Sanjay MisraInstitute for Energy Technology | IFE · Applied Data Science
Sanjay Misra
M.Tech.(Software Engineering), Ph.D(Information Engineering)
ACM Distinguished Speaker (https://speakers.acm.org/speakers/misra_13229)
Head,Soft Engg Modelling& Intelligence Cluster
About
852
Publications
735,363
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,068
Citations
Introduction
Sanjay Misra is Sr. Scientist at IFE, Halden, Norway. He has wide experience in academic administration & research at various universities in Asia, Europe Africa. He has a PhD in Information Engg(Software Eng) from Uni of Alcala, Spain. He is the 6th (all disciplines), &2nd(Sci&Tech)ranked researcher in Norway(2023)for publication points.As SciVal(SCOPUS- Elsevier) analysis was the most productive researcher(no.1)in Nigeria during 2017-2022(Overall),in Comp sci.No 1 in Nigeria & no 2 in Africa.
Additional affiliations
October 2012 - September 2022
January 2010 - October 2012
August 2003 - September 2005
Education
September 2012 - December 2015
Publications
Publications (852)
AI techniques for cybersecurity are advancing, but AI-based classifiers are suspectable of adversarial attacks. It is challenging to quantify the efforts required of an adversary to manipulate a system and quantify this resilience such that different systems can be compared using standard metrics. The study intends to quantify the actions required...
Internet of Things (IoT) devices are becoming increasingly ubiquitous, and their adoption is growing at an exponential rate. However, they are vulnerable to security breaches, and traditional security mechanisms are not enough to protect them. The massive amounts of data generated by IoT devices can be easily manipulated or stolen, posing significa...
Aim
This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.
Methodology
The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected sc...
Even though accurate detection of dangerous malignancies from mammogram images is mostly dependent on radiologists' experience, specialists occasionally differ in their assessments. Computer-aided diagnosis provides a better solution for image diagnosis that can help experts make more reliable decisions. In medical applications for diagnosing cance...
The pervasive spread of fake news in online social media has emerged as a critical threat to societal integrity and democratic processes. To address this pressing issue, this research harnesses the power of supervised AI algorithms aimed at classifying fake news with selected algorithms. Algorithms such as Passive Aggressive Classifier, perceptron,...
The growing advancement of different jobs, skills and businesses has stimulated the spread of diseases. Most of the time, these diseases can cross countries’ borders and spread at a very rapid rate. Avoiding and detecting these infections have proved to be a major problem for our public health and one that must be treated with great importance. Cro...
Intelligent Biomedical Technologies and Applications for Healthcare 5.0 covers artificial health intelligence, biomedical image analysis, 5G, the Internet of Medical Things, intelligent healthcare systems, and extended health intelligence (EHI). This volume contains four sections. The focus of the first section is health data analytics and applicat...
In the digitization era, the battery consumption factor plays a vital role for the devices that operate Android software, expecting them to deliver high performance and good maintainability.The study aims to analyze the Android-specific code smells, their impact on battery consumption, and the formulation of a mathematical model concerning static c...
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography recreates a critical function in safeguarding information from potential risks and confirming the identity of authorised individuals, thereby addressing the growing demand for enhanced image security. This paper presents a novel AES-permuted Feistel Blowfis...
Advancements in artificial intelligence in the cybersecurity domain introduce significant security challenges. A critical concern is the exposure of deep learning techniques to adversarial attacks. Adversary users intentionally attempt to mislead the techniques by infiltrating adversarial samples to mislead the prediction of security devices. The s...
In human resource management, training is considered one of the most effective ways to improve employees’ task performance. However, the effectiveness of training depends mostly on the resources and effort of learners, especially the operant resources. This study investigates the influence of operant resources on individual task performance within...
The advent of the information technology industry has had a progressively beneficial influence on the value chain through the modernization and optimization of production and distribution processes. Digital Twins (DTs) are a combination of advanced technologies applied in several industrial areas like energy, health, and transportation. The objecti...
