Browsing by Author "Misra,S."
Now showing 1 - 20 of 35
- Results Per Page
- Sort Options
Conference Object Citation Count: 2A cognitive evaluation for meetings in software development process(Springer Verlag, 2009) Mısra, Sanjay; Akman,I.; Computer EngineeringSoftware development includes number of different type of meetings in the whole development process. The cognitive activities also play an important role in decision making activities in these meetings since they are carried out by human being. In this paper, we evaluated the relevance of meetings in different phases of the software development process with reference to cognitive aspects. © 2009 Springer Berlin Heidelberg.Conference Object Citation Count: 5A cognitive requirement specification model(2009) Mısra, Sanjay; Misra,S.; Computer EngineeringEliciting/Gathering information from the customers in requirement phase is the most crucial task in the development of the software development process, because this phase builds the base for the success or failure of any software product. Requirements specification process highly depends on the knowledge and mental abilities of the customers. In this paper, we are proposing a cognitive requirement specification model based on the cognitive classification of customers. © 2009 IEEE.Conference Object Citation Count: 7Comparative study of cognitive complexity measures(2008) Mısra, Sanjay; Akman,I.; Computer EngineeringComplexity metrics are used to predict critical information about reliability and maintainability of software systems. Cognitive complexity measure based on cognitive informatics, plays an important role in understanding the fundamental characteristics of software, therefore directly affects the understandability and maintainability of software systems. In this paper, we compared available cognitive complexity measures and evaluated cognitive weight complexity measure in terms of Weyuker's properties. © 2008 IEEE.Conference Object Citation Count: 5Complexity metrics for cascading style sheets(2012) Mısra, Sanjay; Misra,S.; Ikhu-Omoregbe,N.; Computer EngineeringWeb applications are becoming important for small and large companies since they are integrated with their business strategies. Cascading Style Sheets (CSS) however are an integral part of contemporary Web applications that are perceived as complex by users and this result in hampering its widespread adoption. The factors responsible for CSS complexity include size, variety in its rule block structures, rule block reuse, cohesion and attribute definition in rule blocks. In this paper, we have proposed relevant metric for each of the complexity factors. The proposed metrics are validated through a practical framework. The outcome shows that the proposed metrics satisfy most of the parameters required by the practical framework hence establishing them as well structured. © 2012 Springer-Verlag.Conference Object Citation Count: 3Conflict resolution via emerging technologies?(Institute of Physics Publishing, 2019) Mısra, Sanjay; Ugot,O.-A.; Misra,S.; Adewumi,A.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringThis paper presents a review of the current techniques and approaches adopted in conflict resolution in Multi-Agent Systems (MAS). The review highlights the strength and weaknesses, and thus, their success in fostering cooperation and collaboration in multi-agent systems. We survey alternative approaches to conflict resolution that rely on emerging technologies such as deep learning. From the survey, we discuss the benefits of using these emerging technologies in the conflict resolution process. © 2019 Published under licence by IOP Publishing Ltd.Conference Object Citation Count: 10Design and implementation of a mobile webcast application with google analytics and cloud messaging functionality(Institute of Physics Publishing, 2019) Mısra, Sanjay; Misra,S.; Ibanga,E.; Maskeliunas,R.; Damasevicius,R.; Ahuja,R.; Computer EngineeringChurch cast is an application developed to bring the messages of ministries closer to their members by harnessing the Internet and mobile devices. Due to the very busy schedules of people and religious restrictions in some countries, people are not usually able to be physically present at their locations of worship to listen to or watch their ministers. Existing applications developed in the past like DOMI radio and Redemption TV Media were limited to only audio, poor and unintuitive user interfaces and not providing the administrator any interactions with the users of the application. In this work, we develop an Android-based application that makes it possible for users to watch live streams and on-demand videos from their ministries using their mobile devices. The application also incorporates sharing and analytics functionalities to enable users to share videos messages with loved ones and help the administrator monitor users' activities on the application respectively. The cloud messaging functionality enables the administrator to send messages such as announcements to user devices as push notifications. This would eventually increase user knowledge and interaction with the activities going on in their respective places of worship. © 2019 Published under licence by IOP Publishing Ltd.Article Citation Count: 6The determinants of e-tourism websites for tourists while selecting a travel destination(Inderscience Publishers, 2022) Mısra, Sanjay; Majumdar,D.; Misra,S.; Damasevicius,R.; Computer EngineeringThe purpose of this article is to identify the determinants of the e-tourism websites for tourists to select their travel destinations. Based on the review of the literature, a conceptual model has been developed. The model contains antecedents of e-tourism websites that could help a tourist to select the travel destination. The model has been validated statistically with a survey involving 309 usable respondents. The PLS-SEM analysis was conducted for hypotheses testing and for validation of the conceptual