Current Issue : July - September Volume : 2021 Issue Number : 3 Articles : 5 Articles
,e log analysis-based system fault diagnosis method can help engineers analyze the fault events generated by the system. ,e Kmeans algorithm can perform log analysis well and does not require a lot of prior knowledge, but the K-means-based system fault diagnosis method needs to be improved in both efficiency and accuracy. To solve this problem, we propose a system fault diagnosis method based on a reclustering algorithm. First, we propose a log vectorization method based on the PV-DM language model to obtain low-dimensional log vectors which can provide effective data support for the subsequent fault diagnosis; then, we improve the K-means algorithm and make the effect of K-means algorithm based log clustering; finally, we propose a reclustering method based on keywords’ extraction to improve the accuracy of fault diagnosis. We use system log data generated by two supercomputers to verify our method. ,e experimental results show that compared with the traditional K-means method, our method can improve the accuracy of fault diagnosis while ensuring the efficiency of fault diagnosis....
Software metrics which are language-dependent are proposed as quantitative measures to assess internal quality factors for both method and class levels like cohesion and complexity. )e external quality factors like reliability and maintainability are in general predicted using different metrics of internal attributes. Literature review shows a lack of software metrics which are proposed for reliability measurement and prediction. In this context, a suite of four semantic language-independent metrics was proposed by Mili et al. (2014) to assess program redundancy using Shannon entropy measure. )e main objective of these metrics is to monitor program reliability. Despite their important purpose, they are manually computed and only theoretically validated. )erefore, this paper aims to assess the redundancy metrics and empirically validate them as significant reliability indicators. As software reliability is an external attribute that cannot be directly evaluated, we employ other measurable quality factors that represent direct reflections of this attribute. Among these factors, defect density is widely used to measure and predict software reliability based on software metrics. )erefore, a linear regression technique is used to show the usefulness of these metrics as significant indicators of software defect density. A quantitative model is then proposed to predict software defect density based on redundancy metrics in order to monitor software reliability....
In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the security of the entire system and raises many performance issues related to code security. The safety of information systems becomes essential. This is why the performance linked to security codes is of importance essential in the security systems of all companies. Indeed, as contribution, to carry out measurements, it appropriates tools that are the JMH tool (Java Microbenchmark Harness) and the PHP Benchmark script tool which include unsecure java and PHP codes and secured against SQL (Structured Query Language) injection, XSS (Cross Site Scripting) i.e. , using prepared requests, stored procedures, validation of input from white lists, reinforcement of minimum privilege, when sending requests from the last ones to MySQL databases and Postgresql. We recover the times of response to his requests.........................
An important aspect in any business process lifecycle is management of the performance, where performance requirements on business processes are specified as Key Performance Indicators (KPIs) with target values which are to be achieved in a certain analysis period. A KPI is a business metric used to measure and evaluate the individual capability, maturity, complexity, and agility of a business process in the development environment. *is study designed four general KPIs for the integration of SOA and scrum to bring further advancement in these approaches for IIoT. *e study also identified some common metrics which will give help to software developers and, especially, to those who want to apply SOA and scrum integration. *ese metrics will play a critical role of bridging the strategy and concepts of improvements with operational activities. *e identified KPIs will help to measure the business agility, quality and value, team efficiency, and complexity of scrum- and SOA based projects. Software development organizations can also practice these KPIs to know where to focus their resources to deliver the ultimate business profit. So, software business organizations could better align their business projects and IT investments with the rapid market change and deliveries....
Source code transformation is a way in which source code of a program is transformed by observing any operation for generating another or nearly the same program. -is is mostly performed in situations of piracy where the pirates want the ownership of the software program. Various approaches are being practiced for source code transformation and code obfuscation. Researchers tried to overcome the issue of modifying the source code and prevent it from the people who want to change the source code. Among the existing approaches, software birthmark was one of the approaches developed with the aim to detect software piracy that exists in the software. Various features are extracted from software which are collectively termed as “software birthmark.” Based on these extracted features, the piracy that exists in the software can be detected. Birthmarks are considered to insist on the source code and executable of certain programming languages. -e usability of software birthmark can protect software by any modification or changes and ultimately preserve the ownership of software. -e proposed study has used machine learning algorithms for classification of the usability of existing software birthmarks in terms of source code transformation. -e K-nearest neighbors (K-NN) algorithm was used for classification of the software birthmarks. For cross-validation, the algorithms of decision rules, decomposition tree, and LTF-C were used. -e experimental results show the effectiveness of the proposed research....
Loading....