Search Results

Now showing 1 - 10 of 44
  • Article
    Citation - WoS: 20
    Citation - Scopus: 24
    A Study on the Key Soft Skills for Successful Participation of Students in Multinational Engineering Education
    (Tempus Publications, 2017) Fernandez-Sanz, Luis; Teresa Villalba, Maria; Amelio Medina, Jose; Misra, Sanjay; Computer Engineering
    Soft-skills have proved to be a necessary complement to technical skills in today's multinational workplaces. As universities are facing the challenge of promoting internationalization and mobility in students and teachers, they have to decide how to help their students in developing these skills as well as increase their awareness on the cultural differences in multinational settings. After a long trajectory of participation in multinational educational experiences, the authors launched a survey to check if their previous findings on the preferred soft skills by educational experts and managers still remain valid after 5 years. Another goal of the study was the analysis of the link between preference for specific soft skills and cultural background in each country as characterized by Hofstede's indicators. The data collected from 123 experts from 45 different countries have confirmed the existence of a stable core set of preferred soft skills at global level and also for European countries. Results have also shown links between specific cultural indicators and preference for some soft skills.
  • Article
    Citation - Scopus: 1
    Maintaining Software Through Bit-Parallelism and Hashing the Parameterized q-grams
    (Univ Osijek, Tech Fac, 2012) Prasad, Rajesh; Agarwal, Suneeta; Misra, Sanjay; Sharma, Anuj Kumar; Singh, Alok; Computer Engineering
    In the software maintenance, it is often required to find duplicity present in the codes. Two code fragments are equivalent, if one can be transformed into the other via consistent renaming of identifiers, literals and variables. This equivalency can be detected by parameterized string matching. In this matching, a given pattern is said to match with a substring of the text, if there exists a one-to-one correspondence between symbols of and symbols of. In this paper, we propose an efficient algorithm for this problem by using both the overlapping and non-overlapping q-gram. We show the effect of running time of the algorithm on increasing the duplicity present in the code.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 2
    Potential of Support-Vector Regression for Forecasting Stream Flow
    (Univ Osijek, Tech Fac, 2014) Radzi, Mohd Rashid Bin Mohd; Shamshirband, Shahaboddin; Aghabozorgi, Saeed; Misra, Sanjay; Akib, Shatirah; Kiah, Laiha Mat; Computer Engineering
    Stream flow is an important input for hydrology studies because it determines the water variability and magnitude of a river. Water resources engineering always deals with historical data and tries to estimate the forecasting records in order to give a better prediction for any water resources applications, such as designing the water potential of hydroelectric dams, estimating low flow, and maintaining the water supply. This paper presents three soft-computing approaches for dealing with these issues, i.e. artificial neural networks (ANNs), adaptive-neuro-fuzzy inference systems (ANFISs), and support vector machines (SVMs). Telom River, located in the Cameron Highlands district of Pahang, Malaysia, was used in making the estimation. The Telom River's daily mean discharge records, such as rainfall and river-level data, were used for the period of March 1984-January 2013 for training, testing, and validating the selected models. The SVM approach provided better results than ANFIS and ANNs in estimating the daily mean fluctuation of the stream's flow.
  • Conference Object
    Citation - WoS: 1
    A Cognitive Evaluation for Meetings in Software Development Process
    (Springer-verlag Berlin, 2009) Misra, Sanjay; Akman, Ibrahim
    Software development; includes number of different type of meetings in the whole development process. The cognitive activities also play an important role in decision making activities in these meetings since they are carried out, by human being. In this paper, we evaluated the relevance of meetings in different phases of the software development process with reference to cognitive aspects.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 3
    Lessons From Intensive Educational Experiences for Ict Students in Multinational Settings
    (Univ Osijek, Tech Fac, 2017) Fernandez, Luis; Amelio Medina, Jose; Villalba de Benito, Maria Teresa; Misra, Sanjay
    Real internationalization of education is the current challenge for students, teachers and universities in Europe after assuming the implementation of the EHEA (European Higher Education Area). The Erasmus programme has been playing a key role in exposing stakeholders to European internationalization. Although the large global figures of the programme are frequently analyzed, it is important to study the effects of the participation in exchange programs on students and teachers. Erasmus Intensive programs enable a closer look at the daily experience of students. In this article, we analyse the effects of intensive international programs on participants' perceptions and attitudes referred to international and multicultural working environments. Data for the analysis were collected through several experiences where ICT students were involved in intensive multinational programs. Results from 125 students using pre- and post-experience questionnaires show interesting benefits of participating in intensive experiences before starting longer or more challenging activities: they feel more motivated to be engaged in semester long staying or professional work abroad, less worries about how to work in multicultural settings, increment in self-confidence, etc.
