Documente Academic
Documente Profesional
Documente Cultură
objectives, significance of the study and lastly the operational and definition of
terms.
Introduction
getting popular nowadays due to easy to setup feature and no cabling involved.
Anyone can connect computers anywhere at home or at the office without the
need for cables. Most applications require a wireless network connection in order
to use it. Most of the users preferred to use Wi-fi than other existing wireless
privilege”. Nowadays, there are lots of file sharing applications available over the
internet. There are some that requires bluetooth connection, and some are
wireless network. Furthermore, there are file transfer applications developed and
can be downloaded in any downloadable application sites. This helps the user to
easily transfer file without the use of wires or connector, through wireless network
1
users will be able to transfer file from phone to computer or vice versa in just a
second depending on file size and the specifications of the devices used. The
researchers found this technology interesting and consider to analyze and study
internet. Most of the users are simply using the applications without discovering
the idea on how it was developed. As long as the app is working and giving
the flow, the code and most specially the algorithm of that application, in order to
also help the researchers to identify which has a better result and most reliable to
use. The researchers need to learn how to compare an application from other
Margaret Rouse “The word algorithm derives from the name of the
court in Baghdad and who lived from about 780 to 850. Al-Khwarizmi's work is
the likely source for the word algebra as well”. Regarding proposed topic of the
what is File transfer? Based on research, File transfer is the movement of one or
2
more files from one location to another using wireless network or local network,
Through that the researchers end up with a topic that would test one of the
APPLICATION which is the file transfer. Because during the group researched in
thesis 1, there were several topics regarding the file transfer. Some of these are
difficult to analyze and understand, that is why the researchers decided to create
a file transfer that would make it more reliable for the user. This also shows how
effective and useful the file transfer application for the user. In this study, it will
wireless network by analyzing more the algorithm, this would help the
researchers understand the behavior of the application, study and compare the
application from other existing file transfer application available over the internet.
The time and bandwidth where the researcher will test the amount of data that
can be transferred at one time and actual amount of data transferred. Also, part
determine a piece of code or functionality and analyze the logic and flow of
codes. In this study, it is able to determine which code is more applicable and
3
Figure 1. Data Transfer Process
The figure shown above visualizes the process of transferring file and the
plan of the study. The connection is established by the server sharing the unique
IP address with the client/user and client would directly input the given IP
Address of the server and once the two devices are connected, both devices can
now transfer file through wireless network. The researchers can check the time
and identify the speed or the time it takes to transfer the file to another device.
Furthermore, part of it is the bandwidth, where focus on the size or amount of file.
Data accuracy is also included in the study. Lastly, the complexity of the code.
This figure was the overall process of the application in thesis 1. Wherein
the researcher applied the same process for the testing procedure in their current
study.
4
THESIS STATEMENT
By testing all the gathered data which is related to the study, the results
gave the researchers an idea that the accuracy of file transfer using modified K-
General Objective
is identified that the algorithm is accurate in the study by simply doing applicable
Specific Objectives
● To know the accuracy of data doing and after file transfer. This research
aims to determine that the files are accurately transferred from the source to
transferring file, most of the time there are users who accidentally sent wrong file.
5
program's source code. This is used to gauge the overall intricacy of an
● To identify the time and bandwidth. This is to determine the time of data
transferred and also the bandwidth where the researchers can identify the
amount of data that can be transmitted in a fixed amount of time. For digital
devices, the bandwidth is usually expressed in bits per second(bps) or bytes per
second. For analog devices, the bandwidth is expressed in cycles per second, or
Hertz (Hz).
● To know the compatibility of the code to a wide array of device. Part of the
objective is to identify the compatibility of the code or the portability of the code to
other devices. It means that the program can run on entry level to flagship mobile
devices same as the server side software should run to a low specs to high
specs computer.
Wireless Environment by doing testing procedure for the study. In the areas of
the study; data accuracy, code complexity and transfer time and bandwidth are
covered in this study. In this case, the researchers can determine whether the
study is effective and accurate or not through applying all the defined procedure.
