{"title":"Systematic Literature Review on Software Effort Estimation Using Machine Learning Approaches","authors":"P. Sharma, Jaiteg Singh","doi":"10.1109/ICNGCIS.2017.33","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.33","url":null,"abstract":"Accurate effort estimation is amongst the key activities in the software project development. It directly impacts the time and cost of the software projects. This paper presents a systematic literature review of software effort estimation techniques using machine learning. This review presents a discussion about the research trends in machine learning inspired software effort estimation. The results of the systematic review has concluded prominent trends of machine learning approaches, size metrics, benchmark datasets, validation methods etc. used for software effort estimation.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Clustering Algorithms and Their Comparative Performance Analysis on Different Data Set","authors":"Manish Lamba, Sagarjit Dash, Atul Singh Jamwal","doi":"10.1109/ICNGCIS.2017.39","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.39","url":null,"abstract":"K-means is the basic algorithm used for discovering clusters within a dataset. Methods to enhance the k-means clustering algorithm are discussed. With the help of these methods efficiency, accuracy, performance and computational time are improved. Some enhanced variations improve the efficiency and accuracy of the algorithm. Basically, in all the methods, the main aim is to reduce the number of iterations which will decrease the computational time. Studies show that K-means algorithm in clustering is widely used technique. Various enhancements done on k-mean are collected, so by using these enhancements, one can build a new hybrid algorithm which will be more efficient, accurate and less time consuming than the previous work.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Job Scheduling for Hadoop Mapreduce","authors":"Khushboo Kalia, N. Gupta","doi":"10.1109/ICNGCIS.2017.40","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.40","url":null,"abstract":"Hadoop is a distributed computing environment based on java which not only stores but also process the vast volume of data. It's HDFS (Hadoop Distributed File System) is for storing the data and analytics is done by MapReduce. MapReduce is an emerging paradigm for handling huge data sets using shared-nothing clusters. Lot of organizations have already adopted MapReduce for their analytics work. To boost the performance and utilization of the shared cluster, many scheduling mechanism are proposed by different authors. Many problems are faced during MapReduce jobs scheduling such as-locality, synchronization overhead, and fairness. Now, by introducing various scheduling issues concerned with locality, synchronization and fairness this paper surveys the various approaches to handle these problems. In addition, here evaluation of the various scheduling algorithms and for solving overhead during synchronization methods like asynchronous processing and speculative execution are also discussed.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130927043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Your Privacy is not so Private: Unveiling Android Apps Privacy Framework from the Dark","authors":"Sumit Kumar, Ravi Shanker","doi":"10.1109/ICNGCIS.2017.25","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.25","url":null,"abstract":"As the adoption of smartphones continues to surge all over the world, mobile apps have become a tool of greater significance, offering free access to everything ranging from social networking sites and emails to online banking transactions and ticket reservations. In any case, even free applications can include potential tradeoffs with regard to allowing access to private information of their users. This pattern has brought about expanding worries over the malicious nature of these apps and the security threats that these apps force upon its users. In this paper, we analyze the mobile apps privacy framework, its loopholes and survey the proposed tools and frameworks which primarily focuses on the effect of sensitive data leakage and privacy risks involved with it.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nitin Bhandari, Ritika Chowdri, Harmeet Singh, S. Qureshi
{"title":"Resolving Ambiguities in Named Entity Recognition Using Machine Learning","authors":"Nitin Bhandari, Ritika Chowdri, Harmeet Singh, S. Qureshi","doi":"10.1109/ICNGCIS.2017.24","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.24","url":null,"abstract":"In this paper, a named entity recognition model is proposed using data from Wikipedia. In every natural language, noun plays an important role. Named entity recognition is the process of identifying and tagging the proper noun in a text and then categorizing them on basis of names, location, product, and others. It has been performed in various languages using different approaches like rule-based, supervised or unsupervised learning. This paper presents a supervised learning algorithm which is used to train the classifier. Different combination rules are applied to the data to increase the performance of the model. Naive Bayes algorithm is also used to calculate the probability of different classes. The aim of this paper is to put forward a distinct approach and using these features analyze the performance measure of the system.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Next Generation Businesses to Embrace Big Data Analytics","authors":"N. Vishvakarma, Rrk Sharma, .. Krittika","doi":"10.1109/ICNGCIS.2017.19","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.19","url":null,"abstract":"In the context of growing global competition, business in new generation has become more challenging and required more insights to take effective decisions for organizational development. Big Data analytics (BDA) with their potential to ascertain value insights from the huge amount of data has enhanced the decision-making process. The purpose of this paper is to explore the possible use of big data analytics tools in the next generation of the business model. This paper examines the diverse dimensions of an organization development (OD) where BDA tool can be utilized. We use Thomas G. Cummings and Edgar F. Huse[1] framework to identify the dimensions(Human resource management, techno-structural, strategic and human processes) of organizational development.