
Alok MishraNorwegian University of Science and Technology | NTNU
Alok Mishra
PhD (Computer Science), MS(Computer Science), MBA,
About
281
Publications
455,926
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,638
Citations
Introduction
Dr. Alok Mishra is Prof. in Data Management & Software Engg. His areas of research interest are Software Engg., Artificial Intelligence & Info. Systems. He had examinerships of more than 25 Universities and received prestigious awards in academic accomplishments, teaching and research. He was ranked in top 15 students among more than one million students in High School. He is recipient of various scholarships including national merit scholarship and deptt. of IT scholarship of Govt. of India.
Additional affiliations
October 2002 - present
Publications
Publications (281)
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Individual users and corporations are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity...
In recent years, blockchain technology has seen significant growth and widespread adoption in various industries. However, one major drawback of blockchain investments is their substantial energy consumption, which has negative impacts on both the economy and the environment. The main cause of concern is the generation of atmospheric carbon emissio...
Deep learning and machine learning show effectiveness in identifying and addressing cloud security threats. Despite the large number of articles published in this field, there remains a dearth of comprehensive reviews that synthesize the techniques, trends, and challenges of using deep learning and machine learning for cloud computing security. Acc...
Recently, the widespread adoption of artificial intelligence, particularly generative AI technology, has surged across various industries. However, a notable drawback of this technology is its significant energy consumption during model training and operation, which poses challenges to sustainability goals and the environment. Consequently, various...
Purpose
This paper aims to discuss a novel artificial intelligence (AI) model known as Generative Pretrained Transformer (GPT), specifically ChatGPT, and its potential applications in the corporate sphere. It highlights the significance of ChatGPT in the realms of corporate innovation, management and policymaking.
Design/methodology/approach
ChatG...
In today's digital era, the abundance of online services presents users with a daunting array of choices, spanning from streaming platforms to e-commerce websites, leading to decision fatigue. Recommendation algorithms play a pivotal role in aiding users in navigating this plethora of options, among which collaborative filtering (CF) stands out as...
Code smells are software flaws that make it challenging to comprehend, develop, and maintain the software. Identifying and removing code smells is crucial for software quality. This study examines the effectiveness of several machine-learning models before and after applying feature selection and data balancing on code smell datasets. Extreme Gradi...
Rapid expansion of electronic document archives and the proliferation of online information have made it incredibly difficult to categorize text documents. Classification helps in information retrieval from a conceptual framework. This study addresses the challenge of efficiently categorizing text documents amidst the vast electronic document lands...
Cancer is a major global health challenge, emphasizing the critical need for early detection to enhance patient outcomes. This study thoroughly investigates the applications of advanced machine learning methods for cancer detection and prevention, aiming to develop robust algorithms that can accurately identify cancerous cells and assess cancer sev...
Software architecture forms the cornerstone for achieving and ensuring various software quality attributes. It encompasses the collected requirements of the product, serving as a blueprint that delineates quality features for all project stakeholders, along with methods for measurement and control. Despite the significant increase in IoT-based agri...
Abstract: Code smells are early warning signs of potential issues in software quality. Various
techniques are used in code smell detection, including the Bayesian approach, rule-based automatic
antipattern detection, antipattern identification utilizing B-splines, Support Vector Machine direct,
SMURF (Support Vector Machines for design smell detect...
Citation: Kadhim, Y.A.; Guzel, M.S.; Mishra, A. Abstract: Medicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In o...
Agile methods have emerged to overcome the obstacles of structured methodologies, such as the waterfall, prototype, spiral, and so on. There are studies showing the usefulness of agile approaches in software development. However, studies on Agile maintenance are very limited in number. Regardless of the chosen methodology, software maintenance can...
The advancement of artificial intelligence technology in recent years has had a significant impact on various industries, including the field of systems engineering. Generative Artificial Intelligence (AI), like OpenAI's ChatGPT, is one such tool that has garnered attention. While this technology offers researchers in systems engineering intriguing...
