Hemalatha Indukuri - Academia.edu (original) (raw)

Papers by Hemalatha Indukuri

Research paper thumbnail of International Journal Of Scientific Research And Education

Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a s... more Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a set of possessions and services that are on hand by the network or internet. Cloud computing extend a variety of computing techniques like grid compute, distributed computing. Today cloud computing is used in both industrial pasture and educational field. As the meadow of cloud computing is scattering the new technique are increasing. This amplifies in cloud computing location also increases security challenges for cloud developers. Users of confuse save their data in the shade hence the lack of security in cloud can lose the user’s trust. In this paper we will discuss some of the cloud security issue in a mixture of aspects like multi-tenancy, stretch, accessibility etc. the paper also argue existing security technique and approaches for a protected cloud.

Research paper thumbnail of Secure Transferring Routing Using Primary Pre Share an Optimization Advance for Remote Optimization

Trivial safe communications between a random set of network nodes requires each node to keep n 1 ... more Trivial safe communications between a random set of network nodes requires each node to keep n 1 pairwise keys within the situation of symmetrical cryptography and n 1 people keys within the situation of uneven cryptography where n represents the amount of fret nodes. In the cobweb operation faze, each host finds the hade footway length joined second-hand its hide neighbours by resign simple route requisition. A viable pool for key pre-distribution schemes that's constructed according to symmetrical cryptography concepts contains secret pairwise keys. Within this note, we constrain reference to the mesh bed along the underlay layer and also the cryptographic belt that the overlay course. Our hint option would be really the reply to an LP problem flow by loose all the Boolean constraints within the inventive problem. The effectiveness of our formula is within explanation the Boolean LP trouble with an era complexity not exceeding those of resolve the relaxed LP problem while warr...

Research paper thumbnail of Mobile Edge Computing Architecture Challenges, Applications, and Future Directions

International Journal of Grid and High Performance Computing

In the current era of technology, the utilization of tablets and smart phones plays a major role ... more In the current era of technology, the utilization of tablets and smart phones plays a major role in every situation. As the numbers of mobile users increase, the quality of service (QoS) and quality of experience (QoE) are facing the greater challenges. Thus, this can significantly reduce the latency and optimize the power consumed by the tasks executed locally. Most of the previous works are focused only on quality optimization in the dynamic service layouts. However, they ignored the significant impact of accurate access network selection and perfect service placement. This article performs the detailed survey of various MEC approaches with service provision and adoption. The survey also provides the analysis of various approaches for optimizing the QoS parameters and MEC resources. In this regarding, the survey classifies the approaches based on service placement, network selection, QoS, and QoE parameters, and resources such as latency, energy, bandwidth, memory, storage, and pr...

Research paper thumbnail of Case Study on Online Reviews Sentiment AnalysisUsing Machine Learning Algorithms

International Journal of Innovative Research in Computer and Communication Engineering, 2014

The main objective of the research paper is to prove the effectiveness of Analyzing social media ... more The main objective of the research paper is to prove the effectiveness of Analyzing social media data. Twitter is a valuable resource for data mining because of its prevalence and recognition by famous persons. In this paper we present a system which collects Tweets from social networking sites, we’ll be able to do analysis using machine learning techniques on those Tweets and thus provide some prediction of business intelligence. Results of trend analysis will be display as tweets with different sections presenting positive, Negative and neutral.

Research paper thumbnail of Design of an Enhanced Pulse Compression Techniques using Poly-phase Bi-phase and LFM

The main objective of this project is to design an enhanced pulse compression technique using Pol... more The main objective of this project is to design an enhanced pulse compression technique using Polyphase, Biphase and Linear frequency modulated (LFM) Codes. These Techniques are used in Radar systems to avail the benefits of large range detection capability of long duration pulse and high range resolution capability of short duration pulse with low power consumption. These three techniques are designed and verified for comparison purpose. Further this compression technique is enhanced by inserting noise elimination method. Noise elimination involves elimination of unwanted signal compression.

