A Change Impact Analysis Tool for Software Development Phase
|
|
|
- Kelley Haynes
- 9 years ago
- Views:
Transcription
1 , pp A Change Impact Analysis Tool for Software Development Phase Sufyan Basri, Nazri Kama, Roslina Ibrahim and Saiful Adli Ismail Advanced Informatics School, Universiti Teknologi Malaysia, Malaysia [email protected], {mdnazri, iroslina.kl, saifuladli}@utm.my Abstract Accepting too many software change requests could contribute to expense and delay in project delivery. On the other hand rejecting the changes may increase customer dissatisfaction. Software project management might use a reliable estimation on potential impacted artifacts to decide whether to accept or reject the changes. In software development phase, an assumption that all classes in the class artifact are completely developed is impractical compared to software maintenance phase. This is due to some classes in the class artifact are still under development or partially developed. This paper extends our previous works on developing an impact analysis approach for the software development phase in automating the approach which we call it CIAT (Change Impact Analysis Tool). The significant achievements of the tool are demonstrated through an extensive experimental validation using several case studies. The experimental analysis shows improvement in the accuracy over current impact analysis results. Keywords: Software development, change impact analysis, change effort estimation, impact analysis, effort estimation 1. Introduction It is important to manage the changes in the software to meet the evolving needs of the customer and hence, satisfy them [1]. Accepting too many changes causes delay in the completion and it incurs additional cost. Rejecting the changes may cause dissatisfaction to the customers. Thus, it is important for the software project manager to make effective decisions when managing the changes during software development. One type of information that helps to make the decision is the prediction of the number of classes affected by the changes. This prediction can be done by performing change impact analysis [2]. Impact analysis is a process of identifying potential consequences of change, or estimating what needs to be modified to accomplish a change. [3-5]. The motivation behind the impact analysis activity is to identify software artifacts (i.e., requirement, design, class and test artifacts) that are potentially to be affected by a change. Impact analysis has been widely used in software maintenance phase rather than software development phase [6-9]. This is because the current developed impact analysis solutions assume that all classes or class artifacts are completely developed. Most solutions use dynamic analysis techniques [10-13] for their impact analysis implementation. Based on our previous work [6-9], we have demonstrated that there is a significant difference change impact analysis implementation between software maintenance phase and software development phase. The existence of partially developed classes in the software development phase causes problem to the current implementation of dynamic analysis technique to be used in the software development phase. Basically, the dynamic analysis technique analyses the method execution paths that are generated from source code through reverse engineering [10-13]. This analysis tends to produce inaccurate results because some method execution paths that involve partially developed classes [7,8] are not visible due to they have yet to be implemented. The inaccuracy of the ISSN: IJSEIA Copyright c 2015 SERSC
2 generated paths from the dynamic analysis technique is indirectly led to inaccuracy of impact analysis results. This paper extends our previous works on change impact analysis approach for software development phase [6-9]. In brief, the previous approach integrates between the static analysis and dynamic analysis techniques to perform change impact analysis during the software development phase. In this paper, we have extended our work by developing a prototype tool to support the previous developed approach. This paper will give more explanation on the developed tool rather than the concept of change impact analysis approach itself. However, detail information on the change impact analysis approach can be referred to [6-9]. This paper is laid out as follow. Section 2 presents related work whereas Section 3 shows the prototype tool main screen. Section 4 and Section 5 explains our evaluation procedure and its results. Finally, Section 6 describes conclusion and future works. 