Search Results

Now showing 1 - 10 of 146
  • Article
    Citation - WoS: 10
    Citation - Scopus: 18
    Evaluation Criteria for Object-Oriented Metrics
    (Budapest Tech, 2011) Misra, Sanjay; Computer Engineering
    In this paper an evaluation model for object-oriented (OO) metrics is proposed. We have evaluated the existing evaluation criteria for OO metrics, and based on the observations, a model is proposed which tries to cover most of the features for the evaluation of OO metrics. The model is validated by applying it to existing OO metrics. In contrast to the other existing criteria, the proposed model is simple in implementation and includes the practical and important aspects of evaluation; hence it suitable to evaluate and validate any OO complexity metric.
  • Article
    Citation - WoS: 8
    Citation - Scopus: 18
    Featuring Cio: Roles, Skills and Soft Skills
    (Igi Global, 2013) Cano, Carmen; Fernandez-Sanz, Luis; Misra, Sanjay
    This paper describes how the CIO (Chief Information Officer) position appears as a key role in the organizations and the requirements for candidates. The authors compare the requirements presented in different studies to know what are the most important skills for a successful performance as a CIO. They stress the importance of non technical skills as key factors for professional performance. The authors have compared soft skills for CIO or equivalent positions and other professional profiles like programmers or analysts using data taken from thousands of job ads. An overview of the most valuable skills (especially soft skills) for CIOS is presented.
  • Article
    Citation - WoS: 20
    Citation - Scopus: 28
    Bug Severity Assessment in Cross Project Context and Identifying Training Candidates
    (World Scientific Publ Co Pte Ltd, 2017) Singh, V. B.; Misra, Sanjay; Sharma, Meera
    The automatic bug severity prediction will be useful in prioritising the development efforts, allocating resources and bug fixer. It needs historical data on which classifiers can be trained. In the absence of such historical data cross project prediction provides a good solution. In this paper, our objective is to automate the bug severity prediction by using a bug metric summary and to identify best training candidates in cross project context. The text mining technique has been used to extract the summary terms and trained the classifiers using these terms. About 63 training candidates have been designed by combining seven datasets of Eclipse projects to develop the severity prediction models. To deal with the imbalance bug data problem, we employed two approaches of ensemble by using two operators available in RapidMiner: Vote and Bagging. Results show that k-Nearest Neighbour (k-NN) performance is better than the Support Vector Machine (SVM) performance. Naive Bayes f-measure performance is poor, i.e. below 34.25%. In case of k-NN, developing training candidates by combining more than one training datasets helps in improving the performances (f-measure and accuracy). The two ensemble approaches have improved the f-measure performance up to 5% and 10% respectively for the severity levels having less number of bug reports in comparison of major severity level. We have further motivated the paper with a cross project bug severity prediction between Eclipse and Mozilla products. Results show that Mozilla products can be used to build reliable prediction models for Eclipse products and vice versa in case of SVM and k-NN classifiers.
  • Article
    Citation - WoS: 10
    A DISCUSSION ON ASSURING SOFTWARE QUALITY IN SMALL AND MEDIUM SOFTWARE ENTERPRISES: AN EMPIRICAL INVESTIGATION
    (Univ Osijek, Tech Fac, 2011) Pusatli, O. Tolga; Misra, Sanjay
    Under the studies of general core activities including software inspection, review and testing to achieve quality objectives in small-medium size enterprises (SMEs), the paper presents a contemporary view of such companies against quality measures. The results from a local empirical investigation of quality standards in the Turkish software industry are reported. Around 150 software companies have been approached from which 17 detailed feedback inform that in order to ensure software quality, standards including internationally recognized International Standards Organization (ISO) and Capability Maturity Model Integration (CMMI) are given credit. However the substantial workload and resources required to obtain them are also reported as serious; downscaled frameworks of such large models proposed in the literature are not well known by the SMEs either. The paper also discusses "work around" that bypasses such standards to ease delivery of products while keeping certificates as labels just to acquire new jobs for the business.
  • Article
    Citation - WoS: 25
    Identifying Phishing Attacks in Communication Networks Using Url Consistency Features
    (inderscience Enterprises Ltd, 2020) Azeez, Nureni Ayofe; Salaudeen, Balikis Bolanle; Misra, Sanjay; Damasevicius, Robertas; Maskeliunas, Rytis
    Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks.
  • Article
    Citation - WoS: 67
    Citation - Scopus: 90
    Towards a Social and Context-Aware Mobile Recommendation System for Tourism
    (Elsevier, 2017) Colomo-Palacios, Ricardo; Jose Garcia-Penalvo, Francisco; Stantchev, Vladimir; Misra, Sanjay
    Loyalty in tourism is one of the main concerns for tourist organizations and researchers alike. Recently, technology in general and CRM and social networks in particular have been identified as important enablers for loyalty in tourism. This paper presents POST-VIA 360, a platform devoted to support the whole life-cycle of tourism loyalty after the first visit. The system is designed to collect data from the initial visit by means of pervasive approaches. Once data is analysed, POST-VIA 360 produces accurate after visit data and, once returned, is able to offer relevant recommendations based on positioning and bio-inspired recommender systems. To validate the system, a case study comparing recommendations from the POST-VIA 360 and a group of experts was conducted. Results show that the accuracy of system's recommendations is remarkable compared to previous efforts in the field. (C) 2016 Elsevier B.V. All rights reserved.
