CINXE.COM

Tripti Gautam | Guru Gobind Singh Indraprastha University - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Tripti Gautam | Guru Gobind Singh Indraprastha University - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="+Uvlkv5nBGsssOOR0CLGjQIRwBwpQCqmMwZb2HKkg03byw3R8xJl/RBH9YTmuDnHY2noxmDG25WcBTKGQ4HsYA==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-1c712297ae3ac71207193b1bae0ecf1aae125886850f62c9c0139dd867630797.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="tripti gautam" /> <meta name="description" content="Tripti Gautam, Guru Gobind Singh Indraprastha University: 1 Follower, 27 Following, 11 Research papers. Research interests: Google Maps API V3, Web Technology,…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '49879c2402910372f4abc62630a427bbe033d190'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113468711,"monthly_visitor_count_in_millions":113,"user_count":277157467,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732421259000); window.Aedu.timeDifference = new Date().getTime() - 1732421259000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-296162c7af6fd81dcdd76f1a94f1fad04fb5f647401337d136fe8b68742170b1.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-8d53a22151f33ab413d88fa1c02f979c3f8706d470fc1bced09852c72a9f3454.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-f8fe82512740391f81c9e8cc48220144024b425b359b08194e316f4de070b9e8.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://ggsipu.academia.edu/TriptiGautam" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-9601d1cc3d68aa07c0a9901d03d3611aec04cc07d2a2039718ebef4ad4d148ca.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam","photo":"https://0.academia-photos.com/99080811/27084024/25503717/s65_tripti.gautam.jpg","has_photo":true,"department":{"id":39830,"name":"Computer Science","url":"https://ggsipu.academia.edu/Departments/Computer_Science/Documents","university":{"id":3880,"name":"Guru Gobind Singh Indraprastha University","url":"https://ggsipu.academia.edu/"}},"position":"Faculty Member","position_id":1,"is_analytics_public":false,"interests":[{"id":284934,"name":"Google Maps API V3","url":"https://www.academia.edu/Documents/in/Google_Maps_API_V3"},{"id":84092,"name":"Web Technology","url":"https://www.academia.edu/Documents/in/Web_Technology"},{"id":42204,"name":"Engineering Chemistry","url":"https://www.academia.edu/Documents/in/Engineering_Chemistry"},{"id":636574,"name":"Sms Gateway","url":"https://www.academia.edu/Documents/in/Sms_Gateway"},{"id":81988,"name":"Comparative studies","url":"https://www.academia.edu/Documents/in/Comparative_studies"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://ggsipu.academia.edu/TriptiGautam&quot;,&quot;location&quot;:&quot;/TriptiGautam&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;ggsipu.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/TriptiGautam&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-43dbb0b5-8c63-42e7-90b0-53725e007ea9"></div> <div id="ProfileCheckPaperUpdate-react-component-43dbb0b5-8c63-42e7-90b0-53725e007ea9"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Tripti Gautam" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/99080811/27084024/25503717/s200_tripti.gautam.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Tripti Gautam</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://ggsipu.academia.edu/">Guru Gobind Singh Indraprastha University</a>, <a class="u-tcGrayDarker" href="https://ggsipu.academia.edu/Departments/Computer_Science/Documents">Computer Science</a>, <span class="u-tcGrayDarker">Faculty Member</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Tripti" data-follow-user-id="99080811" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="99080811"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Follower</p><p class="data">1</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">27</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="99080811" href="https://www.academia.edu/Documents/in/Google_Maps_API_V3"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://ggsipu.academia.edu/TriptiGautam&quot;,&quot;location&quot;:&quot;/TriptiGautam&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;ggsipu.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/TriptiGautam&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Google Maps API V3&quot;]}" data-trace="false" data-dom-id="Pill-react-component-90145489-a22d-4c57-a029-f8207db00a64"></div> <div id="Pill-react-component-90145489-a22d-4c57-a029-f8207db00a64"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="99080811" href="https://www.academia.edu/Documents/in/Web_Technology"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Web Technology&quot;]}" data-trace="false" data-dom-id="Pill-react-component-2f770cd6-e342-462c-96f3-7a29effa288f"></div> <div id="Pill-react-component-2f770cd6-e342-462c-96f3-7a29effa288f"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="99080811" href="https://www.academia.edu/Documents/in/Engineering_Chemistry"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Engineering Chemistry&quot;]}" data-trace="false" data-dom-id="Pill-react-component-3ae6b5b3-f429-40db-9042-89204a5f5d6c"></div> <div id="Pill-react-component-3ae6b5b3-f429-40db-9042-89204a5f5d6c"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="99080811" href="https://www.academia.edu/Documents/in/Sms_Gateway"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Sms Gateway&quot;]}" data-trace="false" data-dom-id="Pill-react-component-bd443037-0dd7-49a0-ad8a-804f434196cd"></div> <div id="Pill-react-component-bd443037-0dd7-49a0-ad8a-804f434196cd"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="99080811" href="https://www.academia.edu/Documents/in/Comparative_studies"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Comparative studies&quot;]}" data-trace="false" data-dom-id="Pill-react-component-9c08d024-5998-4463-ae21-b71e0ff0860f"></div> <div id="Pill-react-component-9c08d024-5998-4463-ae21-b71e0ff0860f"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Tripti Gautam</h3></div><div class="js-work-strip profile--work_container" data-work-id="95609716"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of 15 Ms Data Mining Techniques for Software Defect Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/97744582/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction">15 Ms Data Mining Techniques for Software Defect Prediction</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Quality and reliability are the major challenges faced in a secure software development process. