![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Management of rice blast disease caused by Pyricularia oryzae through application of biocontrol agents and fungicides alone and in possible combinations
Rice blast caused by Pyricularia oryzae is considered as a major disease because of its wide geographic distribution and destructiveness under favourable conditions causing serious yield losses. The present study...
-
Article
Develo** classifiers by considering sentiment analysis of reported bugs for priority prediction
Software systems behave abnormally due to bugs when it comes into the operational phase. Lack of proper understanding of customer requirements, implementation, knowledge, wrong algorithmic designing, and other...
-
Article
Bug summary entropy based training candidates identification in cross project severity prediction
In a software, prediction of bug severity helps in allocation of resources and scheduling during bug fixing. Automated bug severity prediction is required as assigning severity to a bug manually may take more ...
-
Article
Inter project defect classification based on word embedding
Defect classification is a process to classify defects based on predefined categories. It is time consuming and manual process. Many automatic defect classification methods have been proposed to speed up the p...
-
Chapter
Bug Prediction Techniques: Analysis and Review
Bug expectation could be a preparation where we attempt to foresee bugs based on authentic information about the specific application. The term distinguishes “bug hot spots” within the code base and banners as...
-
Chapter
An Insight into Code Smell Detection Tool
A code smell isn’t a bug and it won’t help your system operate exceptionally. It might simply make it more difficult for software engineers to comprehend and maintain project source code, resulting in extra ma...
-
Article
Retrospective analysis and risk of progression of partial anterior cruciate ligament injuries in a young population
The anterior cruciate ligament (ACL) is a common knee ligament injury. Partial ACL tears are common, and at least 10–27% of isolated ACL tears are diagnosed as partial tears. Patients with partial tears have h...
-
Article
Effect of weather parameters on the development and progression of rice blast disease in Jammu plains
Rice blast is a most destructive disease of rice in Jammu and Kashmir. The environmental conditions highly affect the disease development especially the temperature and relative humidity. Many studies have bee...
-
Article
Comparative analysis of hydrochemical variables of two Ramsar-listed lakes in Pokhara Valley, Nepal
Freshwater is one of the indispensable resources for the livelihood improvement of people and ecological sustainability. This study aims to assess the hydrochemical characteristics and drinking and irrigationa...
-
Article
Blockchain technology and software engineering practices: a systematic review of literature using topic modelling approach
Blockchain has drawn significant attention from researchers for more than a decade. Recently, there has been a series of research works on blockchain technology reported across the globe. However, most of them...
-
Chapter and Conference Paper
Removing Stegomalware from Digital Image Files
Steganography, a data hiding technique, has trended into a lucrative means to hide malware within digital media and other files to avoid detection. Such malware hidden by means of steganography is known as ste...
-
Chapter
Machine Learning Based Software Defect Categorization Using Crowd Labeling
Defect categorization is an important task which helps in software maintenance. It also helps in prioritizing the defects, resource allocation, etc. Standard machine learning techniques can be used to automate...
-
Article
A generalized prediction model for improving software reliability using time-series modelling
The primary goal of any prediction model is an accurate estimation. Software reliability is one of the software organization's major research priorities. One of the quantitative indicators of software quality ...
-
Chapter and Conference Paper
Autoclassify Software Defects Using Orthogonal Defect Classification
Software systems have become an integral part of all the organizations. These systems are performing many critical operations. A defect in these systems affects the product quality and the software development...
-
Chapter and Conference Paper
Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in Windows
Steganography, a data hiding technique has trended into hiding the malware within digital media, giving rise to stegomalware. Specifically, digital images pose a potential threat due to their massive use, inno...
-
Article
Open AccessA time-variant fault detection software reliability model
In this work, we propose a time-variant software reliability model (SRM)which considers the fault detection and the highest number of faults in software. The time-variant genetic algorithm process is implement...
-
Chapter and Conference Paper
Bug Priority Assessment in Cross-Project Context Using Entropy-Based Measure
Software users report bugs on the bug tracking system in a distributed environment with different levels of understanding and knowledge about the software. As a result of this, software bug repository data are...
-
Article
Enhanced payload and trade-off for image steganography via a novel pixel digits alteration
Many high capacity image steganography algorithms have been proposed but at the cost of lower imperceptibility. To fill the gap, this paper proposes a novel RGB image steganography technique that not only enha...
-
Chapter and Conference Paper
Detection of Malign and Benign PE Files Using Texture Analysis
With the unlimited growth of malware and the abundant and often reckless downloading of files from the internet, it is crucial to have an efficient method that can also be scalable and fast for detecting malwa...
-
Chapter and Conference Paper
An Improved Classifier Based on Entropy and Deep Learning for Bug Priority Prediction
The bug reports are reported at a faster rate, resulting in uncertainties and irregularities in the bug reporting process. The noise and uncertainty also generated due to increasing enormous size of the bugs t...