Salman Moiz | University of Hyderabad (original) (raw)
Papers by Salman Moiz
Lecture Notes in Computer Science, 2023
IGI Global eBooks, May 13, 2022
Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measure and area under ROC, yet the tree-based classifiers are performing better than other classifiers.
Advances in intelligent systems and computing, Jun 13, 2018
Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.
ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019
Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.
Journal of critical reviews, 2020
Internet of Things (IoT) connects a large number of devices/objects, and these devices are being ... more Internet of Things (IoT) connects a large number of devices/objects, and these devices are being increased that it is foretold their number will reach billions in the near future, and hence increasing the number of IoT-based services. IoT is built on and integrated with many existing technologies (e.g., wireless sensors, mobile computing, and cloud) which support its spreading and scalability and help it to overcome its known challenges like limited resources. Moreover, service composition supports IoT in the rapid development of new IoT applications leveraging the existing services. These paradigms and techniques are fundamental building blocks and enablers of smart cities. IoT service composition and IoT integration with the above-stated technologies have been addressed in research and industry works. In this paper, we review several types compositions and give our view on future smart city service providers. We also propose a location-aware architecture for integrating IoT services and mobile application services. The proposal is illustrated based on shopping mall scenario, and the high-level architecture is presented in this work.
International Journal of Recent Technology and Engineering (IJRTE), 2019
Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...
2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH), 2017
Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.
The deployment of a software product requires considerable amount of time and effort. In order to... more The deployment of a software product requires considerable amount of time and effort. In order to increase the productivity of the software products, reusability strategies were proposed in the literature. However effective reuse is still a challenging issue. This paper presents a framework studio for effective components reusability which provides the selection of components from framework studio and generation of source code based on stakeholders needs. The framework studio is implemented using swings which are integrated onto the Net Beans IDE which help in faster generation of the source code.
Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...
Scientific Reports, 2021
The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in ... more The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is ...
Learning and Analytics in Intelligent Systems, 2019
Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Lecture Notes in Computer Science
In a mobile computing environment, users can perform on-line transaction processing independent o... more In a mobile computing environment, users can perform on-line transaction processing independent of their physical location. In a mobile environment, multiple mobile hosts may update the data simultaneously which may result in inconsistency of data. To solve such problems many concurrency control techniques have been proposed. The traditional two phase locking protocol has some inherent problems such as deadlocks &
International Journal of Database Management Systems, 2011
The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.
Procedia Technology, 2012
International Journal of Software Engineering & Applications, 2012
ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving da... more ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving data consistency. Due to concurrent executions, transactions initiated by mobile hosts may make the data inconsistent when accessing the same resource. Uneven delay by a mobile host in committing a particular transaction may make other hosts accessing the same resource to wait for an invariant time. This may lead to starvation. This paper proposes an algorithmic approach for preserving consistency during concurrent executions. A simulator, based on this algorithm is build to verify the proposal using the row locking mechanism
bvicam.ac.in
... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Huss... more ... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Hussaini, MJ College of Engg. ... ABSTRACT A Multiprocessor System is an interconnection of multiple processors, typically share main memory and execute different programs concurrently. ...
bvicam.ac.in
Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Designing a Web Education Model For Effective ...
Lecture Notes in Computer Science, 2023
IGI Global eBooks, May 13, 2022
Code smell is an inherent property of software that results in design problems which makes the so... more Code smell is an inherent property of software that results in design problems which makes the software hard to extend, understand, and maintain. In the literature, several tools are used to detect code smell that are informally defined or subjective in nature due to varying results of the code smell. To resolve this, machine leaning (ML) techniques are proposed and learn to distinguish the characteristics of smelly and non-smelly code elements (classes or methods). However, the dataset constructed by the ML techniques are based on the tools and manually validated code smell samples. In this article, instead of using tools and manual validation, the authors considered detection rules for identifying the smell then applied unsupervised learning for validation to construct two smell datasets. Then, applied classification algorithms are used on the datasets to detect the code smells. The researchers found that all algorithms have achieved high performance in terms of accuracy, F-measure and area under ROC, yet the tree-based classifiers are performing better than other classifiers.
