146 results
Search Results
Now showing 1 - 10 of 146
Review Citation - WoS: 16Citation - Scopus: 20Assessing the Coverage of E-Health Services in Sub-Saharan Africa a Systematic Review and Analysis(Georg Thieme verlag Kg, 2017) Adeloye, Davies; Adigun, Taiwo; Misra, Sanjay; Omoregbe, NicholasBackground: E-Health has attracted growing interests globally. The relative lack of facilities, skills, funds and information on existing e-Health initiatives has affected progress on e-Health in Africa. Objectives: To review publicly available literature on e-Health in sub-Saharan Africa (sSA) towards providing information on existing and ongoing e-Health initiatives in the region. Methods: Searches of relevant literature were conducted on Medline, EMBASE and Global Health, with search dates set from 1990 to 2016. We included studies on e-Health initiatives (prototypes, designs, or completed projects) targeting population groups in sSA. Results: Our search returned 2322 hits, with 26 studies retained. Included studies were conducted in 14 countries across the four sub-regions in sSA (Central, East, South and West) and spreading over a 12-year period, 2002-2014. Six types of e-Health interventions were reported, with 17 studies (65%) based on telemedicine, followed by mHealth with 5 studies (19%). Other e-Health types include expert system, electronic medical records, e-mails, and online health module. Specific medical specialties covered include dermatology (19%), pathology (12%) and radiology (8%). Successes were 'widely reported' (representing 50% overall acceptance or positive feedbacks in a study) in 10 studies (38%). The prominent challenges reported were technical problems, poor inter net and connectivity, participants' selection biases, contextual issues, and lack of funds. Conclusion: E-Health is evolving in sSA, but with poorly published evidence. While we call for more quality research in the region, it is also important that population-wide policies and on-going e-Health initiatives are contextually feasible, acceptable, and sustainable.Article Citation - WoS: 10Citation - Scopus: 18Evaluation Criteria for Object-Oriented Metrics(Budapest Tech, 2011) Misra, Sanjay; Computer EngineeringIn this paper an evaluation model for object-oriented (OO) metrics is proposed. We have evaluated the existing evaluation criteria for OO metrics, and based on the observations, a model is proposed which tries to cover most of the features for the evaluation of OO metrics. The model is validated by applying it to existing OO metrics. In contrast to the other existing criteria, the proposed model is simple in implementation and includes the practical and important aspects of evaluation; hence it suitable to evaluate and validate any OO complexity metric.Article Citation - WoS: 8Citation - Scopus: 18Featuring Cio: Roles, Skills and Soft Skills(Igi Global, 2013) Cano, Carmen; Fernandez-Sanz, Luis; Misra, SanjayThis paper describes how the CIO (Chief Information Officer) position appears as a key role in the organizations and the requirements for candidates. The authors compare the requirements presented in different studies to know what are the most important skills for a successful performance as a CIO. They stress the importance of non technical skills as key factors for professional performance. The authors have compared soft skills for CIO or equivalent positions and other professional profiles like programmers or analysts using data taken from thousands of job ads. An overview of the most valuable skills (especially soft skills) for CIOS is presented.Article Citation - WoS: 20Citation - Scopus: 28Bug Severity Assessment in Cross Project Context and Identifying Training Candidates(World Scientific Publ Co Pte Ltd, 2017) Singh, V. B.; Misra, Sanjay; Sharma, MeeraThe automatic bug severity prediction will be useful in prioritising the development efforts, allocating resources and bug fixer. It needs historical data on which classifiers can be trained. In the absence of such historical data cross project prediction provides a good solution. In this paper, our objective is to automate the bug severity prediction by using a bug metric summary and to identify best training candidates in cross project context. The text mining technique has been used to extract the summary terms and trained the classifiers using these terms. About 63 training candidates have been designed by combining seven datasets of Eclipse projects to develop the severity prediction models. To deal with the imbalance bug data problem, we employed two approaches of ensemble by using two operators available in RapidMiner: Vote and Bagging. Results show that k-Nearest Neighbour (k-NN) performance is better than the Support Vector Machine (SVM) performance. Naive Bayes f-measure performance is poor, i.e. below 34.25%. In case of k-NN, developing training candidates by combining more than one training datasets helps in improving the performances (f-measure and accuracy). The two ensemble approaches have improved the f-measure performance up to 5% and 10% respectively for the severity levels having less number of bug reports in comparison of major severity level. We have further motivated the paper with a cross project bug severity prediction between Eclipse and Mozilla products. Results show that Mozilla products can be used to build reliable prediction models for Eclipse products and vice versa in case of SVM and k-NN classifiers.Article Citation - WoS: 10A DISCUSSION ON ASSURING SOFTWARE QUALITY IN SMALL AND MEDIUM SOFTWARE ENTERPRISES: AN EMPIRICAL INVESTIGATION(Univ Osijek, Tech Fac, 2011) Pusatli, O. Tolga; Misra, SanjayUnder the studies of general core activities including software inspection, review and testing to achieve quality objectives in small-medium size enterprises (SMEs), the paper presents