Satwinder Singh

Satwinder Singh
Central University of Punjab | UCP · Department of Computer Science & Technology

PhD

About

70
Publications
31,632
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
988
Citations
Additional affiliations
February 2020 - July 2021
Central University of Punjab
Position
  • Professor (Associate)
December 2015 - December 2018
Central University of Punjab
Position
  • Professor (Assistant)
August 2006 - December 2015
Baba Banda Singh Bahadur Engineering College
Position
  • Professor (Assistant)

Publications

Publications (70)
Article
The Deep Learning model benefits from the information extracted from images, which enhances its understanding of human vision with comparable accuracy and speed. However, the publicly available dataset lacks the necessary diversity in image categories. Consequently, there is a need for a dataset encompassing various categories to facilitate tasks l...
Article
Full-text available
Comparable corpora are the right resources for extracting parallel data due to their abundant availability. It is of great importance where parallel data are scarce. In this study, the focus is placed on building of parallel data for Punjabi and English language pair. The raw data were collected from web contents of “Mann Ki Baat”, which is a colle...
Article
Full-text available
Machine learning based sentiment analysis is an interdisciplinary approach in opinion mining, particularly in the field of media and communication research. In spite of their different backgrounds, researchers have collaborated to test, train and again retest the machine learning approach to collect, analyse and withdraw a meaningful insight from l...
Chapter
The usage of social media has increased exponentially these days. People worldwide are sharing their opinions on different platforms such as Twitter, personal blogs, Facebook, and other similar platforms. Twitter has grown in popularity as a platform for people to express their thoughts and opinions on many different topics. The data from Twitter a...
Chapter
Social media is rapidly growing in popularity and has its advantages and disadvantages. Users posting their daily updates and opinions on social media may inadvertently hurt the feelings of others. Detecting hate speech and harmful information on social media is critical these days, lest it led to calamity. In this research, machine learning classi...
Chapter
The deepest area of data storage where data mining and data management are not possible without the Tor (network) Policy is known as the dark web. The dark web is a paradise for government and private sponsored cybercriminals. In another word, the dark web is known as the underworld of the Internet used for sponsored and organized cybercrime. Tor n...
Article
Full-text available
As of June 2022, more than 530 million people worldwide have become ill with coronavirus disease 2019 (COVID-19). Although COVID-19 is most commonly associated with respiratory distress (severe acute respiratory syndrome), meta-analysis have indicated that liver dysfunction also occurs in patients with severe symptoms. Current studies revealed dist...
Chapter
Full-text available
This study aims at development of generating metrics based code smells prediction to improve the software quality assurance by working at preventive maintenance level. In order to do so, Refactoring is the best solution for identification of smelly areas in the code to reveal the portions which demands patching. It not only increases the life of co...
Article
Full-text available
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain sensitive information from an internet user. In this Systematic Literature Survey (SLR), different phishing detection approaches, namely Lists Based, Visual Similarity, Heuristic, Machine Learning, and Deep Learning based techniques, are studied and compar...
Article
Full-text available
Due to rapid development in the software industry, various software is being developed, which compromises the software quality. As long as time passes, the software which compromises with the quality starts showing bugs which adversely affect the working of the software system. Sometimes software undergo repeated addition of functionality, so vario...
Article
Full-text available
Refactoring is a technique which involves the change in internal layout of software system while keeping external features same as before. It aims at identification of smelly areas in code in order to apply patch. The presence of these smelly areas in code is also called “Code Smells” generally known as “Bad Smells.” Under the present study, the st...
Article
Dual aromatase-steroid sulfatase inhibitors (DASIs) lead to significant deprivation of estrogen levels as compared to a single target inhibition and thereby exhibited an additive or synergistic effect in the treatment of hormone-dependent breast cancer (HDBC). Triazole-bearing DASI's having structural features of clinically available aromatase inhi...
Conference Paper
Full-text available
Speech is considered the most usual mode of interaction between humans. Nowadays, speech is playing a significant role in the field of speech recognition. Speech recognition is seen as a method that is used for extracting meaningful information from speech signals. The technologies related to languages can solve many problems like it can encourage...
Article
Full-text available
Mitochondria are the organelles that generate energy for the cells and act as biosynthetic and bioenergetic factories, vital for normal cell functioning and human health. Mitochondrial bioenergetics is considered an important measure to assess the pathogenesis of various diseases. Dysfunctional mitochondria affect or cause several conditions involv...
Article
Hypoxia-inducible factor (HIF) is a transcriptional factor which plays a crucial role in tumour metastasis thereby responsible for development of various forms of cancers. Indazole derivatives have been reported in the literature as potent HIF-1α inhibitor via interaction with key residues of the HIF-1α active site. Taking into consideration the ro...
Article
Full-text available
Conversational AI intends for machine-human interactions to appear and feel more natural and inclined to communicate in a near-human context. Chatbots, also known as conversational agents, are typically divided into two types of use-cases: task-oriented bots and social friend-bots. Task-oriented bots are often used to do activities such as answerin...
Article
Full-text available
In today’s Globalized Scenario, the requirement for translation is high and increasing rapidly in the number of fields, but it is difficult to translate everything manually. Machine Translation, which is dependent on corpora availability, is a medium for meeting this high demand for translation. Parallel corpora are used to gain most translation k...
Article
Full-text available
