Browsing by Author "Misra, Sanjay"
Now showing 1 - 20 of 146
- Results Per Page
- Sort Options
Article Citation - WoS: 34Citation - Scopus: 62Adopting Automated Whitelist Approach for Detecting Phishing Attacks(Elsevier Advanced Technology, 2021) Azeez, Nureni Ayofe; Misra, Sanjay; Margaret, Ihotu Agbo; Fernandez-Sanz, Luis; Abdulhamid, Shafi'i Muhammad; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityPhishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of quick access time in a real-time environment. However, it has been established that blacklist solution methods offer quick and immediate access time but with a low detection rate. This research paper presents an automated white-list approach for detecting phishing attacks. The white-list is determined by carrying out a detailed analysis between the visual link and the actual link. The similarities of the known trusted site are calculated by juxtaposing the domain name with the contents of the whitelist and later match it with the IP address before a decision is made and further analyzing the actual link and the visual link by calculating the similarities of the known trusted site. The technique then takes a final decision on the extracted information from the hyperlink, which can also be obtained from the web address provided by the user. The experiments carried out provided a very high level of accuracy, specifically, when the dataset was relatively at the lowest level. Six different datasets were used to perform the experiments. The average accuracy obtained after the six experiments was 96.17% and the approach detects phishing sites with a 95.0% true positive rate. It was observed that the level of accuracy varies from one dataset to another. This result shows that the proposed method performs better than similar approaches benchmarked with. The efficiency of the approach was further established through its computation time, memory, bandwidth as well as other computational resources that were utilized with the minimum requirements when compared with other approaches. This solution has provided immense benefits over the existing solutions by reducing the memory requirements and computational complexity, among other benefits. It has also shown that the proposed method can provide more robust detection performances when compared to other techniques. (c) 2021 Elsevier Ltd. All rights reserved.Article Citation - WoS: 36Citation - Scopus: 59Adoption of Mobile Applications for Teaching-Learning Process in Rural Girls' Schools in India: an Empirical Study(Springer, 2020) Chatterjee, Sheshadri; Majumdar, Dipasree; Misra, Sanjay; Damasevicius, Robertas; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityThe purpose of this study is to identify the factors that can impact the adoption of mobile apps for teaching-learning process focusing on the girls' school in rural India. The hypotheses were proposed and a conceptual model has been developed. There is a survey work conducted to collect the data from different respondents using a convenience sampling method. The model has been validated statistically through PLS-SEM analysis covering feedbacks of 271 effective respondents. The study highlights the impact of different antecedents of the behavioural intention of the students of using mobile applications for teaching-learning process. The results also show that among other issues, price value has insignificant influence on the intention of the girl students of the rural India. During survey feedbacks have been obtained from the 271 respondents, which is meagre compared to vastness of the population and school of rural India. Only few predictors have been considered leaving possibilities of inclusion of other boundary conditions to enhance the explanative power more than that has been achieved in the proposed model with the explanative power of 81%. The model has provided laudable inputs to the educational policy makers and technology enablers and administrators to understand the impact of the mobile applications on the rural girls' school of India and facilitate the development of m-learning. Very few studies been conducted to explore the impact of mobile applications on the school education of rural India especially focusing on the girls' schools.Article Citation - WoS: 35Agriculture 4.0: an Implementation Framework for Food Security Attainment in Nigeria's Post-Covid Era(Ieee-inst Electrical Electronics Engineers inc, 2021) Oruma, Samson O.; Misra, Sanjay; Fernandez-Sanz, Luis; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityThe challenge of Nigeria's food insecurity in the era of the Covid-19 pandemic, insecurity, climate change, population growth, food wastage, etc., is a demanding task. This study addresses Nigeria's food insecurity challenges by adopting agriculture 4.0 and commercial farming. Using data from six digital libraries, the Nigerian Bureau of Statistics, and other internet sources, we conducted a Systematic Literature Review (SLR using PRISMA) on Nigeria's agriculture, food security, and agriculture 4.0. Our results show Nigeria's current agricultural state, threats to food security, and modern digital agriculture technologies. We adapted our SLR findings to develop an implementation framework for agriculture 4.0 in solving Nigeria's food insecurity challenge in the post-Covid-19 era. Our proposed framework integrates precision agriculture in Nigeria's food production and the necessary enabling digital technologies in the agri-food supply chain. We analyzed the critical implementation considerations during each agri-food supply chain stage of farming inputs, farming scale, farming approach, farming operation, food processing, food preservation/storage, distribution/logistics, and the final consumers. This study will help researchers, investors, and the government address food security in Nigeria. The implementation of agriculture 4.0 will substantially contribute to SDG 2 (zero hunger), SDG 3 (good health and well-being), and SDG 8 (decent work and economic growth) of #Envision 2030 of the United Nations, for the benefit of Nigeria, Africa, and the entire world.Article Citation - WoS: 17Citation - Scopus: 30Analysis of Cultural and Gender Influences on Teamwork Performance for Software Requirements Analysis in Multinational Environments(Wiley, 2012) Fernandez-Sanz, L.; Misra, Sanjay; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversitySoftware development is mainly a social activity where teams of developers should work as a coordinated unit to fulfill the needs of customers. Studies have shown the importance of teamwork ability as the main skill for software professionals both in local settings and in global software development. Teamwork performance can be evaluated according to different approaches but we need deeper analysis within software teams of differences in individuals' performance related to culture, nationality or even gender. We applied a simple evaluation experience named teamwork benefits awareness (TBA) to groups of last-year students of computing degrees with experience as junior IT professionals during intensive multinational workshops based on international software projects. TBA allowed to measure individual and team performance during a requirements analysis session based on a real project. Results segmented by nationality and gender are presented and analysed in comparison with the data collected from computing professionals in local settings. In general, no significant differences have been found out although interesting relations are suggested with two Hofstede's country indicators. TBA is also perceived as a good technique for highlighting both teamwork benefits as well as the nature of real situations of software requirements analysis and orientation to customer needs.Article Citation - WoS: 40Citation - Scopus: 48Analyzing Human Resource Management Practices Within the Gsd Context(Taylor & Francis inc, 2012) Colomo-Palacios, Ricardo; Casado-Lumbreras, Cristina; Soto-Acosta, Pedro; Misra, Sanjay; Garcia-Penalvo, Francisco Jose; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityThe development of software across different countries (and time zones) differs substantially from software development in one single country or region. The management of processes and people, who work in globally distributed teams, requires a high level of coordination and collaboration which needs to be based on established human resource management practices. The People Capability Maturity Model (People-CMM) provides a complete framework that enables quality in human resource management to be improved. However, today, the adoption of the People-CMM within organizations using Global Software Development (GSD) is not an easy task. This paper uses an empirical study to analyze the implementation of the People-CMM within the GSD context. Results confirm that cultural and communication problems are the main challenges in the implementation of the People-CMM adoption within GSD scenarios.Article Citation - WoS: 9Citation - Scopus: 22Anomaly Detection Using Fuzzy Q-Learning Algorithm(Budapest Tech, 2014) Shamshirband, Shahaboddin; Anuar, Nor Badrul; Kiah, Miss Laiha Mat; Misra, Sanjay; Computer Engineering; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityWireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim's mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier, with less computational complexity, and an accurate decision making to stunt such attacks. In this paper, we propose an intrusion detection system called Fuzzy Q-learning (FQL) algorithm to protect wireless nodes within the network and target nodes from DDoS attacks to identify the attack patterns and take appropriate countermeasures. The FQL algorithm was trained and tested to establish its performance by generating attacks from the NSL-KDD and CAIDA DDoS Attack datasets during the simulation experiments. Experimental results show that the