Browsing by Author "Mishra, Alok"
Now showing 1 - 20 of 72
- Results Per Page
- Sort Options
Article Citation Count: 21Adopting of Agile methods in Software Development Organizations: Systematic Mapping(Assoc information Communication Technology Education & Science, 2017) Mıshra, Alok; Mishra, Alok; Software EngineeringAdoption of agile methods in the software development organization is considered as a powerful solution to deal with the quickly changing and regularly developing business environment and fully-educated customers with constantly rising expectation, such as shorter time periods and an extraordinary level of response and service. This study investigates the adoption of agile approaches in software development organizations by using systematic mapping. Six research questions are identified, and to answer these questions a number of research papers have been reviewed in electronic databases. Finally, 25 research papers are examined and answers to all research questions are provided.Article Citation Count: 15Agile Project Management Tools: A Brief Comprative View(inst information & Communication Technologies-bulgarian Acad Sciences, 2019) Mıshra, Alok; Mishra, Alok; Software EngineeringAgile methodologies are becoming popular in software development. Managers are required to understand project's progress and product quality without development documents. During Agile practices of the teams and organizations, Agile project management tools are frequently used. The use of such tools leads to achieving speed and efficiency, affects the quality of the software. The quality of final product is mostly related with to project management. Accordingly, the paper provides brief comparative perspective about the popular project management tools for agile projects. 16 popular Agile project management tools have been presented helping agile developers to plan and manage their tasks in an efficient manner. Taiga, Axosoft, Agielan, Planbox are more appropriate for start-up projects. The most twitted and most appreciated tools are reported as Jira, Trello, and VersionOne. SpiraTeam by Inflectra and Pivotal Tracker are other pricing and popular agile tools, providing flexibility to Agile developers and increase collaboration among team members.Article Citation Count: 7Algorithm for adaptive learning process and improving learners' skills in Java programming language(Wiley, 2018) Mıshra, Alok; Arsic, Aleksandra; Domazet, Dragan; Mishra, Alok; Software EngineeringAdaptive approaches within distance learning systems enable adapting teaching process to the needs of each learner during the learning process. This paper presents an algorithm for creating an adaptive learning process that provides knowledge and skills improvement for learners in the Java programming language. Also, it presents the application of the tool that checks the learner's knowledge through solving practical tasks from the Java programming language. The adaptive learning process in this work leads the learner through teaching materials and practical tasks where the acquired knowledge is required to be applied. Also, the algorithm, based on the measurement of knowledge and time spent on a particular part of the learning process with detailed feedback and the demonstration of observed deficiencies, directs the learner to teaching materials that allow improving the demonstrated knowledge. Teaching materials are conceived as learning objects and, as such, allow for the application of adaptive approach. An analysis of the effectiveness of the algorithm and tool for practical knowledge testing from the Java programming language was done with a test group of learners who gave their opinions and grades.Article Citation Count: 2Application of Agent Methodology in Healthcare Information Systems(Assoc information Communication Technology Education & Science, 2017) Mıshra, Alok; Mishra, Alok; Software EngineeringThis paper presents a case study to describe the features and the phases of the two agent methodologies. The Gaia methodology for agent oriented analysis and design, Tropos is a detailed agent oriented software engineering methodology to explore each methodology's ability to present solutions for small problems. Also we provide an attempt to discover whether the methodology is in fact understandable and usable. In addition we were collecting and taking notes of the advantages and weaknesses of these methodologies during the study analysis for each methodology and the relationships among their models. The Guardian Angle: Patient-Centered Health Information System (GA: PCHIS) is the personal system to help track, manage, and interpret the subject's health history, and give advice to both patient and provider is used as the case study throughout the paper.Article Citation Count: 51Applications of Stakeholder Theory in Information Systems and Technology(Kaunas Univ Technol, 2013) Mıshra, Alok; Mishra, Deepti; Mıshra, Deepti; Software Engineering; Computer EngineeringStakeholder theory has its origins in management literature. Preston (1999) traces the notion of stakeholders back to the great