According to the survey, India has the world's second-largest newspaper market, with more than 100 K newspaper outlets, approx 240 million circulation, and 1300 million subscribers or readers. The topic modeling work is increasing day by day, and researchers have published multiple topic modeling papers and have implemented them in different areas...
Article
Coronavirus is diagnosed as a human-to-human infection at the initial stage by many of the researchers. As coronavirus is primarily targeting the respiratory system of the human body, the study tries to explore the relationship between pollution and increased number of cases in the states of the USA. The objective of the study is to determine wheth...
Article
Full-text available
This research article attempts to understand the current situation of fake news on social media in India. The study focused on four characteristics of fake news based on four research questions: subject matter, presentation elements of fake news, debunking tool(s) or technique(s) used, and the social media site on which the fake news story was shar...
Article
Full-text available
The present global size of online news websites is more than 200 million. According to MarketingProfs, more than 2 million articles are published every day on the web, but Online News websites have also circulated editorial content over the internet that specifies which articles to display on their website’s home pages and what articles to highligh...
Article
Full-text available
With the advancement of digitization in every domain, the dependency of individuals on these digitized softwares has also increased. Although these softwares can perform storage, transfer, and security of digital media easily, the threat of hardware/software failure, data tapping and breaching data has always been there. Most of these threats have...
Article
Full-text available
Financial fraud is a threat which is increasing on a greater pace and has a very bad impact over the economy, collaborative institutions and administration. Credit card transactions are increasing faster because of the advancement in internet technology which leads to high dependence over internet. With the up-gradation of technology and increase i...
Research
Full-text available
The quest for improving the software quality has given rise to various studies which focus on the enhancement of the quality of software through various processes. Code smells, which are indicators of the software quality have not been put to an extensive study for as to determine their role in the prediction of defects in the software. This study...
Article
Full-text available
The world of digital media is thriving by the day and hence, there is an urge of businesses to magnify it more gaining them maximum financial benefits. This particular urge calls for more and more expansions concerning creating and developing new content whether it's in the form of websites that aims at branding businesses or could be in the form o...
Article
Software project metrics are seen needless in software industries but they are useful when some unacceptable situations come in the project (Satapathy et al., Proceedings of the 48th annual convention of CSI, vol 2, 2013). Mainly the focus of various defect prediction studies is to build prediction models using the regional data available within th...
Article
Full-text available
The patches that fix the critical issues, or implement new functionality with high value features are frequently promoted directly from the development channel to a stabilization channel. This practice that takes place in the rapid development process, potentially by skipping one or more stabilization channels is called patch uplift. Patch uplift i...
Article
Full-text available
Software defect prediction is an important aspect of preventive maintenance of a software. Many techniques have been employed to improve software quality through defect prediction. This paper introduces an approach of defect prediction through a machine learning algorithm, support vector machines (SVM), by using the code smells as the factor. Smell...
Article
Full-text available
Context: Reusing a design pattern is not always in the favor of developers. Thus, the code starts smelling. The presence of "Code Smells" leads to more difficulties for the developers. This racket of code smells is sometimes called Anti-Patterns. Objective: The paper aimed at a systematic literature review of refactoring with respect to code smells...
Conference Paper
Full-text available
Software maintenance has been a topic of great interest to both the Industry and academics. There have been various efforts in improving the software life through various tools and techniques. This paper examines the essence of software metrics and investigates SVM for the efficiency in the process of defect prediction. The study considers various...
Article
Software defect in today's era is crucial in the field of software engineering. Most of the organisations use various techniques to predict defects in their products before they are delivered. Defect prediction techniques help the organisations to use their resources effectively which results in lower cost and time requirements. There are various t...
Article
Full-text available
Software defect in today's era is crucial in the field of software engineering. Most of the organisations use various techniques to predict defects in their products before they are delivered. Defect prediction techniques help the organisations to use their resources effectively which results in lower cost and time requirements. There are various t...
Conference Paper
Full-text available
Software maintenance has been a topic of great interest to both the Industry and academics. There have been various efforts in improving the software life through various tools and techniques. This paper examines the essence of software metrics and bad smells in software maintenance. The study considers various standard metrics and smells and exami...
Conference Paper
Full-text available
This paper presents a survey of different techniques used to predict software faults. It studies various techniques, their advantages and limitations in predicting the software defects. Software metrics find essence in predicting software defects and thus enhancing the quality of a software, while keeping the costs and efforts to minimal. As there...
Conference Paper
Software defect in today's era is most important in the field of software engineering. Most of the organizations used various techniques to predict defects in their products before they are delivered. Defect prediction techniques help the organizations to use their resources effectively which results in lower cost and time requirements. There are v...
Article
Full-text available