proposed FQL IDS has higher accuracy of detection rate than Fuzzy Logic Controller and Q-learning algorithm alone.Article Citation - WoS: 15Citation - Scopus: 22Applicability of Weyuker's Properties on Oo Metrics: Some Misunderstandings(Comsis Consortium, 2008) Misra, Sanjay; Akman, Ibrahim; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityWeyuker's properties have been suggested as a guiding tool in identification of a good and comprehensive complexity measure by several researchers. Weyuker proposed nine properties to evaluate complexity measure for traditional programming. However, they are extensively used for evaluating object-oriented (OO) metrics, although the object-oriented features are entirely different in nature. In this paper, two recently reported OO metrics were evaluated and, based on it; the usefulness and relevance of these properties for evaluation purpose for object-oriented systems is discussed.Article Citation - WoS: 5Citation - Scopus: 5Applying Model-Driven Paradigm for the Improvement of Web Requirement Validation(Budapest Tech, 2012) Aragon, Gustavo; Escalona, M. J.; Hilera, Jose R.; Fernandez-Sanz, Luis; Misra, Sanjay; Computer Engineering; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityThis paper proposes an approach for Web requirements validation by applying the model-driven paradigm in classical requirements validation techniques. In particular, we present how the Navigational Development Techniques (NDT) approach exploits the model-driven paradigm to improve its requirements validation task by exploring tool cases that systematize or even automate the application of requirements validation techniques. Our solution is validated by applying it in a real industrial environment. The results and the learned lessons are presented accordingly.Article Citation - WoS: 5An Approach for E-Commerce On-Demand Service-Oriented Product Line Development(Budapest Tech, 2013) Ezenwoke, Azubuike; Misra, Sanjay; Adigun, Mathew; Mathematics; Computer Engineering; 02. School of Arts and Sciences; 06. School Of Engineering; 01. Atılım UniversityThe growth of Small, Medium and Micro Enterprises (SMMEs) is important to the economic development of Africa. This growth can be greatly enhanced by leveraging IT in business activities since e-commerce is a vital tool to allow participation in globalization. Many SMMEs cannot afford to own e-commerce facilities and to reduce cost. An SMME can pay for just the e-commerce facility they use without owning the services or infrastructure. Due to the dynamic nature of the business domain, delivering such on-demand functionalities involves high flexibility in adapting to new client requirements; therefore, a systematic approach to software component reuse must be adopted to reduce cost and the time to market for new products. This work explores the reuse capabilities of a hybridization of Service Oriented Architecture (SOA) and Software Product Line (SPL).Article Citation - WoS: 11Citation - Scopus: 16An Approach for the Empirical Validation of Software Complexity Measures(Budapest Tech, 2011) Misra, Sanjay; Computer Engineering; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversitySoftware metrics are widely accepted tools to control and assure software quality. A large number of software metrics with a variety of content can be found in the literature; however most of them are not adopted in industry as they are seen as irrelevant to needs, as they are unsupported, and the major reason behind this is due to improper empirical validation. This paper tries to identify possible root causes for the improper empirical validation of the software metrics. A practical model for the empirical validation of software metrics is proposed along with root causes. The model is validated by applying it to recently proposed and well known metrics.Article Citation - WoS: 20Citation - Scopus: 32An Artificial Neural Network Model for Road Accident Prediction: a Case Study of a Developing Country(Budapest Tech, 2014) Ogwueleka, Francisca Nonyelum; Misra, Sanjay; Ogwueleka, Toochukwu Chibueze; Fernandez-Sanz, L.; Computer Engineering; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityRoad traffic accidents (RTA) are one of the major root causes of the unnatural loses of human beings all over the world. Although the rates of RTAs are decreasing in most developed countries, this is not the case in developing countries. The increase in the number of vehicles and inefficient drivers on the road, as well as to the poor conditions and maintenance of the roads, are responsible for this crisis in developing countries. In this paper, we produce a design of an Artificial Neural Network (ANN) model for the analysis and prediction of accident rates in a developing country. We apply the most recent (1998 to 2010) data to our model. In the design, the number of vehicles, accidents, and population were selected and used as model parameters. The sigmoid and linear functions