12 results
Search Results
Now showing 1 - 10 of 12
Article Citation - WoS: 17Citation - Scopus: 30Analysis of Cultural and Gender Influences on Teamwork Performance for Software Requirements Analysis in Multinational Environments(Wiley, 2012) Fernandez-Sanz, L.; Misra, SanjaySoftware development is mainly a social activity where teams of developers should work as a coordinated unit to fulfill the needs of customers. Studies have shown the importance of teamwork ability as the main skill for software professionals both in local settings and in global software development. Teamwork performance can be evaluated according to different approaches but we need deeper analysis within software teams of differences in individuals' performance related to culture, nationality or even gender. We applied a simple evaluation experience named teamwork benefits awareness (TBA) to groups of last-year students of computing degrees with experience as junior IT professionals during intensive multinational workshops based on international software projects. TBA allowed to measure individual and team performance during a requirements analysis session based on a real project. Results segmented by nationality and gender are presented and analysed in comparison with the data collected from computing professionals in local settings. In general, no significant differences have been found out although interesting relations are suggested with two Hofstede's country indicators. TBA is also perceived as a good technique for highlighting both teamwork benefits as well as the nature of real situations of software requirements analysis and orientation to customer needs.Article Citation - WoS: 3Citation - Scopus: 5Particle Swarm Optimization of the Spectral and Energy Efficiency of an Scma-Based Heterogeneous Cellular Network(Wiley, 2022) Noma-Osaghae, Etinosa; Misra, Sanjay; Ahuja, Ravin; Koyuncu, MuratBackground The effect of stochastic small base station (SBS) deployment on the energy efficiency (EE) and spectral efficiency (SE) of sparse code multiple access (SCMA)-based heterogeneous cellular networks (HCNs) is still mostly unknown. Aim This research study seeks to provide insight into the interaction between SE and EE in SBS sleep-mode enabled SCMA-based HCNs. Methodology A model that characterizes the energy-spectral-efficiency (ESE) of a two-tier SBS sleep-mode enabled SCMA-based HCN was derived. A multiobjective optimization problem was formulated to maximize the SE and EE of the SCMA-based HCN simultaneously. The multiobjective optimization problem was solved using a proposed weighted sum modified particle swarm optimization algorithm (PSO). A comparison was made between the performance of the proposed weighted sum modified PSO algorithm and the genetic algorithm (GA) and the case where the SCMA-based HCN is unoptimized. Results The Pareto-optimal front generated showed a simultaneous maximization of the SE and EE of the SCMA-based HCN at high traffic levels and a convex front that allows network operators to select the SE-EE tradeoff at low traffic levels flexibly. The proposed PSO algorithm offers a higher SBS density, and a higher SBS transmit power at high traffic levels than at low traffic levels. The unoptimized SCMA-based HCN achieves an 80% lower SE and a 51% lower EE than the proposed PSO optimized SCMA-based HCN. The optimum SE and EE achieved by the SCMA-based HCN using the proposed PSO algorithm or the GA are comparable, but the proposed PSO uses a 51.85% lower SBS density and a 35.96% lower SBS transmit power to achieve the optimal SE and EE at moderate traffic levels. Conclusion In sleep-mode enabled SCMA-based HCNs, network engineers have to decide the balance of SBS density and SBS transmit power that helps achieve the desired SE and EE.Article Citation - WoS: 17Citation - Scopus: 26Toward Ontology-Based Risk Management Framework for Software Projects: an Empirical Study(Wiley, 2020) Abioye, Temitope Elizabeth; Arogundade, Oluwasefunmi Tale; Misra, Sanjay; Akinwale, Adio T.; Adeniran, Olusola JohnSoftware risk management is a proactive decision-making practice with processes, methods, and tools for managing risks in a software project. Many existing techniques for software project risk management are textual documentation with varying perspectives that are nonreusable and cannot be shared. In this paper, a life-cycle approach to ontology-based risk management framework for software projects is presented. A dataset from literature, domain experts, and practitioners is used. The identified risks are refined by 19 software experts; risks are conceptualized, modeled, and developed using Protege. The risks are qualitatively analyzed and prioritized, and aversion methods are provided. The framework is adopted in real-life software projects. Precision recall and F-measure metrics are used to validate the performance of the extraction tool while performance and perception evaluation are carried out using the performance appraisal form and technology acceptance model, respectively. Mean scores from performance and perception evaluation are compared with evaluation concept scale. Results showed that cost is reduced, high-quality projects are delivered on time, and software developers found this framework a potent tool needed for their day-to-day activities in software development.Article Citation - Scopus: 1Optimizing the Stochastic Deployment of Small Base Stations in an Interleave Division Multiple Access-Based Heterogeneous Cellular Networks(Wiley, 2022) Noma-Osaghae, Etinosa; Misra, Sanjay; Koyuncu, MuratThe use of small