Intrusion detection systems classify computer activities into two main categories: normal and suspicious activities. In order to achieve the classification, Intrusion detection systems use software computing techniques including neural networks and neuro fuzzy networks to categorize network activities and specify what category of attack is being generated. Neuro-Fuzzy classifiers are used for the initial classification of the initial network traffic. An inference system, Fuzzy inference systems is further used to determine whether the activity is normal or malicious. Efficient IDS systems are those capable of reducing false positives and generate high rate attack detection. However, fuzzy inference systems use human knowledge to create their fuzzy rule. In order to introduce a more accurate way of classifying network traffic, we introduce the use of Genetic Algorithms in conjunction with ANFIS so as to optimize data classification and obtain the best results. Genetic algorithms use a set of genetic operators such as mutation, crossover and selection on current population to reproduce similar patterns that will be used repeatedly until a particular criterion is met.
{"title":"Training of intelligent intrusion detection system using neuro fuzzy","authors":"Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia","doi":"10.1109/SNPD.2014.6888688","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888688","url":null,"abstract":"Intrusion detection systems classify computer activities into two main categories: normal and suspicious activities. In order to achieve the classification, Intrusion detection systems use software computing techniques including neural networks and neuro fuzzy networks to categorize network activities and specify what category of attack is being generated. Neuro-Fuzzy classifiers are used for the initial classification of the initial network traffic. An inference system, Fuzzy inference systems is further used to determine whether the activity is normal or malicious. Efficient IDS systems are those capable of reducing false positives and generate high rate attack detection. However, fuzzy inference systems use human knowledge to create their fuzzy rule. In order to introduce a more accurate way of classifying network traffic, we introduce the use of Genetic Algorithms in conjunction with ANFIS so as to optimize data classification and obtain the best results. Genetic algorithms use a set of genetic operators such as mutation, crossover and selection on current population to reproduce similar patterns that will be used repeatedly until a particular criterion is met.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888693
Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi
The bootstrap provides a simple and powerful means of improving the accuracy of clustering. However, for today's increasingly large datasets, the computation of bootstrap-based quantities can be prohibitively demanding. In this paper we introduce the Bag of Little Bootstraps Clustering (BLBC), a new procedure which utilizes the Bag of Little Bootstraps technique to obtain a robust, computationally efficient means of clustering for massive data. Moreover, BLBC is suited to implementation on modern parallel and distributed computing architectures which are often used to process large datasets. We investigate empirically the performance characteristics of BLBC and compare to the performances of existing methods via experiments on simulated data and real data. The results show that BLBC has a significantly more favorable computational profile than the bootstrap based clustering while maintaining good statistical correctness.
自举提供了一种简单而强大的方法来提高聚类的准确性。然而,对于今天越来越大的数据集,基于自举的数量的计算可能要求过高。本文介绍了一种新的聚类方法BLBC (Bag of Little bootstrap Clustering),它利用Bag of Little bootstrap技术获得了一种鲁棒的、计算效率高的海量数据聚类方法。此外,BLBC适合在现代并行和分布式计算架构上实现,这些架构通常用于处理大型数据集。我们通过模拟数据和真实数据的实验,对BLBC的性能特点进行了实证研究,并对现有方法的性能进行了比较。结果表明,在保持良好的统计正确性的同时,BLBC具有明显优于基于自举的聚类的计算轮廓。
{"title":"Scalable bootstrap clustering for massive data","authors":"Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi","doi":"10.1109/SNPD.2014.6888693","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888693","url":null,"abstract":"The bootstrap provides a simple and powerful means of improving the accuracy of clustering. However, for today's increasingly large datasets, the computation of bootstrap-based quantities can be prohibitively demanding. In this paper we introduce the Bag of Little Bootstraps Clustering (BLBC), a new procedure which utilizes the Bag of Little Bootstraps technique to obtain a robust, computationally efficient means of clustering for massive data. Moreover, BLBC is suited to implementation on modern parallel and distributed computing architectures which are often used to process large datasets. We investigate empirically the performance characteristics of BLBC and compare to the performances of existing methods via experiments on simulated data and real data. The results show that BLBC has a significantly more favorable computational profile than the bootstrap based clustering while maintaining good statistical correctness.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888707
Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui
In the recent years, the Graphics Processing Units (GPUs) have gained popularity for general purpose applications, immensely outperforming traditional optimized CPU based implementations. A class of such applications implemented on GPUs to achieve faster execution than CPUs include cryptographic techniques like the Advanced Encryption Standard (AES) which is a widely deployed symmetric encryption/decryption scheme in various electronic communication domains. With the drastic advancements in electronic communication technology, and growth in the user space, the size of data exchanged electronically has increased substantially. So, such cryptographic techniques become a bottleneck to fast transfers of information. In this work, we implement the AES-128 ECB Encryption on two of the recent and advanced GPUs (NVIDIA Quadro FX 7000 and Tesla K20c) with different memory usage schemes and varying input plaintext sizes and patterns. We obtained a speedup of up to 87x against an advanced CPU (Intel Xeon X5690) based implementation. Moreover, our experiments reveal that the different degrees of pattern repetitions in input plaintext affect the encryption performance on GPU.
近年来,图形处理单元(gpu)在通用应用程序中越来越受欢迎,其性能大大优于传统的基于CPU的优化实现。在gpu上实现的一类此类应用程序可以实现比cpu更快的执行速度,包括加密技术,如高级加密标准(AES),这是在各种电子通信领域广泛部署的对称加密/解密方案。随着电子通信技术的飞速发展和用户空间的扩大,以电子方式交换的数据量大大增加。因此,这种加密技术成为信息快速传输的瓶颈。在这项工作中,我们在两种最新和先进的gpu (NVIDIA Quadro FX 7000和Tesla K20c)上实现了AES-128 ECB加密,这些gpu具有不同的内存使用方案和不同的输入明文大小和模式。对于基于高级CPU (Intel Xeon X5690)的实现,我们获得了高达87x的加速。此外,我们的实验表明,输入明文中不同程度的模式重复会影响GPU上的加密性能。
{"title":"AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance","authors":"Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui","doi":"10.1109/SNPD.2014.6888707","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888707","url":null,"abstract":"In the recent years, the Graphics Processing Units (GPUs) have gained popularity for general purpose applications, immensely outperforming traditional optimized CPU based implementations. A class of such applications implemented on GPUs to achieve faster execution than CPUs include cryptographic techniques like the Advanced Encryption Standard (AES) which is a widely deployed symmetric encryption/decryption scheme in various electronic communication domains. With the drastic advancements in electronic communication technology, and growth in the user space, the size of data exchanged electronically has increased substantially. So, such cryptographic techniques become a bottleneck to fast transfers of information. In this work, we implement the AES-128 ECB Encryption on two of the recent and advanced GPUs (NVIDIA Quadro FX 7000 and Tesla K20c) with different memory usage schemes and varying input plaintext sizes and patterns. We obtained a speedup of up to 87x against an advanced CPU (Intel Xeon X5690) based implementation. Moreover, our experiments reveal that the different degrees of pattern repetitions in input plaintext affect the encryption performance on GPU.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the globally recognized advantages of e-invoicing and various efforts to implement such systems, retailers and stores may still have difficulties in promoting purely paperless e-invoices due to the lack of a convenient and secure way for consumers to receive and retrieve the e-invoices. As such, paper-based invoices may still be issued along with e-invoices, contradicting an important benefit of e-invoicing - paper consumption reduction. Thanks to the advances in smart phones and Near Field Communication (NFC) technologies, e-invoices can be delivered via NFC-enabled smartpones, allowing consumers to examine the content immediately after transactions and to easily retrieve them later on. Still, an extra security mechanism is needed to ensure the integrity and non-repudiation of the content, as invoices may bear some value and thus become the target of a security attack. In this paper, we propose a secure NFC-based e-invoice remitting scheme using standard NFC P2P communications, and discuss how it fulfills major security requirements, including authenticity, integrity, and non-repudiation. The proposed system is also implemented and tested in Taiwan's e-invoicing system.
