Elicitation and Prioritization of Software Requirements
|
|
|
- Bernadette Evans
- 10 years ago
- Views:
Transcription
1 Elicitation and Prioritization of Software Requirements Mohd. Sadiq Computer Engineering Section, University Polytechnic, Faculty of Engineering and Technology Jamia Millia Islamia (A Central University), New Delhi (India) Abstract: A requirements may be defined as a demand or need. In software engineering, a requirement is a description of what a system should do. System may have dozen to thousands of requirements. Software requirements stipulate what must be accomplished, transformed, produced or provided. In this paper we have proposed a framework for elicitation and prioritization of software requirements using AHP and QFD techniques. This framework mathematically prioritize the software requirements after eliciting the software requirements from existing method such as misuse case, JAD, ontology and so on, but in this paper we have used the JAD approach in order to elicit the software requirements. Keywords: Software Requirements, Elicitation Techniques, Analytic Hierarchy Process, and Quality Function Deployment. I. INTRODUCTION: Elicitation is all about determining the needs of stakeholders and learning, uncovering extracting and /or discovering needs of the users and other potential stakeholders [5]. Requirement elicitation is recognized as one of the most critical knowledge intensive activities of the development of software. Studies by [13] indicate that 70% of the system errors are due to the inadequate system specification and 30% of the system errors are due to design issue. The analysis of secure software system based on the system requirements elicited in the form of use case and misuse case. Use cases have proven helpful for elicitation of communication about, and documentation of the function requirements. The integral development of use and misuse cases [8,10,12] provides a systematic way for the elicitation of both the functional and non functional requirements [9]. Using an elicitation method can help in producing a consistent and complete set of security requirements. However, brainstorming and elicitation methods used for ordinary functional (enduser) requirements usually are not oriented toward security requirements and do not result in a consistent Mohd. Shahid M. Tech. Scholar, Department of Computer Science and Engineering, Al-Falah School of Engineering and Technology, Dhauj, Faridabad Maharshi Dayanand University, Rohtak, Haryana (India) [email protected] and complete set of security requirements. The resulting system is likely to have fewer security exposures when security requirements are elicited in a systematic way. QFD was developed in the Kobe shipyards as a way to expand and implement the view of quality as taught by W. Edwards Deming and others [16, 17]. It has been widely applied in many industries worldwide, such as automobile, electronics, food processing, computer hardware, and software. Software Quality function Deployment (SQFD) focuses on improving the quality of both the software development process and the product [16, 18]. A number of requirements elicitations techniques have been developed to extract requirements from a user. The following list is a sample of methods that could be considered for eliciting security requirements. The goal of JAD (Joint Application Development) is to involve all stakeholders in the design phase of the product via highly structured and focused meetings. Typical participants in the session include a facilitator, end users of the product, main developers, and observers. In the preliminary phases of JAD, the requirements-engineering team is tasked with fact finding and information gathering. Typically, the outputs of this phase, as applied to security requirements elicitation, are security goals and artifacts. The actual JAD session is then used to validate this information by establishing an agreed-on set of security requirements for the product. If JAD has some advantages so it has also some disadvantages. The important disadvantage of JAD is that if there are too many JAD sessions while the project is progressing then user may develop a feeling that the developer are shifting their work and responsibility onto the users. To get the detailed description about the remaining techniques please refer to [5] [6] [4]. The paper is organized as follows: In section 2 we present the background and related work. In section 3 we have proposed the framework for elicitation and prioritization of software 138
