45 results
Search Results
Now showing 1 - 10 of 45
Conference Object Citation - Scopus: 14Software Process Improvement Methodologies for Small and Medium Enterprises(2008) Mishra,D.; Mishra,A.Today, the software industry is one of the most rapidly growing sectors and small software development companies play an important role in economy. Many such organizations have been interested in Software Process Improvement (SPI). It has been observed that the successful implementation of SPI methodologies is generally not possible within the context of small and medium-sized software enterprises (SMEs) because they are not capable of bearing the cost of implementing these software process improvement programs. Further the proper implementation of software engineering techniques is difficult task for SMEs as they often operate on limited resources and with strict time constraints. There are number of methodologies to address these issues. In this paper, various SPI methodologies for SMEs are discussed and compared. This will lead towards maturity of software process improvement in SMEs and also facilitates in development of automation tools for SPIs in future. © 2008 Springer-Verlag Berlin Heidelberg.Review Information System Process Improvement: a Managerial Perspective(2003) Mishra,A.System process improvement is a continuous strategy in organizations for reducing overall cost, shortening cycle times, and improve quality and user satisfaction. For software organizations to remain competitive and survive in the global market place, it is now inevitable. All organizations are trying to achieve more value from their technology investments. There are various models like Capability Maturity Model (CMM), ISO, etc., available to measure it. However management role is vital for effective process improvement implementation strategy. This paper briefly presents an assessment of all the factors which if taken care by the management effectively can ensure success in information system process improvement.Conference Object Citation - Scopus: 3Radial Basis Function (rbf) Based on Multistage Autoencoders for Intrusion Detection System (ids)(Institute of Electrical and Electronics Engineers Inc., 2019) Kadhim,Y.; Mishra,A.In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to detect IDS attacks with 98.80% accuracy when validated using UNSW-NB15 dataset. The experimental results show the proposed method presents satisfactory results when compared with those obtained in this field. © 2019 IEEE.Conference Object Citation - Scopus: 57Successful Requirement Elicitation by Combining Requirement Engineering Techniques(2008) Mishra,D.; Mishra,A.; Yazici,A.The role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization.This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements. ©2008 IEEE.Book Part Citation - Scopus: 2Novel Covid-19 Recognition Framework Based on Conic Functions Classifier(Springer Science and Business Media Deutschland GmbH, 2022) Karim,A.M.; Mishra,A.The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment approaches to fight back and eliminate the virus. Machine learning is a popular scientific tool and is applied to several medical image recognition problems, involving tumour recognition, cancer detection, organ transplantation and COVID-19 diagnosis. It is proved that machine learning presents robust, fast and accurate results in various medical image recognition problems. Generally, machine learning-based frameworks consist of two stages: feature extraction and classification. In the feature extraction, overwhelmingly unsupervised learning techniques are applied to reduce the input data’s size. This step extracts appropriate features by reducing the computational time and increasing the performance of the classifiers. A classifier is the second step that aims to categorise the input. Within the proposed step, the unsupervised part relies on the feature extraction by using local binary patterns (LBP), followed by feature selection relying on factor analysis technique. The LBP is a kind of visual descriptor, mainly applied for image recognition problem. The aim of using LBP is to analyse the input COVID-19 image and extract salient features. Furthermore, factor analysis is a statistical technique applied to define variability among observed variables in less unnoticed variables named factors. The factor analysis applied to the LBP wavelet aims to select sensitive features from input data (LBP output) and reduce the size input. In the last stage, conic functions classifier is applied to classify two sets of data, categorising the extracted features by using LBP and factor analysis as positive or negative COVID-19 cases. The proposed solution aims to diagnose COVID-19 by using LBP and factor analysis, based on conic functions classifier. The conic functions classifier presents remarkable results compared with these popular classifiers and state-of-the-art studies presented in the literature. © 2022, Springer Nature Switzerland AG.Book Part Citation - Scopus: 1Web Privacy: Issues, Legislations, and Technological Challenges(IGI Global, 2008) Mishra,A.; Mishra,D.People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private organizations, governments and employers. Privacy relates to issues regarding collection, secure transmission, storage, authorized access, usage, and disclosure of personal information. This information is used for commercial gain by many organizations. Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the Internet. The increased use of the Internet and Web for everyday activities is bringing new threats to personal privacy. This chapter assessed various issues related to individual privacy on the Web, growing concerns among the Web users, technologies employed for collecting and protecting information on the Web, privacy-enhancing technologies and the legal provisions to curb the Web privacy. This chapter also reported detailed discussion about Platform for Privacy Preferences (P3P), its structure, present scenario of its implementation and its future success. Global consistency on Internet privacy protection is important to promote the growth of electronic commerce. To protect consumers in a globally consistent manner, legislation, self-regulation, technical solutions and combination solutions are different ways that can be implemented. © 2008, IGI Global.Book Part E-mentoring in global software development teams: Success factors to develop a common culture(IGI Global, 2012) Colomo-Palacios,R.; Mishra,A.; Casado-Lumbreras,C.; Soto-Acosta,P.Global Software Development (GSD) teams face communication and coordination problems due to spatial, temporal, and cultural separation between team members. Cultural diversity and cross-cultural management are significant issues among GSD teams. In software development projects, mentoring dramatically reduces the learning curve for novice human resources. Due to the large amount of electronic communication instruments, a remarkable number of different e-Mentoring concepts have emerged, which provides opportunity for mentoring that would not otherwise be possible. This chapter presents key success factors to enable e-Mentoring as a tool to develop a common culture in GSD scenarios. These success factors enable the correct application of mentoring programmes and the use of this to build a common culture in organizations that perform GSD. © 2013, IGI Global.Article Citation - Scopus: 15Software Quality Assurance Models in Small and Medium Organisations: a Comparison(Inderscience Publishers, 2006) Mishra,A.; Mishra,D.Presently, the majority of software development including outsourcing is carried out by small- and medium-sized software development organisations all over the world. These organisations are not capable of bearing the cost of implementing available software quality models like CMM, SPICE, ISO, etc. Therefore, there is a need to address this problem. In this paper, we have tried to compare the main characteristics, benefits, and limitations of the models for small and medium software development organisations. We believe that this effort will contribute towards the development of a standardised quality improvement model for small- and medium-sized software development organisations. Copyright © 2006 Inderscience Enterprises Ltd.Conference Object Citation - Scopus: 3Achieving Success in Supply Chain Management Software by Agility(Springer Verlag, 2007) Mishra,D.; Mishra,A.Supply chain management is comprehensive software. Due to its scope and unpredictable, complex and unstable requirements, it is not possible to develop it with predictable development process models. Agile methodologies are targeted towards such kind of problems that involves change and uncertainty, and are adaptive rather than predictive. The aim of this paper is to analyze the management and development methodologies used in development of supply chain management software. This paper shows how to overcome risks and handicaps in each development phase of a complex inventive project. It also provides a set of guidelines regarding how the agile methods may be adopted, combined and used in these kinds of projects. © Springer-Verlag Berlin Heidelberg 2007.Conference Object Citation - Scopus: 2Systematic Mapping on Quality in Web Application Testing(Institute of Electrical and Electronics Engineers Inc., 2019) Akbulut,S.; Gebreyesus,Y.T.; Mishra,A.; Yazici,A.Similar to all other fields of study, assuring the quality of web applications is very important. With the aim of increasing web applications quality in testing, our task in this paper is to reflect on the results of the literature searches made in this area. The literature survey carried out in this study searches for studies in the area of quality in application testing and retrieves 1972 papers, published within the timeframe of 2006 and 2016. The publications are systematically identified, analyzed, and classified and an overview of the trends in this specialized field is presented. Systematic mapping is applied to review and structure the body of knowledge related to quality in web application testing. To conduct our study, we selected a set of 27 papers published in the area of quality in web application testing between 2006 and 2016. The results of this work can help other researchers to obtain an overview of the existing web application testing quality trends and approaches as well as to identify areas in the field that require more attention from research point of view. © 2019 IEEE.

