feb 2016
[3] Unity3D, http://learnunity3d.com/tag/android/,Jan 2016
[4] Stuart Russell and Peter Norvig ,“Artificial Intelligence: A Modern Approach”, Second (2nd) Edition
[5]Android Game, gamedev.stackexchange.com
Citation
Sanket Tilotkar, Mehul Makwana, Siraj Sayyed and Aditya Naikbawane, "3D Android game Hide-n-Seek," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.233-236, 2016.
Efficient Indexing and Searching of Big Data in HDFs
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.237-243, Apr-2016
Abstract
Efficient indexing is an efficient, standard data structure, most suited for look operation over an exhaustive set of data. The enormous set of data is mostly unstructured furthermore, does not fit into traditional database categories. Extensive scale preparing of such data needs a dispersed structure such as Hadoop where computational assets could easily be shared furthermore, accessed. An execution of a look motor in Hadoop over millions of Wikipedia reports utilizing an transformed record data structure would be conveyed out for making look operation more accomplished. Transformed record data structure is utilized for mapping a word in a record or set of records to their relating locations. A hash table is utilized in this data structure which stores each word as record furthermore, their relating areas as its values thereby providing simple lookup furthermore, extremely of data making it suitable for look operations.
Key-Words / Index Term
Hadoop; Enormous Data; Efficient Indexing; Data Structure
References
[1] Raj, A. Kaur, K. ; Dutta, U. ; Sandeep, V.V. ; Rao, S. "Enhancement of Hadoop Clusters with Virtualization Using the Capacity Scheduler", Third International Conference on Services in Emerging Markets (ICSEM),Mysore, India, Dec 2012. Page(s): 50 - 57.
[2] Jiong Xie; Shu Yin ; Xiaojun Ruan ; Zhiyang Ding ; Yun Tian ; Majors, J. ; Manzanares, A. ; Xiao Qin. "Improving MapReduce performance through data placement in heterogeneous Hadoop clusters". IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), Atlanta, GA, April, 2010. Page(s): 1 - 9.
[3] Kala Karun, A ; Chitharanjan, K ; "A review on hadoop — HDFS infrastructure extensions ", IEEE Conference on Information & Communication Technologies (ICT), JeJu Island, April 2013. Page(s): 132 - 137.
[4] Richard Mccreadie ; Craig Macdonald ; Iadh Ounis; "MapReduce indexing strategies: Studying scalability and efficiency". International Journal of Information Processing and Management. Volume 48 Issue 5, September, 2012. Pages: 873-888.
[5] Apache Hadoop, Hadoop, HDFS, Avro, Cassandra, Chukwa, HBase, Hive, Mahout, Pig, Zookeeper are trademarks of the Apache Software Foundation. http://www.hadoop.apache.org/ Last Published: 10/16/2013
[6] Barry Wilkinson; Michael Allen; “Parallel Programming: Techniques and Applications Using Networked Workstations and Parallel Computers” (2nd Edition). Publication Date: March 14, 2004,
[7] Gal Lavee ; Ronny Lempel ; Edo Liberty ; Oren Somekh ; " Inverted index compression via online document routing" Published in: WWW '11 Proceedings of the 20th international conference on World Wide Web. Pages 487-496.
[8] Guanghui Xu; Feng Xu; Hongxu Ma; "Deploying and researching Hadoop in virtual machines". Published in: IEEE International Conference on Automation and Logistics (ICAL), Zhengzhou, Aug. 2012. Page(s): 395 - 399.
[9] Shvachko, K.; Hairong Kuang ; Radia, S. ; Chansler, R. " The Hadoop Distributed File System". Published in: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), Incline Village, NV, May 2010. Page(s): 1 - 10.
[10] Ishii, M.; Jungkyu Han; Makino, H; "Design and performance evaluation for Hadoop clusters on virtualized environment" Published in: International Conference on Information Networking (ICOIN), Bangkok, Jan. 2013. Page(s): 244 - 249.
Citation
D.Deepika, K.Pugazhmathi, "Efficient Indexing and Searching of Big Data in HDFs," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.237-243, 2016.
QoS Ranking Prediction for Cloud Brokerage Services
Research Paper | Journal Paper
Vol.4 , Issue.4 , pp.244-251, Apr-2016
Abstract
With the development of Cloud Computing, more also, more companies are advertising diverse cloud services. From the customer’s point of view, it is continuously troublesome to choose whose administrations they should use, based on users’ requirements. Currently there is no programming system which can automatically File cloud suppliers based on their needs. In this work, we propose a system also, a mechanism, which measure the quality also, prioritize Cloud services. Such system can make significant sway also, will create healthy competition among Cloud suppliers to fulfill their Administration Level Understanding (SLA) also, improve their Quality of Service (QoS).
Key-Words / Index Term
Cloud Computing, Administration Measurement, Quality of Service
References
[1] W. Wang, D. Niu, B. Li, and B. Liang, “Dynamic cloud resource reservation via cloud brokerage,” in Proc. IEEE 33rd Int. Conf. Distrib. Comput. Syst., 2013, pp. 400–409.
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, pp. 50–58, 2010.
[3] W. Wang, B. Li, and B. Liang, “To reserve or not to reserve: Optimal online multi-instance acquisition in IaaS clouds,” in Proc. USENIX Int. Conf. Auton. Comput., 2010, pp. 13–22.
[4] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013
[5] N. Chohan, C. Castillo, M. Spreitzer, M. Steinder, A. Tantawi, and C. Krintz, “See spot run: Using spot instances for MapReduce workflows,” in Proc. Conf. Hot Topics Cloud Comput., 2010, p. 7.
[6] E. Roth, Ed., The Shapley Value, Essays in Honor of Lloyd S. Shapley. Cambridge, U.K.: Cambridge Univ. Press, 1988.
[7] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory, Cambridge, U.K.: Cambridge Univ. Press, 2007.
Citation
G.Dinesh, K.Pugazh Mathi, "QoS Ranking Prediction for Cloud Brokerage Services," International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.244-251, 2016.