Alok Mishra

Alok Mishra
Norwegian University of Science and Technology | NTNU

PhD (Computer Science), MS(Computer Science), MBA,

About

281
Publications
455,926
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,638
Citations
Introduction
Dr. Alok Mishra is Prof. in Data Management & Software Engg. His areas of research interest are Software Engg., Artificial Intelligence & Info. Systems. He had examinerships of more than 25 Universities and received prestigious awards in academic accomplishments, teaching and research. He was ranked in top 15 students among more than one million students in High School. He is recipient of various scholarships including national merit scholarship and deptt. of IT scholarship of Govt. of India.
Additional affiliations
October 2002 - present
Atilim University
Position
  • Professor (Full)

Publications

Publications (281)
Article
Full-text available
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Individual users and corporations are not the only ones who are affected by cyber-attacks; national security is also a serious concern. Different nations' cybersecurity...
Article
Full-text available
In recent years, blockchain technology has seen significant growth and widespread adoption in various industries. However, one major drawback of blockchain investments is their substantial energy consumption, which has negative impacts on both the economy and the environment. The main cause of concern is the generation of atmospheric carbon emissio...
Article
Full-text available
Deep learning and machine learning show effectiveness in identifying and addressing cloud security threats. Despite the large number of articles published in this field, there remains a dearth of comprehensive reviews that synthesize the techniques, trends, and challenges of using deep learning and machine learning for cloud computing security. Acc...
Article
Full-text available
Recently, the widespread adoption of artificial intelligence, particularly generative AI technology, has surged across various industries. However, a notable drawback of this technology is its significant energy consumption during model training and operation, which poses challenges to sustainability goals and the environment. Consequently, various...
Article
Full-text available
Purpose This paper aims to discuss a novel artificial intelligence (AI) model known as Generative Pretrained Transformer (GPT), specifically ChatGPT, and its potential applications in the corporate sphere. It highlights the significance of ChatGPT in the realms of corporate innovation, management and policymaking. Design/methodology/approach ChatG...
Article
Full-text available
In today's digital era, the abundance of online services presents users with a daunting array of choices, spanning from streaming platforms to e-commerce websites, leading to decision fatigue. Recommendation algorithms play a pivotal role in aiding users in navigating this plethora of options, among which collaborative filtering (CF) stands out as...
Article
Full-text available
Code smells are software flaws that make it challenging to comprehend, develop, and maintain the software. Identifying and removing code smells is crucial for software quality. This study examines the effectiveness of several machine-learning models before and after applying feature selection and data balancing on code smell datasets. Extreme Gradi...
Article
Full-text available
Rapid expansion of electronic document archives and the proliferation of online information have made it incredibly difficult to categorize text documents. Classification helps in information retrieval from a conceptual framework. This study addresses the challenge of efficiently categorizing text documents amidst the vast electronic document lands...
Article
Full-text available
Cancer is a major global health challenge, emphasizing the critical need for early detection to enhance patient outcomes. This study thoroughly investigates the applications of advanced machine learning methods for cancer detection and prevention, aiming to develop robust algorithms that can accurately identify cancerous cells and assess cancer sev...
Article
Full-text available
Software architecture forms the cornerstone for achieving and ensuring various software quality attributes. It encompasses the collected requirements of the product, serving as a blueprint that delineates quality features for all project stakeholders, along with methods for measurement and control. Despite the significant increase in IoT-based agri...
Article
Full-text available
Abstract: Code smells are early warning signs of potential issues in software quality. Various techniques are used in code smell detection, including the Bayesian approach, rule-based automatic antipattern detection, antipattern identification utilizing B-splines, Support Vector Machine direct, SMURF (Support Vector Machines for design smell detect...
Article
Full-text available
Citation: Kadhim, Y.A.; Guzel, M.S.; Mishra, A. Abstract: Medicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In o...
Article
Full-text available
Agile methods have emerged to overcome the obstacles of structured methodologies, such as the waterfall, prototype, spiral, and so on. There are studies showing the usefulness of agile approaches in software development. However, studies on Agile maintenance are very limited in number. Regardless of the chosen methodology, software maintenance can...
Article
Full-text available
The advancement of artificial intelligence technology in recent years has had a significant impact on various industries, including the field of systems engineering. Generative Artificial Intelligence (AI), like OpenAI's ChatGPT, is one such tool that has garnered attention. While this technology offers researchers in systems engineering intriguing...