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client&amp;#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="448272788a0941c277a71aa6ba4d6f27" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:97744582,&quot;asset_id&quot;:95609716,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="95609716"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="95609716"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 95609716; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=95609716]").text(description); $(".js-view-count[data-work-id=95609716]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 95609716; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='95609716']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 95609716, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "448272788a0941c277a71aa6ba4d6f27" } } $('.js-work-strip[data-work-id=95609716]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":95609716,"title":"15 Ms Data Mining Techniques for Software Defect Prediction","translated_title":"","metadata":{"abstract":"Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client\u0026#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client\u0026#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...","internal_url":"https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2023-01-24T07:45:20.939-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":97744582,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744582/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744582/f201603011456811357-libre.pdf?1674576056=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=YYjLim5gMXi4RkpilAkgTiw4Mo3cwSS8yHYhH2gnfcA70NNI4eWCr96CQnWPhiNGcCOE94fkyCIA79-isPObPq5BJp2aYgTVoFx6FtHc11DDoeIcgCdJQWba22M~vQVeimcXwCI9PoNRIXy3cdthDSK0JbJKmqPUMjp3NC3IaUGmpGIa74ERqh0xoTdPsW7tQYJKBS9R3Q2KhPkTxTnDHaT04kEMtYtUJZvg1oVm1FnrK6VZHNX3YBwSoQZX2ABdNlyFaxdaPWpBDx0IERYyLJ-ah5yxtqSU0QQ-WiUxBR8Mvd4UO6NcXKwSU1Qwmw-2rRCgGNZo3VWarg-dCksDdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[{"id":97744582,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744582/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744582/f201603011456811357-libre.pdf?1674576056=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=YYjLim5gMXi4RkpilAkgTiw4Mo3cwSS8yHYhH2gnfcA70NNI4eWCr96CQnWPhiNGcCOE94fkyCIA79-isPObPq5BJp2aYgTVoFx6FtHc11DDoeIcgCdJQWba22M~vQVeimcXwCI9PoNRIXy3cdthDSK0JbJKmqPUMjp3NC3IaUGmpGIa74ERqh0xoTdPsW7tQYJKBS9R3Q2KhPkTxTnDHaT04kEMtYtUJZvg1oVm1FnrK6VZHNX3YBwSoQZX2ABdNlyFaxdaPWpBDx0IERYyLJ-ah5yxtqSU0QQ-WiUxBR8Mvd4UO6NcXKwSU1Qwmw-2rRCgGNZo3VWarg-dCksDdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":97744581,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744581/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744581/download_file","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744581/f201603011456811357-libre.pdf?1674576060=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=c8WYxcQ5hnTXCB7GGO1t8xRIZHGiSgzVjSYNmu2q~0~m9l8pY5kHwXDK-d83vzOKdn6~P8SG2sUZxmhkwstmu0ZuQin7oesc3QiKfe7m2ljBsch6G-hZxQdlNZDHhzXqGSMti3FL~0WDFQP13CwuJ6~rohZDp-oOCYhJwkMF~p8rtI1s5g8Oie1M8RmbqBao0IlpUDe6aIx-BPVYETkvRzF6HpwU1M7f6vZBkEiHuTlSfdteQcGpcCQtBN8NgRZr2imBzxshE1F4TsL2I7x0074mw7v7tEY3BCuubDI6QLqJV76ZZMtxf-Yr-91R1r04jWHEQszeuHh-2qUFdn4Tmw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":28353956,"url":"https://web.archive.org/web/20180423021746/http://www.academicscience.co.in/admin/resources/project/paper/f201603011456811357.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535751"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security"><img alt="Research paper thumbnail of Global Outlook of Cyber Security" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security">Global Outlook of Cyber Security</a></div><div class="wp-workCard_item"><span>Algorithms for intelligent systems</span><span>, Aug 4, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535751"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535751"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535751; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535751]").text(description); $(".js-view-count[data-work-id=90535751]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535751; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535751']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535751, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535751]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535751,"title":"Global Outlook of Cyber Security","translated_title":"","metadata":{"publication_date":{"day":4,"month":8,"year":2022,"errors":{}},"publication_name":"Algorithms for intelligent systems"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security","translated_internal_url":"","created_at":"2022-11-11T08:16:12.030-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Global_Outlook_of_Cyber_Security","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":9062,"name":"Safeguarding","url":"https://www.academia.edu/Documents/in/Safeguarding"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime"},{"id":245816,"name":"Preparedness","url":"https://www.academia.edu/Documents/in/Preparedness"}],"urls":[{"id":25839416,"url":"https://doi.org/10.1007/978-981-19-2065-3_30"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535749"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence"><img alt="Research paper thumbnail of Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence">Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence</a></div><div class="wp-workCard_item"><span>2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535749"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535749"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535749; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535749]").text(description); $(".js-view-count[data-work-id=90535749]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535749; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535749']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535749, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535749]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535749,"title":"Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence","translated_title":"","metadata":{"publisher":"IEEE","publication_name":"2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence","translated_internal_url":"","created_at":"2022-11-11T08:16:10.668-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":123230,"name":"Regression Analysis","url":"https://www.academia.edu/Documents/in/Regression_Analysis"},{"id":547379,"name":"Akaike Information Criterion","url":"https://www.academia.edu/Documents/in/Akaike_Information_Criterion"},{"id":1671282,"name":"Bayesian Information Criterion","url":"https://www.academia.edu/Documents/in/Bayesian_Information_Criterion"},{"id":3209333,"name":"Mean Squared Error","url":"https://www.academia.edu/Documents/in/Mean_Squared_Error"}],"urls":[{"id":25839414,"url":"http://xplorestaging.ieee.org/ielx7/9823381/9823413/09823692.pdf?arnumber=9823692"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535748"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques"><img alt="Research paper thumbnail of Software defect prediction using data mining techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques">Software defect prediction using data mining techniques</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlat...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535748"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535748"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535748; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535748]").text(description); $(".js-view-count[data-work-id=90535748]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535748; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535748']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535748, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535748]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535748,"title":"Software defect prediction using data mining techniques","translated_title":"","metadata":{"abstract":"Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}}},"translated_abstract":"Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.","internal_url":"https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques","translated_internal_url":"","created_at":"2022-11-11T08:16:09.444-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Software_defect_prediction_using_data_mining_techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":82174,"name":"University","url":"https://www.academia.edu/Documents/in/University"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535741"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of