2. Related Work There are two categories of impact analysis techniques which are static analysis technique and dynamic analysis technique. The static analysis technique develops a set of potential impacted classes by analyzing program static information that is generated from software artifacts (i.e., requirement, design, class and test artifacts). Conversely for the dynamic analysis technique, this technique develops a set of potential impacted classes by analyzing program dynamic information or executing code Static Analysis There are two most related current static analysis techniques to the new proposed approach which are the Use Case Maps (UCM) technique [14,15] and the class interactions prediction with impact prediction filters (CIP-IPF) technique [16,17]. The UCM technique [14] performs impact analysis on the functional requirements and the high level design model. This technique assumes that all the functional requirements and the high level design model are completely developed. This technique has two limitations which are; (1) there is no traceability technique used from the functional requirements and the high level design artifacts to the actual source codes. This technique only makes an assumption that the content of these two artifacts that is represented using the UCM model are reflected to the class artifacts. Any affected elements in the UCM model are indirectly reflected to the affected class artifacts, and (2) there is no dynamic analysis or source code analysis involved in this technique. Based on the precept that some of the effect of a change from a class to other class(es) may only be visible through dynamic or behavior analysis of the changed class [18,19], therefore results from this technique tend to miss some actual impacted classes. Next, the CIP-IPF technique [16, 17] uses a class interactions prediction as a model for detecting impacted classes. This technique has its strength compared to the UCM technique. Comparing to the UCM technique, this technique has traceability link detection between the requirement artifacts and the class artifacts feature. This feature is used to navigate impact of changes at the requirement level to the class artifacts Dynamic Analysis For the dynamic analysis techniques, we have selected two most related works to our research which are the Influence Mechanism technique [11, 13] and the Path Impact technique [12]. Basically, these techniques predict the impact set (classes or methods) based on method level analysis. The Influence Mechanism technique [11, 13] introduces the Influence Graph (IG) as a model to identify impacted classes. This technique uses the class artifacts as a source of analysis and assumes that the class artifacts are completely developed. There is a 246 Copyright c 2015 SERSC
3 limitation of this technique in which there is no formal mapping or traceability process from requirement artifacts or design artifacts to class artifacts. This process is important in impact analysis process as changes not only come from class artifacts but it also comes from design and/or requirement artifacts. Since design and requirement artifacts do interact among them vertically (between two different artifacts of a same type) and horizontally (between requirement and design artifacts), changes that occur to them could contribute to different affected class artifacts. In some circumstances, focusing on the source code analysis may not be able to detect those affected classes. The Path Impact technique [12] uses the Whole Path DAG (Directed Acyclic Graph) model as a model to identify impacted classes. The concept of implementation for this technique is almost similar to the Influence Mechanism technique as this technique uses the class artifacts as a source of analysis and assumes that the class artifacts are completely developed. Also, this technique performs a preliminary analysis prior to performing a detail analysis. There are two limitations of this technique; (1) the implementation is time consuming as the technique opens to a huge number of data when the analysis goes to a large application, (2) there is no formal mapping process from requirement artifacts or design artifacts to class artifacts. As described earlier, this process is important in impact analysis process as changes not only come from class artifacts but also from design and/or requirement artifacts. 3. The CIAT Change Impact Analysis Tool (will called CIAT henceforth) has two main modules, which are Class Interaction Prediction (CIP) Module and Impact Analysis Module as in Figure 1. Figure 1. System Overview The CIP module produces a CIP model which is a traceability model that depicts the interactions between all the software artifacts including requirements, design and classes. It will be used later to perform static change impact analysis and find the impacts of the change. The CIP model can be developed in any format, but for the purpose of this project we developed it using a consistent XML format. It consists of two sections, first section contains the project information and the second section contains the artifacts information. For the impact analysis module, the process begins with performing static impact analysis to find the direct and indirect affected classes. The static impact analysis will find the direct impacted classes which are the first layer of classes affected by a particular changes requirement without vertical traceability relations consideration. Then indirect impacted classes will be identified by complete traceability search through the CIP interactions to find all related classes to the changed requirement. The next process in the impact analysis module is performing vertical traceability to find the actual interactions between the fully developed classes, and improve CIP model by adding underestimated results and removing overestimated results from the CIP model. Then dynamic impact analysis is performed on the improved CIP model as in static impact analysis. Copyright c 2015 SERSC 247