2 requirements (FEPSR) using AHP and QFD techniques, in this section we have also applied FEPSR on a Mini Software for Numerical Integration (MSNI) and finally we conclude the paper in section 4. II. BACKGROUND AND RELATED WORK: D.Firesmith [1], have worked for prioritization dimensions, prioritization approach, prioritization techniques and processes. This paper does not explain how the software requirements will be prioritize mathematically? It has only a list of prioritization techniques. In [19] C. Kuloor and A. Eberlrin have explained the requirements engineering for software product lines. It has limited number of elicitation techniques. This paper does not include ontology framework, misuse cases, rapid application development etc. In [21] J.Karlsson, C Wohlin, and B.Regnell have evaluated six different methods for prioritization software requirements. In this paper, authors have found that Analytic Hierarchy Process to be the most promising method. But in literature we have found the some weaknesses of the AHP. The limitation of the AHP is that it only works because the matrices are all of the same mathematical formknown as positive reciprocal matrix. To create such a matrix requires that, if we use the number 9 to represent A is absolutely more important than B then we have to use 1/9 to define the relative importance of B with respect to A. Some people regard that as reasonable: others are less happy about it. This paper does not include any elicitation technique. We know that without eliciting any requirements we can not prioritize it. So in order to prioritize the requirements, there should be a list of elicitation techniques. Researchers, scientist and academician in the field of software engineering have proposed several techniques to elicit the software requirements. In [3] authors have proposed an approach for the software requirements elicitation. They have used the several steps like training sessions to eliminate lack of user input and poor understanding, recording keywords, pictorial representation of needs and wants to reduce language barriers etc. but this approach does not have the information that how we will prioritize the requirements. In [7] the authors have provided the different elicitation technique and criteria for its selection. In the continuation of the above work we have proposed a FEPSR using AHP and QFD. III. PROPOSED FRAMEWORK: In this section we have proposed FEPSR using AHP and QFD with the help of [14, 15]. This framework overcomes the problems that we had discussed in the last section. 1. Evaluation of Elicitation Criteria. 2. Choose the appropriate Elicitation method. 3. Elicit the software requirements with the help of the following (a) Collect information about user expectations. (b) Train the Clients, Users and Managers. (c) Write the description of the user need for the proposed system. (d) Now you can apply Misuse cases, JAD, RAD, and Ontology framework. 4. In this framework we are using two different prioritizing techniques i.e. Analytic Hierarchy Process (AHP) and Quality Function Deployment (QFD). 5. If we are using AHP { Create the overall performance matrix } Then calculate the Eigen vector Else { Develop the QFD matrix on the basis of the software requirements } 6. Draw the Pareto- like graph 3.1 Evaluation of Elicitation Criteria: The elicitation evaluation criteria may be useful in selecting an elicitation method. We evaluate the elicitation criteria on the basis of [13, 14]. 3.2 Choose the appropriate Elicitation Technique: In [4] Nancy. R. Mead, have discussed the techniques to evaluate the elicitation criteria.so in this paper we have used that technique to evaluate the best elicitation technique and we found that JAD is appropriate for MSNI. Above parameters are used to choose the best elicitation techniques. In this paper we have applied Joint Application Development to elicit the software requirements. We know that we have elicited the software requirements for Numerical Integration Based Software i.e. MSNI which were used to solve the given set of integrals using Simpson s 1/3, Simpson s 3/8 and Trapezoidal rules. 3.3 Elicit the Software Requirements with the help of the following: Collect information about user expectations: Software Requirement Specification is the first step in the software development which is used to capture the requirement of the client. Before the designing phase SRS team write the user manual i.e. SRS and from this SRS we collect the information about the user need and expectations. This careful compilation of information will be used in the next phase to train 139
3 the clients/ user and make them aware of what they can and can not expect from the software developers. In this stage stakeholder also learn about the limitations of the computer resources and functionalities, and availability of other resources Train the Clients, Users, and Managers: Once we have collected the information about the user need and expectation; the next step is to train the clients, users and managers. At this stage, missing user input can be supplemented Write the description of the user need for the proposed system: After the successful completion of the above steps, each stakeholder will write the description of his/ her needs of the system that the clients want to develop. Since the clients and customers are already educated about the computer limitations and availability of resources through the training sessions. In this stage expectations of the development process become clearer. With the help of the above steps i.e , 3.3.2, and 3.3.3, we have elicited the software requirements for MSNI and the important list of software requirements are given below. (a) Total numbers of existing algorithm like Simpson s 1/3 rule, Simpson s 3/8 and Trapezoidal rule. (EA); (b) Total numbers of algorithms proposed by the researchers (PA); (c) Accuracy (AC); (d) Graphical User Interface (GI); (e) Functionality of the algorithm (FA); (f) Passwords (PW) (g) Risk (RI) (h) Cost (CO). 