Hello Lover ROMANCE ON SALE DO TELL...

Close Notification

Your cart does not contain any items

$373.95

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Wiley-Scrivener
14 January 2025
Discover how Natural Language Processing for Software Engineering can transform your understanding of agile development, equipping you with essential tools and insights to enhance software quality and responsiveness in today’s rapidly changing technological landscape.

Agile development enhances business responsiveness through continuous software delivery, emphasizing iterative methodologies that produce incremental, usable software. Working software is the main measure of progress, and ongoing customer collaboration is essential. Approaches like Scrum, eXtreme Programming (XP), and Crystal share these principles but differ in focus: Scrum reduces documentation, XP improves software quality and adaptability to changing requirements, and Crystal emphasizes people and interactions while retaining key artifacts. Modifying software systems designed with Object-Oriented Analysis and Design can be costly and time-consuming in rapidly changing environments requiring frequent updates. This book explores how natural language processing can enhance agile methodologies, particularly in requirements engineering. It introduces tools that help developers create, organize, and update documentation throughout the agile project process.
Edited by:   , , , , , , , , , , ,
Imprint:   Wiley-Scrivener
Country of Publication:   United States
ISBN:   9781394272433
ISBN 10:   139427243X
Pages:   544
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Preface xvii 1 Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment 1 Ravindra Bhardwaj, Sreenivasulu Gogula, Bidisha Bhabani, K. Kanagalakshmi, Aparajita Mukherjee and D. Vetrithangam Preface xvii 2 Frequent Pattern Mining Using Artificial Intelligence and Machine Learning 15 R. Deepika, Sreenivasulu Gogula, K. Kanagalakshmi, Anshu Mehta, S. J. Vivekanandan and D. Vetrithangam 3 Classification and Detection of Prostate Cancer Using Machine Learning Techniques 29 D. Vetrithangam, Pramod Kumar, Shaik Munawar, Rituparna Biswas, Deependra Pandey and Amar Choudhary 4 NLP-Based Spellchecker and Grammar Checker for Indic Languages 43 Brijesh Kumar Y. Panchal and Apurva Shah 5 Identification of Gujarati Ghazal Chanda with Cross-Platform Application 71 Brijeshkumar Y Panchal 6 Cancer Classification and Detection Using Machine Learning Techniques 95 Syed Jahangir Badashah, Afaque Alam, Malik Jawarneh, Tejashree Tejpal Moharekar, Venkatesan Hariram, Galiveeti Poornima and Ashish Jain 7 Text Mining Techniques and Natural Language Processing 113 Tzu-Chia Chen 8 An Investigation of Techniques to Encounter Security Issues Related to Mobile Applications 127 Devabalan Pounraj, Pankaj Goel, Meenakshi, Domenic T. Sanchez, Parashuram Shankar Vadar, Rafael D. Sanchez and Malik Jawarneh 9 Machine Learning for Sentiment Analysis Using Social Media Scrapped Data 143 Galiveeti Poornima, Meenakshi, Malik Jawarneh, A. Shobana, K.P. Yuvaraj, Urmila R. Pol and Tejashree Tejpal Moharekar 10 Opinion Mining Using Classification Techniques on Electronic Media Data 155 Meenakshi 10 Opinion Mining Using Classification Techniques on Electronic Media Data 155 Meenakshi 12 An Investigation of Various Techniques to Improve Cyber Security 183 Shoaib Mohammad, Ramendra Pratap Singh, Rajiv Kumar, Kshitij Kumar Rai, Arti Sharma and Saloni Rathore 13 Brain Tumor Classification and Detection Using Machine Learning by Analyzing MRI Images 193 Chandrima Sinha Roy, K. Parvathavarthini, M. Gomathi, Mrunal Pravinkumar Fatangare, D. Kishore and Anilkumar Suthar 14 Optimized Machine Learning Techniques for Software Fault Prediction 207 Chetan Shelke, Ashwini Mandale (Jadhav), Shaik Anjimoon, Asha V., Ginni Nijhawan and Joshuva Arockia Dhanraj 15 Pancreatic Cancer Detection Using Machine Learning and Image Processing 221 Shashidhar Sonnad, Rejwan Bin Sulaiman, Amer Kareem, S. Shalini, D. Kishore and Jayasankar Narayanan 16 An Investigation of Various Text Mining Techniques 233 Rajashree Gadhave, Anita Chaudhari, B. Ramesh, Vijilius Helena Raj, H. Pal Thethi and A. Ravitheja 17 Automated Query Processing Using Natural Language Processing 245 Divyanshu Sinha, G. Ravivarman, B. Rajalakshmi, V. Alekhya, Rajeev Sobti and R. Udhayakumar 18 Data Mining Techniques for Web Usage Mining 259 Navdeep Kumar Chopra, Chinnem Rama Mohan, Snehal Dipak Chaudhary, Manisha Kasar, Trupti Suryawanshi and Shikha Dubey 19 Natural Language Processing Using Soft Computing 271 M. Rajkumar, Viswanathasarma Ch, Anandhi R. J., D. Anandhasilambarasan, Om Prakash Yadav and Joshuva Arockia Dhanraj 20 Sentiment Analysis Using Natural Language Processing 283 Brijesh Goswami, Nidhi Bhavsar, Soleman Awad Alzobidy, B. Lavanya, R. Udhayakumar and Rajapandian K. 21 Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data 295 C. V. Guru Rao, Nagendra Prasad Krishnam, Akula Rajitha, Anandhi R. J., Atul Singla and Joshuva Arockia Dhanraj 22 Intelligent Pattern Discovery Using Web Data Mining 311 Vidyapati Jha, Chinnem Rama Mohan, T. Sampath Kumar, Anandhi R.J., Bhimasen Moharana and P. Pavankumar 23 A Review of Security Features in Prominent Cloud Service Providers 323 Abhishek Mishra, Abhishek Sharma, Rajat Bhardwaj, Romil Rawat, T.M.Thiyagu and Hitesh Rawat 24 Prioritization of Security Vulnerabilities under Cloud Infrastructure Using AHP 335 Abhishek Sharma and Umesh Kumar Singh 25 Cloud Computing Security Through Detection & Mitigation of Zero-Day Attack Using Machine Learning Techniques 357 Abhishek Sharma and Umesh Kumar Singh 26 Predicting Rumors Spread Using Textual and Social Context in Propagation Graph with Graph Neural Network 389 Siddharath Kumar Arjaria, Hardik Sachan, Satyam Dubey, Ayush Pandey, Mansi Gautam, Nikita Gupta and Abhishek Singh Rathore 27 Implications, Opportunities, and Challenges of Blockchain in Natural Language Processing 403 Neha Agrawal, Balwinder Kaur Dhaliwal, Shilpa Sharma, Neha Yadav and Ranjana Sikarwar 28 Emotion Detection Using Natural Language Processing by Text Classification 425 Jyoti Jayal, Vijay Kumar, Paramita Sarkar and Sudipta Kumar Dutta 29 Alzheimer Disease Detection Using Machine Learning Techniques 443 M. Prabavathy, Paramita Sarkar, Abhrendu Bhattacharya and Anil Kumar Behera 30 Netnographic Literature Review and Research Methodology for Maritime Business and Potential Cyber Threats 457 Hitesh Rawat, Anjali Rawat and Romil Rawat 31 Review of Research Methodology and IT for Business and Threat Management 475 Hitesh Rawat, Anjali Rawat, Sunday Adeola Ajagbe and Yagyanath Rimal About the Editors 487 Index 489