The Internet of Things (IoT) and blockchain are both recognized as cutting-edge, popular technologies. In contrast to IoT, which pertains to the spread of linked equipment via supplying information over the Internet, blockchain offers innovative data storage and management avenues. Even as blockchain demands real-time data application and IoT speci...
(1) Background: Code smell is the most popular and reliable method for detecting potential errors in code. In real-world circumstances, a single source code may have multiple code smells. Multi-label code smell detection is a popular research study. However, limited studies are available on it, and there is a need for a standardized classifier for...
Blockchain (BC) bloat, characterized by excessive data growth on BC networks, presents a pressing challenge. The need for a comprehensive study addressing BC bloat solutions arises due to the scarcity of knowledge in this emerging area. This study advances knowledge along with practical insights and inspires innovative approaches to address BC bloa...
Geographically distributed agile development may experience a high failure rate due to communication issues, which has a negative influence on project performance. One suggested solution in the literature is to enhance both communication and project performance by implementing agile enterprise architecture. However, the empirical evidence that supp...
Detecting code smells may be highly helpful for reducing maintenance costs and raising source code quality. Code smells facilitate developers or researchers to understand several types of design flaws. Code smells with high severity can cause significant problems for the software and may cause challenges for the system’s maintainability. It is quit...
The task of identifying and analyzing Reduplication Multiword Expressions (RMWEs) in Natural Language Processing (NLP) involves extracting repeated words from various text forms and classifying them into Onomatopoeic, non-Onomatopoeic, partial, or semantic types. With the increasing use of low-resource languages in news, opinions, comments, hashtag...
Data privacy is critical for users who want to use Cloud storage services. There is a significant focus on Cloud service providers to address this need. However, in the evolving dynamic cyber‐space, privacy infractions are rising and pose threats to Cloud storage infrastructures. Several studies developed various models and techniques to ensure the...
The use of agile methodology has become widespread in organizations that previously relied on traditional or structured software development methods, such as the waterfall approach. Successful completion rates for agile initiatives are at 40%, whereas only 15% of waterfall projects were successfully completed. To take advantage of the benefits of e...
This study provides empirical evidence to the body of knowledge in Agile methods adoption in small, medium, and large organizations in the global context. This research explores facilitators and inhibitors of Agile methods adoption in software development organizations. A survey was conducted among Agile professionals to gather survey data from 52...
Agile methods have gained wide popularity recently due to their characteristics in software
development. Despite the success of agile methods in the software maintenance process, several
challenges have been reported. In this study, we investigate the challenges that measure the impact
of agile methods in software maintenance in terms of quality fa...
Centralized Vehicle Security System is a python-based computer application, that uses Machine Learning (ML) techniques to detect and recognize the driver's face. So that only authorized personnel of an organization can drive the vehicles. With the invention of many other features like a key-card entry that will unlock the car and start the ignition...
Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. Th...
The fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications. However, fog computing faces several challenges such as security, privacy, and storage. One way to address these challenges is to integrate blockchain with fog computing. There are several applications of blockchain-fog c...
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have played a major role in making it a target of different attacks via malware, causing loss to users, both financially and from a priva...
Code smells are the result of not following software engineering principles during software development, especially in the design and coding phase. It leads to low maintainability. To evaluate the quality of software and its maintainability, code smell detection can be helpful. Many machine learning algorithms are being used to detect code smells....
In recent years, different types of monitoring systems have been designed for various applications, in order to turn the urban environments into smart cities. Most of these systems consist of wireless sensor networks (WSN)s, and the designing of these systems has faced many problems. The first and most important problem is sensor node deployment. T...
Smartphones have enabled the widespread use of mobile applications. However, there are unrecognized defects of mobile applications that can affect businesses due to a negative user experience. To avoid this, the defects of applications should be detected and removed before release. This study aims to develop a defect prediction model for mobile app...