This study aims to protect software development by creating a Software Risk Assessment (SRA) model for each phase of the Software Development Life Cycle (SDLC) using an Adaptive Neuro-Fuzzy Inference System (ANFIS) model. Software developers discovered and validated the risk variables affecting each SDLC phase, following which relevant data about r...
Amidst the relentless pace of the contemporary business landscape, information technology (IT) projects grapple with an escalating challenge — the need to deliver solutions swiftly, adapt to evolving customer demands, and create value within the ever-shifting dynamics of the market. In this demanding environment, the traditional project management...
An emerging subclass of the wireless network is known as a Delay Tolerant Network (DTN), in this network whenever the contact opportunity occurs sender nodes select the relay node randomly and disseminate the message in the network. The basic properties of DTN include; no fixed source-to-destination route, longer delay between nodes, and frequent d...
An intrusion detection system (IDS) is critical in protecting organizations from cyber threats. The susceptibility of Machine Learning and Deep Learning-based IDSs against adversarial attacks arises from malicious actors’ deliberate construction of adversarial samples. This study proposes a Python-based open-source code repository named IDS-Anta wi...
Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods, elevated false positive rates, absence of effective validation, and time-intensive processes. This study proposes a WCSAN-PSO framework to detect adversarial attacks in IDS based on a weighted conditional ste...
Data analytics personalize treatments and improve outcomes in a fast-changing digital world. The infusion of digital technologies into healthcare processes and workflows offers enhancements in areas such as flexibility, scalability, reliability, agility, cost-effectiveness, and the overall quality of healthcare services and operations. However, the...
The way of automation and modernization became relevant and common as the demand for digital technology with IoT and AI has increased, which helped to decrease manual labour and boost overall productivity. Cybersecurity was developed to guard against threats in the online environment to lessen these dangers. To provide a safe and risk-free environm...
With the rapid growth of digitization, the potential usefulness of Artificial Intelligence (AI) and Digital Twins (DTs) in Nuclear Power Plants (NPPs) are being explored. The Sustainable Development Goals (SDGs) conform as an exhaustive framework tracing methods for attaining stability and prosperity for society and the atmosphere, both in the curr...
With the digitization and evolution of Internet technology, the prevalence of most cyber-attacks is increasing. As society adopts digitalization, the need for cyber resilience in enterprises has become paramount because of the escalating threat of cyberattacks. Despite initial efforts, the world must still be on track to meet most Sustainable Devel...
Artificial Intelligence (AI) remain evolved as a central focus on international terrain, whereas the Internet of Things (IoT) is balanced to convey transformative changes in diverse disciplines. The anticipated revolution of sustainable future growth is likely compelled by the integration of Artificial Intelligence and the Internet of Things (AIoT)...
Analyzing, identifying, and classifying nonfunctional requirements from requirement documents is time-consuming and challenging. Machine learning-based approaches have been proposed to minimize analysts' efforts, labor, and stress. However, the traditional approach of supervised machine learning necessitates manual feature extraction, which is time...
With the environmental and societal changes, the achievement of sustainable development goals (SDGs) and the realization of sustainability in general is now more important than ever. Through a bibliometric analysis and scientific mapping analysis, this study aims to explore and provide an overview regarding the role of artificial intelligence (AI),...
The Internet of Things (IoT) has garnered considerable attention from academic and industrial circles as a pivotal technology in recent years. The escalation of security risks is observed to be associated with the growing interest in IoT applications. Intrusion detection systems (IDS) have been devised as viable instruments for identifying and aver...
Background
The importance of customer reviews in determining satisfaction has significantly increased in the digital marketplace. Using sentiment analysis in customer reviews has immense potential but encounters challenges owing to domain heterogeneity. The sentiment orientation of words varies by domain; however, comprehending domain-specific sent...
Cardiovascular disease (CVD) is a variety of diseases that affect the blood vessels and the heart. The authors propose a set of deep learning inspired by the approach used in CVD support centers for the early diagnosis of CVD using deep learning techniques. Data were collected from patients who received CVD screening. The authors propose a predicti...