{"title":"Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices","authors":"Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng","doi":"10.1109/SNPD.2014.6888705","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888705","url":null,"abstract":"Despite the globally recognized advantages of e-invoicing and various efforts to implement such systems, retailers and stores may still have difficulties in promoting purely paperless e-invoices due to the lack of a convenient and secure way for consumers to receive and retrieve the e-invoices. As such, paper-based invoices may still be issued along with e-invoices, contradicting an important benefit of e-invoicing - paper consumption reduction. Thanks to the advances in smart phones and Near Field Communication (NFC) technologies, e-invoices can be delivered via NFC-enabled smartpones, allowing consumers to examine the content immediately after transactions and to easily retrieve them later on. Still, an extra security mechanism is needed to ensure the integrity and non-repudiation of the content, as invoices may bear some value and thus become the target of a security attack. In this paper, we propose a secure NFC-based e-invoice remitting scheme using standard NFC P2P communications, and discuss how it fulfills major security requirements, including authenticity, integrity, and non-repudiation. The proposed system is also implemented and tested in Taiwan's e-invoicing system.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888722
M. Iwashita, T. Kurosawa, A. Inoue, K. Nishimatsu
ICT infrastructures such as wired/wireless information networks are poised to play an important role in meeting these demands, and there is an urgent need to facilitate nationwide ICT infrastructure immediately. Since installation of such ICT infrastructures takes a large amount of time and expenditure, the selection of installation area is an important issue. Low-usage facilities can cause huge problems for businesses in terms of investment efficiency, and it takes time to select areas because we need to consider how to estimate the potential demand and how to diffuse the installation for thousands of municipal areas across the nation. This paper evaluates the micro area selection method which is previously proposed with ICT infrastructure propagating based on commuting flows. A comparison with the performance of a WiMAX service currently in use for several areas induces the improved method.
{"title":"An improvement of micro area selection technique for the diffusion of ICT infrastructure","authors":"M. Iwashita, T. Kurosawa, A. Inoue, K. Nishimatsu","doi":"10.1109/SNPD.2014.6888722","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888722","url":null,"abstract":"ICT infrastructures such as wired/wireless information networks are poised to play an important role in meeting these demands, and there is an urgent need to facilitate nationwide ICT infrastructure immediately. Since installation of such ICT infrastructures takes a large amount of time and expenditure, the selection of installation area is an important issue. Low-usage facilities can cause huge problems for businesses in terms of investment efficiency, and it takes time to select areas because we need to consider how to estimate the potential demand and how to diffuse the installation for thousands of municipal areas across the nation. This paper evaluates the micro area selection method which is previously proposed with ICT infrastructure propagating based on commuting flows. A comparison with the performance of a WiMAX service currently in use for several areas induces the improved method.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888677
Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri
During the past decade, the advent of the social network has offered several platforms that promote communication among users on common spaces. Several efforts were devoted to unify the social network domain, particularly the scientific domain through introducing ontology-based modeling of scientific social network. However, the measurement of the researchers standings within the scientific community is generally absent. To overcome this drawback, we propose, in this paper, a scientific social network ontology which includes definitions of main entities and describes main attributes of : Scientific social network concepts aiming to share common understanding of this domain and to reflect the academic career paths.