3.4 In this paper we have used two different approaches for prioritizing the software requirements i.e. Analytic Hierarchy Process and Quality Function Deployment (QFD). The Analytic Hierarchy Process (AHP) is a structured technique for dealing with complex decisions. Rather than prescribing a "correct" decision, the AHP helps the decision makers find the one that best suits their needs and their understanding of the problem. Based on mathematics and psychology, it was developed by Thomas L. Saaty [11] in the 1970s and has been extensively studied and refined since then. The AHP provides a comprehensive and rational framework for structuring a decision problem, for representing and quantifying its elements, for relating those elements to overall goals, and for evaluating alternative solutions. It is used around the world in a wide variety of decision situations, in fields such as government, business, industry, healthcare, and education. In this section we have first explain how the AHP would be used to prioritize the software requirements. Suppose a university wishes to buy a piece of software of certain type and has four aspects in mind which will govern its purchasing choice. (i) Expense, E (ii) Operability, O (iii) Reliability, R (iv) Adaptability for other uses or Flexibility, F. Competing manufactures of that equipment have offered three options, X, Y, and Z. The software engineers have looked at these options and decided that X is cheap and easy to operate but is very reliable and could not easily be adapted to other users. Y is somewhat more expensive, is reasonable and easy to operate, and is very reliable and not very adaptable. Finally, Z is very expensive, not easy to operate, is a little less reliable than Y but is claimed by the manufacturer to have a wide range of alternatives uses. Each of X, Y, and Z will satisfy the firm s requirements to differing extents so which, overall, best meets this firm s needs? This is clearly an important and common class of problem and AHP have numerous applications. We first provide an initial matrix for the firm s pair wise comparisons in which the principal diagonal contains entries of 1, as each factor is as important as itself [15]. E O R F E 1 O 1 R 1 F 1 There is no standard way to make the pair wise comparison but let us suppose that the firm decide that O is slightly more important than cost. In the next matrix that is rated as 3 in the cell O, E and I/3 in E, O. They also decide that reliability is far more important than cost, giving 9 in R, E and 1/9 in E, R. Similarly we enter the information into the given matrix on the basis of the Saaty Rating scale. This forms the completed matrix, which we will term the Overall Preference matrix (OPM) is E O R F E 1 1/3 1/9 1/5 O R F 5 1 1/3 1 The eigenvector (importance weight) of the relative importance or value of E, O, R, and F is (0.058, , , and 0.226). Thus R is most valuable, O and F are behind, but roughly equal and E is very much less significant. So in this way we can easily collect the customer s requirements. After the detailed description of the AHP we have provided the QFD approach in order to prioritize the software requirements and the steps for the QFD are given below: 1. Generate the importance weight for CNS using Analytic Hierarchy Process (AHP) 2. Place the customer needs, their weight and specification in a QFD matrix. 3. Find out the absolute weight and relative weight. 4. Create the Pareto-like chart of the weights. 140
4 From the above steps we have got the idea that how we will collect the customer needs and how we will prioritize that need using AHP? In this paper we have used the concept of the QFD [16, 17] for the prioritization of the software requirements. Consider the following overall performance matrix (OPM) that is derived from customer needs statement for MSNI: Table-1 (OPM) C PA AC EA FA GI RI PW CO 1 PA 1 1/5 1/3 1/ /5 1/3 2 AC 5 1 1/5 1/ /3 1/5 3 EA / FA /5 1/3 5 5 GI 1/3 1/3 1/3 1/ /5 6 RI 1/3 1/3 1/3 5 1/ PW 5 3 1/3 3 1/3 1/ CO 3 5 1/5 1/5 5 1/5 1/5 1 After applying the AHP we have got the importance weights and it is summarized in table- 02. Table-02 Category I. Weight In the above table functionality of the algorithm has the highest priority because its importance weight is i. e. category 4. Under this category there are again 10 requirements and these requirements are R1, R2, R10. The overall performance matrix for this situation is as below: Table-03 (OPM) R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R1 1 1/ / /9 1/3 R / /5 1/5 9 1/7 R3 1/3 1/ /7 1/5 1/3 1/5 R4 1/7 3 1/ /5 1/3 7 R5 3 1/5 1/7 1/ /9 1/7 R6 1/5 1/3 1/3 1/3 1/ R7 1/ /3 1/5 1/ R8 1/ /9 1/5 1/ /5 R9 9 1/ /7 1/5 1/5 1 3 R10 3 1/7 5 1/7 7 1/9 1/7 5 1/3 1 After applying the AHP [11, 18] we have got the importance weights and it is summarized in table- 04. To compare the global importance of all items in all categories each item needs to be adjusted by the importance weighting of its corresponding category. Thus all the weight category 4 would be adjusted by multiplying