depression in the United States (1929-1941), when the General Electric company defined four major stakeholder groups - shareholders, employees, customers, and the general public. Stakeholder management has become an important tool to transfer ethics to management practice and strategy. Few management topics have generated more debate in recent decades than the underlying notion, the model and the theories surrounding stakeholders (Donaldson and Preston, 1995; Gibson, 2000; Wolfe and Putler, 2002; Friedman and Miles, 2006). The visual power of the stakeholder model and its high simplicity are seen as contributors to the success of the stakeholder concept (Fassin, 2008). An increasing interrelation is observed between the concepts of stakeholder theory, corporate responsibility, and business ethics (Valor, 2005; Garriga et al., 2004). The stakeholder approach in the organization integrates stakeholder relationships within a company's resource base, industry setting, and socio-political arena into a single analytical framework (Susniene & Sargunas, 2009). Mumford (1979) is one of the early researchers in supporting the involvement of end-users as a component of effective information systems development and implementation, using essentially the stakeholder concept in this domain. It has been proved that end-users and managers are very important towards successful system implementation. As more interorganizational information systems are developed which usually involve strategic decisions, a yet wider range of stakeholders needs to be involved (Pouloudi, 1999). In these systems the attention may switch from end-users and focus on those parties that are external to the organization, but who can also be associated in decision making at a managerial or strategic level (Pouloudi & Whitely, 1997). One of the most thorough investigations of the stakeholder concept in information systems research that relates information systems stakeholders with implementation failure was made as an early work by Lyytinen and Hirschheim (1987, 1988). They argue that failure is conditional on the capability of information system to meet the expectations of different stakeholders - i.e. to say an information system may be considered successful by some stakeholder but a failure by others. The concept of stakeholder represents a progression from developer - and user - centered problems to organization-wide and inter organizational information system problems. This is a sign of maturity of information systems research to show how holistic representation of the parties involved in the more complex systems currently developed (Pouloudi, 1999). Stakeholder theory proposes an ethical use of stakeholder concept in Information systems as ethical considerations and professional conduct is a significant issue in information system. The stakeholder theory is extensively used in management in investigating organizational ambiance, strategic management, ethical concerns, business planning process, e-government, project management, environment management, etc. Recently stakeholders are also seen as means to more successful information and communication technologies and information system development and implementation issues. The paper presents stakeholder theory, its origin and applications in Information Systems (IS) field in the literature. The main objective of this research is to build up the knowledge body of stakeholder applications in information systems and technology areas.Conference Object Citation Count: 12An Architectural Model for System of Information Systems(Springer int Publishing Ag, 2015) Mıshra, Alok; Marie-Helene, Abel; Mishra, Alok; Software EngineeringOne of the most important aspects when designing and constructing an Information System is its architecture. This also applies to complex systems such as System of Information Systems (SoIS). Thus, we aim to propose an architectural model of System of Information Systems (SoIS). Though Architecture-based approaches have been promoted as a means of controlling the complexity of systems construction and evolution, what we really look for in this paper is an architectural model to aggregate services from already constructed systems. Nevertheless, it would be a good practice to compare the presented architecture of SoIS to other architecture-based approaches such as Service Oriented Architecture (SOA). Also, it is beneficial to examine how we can use the well-established standards of SOA for the designing of SoIS. In this paper we present an architectural model for System of Information Systems, and highlight the standards of Service Oriented Architecture that might help us in this task.Article Citation Count: 12Attributes impacting cybersecurity policy development: An evidence from seven nations(Elsevier Advanced Technology, 2022) Mıshra, Alok; Alzoubi, Yehia Ibrahim; Anwar, Memoona Javeria; Gill, Asif Qumer; Software EngineeringCyber threats have risen as a result of the growing usage of the Internet. Organizations must have effec-tive cybersecurity policies in place to respond to escalating cyber threats. Individual users and corpora-tions are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. Some na-tions seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Identifying the common poli-cies across several nations may assist academics and policymakers in developing cybersecurity policies. A survey of other nations' cybersecurity policies might be included in the future research.