ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019
Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.
Advances in intelligent systems and computing, Jun 13, 2018
Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.
2017 International Conference on Computing, Communication and Automation (ICCCA), 2017
Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classi... more Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classical threshold secret sharing schemes, and they have been extensively in the literature. In an HTSS, participants are classified into different security levels, and the threshold value of a higher level is smaller than that of a lower level. Participants in each level can recover the secrets, if the number of shares is equal to or more than the corresponding threshold value. Share of a higher level participant can be used to reconstruct the secret at lower level. In this paper, we proposed first hierarchical threshold multi-secret sharing scheme based on polynomial interpolation. Proposed scheme is a variation to HTSS schemes based on the CRT suggested by Singh et al. and Harn et al. Novelty of the proposed scheme is that each participant requires to keep only one secret share and multiple secrets can be shared separately without refreshing the secret share. Also, secrets are recovered in stage by stage. Our scheme which is unconditionally secure, is based on Lagrange interpolation polynomial and one-way function.
International Journal of Recent Technology and Engineering (IJRTE), 2019
Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...
Transaction Management is crucial in mobile environments. Applications in mobile environments hav... more Transaction Management is crucial in mobile environments. Applications in mobile environments have various limitations like low/ variable bandwidth, frequent disconnections, high communication costs etc. These limitations may lead to transaction aborts. The database consistency in the mobile environments can be preserved with the support of ACID properties. This paper proposes different approaches of achieving concurrency control when the mobile host is a thin client. Disconnections during the transaction are treated as a normal situation rather than a drawback
International Journal of Rough Sets and Data Analysis, 2019
Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measur...
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Abstract—Extraction of components pertaining to a particular domain not only reduces the cost but... more Abstract—Extraction of components pertaining to a particular domain not only reduces the cost but also helps in delivering a quality product. However, the advantages of the Component Level Interaction’s (CLI’s) are not clearly presented. In the first part of the paper the design of HR Portal application is described. Later the results are simulated using the Netbeans Profiler tool which exposes and highlights the performance characteristics of component based system pertaining to HR domain. Keywords—Components, Domain Engineering, CLI’s, CCT’s I.
The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.
Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...
Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Fuzzy-rough set theory, an extension to classical rough set theory, is effectively used for attri... more Fuzzy-rough set theory, an extension to classical rough set theory, is effectively used for attribute reduction in hybrid decision systems. However, it’s applicability is restricted to smaller size datasets because of higher space and time complexities. In this work, an algorithm MR_IMQRA is developed as a MapReduce based distributed/parallel approach for standalone fuzzy-rough attribute reduction algorithm IMQRA. This algorithm uses a vertical partitioning technique to distribute the input data in the cluster environment of the MapReduce framework. Owing to the vertical partitioning, the proposed algorithm is scalable in attribute space and is relevant for scalable attribute reduction in the areas of Bioinformatics and document classification. This technique reduces the complexity of movement of data in shuffle and sort phase of MapReduce framework. A comparative and performance analysis is conducted on larger attribute space (high dimensional) hybrid decision systems. The comparat...
Transaction management in wireless environment poses challenging issues in preserving data consis... more Transaction management in wireless environment poses challenging issues in preserving data consistency and fault tolerance. As the mobile databases are prone to frequent disconnections, bandwidth limitations, mobility, etc. efficient execution of the transaction may not always be guaranteed. Replicating data at several sites is a powerful mechanism which not only increases performance but also provides fault tolerance for demanding database applications. However the major concern is to keep the replicated copies always consistent. In this paper various replication techniques and their applicability in the mobile environments are presented. Based on the requirements of the services provider and the type of execution model used, one of the replication strategies may be implemented.
2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH)
Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.
Internet of Things (IoT) is being widely adopted for building many domain applications. IoT Senso... more Internet of Things (IoT) is being widely adopted for building many domain applications. IoT Sensors and Actuators “things” are the most important and essential components upon which these applications are built. For new businesses, investing in deployment of their own sensors and actuators may be infeasible. Thus it was suggested to have sensing and actuating as a service and as a service delivery model. These services may be free (as in use without charge) or they may have a cost structure (pay as you use). In this work we study the adoption of layered fog architecture to enhance sensing and actuating as a service delivery model using this proposed architecture model. Our main goal to provide multiple sensors and actuators composition options, with high data filtering rates and reduced response time. We propose a layered architecture with built-in fault resistance. We explain the various in context of the literature.
ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019
Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.