Rajesh Kumar Chakrawarti, PhD, is a dean and professor in the Department of Computer Science and Engineering at Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of professional experience in academia and industry. Additionally, he has organized and attended over 200 seminars, workshops, and conferences and has published over 100 research papers and book chapters in nationally and internationally revered publications. Ranjana Sikarwar is currently pursuing a PhD from Amity University, Gwalior. She completed her Bachelor of Engineering in 2006 and Master of Technology in Computer Science and Engineering in 2015. Her research interests include social network analysis, graph mining, machine learning, Internet of Things, and deep learning. Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University with over 23 years of experience in the academic, research, and industry sectors. He has a number of publications in journals and conferences, has authored many textbooks and book chapters, and has more than 30 national and international patents. He is an active member and life member of many associations, as well as an editor, technical program committee member, and reviewer in reputed journals and conferences. He has dedicated his career to advancing information and communication technology to enhance and optimize worldwide research and information dissemination, leading to improved student learning and teaching methods. Samson Arun Raj Albert Raj, PhD, is an assistant professor and placement coordinator in the Division of Computer Science and Engineering, School of Computer Science and Technology, Karunya Institute of Technology and Sciences, Tamil Nadu, India. His research is focused on smart city development using drone networks and energy grids with various applications, and his areas of expertise include wireless sensor networks, vehicular ad-hoc networks, and intelligent transportation systems. Shweta Gupta is an assistant professor in the Computer Science and Engineering Department at Medicaps University, Indore (M.P.), India. She focuses on natural language processing, data mining, and machine learning. She aims to close the knowledge gap between theory and real-world applications in the tech sector through her passion for research and teaching. Her approach centers on encouraging creativity and motivating students to strive for technological excellence. Krishnan Sakthidasan Sankaran, PhD, is a professor in the Department of Electronics and Communication Engineering at Hindustan Institute of Technology and Science, India. He has been a senior member of the Institute of Electrical and Electronics Engineers for the past ten years and has published more than 70 papers in refereed journals and international conferences. He has also published three books to his credit. His research interests include image processing, wireless networks, cloud computing, and antenna design. Romil Rawat has attended several research programs and received research grants from the United States, Germany, Italy, and the United Kingdom. He has chaired international conferences and hosted several research events, in addition to publishing several research patents. His research interests include cybersecurity, Internet of Things, dark web crime analysis and investigation techniques, and working towards tracing illicit anonymous contents of cyber terrorism and criminal activities.

See Also