Article
Full-text available
The Internet of Things (IoT) and blockchain are both recognized as cutting-edge, popular technologies. In contrast to IoT, which pertains to the spread of linked equipment via supplying information over the Internet, blockchain offers innovative data storage and management avenues. Even as blockchain demands real-time data application and IoT speci...
Article
Full-text available
(1) Background: Code smell is the most popular and reliable method for detecting potential errors in code. In real-world circumstances, a single source code may have multiple code smells. Multi-label code smell detection is a popular research study. However, limited studies are available on it, and there is a need for a standardized classifier for...
Article
Full-text available
Blockchain (BC) bloat, characterized by excessive data growth on BC networks, presents a pressing challenge. The need for a comprehensive study addressing BC bloat solutions arises due to the scarcity of knowledge in this emerging area. This study advances knowledge along with practical insights and inspires innovative approaches to address BC bloa...
Article
Full-text available
Geographically distributed agile development may experience a high failure rate due to communication issues, which has a negative influence on project performance. One suggested solution in the literature is to enhance both communication and project performance by implementing agile enterprise architecture. However, the empirical evidence that supp...
Article
Full-text available
Detecting code smells may be highly helpful for reducing maintenance costs and raising source code quality. Code smells facilitate developers or researchers to understand several types of design flaws. Code smells with high severity can cause significant problems for the software and may cause challenges for the system’s maintainability. It is quit...
Article
Full-text available
The task of identifying and analyzing Reduplication Multiword Expressions (RMWEs) in Natural Language Processing (NLP) involves extracting repeated words from various text forms and classifying them into Onomatopoeic, non-Onomatopoeic, partial, or semantic types. With the increasing use of low-resource languages in news, opinions, comments, hashtag...
Article
Full-text available
Data privacy is critical for users who want to use Cloud storage services. There is a significant focus on Cloud service providers to address this need. However, in the evolving dynamic cyber‐space, privacy infractions are rising and pose threats to Cloud storage infrastructures. Several studies developed various models and techniques to ensure the...
Article
Full-text available
The use of agile methodology has become widespread in organizations that previously relied on traditional or structured software development methods, such as the waterfall approach. Successful completion rates for agile initiatives are at 40%, whereas only 15% of waterfall projects were successfully completed. To take advantage of the benefits of e...
Article
Full-text available
This study provides empirical evidence to the body of knowledge in Agile methods adoption in small, medium, and large organizations in the global context. This research explores facilitators and inhibitors of Agile methods adoption in software development organizations. A survey was conducted among Agile professionals to gather survey data from 52...
Article
Full-text available
Agile methods have gained wide popularity recently due to their characteristics in software development. Despite the success of agile methods in the software maintenance process, several challenges have been reported. In this study, we investigate the challenges that measure the impact of agile methods in software maintenance in terms of quality fa...
Conference Paper
Centralized Vehicle Security System is a python-based computer application, that uses Machine Learning (ML) techniques to detect and recognize the driver's face. So that only authorized personnel of an organization can drive the vehicles. With the invention of many other features like a key-card entry that will unlock the car and start the ignition...
Article
Full-text available
Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. Th...
Article
Full-text available
The fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications. However, fog computing faces several challenges such as security, privacy, and storage. One way to address these challenges is to integrate blockchain with fog computing. There are several applications of blockchain-fog c...
Article
Full-text available
Smartphone adaptation in society has been progressing at a very high speed. Having the ability to run on a vast variety of devices, much of the user base possesses an Android phone. Its popularity and flexibility have played a major role in making it a target of different attacks via malware, causing loss to users, both financially and from a priva...
Article
Full-text available
Code smells are the result of not following software engineering principles during software development, especially in the design and coding phase. It leads to low maintainability. To evaluate the quality of software and its maintainability, code smell detection can be helpful. Many machine learning algorithms are being used to detect code smells....
Article
Full-text available
In recent years, different types of monitoring systems have been designed for various applications, in order to turn the urban environments into smart cities. Most of these systems consist of wireless sensor networks (WSN)s, and the designing of these systems has faced many problems. The first and most important problem is sensor node deployment. T...
Article
Full-text available
Smartphones have enabled the widespread use of mobile applications. However, there are unrecognized defects of mobile applications that can affect businesses due to a negative user experience. To avoid this, the defects of applications should be detected and removed before release. This study aims to develop a defect prediction model for mobile app...