  • Article
    Citation - WoS: 20
    Citation - Scopus: 28
    Bug Severity Assessment in Cross Project Context and Identifying Training Candidates
    (World Scientific Publ Co Pte Ltd, 2017) Singh, V. B.; Misra, Sanjay; Sharma, Meera
    The automatic bug severity prediction will be useful in prioritising the development efforts, allocating resources and bug fixer. It needs historical data on which classifiers can be trained. In the absence of such historical data cross project prediction provides a good solution. In this paper, our objective is to automate the bug severity prediction by using a bug metric summary and to identify best training candidates in cross project context. The text mining technique has been used to extract the summary terms and trained the classifiers using these terms. About 63 training candidates have been designed by combining seven datasets of Eclipse projects to develop the severity prediction models. To deal with the imbalance bug data problem, we employed two approaches of ensemble by using two operators available in RapidMiner: Vote and Bagging. Results show that k-Nearest Neighbour (k-NN) performance is better than the Support Vector Machine (SVM) performance. Naive Bayes f-measure performance is poor, i.e. below 34.25%. In case of k-NN, developing training candidates by combining more than one training datasets helps in improving the performances (f-measure and accuracy). The two ensemble approaches have improved the f-measure performance up to 5% and 10% respectively for the severity levels having less number of bug reports in comparison of major severity level. We have further motivated the paper with a cross project bug severity prediction between Eclipse and Mozilla products. Results show that Mozilla products can be used to build reliable prediction models for Eclipse products and vice versa in case of SVM and k-NN classifiers.
  • Article
    Citation - WoS: 10
    A DISCUSSION ON ASSURING SOFTWARE QUALITY IN SMALL AND MEDIUM SOFTWARE ENTERPRISES: AN EMPIRICAL INVESTIGATION
    (Univ Osijek, Tech Fac, 2011) Pusatli, O. Tolga; Misra, Sanjay
    Under the studies of general core activities including software inspection, review and testing to achieve quality objectives in small-medium size enterprises (SMEs), the paper presents a contemporary view of such companies against quality measures. The results from a local empirical investigation of quality standards in the Turkish software industry are reported. Around 150 software companies have been approached from which 17 detailed feedback inform that in order to ensure software quality, standards including internationally recognized International Standards Organization (ISO) and Capability Maturity Model Integration (CMMI) are given credit. However the substantial workload and resources required to obtain them are also reported as serious; downscaled frameworks of such large models proposed in the literature are not well known by the SMEs either. The paper also discusses "work around" that bypasses such standards to ease delivery of products while keeping certificates as labels just to acquire new jobs for the business.
  • Article
    Citation - WoS: 25
    Identifying Phishing Attacks in Communication Networks Using Url Consistency Features
    (inderscience Enterprises Ltd, 2020) Azeez, Nureni Ayofe; Salaudeen, Balikis Bolanle; Misra, Sanjay; Damasevicius, Robertas; Maskeliunas, Rytis
    Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks.
  • Conference Object
    Citation - WoS: 1
    Plagiarism Detection in Software Using Efficient String Matching
    (Springer-verlag Berlin, 2012) Pandey, Kusum Lata; Agarwal, Suneeta; Misra, Sanjay; Prasad, Rajesh
    String matching refers to the problem of finding occurrence(s) of a pattern string within another string or body of a text. It plays a vital role in plagiarism detection in software codes, where it is required to identify similar program in a large populations. String matching has been used as a tool in a software metrics, which is used to measure the quality of software development process. In the recent years, many algorithms exist for solving the string matching problem. Among them, Berry-Ravindran algorithm was found to be fairly efficient. Further refinement of this algorithm is made in TVSBS and SSABS algorithms. However, these algorithms do not give the best possible shift in the search phase. In this paper, we propose an algorithm which gives the best possible shift in the search phase and is faster than the previously known algorithms. This algorithm behaves like Berry-Ravindran in the worst case. Further extension of this algorithm has been made for parameterized string matching which is able to detect plagiarism in a software code.
  • Conference Object
    Embryo Spatial Model Reconstruction
    (Springer international Publishing Ag, 2020) Dirvanauskas, Darius; Maskeliunas, Rytis; Raudonis, Vidas; Misra, Sanjay
    Time lapse microscopy offered new solutions to study embryo development process. It allows embryologist to monitor embryo growth in real time and evaluate them without interfering into their growth environment. Embryo evaluation during growth process is one of the key criteria in embryo selection for fertilization. Live embryo monitoring is time consuming and new tools are offered to automate part of process. Our proposed algorithm gives new possibilities for embryo monitoring. It uses embryo images which are taken from different embryo layers, extracts embryo cell features and returns metrical evaluation to compare different embryos. High number of extracted features shows embryo fragmentation. Other tool whichwe present is spatial embryo model. Features extracted from embryo layers are combined together to spatial model. It allows embryologist to examine embryo model and compare different layers in one space. The obtained spatial embryo model will be later used to develop new algorithms for embryo analysis tasks.