C: Software & Data Engineering

C: Software & Data Engineering (217)

GJCST: C

Every year a large scale of students in Bangladesh enrol in different Universities in order to pursue higher studies. With the aim to build up a prosperous career these students begin their academic phase at the University with great expectation and enthusiasm. However among all these enthusiastic and hopeful bright students many seem to become successful in their academic career and fou...
Paper Information
Authors Dr. Linkon Chowdhury, Shahana Yeasmin
Read Journal Click Here
Read Paper Click Here
Page No. 55 to 63

We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and bring into being in an unconstitutional place (e.g., on the web or somebody’s laptop). The distributor must evaluate the likelihood that the leaked data came from one or more agents, as opposed to having been i...
Paper Information
Authors Sudheer Kumar Kotha, CH.S.V.V.S.N.Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

The paper is about the clustering on large numeric data sets using hierarchical method. In this BIRCH approach is used, to reduce the amount of data, for this a hierarchical clustering method was applied to pre-process the dataset. Now a day’s web information plays a prominent role in the web technology, large amount of data is consumed to communicate, but some with intr...
Paper Information
Authors D. Pramodh Krishna,Dr. A. Senguttuvan,T. Swarna Latha
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 32

It is very complex to write programs that behave accurately in the program verification tools. Automatic mining techniques suffer from 90–99% false positive rates, because manual specification writing is not easy. Because they can help with program testing, optimization, refactoring, documentation, and most importantly, debugging and repair. To concentrate on this proble...
Paper Information
Authors ShitalV. Tate, S. Z. Gawali
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

This paper presents an approach to classify remote sensed data using a hybrid classifier. Random forest, Support Vector machines and boosting methods are used to build the said hybrid classifier. The central idea is to subdivide the input data set into smaller subsets and classify individual subsets. The individual subset classification is done using support vector machines classifier. B...
Paper Information
Authors Tarun Rao, T.V.Rajinikanth
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 54

In software engineering, we have identified and described the model correspondence problem. To Describe system architecture and artifacts uses models and diagrams. Models contains series of versions. To understand how versions correspondence are difficult. So, we designed a framework based on Search and Ammolite algorithms, which can cardinally finds the correspondence software models. M...
Paper Information
Authors Dr. Sai Bharath Kadati, CH. Gouthami, K. K. Baseer, A. Rama Mohan Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 58

In this informative age, we find many documents are available in digital forms which need classification of the text. For solving this major problem present researchers focused on machine learning techniques: a general inductive process automatically builds a classifier by learning, from a set of pre classified documents, the characteristics of the categories. The main benefit of the pre...
Paper Information
Authors Durga Bhavani Dasari, Dr. Venu Gopala Rao. K
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 46

The research in the domain of knowledge representation and reasoning has always concentrated on the methods that give a good description in the domain where they are able to be used to construct intelligent applications. Description Logics are a family of languages of knowledge representation which can be used to represent knowledge of a field of applications by clear, formal and structu...
Paper Information
Authors Dr. F. Mamache
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35

In the data stream model the data arrive at high speed so that the algorithms used for mining the data streams must process them in very strict constraints of space and time. This raises new issues that need to be considered when developing association rule mining algorithms for data streams. So it is important to study the existing stream mining algorithms to open up the challenges and ...
Paper Information
Authors Mr. Pramod S. and O.P Vyas
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 30

This paper presents on domain feature modeling, domain architecture design and domain implementation in an enterprise. This paper demonstrates the accounting management feature modeling based on the extended (Feature-Oriented Domain Analysis) FODA method and system architecture of accounting management domain, integrates Aspect Object Oriented Programming technology with domain implement...
Paper Information
Authors Dr. Mukesh Kumar, Pro. (Dr.) Parveen Kumar, Seema
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 25