Article
Full-text available
Stress has been designated the “Health Epidemic of the 21st Century” by the World Health Organization and negatively affects the quality of individuals’ lives by detracting most body systems. In today’s world, different methods are used to track and measure various types of stress. Among these techniques, experience sampling is a unique method for...
Article
Full-text available
The software industry has widely adopted global software development (GSD) to gain economic benefits. Organizations that engage in GSD face various challenges, the majority being associated with requirements change management (RCM). The key motive of this study is to develop a requirement change management and implementation maturity model (SRCMIMM...
Article
Full-text available
Artificial Intelligence has guided technological progress in recent years; it has shown significant development with increased academic studies on Machine Learning and the high demand for this field in the sector. In addition to the advancement of technology day by day, the pandemic, which has become a part of our lives since early 2020, has led to...
Article
Full-text available
Software defect prediction studies aim to predict defect-prone components before the testing stage of the software development process. The main benefit of these prediction models is that more testing resources can be allocated to fault-prone modules effectively. While a few software defect prediction models have been developed for mobile applicati...
Article
Full-text available
It is necessary to know the manufacturer and model of a previously implanted shoulder prosthesis before performing Total Shoulder Arthroplasty operations, which may need to be performed repeatedly in accordance with the need for repair or replacement. In cases where the patient’s previous records cannot be found, where the records are not clear, or...
Article
Full-text available
In recent years, research into blockchain technology and the Internet of Things (IoT) has grown rapidly due to an increase in media coverage. Many different blockchain applications and platforms have been developed for different purposes, such as food safety monitoring, cryptocurrency exchange, and secure medical data sharing. However, blockchain p...
Article
Full-text available
In recent years, research into blockchain technology and the Internet of Things (IoT) has grown rapidly due to an increase in media coverage. Many different blockchain applications and platforms have been developed for different purposes, such as food safety monitoring, cryptocurrency exchange, and secure medical data sharing. However, blockchain p...
Article
Context : Software reliability prediction in the early stages of development can be propitious in many ways. The combinatorial models used to predict reliability using architectures such as fault trees, binary decision diagrams, etc. have limitations in modeling complex system behavior. On the other hand, state-based models such as Markov chains su...
Article
Full-text available
Nowadays, different types of farm management information systems (FMIS) are being used in practice in several sectors of farming, such as dairy, arable, fruits, vegetables, and meat farming. The goal of this research is to identify, evaluate, and synthesize existing FMISs in the Dutch dairy sector and present the state–of–the–art. We performed a mu...
Article
Full-text available
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an...
Chapter
The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment ap...
Article
Full-text available
The Internet of Things (IoT) facilitates in building cyber-physical systems, which are significant for Industry 4.0. Agent-based computing represents effective modeling, programming, and simulation paradigm to develop IoT systems. Agent concepts, techniques, methods, and tools are being used in evolving IoT systems. Over the last years, in particul...
Article
Full-text available
Many real-world optimization problems usually require a large number of conflicting objectives to be optimized simultaneously to obtain solution. It has been observed that these kinds of many-objective optimization problems (MaOPs) often pose several performance challenges to the traditional multi-objective optimization algorithms. To address the p...
Article
Full-text available
Code smells detection helps in improving understandability and maintainability of software while reducing the chances of system failure. In this study, six machine learning algorithms have been applied to predict code smells. For this purpose, four code smell datasets (God-class, Data-class, Feature-envy, and Long-method) are considered which are g...
Article
Full-text available
Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest in research studies that focus on identifying and deriving threshold values is growing, given the advantage of applying software...
Article
Full-text available
This study provides empirical evidence to the body of knowledge in Agile methods adoption in small, medium and large organizations in international context. This research explores the factors involved in the adoption of Agile methods in software development organizations. A survey was conducted among Agile professionals to gather survey data from 5...
Chapter
Full-text available
Climate change risk and environmental degradation are the most critical issues of our society. Our technology-influenced daily lifestyle involves many types of software and apps which are used by society at large, and their use is increasing more than ever before. Sustainability is a significant topic for future professionals and more so for softwa...
Article
Full-text available
The role of design pattern mining is a very significant strategy of re-engineering as with the help of detection one could easily understand complex systems. Of course, identifying a design pattern is not always a simple task. Additionally, pattern recovering methods often encounter problems dealing with space outburst for extensive systems. This p...