4 Due to space limitation, this paper concentrates on impact analysis module only. Basically, the interaction between these two modules is done through an interface file named CIP. This file will be exported from Class Interactions Prediction Module and imported by Impact Analysis Module. In other words the output of the first CIP Module acts as an input for impact analysis module. Overall functionalities of this tool are; (1) To import the CIP file to the system database, (2) To acquire the change request information, and (3) To perform static and dynamic impact analysis. See Figure 2: 3.1. Implementation Steps Figure 2. Overall Functionalities of CIAT The following sub-sections explain briefly the implementation steps of this tool as shown in Figure 3: Import CIP Figure 3. Main Page Form The purpose of this procedure is to import the generated CIP model file. The CIP model file can be an XML (.xml) file or a CIP (.cip) file. Both should have been developed according to the CIP descriptions in XML format. See Figure 4 below: Figure 4. Import CIP Form 248 Copyright c 2015 SERSC
5 Acquire Change Request The purpose of this step is to get the required change request information. Acquiring change request will be performed in Change Request Form (see Figure 5). There are six inputs in Change Request Form; (1) Identification Number - which is filled automatically, (2) Change Requester, (3) Requested Change, (4) Change Priority, (5) Affected Requirements, and (6) Comments (Optional) Perform Impact Analysis Figure 5. Change Request Form This step identifies a set of potential impacted classes using the class interactions prediction according to change request specification. The outcome of this process is a set of initial impacted classes. There are two main sub-steps which are Class Dependency Filtration (CDF) level and the Method Dependency Filtration (MDF) level. a) Perform Class Dependency Filtration Level In this level, the class dependency filtration (CDF) process will be performed on the static impact analysis results as in Figure 6. The CDF level implements the static analysis on the initial set of potential impacted classes produced by the impact analysis process. This implementation is important by the fact that some interaction links in the initial set of potential impacted classes have no change impact value. The interaction link that has no change impact value means that if change occurs to one side of two interacting classes, the other class will not be affected. This is because the other class does not require the changed class for its implementation. Copyright c 2015 SERSC 249
6 Figure 6. Sample of CDF Filtration on Impact Analysis b) Perform Method Dependency Filtration (MDF) The MDF level performs another filtration on the filtered set of potential impacted classes produced by the CDF level. In brief, all method execution paths from the filtered set of potential impacted classes will be extracted and further analyzed to eliminate false impacted classes. In this work, we use the backward and forward analysis technique from [13]. This level can be considered as the dynamic analysis level as it uses the method execution paths analysis to identify impacted classes. To recap we want to make a note that there is one main disadvantage of the current dynamic impact analysis approaches from the software development phase perspective. The disadvantage is all approaches do not consider or include partially developed class analysis in its implementation. This occurs because of all classes in the software maintenance phase have been completely developed or fully developed. Thus, it is not important for these techniques to have the partially developed class analysis. From the dynamic impact analysis implementation in the software development phase, the inclusion of partially developed class analysis is an important feature. This is due to in the software development phase which some classes in the class artifacts are still under construction or partly developed exist. This inclusion is required to ensure the accuracy of the extracted or generated method execution paths from class artifacts. This accuracy indirectly contributes to the accuracy of the set of potential impacted classes results. Figure 7 shows the dynamic impact analysis output. 250 Copyright c 2015 SERSC
7 4. Evaluation Strategy Figure 7. Sample of Dynamic Impact Analysis The ultimate aim of the prototype development is to answer a question of Does the developed prototype tool gives an acceptable accuracy of impact analysis results than the selected current impact analysis techniques? To answer this question, we have compared the accuracy of the prototype results with the selected current impact analysis approaches. The selected approaches are; (1) the Class Interactions Prediction with Impact Prediction Filters (CIP-IPF) approach [16-17], and (2) the Path Impact approach [11]. There are five evaluation attributes used; (1) subject and case study, (2) software development process, (3) evaluation procedure, (4) evaluation metrics, and (5) hypothesis Subject and Case Study Three groups of final year master students of software engineering course in our school were selected. Each group composes five to six members that playing different roles in the software development activity. We have asked these groups to perform impact analysis at several specific phases based on the issued change requests. The groups used the selected three impact analysis approaches which are the CIP-IPF approach [16, 17], the Path-Impact approach [11] and our