Despite its status as one of the most ancient sectors worldwide, agriculture continues to be a fundamental cornerstone of the global economy. Nevertheless, it faces obstacles such as a lack of trust, difficulties in tracking, and inefficiencies in managing the supply chain. This article examines the potential of blockchain technology (BCT) to alter...
Purpose
The ubiquity of the internet has extended immense informational power to patients around the world who previously had abysmal knowledge about the disease they are suffering from. With a large amount of information in their hands, these educated and well-informed patients are cultivating deeper relationships and engagement with their physici...
Regulatory authorities, consumers, and producers alike are alarmed by the issue of food safety, which is a matter of international concern. The conventional approaches utilized in food quality management demonstrate deficiencies in their capacity to sufficiently address issues related to traceability, transparency, and accountability. The emergence...
The COVID-19 pandemic has led to significant disruptions to global economies, leading to the need for rapid transformation in the manufacturing sector. Industry 6.0, the next stage in the evolution of manufacturing, has emerged as a possible solution to these challenges. It builds on the previous industrial revolutions and incorporates advanced tec...
Due to the rapidly evolving technology in the dynamic world, there is a growing desire among software clients for swift delivery of high-quality software. Agile software development satisfies this need and has been widely and appropriately accepted by software professionals. The maintainability of such software, however, has a significant impact on...
Distributed ledger technologies (DLTs) are considered one of the foremost emerging technologies which can contribute to transform cities to smarter cities. DLT play important role in municipalities to accelerate the digitalization process toward changing the roles and services of enterprises in sustainable smart cities. Standardization of DLTs aids...
This competitive environment is rapidly driving technological modernization. Sophisticated cyber security attacks are expanding exponentially, inflicting reputation damage and financial and economic loss. Since security investments may take time to generate revenues, organizations need more time to convince top management to support them. Even thou...
The rise of the Internet of Behaviors (IoB) has paved the way for new opportunities to support and shape human decision-making. IoB refers to the collection, analysis, and use of digital data generated by human activities to inform decision-making processes. This technology has the potential to significantly impact various aspects of our lives, inc...
In recent years, Alzheimer’s disease (AD) has been a serious threat to human health. Researchers and clinicians alike encounter a significant obstacle when trying to accurately identify and classify AD stages. Several studies have shown that multimodal neuroimaging input can assist in providing valuable insights into the structural and functional c...
Due to COVID-19’s significant effects, effective and early viral identification is a critical research concern. This study’s objective is to assess the performance and efficiency of several transfer learning (TL) models and IoT for diagnosing COVID-19 patients in smart hospitals. This claim was clarified using the function of ML models and IoT-rela...
In recent years, BCT has garnered significant attention from researchers worldwide. The technology in question is a distributed database system characterised by its decentralised nature and lack of reliability. BCT has been widely adopted by numerous governments and scholars across various sectors for a number of years. Blockchain technology also i...
Alzheimer's disease (AD) is a long-lasting, degenerative brain illness for which there is now no successful treatment. However, there are medications that can delay its growth and stop its tracks. Therefore, stopping and regulating the progression of AD depends greatly on its early diagnosis. Computer-aided diagnosis (CAD) in health care has become...
Application of artificial intelligence methods in agriculture is gaining research attention with focus on improving planting, harvesting, post-harvesting, etc. Fruit quality recognition is crucial for farmers during harvesting and sorting, for food retailers for quality monitoring, and for consumers for freshness evaluation, etc. However, there is...
Purpose
Alzheimer’s disease (AD) is a progressive, incurable human brain illness that impairs reasoning and retention as well as recall. Detecting AD in its preliminary stages before clinical manifestations is crucial for timely treatment. Magnetic Resonance Imaging (MRI) provides valuable insights into brain abnormalities by measuring the decrease...
To guarantee that software does not fail, software quality assurance (SQA) teams play a critical part in the software development procedure. As a result, prioritizing SQA activities is a crucial stage in SQA. Software defect prediction (SDP) is a procedure for recognizing high-risk software components and determining the influence of software measu...
The recent progress in blockchain and wireless communication infrastructures has paved the way for creating blockchain-based systems that protect data integrity and enable secure information sharing. Despite these advancements, concerns regarding security and privacy continue to impede the widespread adoption of blockchain technology, especially wh...