Research paper thumbnail of Minimizing the Computational Cost on Large Scale Data Using Network Traffic

The goal of this framework to diminish organizes activity cost for a Map-Reduce work by planning ... more The goal of this framework to diminish organizes activity cost for a Map-Reduce work by planning a novel middle of the road information segment conspires. Strategies/Analysis: The Map-Reduce display streamlines the vast scale data taking care of on items aggregate by manhandling parallel map and reduces assignments. Despite the fact that various undertakings have been made to expand the execution of Map-Reduce works, they ignore the system action created in the blend arrange, which expect a fundamental part in execution overhaul. Discoveries: Generally, a hash limit is used to fragment widely appealing data among diminish assignments, which, in any case, isn't development powerful in light of the way that system topology and its information measure associated with each key are not pondered. Reconsider to diminish framework development cost for a Map-Reduce work by arranging a novel direct data portion design. Applications/Improvement: Decomposition based dynamic calculation and ...

Research paper thumbnail of Secure Outsourcing Drug Data Discovery using SVM in Cloud Computing Environment

Journal of emerging technologies and innovative research, 2019

Here enhancing the structure for privacy preserving redistributed drug revelation, which we allud... more Here enhancing the structure for privacy preserving redistributed drug revelation, which we allude to as POD. In particular, POD is enhanced to empower the cloud to securely use different drug condition providers' drug plans to get ready with classification given by model provider. In our philosophy, we arrangement secure calculation protocols to empower the cloudserver to perform generally used entire number and segment calculations. Here arrangement a protected security parameter determination convention to build up a safe progressive critical improvement convention to furtively restore both pick protected parameters. The readied classification used to choose if a drug engineered complex is dynamic or not in a privacy preserving way. At last, we exhibit that the enhanced POD achieve the objective of preparing and chemical complex classification without privacy leak to unapproved stages, and what's more representative its usage and profitability by means of genuine drug dat...

Research paper thumbnail of Secure Web Mining System for Online E-Commerce Business Sites

International journal of scientific research in science, engineering and technology, 2017

Electronic business procedures and information mining instruments have reformed many organization... more Electronic business procedures and information mining instruments have reformed many organizations. Information that organizations gather about clients and their exchanges are the best resources of that business. Information mining is an arrangement of mechanized methods used to remove covered or already obscure snippets of data from substantial databases, utilizing diverse criteria, which makes it conceivable to find examples and connections. This paper talks about the critical part of business in light of information mining learning improvement to recognition the connection of information mining and electronic trade. What's more, express a few applications and difficulties for this situation.

Research paper thumbnail of H2Hadoop : Metadata Centric BigData Analytics on Related Jobs Data Using Hadoop Pseudo Distributed Environment

Hadoop contains a few impediments that could be created to have a higher execution in executing o... more Hadoop contains a few impediments that could be created to have a higher execution in executing occupations. These restrictions are generally a result of information territory in the bunch, occupations and undertakings planning, CPU execution time, or asset designations in Hadoop. Information region and productive asset portion remains a test in cloud computing MapReduce platform. We propose an improved Hadoop design that lessens the calculation cost related with BigData investigation. In the meantime, the proposed engineering tends to the issue of asset distribution in local Hadoop. Improved Hadoop engineering influences on NameNode's capacity to relegate occupations to the TaskTrakers (DataNodes) inside the group. By adding controlling highlights to the NameNode, it can shrewdly immediate and dole out errands to the DataNodes that contain the required information. Proposed arrangement concentrate on removing highlights and building a metadata table that conveys data about the presence and the area of the information obstructs in the bunch. This empowers NameNode to guide the employments to particular DataNodes without experiencing the entire informational collections in the cluster.Comparing with local Hadoop, proposed Hadoop reduced CPU time, number of read operations, input data size, and another different factors.

Research paper thumbnail of A Study on Big Data Hadoop Map Reduce Job Scheduling

International Journal of Engineering & Technology, 2018

A latest tera to zeta era has been created during huge volume of data sets, which keep on collect... more A latest tera to zeta era has been created during huge volume of data sets, which keep on collected from different social networks, machine to machine devices, google, yahoo, sensors etc. called as big data. Because day by day double the data storage size, data processing power, data availability and digital world data size in zeta bytes. Apache Hadoop is latest market weapon to handle huge volume of data sets by its most popular components like hdfs and mapreduce, to achieve an efficient storage ability and efficient processing on massive volume of data sets. To design an effective algorithm is a key factor for selecting nodes are important, to optimize and acquire high performance in Big data. An efficient and useful survey, overview, advantages and disadvantages of these scheduling algorithms provided also identified throughout this paper.