previous approach using the developed prototype tool. The subjects were given a preliminary guideline and briefing on these techniques prior to the experiment. The guideline includes thorough technique explanations and example of its implementation Software Development Process Several change requests were issued during the development phase of a software i.e., requirement phase, design phase, coding phase. In this experiment we have selected the Waterfall software development model [20]. To note, we aware of the latest software development model like Agile model. We will take this model in our future work Evaluation Procedure There are four steps in the procedure: Step 1- change request issuance: There are fifteen change requests have been issued to all groups that reflects to fifteen change requests to three software development project. In total, there were forty five change requests. Copyright c 2015 SERSC 251
8 Step 2- potential impacted class estimation: All groups were required to estimate potential impacted classes using the three selected impact analysis approaches. Step 3- actual impacted class identification: All groups were required to identify actual set of impacted classes through actual change implementation. Step 4- accuracy of the potential impacted class measurement: The comparison of results between step 2 and step 3 using a set of evaluation metrics were conducted Evaluation Metrics The following evaluation metrics [18] were used. Briefly, each prediction of impacted classes by three approaches was categorized according to four numbers: Not Predicting and Not Changing (NP-NC): number of pairs of classes correctly predicted to not be changing; Predicting and Not Changing (P-NC): number of pairs incorrectly predicted to be changing; Not Predicting and Changing (NP-C): number of classes incorrectly predicted to not be changing; and Predicting and Changing (P-C): number of classes correctly predicted to be changing Based on these numbers, we further used to calculate the following values [19, 21]; (1) Completeness value - the ratio of the actual class interactions or impacted classes that were predicted, (2) Correctness value - the ratio of the predicted class interactions that were actually interacting or impacted classes that were actually impacted, and (3) Kappa value [18] - this value reflects the accuracy or the prediction (0 is no better than random chance, is moderate agreement, is substantial agreement, and is almost perfect agreement [14,19]) Hypotheses A hypothesis that investigates the effectiveness of the CIAT is developed. The CIAT represents our developed tool whereby the selected current impact analysis approaches represent the independent technique (CIP-IPF- static analysis approach only; Path Impactdynamic analysis approach only). If the combination is not effective, H 0 is accepted: H 0 : CIAT does not give higher accuracy of impact analysis results than the selected current techniques results. H a : CIAT gives higher accuracy of impact analysis results than the selected current evaluation results. An Independent T-Test statistical analysis was used to validate the hypotheses. In the Stage 1, we compared Means results between the CIP-IPF approach and the CIAT whereas in the Stage 2, Means results of Path Impact technique and CIAT are compared. 5. Evaluation Results Table 1 below shows the summary of T-Test results. Table 1. T-test Results Stage Technique Means Results Analysis Stage 1 CIP-IPF CIAT Stage 2 Path Impact CIAT Copyright c 2015 SERSC
9 5.1. Stage 1 Analysis: The CIP-IPF Technique vs. CIAT The results show that CIAT means value is and the CIP-IPF approach value is This indirectly shows that CIAT value is higher than the CIP-IPF approach. Thus, the values reject the null hypothesis (H 0 : CIAT does not improve on the CIP-IPF approach results) and accept the alternate hypothesis (H a : CIAT approach gives higher accuracy of impact analysis results than the CIP-IPF approach) Stage 2 Analysis: The Path Impact Technique vs. CIAT The results show CIAT value is and the Path Impact approach value is This shows that the CIAT value is higher than the Path Impact approach. Thus, the values reject the null hypothesis (H 0 : CIAT does not give higher accuracy of impact analysis results than the Path Impact approach) and accept the alternate hypothesis (H a : CIAT gives higher accuracy of impact analysis results than the Path Impact approach). 6. Conclusion and Future Work The main contribution of this paper is an automated prototype tool that is developed based on our previous work on change impact analysis for software development phase. To recap, the uniqueness of the approach or the prototype tool is that the element of integration between static and dynamic analysis techniques. This integration intends to overcome the challenges on impact analysis implementation using static analysis and dynamic analysis techniques. For the future works, we plan to extend the tool implementation from agile methodology perspective instead of waterfall methodology. Besides that, we will extend the experiment by including a performance metric. This metric measures the amount of time that is used to identify a set of potential impacted classes according to a particular change request compared to manual approach. Acknowledgements We would like to thank Universiti Teknologi Malaysia (UTM) and Ministry of Higher