The study focuses only on the local area network in wireless environment and
6
When it comes to the specification, the study requires specific
specification for mobile phones and computer. The application works on both
Physical Size 5.2 inches, 5.0 inches, 4.8 inches, 5.5 inches, 5.2 inches,
74.5 cm2 68.9 cm2 63.5 cm2 83.4 cm2 74.5 cm2
(~69.9% (~68.9% (~65.9% (~73.6% (~68.7%
screen-to- screen-to- screen-to- screen-to- screen-to-
body ratio) body ratio) body ratio) body ratio) body ratio)
7
& 4x1.7 GHz
Cortex-A53)
Resolution 1080 x 1920 720 x 1280 720 x 1280 1080 x 1920 720 x 1280
pixels, 16:9 pixels, 16:9 pixels, 16:9 pixels, 16:9 pixels, 16:9
ratio (~424 ratio (~294 ratio (~306 ratio (~401 ratio (~282
ppi density) ppi density) ppi density) ppi density) ppi density)
Internal 16 GB 8 GB, 16 GB 64 GB 16 GB
Storage
Bluetooth 4.1, A2DP, 4.0, A2DP 4.0, A2DP, 4.2, A2DP, 4.1, A2DP,
LE EDR, aptX EDR, LE LE
Researchers
The researchers are the ones who conducted the study. This study will
help the researchers prove the efficiency of the modified K-means algorithm in
file transfer module of UMak Multi-remote control app. The study will benefit the
researchers to have the idea on how accurate and fast the application in different
android mobile phone and windows PC. This will help the researchers improve
8
Future Researchers
This study will serve as guideline to improve the study of the next
researchers who will wish to continue this topic or will be having the same
concept of research. This study will serve as reference to the future researchers
who wish to study the topic about K-means, File transfer or any other related
terms.
Since the users of the UMak Multi-remote control App are the students
and professors of University of Makati and the modified K-means was applied to
this app, these users will have a deeper understanding in using the application. It
will answer the questions of how the app works, what are the benefits of the app,
and how efficient will these user be able to maximize the use of the app.
directly for the user. It uses the services of the computer’s operating system and
signal. Code Complexity is computed using the control flow graph of the
9
of a program, and a directed edge connects two nodes if the second command
Data Accuracy is one of the components of data quality. It refers to whether the
Data is a collection of objects units that are related from one another
channel from one computer system to another. Typically, file transfer is mediated
by a communications protocol.
spans a relatively small area. Most often, a LAN is confined to a single room,
LANs over any distance via telephone lines and radio waves.
progra. Multiple records are contained in a file or data set. Typically, records can
10
Wi-Fi a facility allowing computers, smartphones, or other devices to connect to
the Internet or communicate with one another wirelessly within a particular area.
11
CHAPTER 2
CONCEPTUAL FRAMEWORK
Wireless Environment through various principles and related facts and ideas.
1. Foreign Studies
was to create and provide the background experimental material for the selection
examined.
This study was similar to the researchers current study, which is the file
transfer. This shows the performance of the application over wireless network.
Through this, researchers can determine and compare the work. In the end, the
12
Simulating a File-Sharing P2P Network
peer algorithm is impossible. However, there are P2P algorithms are sensitive to
the network that are used in simulations. This study requires simulations that
This was similar to the study of the researchers, using this the researchers
can identify the P2P Network or File sharing in peer-to-peer algorithm and how is
it works. The researchers can also determine the process and specific goal in
interface sessions
algorithm for multi network interface sessions, India. Nowadays, File transfer in
wireless network is the easiest way to send or transfer file from one device to
another. File transfer can occur through multiple interface connections also,
protocols such as SCTP, transfers data in multiple data stream within a single
connection and LFTP transfers file sourced from multiple servers to a single host,
in this case, IEEE.org would like ensure the utilization of combined bandwidth of
all the interfaces used, so that the rate of file transfer would increase
13
organization use two interfaces i.e, IEEE 802.3 (Ethernet) and IEEE 802.11
This study also focused on file transfer algorithm which is also what
researchers focused at. Using this study, the researchers can easily identify
2. Local Studies
Clustering Algorithm
designed to present and justify the capabilities of data mining. Main contribution
means clustering algorithm. All the data stored in the Student Information and
Accounting System was used to perform an analysis of study outcome taking into
protect their privacy. The study and results showed that students belong to the
mining using K-means algorithm. Part of the study is the data accuracy. In this
study, the researchers tackled the data stored in the Student and Accounting
system. The researchers tested how secured the data. This is also part of the
14
Application of improved Initialization of K-means Algorithm for
“The study shows the effectiveness of the improved initialization of centroids for
make a clear comparison of the standard and the improved initialization of the k-
iterations.”
This study was also related in the current study of the researchers. Using
k-means they can identify the particular need specially the clustering method,
derived Sea surface temperature (SST), and sea surface height (SSH), wind data
(W), and precipitation (P). and the results show that the Philippines naturally
divided into 11 exposure clusters. Typology was done using K-means clustering
15
which has been shown to be robust especially when pixels spatially located near
each other are expected to exhibit similar properties. The K-number of points are
randomly selected from the entire dataset and treated as initial means. Data
points are then sequentially associated with the most similar initial mean and
together these data point and the initial mean make up one of the K-clusters.