the weight of each element by the importance weighting of category 4 i.e Thus the global weight of element 4.1 would be 0.267*0.094= After obtaining all the global weights we proceed to the next step in our CTQ (critical- to- quality) process. Now we will Place customer needs, there weight and specification in QFD matrix. In the following table SA-1 means first specification attributes and SA-2 means second specification attributes and so on. Table-04 Category I. Weight QFD Matrix CN GW Quality Characteristics SA-1 SA-2 SA-3 SA-4 SA , Once the body of the matrix is filled in, multiply the values in each column of the body of the matrix by the corresponding values in the global weight column and sum the column. All raw column weights thus calculated and then normalized as shown in the following table: Table-5 S. Attributes Absolute Weight Normalized weight SA SA SA SA SA From the given chart we conclude that which specification attribute will get the priority. In this approach SA-4 has got first priority, then SA-5 and so on. Relative Weights Pareto-Like Chart of the weights ranked from largest to smallest 0IV. CONCLUSION: SA-4 SA-5 SA-3 SA-2 SA-1 Specification Attributes Series1 IV CONCLUSION: The poor performance could be (i) unrelated to elicitation techniques, (ii) caused by lack of effective elicitation techniques, (iii) by availability but poor use of effective elicitation techniques. In this paper we have proposed an approach to elicit the software 141
5 requirements and its prioritization using AHP. From this approach we can easily rank the requirements and can implement it on the basis of the ranking. In this paper we have developed the mini software for numerical integration (MSNI). This software basically integrates the value of a given function after applying existing techniques like Simpson s 1/3 rule, Simpson s 3/8 rule, trapezoidal rule etc. Any product development involves projecting its potentials success in achieving its functional and commercial goals. Better quality designs that match customer needs and preferences and integrate other life cycle issues early in the software development process. Thus there is significant concern in industry about quality product design, which is addressed by Quality function Deployment (QFD). From the proposed framework it would be easy to prioritize the requirements. We know that 70% of the system errors are due to the in adequate system specification and 30% of the system errors are due to design issue. If we can elicit the system requirements properly and can prioritize it according to proposed framework then we can definitely reduce this 70% factor. V. ACKNOWLEDGEMENTS: The authors would like to thank Mr. Iqbal Azam, Principal, University Polytechnic, Faculty of Engineering and Technology, Jamia Millia Islamia (A Central University), New Delhi-25, India ; and Mr. Jawad Ahmad Siddiqui, Chairman, Al-Falah School of Engineering and Technology, Dhauj, Faridabad, Haryana, India, for his valuable support, guidance and encouragement REFERENCES: 1. D. Firesmith, Prioritizing Requirements, Journal of Object Technology, Volume 3, No.8, September LI Zong-yong, WANG Zhi-xue, YANG-ying, WU Yue, LIU Ying, Towards multiple ontology Framework for Requirements Elicitation and Reuse, 31 st IEEE Annual International Computer Software and Application Conference, P.Rajagopal, R.Lee, Thomas Ahlswede, Chia- Chu Chiang, D. Karolak, A New Approach for Software Requirements Elicitation, Proceedings of the 6 th IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing, Nancy R. Mead, Requirements Elicitation Introduction, Software Engineering Institute Carnegie Mellon University, Ann M. Hickey, Alan M. Davis, Requirements Elicitation and Elicitation technique selection: A Model for Two knowledge-intensive Software development Process, Proceedings of the 36 th IEEE International Conference on System Sciences, W.R. Friedrich, J. A. Van der Poll, Towards a Methodology to Elicit Tacit Domain knowledge from Users, Interdisciplinary Journal of Information, Knowledge, and Management, Volume2, A.M. Hickey, A.M. Davis, Elicitation Technique Selection: How Do Experts Do It? Proceedings of the 11 th IEEE International Requirements Engineering Conference, Gunnar Peterson, John Steven, Defining Misuse within the Development Process, IEEE Security and Privacy, J.J.Pauli, D.Xu, Misuse Case-Based design and Analysis of secure Software Architecture, Proceedings of the IEEE International Conference on Information Technology: Coding and Computing (ITCC05), Ian Alexander, Misuse Cases Help to Elicit Non-functional Requirements, Computing and Control Engineering T. L. Saaty, The Analytic Hierarchy process, New York, McGraw-Hill, J. Karlsson, Software Requirements Prioritizing, Proceedings of the International Conference on Requirement Engineering, Beichter F. et al, SLAN-4-A Software Specification and Design Language, IEEE Transaction on Software Engineering, SE- 10,2, 1994, pp Mohd. Sadiq, Shabina Ghafir, Mohd. Shahid, An Approach for Eliciting Software Requirements and its Prioritization using Analytic Hierarchy Process, IEEE International Conference on Advances in Recent Technologies in Communication and Computing, 2009, ACEEE annual world congress on Engineering and Technology, Kerala, India. 15. Mohd. Sadiq, Shabina Ghafir, Mohd. Shahid, A Framework to Prioritize the software Requirements using Quality Function Deployment, National Conference on Recent Development in Computing and its Application, 2009, organized by Jamia Hamdard, Delhi, India. 16. Xiaoqing frank Liu, Software Quality Development, IEEE Potentials, Bruce White, QFD for small business, Transaction from the 18 Symposium on QFD, Process 19. C.Kuloor, Armin Eberlein, Requirements Engineering for Software Product Lines, The University of Calgary, Canada. 20. J. Karlsson, C. Wohlin, B. Regnell, An Evaluation of Methods for Prioritizing Software Requirements, Elsvier Journal of Information and Software Technology, 1998, pp
MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process
MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process Business Intelligence and Decision Making Professor Jason Chen The analytical hierarchy process (AHP) is a systematic procedure
The Analytic Hierarchy Process. Danny Hahn
The Analytic Hierarchy Process Danny Hahn The Analytic Hierarchy Process (AHP) A Decision Support Tool developed in the 1970s by Thomas L. Saaty, an American mathematician, currently University Chair,
A Project Estimator Tool: for Software Estimation using Neuro-Fuzzy
A Project Estimator Tool: for Software Estimation using Neuro-Fuzzy Anita Verma 1,Sachin Patel 2 and Ajay Jaiswal 3 1,2 RGPV,Bhopal University, Patel College of Science and Technology, Indore(M.P.),India
Vendor Evaluation and Rating Using Analytical Hierarchy Process
Vendor Evaluation and Rating Using Analytical Hierarchy Process Kurian John, Vinod Yeldho Baby, Georgekutty S.Mangalathu Abstract -Vendor evaluation is a system for recording and ranking the performance
Content-Based Discovery of Twitter Influencers
Content-Based Discovery of Twitter Influencers Chiara Francalanci, Irma Metra Department of Electronics, Information and Bioengineering Polytechnic of Milan, Italy [email protected] [email protected]
Analytical Hierarchy Process for Higher Effectiveness of Buyer Decision Process
P a g e 2 Vol. 10 Issue 2 (Ver 1.0), April 2010 Global Journal of Management and Business Research Analytical Hierarchy Process for Higher Effectiveness of Buyer Decision Process Razia Sultana Sumi 1 Golam
Using Analytic Hierarchy Process Method in ERP system selection process
Using Analytic Hierarchy Process Method in ERP system selection process Rima Tamošiūnienė 1, Anna Marcinkevič 2 Abstract. IT and business alignment has become of the strategic importance and the enterprise
THE ANALYTIC HIERARCHY PROCESS (AHP)
THE ANALYTIC HIERARCHY PROCESS (AHP) INTRODUCTION The Analytic Hierarchy Process (AHP) is due to Saaty (1980) and is often referred to, eponymously, as the Saaty method. It is popular and widely used,
Project Management Software Selection Using Analytic Hierarchy Process Method
Project Management Software Selection Using Analytic Hierarchy Process Method ISSN - 35-055 Sweety Sen (B.tech: Information Technology) Dronacharya College of Engineering Gurgaon, India Phone no. : 00343
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances
Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy
Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) August 2015, PP 58-62 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Comparative Analysis of
Supplier Performance Evaluation and Selection in the Herbal Industry
Supplier Performance Evaluation and Selection in the Herbal Industry Rashmi Kulshrestha Research Scholar Ranbaxy Research Laboratories Ltd. Gurgaon (Haryana), India E-mail : [email protected]
Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem
Using Analytic Hierarchy Process (AHP) Method to Raymond Ho-Leung TSOI Software Quality Institute Griffith University *Email:[email protected] Abstract In general, software project development is often
A Controlled Experiment on Analytical Hierarchy Process and Cumulative Voting -
Master Thesis Software Engineering Thesis no: MSE-2007-17 June 2007 A Controlled Experiment on Analytical Hierarchy Process and Cumulative Voting - Investigating Time, Scalability, Accuracy, Ease of use
ANALYTICAL HIERARCHY PROCESS AS A TOOL FOR SELECTING AND EVALUATING PROJECTS
ISSN 1726-4529 Int j simul model 8 (2009) 1, 16-26 Original scientific paper ANALYTICAL HIERARCHY PROCESS AS A TOOL FOR SELECTING AND EVALUATING PROJECTS Palcic, I. * & Lalic, B. ** * University of Maribor,
Architecture Centric Development in Software Product Lines
Architecture Centric Development in Software Product Lines Aurangzeb Khan DCE, College of E & ME National University of Science and Technology (NUST), Pakistan Farooque Azam DCE, College of E & ME National
Decision-making with the AHP: Why is the principal eigenvector necessary
European Journal of Operational Research 145 (2003) 85 91 Decision Aiding Decision-making with the AHP: Why is the principal eigenvector necessary Thomas L. Saaty * University of Pittsburgh, Pittsburgh,
Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process
Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process Chun Yong Chong, Sai Peck Lee, Teck Chaw Ling Faculty of Computer Science and Information Technology, University
