4.6 Article

Semi-Supervised Deep Fuzzy C-Mean Clustering lefor Software Fault Prediction

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 25675-25685

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2835304

Keywords

Semi-supervised learning; fuzzy C-Mean clustering; feature learning; software fault prediction

Funding

  1. National Basic Research Program (973 Program) of China [2013CB329402]
  2. National Natural Science Foundation of China [61573267, 61473215, 61571342, 61572383, 61501353, 61502369, 61271302, 61272282, 61202176]
  3. Fund for Foreign Scholars in University Research and Teaching Programs (111 Project) [B07048]
  4. Major Research Plan of the National Natural Science Foundation of China [91438201, 91438103]

Ask authors/readers for more resources

Software fault prediction is a consequential research area in software quality promise. In this paper, we propose a semi-supervised deep fuzzy C-mean (DFCM) clustering for software fault prediction, which is the cumulation of semi-supervised DFCM clustering and feature compression techniques. Deep is utilized for the feature-based multi clusters of unlabeled and labeled data sets along with their labeled classes. In our approach, for the training model, we simultaneously deal with the unsupervised data and supervised data to exploit the obnubilated information from unlabeled data to labeled data to support the construction of the precise model. We utilize DFCM clustering to handle the class imbalance problem and withal fuzzy theory logic is very akin to human logic and it is facile to comprehend. We further ameliorate the prediction performance with the coalescence of feature learning techniques-feature extraction and feature selection (using random-under sampling) to generate good features and remove irrelevant and redundant features to reduce the noisy data for classification. However, by the performance of the model results, the amalgamation of deep multi clusters and feature techniques work better due to their ability to identify and amalgamation essential information in data feature. The classification model is predicted on the maximum homogeneous between the features of labeled and unlabeled data, the model is trained on the un-noisy data set obtained by the deep coalescence of multi clusters and feature techniques. To check the efficacy of our approach, we chose data sets from real-world software project (NASA & Eclipse), and then we compared our approach with a number of latest classical base-line methods, and investigate the performance by using performance measures such as probability of detection, F-measure, and area under the curve.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Chemistry, Multidisciplinary

Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks

Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Sultan Almotairi

Summary: This paper introduces a network architecture that utilizes the efficient technique of semi-supervised clustering to design an intrusion detection system. By observing users' responses inside and outside the cloud server, different rules and mechanisms are enforced to prevent attacks on the cloud server. The research conducts experiments in different scenarios and compares the results with other papers.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Multidisciplinary

A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission

Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Sultan Almotairi

Summary: This paper discusses cloud computing and data security, and proposes a secure architecture and algorithm implementation to prevent replay attacks.

APPLIED SCIENCES-BASEL (2022)

Review Chemistry, Multidisciplinary

A Comparison of Pooling Methods for Convolutional Neural Networks

Afia Zafar, Muhammad Aamir, Nazri Mohd Nawi, Ali Arshad, Saman Riaz, Abdulrahman Alruban, Ashit Kumar Dutta, Sultan Almotairi

Summary: This paper provides an understanding of the importance and role of pooling layers in convolutional neural networks (CNNs). Pooling layers reduce the resolution of feature maps, decrease spatial dimensions, minimize computational costs, and prevent overfitting.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Multidisciplinary

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Abdulrahman Alruban, Badr Almutairi, Sultan Almotairi

Summary: This paper investigates the issue of data protection in cloud computing, proposing an efficient encryption algorithm to enhance data security and address the challenge of attackers decrypting encrypted data. The research utilizes a two-layer encryption approach to improve data security. A comparison of different studies and technologies is conducted, leading to conclusions based on the results.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Multidisciplinary

Development of Security Rules and Mechanisms to Protect Data from Assaults

Syeda Wajiha Zahra, Ali Arshad, Muhammad Nadeem, Saman Riaz, Ashit Kumar Dutta, Zaid Alzaid, Rana Alabdan, Badr Almutairi, Sultan Almotairi

Summary: This paper presents the principles and methods of cloud cryptography, which protect data through bit-reversing and salting mechanisms, and encrypt data using Caesar cipher and cipher matrix algorithms. By comparing with other algorithms, it demonstrates the superiority of the proposed algorithm.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

Ali Arshad, Muhammad Nadeem, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Zaid Alzaid, Rana Alabdan, Badr Almutairi, Sultan Almotairi

