INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of vertices and edges. Finding the frequent data sets is the major step in the software architecture recovery. Many algorithms are proposed in this context, for example Apriori based. In this paper to find the frequent data sets and a maximum association between the graphs we used an fficient algorithm called SPIN (Spanning tree based Maximal Graph Mining Technique). The results have shown tha our proposed Graph mining technique is more efficient in recovering the oftware Architecture
Authors and Affiliations
Shaheda Akthar , Sk. Md. Rafi
AN EFFECTIVE RETRIVAL SCHEME FOR SOFTWARE COMPONENT REUSE
Software component reuse has become of much interest in the software community due to its potential benefits, cost benefit, time saving, etc. which include increased product quality and decreased product development cost...
Performance Evaluation of CPU-GPU communication Depending on the Characteristic of Co-Located Workloads
Todays, there are many studies in complicated computation and big data processing by using the high performance computability of GPU. Tesla K20X recently announced by NVIDIA provides 3.95 TFLOPS in precision floating poi...
Feature Extraction in Medical Image using Ant Colony Optimization : A Study
The front end of most vision systems consists of an edge detection as preprocessing. The vision of objects is easy for the human because of the natural intelligence of segmenting, pattern matching and recognizing very co...
Ultrasonic Sensor Based 3D Mapping & Localization
This article provides a basic level introduction to 3D mapping using sonar sensors and localization. It describes the methods used to construct a low-cost autonomous robot along with the hardware and software used as wel...
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security
The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In th...