model. The results show that the antecedents of e-tourism websites like the ease of use, website enjoyment, perceived authenticity of websites, and perceived risk have an impact on the tourists for selection of their travel destinations. The e-tourism websites should possess special features to help travellers to accurately finalise their travel destinations. The developer of the website should design the websites to be interactive so that the viewers can enjoy while surfing the website and should be cautious towards the accuracy of the information-content so that the viewers can feel the contents authenticated. Since there are not many studies in the context of the contribution of e-tourism websites for selecting a travel destination, this study has taken an attempt to fill up this gap. © 2022 Inderscience Enterprises Ltd.Conference Object Citation Count: 3A discussion on IS and software measurement terminology flexibility as an example(Institute of Electrical and Electronics Engineers Inc., 2010) Mısra, Sanjay; Misra,S.; Computer EngineeringCloseness in meaning of the terms in the information systems and software engineering May result in discussion of using proper affiliated terms while covering the scope of research. An example is touched in this exploratory study, which discusses flexibility and its affiliated terms: changeability, adaptability, compatibility, flexibility, expandability, extendibility, extensibility and portability. A risk of misinterpretation due to the variety of the usage of the term is noted whereas the adoption of the term has shown that the literature does not have such examples to a serious level; but this review informs about missing discussions in the research reports in the literature due to omitting or ignoring affiliated terms of the keywords. Another product of this paper is to provide basis for future studies in the flexibility as a quality factor in the software measurement. © 2010 IEEE.Conference Object Citation Count: 4Effective project leadership in computer science and engineering(2009) Mısra, Sanjay; Misra,S.; Computer EngineeringProject leaders are the most important individuals in projects. A project leader should follow some thinking styles and values which can lead his or her team to success. There is a common notion among software specialists that the more complex a project manager thinks, the better his leadership is. In this paper, we discuss the significance of simple thinking in project leadership. If the leader thinks in a simple way, then the risk of being suffocated in details is less. Complex thinking brings out greater risks of losing the general control of the system because of spending too much time and effort on details and, as a result, more confusion. Not only simplicity, but also psychological factors are important in guiding teams and developing projects in the most effective way. Here, we present a set of qualities for a good project leader in software engineering. In addition to that, we also demonstrate how cognitive and ethical issues affect leadership qualities. © 2009 Springer Berlin Heidelberg.Conference Object Citation Count: 3Error density metrics for business process model(2009) Mısra, Sanjay; Misra,S.; Computer EngineeringIn this paper, metrics for business process model (BPM), are proposed, which are capable to measure the usability and effectiveness of BPMs. The proposed model is adapting error density metrics to BPMs by considering the similarities between the conceptual characteristics of BPMs and software products. We applied seven software metrics for evaluating quality of business processes/process models. Results show that our metrics help the organization to improve their process, as weighted measurements are indicators for unexpected situations/behaviour for business processes. © 2009 IEEE.Conference Object Citation Count: 0An evaluation on developer's perception of XML schema complexity metrics for web services(2013) Mısra, Sanjay; Mateos,C.; Coscia,J.L.O.; Zunino,A.; Misra,S.; Computer EngineeringUndoubtedly, the Service-Oriented Computing (SOC) is not an incipient computing paradigm anymore, while Web Services technologies is now a very mature stack of technologies. Both have been steadily gaining maturity as their adoption in the software industry grew. Accordingly, several metric suites for assessing different quality attributes of Web Services have been recently proposed. In particular, researchers have focused on measuring services interfaces descriptions, which like any other software artifact, have a measurable size, complexity and quality. This paper presents a study that assesses human perception of some recent services interfaces complexity metrics (Basci and Misra's metrics suite). Empirical evidence suggests that a service interface that it is not complex for a software application, in terms of time and space required to analyze it, will not be necessarily well designed, in terms of best practices for designing Web Services. A Likert-based questionnaire was used to gather individuals opinions about this topic. © 2013 Springer-Verlag Berlin Heidelberg.Article Citation Count: 40Identifying phishing attacks in communication networks using URL consistency features(Inderscience Publishers, 2020) Mısra, Sanjay; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.Article Citation Count: 40Identifying phishing attacks in communication networks using URL consistency features(Inderscience Publishers, 2020) Mısra, Sanjay; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.Article Citation Count: 12Impact analysis of renewable energy based generation in West Africa – a case study of Nigeria;(Politechnika Lubelska, 2021) Mısra, Sanjay; Misra,S.; Damaševičius,R.; Computer EngineeringThe limited supply of fossil fuels, constant rise in the demand of energy and the importance of reducing greenhouse emissions has brought about the adoption of renewable energy sources for generation of electrical power. In this paper, the impact