This study helps the researchers to determine and have more knowledge
regarding K-means algorithm. Furthermore, they can also use this as guidelines
computation, the researcher randomly selected a cluster from data set same with
this study and identified which group is such cluster. In the end of computation,
2. Foreign Literature
Means Clustering
Sharing Using Clustering Technique of K-Means Clustering. Most of the user are
are talking about file transferring in networks. Thesis work design a new
16
Part of the study is the security in transferring file. With the help of this
literature, researchers can use this as a guidelines during the development of the
study. Where the researchers can determine how secure the file.
quantities of data from one network to another. 2350 Mission College Blvd., Suite
777 Santa Clara, California 95054. “Safe Velocity is suited for the topic, because
of its capability where the user could regularly move large quantities of data
across networks, and also addresses the problems of transferring large files
data transferred. And also by addressing the problems in transferring file over
wireless network. In this case, researchers can also test their work and study
using this literature to determine the possible output of the study most specially
best and simplest and most secure way in exchanging files(data) over the
internet. To have access in an FTP server, the users should be able to connect
to the internet or intranet via modern or local area network. There are two types
17
This is specifically the same on the features of what the researchers
developed. They also have Upload and Download. They can test and compare
their work and through that, they can identify and easily test the study.
3. Local Literature
initial centroids instead of random selection for the K-means algorithm. This
paper shows also shows the comparison of K-means and Modified K-means
algorithm. The authors focused on the use of K-means algorithm for the reason
adaptability to distribute data. This algorithm has been used in different topics
like computer vision, geostatistics, astronomy and agriculture. This concept could
be adapted to other application. The main objective of the study is to change the
This article discussed all about k-means algorithm and the other way how
to get the initial centroids or group of cluster instead of randomly selecting it from
data set.
Clustering Algorithm
“This article was designed to justify and present the capabilities in data mining.
18
K-means clustering algorithm had a main contribution to this paper. From 2009-
2013 the date stored was used to perform an analysis of study outcome taking
into consideration not to include in the final result any identifying information to
mechanism through which the nation builds its human capital to enable it to
actively participate in the global economy. The WEKA software was used to build
which is way how to solve and identify the data set or group of cluster.
Cavite. This shows that the K-means Clustering system helps the researchers
specially the system to have a certain reports based on the data collected by the
system. Using of this algorithm all of the disease’s information will be compiled
and will be clustered. The K-means clustering aiming to group item into K cluster
such that all items in the same cluster are similar to each other. The distance
measure was used to calculate similarity and dissimilarity. Centroid is the most
important idea of K-means, every cluster has a centroid which considered as the
representative of a cluster.
This article also focuses the k-means clustering study, in this case, the
researchers can have a knowledge and understanding regarding the study. They
19
can also use this as guide while testing the study so in the end they can get the
best result.
Benchmarking Analysis
This research and study undertaken is to prove and identify which is the
best performance levels and using the information as a bass the strategies and
modified K-means Algorithm from another existing study which is the File
required for the server. On the researchers study only needs 2GB RAM to run
the server unlike from other study it requires 8GB of RAM to run and start the
server. In terms of Network Connectivity, there are 2 types of Network may apply
or use its either WLAN or LAN compared to other study it is only applicable to
LAN connectivity. The researchers also studied the complexity of their codes
20
unlike to other study there is none. Lastly, the researchers also identified the time
21
CHAPTER 3
THEORETICAL FRAMEWORK
Research Methodology
Clustering
Feature Algorithm Design
Selection or Selection
Data Samples
DATASAMP
Result Cluster
Interpretation Validation
KNOWLED
Knowledge
22
In the proposed concept, clustering based security framework will be
Feature selection, different clustering methods are listed so that the researchers
will be able to choose the best clustering methods that are defined. Pattern
clustering, making clusters in a way such that similar data objects are placed in
same cluster and dissimilar data objects are placed in different cluster.
Information Abstraction, the useful information can be easily occupied from the
arranged manner.
a. Algorithm Development
clusters in which each object belongs to the cluster with nearest mean. This
For example, there is a set of data where each set of data has a set of
features, but has no labels. Labels are important in order to predict the given
features of each data sets. The most straightforward task to perform on a data
set that has no label is to find group of data which are similar to one another
23
particular cluster, a point should be closer to a specific centroid of a cluster than
the module of UMak Multi Remote Control App which is the File Transfer module.