Systems Features Analysis (SFA) and Analytic Hierarchy Process (AHP) in Systems Design and Development
Systems Features Analysis (SFA) and Analytic Hierarchy Process (AHP) in Systems Design and Development Felipe P. Vista IV 1, a and Kil To Chong 1, 2, b, * 1 Department of Electronic Engineering, Jeonbuk
COMPARISON OF SIX PRIORITIZATION TECHNIQUES FOR SOFTWARE REQUIREMENTS
Volume 4, No. 1, January 13 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info COMPARISON OF SIX PRIORITIZATION TECHNIQUES FOR SOFTWARE REQUIREMENTS Manju
A Risk Management System Framework for New Product Development (NPD)
2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong
Analytic Hierarchy Process
MODULE 1 Analytic Hierarchy Process LEARNING OBJECTIVES After completing this module, students will be able to: 1. Use the multifactor evaluation process in making decisions that involve a number of factors,
A Multi-Criteria Decision-making Model for an IaaS Provider Selection
A Multi-Criteria Decision-making Model for an IaaS Provider Selection Problem 1 Sangwon Lee, 2 Kwang-Kyu Seo 1, First Author Department of Industrial & Management Engineering, Hanyang University ERICA,
Information Security and Risk Management
Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742
USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS: SOME CHALLENGES
Published in: Inter l Journal of Industrial Engineering: Applications and Practice, Vol. 2, No. 1, pp. 35-44, 1995. 1 USING THE ANALYTIC HIERARCHY PROCESS FOR DECISION MAKING IN ENGINEERING APPLICATIONS:
Degree of Uncontrollable External Factors Impacting to NPD
Degree of Uncontrollable External Factors Impacting to NPD Seonmuk Park, 1 Jongseong Kim, 1 Se Won Lee, 2 Hoo-Gon Choi 1, * 1 Department of Industrial Engineering Sungkyunkwan University, Suwon 440-746,
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL
Kardi Teknomo ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL Revoledu.com Table of Contents Analytic Hierarchy Process (AHP) Tutorial... 1 Multi Criteria Decision Making... 1 Cross Tabulation... 2 Evaluation
USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO
USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORIZE PROJECTS IN A PORTFOLIO Ricardo Viana Vargas, MSc, IPMA-B, PMP Professor Fundação Getúlio Vargas (FGV) Brasil Professor Fundação Instituto
6 Analytic Hierarchy Process (AHP)
6 Analytic Hierarchy Process (AHP) 6.1 Introduction to Analytic Hierarchy Process The AHP (Analytic Hierarchy Process) was developed by Thomas L. Saaty (1980) and is the well-known and useful method to
How to do AHP analysis in Excel
How to do AHP analysis in Excel Khwanruthai BUNRUAMKAEW (D) Division of Spatial Information Science Graduate School of Life and Environmental Sciences University of Tsukuba ( March 1 st, 01) The Analytical
OBJECT ORIENTED SOFTWARE SYSTEM BASED ON AHP
OBJECT ORIENTED SOFTWARE SYSTEM BASED ON AHP Soumi Ghosh Department of Computer Science & Engineering Amity School of Engineering and Technology Amity University, Sec-125, NOIDA, (U.P.), INDIA [email protected]
Project Management Software Selection Using Analytic Hierarchy Process Method
International Journal of Applied Science and Technology Vol. 4, No. ; November 04 Project Management Software Selection Using Analytic Hierarchy Process Method Birgul Kutlu Professor Bogazici University
Reproducing Calculations for the Analytical Hierarchy Process
Reproducing Calculations for the Analytical Hierarchy Process Booz Allen Hamilton International Infrastructure Team Introduction Booz Allen supports clients in the application of the Analytical Hierarchy
Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):593-598 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on supply chain risk evaluation based on
Requirements Engineering: Elicitation Techniques
2008:PR003 Requirements Engineering: Elicitation Techniques Sai Ganesh. Gunda Source:http://www.marcocioffi.com/archives/2005/04/requirements-engineering/ MASTER S THESIS Software Engineering, 2008 Department
Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology
Requirements Engineering for SaaS Application Security in Cloud Using SQUARE Methodology E. Pragnavi J. Sandeep Kumar Assistant Professor, Product Technical Lead, Dept. of CSE, UCE, Infosys, Hyderabad
RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS
RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS Eduardo Piveta 1, Ana Morra 2, Maelo Penta 1 João Araújo 2, Pedro Guerrro 3, R. Tom Price 1 1 Instituto de Informática, Universidade
K.Niha, Dr. W.Aisha Banu, Ruby Anette
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 41 A Cloud Service Providers Ranking System Using Ontology K.Niha, Dr. W.Aisha Banu, Ruby Anette Abstract Cloud
Proposing an approach for evaluating e-learning by integrating critical success factor and fuzzy AHP
2011 International Conference on Innovation, Management and Service IPEDR vol.14(2011) (2011) IACSIT Press, Singapore Proposing an approach for evaluating e-learning by integrating critical success factor
Schedule Risk Analysis Simulator using Beta Distribution
Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) [email protected] Dr. P.K.