Optimal Machine learning Model for Software Defect Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/94072630/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction">Optimal Machine learning Model for Software Defect Prediction</a></div><div class="wp-workCard_item"><span>International Journal of Intelligent Systems and Applications</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="13cd44b4717ebfabc196655a549ad871" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:94072630,&quot;asset_id&quot;:90535741,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535741"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535741"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535741; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535741]").text(description); $(".js-view-count[data-work-id=90535741]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535741; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535741']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535741, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "13cd44b4717ebfabc196655a549ad871" } } $('.js-work-strip[data-work-id=90535741]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535741,"title":"Optimal Machine learning Model for Software Defect Prediction","translated_title":"","metadata":{"publisher":"MECS Publisher","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"International Journal of Intelligent Systems and Applications"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2022-11-11T08:15:57.985-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":94072630,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072630/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072630/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=JiRyuphhpRf5dXwAEEsZCe6SE-0PbMiCVQSoI-iPRVAvL80gjOVhRI5VvSZqYzrcc3KiIWyXLTaGljkp-cvCaTfKHUESZvYJJUdYc4lQKBMvjykx6~ElihYa4Zwu06DcZho-D0j~9H7~ktxX2MU~GRQ5OAN1rQwNjZ0sE95-DI6X7-Jwtlq4JzktO5jKUcYaRJQqOu82BUhRBIRBcrgzC7Vhg3-QEbzpiVzQhejLH2nHEy5YUMMGxWN6qpsL6hqAA9GhdKLYyikZyqYf6skdtJgjM1JBLDAhQv~XHu0lUxMdoUhkUohAnN1V4bARhnRzgnXMqpjqAjMWqZB0Yi0uVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Optimal_Machine_learning_Model_for_Software_Defect_Prediction","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[{"id":94072630,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072630/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072630/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=JiRyuphhpRf5dXwAEEsZCe6SE-0PbMiCVQSoI-iPRVAvL80gjOVhRI5VvSZqYzrcc3KiIWyXLTaGljkp-cvCaTfKHUESZvYJJUdYc4lQKBMvjykx6~ElihYa4Zwu06DcZho-D0j~9H7~ktxX2MU~GRQ5OAN1rQwNjZ0sE95-DI6X7-Jwtlq4JzktO5jKUcYaRJQqOu82BUhRBIRBcrgzC7Vhg3-QEbzpiVzQhejLH2nHEy5YUMMGxWN6qpsL6hqAA9GhdKLYyikZyqYf6skdtJgjM1JBLDAhQv~XHu0lUxMdoUhkUohAnN1V4bARhnRzgnXMqpjqAjMWqZB0Yi0uVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":94072631,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072631/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072631/download_file","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072631/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=eOzj~jS2C3tJWyKU250ySJNxHOdZGF9nMoMO99TzYq9hSgajdCzYYLKLghSq8mOMuJD8diIqupTOL8Hk8vb07XGaaOr0xRrjC5leNVarq8IDKJN1jAPsnFfT~ozLkclIAHR5bodAiiINAPAnyn4gRSMiGb8Ly4raUsf47aVSX6HhzjeSTDUK~3PaGotKciq6ASx7y3ooBVFwV9qF0aQzwABTOEqJpqEzSzvYSgrCgiK7ugMM61fjyLoTzm-CwF4IMiQBVX69NocaA-Dv04YYacADgfvO-OGEhyhtv682XrR5roscYmuh0DvO2zTYa1VzYZERgO7O5mKUGnuQuyoI5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":53293,"name":"Software","url":"https://www.academia.edu/Documents/in/Software"}],"urls":[{"id":25839411,"url":"http://www.mecs-press.org/ijisa/ijisa-v11-n2/IJISA-V11-N2-5.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837244"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity"><img alt="Research paper thumbnail of Role of Technology in Globalization with Reference to Business Continuity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity">Role of Technology in Globalization with Reference to Business Continuity</a></div><div class="wp-workCard_item"><span>Global Journal of Enterprise Information System</span><span>, 2009</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Technology is the vital force in the modern form of business globalization. Technology has revolu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837244"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837244"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837244; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837244]").text(description); $(".js-view-count[data-work-id=78837244]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837244; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837244']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837244, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837244]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837244,"title":"Role of Technology in Globalization with Reference to Business Continuity","translated_title":"","metadata":{"abstract":"Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...","publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"Global Journal of Enterprise Information System"},"translated_abstract":"Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...","internal_url":"https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity","translated_internal_url":"","created_at":"2022-05-09T03:28:47.280-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics"},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837243"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques"><img alt="Research paper thumbnail of Comparative Analysis of Different Machine Learning Techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques">Comparative Analysis of Different Machine Learning Techniques</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Artificial learning (AI) is one of the areas of computer science which develops the system in a w...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837243"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837243"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837243; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837243]").text(description); $(".js-view-count[data-work-id=78837243]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837243; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837243']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837243, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837243]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837243,"title":"Comparative Analysis of Different Machine Learning Techniques","translated_title":"","metadata":{"abstract":"Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.","internal_url":"https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques","translated_internal_url":"","created_at":"2022-05-09T03:28:47.173-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Comparative_Analysis_of_Different_Machine_Learning_Techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837242"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects"><img alt="Research paper thumbnail of Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects">Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Different nations are striving to implement e-governance on a full scale. The major issue is the ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837242"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837242"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837242; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837242]").text(description); $(".js-view-count[data-work-id=78837242]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837242; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837242']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837242, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837242]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837242,"title":"Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects","translated_title":"","metadata":{"abstract":"Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.","internal_url":"https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects","translated_internal_url":"","created_at":"2022-05-09T03:28:47.064-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837241"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment"><img alt="Research paper thumbnail of A Study of Cyber Security in Web Environment" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment">A Study of Cyber Security in Web Environment</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today&amp;#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837241"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837241"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837241; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837241]").text(description); $(".js-view-count[data-work-id=78837241]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837241; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837241']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837241, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837241]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837241,"title":"A Study of Cyber Security in Web Environment","translated_title":"","metadata":{"abstract":"Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today\u0026#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.","publication_date":{"day":null,"month":null,"year":2014,"errors":{}}},"translated_abstract":"Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today\u0026#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.","internal_url":"https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment","translated_internal_url":"","created_at":"2022-05-09T03:28:46.970-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_Study_of_Cyber_Security_in_Web_Environment","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837169"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of Optimal Metrics Selection for Software Defect Prediction" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction">Optimal Metrics Selection for Software Defect Prediction</a></div><div class="wp-workCard_item"><span>International Journal of Data Mining and Emerging Technologies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software metrics are a very important component in software development area. The most important ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837169"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837169"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837169; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837169]").text(description); $(".js-view-count[data-work-id=78837169]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837169; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837169']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837169, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837169]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837169,"title":"Optimal Metrics Selection for Software Defect Prediction","translated_title":"","metadata":{"abstract":"Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.","publisher":"Diva Enterprises Private Limited","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"International Journal of Data Mining and Emerging Technologies"},"translated_abstract":"Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.","internal_url":"https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2022-05-09T03:28:17.546-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Optimal_Metrics_Selection_for_Software_Defect_Prediction","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="67508654"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity"><img alt="Research paper thumbnail of Role of Technology in Globalization with reference to Business Continuity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity">Role of Technology in Globalization with reference to Business Continuity</a></div><div class="wp-workCard_item"><span>Global Journal of Enterprise Information …</span><span>, 2010</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global J...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri <a href="mailto:triptigautam@yahoo.co.in" rel="nofollow">triptigautam@yahoo.co.in</a> Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="67508654"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="67508654"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 67508654; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=67508654]").text(description); $(".js-view-count[data-work-id=67508654]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 67508654; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='67508654']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 67508654, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=67508654]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":67508654,"title":"Role of Technology in Globalization with reference to Business Continuity","translated_title":"","metadata":{"abstract":"... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...","publisher":"ejournal.co.in","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Global Journal of Enterprise Information …"},"translated_abstract":"... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...","internal_url":"https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity","translated_internal_url":"","created_at":"2022-01-07T03:26:46.831-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="13632133" id="papers"><div class="js-work-strip profile--work_container" data-work-id="95609716"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of 15 Ms Data Mining Techniques for Software Defect Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/97744582/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction">15 Ms Data Mining Techniques for Software Defect Prediction</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Quality and reliability are the major challenges faced in a secure software development process. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client&amp;#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="448272788a0941c277a71aa6ba4d6f27" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:97744582,&quot;asset_id&quot;:95609716,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="95609716"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="95609716"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 95609716; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=95609716]").text(description); $(".js-view-count[data-work-id=95609716]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 95609716; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='95609716']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 95609716, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "448272788a0941c277a71aa6ba4d6f27" } } $('.js-work-strip[data-work-id=95609716]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":95609716,"title":"15 Ms Data Mining Techniques for Software Defect Prediction","translated_title":"","metadata":{"abstract":"Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client\u0026#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"Quality and reliability are the major challenges faced in a secure software development process. There are major software cost overruns when a software product with bugs in its various components is deployed at client\u0026#39;s side. The software warehouse is commonly used as record keeping repository which is mostly required while adding new features or fixing bugs. Software bugs lead to inaccurate and different results. As an outcome, the software projects run late, are cancelled or becomes unreliable after deployment This paper entails a detailed literature review on the existence of software failures in the recent past, while briefly discussing about the severe repercussions of these failures. In order to identify these bugs timely, different data mining techniques have been discussed, and used by the researchers profusely, simultaneously with the bug tracking systems to locate the occurrence of the bugs precisely. Bug tracking system plays a vital role in software project as poorly...","internal_url":"https://www.academia.edu/95609716/15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2023-01-24T07:45:20.939-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":97744582,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744582/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744582/f201603011456811357-libre.pdf?1674576056=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=YYjLim5gMXi4RkpilAkgTiw4Mo3cwSS8yHYhH2gnfcA70NNI4eWCr96CQnWPhiNGcCOE94fkyCIA79-isPObPq5BJp2aYgTVoFx6FtHc11DDoeIcgCdJQWba22M~vQVeimcXwCI9PoNRIXy3cdthDSK0JbJKmqPUMjp3NC3IaUGmpGIa74ERqh0xoTdPsW7tQYJKBS9R3Q2KhPkTxTnDHaT04kEMtYtUJZvg1oVm1FnrK6VZHNX3YBwSoQZX2ABdNlyFaxdaPWpBDx0IERYyLJ-ah5yxtqSU0QQ-WiUxBR8Mvd4UO6NcXKwSU1Qwmw-2rRCgGNZo3VWarg-dCksDdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"15_Ms_Data_Mining_Techniques_for_Software_Defect_Prediction","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[{"id":97744582,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744582/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744582/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744582/f201603011456811357-libre.pdf?1674576056=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=YYjLim5gMXi4RkpilAkgTiw4Mo3cwSS8yHYhH2gnfcA70NNI4eWCr96CQnWPhiNGcCOE94fkyCIA79-isPObPq5BJp2aYgTVoFx6FtHc11DDoeIcgCdJQWba22M~vQVeimcXwCI9PoNRIXy3cdthDSK0JbJKmqPUMjp3NC3IaUGmpGIa74ERqh0xoTdPsW7tQYJKBS9R3Q2KhPkTxTnDHaT04kEMtYtUJZvg1oVm1FnrK6VZHNX3YBwSoQZX2ABdNlyFaxdaPWpBDx0IERYyLJ-ah5yxtqSU0QQ-WiUxBR8Mvd4UO6NcXKwSU1Qwmw-2rRCgGNZo3VWarg-dCksDdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":97744581,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/97744581/thumbnails/1.jpg","file_name":"f201603011456811357.pdf","download_url":"https://www.academia.edu/attachments/97744581/download_file","bulk_download_file_name":"15_Ms_Data_Mining_Techniques_for_Softwar.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/97744581/f201603011456811357-libre.pdf?1674576060=\u0026response-content-disposition=attachment%3B+filename%3D15_Ms_Data_Mining_Techniques_for_Softwar.pdf\u0026Expires=1732424727\u0026Signature=c8WYxcQ5hnTXCB7GGO1t8xRIZHGiSgzVjSYNmu2q~0~m9l8pY5kHwXDK-d83vzOKdn6~P8SG2sUZxmhkwstmu0ZuQin7oesc3QiKfe7m2ljBsch6G-hZxQdlNZDHhzXqGSMti3FL~0WDFQP13CwuJ6~rohZDp-oOCYhJwkMF~p8rtI1s5g8Oie1M8RmbqBao0IlpUDe6aIx-BPVYETkvRzF6HpwU1M7f6vZBkEiHuTlSfdteQcGpcCQtBN8NgRZr2imBzxshE1F4TsL2I7x0074mw7v7tEY3BCuubDI6QLqJV76ZZMtxf-Yr-91R1r04jWHEQszeuHh-2qUFdn4Tmw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":28353956,"url":"https://web.archive.org/web/20180423021746/http://www.academicscience.co.in/admin/resources/project/paper/f201603011456811357.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535751"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security"><img alt="Research paper thumbnail of Global Outlook of Cyber Security" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security">Global Outlook of Cyber Security</a></div><div class="wp-workCard_item"><span>Algorithms for intelligent systems</span><span>, Aug 4, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535751"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535751"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535751; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535751]").text(description); $(".js-view-count[data-work-id=90535751]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535751; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535751']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535751, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535751]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535751,"title":"Global Outlook of Cyber Security","translated_title":"","metadata":{"publication_date":{"day":4,"month":8,"year":2022,"errors":{}},"publication_name":"Algorithms for intelligent systems"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535751/Global_Outlook_of_Cyber_Security","translated_internal_url":"","created_at":"2022-11-11T08:16:12.030-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Global_Outlook_of_Cyber_Security","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security"},{"id":9062,"name":"Safeguarding","url":"https://www.academia.edu/Documents/in/Safeguarding"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime"},{"id":245816,"name":"Preparedness","url":"https://www.academia.edu/Documents/in/Preparedness"}],"urls":[{"id":25839416,"url":"https://doi.org/10.1007/978-981-19-2065-3_30"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535749"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence"><img alt="Research paper thumbnail of Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence">Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence</a></div><div class="wp-workCard_item"><span>2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535749"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535749"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535749; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535749]").text(description); $(".js-view-count[data-work-id=90535749]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535749; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535749']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535749, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535749]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535749,"title":"Optimization of Bug Detection Model(OBDM):By Evaluating Performance Metric using Artificial Intelligence","translated_title":"","metadata":{"publisher":"IEEE","publication_name":"2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535749/Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence","translated_internal_url":"","created_at":"2022-11-11T08:16:10.668-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Optimization_of_Bug_Detection_Model_OBDM_By_Evaluating_Performance_Metric_using_Artificial_Intelligence","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":123230,"name":"Regression Analysis","url":"https://www.academia.edu/Documents/in/Regression_Analysis"},{"id":547379,"name":"Akaike Information Criterion","url":"https://www.academia.edu/Documents/in/Akaike_Information_Criterion"},{"id":1671282,"name":"Bayesian Information Criterion","url":"https://www.academia.edu/Documents/in/Bayesian_Information_Criterion"},{"id":3209333,"name":"Mean Squared Error","url":"https://www.academia.edu/Documents/in/Mean_Squared_Error"}],"urls":[{"id":25839414,"url":"http://xplorestaging.ieee.org/ielx7/9823381/9823413/09823692.pdf?arnumber=9823692"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535748"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques"><img alt="Research paper thumbnail of Software defect prediction using data mining techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques">Software defect prediction using data mining techniques</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlat...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535748"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535748"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535748; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535748]").text(description); $(".js-view-count[data-work-id=90535748]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535748; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535748']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535748, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=90535748]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535748,"title":"Software defect prediction using data mining techniques","translated_title":"","metadata":{"abstract":"Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}}},"translated_abstract":"Software metrics, Feature selection, Boruta, regsubsets FSelector, Random Forest, Linear correlation, Rank Correlation, Information gain, Linear Regression, Random Forest, Neural Network, Support Vector Machine, Decision Tree, Decision Stump.","internal_url":"https://www.academia.edu/90535748/Software_defect_prediction_using_data_mining_techniques","translated_internal_url":"","created_at":"2022-11-11T08:16:09.444-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Software_defect_prediction_using_data_mining_techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":82174,"name":"University","url":"https://www.academia.edu/Documents/in/University"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="90535741"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of Optimal Machine learning Model for Software Defect Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/94072630/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction">Optimal Machine learning Model for Software Defect Prediction</a></div><div class="wp-workCard_item"><span>International Journal of Intelligent Systems and Applications</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="13cd44b4717ebfabc196655a549ad871" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:94072630,&quot;asset_id&quot;:90535741,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="90535741"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="90535741"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 90535741; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=90535741]").text(description); $(".js-view-count[data-work-id=90535741]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 90535741; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='90535741']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 90535741, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "13cd44b4717ebfabc196655a549ad871" } } $('.js-work-strip[data-work-id=90535741]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":90535741,"title":"Optimal Machine learning Model for Software Defect Prediction","translated_title":"","metadata":{"publisher":"MECS Publisher","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"International Journal of Intelligent Systems and Applications"},"translated_abstract":null,"internal_url":"https://www.academia.edu/90535741/Optimal_Machine_learning_Model_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2022-11-11T08:15:57.985-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":94072630,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072630/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072630/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=JiRyuphhpRf5dXwAEEsZCe6SE-0PbMiCVQSoI-iPRVAvL80gjOVhRI5VvSZqYzrcc3KiIWyXLTaGljkp-cvCaTfKHUESZvYJJUdYc4lQKBMvjykx6~ElihYa4Zwu06DcZho-D0j~9H7~ktxX2MU~GRQ5OAN1rQwNjZ0sE95-DI6X7-Jwtlq4JzktO5jKUcYaRJQqOu82BUhRBIRBcrgzC7Vhg3-QEbzpiVzQhejLH2nHEy5YUMMGxWN6qpsL6hqAA9GhdKLYyikZyqYf6skdtJgjM1JBLDAhQv~XHu0lUxMdoUhkUohAnN1V4bARhnRzgnXMqpjqAjMWqZB0Yi0uVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Optimal_Machine_learning_Model_for_Software_Defect_Prediction","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[{"id":94072630,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072630/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072630/download_file?st=MTczMjQyMTI1OSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072630/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=JiRyuphhpRf5dXwAEEsZCe6SE-0PbMiCVQSoI-iPRVAvL80gjOVhRI5VvSZqYzrcc3KiIWyXLTaGljkp-cvCaTfKHUESZvYJJUdYc4lQKBMvjykx6~ElihYa4Zwu06DcZho-D0j~9H7~ktxX2MU~GRQ5OAN1rQwNjZ0sE95-DI6X7-Jwtlq4JzktO5jKUcYaRJQqOu82BUhRBIRBcrgzC7Vhg3-QEbzpiVzQhejLH2nHEy5YUMMGxWN6qpsL6hqAA9GhdKLYyikZyqYf6skdtJgjM1JBLDAhQv~XHu0lUxMdoUhkUohAnN1V4bARhnRzgnXMqpjqAjMWqZB0Yi0uVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":94072631,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/94072631/thumbnails/1.jpg","file_name":"IJISA-V11-N2-5.pdf","download_url":"https://www.academia.edu/attachments/94072631/download_file","bulk_download_file_name":"Optimal_Machine_learning_Model_for_Softw.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/94072631/IJISA-V11-N2-5-libre.pdf?1668186213=\u0026response-content-disposition=attachment%3B+filename%3DOptimal_Machine_learning_Model_for_Softw.pdf\u0026Expires=1732424727\u0026Signature=eOzj~jS2C3tJWyKU250ySJNxHOdZGF9nMoMO99TzYq9hSgajdCzYYLKLghSq8mOMuJD8diIqupTOL8Hk8vb07XGaaOr0xRrjC5leNVarq8IDKJN1jAPsnFfT~ozLkclIAHR5bodAiiINAPAnyn4gRSMiGb8Ly4raUsf47aVSX6HhzjeSTDUK~3PaGotKciq6ASx7y3ooBVFwV9qF0aQzwABTOEqJpqEzSzvYSgrCgiK7ugMM61fjyLoTzm-CwF4IMiQBVX69NocaA-Dv04YYacADgfvO-OGEhyhtv682XrR5roscYmuh0DvO2zTYa1VzYZERgO7O5mKUGnuQuyoI5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":53293,"name":"Software","url":"https://www.academia.edu/Documents/in/Software"}],"urls":[{"id":25839411,"url":"http://www.mecs-press.org/ijisa/ijisa-v11-n2/IJISA-V11-N2-5.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837244"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity"><img alt="Research paper thumbnail of Role of Technology in Globalization with Reference to Business Continuity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity">Role of Technology in Globalization with Reference to Business Continuity</a></div><div class="wp-workCard_item"><span>Global Journal of Enterprise Information System</span><span>, 2009</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Technology is the vital force in the modern form of business globalization. Technology has revolu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837244"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837244"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837244; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837244]").text(description); $(".js-view-count[data-work-id=78837244]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837244; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837244']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837244, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837244]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837244,"title":"Role