Summary: There are techniques and algorithms available for detecting attacks on cloud data, but they cannot protect the data from attackers. Cloud cryptography provides a secure and reliable way to transmit data. This paper develops various data security techniques to completely protect data from attackers.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Computer Science, Information Systems

An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Moteeb Al Moteri, Sultan Almotairi

Summary: This paper presents an efficient algorithm to protect data from invaders and prevent data misuse. By converting plain text to ASCII and using a Non-Deterministic Bit Generator to generate a key, the key is XORed with the plain text and bitwise toggling is applied. Then, an efficient matrix cipher encryption algorithm is developed to encrypt the data. The key can only decrypt the data with the correct key, ensuring the data security.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Computer Science, Information Systems

Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Shahab S. Band, Amir Mosavi

Summary: Many organizations focus on protecting cloud servers from external attacks, but the majority of risks come from internal sources. While there are algorithms in place to safeguard against attacks, hackers constantly find ways to bypass these security measures. Cloud cryptography provides the best data protection algorithm for secure data exchange between authentic users.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Computer Science, Information Systems

Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

Muhammad Nadeem, Ali Arshad, Saman Riaz, SyedaWajiha Zahra, Muhammad Rashid, Shahab S. Band, Amir Mosavi

Summary: Cloud computing is an attractive and cost-saving model that offers online services to end-users, allowing them to access data from any node. However, cloud security is a major concern due to various malware attacks from internal and external sources. This paper proposes a tool that uses Cloudflare and K-nearest neighbors (KNN) classification to prevent spamming attacks on cloud servers. Cloudflare blocks attacker's IP addresses, while KNN classifiers identify the location of spammers. The article also discusses various prevention techniques, compares with other studies, and draws conclusions based on different results.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Computer Science, Information Systems

Deep Bimodal Fusion Approach for Apparent Personality Analysis

Saman Riaz, Ali Arshad, Shahab S. Band, Amir Mosavi

Summary: Personality is characterized by individuals' patterns of feeling, thinking, and behaving. Predicting personality from small video series is an exciting area of research in computer vision. Most existing research has achieved preliminary results in extracting extensive knowledge from visual and audio modalities. To address this limitation, the Deep Bimodal Fusion (DBF) approach is proposed, which predicts five traits of personality using a combination of visual and audio information. The proposed framework utilizes modified convolutional neural networks for visual analysis and employs long short-term memory models to analyze audio representations. By independently determining traits and combining them through weighted fusion, the proposed approach achieves a mean accuracy score of 0.9183, outperforming previous frameworks.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Article Computer Science, Information Systems

An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-II

Afia Zafar, Muhammad Aamir, Nazri Mohd Nawi, Ali Arshad, Saman Riaz, Abdulrahman Alruban, Ashit Kumar Dutta, Badr Almutairi, Sultan Almotairi

Summary: Convolutional neural networks are widely used in computer vision and have shown effectiveness in solving image processing problems. Designing the network structure for higher accuracy requires adjusting hyperparameters, which is time-consuming and requires domain knowledge. To overcome this, we propose an evolutionary algorithm-based approach that dynamically enhances the structure of CNNs using optimized hyperparameters, resulting in superior classification accuracy compared to previous methods.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Anomaly detection of high-dimensional sparse data based on Ensemble Generative Adversarial Networks

Wanghu Chen, Meilin Zhou, Chenhan Zhai, Mengyang Shen, Pengbo Lv, Ali Arshad

Summary: In this paper, the combination of Generative Adversarial Network (GAN) with Ensemble Learning is introduced for anomaly detection in high-dimensional sparse data. Experimental results show that this approach outperforms traditional GAN-based methods in improving AUC and compared favorably with other representative anomaly detection approaches.

2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) (2021)

Article Computer Science, Information Systems

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

Muhammad Nadeem, Ali Arshad, Saman Riaz, Shahab S. Band, Amir Mosavi

Summary: This article discusses the security issues of cloud computing and defense mechanisms, focusing on monitoring the attack rate of the network using an Intrusion Detection System, and providing various solutions to protect the cloud server from attacks.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A Semi-Supervised CNN With Fuzzy Rough C-Mean for Image Classification

Saman Riaz, Ali Arshad, Licheng Jiao

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Semi-Supervised Deep Fuzzy C-Mean Clustering for Imbalanced Mulit-Class Classification

Ali Arshad, Saman Riaz, Licheng Jiao

IEEE ACCESS (2019)

No Data Available