Stress has been designated the “Health Epidemic of the 21st Century” by the World Health Organization and negatively affects the quality of individuals’ lives by detracting most body systems. In today’s world, different methods are used to track and measure various types of stress. Among these techniques, experience sampling is a unique method for...
The software industry has widely adopted global software development (GSD) to gain economic benefits. Organizations that engage in GSD face various challenges, the majority being associated with requirements change management (RCM). The key motive of this study is to develop a requirement change management and implementation maturity model (SRCMIMM...
Artificial Intelligence has guided technological progress in recent years; it has shown significant development with increased academic studies on Machine Learning and the high demand for this field in the sector. In addition to the advancement of technology day by day, the pandemic, which has become a part of our lives since early 2020, has led to...
Software defect prediction studies aim to predict defect-prone components before the testing stage of the software development process. The main benefit of these prediction models is that more testing resources can be allocated to fault-prone modules effectively. While a few software defect prediction models have been developed for mobile applicati...
It is necessary to know the manufacturer and model of a previously implanted shoulder
prosthesis before performing Total Shoulder Arthroplasty operations, which may need to be performed repeatedly in accordance with the need for repair or replacement. In cases where the patient’s previous records cannot be found, where the records are not clear, or...
In recent years, research into blockchain technology and the Internet of Things (IoT) has grown rapidly due to an increase in media coverage. Many different blockchain applications and platforms have been developed for different purposes, such as food safety monitoring, cryptocurrency exchange, and secure medical data sharing. However, blockchain p...
In recent years, research into blockchain technology and the Internet of Things (IoT) has
grown rapidly due to an increase in media coverage. Many different blockchain applications and platforms have been developed for different purposes, such as food safety monitoring, cryptocurrency exchange, and secure medical data sharing. However, blockchain p...
Context
: Software reliability prediction in the early stages of development can be propitious in many ways. The combinatorial models used to predict reliability using architectures such as fault trees, binary decision diagrams, etc. have limitations in modeling complex system behavior. On the other hand, state-based models such as Markov chains su...
Nowadays, different types of farm management information systems (FMIS) are being used in practice in several sectors of farming, such as dairy, arable, fruits, vegetables, and meat farming. The goal of this research is to identify, evaluate, and synthesize existing FMISs in the Dutch dairy sector and present the state–of–the–art. We performed a mu...
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds,
but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an...
The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment ap...
The Internet of Things (IoT) facilitates in building cyber-physical systems, which are significant for Industry 4.0. Agent-based computing represents effective modeling, programming, and simulation paradigm to develop IoT systems. Agent concepts, techniques, methods, and tools are being used in evolving IoT systems. Over the last years, in particul...
Many real-world optimization problems usually require a large number of conflicting objectives to be optimized simultaneously to obtain solution. It has been observed that these kinds of many-objective optimization problems (MaOPs) often pose several performance challenges to the traditional multi-objective optimization algorithms. To address the p...
Code smells detection helps in improving understandability and maintainability of software while reducing the chances of system failure. In this study, six machine learning algorithms have been applied to predict code smells. For this purpose, four code smell datasets (God-class, Data-class, Feature-envy, and Long-method) are considered which are g...
Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest in research studies that focus on identifying and deriving threshold values is growing, given the advantage of applying software...
This study provides empirical evidence to the body of knowledge in Agile methods adoption in small, medium and large organizations in international context. This research explores the factors involved in the adoption of Agile methods in software development organizations. A survey was conducted among Agile professionals to gather survey data from 5...
Climate change risk and environmental degradation are the most critical issues of our society. Our technology-influenced daily lifestyle involves many types of software and apps which are used by society at large, and their use is increasing more than ever before. Sustainability is a significant topic for future professionals and more so for softwa...
The role of design pattern mining is a very significant strategy of re-engineering as with the help of detection one could easily understand complex systems. Of course, identifying a design pattern is not always a simple task. Additionally, pattern recovering methods often encounter problems dealing with space outburst for extensive systems. This p...