Article
Full-text available
Disasters pose a real threat to the lives and property of citizens; therefore, it is necessary to reduce their impact to the minimum possible. In order to achieve this goal, a framework for enhancing the current disaster management system was proposed, called the smart disaster management system. The smart aspect of this system is due to the applic...
Article
Full-text available
The early and accurate prediction of defects helps in testing software and therefore leads to an overall higher-quality product. Due to drift in software defect data, prediction model performances may degrade over time. Very few earlier works have investigated the significance of concept drift (CD) in software-defect prediction (SDP). Their results...
Article
Full-text available
Unified Modeling Language (UML) includes various types of diagrams that help to study, analyze, document, design, or develop any software efficiently. Therefore, UML diagrams are of great advantage for researchers, software developers, and academicians. Class diagrams are the most widely used UML diagrams for this purpose. Despite its recognition a...
Article
In this research, we explored the use of Agile methods in small and medium-scale software development organizations. Specifically, focusing on three different types of agile approaches which are: Extreme Programming (XP), Scrum Methodology, and Dynamic System Development Methods. Most of the development methods and techniques are not employed as is...
Article
Full-text available
In the current competitive world, producing quality products has become a prominent factor to succeed in business. In this respect, defining and following the software product quality metrics (SPQM) to detect the current quality situation and continuous improvement of systems have gained tremendous importance. Therefore, it is necessary to review t...
Article
Product and process metrics are measured from the development and evolution of software. Metrics are indicators of software fault-proneness and advanced models using machine learning can be provided to the development team to select modules for further inspection. Most fault-proneness classifiers were built from product metrics. However, the inclus...
Chapter
Full-text available
Climate change risk and environmental degradation are the most critical issues of our society. Our technology influenced daily lifestyle involves many software and apps which are used by large society and their use is increasing than ever before. Sustainability is a significant topic for future professionals and more so for software engineers due t...
Article
Full-text available
Purpose: In this study, the required dose rates for optimal treatment of tumoral tissues when using proton therapy in the treatment of defective tumours seen in mandibles has been calculated. We aimed to protect the surrounding soft and hard tissues from unnecessary radiation as well as to prevent complications of radiation. Bragg curves of therap...
Article
Full-text available
Internet of Things (IoT) enables organizations to automate the process and improves service delivery through Internet technology and transferring the data at the cloud level. IoT does not allow the use of a universal software architecture for different fields in which it is used, but needs to be adjusted according to the requirements of users. This...
Article
Full-text available
Software has become an integral part of our everyday life and is gradually impacting human beings and society. Climate change risk and environmental degeneration are the most critical issues facing our society. Therefore, environmental concerns should be addressed in software and information system development, implementation, and operation. Sustai...
Article
Full-text available
ERP implementation is a complex and expensive project for organisations, because it touches upon social, behavioural and technical issues. This article presents an in-depth case study of an ERP consultancy in order to comprehensively understand ERP implementation from the consultancy’s perspective. Interviews were conducted with consultants, projec...
Article
Full-text available
Water could be some-times a source of danger on people's lives and property. Although it is one of the most important elements of life on this planet. This article define the threat of water pollution in Tigris River in Iraq. by collecting a data that generated by sensors that installed in a water pollution sensing project in Baghdad city, also thi...
Article
Full-text available
Effective software testing leads to assurance towards high quality in software development. Automation testing tool facilitates in faster testing process in testing stage thus completion and implementation of software on time. One of the most significant issues for automation is to select the automation-testing tool and the appropriate framework. T...
Article
Full-text available
This paper proposes a novel data classification framework, combining sparse auto-encoders (SAEs) and a post-processing system consisting of a linear system model relying on Particle Swarm Optimization (PSO) algorithm. All the sensitive and high-level features are extracted by using the first auto-encoder which is wired to the second auto-encoder, f...
Article
Full-text available
Quality pressure is one of the factors affecting processes for software development in its various stages. DevOps is one of the proposed solutions to such pressure. The primary focus of DevOps is to increase the deployment speed, frequency and quality. DevOps is a mixture of different developments and operations to its multitudinous ramifications i...
Article
Full-text available
The development of a software system is becoming a complex job due to the increasing demand of continuous software development (DevOps), competitive market, use of agile practices and globally distributed environment. Majority of the software development firms are struggling to follow the concepts of continuous and agile software development method...