were used as activation functions with the feed forward-back propagation algorithm. The performance evaluation of the model signified that the ANN model is better than other statistical methods in use.Article Citation - WoS: 13ASSESSING COGNITIVE COMPLEXITY IN JAVA-BASED OBJECT-ORIENTED SYSTEMS: METRICS AND TOOL SUPPORT(Slovak Acad Sciences inst informatics, 2016) Crasso, Marco; Mateos, Cristian; Zunino, Alejandro; Misra, Sanjay; Polvorin, Pablo; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversitySoftware cognitive complexity refers to how demanding the mental process of performing tasks such as coding, testing, debugging, or modifying source code is. Achieving low levels of cognitive complexity is crucial for ensuring high levels of software maintainability, which is one of the most rewardful software quality attributes. Therefore, in order to control and ensure software maintainability, it is first necessary to accurately quantify software cognitive complexity. In this line, this paper presents a software metric to assess cognitive complexity in Object Oriented (OO) systems, and particularly those developed in the Java language, which is very popular among OO programming languages. The proposed metric is based on a characterization of basic control structures present in Java systems. Several algorithms to compute the metric and their materialization in the Eclipse IDE are also introduced. Finally, a theoretical validation of the metric against a framework specially designed to validate software complexity metrics is presented, and the applicability of the tool is shown by illustrating the metric in the context of ten real world Java projects and relevant metrics from the well-known Chidamber-Kemerer metric suite.Review Citation - WoS: 16Citation - Scopus: 20Assessing the Coverage of E-Health Services in Sub-Saharan Africa a Systematic Review and Analysis(Georg Thieme verlag Kg, 2017) Adeloye, Davies; Adigun, Taiwo; Misra, Sanjay; Omoregbe, Nicholas; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityBackground: E-Health has attracted growing interests globally. The relative lack of facilities, skills, funds and information on existing e-Health initiatives has affected progress on e-Health in Africa. Objectives: To review publicly available literature on e-Health in sub-Saharan Africa (sSA) towards providing information on existing and ongoing e-Health initiatives in the region. Methods: Searches of relevant literature were conducted on Medline, EMBASE and Global Health, with search dates set from 1990 to 2016. We included studies on e-Health initiatives (prototypes, designs, or completed projects) targeting population groups in sSA. Results: Our search returned 2322 hits, with 26 studies retained. Included studies were conducted in 14 countries across the four sub-regions in sSA (Central, East, South and West) and spreading over a 12-year period, 2002-2014. Six types of e-Health interventions were reported, with 17 studies (65%) based on telemedicine, followed by mHealth with 5 studies (19%). Other e-Health types include expert system, electronic medical records, e-mails, and online health module. Specific medical specialties covered include dermatology (19%), pathology (12%) and radiology (8%). Successes were 'widely reported' (representing 50% overall acceptance or positive feedbacks in a study) in 10 studies (38%). The prominent challenges reported were technical problems, poor inter net and connectivity, participants' selection biases, contextual issues, and lack of funds. Conclusion: E-Health is evolving in sSA, but with poorly published evidence. While we call for more quality research in the region, it is also important that population-wide policies and on-going e-Health initiatives are contextually feasible, acceptable, and sustainable.Article Citation - Scopus: 4Attitude of Mobile Telecommunication Subscribers Towards Sim Card Registration in Lagos State, Southwestern Nigeria(Springer india, 2019) Oyediran, O.; Omoshule, A.; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, Robertas; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityDespite the concerted effort of the Nigeria Communication Commission (NCC) to ensure that Nigeria mobile phone subscribers register their SIM cards, there has been some level of apathy on the part of the mobile phone subscribers. This study investigated the attitude of mobile telecommunication subscribers towards SIM card registration in Lagos Metropolis, Nigeria. The theories of planned behaviour and reasoned action were adapted for the study because they provide the necessary constructs that help to investigate the attitudes of telecommunication subscribers. The purposive sampling technique was adopted in selecting five local government areas within Lagos. Random sampling method was used to select 300 mobile phone subscribers. In total, 290 responses were collected and were found usable. Data analysis was performed using statistical