This paper presents a technique to detect clones in UML class models. Class metrics (number of attributes, number of operations) of a class, class attribute names, root nodes, child nodes and class method names are compared with corresponding metrics, attribute names, root node, child nodes and method names of another class. Based on the number of...
Article
This paper presents a technique to detect clones in source code by comparing the operations performed in the statements comprising a function. The key concept used is that two functions are considered clones if the statements in the functions perform the same operation up to a certain extent. This could be ascertained by categorizing the available...
Article
Full-text available
Software maintenance is one of the key activities in any software engineering process in which source code analysis plays a crucial role. Due to the high cost of maintenance, it has become quite necessary to produce high quality software. Over time, numerous analyses have been performed on source code to determine complexity and other metrics. Lots...
Article
Full-text available
The fault prediction model grants assistance during the software development by providing recourse to the present faults with the Bayesian Interference. All faults prediction techniques get a help in this study with the designing of Logistic regression model and Bayesian inference altogether. It is also told as fact that Bayesian inference grap...
Article
Full-text available
There have been numerous studies to predict the error proneness of class. If software testers have only a very limited amount of time left to conduct testing, knowing where the most severe errors are likely to occur in a system is more helpful than just knowing where errors are likely to occur. This paper describes how we calculated various object...
Article
In order to improve software maintainability, possible improvement efforts must be made measurable. One such effort is refactoring the code which makes the code easier to read, understand and maintain. It is done by identifying the bad smell area in the code. This paper presents the results of an empirical study to develop a metrics model to identi...
Article
The impact of OO design on software quality characteristics such as defect density and rework by mean of experimental validation. Encapsulation, inheritance, polymorphism, reusability, Data hiding and message-passing are the major attribute of an Object Oriented system. In order to evaluate the quality of an Object oriented system the above said at...
Article
Full-text available
To assist maintenance and evolution teams, work needs to be done at the onset of software development. One such facilitation is refactoring the code, making it easier to read, understand and maintain. Refactoring is done by identifying bad smell areas in the code. In this paper, based on empirical analysis, we develop a metrics model to identify sm...
Conference Paper
Full-text available
Various studies have found that software metrics can predict class error proneness. However their study is focused on the relationship between class error proneness and software metrics during the development phase of software projects not in system's post-release evolution. This study is focused on the three releases of Javassist- open source java...
Article
Object oriented development has proved its worth in today’ssystem because its design and development is better, reliable andeasier to access than the traditional methodologies. Due to updatedrequirements and lack of documentation in old systems hasprovided a motivation to revamp the systems. Rebuilding orredesigning the same system is highly expens...
Article
Object oriented development has proved its worth in today's system because its design and development is better, reliable and easier to access than the traditional methodologies. Due to updated requirements and lack of documentation in old systems has provided a motivation to revamp the systems. Rebuilding or redesigning the same system is highly e...
Article
Full-text available
Estimating software development effort is an important task in the management of large software projects. The task is challenging and it has been receiving the attentions of researchers ever since software was developed for commercial purpose. A number of estimation models exist for effort prediction. However, there is a need for novel model to obt...
Article
Full-text available
Problem statement: S everal efficient algorithms were developed to cope with the popular task of sorting. Improved heap sort is a new variant of heap sort. Basic idea of new algorithm is similar to classical Heap sort algorithm but it builds heap in another way. The improved heap sort algorithm requires nlogn-0.788928n comparisons for worst case an...
Article
This paper presents some advances towards the quantitative evaluation of design attributes of object oriented software systems. We believe that these attributes can express the quality of internal structure, thus being strongly correlated with quality characteristics like analyzability, changeability, stability and testabilility, which are importan...
Article
Accurate software cost estimates are critical to both developers and customers. They can be used for generating request for proposals, contract negotiations, scheduling, monitoring and control. The exact relationship between the attributes of the effort estimation is difficult to establish. A neural network is good at discovering relationships and...
Article
An existing mathematical model correlating runoff with recharge rate in a drain was used to determine the recharge rate through a surface drain. Two flow conditions were considered namely, free flow and detained flow. Detained flow conditions were made through a series of checks along the drain. Thirty years of rainfall values in the monsoon period...
Conference Paper
— The most reliable and accurate description of the actual behavior of a software system is its source code. However, not all questions about the system can be answered directly by resorting to this repository of information. What the reverse engineering methodology aims at is the extraction of abstract, goal-oriented “views ” of the system, able t...
Article
Full-text available
� Abstract—In field of Computer Science and Mathematics, sorting algorithm is an algorithm that puts elements of a list in a certain order i.e. ascending or descending. Sorting is perhaps the most widely studied problem in computer science and is frequently used as a benchmark of a system's performance. This paper presented the comparative performa...
Article
Full-text available
Today there are several efficient algorithms that cope with the popular task of sorting. This paper titled Comparative Performance Study of Improved Heap Sort Algorithm and other sorting Algorithms presents a comparison between classical sorting algorithms and improved heap sort algorithm. To have some experimental data to sustain these comparisons...

Network

Cited By