The researchers studied and found out that using a modified K-means
environment.
clustering. First step is feature selection where the number of patterns available
is the same as the number of clustering algorithm exist so the best one can be
pattern. The next step is Grouping, or making clusters in a way that similar data
objects are placed in the same cluster while dissimilar data objects are placed in
There is an open source analyzer which can test the complexity of the
code. Best example of this is Lizard code complexity analyzer, an open source
tool where the researchers just simply input the codes and it will automatically
24
generate an output of the complexity of the code. By the help of Lizard code
FileDownloadFragment 2 1 5 0
Table 3 shows the result given by an online source tool named Lizard. The
researchers were able to get number of lines of code or NLOC, the number of
token and the number of parameters and most specially the complexity of the
codes which the researchers are aiming to acquire. The researchers also did a
of each function of the program. By the help of an online tool named Code2flow
where the researchers simply input a specific lines of code, the website will
automatically generate a flowchart, then after that the researchers proceed with
the cyclomatic complexity computation. The result was used for the cyclomatic
25
Figure 3. Flowchart of File Download Fragment
the flowchart generated by Code2Flow, the researchers can easily compute for
where,
26
In figure 3, there are 5 edges, 2 nodes and 1 node that have
CC = 5 - 2 + 2*1
CC = 3 +2
CC = 5
Using the gathered data from the Lizard code complexity analyzer and
complexity of the codes used for the File Transfer Module of UMak Multi-remote
control App. Given that the variable E is equals to the number of edges in the
flow graph, N is equals to the number of nodes in the flow graph and P is equals
to the number of nodes that have exit points. After generating the results online,
the researchers were able to gather the following value for E that is equals to 5,
number ranges from 1 to 10 is a structured and well written code, high testability,
cost and lesser effort. These results will be the basis of the researcher's
27
Table 4. Code complexity result of File Transfer Fragment
FileTransferFragment 2 1 5 0
Table 4 shows the result given by an online source tool named Lizard. The
researchers were able to get number of lines of code or NLOC, the number of
token and the number of parameters and most specially the complexity of the
codes. Same as the first testing performed on the first figure, the researchers
also did a manual computation to check if the result is correct using cyclomatic
complexity of each function of the codes. By the help of an online tool named
Code2flow where the researchers just simply input the specific code then
Code2flow will automatically give a flowchart output, then after that the
researchers proceed with the cyclomatic complexity computation. The result was
used for the cyclomatic computation wherein the NLOC or Number lines of
28
Figure 4. Flowchart of File Transfer Fragment
the flowchart generated by Code2Flow, the researchers can easily compute for
29
where,
CC = 8 - 2+ 2*1
CC = 6 +2
CC = 8
given data came from the given result of Lizard and Code2flow tool website. 8
represents the number of edges, 2 represents the nodes and 1 is the exit point.
From the computation above the cyclomatic complexity result was 8. Based on
the website www.guru99.com once the result is within 1-10 the codes are
Structured and well written, High Testability and Cost and Effort is less.
30
c. Experimental Analysis
i. Test Setup
The researchers setup the software and hardware which serves as the
environment needed for the testing of different test cases. In terms of software
with at least 2gb RAM so the user can install the application. In terms of
pc/computer that will serves as server of the application, Pentium processor, 1gb
of RAM and integrated graphics card is enough because the server does not
Physical Size 5.2 inches, 5.0 inches, 4.8 inches, 5.5 inches, 5.2 inches,
74.5 cm2 68.9 cm2 63.5 cm2 83.4 cm2 74.5 cm2
31
(~69.9% (~68.9% (~65.9% (~73.6% (~68.7%
screen-to- screen-to- screen-to- screen-to- screen-to-
body ratio) body ratio) body ratio) body ratio) body ratio)
Resolution 1080 x 1920 720 x 1280 720 x 1280 1080 x 1920 720 x 1280
pixels, 16:9 pixels, 16:9 pixels, 16:9 pixels, 16:9 pixels, 16:9
ratio (~424 ratio (~294 ratio (~306 ratio (~401 ratio (~282
ppi density) ppi density) ppi density) ppi density) ppi density)
Internal 16 GB 8 GB, 16 GB 64 GB 16 GB
Storage
Bluetooth 4.1, A2DP, 4.0, A2DP 4.0, A2DP, 4.2, A2DP, 4.1, A2DP,
LE EDR, aptX EDR, LE LE
application was tested. This also shows that the application was successfully
tested on different Mobile Phones with Android version from Kitkat to Nougat OS.
32
Table 6. Key Persons and their Roles on Testing
2. Jerry Boy Q. Santos Device Setup (Windows PC), Recording the test
result
Table 6 shows the key persons and each roles on test setup. Key person
1 was assigned in gathering data, documenting the test and setting-up the
android phone. Key person 2 was assigned in taking down notes especially the
result of testing and also setting-up the windows PC. The key person 3 was
the client server and the host android mobile phone and analyzing the test
results.
