Free Essay

Analyzing Anti-Pattern Detection

In: Computers and Technology

Submitted By phambir
Words 4918
Pages 20
Analyzing Anti-pattern Detection
Southern Methodist University

Abstract
A design pattern is a well-understood, reusable design fragment used to solve a commonly occurring problem in software development. Whereas, antipatterns are common design pitfalls that provide poor solutions to recurring design problems. Developers may unwillingly introduce anti-patterns in their software systems due to time pressure, lack of skills, communication or understanding. Anti-patterns have a negative effect on the comprehension and maintainability of a software system, and thus, understanding and detecting Anti-patterns provides the knowledge to prevent or recover from them.
This paper discusses the anti-patterns of object oriented design, their symptoms, and consequences and issues related to their detection. This study also discusses some of the tools and approaches that are currently being developed and used in the software industry to detect anti-pattern. Towards the end, this paper also highlights some of the problems that are still open, to drive future research direction in this field.

1. Introduction
Now-a-days, most of the software projects deal with large number of components that make the software more complicated and hard for novice designers to design. A design pattern is one of the most simple and powerful techniques used to improve the software design. Unfortunately, due to a number of market/customers constraints, anti-patterns may get introduced into the software systems and deteriorate its software quality. Hence, anti-patterns need to be carefully detected and monitored and, consequently, refactoring operations should be planned and performed to deal with them.
In this paper, we will focus to present the different types of anti-patterns in object-oriented design, their symptoms and consequences, and the challenges and issues in detecting these anti-patterns. In a positive sense, Anti-patterns provide real-world experience in recognizing recurring problems in the software industry and provide the tools to enable you to recognize these problems and to determine their underlying causes. It

also helps us to take protective measures at several levels to improve the developing of applications, designing of software and the effective management of software projects. We would support this hypothesis by an empirical evaluation. By analyzing these approaches, we will also discuss some of the tools that are currently being used to detect anti-patterns. In addition to this, we will also discuss the issues that are still open, to drive future direction in this field.

2. Related Work
Several approaches based on different techniques were proposed to detect design defects in object oriented design. Rahma et al. used quality metrics to identify antipatterns in UM. Langelier et al. proposed a visual approach to detect anti-patterns. Kessentini et al proposed an automated approach that was based on detection rules for detecting design defects in software source code. Xue Qing proposed an approach for UML specification of Object oriented anti-patterns.
Stoianov and Sora proposed a logic based detection method using Prolog technique. Abdou Maiga proposed use of Support Vector Machine for anti-pattern detection. A number of tools like AnalystAJ, PMDm and Hammurapi were developed to identify antipatterns.
The research work carried out so far has some amount of limitation. They have limited precision and recall and require extensive knowledge of anti-patterns.
Also, they cannot be applied to subsets of systems.

3. Object-Oriented Design Anti-patterns
It is essential to have a good software structure for system extension and maintenance. Software development is a complex activity, and thus, the implemented structure of systems tends to stray from the planned structure as determined by architecture, analysis and design.
The good part about anti-patterns is that they can be used to identify the common problems and negative effects of the design solution. They also show how to prevent or resolve these problems. Let us discuss a few

types of anti-patterns that we have identified in object oriented design. [2]
1) Anemic Domain Model:
This anti-pattern occurs when the software domain objects contain little or no business logic and when data and behavior are separated in the domain model. The fundamental idea of objectoriented design is to combine data and process together. In contrast, the anemic domain model implements the business logic in separate classes which transforms the state of the domain objects. One solution to this design problem is to combine attributes and processes in one class.
2) Boat Anchor:
A Boat Anchor is a piece of hardware or software in the system that serves no useful purpose [5]. This causes many problems for developers who attempt to maintain the program that contains the obsolete code. The programmers have a hard time in differentiating the working code from the obsolete one.
3) The Blob:
It is a procedural-style design that leads to one object with a lion’s share of responsibilities, whereas other objects only hold data or perform simple tasks or processes. [5] [11]
4) BaseBean:
It is a utility class from which concrete entities have been derived via sub-classing. A class should not inherit from another class just because it contains a function needed in the subclass, and the delegation method should be used instead.
5) Call super:
This anti-pattern occurs when a super class requires subclasses to call an overridden method. In this design pattern, a particular class stipulates that in a derived subclass, the user is required to override method and call back the overridden function itself at a particular point.
6) Spaghetti Code:
This type of anti-pattern occurs when you have an ad-hoc software structure that makes it

