Published: Aug 11, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa1
Volume 11
Deepa Bura, Amit Choudhary
Software plays an important role in effective computing and communication of any services. It become crucial to identify some critical parts of the software that can lead to enhanced computing and...
Show More
Software plays an important role in effective computing and communication of any services. It become crucial to identify some critical parts of the software that can lead to enhanced computing and increases efficiency of the software. Dependency plays a significant role in finding relationship amongst classes and predicting change prone classes. This paper aims to enhance Behavioral Dependency by defining 6 types of dependencies amongst classes. These are (i) direct behavioral dependency (ii) indirect behavioral dependency (iii) internal behavioral dependency (iv) external behavioral dependency (v) indirect internal behavioral dependency and (vi) Indirect External Behavioral Dependency. Evaluating these dependencies, gives accurate results for the prediction of change prone classes. Further, paper compares proposed approach with existing methods.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bura, Deepa, and Amit Choudhary. "Enhancing Behavioral Dependency for Effective Computing in Software." IJSDA vol.11, no.2 2022: pp.1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
APA
Bura, D. & Choudhary, A. (2022). Enhancing Behavioral Dependency for Effective Computing in Software. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
Chicago
Bura, Deepa, and Amit Choudhary. "Enhancing Behavioral Dependency for Effective Computing in Software," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
Export Reference
Published: Jul 29, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa2
Volume 11
Abha Jain, Ankita Bansal
The need of the customers to be connected to the network at all times has led to the evolution of mobile technology. Operating systems play a vitol role when we talk of technology. Nowadays, Android...
Show More
The need of the customers to be connected to the network at all times has led to the evolution of mobile technology. Operating systems play a vitol role when we talk of technology. Nowadays, Android is one of the popularly used operating system in mobile phones. Authors have analysed three stable versions of Android, 6.0, 7.0 and 8.0. Incorporating a change in the version after it is released requires a lot of rework and thus huge amount of costs are incurred. In this paper, the aim is to reduce this rework by identifying certain parts of a version during early phase of development which need careful attention. Machine learning prediction models are developed to identify the parts which are more prone to changes. The accuracy of such models should be high as the developers heavily rely on them. The high dimensionality of the dataset may hamper the accuracy of the models. Thus, the authors explore four dimensionality reduction techniques, which are unexplored in the field of network and communication. The results concluded that the accuracy improves after reducing the features.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jain, Abha, and Ankita Bansal. "Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology." IJSDA vol.11, no.2 2022: pp.1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
APA
Jain, A. & Bansal, A. (2022). Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
Chicago
Jain, Abha, and Ankita Bansal. "Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
Export Reference
Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa3
Volume 11
Deena Nath Gupta, Rajendra Kumar
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints....
Show More
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in large amount to collect the relevant data in an IoT environment, and different sensor devices transmit these data as useful information, the first thing needs to be secure is the identity of devices. The second most important thing is the reliable information transmission between a sensor node and a sink node. While designing the cryptographic method in the IoT environment, programmers need to keep in mind the power limitation of the constraint devices. Mutual authentication between devices and encryption-decryption of messages need some sort of secure key. In the proposed cryptographic environment, there will be a hierarchical clustering, and devices will get registered by the authentication center at the time they enter the cluster. The devices will get mutually authenticated before initiating any conversation and will have to follow the public key protocol.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gupta, Deena Nath, and Rajendra Kumar. "Multi-Layer and Clustering-Based Security Implementation for an IoT Environment." IJSDA vol.11, no.2 2022: pp.1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
APA
Gupta, D. N. & Kumar, R. (2022). Multi-Layer and Clustering-Based Security Implementation for an IoT Environment. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
Chicago
Gupta, Deena Nath, and Rajendra Kumar. "Multi-Layer and Clustering-Based Security Implementation for an IoT Environment," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
Export Reference
Published: Aug 26, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa4
Volume 11
Shailja Gupta, Manpreet Kaur, Sachin Lakra
In the recent times transfer learning models have known to exhibited good results in the area of text classification for question-answering, summarization, next word prediction but these learning...
Show More
In the recent times transfer learning models have known to exhibited good results in the area of text classification for question-answering, summarization, next word prediction but these learning models have not been extensively used for the problem of hate speech detection yet. We anticipate that these networks may give better results in another task of text classification i.e. hate speech detection. This paper introduces a novel method of hate speech detection based on the concept of attention networks using the BERT attention model. We have conducted exhaustive experiments and evaluation over publicly available datasets using various evaluation metrics (precision, recall and F1 score). We show that our model outperforms all the state-of-the-art methods by almost 4%. We have also discussed in detail the technical challenges faced during the implementation of the proposed model.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gupta, Shailja, et al. "BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder." IJSDA vol.11, no.2 2022: pp.1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
APA
Gupta, S., Kaur, M., & Lakra, S. (2022). BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
Chicago
Gupta, Shailja, Manpreet Kaur, and Sachin Lakra. "BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
Export Reference
Published: Aug 11, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa5
Volume 11
Ravindra Kumar Singh, Harsh Kumar Verma
Twitter has gained a significant prevalence among the users across the numerous domains, in the majority of the countries, and among different age groups. It servers a real-time micro-blogging...
Show More
Twitter has gained a significant prevalence among the users across the numerous domains, in the majority of the countries, and among different age groups. It servers a real-time micro-blogging service for communication and opinion sharing. Twitter is sharing its data for research and study purposes by exposing open APIs that make it the most suitable source of data for social media analytics. Applying data mining and machine learning techniques on tweets is gaining more and more interest. The most prominent enigma in social media analytics is to automatically identify and rank influencers. This research is aimed to detect the user's topics of interest in social media and rank them based on specific topics, domains, etc. Few hybrid parameters are also distinguished in this research based on the post's content, post’s metadata, user’s profile, and user's network feature to capture different aspects of being influential and used in the ranking algorithm. Results concluded that the proposed approach is well effective in both the classification and ranking of individuals in a cluster.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Singh, Ravindra Kumar, and Harsh Kumar Verma. "User Activity Classification and Domain-Wise Ranking Through Social Interactions." IJSDA vol.11, no.2 2022: pp.1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
APA
Singh, R. K. & Verma, H. K. (2022). User Activity Classification and Domain-Wise Ranking Through Social Interactions. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
Chicago
Singh, Ravindra Kumar, and Harsh Kumar Verma. "User Activity Classification and Domain-Wise Ranking Through Social Interactions," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
Export Reference
Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa6
Volume 11
Aruna Malik, Rajeev Kumar
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently...
Show More
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication between the sender and receiver. In this paper, we propose a Robust RDH scheme using IPVO based pairwise embedding. The proposed scheme is designed to prevent unintentional modifications caused to the secret data by JPEG compression. The cover image is decomposed into two planes namely HSB plane and LSB plane. As JPEG compression most likely modifies the LSBs of the cover image during compression, it is best not to hide the secret data into LSB planes. So, the proposed method utilizes a pairwise embedding to embed secret data into HSB plane of the cover image. High fidelity improved pixel value ordering (IPVO) based pairwise embedding ensures that the embedding performance of the proposed method is improved.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Malik, Aruna, and Rajeev Kumar. "Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication." IJSDA vol.11, no.2 2022: pp.1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
APA
Malik, A. & Kumar, R. (2022). Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
Chicago
Malik, Aruna, and Rajeev Kumar. "Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSDA should be directed to the attention of:
Submission-Related InquiriesProf. Ahmad Taher Azar
Editor-in-Chief
International Journal of System Dynamics Applications (IJSDA)
E-mails:
aazar@igi-global.com
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100