Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) http://matjournals.co.in/index.php/JOCSES <div id="journalDescription"> <p><strong>Journal of Computer Science Engineering and Software Testing:-</strong> is a print e-journal focused towards the rapid Publication of fundamental research papers on all areas of computer science engineering and software testing.<br /><br />Software Engineering is the study and application of engineering to the design, development, and maintenance of software. Where Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test.</p> <ul> <li>development, operation, and maintenance of software</li> <li>computer programming</li> <li>systems analysis</li> <li>information hiding</li> <li>software bugs</li> <li>computer hardware platform</li> <li>source data, or interacting with different software</li> </ul> <p>This Journal involves the comprehensive coverage of all the aspects of computer science engineering and software testing.</p> </div> en-US Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) Mining User Interests from Web Log Data using Long-Period Extracting Algorithm http://matjournals.co.in/index.php/JOCSES/article/view/7132 <p>The knowledge available on the Web is increasing rapidly. Without using a recommendation system, many users spend a lot of time on the Web to get the data they need. Using a recommendation system is very important as it reduces the time that users need to spend to get the data they need. But, nowadays many recommendation systems cannot give the exact information to the users. The reason is that they cannot extract user’s interests accurately. So, analyzing the user’s interests and identifying the correct domain is an important research in Web Usage Mining. If users' interests can be automatically detected from their Web Log Data, they can be used for information recommendation which will be useful for both the users and the website developers. In this paper, a unique algorithm is proposed to extract users' interests. The algorithm is based on visit time and visit density. The experimental results of the proposed method find the user's interested domains.</p> K. Srinivasa Rao M. Krishna Murthy Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-02-16 2015-02-16 CORFOOS: Cost Reduction Framework for Object Oriented System http://matjournals.co.in/index.php/JOCSES/article/view/7123 <p>There are many constraints in developing software for an organization, such as time and budget. Due to these constraints and intricacies of advanced software development technology, it has become very challenging to complete such projects. To make these projects cost-effective, this paper presents a cost reduction framework (CORFOOS) which works at three levels. At the first level, Intermediate Requirement Dependency Value (IRDV) of each requirement is determined by creating the intermediate requirements dependency graph (IRDG). At the second level, the requirements are categorised and finally at the third level, the testing parameters are determined by analyzing the requirements. To analyze the requirements, the dependency model, interaction model, language specification model and fault model are used.</p> Vedpal Naresh Chauhan Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-01-20 2015-01-20 Sensitive and Privacy Sensitive Attributes in Data Mining with Discrimination http://matjournals.co.in/index.php/JOCSES/article/view/7139 <p>Data Mining is a technique which extracts useful information and data, like sequential patterns and the trends from the large amount of databases. The space to yourself responsive input data and the output data that is often used for selecting be worthy of defence against exploitation. In this paper we describe work in progress of our research project on how and to what amount authorized and moral rules can be incorporated in data mining algorithms to prevent such exploitation. For that purpose, fact sets in the field of public safety are used, made available by law and honesty departments. The centre is on preventing that selection rules turn out to distinguish particular groups of people in immoral or against the law ways. Important questions are how existing lawful and moral rules and principles can be translated in format understandable for computers and in which way these rules can be used to guide the data mining process. Furthermore, the technical potentials are used as response to plan solid directions and recommendation for formalising legislation. This will additional clarify how existing moral and lawful standards are to be applied on new technology and, when required, which new ethical and legal principles are to be developed. Opposing to previous attempt to protect space to you in data mining, we will not focus on (a priori) access limiting method concerning input data, but rather focus on (a posterior) accountability and clearness. Instead of limiting access to data, which is more and more hard to put into effect in a world of computerized and interlinked databases and information networks, rather the question how data can and may be used is stressed.</p> Kannasani Srinivasa Rao M Krishnamurthy Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-06-13 2015-06-13 Test Case Prioritization Using Aggregate Weight of the Independent Path http://matjournals.co.in/index.php/JOCSES/article/view/7134 <p>Software testing is considered an important phase for developing and maintaining any software. It controls the quality and reliability of the software being tested. The main objective of testing is to identify and eliminated bugs. Although it is a time consuming activity, the time spent is justified because it is used for generation of test cases and their testing. So, in order to avoid exhaustive testing, test cases are prioritized. In the past, many techniques of prioritization have been used to prioritize the test cases of white box testing, which fully covers the whole structural and functional part of software, as it covers the independent paths of all modules. But none of the techniques focused on the complexity of the statements covered by an independent path. So in this paper, the prioritization of test cases using basis path testing is presented, in which the most important independent path has been considered for testing. The importance of the independent path is calculated on the basis of the Complexity of the statements covered by that independent path.