Quality and reliability are the major challenges faced in a secure software development process. ... more Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client's side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...
Software defect prediction using data mining techniques
Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlat... more Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.
International Journal of Intelligent Systems and Applications, 2019
Machine Learning is a division of Artificial Intelligence which builds a system that learns from ... more Machine Learning is a division of Artificial Intelligence which builds a system that learns from the data. Machine learning has the capability of taking the raw data from the repository which can do the computation and can predict the software bug. It is always desirable to detect the software bug at the earliest so that time and cost can be reduced. Feature selection technique wrapper and filter method is used to find the most optimal software metrics. The main aim of the paper is to find the best model for the software bug prediction. In this paper machine learning techniques linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump are used and comparative analysis has been done using performance parameters such as correlation, R-squared, mean square error, accuracy for software modules named as ant, ivy, tomcat, berek, camel, lucene, poi, synapse and velocity. Support vector machine outperform as compare to other machine learning model.
Role of Technology in Globalization with Reference to Business Continuity
Global Journal of Enterprise Information System, 2009
Technology is the vital force in the modern form of business globalization. Technology has revolu... more Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...
Comparative Analysis of Different Machine Learning Techniques
Artificial learning (AI) is one of the areas of computer science which develops the system in a w... more Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.
Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects
Different nations are striving to implement e-governance on a full scale. The major issue is the ... more Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.
Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of... more Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today's world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.
Optimal Metrics Selection for Software Defect Prediction
International Journal of Data Mining and Emerging Technologies, 2017
Software metrics are a very important component in software development area. The most important ... more Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.
Role of Technology in Globalization with reference to Business Continuity
Global Journal of Enterprise Information …, 2010
... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri [email protected] Page 2. Global J... more ... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri [email protected] Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...
Quality and reliability are the major challenges faced in a secure software development process. ... more Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client's side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...
Software defect prediction using data mining techniques
Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlat... more Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.
International Journal of Intelligent Systems and Applications, 2019
Machine Learning is a division of Artificial Intelligence which builds a system that learns from ... more Machine Learning is a division of Artificial Intelligence which builds a system that learns from the data. Machine learning has the capability of taking the raw data from the repository which can do the computation and can predict the software bug. It is always desirable to detect the software bug at the earliest so that time and cost can be reduced. Feature selection technique wrapper and filter method is used to find the most optimal software metrics. The main aim of the paper is to find the best model for the software bug prediction. In this paper machine learning techniques linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump are used and comparative analysis has been done using performance parameters such as correlation, R-squared, mean square error, accuracy for software modules named as ant, ivy, tomcat, berek, camel, lucene, poi, synapse and velocity. Support vector machine outperform as compare to other machine learning model.
Role of Technology in Globalization with Reference to Business Continuity
Global Journal of Enterprise Information System, 2009
Technology is the vital force in the modern form of business globalization. Technology has revolu... more Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...
Comparative Analysis of Different Machine Learning Techniques
Artificial learning (AI) is one of the areas of computer science which develops the system in a w... more Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.
Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects
Different nations are striving to implement e-governance on a full scale. The major issue is the ... more Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.
Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of... more Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today's world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.
Optimal Metrics Selection for Software Defect Prediction
International Journal of Data Mining and Emerging Technologies, 2017
Software metrics are a very important component in software development area. The most important ... more Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.
Role of Technology in Globalization with reference to Business Continuity
Global Journal of Enterprise Information …, 2010
... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri [email protected] Page 2. Global J... more ... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri [email protected] Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...
Uploads
Papers by Tripti Gautam