difficult to extend and optimize code. It consists of classes without any structure, that have long methods without parameters, and that utilize the global variables for processing [5] [1] [10].
7) Circular Dependency:
This type of ant-pattern occurs when two or more objects or modules, directly or indirectly depend on each other. They are also known as mutually recursive modules. Software engineers may inadvertently introduce circular dependencies if given a very large and complex software design [8]. This anti-pattern can be found and removed by using tools used to analyze software or by using the observer pattern. [14]
8) Cut and paste programming:
This type of anti-pattern occurs when code is reused by copying the source code and simply pasting it to fit with the codebase [5]. This might cause significant maintenance issues. To avoid this anti-pattern, use alternative forms of reuse like black-box reuse. This would reduce maintenance issues by having common source code, testing and documentation. [13]
9) Functional Decomposition:
This anti-pattern occurs when experienced, nonobject-oriented developers design and implement an application in an object-oriented language. The resulting code resembles a structural language like PASCAL, FORTRAN in a class structure. Translating these into objectoriented architecture causes problems. [1] [5]
10) Lava Flow:
This type of anti-pattern occurs when a code that is written under sub-optimal conditions is frozen and put into production while it is still in a developmental state. This is similar to a Lava
Flow with hardening globules of rocky material.
The refactored solution includes a configuration management process that removes dead code and refactors design to increase code quality. [6]
[7] [12]
11) Poltergeists:
These depict type of classes that have very limited responsibilities in the system function

and have very brief life cycle. Poltergeists often start processes for other objects. They are one of the most unwanted anti-patterns because they consume and waste unnecessary resources every time they appear. [5][7][14][17]
12) Golden Hammer:
This anti-pattern is based on the assumption that an architecture, a solution or a software tool is the best solution for every software problem or project. The common notion is that if you have learned to use a tool in one context (golden hammer), now that you are so proud of having learned how to use this complicated tool, all of a sudden you see golden nails everywhere. [18]

4. Symptoms and Consequences of antipatterns
In this section, we will describe some symptoms and consequences of the anti-patterns defined above.
The basic symptom of an Anemic Domain Model anti-pattern is that at first glance, it seems like the real thing. There might be a number of objects that are named after the nouns in the domain space, and these objects might be connected with the rich relationships and structure that true domains have. However, the real catch comes when you look at their behavior and realize that there is hardly any behavior on these objects.
The most common symptoms and consequences of having a Boat Anchor anti-pattern in the code are getting longer compile times and having the risk that programmers may accidentally link working code into the dead code, inadvertently resurrecting it. Also, even if a programmer comes across a dead code, he might waste valuable time before he realizes that the code that he is working with is never executed and thus is not part of the problem he is trying to solve.
The common symptoms of having Blob anti-pattern in a code are having a single class with many attributes and operations, having a single controller class that has simple, data-object classes associated with it, lack of object-oriented design, or having a migrated legacy design. The Blob class is usually too complex for reuse and testing. Also, since it uses excessive resources even for simple operations, it may be an expensive option to load into memory.
The main cause behind BaseBean anti-pattern is when a software developer confuses an IS-A relationship, with a HAS-A relationship. This can be used as a base in detecting this anti-pattern. Call Super is pretty easy to spot. The documentation asks the developers that in order to do your own thing, you

should just sub-class the process method. However, it is important to remember to start your method with a call to the super class. Thus, whenever you have to remember to do something every time, that’s a sign of a bad API.
There are many symptoms and consequences of using a Spaghetti anti-pattern in the code. In this antipattern, the methods are very process-oriented. Most of the times, objects are named as processes and a minimal relationship exists between objects. Also, it becomes easy to predict the pattern of use of objects. In this design pattern, many object methods have no parameters and utilize class or global variables for processing. Code becomes difficult to reuse. In some cases, code is never considered for reuse.
Circular dependencies can cause many unwanted effects in a software program like the tight coupling of the mutually dependent modules which makes separate re-use of a single module impossible. It might also cause a domino effect when a small local change in one module spreads into other modules and has unwanted global effects. Also, this anti-pattern may cause memory leaks. Due to cut-and-paste-programming, the same software bug might get duplicated and might reoccur throughout the software, despite many local fixes in the code. There may be unnecessary increase in the lines of code without adding overall productivity or without the expected reduction in the maintenance costs associated with other forms of reuse. Code is considered as selfdocumenting and can be re-used with a minimum effort.
The major consequence of using this anti-pattern is that since the same software bug occurs throughout the code, it becomes difficult to locate and fix all instances of a particular mistake.
The most obvious symptoms of Functional
Decomposition may be the presence of classes with function names such as Calculate_Interest or
Display_Table. There might be no way to clearly document or even explain how the system works that may lead to class models that absolutely make no sense.
Also, this anti-pattern might contain all class attributes that are private and are only used inside the class. All the classes used in this design pattern may only have a single action such as a function and an incredibly degenerate architecture that completely misses the point of object-oriented architecture. This anti-pattern has no leveraging of object-oriented principles such as inheritance and polymorphism. Thus, the use of this design pattern might lead to frustration and hopelessness on the part of testers.
Frequent, unjustifiable variables and code fragments in the system, whole blocks of commented code with no documentation may indicate the presence of a Lava
Flow anti-pattern. The software contains undocumented

