The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer software size continues to grow recently. But it is difficult to collect information to support software development and maintenances. Data mining technology can be used to automatically discover knowledge from software testing data. It is helpful to increase software developing process and improve software quality. At first, correlation analysis is adopted to study the relevance among the...
Twitter is a widely used social network. Previous research showed that users engage in Twitter to communicate about software applications via short messages, referred to as tweets, and that some of these tweets are relevant for software evolution. However, a manual analysis is impractical due to the large number of tweets – in the range of thousands per day for popular apps. In this work we present...
Software projects are getting more complex and thus it is very difficult for the companies to develop their projects alone. There are multiple heterogeneous systems which are different by multiple perspectives such as different users functionalities delivered different CASE tools, technology adopted for software development, and different platform used for deployment. Thus heterogeneous systems are...
Object-oriented design patterns are frequently used in real-world applications. Detection of design patterns is essential for comprehension of the intent and design of a software project. This paper presents a graph-mining approach for detecting design patterns. Our approach is based on searching input design patterns in the space of model graph of the source code by isomorphic sub-graph search method...
Business process mining or process mining is the intersection between data mining and business process modelling that extracts business patterns from event logs. Event logs are freely available in any organization. Business logs are a potential source of useful information. By the various patterns that are present in the logs, a lot can be estimated about the type of procedures that should be incorporated...
Recently frequent and sequential pattern mining algorithms have been widely used in the field of software engineering to mine various source code or specification patterns. In practice software evolves from one version to another is needed for providing extra facilities to user. This kind of task is challenging in this domain since the database is usually updated in all kinds of manners such as insertion,...
Unified Modeling Language (UML) is widely applied and emerging in software testing area. One of the UML model is sequence diagram. Current researcher required a few of software in order to generate test cases. This software is needed in order to draw the sequence diagram, translate the diagram and generate the test cases. Test cases contain input and expected output of certain scenario in the system...
In a scientific research network, to determine the influence of an academic research, a key is to build and evaluate properties of its cited references or co-author networks. To analyze 18,000 lines of original data from Problem C given in 2014 MCM/ICM (Mathematical Contest In Modeling /Interdisciplinary Contest In Modeling), the Pajek software was used with obtaining a result that correlations among...
Data mining is a powerful new technology and is an important area of science and engineering. In this paper show that the comparing results using bagging, stacking and random subspace algorithms on forest fire data set in to WEKA data mining suite. We compare better results of these methods and improve classification accuracy. Performance results show that the classifiers built. These classifiers...
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The main risk factors associated with a software defect which is not detected during the early phase of its development are cost and effort. Thus the main intention of any organization is to identify and rectify the defects...
Present day scenario shows a drastic increase in the growth of the malware. According to Kaspersky Security Lab report, India ranks seventh in offline threats and ninth in online threats caused by malware, among top ten countries of the world. Advancement in the evasion techniques like code obfuscation, packing, encryption or polymorphism help malware writers to avoid detection of their malwares by...
Graph mining is an important research area within the domain of data mining. One of the most challenging tasks of graph mining is frequent subgraph mining. This work presents the first FPGA-based implementation, to the best of our knowledge, of the most efficient and well-known algorithm for the Frequent Subgraph Mining (FSM) problem, i.e. gSpan. The proposed system, named High Performance Computing-gSpan...
With the rapid development of software technology and open source projects, software industry becomes more and more threatened by software piracy. As an excellent detection technique of software piracy, software birthmark, which can describe the unique characteristic of a program, has obtained more and more attention. In this paper, we propose a software birthmark called SCDG-DDGB (System Call Dependence...
The great volume of information is currently a reality. Processing these data, mainly in institutions with a great capacity of processing, is carried out by means of mainframes that are capable of performing operations at a great speed and on an extremely large volume of data in the Big Data age. Indirect methods of gauging the usage of software installed in the mainframe environment are used to measure...
In the process of software evolution, software change information can help software developers and system analysts to get a better understanding of differential part of software. In this paper, we construct different versions of source code into abstract syntax trees, and use an improved tree matching algorithm which combines multiple string matching algorithms, bilateral best match strategy and predicate...
In the process of automatic test case generation in the function call path test, it is important to analysis information of control flow in program, draw the function call graph, and extract control conditions and variables in conditions. However variables in conditions are always not the same as variables in test cases, so it ca't generate accurate and effective test cases for just extracting function...
Aspect mining is a growing area of research investigating the effective ways of finding crosscutting concerns in existing non-aspect oriented software. Once found, these concerns can be refactored into aspects, which in turn, reduce the system's complexity and make it easier to understand, maintain, and evolve. There are numerous studies that have defined new aspect mining techniques and used case...
We propose intensity constraint-based closed sequential pattern mining algorithm, called IC-BIDE, for a coding pattern extraction. Source code often contains frequent patterns of function calls or control flows, i.e., "coding patterns." Previous studies used sequential pattern mining to extract coding pattern, however, these algorithms have not been optimized for coding pattern extraction,...
Software systems intensively depend on external libraries, chosen at conception time. However, relevance of any library irremediably changes during projects and/or library life cycle. As a consequence, projects developers must periodically reconsider the libraries they depend on, and must think about library migration. When they want to migrate their libraries, they then have to identify candidate...
In recent decades the production of large software projects are very large and is costly and time consuming during the phases of software development there are some bugs. Some of the errors generated by the software to detect errors in the initial is phases these errors and may not be seen until the final phases. To clear this error may be the next generation of software. Time and expense of producing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.