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )Article Citation Count: 6Automatic Classification of UML Class Diagrams Using Deep Learning Technique: Convolutional Neural Network(Mdpi, 2021) Mıshra, Alok; Chowdhuri, Sripriya Roy; Singh, Jyoti; Gupta, Manjari; Mishra, Alok; Software EngineeringUnified Modeling Language (UML) includes various types of diagrams that help to study, analyze, document, design, or develop any software efficiently. Therefore, UML diagrams are of great advantage for researchers, software developers, and academicians. Class diagrams are the most widely used UML diagrams for this purpose. Despite its recognition as a standard modeling language for Object-Oriented software, it is difficult to learn. Although there exist repositories that aids the users with the collection of UML diagrams, there is still much more to explore and develop in this domain. The objective of our research was to develop a tool that can automatically classify the images as UML class diagrams and non-UML class diagrams. Earlier research used Machine Learning techniques for classifying class diagrams. Thus, they are required to identify image features and investigate the impact of these features on the UML class diagrams classification problem. We developed a new approach for automatically classifying class diagrams using the approach of Convolutional Neural Network under the domain of Deep Learning. We have applied the code on Convolutional Neural Networks with and without the Regularization technique. Our tool receives JPEG/PNG/GIF/TIFF images as input and predicts whether it is a UML class diagram image or not. There is no need to tag images of class diagrams as UML class diagrams in our dataset.Article Citation Count: 3Challenges in Agile Software Maintenance for Local and Global Development: An Empirical Assessment(Mdpi, 2023) Yazıcı, Ali; Mishra, Alok; Mıshra, Alok; Younas, Muhammad; Software EngineeringAgile methods have gained wide popularity recently due to their characteristics in software development. Despite the success of agile methods in the software maintenance process, several challenges have been reported. In this study, we investigate the challenges that measure the impact of agile methods in software maintenance in terms of quality factors. A survey was conducted to collect data from agile practitioners to establish their opinions about existing challenges. As a result of the statistical analysis of the data from the survey, it has been observed that there are moderately effective challenges in manageability, scalability, communication, collaboration, and transparency. Further research is required to validate software maintenance challenges in agile methods.Article Citation Count: 1Cloud-Based Test Tools: A Brief Comparative View(inst information & Communication Technologies-bulgarian Acad Sciences, 2018) Mıshra, Alok; Sezer, Leyla; Mishra, Alok; Software EngineeringThe concept of virtualization has brought life to the new methods of software testing. With the help of cloud technology, testing has become much more popular because of the opportunities it provides. Cloud technologies provides everything as a service, hence the software testing is also provided as a service on cloud with the privileges of lower cost of testing, and relatively less effort. There are various cloud-based test tools . focusing on different aspects of software testing such as load tests, regression tests, stress tests, performance tests, scalability tests, security tests, .functional tests, browser performance tests, and latency tests. This paper investigates the cloud-based testing tools focusing on different aspects of software testing.Article Citation Count: 3Comparing the Artifacts of Agent Methodologies(Assoc information Communication Technology Education & Science, 2018) Mıshra, Alok; Mishra, Alok; Software EngineeringAgent-oriented software engineering (AOSE) systems are often distinguished from each other based on intelligence, autonomy, and reasoning. In this recpect, agent methodologies aim to covering all important components needed to build software systems. The success of agent methodologies depends on the development of all the necessary processes within different software stages, such as analysis, design, implementation, testing and maintenance. This work introduces a comparative study of agent approches with the purpose to asseses and compare the development lifecycle processes of four different well-known AOSE methodologies, ADELFE, PASSI, Gaia and O-MaSE to define the similarities and differences between them. We can conclude that, the development of standard agent approach that supports Multi-Agent Systems (MAS) based has become an urgent need.Article Citation Count: 44Complex