a contemporary view of such companies against quality measures. The results from a local empirical investigation of quality standards in the Turkish software industry are reported. Around 150 software companies have been approached from which 17 detailed feedback inform that in order to ensure software quality, standards including internationally recognized International Standards Organization (ISO) and Capability Maturity Model Integration (CMMI) are given credit. However the substantial workload and resources required to obtain them are also reported as serious; downscaled frameworks of such large models proposed in the literature are not well known by the SMEs either. The paper also discusses "work around" that bypasses such standards to ease delivery of products while keeping certificates as labels just to acquire new jobs for the business.Article Citation - WoS: 25Identifying Phishing Attacks in Communication Networks Using Url Consistency Features(inderscience Enterprises Ltd, 2020) Azeez, Nureni Ayofe; Salaudeen, Balikis Bolanle; Misra, Sanjay; Damasevicius, Robertas; Maskeliunas, RytisPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks.Article Citation - WoS: 67Citation - Scopus: 90Towards a Social and Context-Aware Mobile Recommendation System for Tourism(Elsevier, 2017) Colomo-Palacios, Ricardo; Jose Garcia-Penalvo, Francisco; Stantchev, Vladimir; Misra, SanjayLoyalty in tourism is one of the main concerns for tourist organizations and researchers alike. Recently, technology in general and CRM and social networks in particular have been identified as important enablers for loyalty in tourism. This paper presents POST-VIA 360, a platform devoted to support the whole life-cycle of tourism loyalty after the first visit. The system is designed to collect data from the initial visit by means of pervasive approaches. Once data is analysed, POST-VIA 360 produces accurate after visit data and, once returned, is able to offer relevant recommendations based on positioning and bio-inspired recommender systems. To validate the system, a case study comparing recommendations from the POST-VIA 360 and a group of experts was conducted. Results show that the accuracy of system's recommendations is remarkable compared to previous efforts in the field. (C) 2016 Elsevier B.V. All rights reserved.Article Citation - WoS: 20Citation - Scopus: 25A Study on the Key Soft Skills for Successful Participation of Students in Multinational Engineering Education(Tempus Publications, 2017) Fernandez-Sanz, Luis; Teresa Villalba, Maria; Amelio Medina, Jose; Misra, Sanjay; Computer EngineeringSoft-skills have proved to be a necessary complement to technical skills in today's multinational workplaces. As universities are facing the challenge of promoting internationalization and mobility in students and teachers, they have to decide how to help their students in developing these skills as well as increase their awareness on the cultural differences in multinational settings. After a long trajectory of participation in multinational educational experiences, the authors launched a survey to check if their previous findings on the preferred soft skills by educational experts and managers still remain valid after 5 years. Another goal of the study was the analysis of the link between preference for specific soft skills and cultural background in each country as characterized by Hofstede's indicators. The data collected from 123 experts from 45 different countries have confirmed the existence of a stable core set of preferred soft skills at global level and also for European countries. Results have also shown links between specific cultural indicators and preference for some soft skills.Article Citation - Scopus: 1Maintaining Software Through Bit-Parallelism and Hashing the Parameterized q-grams(Univ Osijek, Tech Fac, 2012) Prasad, Rajesh; Agarwal, Suneeta; Misra, Sanjay; Sharma, Anuj Kumar; Singh, Alok; Computer EngineeringIn the software maintenance, it is often required to find duplicity present in the codes. Two code fragments are equivalent, if one can be transformed into the other via consistent renaming of identifiers, literals and variables. This equivalency can be detected by parameterized string matching. In this matching, a given pattern is said to match with a substring of the text, if there exists a one-to-one correspondence between symbols of and symbols of. In this paper, we propose an efficient algorithm for this problem by using both the overlapping and non-overlapping q-gram. We show the effect of running time of the algorithm on increasing the duplicity present in the code.Article Citation - WoS: 19Software Development Outsourcing: Challenges and Opportunities in Nigeria(Taylor & Francis inc, 2014) Casado-Lumbreras, Cristina; Colomo-Palacios, Ricardo; Ogwueleka, Francisca N.; Misra, SanjayIn recent years, several emergent regions have become software development sourcing countries. This article investigates the possibilities of sub-Saharan Africa as a sourcing destination in the software field. To find out the reasons why sub-Saharan Africa countries, in general, and Nigeria, in particular, are not considered a destination for global software development projects, the authors interviewed a set of professionals from Europe and Africa. Results indicate that there are many disadvantages and difficulties impeding Nigeria from becoming a preferred sourcing destination, mainly the absence of a strong software industry and the concerns about legislative, fiscal, and commercial premises. On the other hand, it is observed that there are also relevant added values and competitive advantages in Nigeria (English-speaking country, same time zone, and cost); therefore, it can become a potential target for software development outsourcing in the medium and long terms.

