A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques

2019 ◽  
Vol 13 (1) ◽  
pp. 30-45
Author(s):  
Pratiksha Gautam ◽  
Hemraj Saini

Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.

2016 ◽  
Vol 18 (04) ◽  
pp. 15-19
Author(s):  
Sunayna Sunayna ◽  
Kamna Solanki ◽  
Sandeep Dalal ◽  
Sudhir Sudhir

2020 ◽  
Vol 28 (2) ◽  
pp. 298-318
Author(s):  
Roman Girma Teshome

The effectiveness of human rights adjudicative procedures partly, if not most importantly, hinges upon the adequacy of the remedies they grant and the implementation of those remedies. This assertion also holds water with regard to the international and regional monitoring bodies established to receive individual complaints related to economic, social and cultural rights (hereinafter ‘ESC rights’ or ‘socio-economic rights’). Remedies can serve two major functions: they are meant, first, to rectify the pecuniary and non-pecuniary damage sustained by the particular victim, and second, to resolve systematic problems existing in the state machinery in order to ensure the non-repetition of the act. Hence, the role of remedies is not confined to correcting the past but also shaping the future by providing reforming measures a state has to undertake. The adequacy of remedies awarded by international and regional human rights bodies is also assessed based on these two benchmarks. The present article examines these issues in relation to individual complaint procedures that deal with the violation of ESC rights, with particular reference to the case laws of the three jurisdictions selected for this work, i.e. the United Nations, Inter-American and African Human Rights Systems.


2016 ◽  
Vol 18 (3) ◽  
pp. 161-224
Author(s):  
ʿĀʾiḍ B. Sad Al-Dawsarī

The story of Lot is one of many shared by the Qur'an and the Torah, and Lot's offer of his two daughters to his people is presented in a similar way in the two books. This article compares the status of Lot in the Qur'an and Torah, and explores the moral dimensions of his character, and what scholars of the two religions make of this story. The significance of the episodes in which Lot offers his daughters to his people lies in the similarities and differences of the accounts given in the two books and the fact that, in both the past and the present, this story has presented moral problems and criticism has been leveled at Lot. Context is crucial in understanding this story, and exploration of the ways in which Lot and his people are presented is also useful in terms of comparative studies of the two scriptures. This article is divided into three sections: the first explores the depiction of Lot in the two texts, the second explores his moral limitations, and the third discusses the interpretations of various exegetes and scholars of the two books. Although there are similarities between the Qur'anic and Talmudic accounts of this episode, it is read differently by scholars from the two religions because of the different contexts of the respective accounts.


2020 ◽  
Vol 14 ◽  
Author(s):  
Meghna Dhalaria ◽  
Ekta Gandotra

Purpose: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on Android malware detection using machine learning and deep learning and identify the research gaps. It provides the insights obtained through literature and future research directions which could help researchers to come up with robust and accurate techniques for classification of Android malware. Design/Methodology/Approach: This paper provides a review of the basics of Android malware, its evolution timeline and detection techniques. It includes the tools and techniques for analyzing the Android malware statically and dynamically for extracting features and finally classifying these using machine learning and deep learning algorithms. Findings: The number of Android users is expanding very fast due to the popularity of Android devices. As a result, there are more risks to Android users due to the exponential growth of Android malware. On-going research aims to overcome the constraints of earlier approaches for malware detection. As the evolving malware are complex and sophisticated, earlier approaches like signature based and machine learning based are not able to identify these timely and accurately. The findings from the review shows various limitations of earlier techniques i.e. requires more detection time, high false positive and false negative rate, low accuracy in detecting sophisticated malware and less flexible. Originality/value: This paper provides a systematic and comprehensive review on the tools and techniques being employed for analysis, classification and identification of Android malicious applications. It includes the timeline of Android malware evolution, tools and techniques for analyzing these statically and dynamically for the purpose of extracting features and finally using these features for their detection and classification using machine learning and deep learning algorithms. On the basis of the detailed literature review, various research gaps are listed. The paper also provides future research directions and insights which could help researchers to come up with innovative and robust techniques for detecting and classifying the Android malware.


2020 ◽  
Author(s):  
Johann Johann And Devika

BACKGROUND Since November 2019, Covid - 19 has spread across the globe costing people their lives and countries their economic stability. The world has become more interconnected over the past few decades owing to globalisation and such pandemics as the Covid -19 are cons of that. This paper attempts to gain deeper understanding into the correlation between globalisation and pandemics. It is a descriptive analysis on how one of the factors that was responsible for the spread of this virus on a global scale is globalisation. OBJECTIVE - To understand the close relationship that globalisation and pandemics share. - To understand the scale of the spread of viruses on a global scale though a comparison between SARS and Covid -19. - To understand the sale of globalisation present during SARS and Covid - 19. METHODS A descriptive qualitative comparative analysis was used throughout this research. RESULTS Globalisation does play a significant role in the spread of pandemics on a global level. CONCLUSIONS - SARS and Covid - 19 were varied in terms of severity and spread. - The scale of globalisation was different during the time of SARS and Covid - 19. - Globalisation can be the reason for the faster spread in Pandemics.


Sign in / Sign up

Export Citation Format

Share Document