Disasters pose a real threat to the lives and property of citizens; therefore, it is necessary to reduce their impact to the minimum possible. In order to achieve this goal, a framework for enhancing the current disaster management system was proposed, called the smart disaster management system. The smart aspect of this system is due to the applic...
The early and accurate prediction of defects helps in testing software and therefore leads to an overall higher-quality product. Due to drift in software defect data, prediction model performances may degrade over time. Very few earlier works have investigated the significance of concept drift (CD) in software-defect prediction (SDP). Their results...
Unified Modeling Language (UML) includes various types of diagrams that help to study, analyze, document, design, or develop any software efficiently. Therefore, UML diagrams are of great advantage for researchers, software developers, and academicians. Class diagrams are the most widely used UML diagrams for this purpose. Despite its recognition a...
In this research, we explored the use of Agile methods in small and medium-scale software development organizations. Specifically, focusing on three different types of agile approaches which are: Extreme Programming (XP), Scrum Methodology, and Dynamic System Development Methods. Most of the development methods and techniques are not employed as is...
In the current competitive world, producing quality products has become a prominent factor to succeed in business. In this respect, defining and following the software product quality metrics (SPQM) to detect the current quality situation and continuous improvement of systems have gained tremendous importance. Therefore, it is necessary to review t...
Product and process metrics are measured from the development and evolution of software. Metrics are indicators of software fault-proneness and advanced models using machine learning can be provided to the development team to select modules for further inspection. Most fault-proneness classifiers were built from product metrics. However, the inclus...
Climate change risk and environmental degradation are the most critical issues of our society. Our technology influenced daily lifestyle involves many software and apps which are used by large society and their use is increasing than ever before. Sustainability is a significant topic for future professionals and more so for software engineers due t...
Purpose:
In this study, the required dose rates for optimal treatment of tumoral tissues when using proton therapy in the treatment of defective tumours seen in mandibles has been calculated. We aimed to protect the surrounding soft and hard tissues from unnecessary radiation as well as to prevent complications of radiation. Bragg curves of therap...
Internet of Things (IoT) enables organizations to automate the process and improves service delivery through Internet technology and transferring the data at the cloud level. IoT does not allow the use of a universal software architecture for different fields in which it is used, but needs to be adjusted according to the requirements of users. This...
Software has become an integral part of our everyday life and is gradually impacting human beings and society. Climate change risk and environmental degeneration are the most critical issues facing our society. Therefore, environmental concerns should be addressed in software and information system development, implementation, and operation. Sustai...
ERP implementation is a complex and expensive project for organisations, because it touches upon social, behavioural and technical issues. This article presents an in-depth case study of an ERP consultancy in order to comprehensively understand ERP implementation from the consultancy’s perspective. Interviews were conducted with consultants, projec...
Water could be some-times a source of danger on people's lives and property. Although it is one of the most important elements of life on this planet. This article define the threat of water pollution in Tigris River in Iraq. by collecting a data that generated by sensors that installed in a water pollution sensing project in Baghdad city, also thi...
Effective software testing leads to assurance towards high quality in software development. Automation testing tool facilitates in faster testing process in testing stage thus completion and implementation of software on time. One of the most significant issues for automation is to select the automation-testing tool and the appropriate framework. T...
This paper proposes a novel data classification framework, combining sparse auto-encoders (SAEs) and a post-processing system consisting of a linear system model relying on Particle Swarm Optimization (PSO) algorithm. All the sensitive and high-level features are extracted by using the first auto-encoder which is wired to the second auto-encoder, f...
Quality pressure is one of the factors affecting processes for software development in its various stages. DevOps is one of the proposed solutions to such pressure. The primary focus of DevOps is to increase the deployment speed, frequency and quality. DevOps is a mixture of different developments and operations to its multitudinous ramifications i...
The development of a software system is becoming a complex job due to the increasing demand of continuous software development (DevOps), competitive market, use of agile practices and globally distributed environment. Majority of the software development firms are struggling to follow the concepts of continuous and agile software development method...