{"title":"ONTOSSN: Scientific social network ontology","authors":"Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri","doi":"10.1109/SNPD.2014.6888677","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888677","url":null,"abstract":"During the past decade, the advent of the social network has offered several platforms that promote communication among users on common spaces. Several efforts were devoted to unify the social network domain, particularly the scientific domain through introducing ontology-based modeling of scientific social network. However, the measurement of the researchers standings within the scientific community is generally absent. To overcome this drawback, we propose, in this paper, a scientific social network ontology which includes definitions of main entities and describes main attributes of : Scientific social network concepts aiming to share common understanding of this domain and to reflect the academic career paths.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888738
Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa
As aging society problem goes severe, systems to confirm to safety of elders in daily life are expected to relieve burdensome safety confirmation tasks of care workers. In this paper, a sensor, which detects person localization without privacy offending, applying Obrid-Sensor is proposed. In the proposed design, the Obrid-Sensor is constructed with a line sensor and a slit to obtain one-dimensional brightness distribution. The proposed sensor is able to obtain one-dimensional brightness distribution that is approximately equal to integration value of each vertical pixel line of two-dimensional image. Meanwhile, the novel slit type Obrid-Sensor, which was constructed without Rod lens, is studied in this research. By employing the proposed sensor, the information of a subject's position and motion can be obtained without using two-dimensional texture image. The effectiveness of the proposed method is confirmed by experiments.
{"title":"Detection range fitting of slit type Obrid-Sensor","authors":"Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa","doi":"10.1109/SNPD.2014.6888738","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888738","url":null,"abstract":"As aging society problem goes severe, systems to confirm to safety of elders in daily life are expected to relieve burdensome safety confirmation tasks of care workers. In this paper, a sensor, which detects person localization without privacy offending, applying Obrid-Sensor is proposed. In the proposed design, the Obrid-Sensor is constructed with a line sensor and a slit to obtain one-dimensional brightness distribution. The proposed sensor is able to obtain one-dimensional brightness distribution that is approximately equal to integration value of each vertical pixel line of two-dimensional image. Meanwhile, the novel slit type Obrid-Sensor, which was constructed without Rod lens, is studied in this research. By employing the proposed sensor, the information of a subject's position and motion can be obtained without using two-dimensional texture image. The effectiveness of the proposed method is confirmed by experiments.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125604292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888717
Xiaofeng Cui, R. Paige
The ultimate aim of business/mission software is to help implement the business value or mission imperatives. For critical business/mission applications, high-level strategies need to play a crucial role in the development and validation of software requirement, so that the requirements and the produced software can closely align with the business/mission objectives and effectively contribute to the business/mission success. In this paper, we propose a strategy-guided method for the development and validation of requirements. We firstly articulate the dimensions of strategy and concept model for connecting strategies and requirements. We then present the approaches for the requirements development and validation, based on the relationship between the elements of strategies and requirements. This strategy-guided method addresses the paradigms for both the market-oriented and customer-specific software development. We also give an example illustrating the strategy perspectives and the resulting requirements.
{"title":"Strategy-guided requirements development and validation","authors":"Xiaofeng Cui, R. Paige","doi":"10.1109/SNPD.2014.6888717","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888717","url":null,"abstract":"The ultimate aim of business/mission software is to help implement the business value or mission imperatives. For critical business/mission applications, high-level strategies need to play a crucial role in the development and validation of software requirement, so that the requirements and the produced software can closely align with the business/mission objectives and effectively contribute to the business/mission success. In this paper, we propose a strategy-guided method for the development and validation of requirements. We firstly articulate the dimensions of strategy and concept model for connecting strategies and requirements. We then present the approaches for the requirements development and validation, based on the relationship between the elements of strategies and requirements. This strategy-guided method addresses the paradigms for both the market-oriented and customer-specific software development. We also give an example illustrating the strategy perspectives and the resulting requirements.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888726
Kazumasa Fukuda, Haruaki Tamada
This paper proposes an obfuscation method against illegal analysis. The proposed method tries to build a fake call flow graph from debugging tools. The call flow graph represents relations among methods, and helps understanding of a program. The fake call flow graph leads misunderstanding of the program. We focus on a hook mechanism of the method call for changing a callee. We conduct two experiments to evaluate the proposed method. First experiment simulates attacks by existing tools: Soot, jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second experiment evaluates understandability of the obfuscated program by the hand. Only one subject in the nine subjects answered the correct value. The experiments shows the proposed method has good tolerance against existing tools, and high difficulty of understanding even if the target program is tiny and simple program.