Education (MoHE) Malaysia for their financial support under the Vote No 4L067. Also to final year post-graduate students of software engineering course at the Advanced Informatics School, Universiti Teknologi Malaysia who have been involved in the study. References [1] S. L. Pfleeger and S. A. Bohner, A framework for Software Maintenance Metrics, Proceedings of the International Conference on Software Maintenance, (1990), pp [2] K. H. Bennet and V. T. Rajlich, Software Maintenance and Evolution: A Roadmap, Proceedings of the International Conference on the Future of Sofware Engineering, (2000), pp [3] G. Kotonya and I. Somerville, Requirements Engineering: Processes and Techniques, John Wiley & Sons Ltd, (1998). [4] R. S. Arnold and S. A. Bohner, Impact analysis-towards a framework for comparison, Software Maintenance, (1993). CSM-93, Proceedings, Conference, (1993) September 27-30, pp [5] G. Antoniol, G. Canfora and G. Casazza, Information Retrieval Models for Recovering Traceability Links between Source Code and Documentation, Proceedings of the International Conference on Software Maintenance, (2000), pp [6] N. Kama, A Change Impact Analysis Approach for the Software Development Phase: Evaluating an Integration Approach, International Journal of Software Engineering and Its Application, vol. 7, no. 2, (2013) March. [7] N. Kama, Integrated change impact analysis approach for the software development phase, International Journal of Software Engineering and its Applications, vol. 7, no. 2, (2013) March, pp [8] N. Kama Change impact analysis for the software development phase: State-of-the-art, International Journal of Software Engineering and its Applications, vol. 7, no. 2, (2013) March, pp Copyright c 2015 SERSC 253
10 [9] N. Kama and S. Basri, Considering Partially Developed Artifacts in Change Impact Analysis Implementation, Journal of Software, vol. 9, no. 8, (2014), pp [10] B. Breech, M. Tegtmeyer and L. Pollock, Integrating Influence Mechanisms into Impact Analysis for Increased Precision, Proceedings of the 22nd International Conference on Software Maintenance, (2006), pp [11] J. Law and G. Rothermal, Whole Program Path-Based Dynamic Impact Analysis, Proceedings of the 25th International Conference on Software Engineering (ICSE 2003), (2003), pp [12] B. Breech, A. Danalis, S. Shindo and L. Pollock, Online Impact Analysis via Dynamic Compilation Technology, Proceeding of the 20th IEEE International Conference on Software Maintenance, Washington, US, (2004) September [13] J. Law and G. Rothermel, Incremental Dynamic Impact Analysis for Evolving Software Systems, Proceeding of the 14th International Symposium on Software Reliability Engineering, Washington, US, (2003) November [14] J. Hassine, J. Rilling, J. Hewitt and R. Dssouli, Change Impact Analysis for Requirement Evolution Using Use Case Maps, Proceeding of the 8th International Workshop on Principles of Software Evolution, Washington, US, (2005) September 5. [15] M. Shiri, J. Hassine and J. Rilling, A Requirement Level Modification Analysis Support Framework, Proceeding of the 3rd International IEEE Workshop on Software Evolvability, Montreal, Canada, (2007) October 1. [16] N. Kama, T. French and M. Reynolds, Design Patterns Consideration in Class Interactions Prediction Development, International Journal of Advanced Science and Technology, vol. 28, no. 6, (2011). [17] N. Kama and F. Azli, Requirement Level Impact Analysis with Impact Prediction Filter, Proceeding of the 4th International Conference on Software Technology and Engineering, Phuket Thailand, (2012) September 1-2. [18] M. Lindvall and K. Sandahl, How Well Do Experienced Software Developers Predict Software Changes, Journal of Systems and Software, vol. 43, no. 1, (1998). [19] J. Cohen, A Coefficient of Agreement for Nominal Scales, Journal of Educational and Psychological Measurement, vol. 20, no. 1, (1960). [20] I. Sommerville, Software Engineering (7th Edition), Pearson Education, (2008). [21] J. R. Landis and G. G. Koch. The Measurement of Observer Agreement for Categorical Data, Journal of Biometrics, vol. 33, no. 1, (1977). Authors Sufyan Basri, obtained his first degree at Universiti Teknologi Malaysia (UTM) in Electrical Engineering (Mechatronic) in 2001, second degree in Real Time Software Engineering at the same university in she is currently pursuing his PhD at UTM and his research interest includes Software Engineering, Change Management and Effort Estimation. Nazri Kama, obtained his first degree at Universiti Teknologi Malaysia (UTM) in Management Information System in 2000, second degree in Real Time Software Engineering at the same university in 2002 and his PhD at The University of Western Australia (UWA) in Software Engineering in He has a considerable experience in a wide range on Software Engineering area. His major involvement is in software development. 254 Copyright c 2015 SERSC
