Mısra, Sanjay

Loading...
Profile Picture
Name Variants
M.,Sanjay
Misra, Sanjay
Mısra,S.
Mısra, Sanjay
Misra,S.
S.,Misra
Sanjay, Mısra
Sanjay, Misra
S., Misra
S.,Mısra
M., Sanjay
Misra, S.
Job Title
Profesör Doktor
Email Address
sanjay.misra@atilim.edu.tr
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Scholarly Output

125

Articles

79

Citation Count

2203

Supervised Theses

1

Scholarly Output Search Results

Now showing 1 - 10 of 125
  • Conference Object
    Citation Count: 5
    A new complexity metric based on cognitive informatics
    (2008) Mısra, Sanjay; Akman,I.; Computer Engineering
    In this paper, a new complexity metric based on cognitive informatics is proposed for object oriented(OO) code. This is the single metric, which covers cognitive complexity of the OO system, method complexity and complexity due to inheritance together. The proposed metric was evaluated against Weyuker set of measurement principles. It was found that seven Weyuker properties are satisfied by this measure. © 2008 Springer-Verlag Berlin Heidelberg.
  • Article
    Citation Count: 31
    Adoption of mobile applications for teaching-learning process in rural girls' schools in India: an empirical study
    (Springer, 2020) Mısra, Sanjay; Majumdar, Dipasree; Misra, Sanjay; Damasevicius, Robertas; Computer Engineering
    The purpose of this study is to identify the factors that can impact the adoption of mobile apps for teaching-learning process focusing on the girls' school in rural India. The hypotheses were proposed and a conceptual model has been developed. There is a survey work conducted to collect the data from different respondents using a convenience sampling method. The model has been validated statistically through PLS-SEM analysis covering feedbacks of 271 effective respondents. The study highlights the impact of different antecedents of the behavioural intention of the students of using mobile applications for teaching-learning process. The results also show that among other issues, price value has insignificant influence on the intention of the girl students of the rural India. During survey feedbacks have been obtained from the 271 respondents, which is meagre compared to vastness of the population and school of rural India. Only few predictors have been considered leaving possibilities of inclusion of other boundary conditions to enhance the explanative power more than that has been achieved in the proposed model with the explanative power of 81%. The model has provided laudable inputs to the educational policy makers and technology enablers and administrators to understand the impact of the mobile applications on the rural girls' school of India and facilitate the development of m-learning. Very few studies been conducted to explore the impact of mobile applications on the school education of rural India especially focusing on the girls' schools.
  • Article
    Citation Count: 3
    Enhancing Misuse Cases With Risk Assessment for Safety Requirements
    (Ieee-inst Electrical Electronics Engineers inc, 2020) Mısra, Sanjay; Misra, Sanjay; Abayomi-Alli, Olusola O.; Fernandez-Sanz, Luis; Computer Engineering
    Risk-driven requirements elicitation represents an approach that allows assignment of appropriate countermeasure for the protection of the Information System (IS) depending on the risk level. Elicitation of safety requirements based on risk analysis is essential for those IS which will run on the open and dynamic Internet platform. Traditionally, misuse cases are used to find the weak points of an IS but cannot differentiate between the weak point that can lead to lenient hazard and/or serious hazard. In this paper, we present an enhanced misuse case approach to support IS safety risk assessment at the early stages of software process. We extensively examined and identified concepts which constitute a modelling technique for IS safety risk assessment and build a conceptual model for achieving IS safety risk assessment during the requirement analysis phase of software process. The risk assessment process follows an approach of consequential analysis based on misuse cases for safety hazard identification and qualitative risk measurement. The safety requirements are elicited according to the results of the risk assessment. A medical IS is used as a case study to validate the proposed model.
  • Article
    Citation Count: 14
    An Ontology-Based Security Risk Management Model for Information Systems
    (Springer Heidelberg, 2020) Mısra, Sanjay; Abayomi-Alli, Adebayo; Misra, Sanjay; Computer Engineering
    Security risk management is a knowledge-intensive procedure that requires monitoring and capturing relevant information that can assist in making the right decision by managers. In this paper, a semantically enhanced model for security management during the information system lifetime is proposed. The model supports the continuous collection of identified threat behaviours from the intrusion detection system, filtering and analysis of the threats within a time snapshot and re-appraiser of IS security countermeasures which involves the security administrator (S-Admin), managers, IS and security management system as stakeholders. The probe agent categorizes the security threats identified by the IDS using the developed ontology-driven knowledge base, while the likelihood of threats occurring in real time was obtained using long-term frequency probability. The case-based reasoning paradigm is employed for the security solution reasoning of identified threat risk. The suggested security solutions are based on CASE base built on existing threat ontology. The re-appraiser is based on the success likelihood of potential ongoing threats. The system facilitates management decision with regard to security control selection so that they can have a maximum Return on Security Investment. The proposed Collect-Probe-Analyse-Reason-Reappraise model is illustrated using an e-banking system.
  • Article
    Citation Count: 40
    An empirical analysis of the effectiveness of software metrics and fault prediction model for identifying faulty classes
    (Elsevier, 2017) Mısra, Sanjay; Misra, Sanjay; Rath, Santanu Ku.; Computer Engineering