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized Algorithm For Efficient Problem Solving In K-MEANS Clustering","authors":"S. Qureshi, Sunali Y Mehta, Chaahat Gupta","doi":"10.1109/ICNGCIS.2017.13","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.13","url":null,"abstract":"K-means clustering is used to cluster numerical data. In K-means we define two measures of distances, between two data points (records) and the distance between two clusters. Distance can be measured (calculated) in a number of ways but four principles tend to hold true. This paper proposes an optimized algorithm for k-means clustering. We introduce genetic algorithm skilfully, on data sets to get an improvised and better results on the data over the existing ones. This algorithm overcomes the disadvantages of the already existing algorithms for obtaining efficient results. We experimentally demonstrate that our algorithm works correctly and can optimize data sets critically for better performance.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization in Cloud Computing: Developments and Trends","authors":"I. Odun-Ayo, Olasupo O. Ajayi, Chinonso Okereke","doi":"10.1109/ICNGCIS.2017.10","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.10","url":null,"abstract":"Cloud computing is an interesting paradigm that is making computing and other related activities easy for consumers. The cloud infrastructure is not new, but it is working on new technology based on various services offered. The cloud provides application software online for users to conduct common activities like word processing. Cloud computing also enables consumers to leverage on cloud infrastructure by designing and deploying their application on the cloud. A unique feature of the cloud is the provision of scalable storage for data which are usually spread across several geographical locations. A core technology used on the cloud is virtualization. This allows virtual machines to be hosted on physical servers. This provides great benefits to users on the cloud. This paper presents the state of the art from some literature available on cloud virtualisation. The study was executed by means of review of some literature available on cloud virtualisation. The study was performed by means of review of some literature using reliable methods. This paper examines present trends in the area of cloud virtualisation and provides a guide for future research. In the present work, the objective is to answer the following question: what is the current trend and development in cloud virtualisation? Papers published in journals, conferences, white papers and those published in reputable magazines were analysed. The expected result at the end of this review is the identification of trends in cloud virtualisation. This will be of benefit to prospective cloud users and even cloud providers.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Classification Based Approach For Data Confidentiality in Cloud Environment","authors":"Rasmeet Kour, Suparti Koul, Manpreet Kour","doi":"10.1109/ICNGCIS.2017.36","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.36","url":null,"abstract":"Data security in cloud computing is a hard and tiresome task that has not been completely achieved. Various techniques have been proposed for securing data in cloud. Data encryption is a widely used technique for securing the data in cloud. An accurate data security strategy in distributed computing can be decided by first understanding the security necessities of data followed by the selection of possible approach for securing the data. This will help in deciding which data needs to be secured and which not. This paper presents a data classification technique for data security in cloud environment. An improved bagging and boosting algorithm is employed for classifying the data into sensitive i.e. private and non sensitive i.e. public data. After the data is classified, blowfish algorithm is applied for securing the sensitive data and non sensitive data is sent to cloud without encryption, hence saving the overhead and time for securing the entire data. Moreover for upgrading a secure cloud system, the cloud is divided into segments thus dividing the data and storing it in different segments instead of storing the entire data on a single cloud. Thus this algorithm boosts the security on cloud system. Also the results show that improved bagging and boosting technique gives better results compared to K-NN classification algorithm thus reducing the classification time and enhancing the accuracy.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132710862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Industrial Study on Developers' Prevalent Copy and Paste Activities","authors":"Sarveshwar Bharti, Hardeep Singh","doi":"10.1109/ICNGCIS.2017.16","DOIUrl":"https://doi.org/10.1109/ICNGCIS.2017.16","url":null,"abstract":"Copy and then pasting code fragments is the most prevalent activity accomplished by the developers to reuse the available functionality. It has been empirically evidenced that this programming approach is one of the main reasons for code cloning in the software systems and thus needs to be managed. The literature mentions many tools that have been implemented to proactively manage clones while tracking this copy and paste activity inside IDEs. To have a better management tool, developer's behavior should be analyzed. To gather the knowledge about the programming practices, this paper presents results from an industrial survey conducted, involving professional developers, to understand the developer's copy and paste intentions. This work will shed a light on what programmers are doing while reusing code and why. This study reveals various reasons/intentions, extent, source etc. of the copy and paste activity done by the developer. This study reported the frequent use of this typical activity by the programmers so as not to reinvent the wheel and the negative impacts of this programming activity. And, finally, results suggest incorporating the functionality, inspired by the inference drawn from developers' behavior to the existing IDEs to manage the activities committed by the developer.","PeriodicalId":314733,"journal":{"name":"2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122688852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}