complex, important-looking functions, classes or segments that do not clearly relate to the system architecture. Lots of “in flux” or “to be replaced” code areas, unused code just left in are additional symptoms of Lava Flow anti-pattern. This anti-pattern might have some serious consequences. If the process that leads to
Lava Flow is not checked, the problem might grow exponentially as succeeding developers might unknowingly introduce new flaws as they try to work around the original ones.
Poltergeists have unnecessary and redundant navigation paths, transient associations and stateless classes along with the occurrence of temporary and short duration objects or classes. Due to the transient nature of this anti-pattern, it is extremely difficult to understand and analyze such a system and hence impossible to reuse. [17]
When identical tools and products are used for wide array of conceptually diverse products, or when solutions have inferior performance, scalability etc. when compared to other solutions in the industry, they indicate the presence of the Golden Hammer antipattern. The developers become isolated from the industry and demonstrate a lack of knowledge and experience with alternative approaches. The main consequence of this anti-pattern is that the requirements are not fully met, in an attempt to leverage existing investment. As a result, the design and system architecture is dictated by existing products, and the new software development relies completely on a specific vendor product or technology [18].

and other technologies in high-risk areas to enable minimal software rework.
One solution to resolve the problem of Blob antipattern is by refactoring. The main principle used behind this solution is to move behavior away from the Blob by encapsulating data objects in a way that makes these objects more capable and the Blob less complex. We use the following steps in refactoring Blob.
Consider a library system architecture diagram represented with a Bob Class called Library as shown in figure 1.

Figure 1: Library system architecture diagram [11]

1.

Identify or categorize related attributes and operations according to contracts. As shown in figure 2, we would group operations related to

5. Anti-pattern refactoring solutions or approaches used currently
As discussed in the previous sections, the structure of a software plays an important role with respect to system extension and maintenance. One solution to improve the software structure is to use software refactoring. The resulting structure does not have to resemble the original planned structure.
As the programmers learn constraints and approaches that modify the context of the coded solutions, the structure of the software changes. Thus, when used properly, refactoring can be considered as a natural activity in the programming process. Let’s discuss a few refactored solutions that are used to improve the structure of the software in anti-patterns.
To deal with Boat Anchor anti-pattern, the correct solution is to remove them from the codebase and to place them in a separate location, so that they can be referred to if necessary, but will not be compiled or mistaken as working code. Also, technical backups should be identified for most infrastructure technologies

Figure 2: Identified cohesive set of operations and attributes [11] catalog management like Sort_Catalog,,
Search_Catalog, and also identify operations and attributes related to individual items like Print_Item,
Delete_Item, etc.

2.

Find “natural homes” for these contract-based collections of functionality and then migrate them there. As shown in figure 3, we gather related operations and migrate them from
Library class to Catalog class, and from Library class to Item class, thus making Catalog and
Item classes more than simple encapsulated data tables that result in a better object-oriented design. be implemented by the subclasses and have the original method call that method.
The steps involved in eliminating the Spaghetti Code and using a refactored solution are as follows:
 Refactor to generalize: An abstract superclass is created:
1. Subclass function signatures are made compatible 2. Function signatures to the superclass are added 3. Function bodies and variables are made compatible 4. Common code is migrated to the superclass
 Refactor to specialize: Conditionals are simplified: 1. A subclass with matching invariant is created for each condition
2. The code is coped into the subclass
3. Code is simplified based upon the invariant
4. The superclass constructor is specialized


Figure 3: Operations to be migrated to the catalog class [11]

3.

Finally, remove all transient associations, replacing them as appropriate with type specifiers to attributes and operations arguments. As shown in figure 4, we remove the
Item class that is far-coupled to the Library class and migrate Items to Catalogs.

Figure 4: Removing all transient associations [11]

To avoid BaseBean anti-pattern, the inherited functionality should be provided via delegation method.
Delegation (HAS-A relationship) should be used to obtain the business logic or data structure that is required. If applicable, in some cases, a Java utility class containing only static methods can be created to contain the necessary functionality.
One approach to solve the Call Super anti-pattern issue is to use the template method pattern where the superclass includes a purely abstract method that must

Refactor to combine: Aggregations and components are captured:
Type A. Members from an aggregate class are moved to a component class
Type B. Members from a component class are moved to an aggregate class
Type C. Inheritance is converted to aggregation

To avoid Circular Dependency anti-patterns, the developers should use tools to analyze software and to find unwanted circular dependencies. Generally, the circular dependencies are introduced by inexperienced programmers who need to implement some kind of callback functions. However, such unnecessary circular dependencies are avoided by experienced programmers by applying design patterns like observer pattern.
The most effective solution for Cut and Paste
Programming anti-pattern is to refactor the code base into reusable libraries or components that use Black Box reuse method. Black-box reuse reduces maintenance issues by having a common source code, testing and documentation for multiple reuses.

