Pseudo-Code Attack (PCA) in Software Engineering
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 6
Abstract
Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programming languages is applicable to software metric calculations such as line of code, code minimization, re-usability, and so on. Various attacks may be carried out during the metric computation phases in order to decrease the model parameters and delay the software package offering. Many attacks in networks have been discovered and avoided; this Pseudo-code assault is a new technique for boosting metric estimation in software development. This article suggested a method for introducing the Pseudo-code threat and detecting the presence of the Pseudo-code assault in the code base. Estimated size and duration are key quality assurance metrics in software development process. Software quality is measured by the average time between failures and the number of defects per line of code.
Authors and Affiliations
Sushil Bhardwaj
A Novel Rhombus Shaped Multiband Antenna for Wireless Applications
A 30X20X1.6mm3 Novel Rhombus Shaped ring type multiband Antenna was proposed in this paper. The Antenna has 25x15mm2 partial ground inserted below the FR4 Epoxy Substrate to improve performance of Antenna. In addition,...
Comprehensive Review on Machine Learning Applications in Cloud Computing
Cloud computing provides on-demand access to a variety of processing, storage, and network resources. Over the past few years, cloud computing has become a widely accepted computing paradigm and one of the fastest-growin...
Chip Floorplanning Optimization Using Deep Reinforcement Learning
This paper presents a new method for chip floorplanning optimization using deep learning (DRL) combined with graph neural networks (GNNs). The plan addresses the challenges of traditional floor plans by applying AI to sp...
Boomerang Analysis of Permutation Function of 3D-AES Block Cipher
Boomerang analysis is a type of differential attack that use two bits of key difference and comparing both to examine any differences in bit after encryption. This paper describe boomerang analysis of permutation functio...
Stabilization of Black Cotton Soil Using Terrazyme and Rice Hush Ash
Construction on the black cotton soil, a form of troublesome expanding soil, has various difficulties. It has a swollen and impermeable nature with poor sub grade geotechnical properties. This study takes a stab at impro...