Advances in intelligent systems and computing, Jun 13, 2018
Software reusability is one of the important mechanisms needed to maintain its quality and produc... more Software reusability is one of the important mechanisms needed to maintain its quality and productivity. Even though the candidate components are available in the repository to be reused, software engineers prefer to develop the system from scratch. There exists fear of reuse because the developers are not sure whether candidate component will work. In this paper, first the focus is on retrieving the desired components based on rule generation using rough sets. If the component is not found, then it can be developed and stored in repository. Secondly, uncertainty in identifying the desired component is addressed and an approach to model such uncertainty is proposed. Rough set exploration system (RSES) tool is used to simulate the results on certain behaviors of banking domain.
ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2019
Code smell is an indication of design problem or quality in the source code which constantly affe... more Code smell is an indication of design problem or quality in the source code which constantly affect the evolution of a software project. Refactoring is a technique which can remove the code smells to improve the design quality of the code. In the literature, there are many code smells, refactoring techniques, and refactoring tools. However, a software project often contains thousands of code smells and many of them have no relation to design quality. It is a challenge for developers to decide which kind of code smell should be refactored first. The state of the art techniques fall short in assisting developers in the prioritize of code smell shows the impact on design quality. In this paper, we have chosen 4 code smells and found the relationship among them with the help of dependency finder tool. With this finding, we are analyzing and prioritizing the code smells based on design quality. In this way, the code smell ordering (prioritize the code smells) is recommended to the developers which one to refactor first. The suggested order may dispel some of the code smell or may dispel some of possible refactoring techniques of the code smell in the large software project. We have evaluated, recommended order on simple java source code and the results show that the order which we suggested has more impacted on design quality.
Journal of critical reviews, 2020
Internet of Things (IoT) connects a large number of devices/objects, and these devices are being ... more Internet of Things (IoT) connects a large number of devices/objects, and these devices are being increased that it is foretold their number will reach billions in the near future, and hence increasing the number of IoT-based services. IoT is built on and integrated with many existing technologies (e.g., wireless sensors, mobile computing, and cloud) which support its spreading and scalability and help it to overcome its known challenges like limited resources. Moreover, service composition supports IoT in the rapid development of new IoT applications leveraging the existing services. These paradigms and techniques are fundamental building blocks and enablers of smart cities. IoT service composition and IoT integration with the above-stated technologies have been addressed in research and industry works. In this paper, we review several types compositions and give our view on future smart city service providers. We also propose a location-aware architecture for integrating IoT services and mobile application services. The proposal is illustrated based on shopping mall scenario, and the high-level architecture is presented in this work.
International Journal of Recent Technology and Engineering (IJRTE), 2019
Transition of traditional online learning towards the Smart learning environments requires adapta... more Transition of traditional online learning towards the Smart learning environments requires adaptation of the smart features. Personalized assistance is one of the most required characteristic. Learning plans are important building blocks for any teaching learning paradigms. Often an instructor makes a learning plan keeping stakeholders into consideration. However in an online learning environment the stakeholders are not able to adapt to these static plans as there is no personalization involved. As a result there is a considerable increase in dropout rates. Hence there is a need for adaptive learning plans which aims for dynamic adjustment of schedules/learning plans that may help in successful completion of course. This paper presents an approach for dynamic learning plan generator and also proposes a revised Learning plan template to achieve personalized assistance in Smart learning environments. The responses of stakeholders on traditional learning plans and that of individualiz...