11 Roslina Ibrahim, is currently attached to Advanced Informatics School (AIS) at Universiti Teknologi Malaysia, Kuala Lumpur. She holds a PhD in information science from Universiti Kebangsaan Malaysia and master degree in computer science. Her research interests are user acceptance of information systems, design and developments of educational games and usability evaluation. She has 15 years experiences in teaching several IT related courses both for undergraduate and postgraduate students, including IT and multimedia, Web development, audio and video in multimedia, instructional multimedia design, IT Project Management, User Experience and Interaction Design and Research methodology. Currently, she is an Acting Academic Manager for Research Students with responsibilities of managing academic matters for Doctor of Philosophy and Master of Philosophy students at AIS. Saiful Adli Ismail, obtained his first degree at Universiti Teknologi Malaysia (UTM) in Industrial Computing in 1997, second degree in Real Time Software Engineering at the same university in 2000 and currently continues his PhD at Universiti Teknologi Malaysia. Copyright c 2015 SERSC 255
12 256 Copyright c 2015 SERSC
Change Impact Analysis for the Software Development Phase: State-of-the-art
Change Impact Analysis for the Software Development Phase: State-of-the-art Nazri Kama Advanced Informatics School, Universiti Teknologi Malaysia, Malaysia [email protected] Abstract Impact analysis
Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase
Extending Change Impact Analysis Approach for Change Effort Estimation in the Software Development Phase NAZRI KAMA, MEHRAN HALIMI Advanced Informatics School Universiti Teknologi Malaysia 54100, Jalan
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe
A Review of an MVC Framework based Software Development
, pp. 213-220 http://dx.doi.org/10.14257/ijseia.2014.8.10.19 A Review of an MVC Framework based Software Development Ronnie D. Caytiles and Sunguk Lee * Department of Multimedia Engineering, Hannam University
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Soft Skills Implementation in Construction Management Program: A Comparative Study of Lecturers and Students Perspective
Soft Skills Implementation in Construction Management Program: A Comparative Study of and Students Perspective H.Mohd Affandi, F. Hassan, Z. Ismail and M.F. Mustaffa Kamal Faculty of Architecture, Planning
The KPI Development Framework for ICTSQ Measurement
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The KPI Development Framework for ICTSQ Measurement Rozi Nor Haizan, Nor 1+,
A Survey of Software Development Process Models in Software Engineering
, pp. 55-70 http://dx.doi.org/10.14257/ijseia.2015.9.11.05 A Survey of Software Development Process Models in Software Engineering Iqbal H. Sarker 1, Faisal Faruque 1, Ujjal Hossen 2 and Atikur Rahman
A Case Study Research on Software Cost Estimation Using Experts Estimates, Wideband Delphi, and Planning Poker Technique
, pp. 173-182 http://dx.doi.org/10.14257/ijseia.2014.8.11.16 A Case Study Research on Software Cost Estimation Using Experts Estimates, Wideband Delphi, and Planning Poker Technique Taghi Javdani Gandomani
Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results
, pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
A Traceability Approach to Support Object-oriented Software
A Traceability Approach to Support Object-oriented Software Othman Mohd Yusop Centre for Advanced Software Engineering Universiti Teknologi Malaysia 54100 Jln Semarak, K. Lumpur [email protected] Dr.
Different Approaches using Change Impact Analysis of UML Based Design for Software Development
Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development
Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development ARBI GHAZARIAN University of Toronto Department of Computer Science 10 King s College Road, Toronto,
Outline. Definitions. Course schedule
SENG480A/CSC576A Topics in Software Engineering Software Development, Architecture & Evolution Lectures, Sep 17, 20, 2001 Hausi A. Müller University of Victoria Outline Assignment 1 due Sep 27 Last week
Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution
Evaluating Software Maintenance Testing Approaches to Support Test Case Evolution Othman Mohd Yusop and Suhaimi Ibrahim Advanced Informatics School Universiti Teknologi Malaysia, International Campus 54100
1. Systematic literature review
1. Systematic literature review Details about population, intervention, outcomes, databases searched, search strings, inclusion exclusion criteria are presented here. The aim of systematic literature review
Software Development and Testing: A System Dynamics Simulation and Modeling Approach
Software Development and Testing: A System Dynamics Simulation and Modeling Approach KUMAR SAURABH IBM India Pvt. Ltd. SA-2, Bannerghatta Road, Bangalore. Pin- 560078 INDIA. Email: [email protected],
Study of Impact Analysis of Software Requirement Change in SAP ERP
Study of Impact Analysis of Software Requirement Change in SAP ERP S. M. Ghosh 1, H. R. Sharma 1, V. Mohabay 2 1 Chhatrapati Shivaji Institute of Technology, Durg (CG) INDIA 2 Department of Electronics
Calculating, Interpreting, and Reporting Estimates of Effect Size (Magnitude of an Effect or the Strength of a Relationship)
1 Calculating, Interpreting, and Reporting Estimates of Effect Size (Magnitude of an Effect or the Strength of a Relationship) I. Authors should report effect sizes in the manuscript and tables when reporting
Traceability Method for Software Engineering Documentation
www.ijcsi.org 216 Traceability Method for Software Engineering Documentation Nur Adila Azram 1 and Rodziah Atan 2 1 Department of Information System, Universiti Putra Malaysia, Company Serdang, Selangor,
TABLE OF CONTENTS. About Chi Squares... 1. What is a CHI SQUARE?... 1. Chi Squares... 1. Hypothesis Testing with Chi Squares... 2
