Mıshra, Alok
Loading...
Profile URL
Name Variants
Mishra, A.
Mishra, A
Mishra A.
Alok, Mishra
Mıshra, Alok
A., Mishra
Alok M.
M., Alok
M.,Alok
Mishra, Alok
Mishra,A.
A.,Mıshra
A.,Mishra
Alok, Mıshra
A., Mıshra
Mıshra,A.
Mishra, A
Mishra A.
Alok, Mishra
Mıshra, Alok
A., Mishra
Alok M.
M., Alok
M.,Alok
Mishra, Alok
Mishra,A.
A.,Mıshra
A.,Mishra
Alok, Mıshra
A., Mıshra
Mıshra,A.
Job Title
Profesor Doktor
Email Address
alok.mishra@atilim.edu.tr
Main Affiliation
Software Engineering
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID
Sustainable Development Goals
1NO POVERTY
0
Research Products
2ZERO HUNGER
1
Research Products
3GOOD HEALTH AND WELL-BEING
9
Research Products
4QUALITY EDUCATION
6
Research Products
5GENDER EQUALITY
1
Research Products
6CLEAN WATER AND SANITATION
1
Research Products
7AFFORDABLE AND CLEAN ENERGY
0
Research Products
8DECENT WORK AND ECONOMIC GROWTH
0
Research Products
9INDUSTRY, INNOVATION AND INFRASTRUCTURE
8
Research Products
10REDUCED INEQUALITIES
0
Research Products
11SUSTAINABLE CITIES AND COMMUNITIES
4
Research Products
12RESPONSIBLE CONSUMPTION AND PRODUCTION
4
Research Products
13CLIMATE ACTION
4
Research Products
14LIFE BELOW WATER
4
Research Products
15LIFE ON LAND
0
Research Products
16PEACE, JUSTICE AND STRONG INSTITUTIONS
10
Research Products
17PARTNERSHIPS FOR THE GOALS
2
Research Products

This researcher does not have a Scopus ID.

Documents
170
Citations
2555

Scholarly Output
197
Articles
103
Views / Downloads
161/259
Supervised MSc Theses
13
Supervised PhD Theses
8
WoS Citation Count
2079
Scopus Citation Count
3045
Patents
0
Projects
0
WoS Citations per Publication
10.55
Scopus Citations per Publication
15.46
Open Access Source
42
Supervised Theses
21
| Journal | Count |
|---|---|
| Sensors | 7 |
| TEM Journal | 7 |
| Computers in Human Behavior | 4 |
| Applied Sciences | 4 |
| Electronics Information and Planning | 4 |
Current Page: 1 / 22
Scopus Quartile Distribution
Competency Cloud

151 results
Scholarly Output Search Results
Now showing 1 - 10 of 151
Article Citation - WoS: 18Citation - Scopus: 21Research Trends in Management Issues of Global Software Development: Evaluating the Past To Envision the Future(Taylor & Francis inc, 2011) Mishra, Deepti; Mishra, AlokThis paper presents research trends in management issues (project management, process management, knowledge management, requirements management, configuration management, risk management, quality management) of distributed/global information system development. The main objective is to highlight the current research and practice direction in these areas. The results are based on peer-reviewed conference papers/journal articles, published between 2000 and early 2011. The analysis revealed that most research has been done in project management, process management, knowledge management and requirements management areas while configuration, risk, and quality management issues could get only limited attention in global/distributed information system development. This indicates the need for future research (quantitative and qualitative) in these areas.Book Part Citation - Scopus: 2Novel Covid-19 Recognition Framework Based on Conic Functions Classifier(Springer Science and Business Media Deutschland GmbH, 2022) Karim,A.M.; Mishra,A.The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment approaches to fight back and eliminate the virus. Machine learning is a popular scientific tool and is applied to several medical image recognition problems, involving tumour recognition, cancer detection, organ transplantation and COVID-19 diagnosis. It is proved that machine learning presents robust, fast and accurate results in various medical image recognition problems. Generally, machine learning-based frameworks consist of two stages: feature extraction and classification. In the feature extraction, overwhelmingly unsupervised learning techniques are applied to reduce the input data’s size. This step extracts appropriate features by reducing the computational time and increasing the performance of the classifiers. A classifier is the second step that aims to categorise the input. Within the proposed step, the unsupervised part relies on the feature extraction by using local binary patterns (LBP), followed by feature selection relying on factor analysis technique. The LBP is a kind of visual descriptor, mainly applied for image recognition problem. The aim of using LBP is to analyse the input COVID-19 image and extract salient features. Furthermore, factor analysis is a statistical technique applied to define variability among observed variables