of Technology in Globalization with Reference to Business Continuity","translated_title":"","metadata":{"abstract":"Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...","publication_date":{"day":null,"month":null,"year":2009,"errors":{}},"publication_name":"Global Journal of Enterprise Information System"},"translated_abstract":"Technology is the vital force in the modern form of business globalization. Technology has revolutionized the global economy and has become critical competitive strategy. It has globalized the world, which drive all the countries to more ethical standards. This paper attempts to show how Technology revolution is sweeping the globe and the transition from manual to electronic delivery of services both in public and private sector leads to advancement of business community throughout the world. Globalization has lead to new markets and information technology is one of the technologies fostered to the new market in this increasing competitive world. Technology has helped us in overcoming the major hurdles of globalization and international trade such as trade barrier, lack of common ethical standard, transportation cost and delay in information exchange, thereby changing the market place. Technology has enabled the software experts to work collaboratively over the network with companie...","internal_url":"https://www.academia.edu/78837244/Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity","translated_internal_url":"","created_at":"2022-05-09T03:28:47.280-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Role_of_Technology_in_Globalization_with_Reference_to_Business_Continuity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics"},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837243"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques"><img alt="Research paper thumbnail of Comparative Analysis of Different Machine Learning Techniques" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques">Comparative Analysis of Different Machine Learning Techniques</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Artificial learning (AI) is one of the areas of computer science which develops the system in a w...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837243"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837243"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837243; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837243]").text(description); $(".js-view-count[data-work-id=78837243]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837243; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837243']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837243, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837243]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837243,"title":"Comparative Analysis of Different Machine Learning Techniques","translated_title":"","metadata":{"abstract":"Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Artificial learning (AI) is one of the areas of computer science which develops the system in a way that our system starts learning and gives the reaction as a human brain does. This paper discussed one of the branches of AI i.e. Machine learning as the name suggests it focuses on the development of the computers especially their programs that access the data that can be used for self-development. The main objective of the paper is to compare the best machine learning model by using the performance parameter R squared and Mean square Error (MSE). The data set was taken from the promise repository for the analysis. Feature selection technique Boruta was applied to find the important/confirmed variables from the dataset which are having information regarding the JAVA projects. This paper finds out that among different algorithms which one outperforms when the comparative analysis was done to find the best model.","internal_url":"https://www.academia.edu/78837243/Comparative_Analysis_of_Different_Machine_Learning_Techniques","translated_internal_url":"","created_at":"2022-05-09T03:28:47.173-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Comparative_Analysis_of_Different_Machine_Learning_Techniques","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837242"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects"><img alt="Research paper thumbnail of Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects">Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Different nations are striving to implement e-governance on a full scale. The major issue is the ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837242"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837242"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837242; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837242]").text(description); $(".js-view-count[data-work-id=78837242]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837242; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837242']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837242, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837242]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837242,"title":"Security Analysis of Cyber Attacks Using Machine Learning Algorithms in eGovernance Projects","translated_title":"","metadata":{"abstract":"Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Different nations are striving to implement e-governance on a full scale. The major issue is the problem of secure transactions with high privacy. In order to make sure that the government is functioning properly, there must be a high level of transparency in the system with high accountability, integrity and confidentiality. The risks and challenges that arises by implementing the e-governance are chiefly because of the poor security in free WiFi networks which are given for accessing the e-services. Hence, researchers must develop methods and tools which can react to the attacks and defend themselves autonomously. This paper helps in analysis of few categories of cyber attacks using machine learning algorithms.","internal_url":"https://www.academia.edu/78837242/Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects","translated_internal_url":"","created_at":"2022-05-09T03:28:47.064-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Security_Analysis_of_Cyber_Attacks_Using_Machine_Learning_Algorithms_in_eGovernance_Projects","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837241"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment"><img alt="Research paper thumbnail of A Study of Cyber Security in Web Environment" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment">A Study of Cyber Security in Web Environment</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today&amp;#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837241"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837241"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837241; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837241]").text(description); $(".js-view-count[data-work-id=78837241]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837241; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837241']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837241, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837241]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837241,"title":"A Study of Cyber Security in Web Environment","translated_title":"","metadata":{"abstract":"Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today\u0026#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.","publication_date":{"day":null,"month":null,"year":2014,"errors":{}}},"translated_abstract":"Over the last few years, threats in cyberspace have risen dramatically. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow the smooth working of infrastructures in any organization. Since cyberspace is widely adopted and used worldwide, there is need of healthy functioning of cyberspace in terms of economical and national security. There are number of policies, strategies, actions that are taking place to reduce the threat of cybercrime in Today\u0026#39;s world. This paper focuses on the “Need of Cyber security” and various areas of emerging technologies where Cyber Threats exist in different forms. Some of the crimes in various areas that occurred are also studied.","internal_url":"https://www.academia.edu/78837241/A_Study_of_Cyber_Security_in_Web_Environment","translated_internal_url":"","created_at":"2022-05-09T03:28:46.970-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_Study_of_Cyber_Security_in_Web_Environment","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78837169"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction"><img alt="Research paper thumbnail of Optimal Metrics Selection for Software Defect Prediction" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction">Optimal Metrics Selection for Software Defect Prediction</a></div><div class="wp-workCard_item"><span>International Journal of Data Mining and Emerging Technologies</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software metrics are a very important component in software development area. The most important ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78837169"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78837169"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78837169; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78837169]").text(description); $(".js-view-count[data-work-id=78837169]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78837169; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78837169']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78837169, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78837169]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78837169,"title":"Optimal Metrics Selection for Software Defect Prediction","translated_title":"","metadata":{"abstract":"Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.","publisher":"Diva Enterprises Private Limited","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"International Journal of Data Mining and Emerging Technologies"},"translated_abstract":"Software metrics are a very important component in software development area. The most important challenge of any software developer is that ‘the software should be 100% accurate or with minimal defect’ when it reaches to the end-user. The earlier the defect is detected, the earlier the development cost also gets reduced. This is a fact that more complex the data or software, there is a more probability of the defect. So it is always desirable to use only the relevant and important data for the software development which will definitely reduce time and cost of the developer. The main objective of this paper is to find the important and relevant metrics in the software modules which will reduce the attribute in a data set. More the number of variables, more complex will be the system and more the defects; so it is always preferable to select the small feature set using feature selection and focus only on the important variable. The data set for the software bug prediction Chidamber and Kemerer metrics and Object Oriented metrics were taken from the Promise repository which is publicly available. The experiment from the 10 software modules (Jureczko M. Software Engineering: An International Journal 2011;1(1):95), ant, ivy, tomcat, berek, camel, jedit, lucene, poi, synapse and velocity, using feature selection techniques, Boruta, regsubset and FSelector, has shown that response for a class, lines of code and weighted methods for class are the most optimal metrics, whereas number of children and Depth of Inheritance Tree are least significant.","internal_url":"https://www.academia.edu/78837169/Optimal_Metrics_Selection_for_Software_Defect_Prediction","translated_internal_url":"","created_at":"2022-05-09T03:28:17.546-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Optimal_Metrics_Selection_for_Software_Defect_Prediction","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="67508654"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity"><img alt="Research paper thumbnail of Role of Technology in Globalization with reference to Business Continuity" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity">Role of Technology in Globalization with reference to Business Continuity</a></div><div class="wp-workCard_item"><span>Global Journal of Enterprise Information …</span><span>, 2010</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global J...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri <a href="mailto:triptigautam@yahoo.co.in" rel="nofollow">triptigautam@yahoo.co.in</a> Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="67508654"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="67508654"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 67508654; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=67508654]").text(description); $(".js-view-count[data-work-id=67508654]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 67508654; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='67508654']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 67508654, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=67508654]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":67508654,"title":"Role of Technology in Globalization with reference to Business Continuity","translated_title":"","metadata":{"abstract":"... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...","publisher":"ejournal.co.in","publication_date":{"day":null,"month":null,"year":2010,"errors":{}},"publication_name":"Global Journal of Enterprise Information …"},"translated_abstract":"... Page 70 Harmeet Malhotra Tripti Lamba IITM Jankpuri triptigautam@yahoo.co.in Page 2. Global Journal of Enterprise Information System Global Journal of Enterprise Information System July 2009-Dec 2009 Volume-1 Issue-2 ...","internal_url":"https://www.academia.edu/67508654/Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity","translated_internal_url":"","created_at":"2022-01-07T03:26:46.831-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":99080811,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Role_of_Technology_in_Globalization_with_reference_to_Business_Continuity","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":99080811,"first_name":"Tripti","middle_initials":null,"last_name":"Gautam","page_name":"TriptiGautam","domain_name":"ggsipu","created_at":"2018-12-12T21:12:09.574-08:00","display_name":"Tripti Gautam","url":"https://ggsipu.academia.edu/TriptiGautam"},"attachments":[],"research_interests":[{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "eb6989d9d393cb9342c299647e511134d90d0ab300a8c425addef6b99b064943", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="nUPuAnTqpsH8qv4/j9bNFTkYsDtp884f2JSgySMsil2/wwZBeZ/HV8Bd6Cq5TDJfWGCY4SB1Pyx3l8mXEgnlcA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://ggsipu.academia.edu/TriptiGautam" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="EAHQShn4wimfwr8HIWlgP776QUr4yEvG/2T98BacPDsygTgJFI2jv6M1qRIX859134JpkLFOuvVQZ5SuJ7lTFg==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10