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Evaluating Simulation Software Alternatives through ANP
Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 Evaluating Simulation Software Alternatives through ANP
Describe the process of parallelization as it relates to problem solving.
Level 2 (recommended for grades 6 9) Computer Science and Community Middle school/junior high school students begin using computational thinking as a problem-solving tool. They begin to appreciate the
A Comparison of SOA Methodologies Analysis & Design Phases
202 A Comparison of SOA Methodologies Analysis & Design Phases Sandra SVANIDZAITĖ Institute of Mathematics and Informatics, Vilnius University Abstract. Service oriented computing is a new software engineering
Design of Customer-Oriented Cloud Products
Design of Customer-Oriented Cloud Products Gülfem Isiklar Alptekin, S. Emre Alptekin Abstract Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises
Talk:Analytic Hierarchy Process/Example Leader
Talk:Analytic Hierarchy Process/Example Leader 1 Talk:Analytic Hierarchy Process/Example Leader This is an example showing the use of the AHP in a practical decision situation. Click HERE to return to
Multi-Criteria Decision-Making Using the Analytic Hierarchy Process for Wicked Risk Problems
Multi-Criteria Decision-Making Using the Analytic Hierarchy Process for Wicked Risk Problems Introduction It has become more and more difficult to see the world around us in a uni-dimensional way and to
2014 ASE BigData/SocialInformatics/PASSAT/BioMedCom 2014 Conference, Harvard University, December 14-16, 2014
New Quality Function Deployment Integrated Methodology for Design of Big Data E-Government System in Egypt Ahmed Ahmed Attia PHd, Space Projects Quality Expert. Lecturer of MIS, Modern Academy, Cairo,
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Plan-Driven Methodologies
Plan-Driven Methodologies The traditional way to develop software Based on system engineering and quality disciplines (process improvement) Standards developed from DoD & industry to make process fit a
A Development of the Effectiveness Evaluation Model for Agile Software Development using the Balanced Scorecard
, March 13-15, 2013, Hong Kong A Development of the Effectiveness Evaluation Model for Agile Development using the Balanced Scorecard Sunisa Atiwithayaporn 1, Wanchai Rivepiboon 2 Abstract Most of standard
Description: Setting Strategic Change Priorities
Date: 28 October 2015 9:00-16:00 Activity: Post-Conference Seminar for World Quality Forum Location: Budapest, Hungary Program: One Day Seminar (lunch included) [four sessions of 1.5 hours each] Title:
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Design of Analytic Hierarchy Process Algorithm and Its Application for Vertical Handover in Cellular Communication
Design of Analytic Hierarchy Process Algorithm and Its Application for Vertical Handover in Cellular Communication Under the Guidance of Asso. Prof. Mr. Saurav Dhar Deptt. of Electronics and Communication
Software Design Document (SDD) Template
(SDD) Template Software design is a process by which the software requirements are translated into a representation of software components, interfaces, and data necessary for the implementation phase.
An experimental comparison of five prioritization methods - Investigating ease of use, accuracy and scalability
Master Thesis Software Engineering Thesis no: MSE-2005-11 August 2005 An experimental comparison of five prioritization methods - Investigating ease of use, accuracy and scalability Viggo Ahl School of
ISAHP 2007, Viña Del Mar, Chile, August 3, 2007
ISAHP 2007, Viña Del Mar, Chile, August 3, 2007 Key Performance Indicators Measurement Model Based on Analytic Hierarchy Process and Trend-Comparative Dimension in Higher Education Institution Kadarsah
A Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
Analytical Hierarchy Process (AHP)
SIX SIG NTGE,Inc for Software evelopment nalytical Hierarchy Process (HP) Simple Excel HP Tool Expert Choice T Tool Overview 2003 Six Sigma dvantage, Inc ll rights reserved FSS: easure 44 FSS: easure 44
The use of Trade-offs in the development of Web Applications
The use of Trade-offs in the development of Web Applications Sven Ziemer and Tor Stålhane Department of Computer and Information Science Norwegian University of Technology and Science {svenz, stalhane}@idi.ntnu.no
Facilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat [email protected] Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
Data Mining and Analytics in Realizeit
Data Mining and Analytics in Realizeit November 4, 2013 Dr. Colm P. Howlin Data mining is the process of discovering patterns in large data sets. It draws on a wide range of disciplines, including statistics,
Service Oriented Architecture and Its Advantages
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
Forward Thinking for Tomorrow s Projects Requirements for Business Analytics
Seilevel Whitepaper Forward Thinking for Tomorrow s Projects Requirements for Business Analytics By: Joy Beatty, VP of Research & Development & Karl Wiegers, Founder Process Impact We are seeing a change