2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH), 2017
Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scorin... more Evaluation is a mechanism to check the correctness of a document or program. A Rubric is a scoring guide that is used for assessing students learning outcomes. IEEE 830.1998 is a IEEE recommended practice for Software Requirements Specification. The design of rubrics for standard templates like that of IEEE SRS helps in assessing several projects with uniform scaling. In this work, a holistic rubric is created for IEEE 830.1998 standard SRS template assessment. This rubric is applied on the actual students submissions over Moodle platform. The results show that the traditional assessment by the faculty and the proposed rubric based assessment matches closely and provides scope for the course development through formative assessment.
The deployment of a software product requires considerable amount of time and effort. In order to... more The deployment of a software product requires considerable amount of time and effort. In order to increase the productivity of the software products, reusability strategies were proposed in the literature. However effective reuse is still a challenging issue. This paper presents a framework studio for effective components reusability which provides the selection of components from framework studio and generation of source code based on stakeholders needs. The framework studio is implemented using swings which are integrated onto the Net Beans IDE which help in faster generation of the source code.
Software that is badly written and prone to design problems often smells. Code smells results in ... more Software that is badly written and prone to design problems often smells. Code smells results in design anomalies that make software hard to understand and maintain. Several tools and techniques available in literature helps in detection of code smells. But the severity of the smells in the code is often not known immediately as it lacks visualization. In this paper, two method level code smells namely long method and feature envy are visualized using chernoff faces. Techniques proposed in literature either use knowledge driven approach or data driven approach for code smell detection. In the proposed approach a fusion of both knowledge and data driven approach is used to identify the most relevant features. These most relevant features are mapped to the 15 desired features of chernoff faces to visualize the behavior of the code. The result shows that almost 95% of the smells are visualized correctly. This helps in analyzing the programmer’s capability in maintaining quality of sour...
Scientific Reports, 2021
The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in ... more The reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is ...
Learning and Analytics in Intelligent Systems, 2019
Smart learning provides a holistic learning to students with a major paradigm shift by using mode... more Smart learning provides a holistic learning to students with a major paradigm shift by using modern day technologies. The Learning Management systems are mostly built using traditional standard frameworks like that of IEEE Learning Technology Systems Architecture (LTSA). These frameworks are not suitable to smart learning environment as they lack several desired features to qualify for smartness levels in learning. In this paper a modified block chain enabled LTSA framework is proposed to realize the sense level of smartness. The proposed framework is evaluated for various security threats suitable in virtual learning. The risk impact factor for several threats is compared for several threat patterns and it is observed that risk impact factor sufficiently reduced in the proposed framework as compared to that of LTSA.
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
Lecture Notes in Computer Science
In a mobile computing environment, users can perform on-line transaction processing independent o... more In a mobile computing environment, users can perform on-line transaction processing independent of their physical location. In a mobile environment, multiple mobile hosts may update the data simultaneously which may result in inconsistency of data. To solve such problems many concurrency control techniques have been proposed. The traditional two phase locking protocol has some inherent problems such as deadlocks &
International Journal of Database Management Systems, 2011
The use of data services from handheld devices has increased exponentially resulting in several c... more The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.
Procedia Technology, 2012
International Journal of Software Engineering & Applications, 2012
ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving da... more ABSTRACT Transaction processing in wireless environment poses challenging issues in preserving data consistency. Due to concurrent executions, transactions initiated by mobile hosts may make the data inconsistent when accessing the same resource. Uneven delay by a mobile host in committing a particular transaction may make other hosts accessing the same resource to wait for an invariant time. This may lead to starvation. This paper proposes an algorithmic approach for preserving consistency during concurrent executions. A simulator, based on this algorithm is build to verify the proposal using the row locking mechanism
bvicam.ac.in
... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Huss... more ... Salman Abdul Moiz, Assoc Prof, CSED, MJ College of Engg. & Tech, Hyd Syed Khaver Hussaini, MJ College of Engg. ... ABSTRACT A Multiprocessor System is an interconnection of multiple processors, typically share main memory and execute different programs concurrently. ...
bvicam.ac.in
Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, Febru... more Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi ... Designing a Web Education Model For Effective ...