methods, and Spearman's correlation analysis was used to test relationship between the variables of interest. The results of the study revealed that SIM card users have positive attitude towards SIM card registration. Perceived usefulness and perceived ease of use significantly influenced subscribers attitude towards SIM card registration with both of them having negative significant relationship with attitude towards registration (r = -.116, r = -.132, p < 0.05) respectively.Article Citation - WoS: 6Citation - Scopus: 8Automated Recovery and Visualization of Test-To Traceability (tct) Links: an Evaluation(Ieee-inst Electrical Electronics Engineers inc, 2021) Aljawabrah, Nadera; Gergely, Tamas; Misra, Sanjay; Fernandez-Sanz, Luis; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityIn the software development process, traceability links between unit tests and code are not explicitly maintained, and dependencies in most cases are manually identified. As a result, a large amount of effort and time is required during the comprehension process to establish the links between these artifacts. Although there are several methods that can infer such links based on different phenomenons, these methods usually produce different set of traceability links. This work expands upon previous traceability link recovery and visualization studies by implementing a combination of traceability recovery methods that automatically retrieve the links, and visualizing them to help developers to overview the links inferred by various recovery techniques, and also to select the right relations for analyses. The results of the usability study show that the visualization model presented herein can effectively support browsing, comprehension, and maintenance of Test-to Code Traceability (TCT) links in a system with enhanced efficiency, as well as visualization of TCT links from multiple sources is better than a visualization of single source of traceability links.Conference Object Citation - WoS: 2Citation - Scopus: 3Autonomous Tuning for Constraint Programming Via Artificial Bee Colony Optimization(Springer-verlag Berlin, 2015) Soto, Ricardo; Crawford, Broderick; Mella, Felipe; Flores, Javier; Galleguillos, Cristian; Misra, Sanjay; Paredes, Fernando; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityConstraint Programming allows the resolution of complex problems, mainly combinatorial ones. These problems are defined by a set of variables that are subject to a domain of possible values and a set of constraints. The resolution of these problems is carried out by a constraint satisfaction solver which explores a search tree of potential solutions. This exploration is controlled by the enumeration strategy, which is responsible for choosing the order in which variables and values are selected to generate the potential solution. Autonomous Search provides the ability to the solver to self-tune its enumeration strategy in order to select the most appropriate one for each part of the search tree. This self-tuning process is commonly supported by an optimizer which attempts to maximize the quality of the search process, that is, to accelerate the resolution. In this work, we present a new optimizer for self-tuning in constraint programming based on artificial bee colonies. We report encouraging results where our autonomous tuning approach clearly improves the performance of the resolution process.Article Citation - WoS: 20Citation - Scopus: 27Bug Severity Assessment in Cross Project Context and Identifying Training Candidates(World Scientific Publ Co Pte Ltd, 2017) Singh, V. B.; Misra, Sanjay; Sharma, Meera; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityThe automatic bug severity prediction will be useful in prioritising the development efforts, allocating resources and bug fixer. It needs historical data on which classifiers can be trained. In the absence of such historical data cross project prediction provides a good solution. In this paper, our objective is to automate the bug severity prediction by using a bug metric summary and to identify best training candidates in cross project context. The text mining technique has been used to extract the summary terms and trained the classifiers using these terms. About 63 training candidates have been designed by combining seven datasets of Eclipse projects to develop the severity prediction models. To deal with the imbalance bug data problem, we employed two approaches of ensemble by using two operators available in RapidMiner: Vote and Bagging. Results show that k-Nearest Neighbour (k-NN) performance is better than the Support Vector Machine (SVM) performance. Naive Bayes f-measure performance is poor, i.e. below 34.25%. In case of k-NN, developing training candidates by combining more than one training datasets helps in improving the performances (f-measure and accuracy). The two ensemble approaches have improved the f-measure performance up to 5% and 10% respectively for the severity