of renewable energy generation in Nigeria is explored. A review of renewable deposits in Nigeria with a focus on Solar, Biomass, Hydropower, Pumped Storage Hydro and Ocean energy is detailed. The impact of renewable energy-based generation is assessed from three different dimensions: Economic Impact, Social Impact and Environmental Impact. In accessing economic impact; the conditions are employment and job creation, gross domestic product (GDP) growth and increase in local research and development. To analyze the social im-pact; renewable energy education, renewable energy businesses, ministries and institutes, renewable energy projects and investments as well as specific solar and wind projects across Nigeria were considered. Also, environmental issues were discussed. Similarly, policy imperatives for renewable energy generation in Nigeria was pro-vided. This paper would be useful in accessing the successes Nigeria has experienced so far in the area of sustainable development and the next steps to achieving universal energy for all in Nigeria in 2030. © 2020, Politechnika Lubelska. All rights reserved.Conference Object Citation Count: 3An Improved Feature Selection Method for Short Text Classification(Institute of Physics Publishing, 2019) Mısra, Sanjay; Misra,S.; Matthews,V.O.; Odusami,M.; Abayomi-Alli,A.; Ahuja,R.; Maskeliunas,R.; Computer EngineeringText has become one of the widest means of communication on mobile devices due to cheap rate and convenience for instance short text, web document, emails, instant messages. The exponential growth of text documents shared among users globally has increased the threat of misclassification associated with mobile devices such as Spam, Phishing, License to kill, Malware and privacy issues. Existing studies have shown that the major problem associated with text message classification is the poor representation of feature thus reducing accuracy and increasing f-measure rate. Thus, a modified Genetic Algorithm (GA) for improve feature selection and Artificial Immune System (AIS) algorithm was proposed for effective text classification in mobile short messages. The system will be deployed on an Android OS. © 2019 Published under licence by IOP Publishing Ltd.Conference Object Citation Count: 20An Improved Model for Alleviating Layer Seven Distributed Denial of Service Intrusion on Webserver(Institute of Physics Publishing, 2019) Mısra, Sanjay; Misra,S.; Adetiba,E.; Abayomi-Alli,O.; Damasevicius,R.; Ahuja,R.; Computer EngineeringApplication layer or Layer Seven Distributed Denial of service (L7DDoS) intrusion is one of the greatest threats that intrusion a webserver. The hackers have different motives which could be for Extortion, Exfiltration e.t.c Researchers have employed several methods to prevent L7DDoS intrusion especially using machine learning. Although Machine learning techniques has proven to be very effective with high detection accuracy, the approach still find it difficult to detect Hyper Text Transfer Protocol (HTTP) based botnet traffic on web server with high false positive rate. The adoption of deep learning based technique using Long Short Term Memory (LSTM) will alleviate this problem. © 2019 Published under licence by IOP Publishing Ltd.Conference Object Citation Count: 32Influence of human factors in software quality and productivity(2011) Mısra, Sanjay; Misra,S.; Computer EngineeringTraditionally more effort has been devoted to technical and process aspects of software quality and productivity. However, in an activity like software development so intensive in workforce and so dependent on professionals' performance, it is strange that human and social factors affecting development teams have been attracted little attention. This paper is aimed at analyzing contributions in this area as well as providing empirical data from specific initiatives to know more about real practices and situation in software organizations. © 2011 Springer-Verlag.Conference Object Citation Count: 7Measuring complexity of object oriented programs(2008) Mısra, Sanjay; Akman,I.; Computer EngineeringIn this paper, a metric for object oriented language is formulated and validated. On the contrary of the other metrics used for object oriented programming (OOPs), the proposed metric calculates the complexity of a class at method level and hence considers the internal architecture of the classes, subclasses and member functions. The proposed metric is evaluated against Weyuker's proposed set of measurement principles through examples and validated through experimentation, case study and comparative study with similar measures. The practical usefulness of the metric is evaluated by a practical framework. © 2008 Springer-Verlag Berlin Heidelberg.Conference Object Citation Count: 7Measuring complexity of object oriented programs(2008) Mısra, Sanjay; Akman,I.; Computer EngineeringIn this paper, a metric for object oriented language is formulated and validated. On the contrary of the other metrics used for object oriented programming (OOPs), the proposed metric calculates the complexity of a class at method level and hence considers the internal architecture of the classes, subclasses and member functions. The proposed metric is evaluated against Weyuker's proposed set of measurement principles through examples and validated through experimentation, case study and comparative study with similar measures. The practical usefulness of the metric is evaluated by a practical framework. © 2008 Springer-Verlag Berlin Heidelberg.Conference Object Citation Count: 10A model for measuring cognitive complexity of software(Springer Verlag, 2008) Mısra, Sanjay; Akman,I.; Computer EngineeringThis paper proposes a model for calculating cognitive complexity of a code. This model considers all major factors responsible for (cognitive) complexity. The practical applicability of the measure is evaluated through experimentation, test cases and comparative study. © 2008 Springer-Verlag Berlin Heidelberg.