{"title":"An obfuscation method to build a fake call flow graph by hooking method calls","authors":"Kazumasa Fukuda, Haruaki Tamada","doi":"10.1109/SNPD.2014.6888726","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888726","url":null,"abstract":"This paper proposes an obfuscation method against illegal analysis. The proposed method tries to build a fake call flow graph from debugging tools. The call flow graph represents relations among methods, and helps understanding of a program. The fake call flow graph leads misunderstanding of the program. We focus on a hook mechanism of the method call for changing a callee. We conduct two experiments to evaluate the proposed method. First experiment simulates attacks by existing tools: Soot, jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second experiment evaluates understandability of the obfuscated program by the hand. Only one subject in the nine subjects answered the correct value. The experiments shows the proposed method has good tolerance against existing tools, and high difficulty of understanding even if the target program is tiny and simple program.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/SNPD.2014.6888690
Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña
Context: Productivity management of software developers is a challenge in Information and Communication Technology. Predictions of productivity can be useful to determine corrective actions and to assist managers in evaluating improvement alternatives. Productivity prediction models have been based on statistical regressions, statistical time series, fuzzy logic, and machine learning. Goal: To propose a machine learning model termed general regression neural network (GRNN) for predicting the productivity of software practitioners. Hypothesis: Prediction accuracy of a GRNN is better than a statistical regression model when these two models are applied for predicting productivity of software practitioners who have individually developed their software projects. Method: A sample obtained from 396 software projects developed between the years 2005 and 2011 by 99 practitioners was used for training the models, whereas a sample of 60 projects developed by 15 practitioners in the first months of 2012 was used for testing the models. All projects were developed based upon a disciplined development process within a controlled environment. The accuracy of the GRNN was compared against that of a multiple regression model (MLR). The criteria for evaluating the accuracy of these two models were the Magnitude of Error Relative to the estimate and a t-paired statistical test. Results: Prediction accuracy of an GRNN was statistically better than that of an MLR model at the 99% confidence level. Conclusion: An GRNN could be applied for predicting the productivity of practitioners when New and Changed lines of code, reused code, and programming language experience of practitioners are used as independent variables.
{"title":"A machine learning technique for predicting the productivity of practitioners from individually developed software projects","authors":"Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña","doi":"10.1109/SNPD.2014.6888690","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888690","url":null,"abstract":"Context: Productivity management of software developers is a challenge in Information and Communication Technology. Predictions of productivity can be useful to determine corrective actions and to assist managers in evaluating improvement alternatives. Productivity prediction models have been based on statistical regressions, statistical time series, fuzzy logic, and machine learning. Goal: To propose a machine learning model termed general regression neural network (GRNN) for predicting the productivity of software practitioners. Hypothesis: Prediction accuracy of a GRNN is better than a statistical regression model when these two models are applied for predicting productivity of software practitioners who have individually developed their software projects. Method: A sample obtained from 396 software projects developed between the years 2005 and 2011 by 99 practitioners was used for training the models, whereas a sample of 60 projects developed by 15 practitioners in the first months of 2012 was used for testing the models. All projects were developed based upon a disciplined development process within a controlled environment. The accuracy of the GRNN was compared against that of a multiple regression model (MLR). The criteria for evaluating the accuracy of these two models were the Magnitude of Error Relative to the estimate and a t-paired statistical test. Results: Prediction accuracy of an GRNN was statistically better than that of an MLR model at the 99% confidence level. Conclusion: An GRNN could be applied for predicting the productivity of practitioners when New and Changed lines of code, reused code, and programming language experience of practitioners are used as independent variables.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}