Since there is no direct way to refactor, we redesign using Object-Oriented principles to eliminate
Functional Decomposition. Let us discuss the solution approach used. First, an analysis model is defined for the software to explain the critical features of the software from the user’s point of view. Next, a design model is formulated that incorporates the essential features of the existing system. Here, the focus is to establish a basis for explaining the system as much as possible rather than improving the model. Ideally, the design model will justify or at least rationalize, most of the software modules. The new design model provides insight as to how the overall system fits together.
Finally, examine the design and find similar subsystems. Those would be our reuse candidates. Now, the program can be maintained by refactoring the code base to reuse code between similar subsystems.
The only sure-fire way to prevent Lava Flow antipattern is by ensuring sound architecture is preceding the production code development. This so-called sound architecture must be backed up by a configuration management process that ensures architectural compliance and accommodates the changing requirements (“mission creeps”). If Lava Flow antipattern already exists in the code, then architecture changes should be avoided during active development.
Thus, the management must postpone development until a clear architecture is defined and disseminated to developers. System discovery activities should be used while defining the architecture since it is required to locate the components that are really used and necessary to the system. It also identifies those lines of code that can be safely deleted. However, when suspected dead code is eliminated, bugs could be introduced. The cause of the error should be fully understood to immediately fix the symptoms. To avoid Lava Flow, it is important to establish system-level software interfaces that are stable, well-defined, and clearly documented. Tools that can are used to assist in configuration management are
Source-Code Control System (SCCS).
Poltergeists can be eliminated from the system by removing the class hierarchy altogether as suggested by
Ghostbusters. However, after their removal, the functionality that was provided by the poltergeists must also be replaced. The following steps illustrate the
Poltergeists Refactored Solution:
 Refactor to eliminate the irrelevant classes:
This can be achieved by deleting the external classes (classes that outside the system) and by deleting the classes with no domain relevance.
 Refactor to eliminate the transient “data classes”  Refactor to eliminate “operation classes”



Refactor other classes with short lifecycles or few responsibilities:
This can be achieved by moving into collaborating classes and regrouping into cohesive larger classes.
The key aspect is to move the controlling actions initially encapsulate in the Poltergeist into the related classes that they are invoked. Consider the Peach
Canning example shown in figure 5.
Figure 5: Peach_Canner_Controller is a Poltergeist [13]

As shown in Figure 5, the Peach_Canner_Controller class has redundant navigation paths to all other classes in the system, all of its associations are transient and it has no state. Also, it is a temporary, short-duration class that pops into existence only to invoke other classes through temporary associations.

Figure 6: The Poltergeist class is removed [13]

We remove the Poltergeist class so that the remaining classes lose the ability to interact and there is no longer any ordering of processes as shown in figure 6.
Golden Hammer anti-pattern can be avoided by using two approaches – philosophical and developmental. Philosophically, an organization needs to develop a commitment to an exploration of new technologies. Expanding a knowledge of developers through education, training and book study groups

would expose the developers to new solutions. Apart from that, software systems need to be designed and developed with well-defined boundaries that facilitate the replaceability of individual software components.
Apart from the solutions discussed in this paper, there are several other tools and techniques that are currently being used to detect and analyze the antipatterns in the software design.

6. Challenges and Issues in OOD antipatterns detection techniques
As discussed in the above sections, several techniques are proposed for detecting and preventing anti-patterns in software systems. However, these techniques have some critical issues and challenges that need to be dealt with.
If used appropriately, anti-patterns can be used in recognizing the recurring problems in the software industry and can help in implementing a better product or software.
Addressing the following issues may help antipatterns gain acceptance.
The strength of anti-patterns comes from an expanded knowledge base like that with design patterns.
For anti-patterns to become increasingly useful, it is important to enhance the presence of the online collaboration of resources like Wiki, blogs etc. The developers should be strongly encouraged to refer the knowledge base and follow the guidelines while developing any software code.
Different Design patterns and anti-patterns refer to many different pattern definition languages and corresponding templates. The overall lexicon of Design patterns is consistent. However, due to the lack of a single seminal work, the anti-pattern definitions seem to be inconsistent. Thus, a need for standard lexicon arises.
Since anti-patterns focus on mistakes in the design patterns, a logical extension of that investigation is to search for the person who is responsible for that mistake. However, this creates unwilling participants and threatens the effective use of anti-patterns. In such situations, the administrations usually tend to ignore the fact that anti-patterns can arise through no fault of an individual but might be a result of obsolescence of technology or similar reasons.
Apart from these, there are a number of critical issues with respect to the detection of anti-patterns in the software system. One major issue in anti-pattern detection is in extracting information from source code components in order to identify symptoms of poor design choices. Different sources of information have different design choices. Also, the type of information to be exploited depends on the kind of anti-pattern to be

detected. Thus, building a tool to detect anti-patterns in software system becomes difficult.
Another major issue is in defining the algorithm to identify candidate anti-patterns. Since each algorithm has its own strengths and weaknesses, an algorithm ensuring a fair compromise of strengths and weaknesses must be chosen depending on the anti-pattern that is under analysis.
Also, there are number of disadvantages in using manual and auto detection approaches in detecting antipatterns. Manual detection approach consumes a large amount of time and effort, and suffer from the anomaly detection, such as context-dependence and ambiguous definitions. In order to overcome time and effort problems, auto detection approaches were developed.
However, they suffer from the uncertainty problems that provide no indication of which set of candidate classes should be inspected first for confirmation and correction. Apart from these, there are a number of challenges with respect to using rule based detection technique or
BBN based detection technique and so on.