About Chi Squares TABLE OF CONTENTS About Chi Squares... 1 What is a CHI SQUARE?... 1 Chi Squares... 1 Goodness of fit test (One-way χ 2 )... 1 Test of Independence (Two-way χ 2 )... 2 Hypothesis Testing
An Empirical Study on the Performance of Software Company with Software Type
, pp.56-60 http://dx.doi.org/10.1257/astl.201.8.11 An Empirical Study on the Performance of Software Company with Software Type Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi, Jae-Sung Choi #3-707, DGIST,
TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW
Year 2014, Vol. 1, issue 1, pp. 49-56 Available online at: http://journal.iecuniversity.com TRADITIONAL VS MODERN SOFTWARE ENGINEERING MODELS: A REVIEW Singh RANDEEP a*, Rathee AMIT b a* Department of
Digital Forensics (2012)
CyberCSI 2 nd Half Year 2012, Summary Report Prepared By: Rafizah Abd Manaf and Nur Aishah Mohamad Reviewed By: Nazri Mohamed Author email address: [email protected], [email protected] and
COMPARISONS OF CUSTOMER LOYALTY: PUBLIC & PRIVATE INSURANCE COMPANIES.
277 CHAPTER VI COMPARISONS OF CUSTOMER LOYALTY: PUBLIC & PRIVATE INSURANCE COMPANIES. This chapter contains a full discussion of customer loyalty comparisons between private and public insurance companies
User Resistance Factors in Post ERP Implementation
User Resistance Factors in Post ERP Implementation Sayeed Haider Salih 1 e-mail: [email protected] Ab Razak Che Hussin 2 e-mail: [email protected] Halina Mohamed Dahlan 3 e-mail: [email protected] Author(s)
VISUALIZATION APPROACH FOR SOFTWARE PROJECTS
Canadian Journal of Pure and Applied Sciences Vol. 9, No. 2, pp. 3431-3439, June 2015 Online ISSN: 1920-3853; Print ISSN: 1715-9997 Available online at www.cjpas.net VISUALIZATION APPROACH FOR SOFTWARE
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
Usability Evaluation of Universities Websites
1 Jabar M. A., 2Usman Abbas Usman, 3Sidi F. Department of Information System, marzanah@ upm.edu.my 2 Department of Information System, [email protected] 3 Department of Computer Science, fatimah@
Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics
Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Kumi Jinzenji NTT Software Innovation Canter NTT Corporation Tokyo, Japan [email protected] Takashi
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements Byron J. Williams Jeffrey Carver Ray Vaughn Department of Computer Science and Engineering Mississippi State University
Prediction of Business Process Model Quality based on Structural Metrics
Prediction of Business Process Model Quality based on Structural Metrics Laura Sánchez-González 1, Félix García 1, Jan Mendling 2, Francisco Ruiz 1, Mario Piattini 1 1 Alarcos Research Group, TSI Department,
Consider a study in which. How many subjects? The importance of sample size calculations. An insignificant effect: two possibilities.
Consider a study in which How many subjects? The importance of sample size calculations Office of Research Protections Brown Bag Series KB Boomer, Ph.D. Director, [email protected] A researcher conducts
Karunya University Dept. of Information Technology
PART A Questions 1. Mention any two software process models. 2. Define risk management. 3. What is a module? 4. What do you mean by requirement process? 5. Define integration testing. 6. State the main
Software Testing Strategies and Techniques
Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,
A Visualization Method to Support Impacts Analysis in Program Understanding
A Visualization Method to Support Impacts Analysis in Program Understanding Rita Noremi Bt Mohamad Centre for Advanced Software Engineering (CASE) Universiti Teknologi Malaysia Kuala Lumpur, Malaysia [email protected]
Project Management Practices: The Criteria for Success or Failure
234 Iman Attarzadeh Siew Hock Ow Department of Software Engineering Faculty of Computer Science & Information Technology University of Malaya, 50603 Kuala Lumpur, MALAYSIA Email: [email protected],
Requirements-Based Testing: Encourage Collaboration Through Traceability
White Paper Requirements-Based Testing: Encourage Collaboration Through Traceability Executive Summary It is a well-documented fact that incomplete, poorly written or poorly communicated requirements are
Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction
Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, [email protected] Keywords: Regression
Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems
Combining Static and Dynamic Impact Analysis for Large-scale Enterprise Systems The 15th International Conference on Product-Focused Software Process Improvement, Helsinki, Finland. Wen Chen, Alan Wassyng,
SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA
I.J.E.M.S., VOL.3(2) 2012: 99-104 ISSN 2229-6425 SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA *Jimoh, R. G. & Abikoye, O. C. Computer Science Department,
Critical Success Factors of Information Technology Projects
Critical Success Factors of Information Technology Projects Md. Athar Imtiaz, Abduljalil S. Al-Mudhary, Md. Taha Mirhashemi, Roslina Ibrahim Abstract Information Technology (IT) is being used by almost
A Comparison of General Approaches to Multiprocessor Scheduling
A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA [email protected] Michael A. Palis Department of Computer Science Rutgers University
Open Source Software: How Can Design Metrics Facilitate Architecture Recovery?
