Analyzing complexity nature inspired optimization algorithms using halstead metrics

Nowadays the research is focusing on new software development and analyzing or comparing the existing technologies. One of the rising zones of Software Engineering is Software Metrics. Software Metrics is used to test the quality of code without its execution. The primary Objective of the study is to analyze different software metrics for most commonly used nature-inspired optimization techniques like Genetic optimization and Ant-Colony Optimization. We analyze both the optimization algorithm in terms of solving traveling salesman problem which is developed in java.

[2]  Chandra Segar Thirumalai,et al.  ON NON-LINEAR SET ASSOCIATIVE CACHE DESIGN , 2017 .

[3]  Chandra Segar Thirumalai,et al.  SPANNING TREE APPROACH FOR ERROR DETECTION AND CORRECTION , 2017 .

[4]  Chandrasegar Thirumalai,et al.  Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[5]  Chandra Segar Thirumalai REVIEW ON THE MEMORY EFFICIENT RSA VARIANTS , 2017 .

[6]  Chandrasegar Thirumalai,et al.  Analyzing the forest fire using correlation methods , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[7]  R. Fisher 014: On the "Probable Error" of a Coefficient of Correlation Deduced from a Small Sample. , 1921 .

[8]  Yang Wang,et al.  Dissecting pattern unlock: The effect of pattern strength meter on pattern selection , 2014, J. Inf. Secur. Appl..

[9]  Chandra Segar Thirumalai PHYSICIANS DRUG ENCODING SYSTEM USING AN EFFICIENT AND SECURED LINEAR PUBLIC KEY CRYPTOSYSTEM (ESLPKC) , 2016 .

[10]  P. Venkata Krishna,et al.  Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[11]  Yi Wang,et al.  An improved ridge features extraction algorithm for distorted fingerprints matching , 2013, J. Inf. Secur. Appl..

[12]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[13]  P. Venkata Krishna,et al.  A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology , 2014, IEEE Journal of Biomedical and Health Informatics.

[14]  C. Spearman General intelligence Objectively Determined and Measured , 1904 .

[15]  F. Galton Kinship and Correlation , 1989 .

[16]  Chandra Segar Thirumalai,et al.  SYSTEM USING BASE 128 ENCODING SCHEME , 2017 .

[17]  P. Viswanathan,et al.  Fingerprint enhancement and compression method using Morlet wavelet , 2010 .

[18]  Chandrasegar Thirumalai,et al.  Physicians medicament using linear public key crypto system , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[19]  Daniele Sgandurra,et al.  Automating the assessment of ICT risk , 2014, J. Inf. Secur. Appl..

[20]  G. Yule On the significance of Bravais' formulæ for regression, &c., in the case of skew correlation , 2022, Proceedings of the Royal Society of London.

[21]  Chandrasegar Thirumalai,et al.  Data analysis using box and whisker plot for lung cancer , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[22]  P. Venkata Krishna,et al.  Fusion of Cryptographic Watermarking Medical Image System with Reversible Property , 2011 .

[23]  Chandrasegar Thirumalai,et al.  Analysing the concrete compressive strength using Pearson and Spearman , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[24]  Typical Laws of Heredity , 1877, Nature.

[25]  Chandrasegar Thirumalai,et al.  Evaluating software metrics of gaming applications using code counter tool for C and C++ (CCCC) , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[26]  Chandrasegar Thirumalai,et al.  Multi key distribution scheme by diophantine form for secure IoT communications , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[27]  A. Vijayalakshmi,et al.  Heuristics prediction of olympic medals using machine learning , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[28]  D. Griffith Spatial Autocorrelation and Spatial Filtering , 2003 .

[29]  Chandrasegar Thirumalai,et al.  Investigating the breast cancer tissue utilizing semi-supervised learning and similarity measure , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[30]  Paul A. Watters,et al.  A methodology for estimating the tangible cost of data breaches , 2014, J. Inf. Secur. Appl..

[31]  F. Galton I. Co-relations and their measurement, chiefly from anthropometric data , 1889, Proceedings of the Royal Society of London.

[32]  Salil S. Kanhere,et al.  Trust-based privacy-aware participant selection in social participatory sensing , 2015, J. Inf. Secur. Appl..

[33]  Adam J. Aviv,et al.  Cross-domain collaboration for improved IDS rule set selection , 2015, J. Inf. Secur. Appl..

[34]  M. Koch,et al.  Prognostic impact of a compartment-specific angiogenic marker profile in patients with pancreatic cancer , 2014, OncoTarget.

[35]  Paolo Nesi,et al.  A method and tool for assessing object-oriented projects and metrics management , 2000, J. Syst. Softw..

[36]  Benjamin J. Raphael,et al.  Multiplatform Analysis of 12 Cancer Types Reveals Molecular Classification within and across Tissues of Origin , 2014, Cell.

[37]  Shari Lawrence Pfleeger,et al.  Software Metrics : A Rigorous and Practical Approach , 1998 .

[38]  N Chandramowliswaran,et al.  A Note on Linear based Set Associative Cache address System , 2012 .

[39]  Chandrasegar Thirumalai,et al.  An assessment of halstead and COCOMO model for effort estimation , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[40]  Chandrasegar Thirumalai,et al.  Analysis of cost estimation function for facebook web click data , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[41]  R. Vijayaragavan,et al.  Pell's RSA key generation and its security analysis , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[42]  Chandrasegar Thirumalai,et al.  One-Dimension Force Balance System for Hypersonic Vehicle an experimental and Fuzzy Prediction Approach , 2018 .

[43]  Chandrasegar Thirumalai,et al.  Decision making system using machine learning and Pearson for heart attack , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[44]  Chandrasegar Thirumalai,et al.  An assessment framework of intuitionistic fuzzy network for C2B decision making , 2017, 2017 4th International Conference on Electronics and Communication Systems (ICECS).

[45]  Chandrasegar Thirumalai,et al.  An assessment framework for Precipitation decision making using AHP , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[46]  R. Kanimozhi,et al.  Data analysis using box plot on electricity consumption , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).