  • Article
    Citation - WoS: 17
    Citation - Scopus: 26
    Toward Ontology-Based Risk Management Framework for Software Projects: an Empirical Study
    (Wiley, 2020) Abioye, Temitope Elizabeth; Arogundade, Oluwasefunmi Tale; Misra, Sanjay; Akinwale, Adio T.; Adeniran, Olusola John
    Software risk management is a proactive decision-making practice with processes, methods, and tools for managing risks in a software project. Many existing techniques for software project risk management are textual documentation with varying perspectives that are nonreusable and cannot be shared. In this paper, a life-cycle approach to ontology-based risk management framework for software projects is presented. A dataset from literature, domain experts, and practitioners is used. The identified risks are refined by 19 software experts; risks are conceptualized, modeled, and developed using Protege. The risks are qualitatively analyzed and prioritized, and aversion methods are provided. The framework is adopted in real-life software projects. Precision recall and F-measure metrics are used to validate the performance of the extraction tool while performance and perception evaluation are carried out using the performance appraisal form and technology acceptance model, respectively. Mean scores from performance and perception evaluation are compared with evaluation concept scale. Results showed that cost is reduced, high-quality projects are delivered on time, and software developers found this framework a potent tool needed for their day-to-day activities in software development.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 4
    Predictive Rental Values Model for Low-Income Earners in Slums: the Case of Ijora, Nigeria
    (Taylor & Francis Ltd, 2023) Iroham, Chukwuemeka O.; Misra, Sanjay; Emebo, Onyeka C.; Okagbue, Hilary, I
    It is well known most often that values of properties tend to hike at the effluxion of time. This has necessitated the adoption of predictive models in interpreting outcomes in the property market in the future. Earlier studies have been oblivious of such models' outcomes as it affects any focal group, particularly the vulnerable. This present study focuses on the low-income earners found in the slum. The Ijora community in Lagos was the highlight of this study, particularly Ijora Badia and Ijora Oloye, regarded as slums according to the UNDP report. The entire fifty-two (52) local agents in the Ijora community were surveyed in cross-sectional survey research that entailed the questionnaire's issuance. The nexus of data collection, pre-processing, data analysis, algorithm application, and model evaluation resulted in retrieving rental values within the years 2010 and 2019 on two predominant residential property types of self-contain and one-bedroom flats found within the community. Three selected algorithms, Artificial Neural Network (ANN), Support Vector Machine, and Logistic Regression, were essentially used as classifiers but trained to predict the continuous values. These algorithms were implemented through the use of Python's SciKit-learn Library and RapidMiner. The findings revealed that though all three models gave accurate predictions, Logistic Regression was the highest with low error values. It was recommended that Logistic Regression be applied but with much data set of property values of low-income earners over much more period. This study will contribute to the Sustainable development goals(SDG) 11(Sustainable cities and communities) of the United Nations to benefit developing countries, especially in sub-Saharan Africa.
  • Article
    Citation - WoS: 11
    Citation - Scopus: 17
    Software Measurement Activities in Small and Medium Enterprises: an Empirical Assessment
    (Budapest Tech, 2011) Pusatli, O. Tolga; Misra, Sanjay; Computer Engineering
    An empirical study for evaluating the proper implementation of measurement/metric programs in software companies in one area of Turkey is presented. The research questions are discussed and validated with the help of senior software managers (more than 15 years' experience) and then used for interviewing a variety of medium and small scale software companies in Ankara. Observations show that there is a common reluctance/lack of interest in utilizing measurements/metrics despite the fact that they are well known in the industry. A side product of this research is that internationally recognized standards such as ISO and CMMI are pursued if they are a part of project/job requirements; without these requirements, introducing those standards to the companies remains as a long-term target to increase quality.
  • Review
    Citation - WoS: 3
    Citation - Scopus: 9
    An Empirical Evaluation of Software Quality Assurance Practices and Challenges in a Developing Country: a Comparison of Nigeria and Turkey
    (Springer international Publishing Ag, 2016) Sowunmi, Olaperi Yeside; Mısra, Sanjay; Misra, Sanjay; Fernandez-Sanz, Luis; Crawford, Broderick; Soto, Ricardo; Mısra, Sanjay; Computer Engineering; Computer Engineering
    Background: The importance of quality assurance in the software development process cannot be overemphasized because its adoption results in high reliability and easy maintenance of the software system and other software products. Software quality assurance includes different activities such as quality control, quality management, quality standards, quality planning, process standardization and improvement amongst others. The aim of this work is to further investigate the software quality assurance practices of practitioners in Nigeria. While our previous work covered areas on quality planning, adherence to standardized processes and the inherent challenges, this work has been extended to include quality control, software process improvement and international quality standard organization membership. It also makes comparison based on a similar study carried out in Turkey. The goal is to generate more robust findings that can properly support decision making by the software community. The qualitative research approach, specifically, the use of questionnaire research instruments was applied to acquire data from software practitioners. Results: In addition to the previous results, it was observed that quality assurance practices are quite neglected and this can be the cause of low patronage. Moreover, software practitioners are neither aware of international standards organizations or the required process improvement techniques; as such their claimed standards are not aligned to those of accredited bodies, and are only limited to their local experience and knowledge, which makes it questionable. The comparison with Turkey also yielded similar findings, making the results typical of developing countries. The research instrument used was tested for internal consistency using the Cronbach's alpha, and it was proved reliable. Conclusion: For the software industry in developing countries to grow strong and be a viable source of external revenue, software assurance practices have to be taken seriously because its effect is evident in the final product. Moreover, quality frameworks and tools which require minimum time and cost are highly needed in these countries.