5 research outputs found

    An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning

    Get PDF
    The reliability and quality of software programs remains to be an important and challenging aspect of software design. Software developers and system operators spend huge time on assessing and overcoming expected and unexpected errors that might affect the users’ experience negatively. One of the major concerns in developing software problems is the bug reports, which contains the severity and priority of these defects. For a long time, this task was performed manually with huge effort and time consumptions by system operators. Therefore, in this paper, we present a novel automatic assessment tool using Machine Learning algorithms, for assessing bugs’ reports based on several features such as hardware, product, assignee, OS, component, target milestone, votes, and versions.  The aim is to build a tool that automatically classifies software bugs according to the severity and priority of the bugs and makes predictions based on the most representative features and bug report text. To perform this task, we used the Multi-Nominal Naive Bayes, Random Forests Classifier, Bagging, Ada Boosting, SVC, KNN, and Linear SVM Classifiers and Natural Language Processing techniques to analyze the Eclipse dataset. The approach shows promising results for software bugs’ detection and prediction

    Detection of Americans’ Behavior toward Islam on Facebook

    Get PDF
    Social network websites have become a rich place for detecting and analyzing people’s attitudes, perceptions, and feelings towards news, products,  and other real-world issues. Facebook is a popular platform among different age groups and countries and is generally used to convey ideas about certain topics based on likes, comments and sharing. In recent years, one of the most controversial topics were the idea behind Islamophobia and other ideas built in people’s minds about Islam around the world. This research studied the public opinion of American citizens about Islam during the presidency of Donald Trump, as that period was rich in diversity of opinion between his supporters and detractors. In this paper, sentiment analysis was used to analyze American citizens’ behavior towards posts about Islam during Trump’s presidency in various states across the United States. Sentiment analysis was performed on Facebook posts and comments extracted from American news channels from the year 2017. Several machine learning methods were used to detect the polarity in the dataset. The highest classification accuracy among the classifiers used in this research was achieved using a logistic regression classifier, reaching 84%

    Dynamic authentication for intelligent sensor clouds in the Internet of Things

    No full text
    Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory Information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms’ ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol’s design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems
    corecore