8. Conclusions
An anti-pattern is a pattern gone bad, and it represents symptoms of poor design and implementation choices. Anti-patterns may result in time-consuming maintenance operations due to their lower comprehensibility and maintainability and hence, seem to be complex [3]. It can be the result of a manager or developer not knowing any better or not having sufficient knowledge or experience in solving a particular type of problem, or having applied a perfectly good pattern in the wrong context. [16]
Anti-patterns
mostly generate negative consequences whereas refactored solution generates positive benefits. In this paper, we discussed a number of object-oriented design patterns, their symptoms and consequences. We also discussed the issues and challenges that have to be faced while detecting antipatterns.
Thus, anti-patterns can be used for refactoring, migration, upgrade and reengineering. Having said that, design patterns are widely accepted and have abundant resources, but the concept of anti-patterns is still relatively immature and should be discussed and used more frequently. There are still some open issues that need to be addressed and need more analysis and research. Some of them are - Are anti-patterns really harmful [4], providing a complete support for the identification of anti-patterns, use of historical and lexical analysis to detect anti-pattern, analyzing the usability of detection tools, and so on [1].

9. References
[1] Palomba, F., BAVOTA, G., OLIVETO, R., & DE LUCIA,
A. N. D. R. E. A. (2014). Anti-Pattern Detection: Methods,
Challenges, and Open Issues.ADVANCES IN COMPUTERS,
VOL 95, 95, 201-238.

[2] Din, J., Al-Badareen, A. B., & Jusoh, Y. Y. (2012,
December). Antipatterns detection approaches in ObjectOriented Design: A literature review. InComputing and
Convergence Technology (ICCCT), 2012 7th International
Conference on (pp. 926-931). IEEE.

[9] Design Patterns and Refactoring. (n.d.). Retrieved April
28, 2015, from https://sourcemaking.com/antipatterns
[10] Moha, N., Guéhéneuc, Y. G., Le Meur, A. F., Duchien,
L., & Tiberghien, A. (2010). From a domain analysis to the specification and detection of code and design smells. Formal
Aspects of Computing, 22(3-4), 345-361.
[11] Design Patterns and Refactoring. (n.d.). Retrieved April
28, 2015, from https://sourcemaking.com/antipatterns/theblob
[12] Design Patterns and Refactoring. (n.d.). Retrieved April
28, 2015, from https://sourcemaking.com/antipatterns/lavaflow

[3] Elaasar, M. E. (2012). An Approach to Design Pattern and
Anti-Pattern
Detection in MOF-Based
Modeling
Languages (Doctoral dissertation, Carleton University
Ottawa).

[13] What is Circular dependency and how do we resolve it?
(n.d.).
Retrieved
April
28,
2015,
from http://www.codeproject.com/Articles/616344/What-isCircular-dependency-and-how-do-we-resolve [4] Abbes, M., Khomh, F., Guéhéneuc, Y. G., & Antoniol, G.
(2011, March). An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension. In Software Maintenance and Reengineering
(CSMR), 2011 15th European Conference on (pp. 181-190).
IEEE.

[14] Design Patterns and Refactoring. (n.d.). Retrieved April
28,
2015, from [5] Mowbray, T. J., Brown, W. J., & McCornnick III, H. W.
(1998). AntiPatterns: Refactoring software, architectures, and projects in crisis. ed: John Wiley & Sons, Hoboken, NJ.
[6] Fowler, M. (1997). Refactoring: Improving the Design of
Existing Code.
[7] Stoianov, A., & Sora, I. (2010). Detecting patterns and antipatterns in software using Prolog rules. In Computational
Cybernetics and Technical Informatics (ICCC-CONTI), 2010
International Joint Conference on (pp. 253-258).
[8] Ballis, D., Baruzzo, A., & Comini, M. (2008, April). A minimalist visual notation for design patterns and antipatterns.
In Information Technology: New Generations, 2008. ITNG
2008. Fifth International Conference on (pp. 51-56). IEEE.

https://sourcemaking.com/antipatterns/poltergeists
[15] AntiPattern - Cut-And-Paste Programming. (n.d.).
Retrieved
April
28,
2015, from http://www.darxstudios.com/darxstudios/2014/9/7/antipattern-cut-and-paste-programming
[16] Development AntiPattern:. (n.d.). Retrieved April 28,
2015, from http://www.antipatterns.com/briefing/sld022.htm
[17] Poltergeist-the most unwanted antipattern. (n.d.).
Retrieved
April
28,
2015, from http://icmgworld.com/corp/news/Articles/RS/jan_0302.asp
[18] Software Antipatterns : The Golden Hammer. (n.d.).
Retrieved
April
28,
2015, from http://codebalance.blogspot.com/2010/10/softwareantipatterns-golden-hammer.html

Similar Documents

Premium Essay

Real-Time Fraud Detection

...severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå......