Research paper thumbnail of Sentiment classification in online reviews using FRN algorithm

IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), 2013

The internet is rich in directional text (i.e., text containing opinions and emotions). World Wid... more The internet is rich in directional text (i.e., text containing opinions and emotions). World Wide Web provides volumes of text-based data about consumer preferences, stored in online review websites, web forums, blogs, etc. Sentiment analysis is a technique to classify people's opinions in product reviews, blogs or social networks has emerged as a method for mining opinions from such text archives. It uses machine learning methods combined with linguistic attributes/features in order to identify among other things the sentiment polarity (e.g., positive, negative, and neutral) We investigated supervised learning by incorporating linguistic rules and constraints that could improve the performance of calculations and classifications.

Research paper thumbnail of Automated Sentiment Analysis System Using Machine Learning Algorithms

ABSTRACT: Sentiment analysis can be very useful for business if employed correctly. In this artic... more ABSTRACT: Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it. In this paper we present a system which collects Tweets from social networking sites, we’ll be able to do analysis using machine learning techniques on those Tweets and thus provide some prediction of business intelligence. Results of trend analysis will be display as tweets with different sections presenting positive, Negative and neutral.

Research paper thumbnail of Triplet Loss based Siamese Networks for Automatic Short Answer Grading

Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation

Research paper thumbnail of Extracting Ironic Tweets using Experts Model

Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation

Research paper thumbnail of Expediting International Student Admission Process Using Data Analytics

IOP Conference Series: Materials Science and Engineering, 2021

The student admission process is a critical step from both student and university perspectives. T... more The student admission process is a critical step from both student and university perspectives. The students will benefit if the universities take admission decisions sooner rather than later, leaving them time to opt for another university in case of rejection. However, with the level of manual work involved in the student admission process, universities often take long durations for the admission decisions. Expediting the admission process using Data analytics starts new research across different tasks in educational institutes. The research presents a model to automate each step of the international student admission process in universities across the USA, using Data analytics. The model’s distinguishing capability is that it performs both predictive and descriptive analytics to analyze different student’s application sections and adapt to different admissions types with minor changes.

Research paper thumbnail of Comparative Analysis of Sentiment Analysis Between All Bigrams and Selective Adverb/Adjective Bigrams

Increase in the amount of unstructured data across different platforms serves as a valuable resou... more Increase in the amount of unstructured data across different platforms serves as a valuable resource for predicting market trends, analyzing product features, and considering the customer sentiment in designing new features/products. The sentiment of unstructured data such as tweets, Facebook comments, and web reviews is calculated by using the polarity and intensity of the words, whereas polarity indicates positive or negative sentiment, and intensity indicates the strength of polarity. In this paper, a comparative study of sentiment analysis performance and accuracy between all bigrams and selective adverb/adjective bigrams is done. The outcome of this research will serve as a metric for both academia and industry to implement sentiment analysis projects.

Research paper thumbnail of An Android Bug Detector Using Reverse Engineering

International Journal of Control Theory and Applications, 2016

In day-today life most of the population in this world using Mobile Phones. Like computers, smart... more In day-today life most of the population in this world using Mobile Phones. Like computers, smart phones are likely to under malfunction as long they are in continuous operation. While 81% of the smart phone users are Android users. It is necessary to debug the applications before using them. In this paper authors are interested in Android Reverse Engineering Bug Detector (AREBD) technique to detect and recover the number of bugs by converting binary code to intermediate code. While Debugging we mainly concentrate on computer program, whether it is behaving as expected. Debugging tends to be difficult when various subsystems are tightly bound, as changes in one subsystem may cause bugs to other subsystems. Android Bug Detector is a tool that performs Android Application Debugging using manifest file in .apk file. It is a process of finding the malicious code and reducing the number of bugs in an android application. The proposed bug detector is implemented using Open source and is free of cost. It is slower in detection, but gives efficient results irrespective of capacity of .apk file.

