Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Management of rice blast disease caused by Pyricularia oryzae through application of biocontrol agents and fungicides alone and in possible combinations

    Rice blast caused by Pyricularia oryzae is considered as a major disease because of its wide geographic distribution and destructiveness under favourable conditions causing serious yield losses. The present study...

    Devanshi Pandit, A. K. Singh, V. K. Razdan, S. K. Singh in Indian Phytopathology (2024)

  2. No Access

    Article

    Develo** classifiers by considering sentiment analysis of reported bugs for priority prediction

    Software systems behave abnormally due to bugs when it comes into the operational phase. Lack of proper understanding of customer requirements, implementation, knowledge, wrong algorithmic designing, and other...

    Anisha Singh, P. K. Kapur, V. B. Singh in International Journal of System Assurance … (2024)

  3. No Access

    Article

    Bug summary entropy based training candidates identification in cross project severity prediction

    In a software, prediction of bug severity helps in allocation of resources and scheduling during bug fixing. Automated bug severity prediction is required as assigning severity to a bug manually may take more ...

    Meera Sharma, Madhu Kumari, V. B. Singh in International Journal of System Assurance … (2024)

  4. No Access

    Article

    Inter project defect classification based on word embedding

    Defect classification is a process to classify defects based on predefined categories. It is time consuming and manual process. Many automatic defect classification methods have been proposed to speed up the p...

    Sushil Kumar, Meera Sharma, S. K. Muttoo in International Journal of System Assurance … (2024)

  5. No Access

    Chapter

    Bug Prediction Techniques: Analysis and Review

    Bug expectation could be a preparation where we attempt to foresee bugs based on authentic information about the specific application. The term distinguishes “bug hot spots” within the code base and banners as...

    Riya Sen, V. B. Singh in Reliability Engineering for Industrial Processes (2024)

  6. No Access

    Chapter

    An Insight into Code Smell Detection Tool

    A code smell isn’t a bug and it won’t help your system operate exceptionally. It might simply make it more difficult for software engineers to comprehend and maintain project source code, resulting in extra ma...

    Shrasti Mourya, Piyush Pratap Singh in Reliability Engineering for Industrial Pro… (2024)

  7. No Access

    Article

    Retrospective analysis and risk of progression of partial anterior cruciate ligament injuries in a young population

    The anterior cruciate ligament (ACL) is a common knee ligament injury. Partial ACL tears are common, and at least 10–27% of isolated ACL tears are diagnosed as partial tears. Patients with partial tears have h...

    S. K. Rai, T. P. Gupta, V. B. Singh in Archives of Orthopaedic and Trauma Surgery (2023)

  8. No Access

    Article

    Effect of weather parameters on the development and progression of rice blast disease in Jammu plains

    Rice blast is a most destructive disease of rice in Jammu and Kashmir. The environmental conditions highly affect the disease development especially the temperature and relative humidity. Many studies have bee...

    Devanshi Pandit, A. K. Singh, S. K. Singh, V. B. Singh in Indian Phytopathology (2023)

  9. No Access

    Article

    Comparative analysis of hydrochemical variables of two Ramsar-listed lakes in Pokhara Valley, Nepal

    Freshwater is one of the indispensable resources for the livelihood improvement of people and ecological sustainability. This study aims to assess the hydrochemical characteristics and drinking and irrigationa...

    R. R. Pant, K. Bishwakarma, K. B. Pal in International Journal of Energy and Water … (2023)

  10. No Access

    Article

    Blockchain technology and software engineering practices: a systematic review of literature using topic modelling approach

    Blockchain has drawn significant attention from researchers for more than a decade. Recently, there has been a series of research works on blockchain technology reported across the globe. However, most of them...

    Priti Jagwani, V. B. Singh, Noopur Agrawal in International Journal of System Assurance … (2023)

  11. No Access

    Chapter and Conference Paper

    Removing Stegomalware from Digital Image Files

    Steganography, a data hiding technique, has trended into a lucrative means to hide malware within digital media and other files to avoid detection. Such malware hidden by means of steganography is known as ste...

    Vinita Verma, Sunil K. Muttoo, V. B. Singh in Advances in IoT and Security with Computat… (2023)

  12. No Access

    Chapter

    Machine Learning Based Software Defect Categorization Using Crowd Labeling

    Defect categorization is an important task which helps in software maintenance. It also helps in prioritizing the defects, resource allocation, etc. Standard machine learning techniques can be used to automate...

    Sushil Kumar, Meera Sharma, S. K. Muttoo in Predictive Analytics in System Reliability (2023)

  13. No Access

    Article

    A generalized prediction model for improving software reliability using time-series modelling

    The primary goal of any prediction model is an accurate estimation. Software reliability is one of the software organization's major research priorities. One of the quantitative indicators of software quality ...

    Kamlesh Kumar Raghuvanshi, Arun Agarwal in International Journal of System Assurance … (2022)

  14. No Access

    Chapter and Conference Paper

    Autoclassify Software Defects Using Orthogonal Defect Classification

    Software systems have become an integral part of all the organizations. These systems are performing many critical operations. A defect in these systems affects the product quality and the software development...

    Sushil Kumar, Meera Sharma, S. K. Muttoo in Computational Science and Its Applications… (2022)

  15. No Access

    Chapter and Conference Paper

    Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in Windows

    Steganography, a data hiding technique has trended into hiding the malware within digital media, giving rise to stegomalware. Specifically, digital images pose a potential threat due to their massive use, inno...

    Vinita Verma, Sunil K. Muttoo, V. B. Singh in Security, Privacy and Data Analytics (2022)

  16. Article

    Open Access

    A time-variant fault detection software reliability model

    In this work, we propose a time-variant software reliability model (SRM)which considers the fault detection and the highest number of faults in software. The time-variant genetic algorithm process is implement...

    Kamlesh Kumar Raghuvanshi, Arun Agarwal, Khushboo Jain, V. B. Singh in SN Applied Sciences (2021)

  17. No Access

    Chapter and Conference Paper

    Bug Priority Assessment in Cross-Project Context Using Entropy-Based Measure

    Software users report bugs on the bug tracking system in a distributed environment with different levels of understanding and knowledge about the software. As a result of this, software bug repository data are...

    Meera Sharma, Madhu Kumari, V. B. Singh in Advances in Machine Learning and Computati… (2021)

  18. No Access

    Article

    Enhanced payload and trade-off for image steganography via a novel pixel digits alteration

    Many high capacity image steganography algorithms have been proposed but at the cost of lower imperceptibility. To fill the gap, this paper proposes a novel RGB image steganography technique that not only enha...

    Vinita Verma, Sunil K. Muttoo, V. B. Singh in Multimedia Tools and Applications (2020)

  19. No Access

    Chapter and Conference Paper

    Detection of Malign and Benign PE Files Using Texture Analysis

    With the unlimited growth of malware and the abundant and often reckless downloading of files from the internet, it is crucial to have an efficient method that can also be scalable and fast for detecting malwa...

    Vinita Verma, Sunil K. Muttoo, V. B. Singh in Information Systems Security (2020)

  20. No Access

    Chapter and Conference Paper

    An Improved Classifier Based on Entropy and Deep Learning for Bug Priority Prediction

    The bug reports are reported at a faster rate, resulting in uncertainties and irregularities in the bug reporting process. The noise and uncertainty also generated due to increasing enormous size of the bugs t...

    Madhu Kumari, V. B. Singh in Intelligent Systems Design and Applications (2020)

previous disabled Page of 3