</p> Harish Kumar Naresh Chauhan Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-03-25 2015-03-25 Short-Period Algorithm for Extracting the User’s Interests http://matjournals.co.in/index.php/JOCSES/article/view/7129 <p>The knowledge on the cobweb is growing expressively. Without a recommendation theory, the clients may come through lots of instance on the network in finding the knowledge they are stimulated in. Today, many web recommendation theories cannot give clients adequate symbolized help but provide the client with lots of immaterial knowledge. One of the main reasons is that it cannot correctly extract user's interests. Therefore, analyzing users' Web Log Data and extracting users' potential interested domains become very important research topics of web usage mining. If users' interests can be automatically detected from users' Web Log Data, they can be used for information recommendation which will be useful for both the users and the Web site developers. In this paper, one novel algorithm is proposed to extract users' interests. The algorithm is based on visit time and visit density. The experimental results of the proposed method succeed in finding user's interested domains.</p> K. Srinivasa Rao M. Krishna Murthy Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-10-23 2015-10-23 Identifying Query Groups and Maintaining User Search Histories http://matjournals.co.in/index.php/JOCSES/article/view/7119 <p>The research overview described focuses on the design of search history displays to support information seeking (IS). Users are increasingly pursuing complex task-oriented goals on the Web, such as making travel arrangements, managing finances or planning purchases. Searchers create and use external records of their actions and the corresponding results by writing/typing notes, using copy and paste functions and making printouts. To better support users in their long-term information quests on the Web, search engines keep track of their queries and clicks while searching online. In this paper, we study the problem of organizing a user’s historical queries into groups in a dynamic and automated fashion. Automatically identifying query groups is helpful for a number of different search engine components and applications, such as query suggestions, result ranking, query alterations, sessionization and collaborative search. We experimentally study the performance of different techniques and showcase their potential, especially when combined together.</p> K. Srinivasa Rao M. Krishna Murthy Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-09-20 2015-09-20 Web Based XSS and SQL Attacks on Cloud and Mitigation http://matjournals.co.in/index.php/JOCSES/article/view/7141 <p>A key technology towards enabling the use of Software as a Service (SaaS) in the cloud computing is Web 2.0 which relieves the users form tasks such as installation and maintenance. Web based applications are recently considered as the fastest service to provide on-line information. It has been used widely all around. As growing rate of using web based applications its vulnerabilities are also being discovered and disclosed at an alarming rate. Cloud computing systems are facing a web based software security problems. This type of attacks are use to exploit the authorization, authentication and accounting the vulnerability of Cloud Systems. Malicious programs can be uploaded to cloud systems to create damage. In other words, an attacker uses skills to exploit the system by injecting some malicious script into the web pages in a dynamic form that allows capturing the private session information. Cloud systems are susceptible to malware injection attacks and its security risks and threats were investigate based on the nature of the cloud service models. It is essential to identify the possible cloud attacks and threats for implement the better security mechanisms to protect cloud computing environment. In this paper we have present most common prominent web based malware injection with two category cross-site scripting and SQL injection attacks on the cloud and methods used to hack the website by different techniques and some mitigation technique to avoid such type of attacks.</p> Neeta Sharma Mahtab Alam Mayank Singh Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-07-30 2015-07-30 Denial of Service: Techniques of Attacks and Mitigation http://matjournals.co.in/index.php/JOCSES/article/view/7137 <p>As cloud computing technology has many advantages but cloud security or cloud software security threats and attacks at various levels are also a big concern of all the organizations. Those systems are connected to the internet in the cloud network can be effected by different types of attacks and one of the prominent attack is DoS (denial of service) attack. DoS attack has been considered as one of the important security threat in cloud computing systems at various level that has proven difficult to alleviate. This attack perpetrated in many ways such as consuming computational resources, disruption of information and obstructing the communication media. Once the attack is successful in consuming resources on the victim computers, the attacker then could control and direct them to attack as a group. This means DoS attack also allows the attacker to get the administrative control of the systems. Dos attack can be launched for sending the flood or crashes the services of the system. In this paper, we present the different types of DoS attacks and techniques for launched the DoS attack at various level and the techniques applied to mitigate the harmful effects of the DoS attack.</p> Neeta Sharma Mahtab Alam Mayank Singh Copyright (c) 2015 Journal of Computer Science Engineering and Software Testing (e-ISSN: 2581-6969) 2015-05-20 2015-05-20