    Software fault prediction models are used to predict faulty modules at the very early stage of software development life cycle. Predicting fault proneness using source code metrics is an area that has attracted several researchers' attention. The performance of a model to assess fault proneness depends on the source code metrics which are considered as the input for the model. In this work, we have proposed a framework to validate the source code metrics and identify a suitable set of source code metrics with the aim to reduce irrelevant features and improve the performance of the fault prediction model. Initially, we applied a t-test analysis and univariate logistic regression analysis to each source code metric to evaluate their potential for predicting fault proneness. Next, we performed a correlation analysis and multivariate linear regression stepwise forward selection to find the right set of source code metrics for fault prediction. The obtained set of source code metrics are considered as the input to develop a fault prediction model using a neural network with five different training algorithms and three different ensemble methods. The effectiveness of the developed fault prediction models are evaluated using a proposed cost evaluation framework. We performed experiments on fifty six Open Source Java projects. The experimental results reveal that the model developed by considering the selected set of source code metrics using the suggested source code metrics validation framework as the input achieves better results compared to all other metrics. The experimental results also demonstrate that the fault prediction model is best suitable for projects with faulty classes less than the threshold value depending on fault identification efficiency (low - 48.89%, median- 39.26%, and high - 27.86%).
  • Conference Object
    Citation Count: 9
    A Case Study on Measuring the Size of Microservices
    (Springer international Publishing Ag, 2018) Koyuncu, Murat; Koyuncu, Murat; Mısra, Sanjay; Information Systems Engineering; Computer Engineering
    In cloud computing, the microservices has become the mostly used architectural style. However, there is still an ongoing debate about how big a microservice should be. In this case study, a monolith application is measured using Common Software Measurement International Consortium (COSMIC) Function Points. The same application is divided into pieces by following the Domain Driven Design (DDD) principles. The resulting cloud friendly microservices are measured again using COSMIC Function Points and the obtained results are compared.
  • Article
    Citation Count: 26
    Software Code Smell Prediction Model Using Shannon, Renyi and Tsallis Entropies
    (Mdpi, 2018) Mısra, Sanjay; Suri, Bharti; Kumar, Vijay; Misra, Sanjay; Blazauskas, Tomas; Damasevicius, Robertas; Computer Engineering
    The current era demands high quality software in a limited time period to achieve new goals and heights. To meet user requirements, the source codes undergo frequent modifications which can generate the bad smells in software that deteriorate the quality and reliability of software. Source code of the open source software is easily accessible by any developer, thus frequently modifiable. In this paper, we have proposed a mathematical model to predict the bad smells using the concept of entropy as defined by the Information Theory. Open-source software Apache Abdera is taken into consideration for calculating the bad smells. Bad smells are collected using a detection tool from sub components of the Apache Abdera project, and different measures of entropy (Shannon, Renyi and Tsallis entropy). By applying non-linear regression techniques, the bad smells that can arise in the future versions of software are predicted based on the observed bad smells and entropy measures. The proposed model has been validated using goodness of fit parameters (prediction error, bias, variation, and Root Mean Squared Prediction Error (RMSPE)). The values of model performance statistics (R-2, adjusted R-2, Mean Square Error (MSE) and standard error) also justify the proposed model. We have compared the results of the prediction model with the observed results on real data. The results of the model might be helpful for software development industries and future researchers.
  • Article
    Citation Count: 8
    A simplified model for software inspection
    (Wiley, 2014) Mısra, Sanjay; Fernandez, Luis; Colomo-Palacios, Ricardo; Computer Engineering
    Software inspection is considered a cost-effective quality assurance technique in software process improvement. Although inspections detect the majority of defects in the early stages of the development process, this technique is not a common practice in the software industry, especially in small and medium enterprises. In this paper, we propose a model for the inspection process intended to be applicable and acceptable to both small and medium enterprises and large software organisations. The model was implemented in two organisations: one in a medium-scale company and the other one in a department of a big company where its feasibility and benefits were confirmed. A comparison with recent alternative inspection models has also been performed showing the practicality of the proposal and ease of adoption and cost-effectiveness. Copyright (c) 2014 John Wiley & Sons, Ltd.
  • Conference Object
    Citation Count: 10
    An object oriented complexity metric based on cognitive weights
    (Ieee Computer Soc, 2007) Mısra, Sanjay; Computer Engineering
    Complexity in general is defined as "the degree to which a system or component has a design or implementation that is difficult to understand and verify". Complexity metrics are used to predict critical information about reliability and maintainability of software systems. Object oriented software development requires a different approach to software metrics. In this paper, an attempt has been made to propose a metric for an object oriented code, which calculates the complexity of a class at method level. The proposed measure considers the internal architecture of the class, subclass, and member functions, while other proposed metrics for object oriented programming do not. An attempt has also been made to evaluate and validate the proposed measure in terms of Weyuker's properties and against the principles of measurement theory. It has been found that seven of nine Weyuker's properties have been satisfied by the proposed measure. It also satisfies most of the parameters required by the measurement theory perspective, hence establishes as a well-structured one.
  • Article
    Citation Count: 24
    Framework for evaluation and validation of software complexity measures
    (inst Engineering Technology-iet, 2012) Mısra, Sanjay; Akman, I.; Colomo-Palacios, R.; Computer Engineering
    This study proposes a framework for the evaluation and validation of software complexity measure. This framework is designed to analyse whether or not software metric qualifies as a measure from different perspectives. Unlike existing frameworks, it takes into account the practical usefulness of the measure and includes all the factors that are important for theoretical and empirical validation including measurement theory. The applicability of the framework is tested by using cognitive functional size measure. The testing process shows that in the same manner the proposed framework can be applied to any software measure. A comparative study with other frameworks has also been performed. The results reflect that the present framework is a better representation of most of the parameters that are required to evaluate and validate a new complexity measure.