Words: 56858 - Pages: 228

Free Essay

Change Detection

...Different Change Detection Techniques Table of Contents Introduction...................................................3 Digital Change Detection Process...............................4 Description of the most commonly used change detection methods.5 I. Post-Classification Comparison..........................5 II. Direct Classification...................................6 III. Principal Component Analysis (PCA)......................6 IV. Image Differencing......................................8 V. Change Vector Analysis (CVA)............................9 Relative accuracy of the most commonly used change detection methods........................................................9 I. Post-Classification Comparison.........................10 II. Direct Classification..................................11 III. Principal Component Analysis (PCA).....................11 IV. Image Differencing.....................................12 V. Change Vector Analysis (CVA) Conclusion....................................................14 References....................................................15 Introduction Remote sensing change detection has been defined as the process of identifying change in the state of an object or phenomena through the detection of differences between two or more sets of images taken of the same area on different dates (Wang, 1993). The underlying assumption is that changes on the ground cause significant......

Words: 3616 - Pages: 15

Free Essay

Intrusion Detection Systems

...Intrusion Detection Systems CMIT368 August 12, 2006 Introduction As technology has advanced, information systems have become an integral part of every day life. In fact, there are not too many public or private actions that can take part in today’s society that do not include some type of information system at some level or another. While information systems make our lives easier in most respects, our dependency upon them has become increasingly capitalized upon by persons with malicious intent. Therefore, security within the information systems realm has introduced a number of new devices and software to help combat the unfortunate results of unauthorized network access, identity theft, and the like – one of which is the intrusion detection system, or IDS. Intrusion detection systems are primarily used to detect unauthorized or unconventional accesses to systems and typically consist of a sensor, monitoring agent (console), and the core engine. The sensor is used to detect and generate the security events, the console is used to control the sensor and monitor the events/alarms it produces, and the engine compares rules against the events database generated by the sensors to determine which events have the potential to be an attack or not (Wikipedia, 2006, para. 1-3). IDS generally consist of two types – signature-based and anomaly-based. Signature-based IDS operate by comparing network traffic against a known database of attack categories. In......

Words: 1749 - Pages: 7

Premium Essay

Detection of Ovulation

...Preventive Powers of Ovulation and Progesterone Detection of Ovulation by Dr. Jerilynn C. Prior, Scientific Director, Centre for Menstrual Cycle and Ovulation Research. I believe that ovulation with a normal luteal phase length – and normal amounts of progesterone to counterbalance and complement estrogen – is of key importance for women’s bone, breast and heart health (see Ovulatory Disturbances - They Do Matter [PDF]). In the last issue we discussed how you, personally, can tell that you are ovulating using the Molimina Question, recording and analyzing your basal temperature using quantitative methods (called QBT), and possibly using the over-the counter fertility test detecting the mid-cycle luteinizing hormone (LH) peak. We will now look at the medical methods for diagnosis of ovulation. How can a doctor tell if I am ovulating? For some physicians, especially those who specialize in fertility management, all methods for detecting ovulation (short of doing an operation and observing the egg actually squirting out of the ovary-see figure) are indirect and therefore considered inferior. There are three different, indirect medical methods that are commonly used to diagnose ovulation and normal progesterone action: 1) a series of ultrasounds of the ovary across the mid-cycle; 2) a biopsy of the uterine lining about a week after expected ovulation to see if the cells show evidence for progesterone action; and 3) taking one or several measurements of estrogen and progesterone...

Words: 2015 - Pages: 9

Free Essay

Methods of Lie Detection

...Methods of Lie Detection Samuel Medina Housatonic Community College Abstract This research paper will cover a few different aspects of Lie Detection. Through the knowledge gathered from 5 journal articles the reader will learn of different methods of lie detection as well as some real life applications and the possibilities of lie detection in the near future. The areas that the 5 journal articles touch upon are the Cognitive load approach, the use of the polygraph and its controversies, the behavioral differences when using a person’s first or second language, the use of fMRI and the potential future of fMRI technology and last but not least some of the application of lie detection in our world today and potential for even more efficient and less intrusive methods of lie detection. Methods of Lie Detection In today’s society technology is at the fore-front of almost every aspect of life. In one particular area technology has created a new path of discovery for society to explore. Lie detection is a subject widely used in different ways throughout law enforcement and is becoming implemented in many different ways in our society today. Lie detection is being used in court rooms all over the world to solidify verdicts proved in the court rooms. There are a few methods of lie detection used in and outside of the court rooms but not all are allowed in the court rooms because of certain controversies. Of course with......

Words: 1960 - Pages: 8

Free Essay

Intrusion Detection

...Term paper cyber security awareness -Topic- Network intrusion detection methods INTRODUCTION Intrusions are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. Intrusion Detection Systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection provides a way to identify and thus allow responses to, attacks against these systems. Second, due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs that could be used by an intruder to attack the systems or applications. As a result, certain preventive mechanisms (e.g., firewalls) may not be as effective as expected. Intrusion detection complements these protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that we can understand the security threats and risks and thus be better prepared for future attacks. IDSs may be classified into Host-Based IDSs, Distributed IDSs, and Network-Based IDSs......