33
ii. Testing Procedure
The test starts by setting up the network and the devices needed in testing
Nougat version of Operating System and has a 2gb of RAM. With the use of
Android studio, where the researchers used to developed the application, it has a
built-in tools that can be used, making the testing automated. Since the testing is
automated, it is expected that all the outputs generated will be recorded up to the
smallest milliseconds.
see the difference in results between different devices and by the use of wireless
network. After all the process, researchers recorded the given data of testing
34
CHAPTER 4
This chapter shows the Evaluation metrics used by the researchers on the
study. Evaluation results, together with the graph based on the testing procedure
Evaluation Metrics
a. Accuracy
But before testing it, the researchers make sure that both devices
are connected at the same network. Because the overall output will
b. Code Complexity
There are free open source tools available online, which the
35
to Computer) the computation below was the actual computation of
file transfer.
where,
CC = 8 - 2+ 2*1
CC = 6 +2
CC = 8
The result was 8, which means the code is well written, high
was stated there that once the result is between 1-10 the code is
After testing the complexity of the code for file transfer, researchers
36
Cyclomatic complexity = E - N + 2*P
where,
CC = 5 - 2 + 2*1
CC = 3 +2
CC = 5
was stated there that once the result is between 1-10 the code is
c. Time Complexity
researchers setup the devices and inputted the data required. The
37
produced a desirable output. The file was transferred on a desirable
Nokia 5 was 1.52 seconds and lastly Huawei P9 Lite got 1.07
38
Evaluation Results
This figure showed the testing result for time complexity. Wherein the
researchers check the time using different android phones. For Lenovo A5000
got 3.83 sec. For Zenfone 3 laser it has 2.60 sec., for Samsung galaxy S3 it has
2.11 sec., for Nokia 5 it has 1.52 sec., lastly for Huawei P9 it has 1.07 sec. Based
on the output. Time would not exceed to 4 sec. The maximum time was 3.83
seconds.
39
Table 8. The Equivalent result of Time of Android Phone
Nokia 5 passed
The table above shows the equivalent result of every phone tested by the
researchers. All of those are PASSED because of not having more than 5
Code complexity:
complexity. The researchers computed the code complexity of File Upload and
File Download.
where,
40
P = number of nodes that have exit points
CC = 8 - 2+ 2*1
CC = 6 +2
CC = 8
where,
CC = 5 - 2 + 2*1
CC = 3 +2
CC = 5
41
Figure 6. Graph result of code complexity
Figure 6 shows the result of the computation for code complexity by the
which means that the code is well written code, High Testability and Cost and
42
Table 8. Corresponding meaning of complexity numbers
High Testability
Medium Testability
Low Testability
on the website guru99. Through this the researchers can easily identify if the
codes are complex. The first testing which was getting the code complexity of
File download. This test gave a result of 5 which means the complexity of the
codes is well written, high testability, and cost and effort is less. The next testing
was for the File Transfer Fragment of file upload where the result was 8 which
43
means the complexity of the codes is well written, high testability, and cost and
effort is less. Because as long as the result is within 1-10 the code is high
testability, cost and effort less. For accuracy the researchers testing it by sending
file and what is supposedly sent was accurate from what the computer received
and vice versa. For time complexity, the code was compatible from other devices
because it was working very well based on the result during testing procedure.
After getting all the result through testing, the researchers found out that
the complexity of their codes has minimal risk by getting 5 and 8 output. Based
on the table shown on the evaluation result. Having a result between 1-10
meaning that the codes are high testability, cost and effort is less. For time
phones. And the result is by having not more than 5 seconds of file transferring it
specification and file size. In terms of accuracy, researchers found out that the
result was accurate because of the result acquired. The file transferred was
accurate from what the receiving device. The code was compatible from other
devices because it is working very well based on the result during testing
procedure.
44
Chapter 5
from the development and analysis of the evaluation results, and the
SUMMARY OF FINDINGS
On the basis of the tests and evaluation conducted by the study of the
CONCLUSIONS
testing procedure that they have done. With the help of some sources available
RECOMMENDATIONS
45
Based on the conclusions derived from the study, the following
recommendations are:
3. The future researchers may continue this study and can use other
4. The future researchers may also try a different algorithm for File
The researchers would like to prove more the efficiency, accuracy and
speed in terms of performance of the chosen study with the help of the future
researchers together with other algorithm, method, procedure and metrics that
46
47