Research paper thumbnail of International Journal Of Scientific Research And Education

Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a s... more Today, cloud computing is a rising way of computing in computer knowledge. Cloud computing is a set of possessions and services that are on hand by the network or internet. Cloud computing extend a variety of computing techniques like grid compute, distributed computing. Today cloud computing is used in both industrial pasture and educational field. As the meadow of cloud computing is scattering the new technique are increasing. This amplifies in cloud computing location also increases security challenges for cloud developers. Users of confuse save their data in the shade hence the lack of security in cloud can lose the user’s trust. In this paper we will discuss some of the cloud security issue in a mixture of aspects like multi-tenancy, stretch, accessibility etc. the paper also argue existing security technique and approaches for a protected cloud.

Research paper thumbnail of Secure Transferring Routing Using Primary Pre Share an Optimization Advance for Remote Optimization

Trivial safe communications between a random set of network nodes requires each node to keep n 1 ... more Trivial safe communications between a random set of network nodes requires each node to keep n 1 pairwise keys within the situation of symmetrical cryptography and n 1 people keys within the situation of uneven cryptography where n represents the amount of fret nodes. In the cobweb operation faze, each host finds the hade footway length joined second-hand its hide neighbours by resign simple route requisition. A viable pool for key pre-distribution schemes that's constructed according to symmetrical cryptography concepts contains secret pairwise keys. Within this note, we constrain reference to the mesh bed along the underlay layer and also the cryptographic belt that the overlay course. Our hint option would be really the reply to an LP problem flow by loose all the Boolean constraints within the inventive problem. The effectiveness of our formula is within explanation the Boolean LP trouble with an era complexity not exceeding those of resolve the relaxed LP problem while warr...

Research paper thumbnail of Mobile Edge Computing Architecture Challenges, Applications, and Future Directions

International Journal of Grid and High Performance Computing

In the current era of technology, the utilization of tablets and smart phones plays a major role ... more In the current era of technology, the utilization of tablets and smart phones plays a major role in every situation. As the numbers of mobile users increase, the quality of service (QoS) and quality of experience (QoE) are facing the greater challenges. Thus, this can significantly reduce the latency and optimize the power consumed by the tasks executed locally. Most of the previous works are focused only on quality optimization in the dynamic service layouts. However, they ignored the significant impact of accurate access network selection and perfect service placement. This article performs the detailed survey of various MEC approaches with service provision and adoption. The survey also provides the analysis of various approaches for optimizing the QoS parameters and MEC resources. In this regarding, the survey classifies the approaches based on service placement, network selection, QoS, and QoE parameters, and resources such as latency, energy, bandwidth, memory, storage, and pr...

Research paper thumbnail of Case Study on Online Reviews Sentiment AnalysisUsing Machine Learning Algorithms

International Journal of Innovative Research in Computer and Communication Engineering, 2014

The main objective of the research paper is to prove the effectiveness of Analyzing social media ... more The main objective of the research paper is to prove the effectiveness of Analyzing social media data. Twitter is a valuable resource for data mining because of its prevalence and recognition by famous persons. In this paper we present a system which collects Tweets from social networking sites, we’ll be able to do analysis using machine learning techniques on those Tweets and thus provide some prediction of business intelligence. Results of trend analysis will be display as tweets with different sections presenting positive, Negative and neutral.

Research paper thumbnail of Design of an Enhanced Pulse Compression Techniques using Poly-phase Bi-phase and LFM

The main objective of this project is to design an enhanced pulse compression technique using Pol... more The main objective of this project is to design an enhanced pulse compression technique using Polyphase, Biphase and Linear frequency modulated (LFM) Codes. These Techniques are used in Radar systems to avail the benefits of large range detection capability of long duration pulse and high range resolution capability of short duration pulse with low power consumption. These three techniques are designed and verified for comparison purpose. Further this compression technique is enhanced by inserting noise elimination method. Noise elimination involves elimination of unwanted signal compression.