Words: 1083 - Pages: 5

Free Essay

Aviation Weather Detection

... Improvements in Weather Detection in Aviation Anfernee Emerenciana Florida Institute of Technology Abstract When it comes to flying, planning is everything; one of the biggest things that pilots need to take in to account is namely the weather. There are two key components when it comes to weather planning: forecasting and detection. The FAA and other meteorological organizations are continuously coming up with improvements and new ways to give pilots the necessary weather information needed in order successfully and safely do the flight. This paper will discuss how weather detection and forecasting have improved over the years, what the current developments are, and also what is still left to be done in order to ensure proper planning and overall safety for the flight The Federal Aviation Administration is a federal branch that focuses on the overall safety and regulations in regards to aviation in the United States. A pilot is required to get a weather briefing before each flight. These weather briefings are offered by the FAA in conjunction with Lockheed Martin. The weather briefings provide weather information products that give important information in regards to winds, cloud ceilings, icing hazards and turbulence. According to Gloria J Kulesa (2004), the weather phenomena’s that have the greatest impacts are: in-flight icing, turbulence, convective weather, cloud ceilings and visibilities. While traveling, one of the greatest annoyances is flight delays. Most......

Words: 1365 - Pages: 6

Free Essay

Intrusion Detection

...Intrusion detection Intrusion detection is a means of supervising the events that occur in a computer system or network. This includes examining them for traces of possible incidents that are in violations or threats of violation of computer security policies, acceptable use policies, or standard security practices (Ogunleye & Ogunde, 2011). Intrusion detection is become more than ever an important focus of many organization. This focus is driven by the availability of more information systems and globalization through the use of the internet. The market place is no longer the residents of a small town going to the local mall, but services online available to anyone with a web browser. With all this access vastly multiplies the possibilities of one masked robber in a year to thousands of wrong dowers at a desktop or laptop that has discovered vulnerability in the system and decides to take the chance to exploit it. There are various approaches an organization can use to deal with many of the problems that exist with securing an information system. Jain’s (2008) article from the ICFAI Journal of Information Technology depicts a scenario of a network intrusion detection team and how situation can be averted: …The hackers started with slating down the objectives of their ‘Limited Knowledge Penetration Testing’, also referred to as ‘White Box Approach’, and gathered sufficient information to ensure that the testing did not affect the normal business operations. They emulated a...

Words: 1808 - Pages: 8

Premium Essay

Rapid Detection of Nicotine

...No. 6 ARTIFICIAL HEARTS IN MANKIND 353 A RAPID TECHNIQUE FOR THE DETECTION OF NICOTINE IN DEVELOPING TOBACCO SEEDLINGS1' 2 PEI-HSING LIN WU AND WILLIAM R. SHARP Department of Botany and Institute of Polar Studies, and Department of Microbiology, The Ohio State University, Columbus, Ohio 4S210 ABSTRACT A rapid and sensitive method for detecting alkaloids, in particular nicotine, from Nicotiana rustica tobacco seedlings up to 2 mm in length has been developed. Growing tissue is applied (squashed) directly onto silica gel plates for thin-layer chromotographic analysis. The sensitivity of this method permits the detection of quantities of nicotine as small as 0.4 microgram. INTRODUCTION During the course of our study on the chemical patterns of plant growth and development (Peters et al., 1972), it was necessary to use rapid procedures to analyze chemical contents of growing tissues. The present study deals with the development of a procedure for the rapid detection of the alkaloids. The histochemical detection of alkaloids in growing tissues, as demonstrated by others (Chaze, 1932; James, 1950), is based on the reaction with iodine in potassium iodide solution. These methods are complicated by the presence of carbohydrates and proteins, which also react positively to iodine in potassium iodide solution. James (1946) was able to overcome the difficulty of liberating alkaloids from denatured proteins by blotting the tissue on filter paper prior to other treatment;...

Words: 1728 - Pages: 7

Premium Essay

Analyzing

...Analyzing Psychological Disorder By Steven Smith Psy/240 First I would like to thank you for this opportunity that you are giving me. A part of this opportunity that you have given me contains two parts, A and B. In part A, I will analyze schizophrenia a psychiatric disease that is well known. I will take you on the journey of how schizophrenia affects the brain, neural basis, causes, symptoms, and drug therapies of this psychiatric disease. In part B we will continue our journey through a bio-psychologist’s perspective on the following two case studies; the first one will be about a teenager named Beth who has severe eating disorder name anorexia. The second will be about a single mother named Mary, who has a sleep disorder known as Insomnia. In both cases I will determine the relationship with nature-nurture issue, drug interventions or solutions, and the positive and negative aspects of the solutions or drug interventions. Part A: Schizophrenia: Causes, Symptoms and Treatments The psychiatric disease schizophrenia as describe by John P.J. Pinel in the seventh edition of Biopsychology, is the “splitting of psychic functions”. There is not a specific race or cultural group that will end up with schizophrenia. Experts have not pin pointed what cause schizophrenia, but they believe it is a combination of factor from genetics to environmental. Schizophrenia...