software project development: agile methods adoption(Wiley, 2011) Mıshra, Alok; Mishra, Alok; Mıshra, Deepti; Software Engineering; Computer EngineeringThe Agile Software Development paradigm has become increasingly popular in the last few years, since it claims lower costs, better productivity, better quality and better business satisfaction. Supply chain management (SCM) is a complex software development project. Owing to its scope and uncertain, complex and unstable requirements, it is not possible to develop it with predictable software development process models. Agile methodologies are targeted toward such kinds of problems that involve change and uncertainty, and are adaptive rather than predictive. How an agile process is introduced will significantly impact the implementation success of the process change. The objective of this paper is to analyze the agile development methodologies and management approach used in developing a complex software project. This further demonstrates how to overcome risks and barriers in each development phase of such complex inventive software projects. It also provides a set of guidelines regarding how the agile methodologies can be adopted, combined and used in these kinds of complex software projects. These findings have implications for software engineers and managers developing software by agile methods. Copyright (C) 2011 John Wiley & Sons, Ltd.Article Citation Count: 1A Conceptual Design of Smart Management System for Flooding Disaster(Mdpi, 2021) Mıshra, Alok; Mishra, Alok; Software EngineeringDisasters pose a real threat to the lives and property of citizens; therefore, it is necessary to reduce their impact to the minimum possible. In order to achieve this goal, a framework for enhancing the current disaster management system was proposed, called the smart disaster management system. The smart aspect of this system is due to the application of the principles of information and communication technology, especially the Internet of Things. All participants and activities of the proposed system were clarified by preparing a conceptual design by using The Unified Modeling Language diagrams. This effort was made to overcome the lack of citizens' readiness towards the use of information and communication technology as well as increase their readiness towards disasters. This study aims to develop conceptual design that can facilitate in development of smart management system for flooding disaster. This will assist in the design process of the Internet of Things systems in this regard.Book Part Citation Count: 2Curriculum Issues in Industry Oriented Software Engineering Education(Igi Global, 2012) Mıshra, Alok; Mishra, Deepti; Mıshra, Deepti; Software Engineering; Computer EngineeringSoftware engineering education has been emerging as an independent and mature discipline. Accordingly, various studies are being done to provide guidelines for the software engineering education curriculum design. This chapter summarizes the case for the need for software industry related courses and discusses the significance of industry oriented software engineering education to meet the educational objectives of all stakeholders. Software industry oriented curricula for the undergraduate and postgraduate levels are discussed. An industry oriented postgraduate level (Master's degree level) software engineering course is also proposed which includes foundational and applied courses to provide effective training to future software engineers. This will lead to the enhancement of their employment prospects in industrial and allied sectors.Master Thesis Cyber güvenlik politikalarının karşılaştırmalı araştırması(2017) Mıshra, Alok; Mishra, Alok; Software EngineeringSiber alan her zamankinden daha hızlı genişliyor ve bununla birlikte siber tehditler artmakta ve güçlü bir siber güvenlik politikası zorunluluğu bulunmaktadır. Siber saldırılar yalnızca bireysel kullanıcıları ve kuruluşları etkilemekle kalmaz, aynı zamanda ulusal güvenlik sorunlarına da neden olabilir. Farklı ülkelerin farklı politikaları, bilgisayar korsanlarının ve davetsiz misafirlerinin, yetkililerin suçluları takip etmesini imkansız hale getirirken siber saldırı düzenlemelerini mümkün kılıyor. Her türlü suçlunun takip edilebileceği ve buna göre cezalandırılabilmesi için her türlü siber tehdide yönelten kapsamlı bir siber güvenlik politikası geliştirmek önemlidir. Bu araştırma çalışması, seçilen ülkelerin siber güvenlik politikalarının farklı niteliklerini inceler ve karşılaştırır. Bu araştırma çalışması, her şey dahil bir siber güvenlik politikası geliştirmeye yardımcı olabilecek bazı önemli nitelikleri tanımlar.Article Citation Count: 21Cybersecurity Enterprises Policies: A Comparative Study(Mdpi, 2022) Mıshra, Alok; Alzoubi, Yehia Ibrahim; Gill, Asif Qumer; Anwar, Memoona Javeria; Software EngineeringCybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.Article Citation Count: 7Deep Learning-Based Computer-Aided Diagnosis (CAD): Applications for Medical Image Datasets(Mdpi, 2022) Khan, Muhammad Umer; Khan, Muhammad Umer; Mıshra, Alok; Software Engineering; Mechatronics