in less unnoticed variables named factors. The factor analysis applied to the LBP wavelet aims to select sensitive features from input data (LBP output) and reduce the size input. In the last stage, conic functions classifier is applied to classify two sets of data, categorising the extracted features by using LBP and factor analysis as positive or negative COVID-19 cases. The proposed solution aims to diagnose COVID-19 by using LBP and factor analysis, based on conic functions classifier. The conic functions classifier presents remarkable results compared with these popular classifiers and state-of-the-art studies presented in the literature. © 2022, Springer Nature Switzerland AG.Article Citation - WoS: 5Citation - Scopus: 8A Novel Hybrid Machine Learning-Based System Using Deep Learning Techniques and Meta-Heuristic Algorithms for Various Medical Datatypes Classification(Mdpi, 2024) Kadhim, Yezi Ali; Guzel, Mehmet Serdar; Mishra, AlokMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep learning techniques, which were based on a convolutional neural network (CNN) or autoencoder, to extract features and combine them with the next step of the meta-heuristic algorithm in order to select optimal features using the particle swarm optimization (PSO) algorithm. This combination sought to reduce the dimensionality of the datasets while maintaining the original performance of the data. This is considered an innovative method and ensures highly accurate classification results across various medical datasets. Several classifiers were employed to predict the diseases. The COVID-19 dataset found that the highest accuracy was 99.76% using the combination of CNN-PSO-SVM. In comparison, the brain tumor dataset obtained 99.51% accuracy, the highest accuracy derived using the combination method of autoencoder-PSO-KNN.Master Thesis Bulut Depolama için Gizlilik Koruma Tekniklerinin Karşılaştırmalı Bir Çalışması(2020) Jabar, Thr Satar Jabar; Mıshra, AlokBilgi ve veri gizliliği, özellikle internet kullanıcılarının kişisel ve hassas verilerini bulut ortamında depolamada, bulut bilişim endüstrisi için kritik kavramlar haline geldi. Birçok bulut hizmeti sağlayıcısı, geniş bir bulut topluluğu oluşturmada öncü girişim olarak kullanıcıları için birinci sınıf ve kaliteye dayalı hizmetler sunmaktadır. Ancak, tüm dünyada siber güvenlik ve gizlilik ihlalleri artmaya ve gelişmeye ve sonununda çoğu servis sağlayıcının altyapısı tehdit edilmeye başlanmıştır. Neyse ki, veri gizliliğinin tehlikeli zorluklarının üstesinden gelmek ve bulut depolama içeriklerini korumak ve daha iyi metodolojiler bulmaya yönelik uygun teknikler geliştirmek üzere çok sayıda araştırma yapıldığı gözlemlenmektedir. Bu çalışma, bulut depolamaya yönelik gizlilik koruma tekniklerinin çeşitli biçimlerini karşılaştırmaya odaklanmaktadır. Çalışma, veri gizliliğinin karşı karşıya olduğu ikilem için esnek, güvenli ve verimli çözümler tasarlamak amacıyla, gizliliği koruma tekniklerinin ve bunların ortak özelliklerinin kapsamlı bir analizini içermektedir. Bu çalışmada ayrıca, tek seferlik parola kimlik doğrulama teknolojisi ve çoklu bulut depolama yapısı ile çok katmanlı bir şifreleme çerçevesi önererek bulut depolamanın gizliliğini korumak için ulaşılabilir bir çözüm sunulmaktadır.Conference Object Citation - WoS: 6Software Architecture in Distributed Software Development: a Review(Springer-verlag Berlin, 2013) Mishra, Alok; Mishra, DeeptiThis paper presents a literature review of distributed software development (DSD) or global software development (GSD) and software architecture. The main focus is to highlight the current researches, observations, as well as practice directions in these areas. The results have been limited to peer-reviewed conference papers and journal articles, and analysis reports that major studies have been performed in software architecture and global software development, while the empirical studies of interfacing distributed/global software development and software architecture has only received very little attention among researchers up to now. This indicates the need for future research in these areas.Article Citation - WoS: 4Citation - Scopus: 6A Conceptual Design of Smart Management System for Flooding Disaster(Mdpi, 2021) Ibrahim, Thaer; Mishra, AlokDisasters pose a real threat to the lives and property of citizens; therefore, it is necessary to reduce their impact to the minimum possible. In order to achieve this goal, a framework for enhancing the current disaster management system was proposed, called the smart disaster management system. The smart aspect of this