base stations (SBSs) to improve the throughput of cellular networks gave rise to the advent of heterogeneous cellular networks (HCNs). Still, the interleave division multiple access (IDMA) performance in sleep mode active HCNs has not been studied in the existing literature. This research examines the 24-h throughput, spectral efficiency (SE), and energy efficiency (EE) of an IDMA-based HCN and compares the result with orthogonal frequency division multiple access (OFDMA). An energy-spectral-efficiency (ESE) model of a two-tier HCN was developed. A weighted sum modified particle swarm optimization (PSO) algorithm simultaneously maximized the SE and EE of the IDMA-based HCN. The result obtained showed that the IDMA performs at least 68% better than the OFDMA on the throughput metric. The result also showed that the particle swarm optimization algorithm produced the Pareto optimal front at moderate traffic levels for all varied network parameters of SINR threshold, SBS density, and sleep mode technique. The IDMA-based HCN can improve the throughput, SE, and EE via sleep mode techniques. Still, the combination of network parameters that simultaneously maximize the SE and EE is interference limited. In sleep mode, the performance of the HCN is better if the SBSs can adapt to spatial and temporal variations in network traffic.Article Citation - WoS: 37Citation - Scopus: 59Career Abandonment Intentions among Software Workers(Wiley, 2014) Colomo-Palacios, Ricardo; Casado-Lumbreras, Cristina; Misra, Sanjay; Soto-Acosta, PedroWithin the software development industry, human resources have been recognized as one of the most decisive and scarce resources. Today, the retention of skilled IT (information technology) personnel is a major issue for employers and recruiters as well, since IT career abandonment is a common practice and means not only the loss of personnel, knowledge, and skills, but also the loss of business opportunities. This article seeks to discover the main motivations young practitioners abandon the software career. To achieve this objective, two studies were conducted. The first study was qualitative (performed through semistructured interviews) and intended to discover the main variables affecting software career abandonment. The second study was quantitative, consisting of a Web-based survey developed from the output of the first study and administered to a sample of 148 IT practitioners. Results show that work-related, psychological, and emotional variable are the most relevant group of variables explaining IT career abandonment. More specifically, the three most important variables that motivate employees to abandon the career are effort-reward imbalance, perceived workload, and emotional exhaustion. In contrast, variables such as politics and infighting, uncool work, and insufficient resources influence to a lesser extent the decision to leave the career. (c) 2012 Wiley Periodicals, Inc.Article Citation - WoS: 103Citation - Scopus: 160Cassava Disease Recognition From Low-Quality Images Using Enhanced Data Augmentation Model and Deep Learning(Wiley, 2021) Abayomi-Alli, Olusola Oluwakemi; Damasevicius, Robertas; Misra, Sanjay; Maskeliunas, RytisImprovement of deep learning algorithms in smart agriculture is important to support the early detection of plant diseases, thereby improving crop yields. Data acquisition for machine learning applications is an expensive task due to the requirements of expert knowledge and professional equipment. The usability of any application in a real-world setting is often limited by unskilled users and the limitations of devices used for acquiring images for classification. We aim to improve the accuracy of deep learning models on low-quality test images using data augmentation techniques for neural network training. We generate synthetic images with a modified colour value distribution to expand the trainable image colour space and to train the neural network to recognize important colour-based features, which are less sensitive to the deficiencies of low-quality images such as those affected by blurring or motion. This paper introduces a novel image colour histogram transformation technique for generating synthetic images for data augmentation in image classification tasks. The approach is based on the convolution of the Chebyshev orthogonal functions with the probability distribution functions of image colour histograms. To validate our proposed model, we used four methods (resolution down-sampling, Gaussian blurring, motion blur, and overexposure) for reducing image quality from the Cassava leaf disease dataset. The results based on the modified MobileNetV2 neural network showed a statistically significant improvement of cassava leaf disease recognition accuracy on lower-quality testing images when compared with the baseline network. The model can be easily deployed for recognizing and detecting cassava leaf diseases in lower quality images, which is a major factor in practical data acquisition.Article Citation - WoS: 31Citation - Scopus: 50Neural Network and Classification Approach in Identifying Customer Behavior in the Banking Sector: a Case Study of an International Bank(Wiley, 2015) Ogwueleka, Francisca Nonyelum; Misra, Sanjay; Colomo-Palacios, Ricardo; Fernandez, LuisThe customer relationship focus for banks is in development of main competencies and strategies of building strong profitable customer relationships through considering and managing the customer impression, influence on the culture of the bank, satisfactory treatment, and assessment of