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES
49 CHAPTER 3 IDENTIFICATION OF MOST PREFERRED KEY PERFORMANCE INDICATOR IN INDIAN CALL CENTRES 3.1 INTRODUCTION Key Performance Indicators (KPIs) is means for assessment of an organisations current position
Identifying, Ranking and Sensitivity Analysis for financing. Methods of deteriorated areas renovation projects
Identifying, Ranking and Sensitivity Analysis for financing Methods of deteriorated areas renovation projects VahidrezaYousefi a,*1, Aida Rahimi Golkhandan b, Sarmad Kiani c a.phd candidate of Construction
A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management
International Journal of Soft Computing and Engineering (IJSCE) A Study on Software Metrics and Phase based Defect Removal Pattern Technique for Project Management Jayanthi.R, M Lilly Florence Abstract:
Hybrid SWOT-AHP Analysis of ICT Enabled Control System in the Process Industry - A Case Study
Hybrid SWOT-AHP Analysis of ICT Enabled Control System in the Process Industry - A Case Study Jayalakshmi.B, Research scholar, Mechanical Department, Karpagam University, Coimbatore, Tamil Nadu,India (Associate
3 Guidance for Successful Evaluations
3 Guidance for Successful Evaluations In developing STEP, project leads identified several key challenges in conducting technology evaluations. The following subsections address the four challenges identified
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID. Jovita Nenortaitė
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.3 COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID Jovita Nenortaitė InformaticsDepartment,VilniusUniversityKaunasFacultyofHumanities
A Quality Based Method to Analyze Software Architectures
www.ijcsi.org A Quality Based Method to Analyze Software Architectures Farzaneh Hoseini Jabali, Sayed Mehran Sharafi and Kamran Zamanifar3 Computer Department, Islamic Azad University, Naafabad Branch,
Study of data structure and algorithm design teaching reform based on CDIO model
Study of data structure and algorithm design teaching reform based on CDIO model Li tongyan, Fu lin (Chengdu University of Information Technology, 610225, China) ABSTRACT CDIO is a new and innovative engineering
Evaluating the Critical success factors of strategic customer relationship management (SCRM) in textile industry (with Fuzzy Approach)
International Research Journal of Applied and Basic Sciences 2015 Available online at www.irjabs.com ISSN 2251-838X / Vol, 9 (9): 1560-1567 Science Explorer Publications Evaluating the Critical success
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Software Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
Data Mining Algorithms and Techniques Research in CRM Systems
Data Mining Algorithms and Techniques Research in CRM Systems ADELA TUDOR, ADELA BARA, IULIANA BOTHA The Bucharest Academy of Economic Studies Bucharest ROMANIA {Adela_Lungu}@yahoo.com {Bara.Adela, Iuliana.Botha}@ie.ase.ro
1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014
1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu
A Vague Improved Markov Model Approach for Web Page Prediction
A Vague Improved Markov Model Approach for Web Page Prediction ABSTRACT Priya Bajaj and Supriya Raheja Department of Computer Science & Engineering, ITM University Gurgaon, Haryana 122001, India Today
Teaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
SMICloud: A Framework for Comparing and Ranking Cloud Services
2011 Fourth IEEE International Conference on Utility and Cloud Computing SMICloud: A Framework for Comparing and Ranking Cloud Services Saurabh Kumar Garg, Steve Versteeg and Rajkumar Buyya Cloud Computing
Agile Software Development Methodologies and Its Quality Assurance
Agile Software Development Methodologies and Its Quality Assurance Aslin Jenila.P.S Assistant Professor, Hindustan University, Chennai Abstract: Agility, with regard to software development, can be expressed
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
Framework of Measuring Key Performance Indicators for Decision Support in Higher Education Institution
Journal of Applied Sciences Research, 3(12): 1689-1695, 2007 2007, INSInet Publication Framework of Measuring Key Performance Indicators for Decision Support in Higher Education Institution Kadarsah Suryadi
Quantifying energy security: An Analytic Hierarchy Process approach
ERG/200906 Quantifying energy security: An Analytic Hierarchy Process approach Larry Hughes, PhD Energy Research Group Department of Electrical and Computer Engineering Dalhousie University Halifax, Nova
Study of Lightning Damage Risk Assessment Method for Power Grid
Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid
Application of the Pareto Principle in Rapid Application Development Model
Application of the Pareto Principle in Rapid Application Development Model Vishal Pandey #1, AvinashBairwa #2, Sweta Bhattacharya #3 School of Information Technology & Engineering VIT University, Vellore