system is due to the application of the principles of information and communication technology, especially the Internet of Things. All participants and activities of the proposed system were clarified by preparing a conceptual design by using The Unified Modeling Language diagrams. This effort was made to overcome the lack of citizens' readiness towards the use of information and communication technology as well as increase their readiness towards disasters. This study aims to develop conceptual design that can facilitate in development of smart management system for flooding disaster. This will assist in the design process of the Internet of Things systems in this regard.Conference Object Software Quality Management Improvement Through Mentoring: an Exploratory Study From Gsd Projects(Springer-verlag Berlin, 2011) Colomo-Palacios, Ricardo; Soto-Acosta, Pedro; Mishra, Alok; Garcia-Crespo, AngelSoftware Quality Management (SQM) is a set of processes and procedures designed to assure the quality of software artifacts along with their development process. In an environment in which software development is evolving to a globalization, SQM is seen as one of its challenges. Global Software Development is a way to develop software across nations, continents, cultures and time zones. The aim of this paper is to detect if mentoring, one of the lead personnel development tools, can improve SQM of projects developed under GSD. The results obtained in the study reveal that the influence of mentoring on SQM is just temperate.Article Citation - WoS: 22Citation - Scopus: 32Organizational Issues in Embracing Agile Methods: an Empirical Assessment(Springer india, 2021) Mishra, Alok; Abdalhamid, Samia; Mishra, Deepti; Ostrovska, SofiyaThis study provides empirical evidence to the body of knowledge in Agile methods adoption in small, medium and large organizations in international context. This research explores the factors involved in the adoption of Agile methods in software development organizations. A survey was conducted among Agile professionals to gather survey data from 52 software organizations in seven countries across the world. Statistical techniques are applied towards empirical assessment. Organizational culture, team structure and management support are found to be crucial success factors whereas lack of management support, a large organization size and traditional organizational culture are found to be detrimental for the adoption of Agile approach in an organization. The selection of an appropriate Agile method depends on the project size and, for each size, there are specific methods preferred by different enterprises. Providing better control over the work is viewed as the primary advantage of the Agile methods within large and small organizations, while for the medium-size organizations, the priority is switched to coping with changing user requirements. Majority of the respondents did not consider embracing agile methods as a reason for project failure which indicates that Agile methods are, indeed, beneficial.Article Citation - WoS: 36Citation - Scopus: 68Cybersecurity Enterprises Policies: a Comparative Study(Mdpi, 2022) Mishra, Alok; Alzoubi, Yehia Ibrahim; Gill, Asif Qumer; Anwar, Memoona JaveriaCybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization's cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises' security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.Conference Object Citation - WoS: 12An Architectural Model for System of Information Systems(Springer int Publishing Ag, 2015) Majd, Saleh; Marie-Helene, Abel; Mishra, AlokOne of the most important aspects when designing and constructing an Information System is its architecture. This also applies to complex systems such as System of Information Systems (SoIS). Thus, we aim to propose an architectural model of System of Information Systems (SoIS). Though Architecture-based approaches have been promoted as a means of controlling the complexity of systems construction and evolution, what we really look for in this paper is an architectural model to aggregate services from already constructed systems. Nevertheless, it would be a good practice to compare the presented architecture of SoIS to other architecture-based approaches such as Service Oriented Architecture (SOA). Also, it is beneficial to examine how we can use the well-established standards of SOA for the designing of SoIS. In this paper we present an architectural model for System of Information Systems, and highlight the standards of Service Oriented Architecture that might help us in this task.