valued relationship building. Artificial neural networks (ANNs) are used after data segmentation and classification, where the designed model register records into two class sets, that is, the training and testing sets. ANN predicts new customer behavior from previously observed customer behavior after executing the process of learning from existing data. This article proposes an ANN model, which is developed using a six-step procedure. The back-propagation algorithm is used to train the ANN by adjusting its weights to minimize the difference between the current ANN output and the desired output. An evaluation process is conducted to determine whether the ANN has learned how to perform. The training process is halted periodically, and its performance is tested until an acceptable result is obtained. The principles underlying detection software are grounded in classical statistical decision theory.Article Citation - WoS: 5Citation - Scopus: 7The Role of Leadership Cognitive Complexity in Software Development Projects: an Empirical Assessment for Simple Thinking(Wiley, 2011) Akman, Ibrahim; Misra, Sanjay; Cafer, FeridSimple thinking (or simplicity) is a way of coping with complexity. It is especially important in the software development process (SDP), which is an error-prone, time-consuming, and complex activity. This article investigates the role of the thinking style-namely, simple thinking-which has been found effective in solving complicated problems during software development. For this purpose, it reviews and discusses simplicity issues from a general perspective and, then, reports the findings of a survey concerning the assessment of simplicity in SDP. The survey was conducted among information and communication technologies senior professionals and managers from government and private-sector organizations. Relevant hypotheses have been developed under different empirical categories for analysis. Statistical analysis techniques were then used to draw inferences based on these hypotheses. The results have proved simplicity to have a significant role in the SDP to a certain extent. (C) 2011 Wiley Periodicals, Inc.Article Citation - WoS: 10Citation - Scopus: 16A Survey and Meta-Analysis of Application-Layer Distributed Denial-Of Attack(Wiley, 2020) Odusami, Modupe; Misra, Sanjay; Abayomi-Alli, Olusola; Abayomi-Alli, Adebayo; Fernandez-Sanz, LuisBackground One of the significant attacks targeting the application layer is the distributed denial-of-service (DDoS) attack. It degrades the performance of the server by usurping its resources completely, thereby denying access to legitimate users and causing losses to businesses and organizations. Aim This study aims to investigate existing methodologies for application-layer DDoS (APDDoS) attack defense by using specific measures: detection methods/techniques, attack strategy, and feature exploration of existing APDDoS mechanisms. Methodology The review is carried out on a database search of relevant literature in IEEE Xplore, ACM, Science Direct, Springer, Wiley, and Google Search. The search dates to capture journals and conferences are from 2000 to 2019. Review papers that are not in English and not addressing the APDDoS attack are excluded. Three thousand seven hundred eighty-nine studies are identified and streamlined to a total of 75 studies. A quantifiable assessment is performed on the selected articles using six search procedures, namely: source, methods/technique, attack strategy, datasets/corpus, status, detection metric, and feature exploration. Results Based on existing methods/techniques for detection, the results show that machine learning gave the highest proportion with 36%. However, assessment based on attack strategy shows that several studies do not consider an attack form for deploying their solution. Result based on existing features for the APDDoS detection technique shows request stream during a user session and packet pattern gave the highest result with 47%. Unlike packet header information with 33%, request stream during absolute time interval with 12% and web user features 8%. Conclusion Research findings show that a large proportion of the solutions for APDDoS attack detection utilized features based on request stream during user session and packet pattern. The optimization of features will improve detection accuracy. Our study concludes that researchers need to exploit all attack strategies using deep learning algorithms, thus enhancing effective detection of APDDoS attack launch from different botnets.Article Citation - WoS: 1Citation - Scopus: 1A Cognitive Model for Meetings in the Software Development Process(Wiley, 2014) Misra, Sanjay; Akman, IbrahimMeetings are at the heart of the software development process (SDP) and can be of different types. The present article first proposes an abstract cognitive model for meetings, which represents how different types of meetings are affected by cognitive activities at different stages within the SDP. Second, and based on the analysis of meetings at different stages of SDP, it proposes the removal of such meetings from some of the stages within the program by using a cognitive evaluation model for meetings and their replacement, instead, with information and communication technology tools and techniques by means of a cognitive evaluation model. The abstract cognitive model and the evaluation model are validated empirically through experimentation, carried out through a detailed analysis of a target group composed of information technology professionals. (c) 2011 Wiley Periodicals, Inc.