Words: 2019 - Pages: 9

Premium Essay

Pattern

...without reference to or inclusion of the results determined from the analysis. Description of the Research Design and Procedures Used: Completely explain step-by-step what was done. Sources of Data: Give complete information about who, what, when, where, and how the data was collected. Sampling Procedures: Explain how the data was limited to the amount which was gathered. If all of the available data were not utilized, how was a representative sample achieved? Methods and Instruments of Data Gathering: Explain the procedures for obtaining the data collected. Include the forms or manner by which it was recorded. Statistical Treatment: Explain the complete mathematical procedures used in analyzing the data and determining the significance of the results. Analysis of Data: Describe the patterns observed in the data. Use tables and figures to help clarify the material when possible. Summary and Conclusions: This section condenses the previous sections, succinctly presents the results concerning the hypotheses, and suggests what else can be done. Restatement of the Problem: This is a short reiteration of the problem. Description of the Procedures: This is a brief reiteration of important elements of the design of the study. Major Findings: The final results from the analysis are presented, the hypothesis stated, and the decision about the rejection or the failure to reject the hypothesis is given. Conclusions: Comments about the implication of the findings are......

Words: 653 - Pages: 3

Premium Essay

Intrusion Detection

...RESEARCH REPORT – CP5603 INTRUSION DETECTION ASHWIN DHANVANTRI JAMES COOK UNIVERSITY AUSTRILIA SINGAPORE CAMPUS STUDENT ID 12878531 Table Of Contents Title Page No Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Types of Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . 2 Working Of Intrusion Detection System. . . . . . . . . . . . . . . . . . . . . 3 System Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Outline Technical Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Module Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Technology Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .......

Words: 3561 - Pages: 15

Free Essay

Lab 4: Edge Detection in Images

...Lab 4: Edge Detection in Images A. Background Information Edge detection is a common, but very important method for analyzing images. It can be used to help identify objects in a scene or features of an object. It is widely used in biometrics security applications to identify facial features or fingerprints. The example below shows the process of edge detection applied to a picture of a bike next to a brick wall. As can be seen, edge detection easily shows the outline of the bike, the bricks in the wall, and even the writing on the bike. | | Edge Detection Example: Original Image (left) and Edge Detected Image (right) | So how does edge detection work? The first step in understanding the process is to understand what an edge is in an image. If you were to look at the values of in an image along a single row or column, you would see something that looks like this: Bricks Bricks Grout Lines Grout Lines This is actually the graph of the pixel values from the first row of the original picture shown above. What you are seeing here are the individual dark colored bricks that make up the top border of the image. The bricks themselves are the lower and relatively flat sections, while the lighter colored grout between the bricks is represented by the sharp peaks. With this understanding, we can see that an edge (a sharp change in color) is represented by a large change in the pixel value. In order to locate the areas that have these drastic......

Words: 2189 - Pages: 9

Free Essay

Face Detection

...accuracy. Using fea- The facial landmarks (eyes, eyebrows, nose, mouth) are intutures extracted by facial landmark detection, we received on itively the most expressive features in a face, and could also average 52% classification accuracy. However, when we used serve as good features for emotion classification. a convolutional neural network, we received 65% classification accuracy. 1.3 1 Support vector machines are widely used in classification problems, and is an optimization problem that can be solved in its dual form, Introduction Detecting facial expressions is an area of research within computer vision that has been studied extensively, using many different approaches. In the past, work on facial image analysis concerned robust detection and identification of individuals [5]. More recently, work has expanded into classification of faces based on features extracted from facial data, as done in [6], and using more complex systems like convolutional neural networks, as done in [1] and [2]. In our project, we compared classification using features manually extracted from facial images against classification using a convolutional neural net, which learns the significant features of images through convolutional and pooling neural layers. The two manual feature extraction methods we explored were principal component analysis (PCA) and facial landmark detection. These extracted features were then classified using a kernel support vector machine (SVM) and a......

Words: 3596 - Pages: 15

Premium Essay

Advertisement Detection

...boxes or software that detect and discard the commercials on the broadcast TV signal. Study in the field of the advertisement identification is segmented into various manners. It can be dependent on the audio or video information or an amalgamation of both. There are some works by A. G. Hauptmann and M. J. Witbrock (2006) that use the verbatim data achieved from the text streams, or the optical character recognition or speech identification for segmentation. In work proposed by L.-Y. Duan et al (2007) it has been given that using usual features of advertisement blocks like frames and silence amid commercials to identify cuts and categorize commercials dependent on OCR. In this work there have been two varied use cases for the commercial detection 1. Identify broadcast of recognized commercials with large precision something like the use of fingerprinting 2. Identify earlier not known commercials. Next segmentation is to differentiate amid the methodologies on online instantaneous or offline processing. A few approaches require investigating the entire video to identify the maximums and to calculate attributes with progressive requirements, while the rest depend on the fly identification of the advertisements. Also there are variations amidst the advertisement identification in the compressed and uncompressed realm. Identification in a compact domain is quick also it is quite a perplexing task and the identification rates are less as compared to the......

Words: 3635 - Pages: 15