Advances in intelligent systems and computing, Jun 13, 2018
Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.
2017 International Conference on Computing, Communication and Automation (ICCCA), 2017
Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classi... more Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classical threshold secret sharing schemes, and they have been extensively in the literature. In an HTSS, participants are classified into different security levels, and the threshold value of a higher level is smaller than that of a lower level. Participants in each level can recover the secrets, if the number of shares is equal to or more than the corresponding threshold value. Share of a higher level participant can be used to reconstruct the secret at lower level. In this paper, we proposed first hierarchical threshold multi-secret sharing scheme based on polynomial interpolation. Proposed scheme is a variation to HTSS schemes based on the CRT suggested by Singh et al. and Harn et al. Novelty of the proposed scheme is that each participant requires to keep only one secret share and multiple secrets can be shared separately without refreshing the secret share. Also, secrets are recovered in stage by stage. Our scheme which is unconditionally secure, is based on Lagrange interpolation polynomial and one-way function.
International Journal of Recent Technology and Engineering (IJRTE), 2019
Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...
Transaction Management is crucial in mobile environments. Applications in mobile environments hav... more Transaction Management is crucial in mobile environments. Applications in mobile environments have various limitations like low/ variable bandwidth, frequent disconnections, high communication costs etc. These limitations may lead to transaction aborts. The database consistency in the mobile environments can be preserved with the support of ACID properties. This paper proposes different approaches of achieving concurrency control when the mobile host is a thin client. Disconnections during the transaction are treated as a normal situation rather than a drawback
International Journal of Rough Sets and Data Analysis, 2019
Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measur...
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Abstract—Extraction of components pertaining to a particular domain not only reduces the cost but... more Abstract—Extraction of components pertaining to a particular domain not only reduces the cost but also helps in delivering a quality product. However, the advantages of the Component Level Interaction’s (CLI’s) are not clearly presented. In the first part of the paper the design of HR Portal application is described. Later the results are simulated using the Netbeans Profiler tool which exposes and highlights the performance characteristics of component based system pertaining to HR domain. Keywords—Components, Domain Engineering, CLI’s, CCT’s I.
The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.
Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...
Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Fuzzy-rough set theory, an extension to classical rough set theory, is effectively used for attri... more Fuzzy-rough set theory, an extension to classical rough set theory, is effectively used for attribute reduction in hybrid decision systems. However, it’s applicability is restricted to smaller size datasets because of higher space and time complexities. In this work, an algorithm MR_IMQRA is developed as a MapReduce based distributed/parallel approach for standalone fuzzy-rough attribute reduction algorithm IMQRA. This algorithm uses a vertical partitioning technique to distribute the input data in the cluster environment of the MapReduce framework. Owing to the vertical partitioning, the proposed algorithm is scalable in attribute space and is relevant for scalable attribute reduction in the areas of Bioinformatics and document classification. This technique reduces the complexity of movement of data in shuffle and sort phase of MapReduce framework. A comparative and performance analysis is conducted on larger attribute space (high dimensional) hybrid decision systems. The comparat...
Transaction management in wireless environment poses challenging issues in preserving data consis... more Transaction management in wireless environment poses challenging issues in preserving data consistency and fault tolerance. As the mobile databases are prone to frequent disconnections, bandwidth limitations, mobility, etc. efficient execution of the transaction may not always be guaranteed. Replicating data at several sites is a powerful mechanism which not only increases performance but also provides fault tolerance for demanding database applications. However the major concern is to keep the replicated copies always consistent. In this paper various replication techniques and their applicability in the mobile environments are presented. Based on the requirements of the services provider and the type of execution model used, one of the replication strategies may be implemented.
2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH)
Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.
Internet of Things (IoT) is being widely adopted for building many domain applications. IoT Senso... more Internet of Things (IoT) is being widely adopted for building many domain applications. IoT Sensors and Actuators “things” are the most important and essential components upon which these applications are built. For new businesses, investing in deployment of their own sensors and actuators may be infeasible. Thus it was suggested to have sensing and actuating as a service and as a service delivery model. These services may be free (as in use without charge) or they may have a cost structure (pay as you use). In this work we study the adoption of layered fog architecture to enhance sensing and actuating as a service delivery model using this proposed architecture model. Our main goal to provide multiple sensors and actuators composition options, with high data filtering rates and reduced response time. We propose a layered architecture with built-in fault resistance. We explain the various in context of the literature.
Uploads
Papers by Dr.Salman Abdul Moiz