Research paper thumbnail of Minimizing the Computational Cost on Large Scale Data Using Network Traffic

The goal of this framework to diminish organizes activity cost for a Map-Reduce work by planning ... more The goal of this framework to diminish organizes activity cost for a Map-Reduce work by planning a novel middle of the road information segment conspires. Strategies/Analysis: The Map-Reduce display streamlines the vast scale data taking care of on items aggregate by manhandling parallel map and reduces assignments. Despite the fact that various undertakings have been made to expand the execution of Map-Reduce works, they ignore the system action created in the blend arrange, which expect a fundamental part in execution overhaul. Discoveries: Generally, a hash limit is used to fragment widely appealing data among diminish assignments, which, in any case, isn't development powerful in light of the way that system topology and its information measure associated with each key are not pondered. Reconsider to diminish framework development cost for a Map-Reduce work by arranging a novel direct data portion design. Applications/Improvement: Decomposition based dynamic calculation and ...

Research paper thumbnail of Secure Outsourcing Drug Data Discovery using SVM in Cloud Computing Environment

Journal of emerging technologies and innovative research, 2019

Here enhancing the structure for privacy preserving redistributed drug revelation, which we allud... more Here enhancing the structure for privacy preserving redistributed drug revelation, which we allude to as POD. In particular, POD is enhanced to empower the cloud to securely use different drug condition providers' drug plans to get ready with classification given by model provider. In our philosophy, we arrangement secure calculation protocols to empower the cloudserver to perform generally used entire number and segment calculations. Here arrangement a protected security parameter determination convention to build up a safe progressive critical improvement convention to furtively restore both pick protected parameters. The readied classification used to choose if a drug engineered complex is dynamic or not in a privacy preserving way. At last, we exhibit that the enhanced POD achieve the objective of preparing and chemical complex classification without privacy leak to unapproved stages, and what's more representative its usage and profitability by means of genuine drug dat...

Research paper thumbnail of Secure Web Mining System for Online E-Commerce Business Sites

International journal of scientific research in science, engineering and technology, 2017

Electronic business procedures and information mining instruments have reformed many organization... more Electronic business procedures and information mining instruments have reformed many organizations. Information that organizations gather about clients and their exchanges are the best resources of that business. Information mining is an arrangement of mechanized methods used to remove covered or already obscure snippets of data from substantial databases, utilizing diverse criteria, which makes it conceivable to find examples and connections. This paper talks about the critical part of business in light of information mining learning improvement to recognition the connection of information mining and electronic trade. What's more, express a few applications and difficulties for this situation.

Research paper thumbnail of H2Hadoop : Metadata Centric BigData Analytics on Related Jobs Data Using Hadoop Pseudo Distributed Environment

Hadoop contains a few impediments that could be created to have a higher execution in executing o... more Hadoop contains a few impediments that could be created to have a higher execution in executing occupations. These restrictions are generally a result of information territory in the bunch, occupations and undertakings planning, CPU execution time, or asset designations in Hadoop. Information region and productive asset portion remains a test in cloud computing MapReduce platform. We propose an improved Hadoop design that lessens the calculation cost related with BigData investigation. In the meantime, the proposed engineering tends to the issue of asset distribution in local Hadoop. Improved Hadoop engineering influences on NameNode's capacity to relegate occupations to the TaskTrakers (DataNodes) inside the group. By adding controlling highlights to the NameNode, it can shrewdly immediate and dole out errands to the DataNodes that contain the required information. Proposed arrangement concentrate on removing highlights and building a metadata table that conveys data about the presence and the area of the information obstructs in the bunch. This empowers NameNode to guide the employments to particular DataNodes without experiencing the entire informational collections in the cluster.Comparing with local Hadoop, proposed Hadoop reduced CPU time, number of read operations, input data size, and another different factors.

Research paper thumbnail of A Study on Big Data Hadoop Map Reduce Job Scheduling

International Journal of Engineering & Technology, 2018

A latest tera to zeta era has been created during huge volume of data sets, which keep on collect... more A latest tera to zeta era has been created during huge volume of data sets, which keep on collected from different social networks, machine to machine devices, google, yahoo, sensors etc. called as big data. Because day by day double the data storage size, data processing power, data availability and digital world data size in zeta bytes. Apache Hadoop is latest market weapon to handle huge volume of data sets by its most popular components like hdfs and mapreduce, to achieve an efficient storage ability and efficient processing on massive volume of data sets. To design an effective algorithm is a key factor for selecting nodes are important, to optimize and acquire high performance in Big data. An efficient and useful survey, overview, advantages and disadvantages of these scheduling algorithms provided also identified throughout this paper.