Advances in the use of an intelligent transportation system (ITS) have been deployed in most of the world, which presents new opportunities for developing sustainable transportation system. This paper focuses on improving intelligent transportation systems using Big Data tools in predicting road accidents in Nigeria, based on real-time data gotten...
The most common causes of death are cardiovascular diseases (CVDs) every year due to lifestyle which include getting stressed up, unhealthy consumption of food, and many more amongst others. Several researchers have used machine learning (ML) models for the diagnosis of CVD, but it has been discovered that a lot of them still obtain low accuracy, A...
Anomaly detection enables the identification of the nature of the outliers to determine if they are errors or new trends that need to be understood and learnt by the model for improved generalisation capability. Multivariate and univariate anomaly detection is used to find an unusual point or pattern in a given set. A substantial number of articles...
The growth of internet used automobile shopping has been tremendous in recent years. It is important for sellers to correctly evaluate the price of the used cars. From the literature, classification is an approach that assists in data interpretation by analyzing data and providing a second opinion on data among other tasks most of the classifiers u...
Globally, the use of renewable energy has increased significantly since the late twentieth century. Nigeria is also leading the exponential growth of renewable energy use. This article will predict the solar energy collected in 11 power distribution company areas (DISCO) in Nigeria: Abuja, Benin, Eko, Enugu, Ibadan, Ikeja, Jos, Kaduna, Kano, Port-H...
The advancement in technology has led to the integration of internet-connected devices and systems into emergency management and response, known as the Internet of Emergency Services (IoES). This integration has the potential to revolutionize the way in which emergency services are provided, by allowing for real-time data collection and analysis, a...
Using software metrics as a method of quantification of software, various approaches were proposed for locating defect-prone source code units within software projects. Most of these approaches rely on supervised learning algorithms, which require labeled data for adjusting their parameters during the learning phase. Usually, such labeled training...
The COVID-19 pandemic has highlighted the critical importance of efficient and effective vaccine distribution in responding to global health emergencies. However, the complex and rapidly changing nature of the pandemic has made it challenging for traditional methods of vaccine allocation and delivery to keep up. Reinforcement learning (RL) has emer...
The main success of CNNs is in their capability to learn features automatically from domain-specific images unlike the other machine learning schemes. During training phase, CNN architecture utilizes transfer strategy of learned knowledge from a pre-trained network in one previous task to a new task. Traditional classification schemes have numerous...
This work proposes a short-term electrical load demand forecaster for the Nigerian power distribution firms in Abuja, Benin, and Enugu. Using artificial neural network, the forecaster is created. Hour of the day, calendar day, day of the week (Sunday-Saturday), load demand of the previous day, load demand of the previous week, and average load dema...
Due to technological advancements and consumer demands, online shopping creates new features and adapts to new standards. A robust customer satisfaction prediction model concerning trust and privacy platforms can encourage an organization to make better decisions about its service and quality. This study presented an approach to predict consumer sa...
Containers as a service (CaaS) are a kind of services that permits the organization to handle the containers more effectively. Containers are lightweight, require less computing resources, portable, and facilitate better support for microservices. In the CaaS model, containers are deployed in virtual machines, and the virtual machine runs on the ph...
The task of classifying opinions conveyed in any form of text online is referred to as sentiment analysis. The emergence of social media usage and its spread has given room for sentiment analysis in our daily lives. Social media applications and websites have become the foremost spring of data recycled for reviews for sentimentality in various fiel...
Social Media today has become the most relevant and affordable platform to express one's views in real-time. The #Endsars protest in Nigeria and the COVID-19 pandemic have proven how important and reliant both government agencies and individuals are on social media. This research uses tweets collected from Twitter API to identify and classify trans...
As the topic of sustainable development continues to prominence in global affairs, the case for renewable energy has never been stronger. To be regarded as a perfect alternative to conventional (non-renewable) energy sources in many climes, renewable energy, such as solar and wind, shows promise when considering concepts like grid parity. A signifi...