EngineeringComputer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the best optimal features while reducing the amount of data. Lastly, diagnosis prediction (classification) is achieved using learnable classifiers. The novel framework for the extraction and selection of features is based on deep learning, auto-encoder, and ACO. The performance of the proposed approach is evaluated using two medical image datasets: chest X-ray (CXR) and magnetic resonance imaging (MRI) for the prediction of the existence of COVID-19 and brain tumors. Accuracy is used as the main measure to compare the performance of the proposed approach with existing state-of-the-art methods. The proposed system achieves an average accuracy of 99.61% and 99.18%, outperforming all other methods in diagnosing the presence of COVID-19 and brain tumors, respectively. Based on the achieved results, it can be claimed that physicians or radiologists can confidently utilize the proposed approach for diagnosing COVID-19 patients and patients with specific brain tumors.Article Citation Count: 3Deep Learning-Based Defect Prediction for Mobile Applications(Mdpi, 2022) Mıshra, Alok; Akbulut, Akhan; Catal, Cagatay; Mishra, Alok; Software EngineeringSmartphones have enabled the widespread use of mobile applications. However, there are unrecognized defects of mobile applications that can affect businesses due to a negative user experience. To avoid this, the defects of applications should be detected and removed before release. This study aims to develop a defect prediction model for mobile applications. We performed cross-project and within-project experiments and also used deep learning algorithms, such as convolutional neural networks (CNN) and long short term memory (LSTM) to develop a defect prediction model for Android-based applications. Based on our within-project experimental results, the CNN-based model provides the best performance for mobile application defect prediction with a 0.933 average area under ROC curve (AUC) value. For cross-project mobile application defect prediction, there is still room for improvement when deep learning algorithms are preferred.Article Citation Count: 7Deployment Optimization Algorithms in Wireless Sensor Networks for Smart Cities: A Systematic Mapping Study(Mdpi, 2022) Mıshra, Alok; Mishra, Alok; Software EngineeringIn recent years, different types of monitoring systems have been designed for various applications, in order to turn the urban environments into smart cities. Most of these systems consist of wireless sensor networks (WSN)s, and the designing of these systems has faced many problems. The first and most important problem is sensor node deployment. The main function of WSNs is to gather the required information, process it, and send it to remote places. A large number of sensor nodes were deployed in the monitored area, so finding the best deployment algorithm that achieves maximum coverage and connectivity with the minimum number of sensor nodes is the significant point of the research. This paper provides a systematic mapping study that includes the latest recent studies, which are focused on solving the deployment problem using optimization algorithms, especially heuristic and meta-heuristic algorithms in the period (2015-2022). It was found that 35% of these studies updated the swarm optimization algorithms to solve the deployment problem. This paper will be helpful for the practitioners and researchers, in order to work out new algorithms and seek objectives for the sensor deployment. A comparison table is provided, and the basic concepts of a smart city and WSNs are presented. Finally, an overview of the challenges and open issues are illustrated.Article Citation Count: 1Design Patterns Discovery in Source Code: Novel Technique Using Substring Match(Assoc information Communication Technology Education & Science, 2021) Mıshra, Alok; Pant, Vivekanand; Gupta, Manjari; Mishra, Alok; Software EngineeringThe role of design pattern mining is a very significant strategy of re-engineering as with the help of detection one could easily understand complex systems. Of course, identifying a design pattern is not always a simple task. Additionally, pattern recovering methods often encounter problems dealing with space outburst for extensive systems. This paper introduces a new way to discover a design pattern based on an Impact Analysis matrix followed by substring match. UML diagrams corresponding to codes are created using Visual Paradigm Enterprise. Impact Analysis matrices of these UML diagrams are converted to string format. Considering system code string as main string and design pattern string as a substring, the main string is further decomposed. A substring match technique is developed here to discover design patterns in the source code. Overall, this procedure has the potential to convert the representation of system design and design pattern in ingenious shapes. In addition, this method has the advantage of moderation in the size. Therefore, this approach is beneficial for Software professionals and researchers due to its simplicity.