Research paper thumbnail of Sentiment classification in online reviews using FRN algorithm

IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013), 2013

The internet is rich in directional text (i.e., text containing opinions and emotions). World Wid... more The internet is rich in directional text (i.e., text containing opinions and emotions). World Wide Web provides volumes of text-based data about consumer preferences, stored in online review websites, web forums, blogs, etc. Sentiment analysis is a technique to classify people's opinions in product reviews, blogs or social networks has emerged as a method for mining opinions from such text archives. It uses machine learning methods combined with linguistic attributes/features in order to identify among other things the sentiment polarity (e.g., positive, negative, and neutral) We investigated supervised learning by incorporating linguistic rules and constraints that could improve the performance of calculations and classifications.

Research paper thumbnail of Automated Sentiment Analysis System Using Machine Learning Algorithms

ABSTRACT: Sentiment analysis can be very useful for business if employed correctly. In this artic... more ABSTRACT: Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it. In this paper we present a system which collects Tweets from social networking sites, we’ll be able to do analysis using machine learning techniques on those Tweets and thus provide some prediction of business intelligence. Results of trend analysis will be display as tweets with different sections presenting positive, Negative and neutral.

Research paper thumbnail of Triplet Loss based Siamese Networks for Automatic Short Answer Grading

Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation

Research paper thumbnail of Extracting Ironic Tweets using Experts Model

Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation

Research paper thumbnail of Expediting International Student Admission Process Using Data Analytics

IOP Conference Series: Materials Science and Engineering, 2021

The student admission process is a critical step from both student and university perspectives. T... more The student admission process is a critical step from both student and university perspectives. The students will benefit if the universities take admission decisions sooner rather than later, leaving them time to opt for another university in case of rejection. However, with the level of manual work involved in the student admission process, universities often take long durations for the admission decisions. Expediting the admission process using Data analytics starts new research across different tasks in educational institutes. The research presents a model to automate each step of the international student admission process in universities across the USA, using Data analytics. The model’s distinguishing capability is that it performs both predictive and descriptive analytics to analyze different student’s application sections and adapt to different admissions types with minor changes.

Research paper thumbnail of Comparative Analysis of Sentiment Analysis Between All Bigrams and Selective Adverb/Adjective Bigrams

Increase in the amount of unstructured data across different platforms serves as a valuable resou... more Increase in the amount of unstructured data across different platforms serves as a valuable resource for predicting market trends, analyzing product features, and considering the customer sentiment in designing new features/products. The sentiment of unstructured data such as tweets, Facebook comments, and web reviews is calculated by using the polarity and intensity of the words, whereas polarity indicates positive or negative sentiment, and intensity indicates the strength of polarity. In this paper, a comparative study of sentiment analysis performance and accuracy between all bigrams and selective adverb/adjective bigrams is done. The outcome of this research will serve as a metric for both academia and industry to implement sentiment analysis projects.

Research paper thumbnail of An Android Bug Detector Using Reverse Engineering

International Journal of Control Theory and Applications, 2016

In day-today life most of the population in this world using Mobile Phones. Like computers, smart... more In day-today life most of the population in this world using Mobile Phones. Like computers, smart phones are likely to under malfunction as long they are in continuous operation. While 81% of the smart phone users are Android users. It is necessary to debug the applications before using them. In this paper authors are interested in Android Reverse Engineering Bug Detector (AREBD) technique to detect and recover the number of bugs by converting binary code to intermediate code. While Debugging we mainly concentrate on computer program, whether it is behaving as expected. Debugging tends to be difficult when various subsystems are tightly bound, as changes in one subsystem may cause bugs to other subsystems. Android Bug Detector is a tool that performs Android Application Debugging using manifest file in .apk file. It is a process of finding the malicious code and reducing the number of bugs in an android application. The proposed bug detector is implemented using Open source and is free of cost. It is slower in detection, but gives efficient results irrespective of capacity of .apk file.