levels having less number of bug reports in comparison of major severity level. We have further motivated the paper with a cross project bug severity prediction between Eclipse and Mozilla products. Results show that Mozilla products can be used to build reliable prediction models for Eclipse products and vice versa in case of SVM and k-NN classifiers.Article Citation - WoS: 36Citation - Scopus: 58Career Abandonment Intentions among Software Workers(Wiley, 2014) Colomo-Palacios, Ricardo; Casado-Lumbreras, Cristina; Misra, Sanjay; Soto-Acosta, Pedro; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityWithin the software development industry, human resources have been recognized as one of the most decisive and scarce resources. Today, the retention of skilled IT (information technology) personnel is a major issue for employers and recruiters as well, since IT career abandonment is a common practice and means not only the loss of personnel, knowledge, and skills, but also the loss of business opportunities. This article seeks to discover the main motivations young practitioners abandon the software career. To achieve this objective, two studies were conducted. The first study was qualitative (performed through semistructured interviews) and intended to discover the main variables affecting software career abandonment. The second study was quantitative, consisting of a Web-based survey developed from the output of the first study and administered to a sample of 148 IT practitioners. Results show that work-related, psychological, and emotional variable are the most relevant group of variables explaining IT career abandonment. More specifically, the three most important variables that motivate employees to abandon the career are effort-reward imbalance, perceived workload, and emotional exhaustion. In contrast, variables such as politics and infighting, uncool work, and insufficient resources influence to a lesser extent the decision to leave the career. (c) 2012 Wiley Periodicals, Inc.Conference Object Citation - WoS: 9Citation - Scopus: 12A Case Study on Measuring the Size of Microservices(Springer international Publishing Ag, 2018) Vural, Hulya; Koyuncu, Murat; Misra, Sanjay; Information Systems Engineering; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityIn cloud computing, the microservices has become the mostly used architectural style. However, there is still an ongoing debate about how big a microservice should be. In this case study, a monolith application is measured using Common Software Measurement International Consortium (COSMIC) Function Points. The same application is divided into pieces by following the Domain Driven Design (DDD) principles. The resulting cloud friendly microservices are measured again using COSMIC Function Points and the obtained results are compared.Article Citation - WoS: 98Citation - Scopus: 154Cassava Disease Recognition From Low-Quality Images Using Enhanced Data Augmentation Model and Deep Learning(Wiley, 2021) Abayomi-Alli, Olusola Oluwakemi; Damasevicius, Robertas; Misra, Sanjay; Maskeliunas, Rytis; Computer Engineering; 06. School Of Engineering; 01. Atılım UniversityImprovement of deep learning algorithms in smart agriculture is important to support the early detection of plant diseases, thereby improving crop yields. Data acquisition for machine learning applications is an expensive task due to the requirements of expert knowledge and professional equipment. The usability of any application in a real-world setting is often limited by unskilled users and the limitations of devices used for acquiring images for classification. We aim to improve the accuracy of deep learning models on low-quality test images using data augmentation techniques for neural network training. We generate synthetic images with a modified colour value distribution to expand the trainable image colour space and to train the neural network to recognize important colour-based features, which are less sensitive to the deficiencies of low-quality images such as those affected by blurring or motion. This paper introduces a novel image colour histogram transformation technique for generating synthetic images for data augmentation in image classification tasks. The approach is based on the convolution of the Chebyshev orthogonal functions with the probability distribution functions of image colour histograms. To validate our proposed model, we used four methods (resolution down-sampling, Gaussian blurring, motion blur, and overexposure) for reducing image quality from the Cassava leaf disease dataset. The results based on the modified MobileNetV2 neural network showed a statistically significant improvement of cassava leaf disease recognition accuracy on lower-quality testing images when compared with the baseline network. The model can be easily deployed for recognizing and detecting cassava leaf diseases in lower quality images, which is a major factor in practical data acquisition.