Open Source Software: How Can Design Metrics Facilitate Architecture Recovery? Eleni Constantinou 1, George Kakarontzas 2, and Ioannis Stamelos 1 1 Computer Science Department Aristotle University of Thessaloniki
User Acceptance of a Key Performance Indicators Monitoring System (KPI-MS) in Higher Education: An Application of the Technology Acceptance Model
2011 2nd International Conference on Education and Management Technology IPEDR vol.13 (2011) (2011) IACSIT Press, Singapore User Acceptance of a Key Performance Indicators Monitoring System (KPI-MS) in
Journal of Information Technology Impact
Journal of Information Technology Impact Vol. 5, No. 3, pp. 129-138, 2005 Using a Priori Algorithm for Supporting an e-commerce System Mohammad Nazir Ahmad Sharif 1 Ng Moon Ching 2 Aryati Bakri 3 Nor Hidayati
How to Estimate Software Size and Effort in Iterative Development 1 Aleš Živkovič, Marjan Heričko
How to Software Size and Effort in Iterative Development 1 Aleš Živkovič, Marjan Heričko University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, SI-2000 Maribor, Slovenia
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT
NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT 1 MOHD NAZRI ISMAIL, 2 ABDULLAH MOHD ZIN 1 Faculty of MIIT, University of Kuala Lumpur (UniKL), Malaysia 2 Faculty of FTSM, University
Research Methods & Experimental Design
Research Methods & Experimental Design 16.422 Human Supervisory Control April 2004 Research Methods Qualitative vs. quantitative Understanding the relationship between objectives (research question) and
Building Ontology Networks: How to Obtain a Particular Ontology Network Life Cycle?
See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/47901002 Building Ontology Networks: How to Obtain a Particular Ontology Network Life Cycle?
AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY
AN ALTERNATIVE MODEL OF ERP MAINTENANCE STRATEGY Muhammad Rofi IMTIHAN 1, Mohd. Salihin NGADIMAN, Habibollah HARON Department of Modelling and Industrial Computing Faculty of Computer Science and Information
Using News Articles to Predict Stock Price Movements
Using News Articles to Predict Stock Price Movements Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 9237 [email protected] 21, June 15,
Survey Research: Choice of Instrument, Sample. Lynda Burton, ScD Johns Hopkins University
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this
POSITIVE TRENDS IN REQUIREMENT ENGINEERING PRACTICES FOR HIGHER SOFTWARE QUALITY
POSITIVE TRENDS IN REQUIREMENT ENGINEERING PRACTICES FOR HIGHER Dr. Rajinder Singh* SOFTWARE QUALITY Abstract : In this competitive world, customer satisfaction is the utmost important thing for any organization
A Case Retrieval Method for Knowledge-Based Software Process Tailoring Using Structural Similarity
A Case Retrieval Method for Knowledge-Based Software Process Tailoring Using Structural Similarity Dongwon Kang 1, In-Gwon Song 1, Seunghun Park 1, Doo-Hwan Bae 1, Hoon-Kyu Kim 2, and Nobok Lee 2 1 Department
Software Engineering
1 Software Engineering Lecture 2: Software Life Cycles Stefan Hallerstede Århus School of Engineering 25 August 2011 2 Contents Naive Software Development Code & Fix Towards A Software Process Software
Automated Test Approach for Web Based Software
Automated Test Approach for Web Based Software Indrajit Pan 1, Subhamita Mukherjee 2 1 Dept. of Information Technology, RCCIIT, Kolkata 700 015, W.B., India 2 Dept. of Information Technology, Techno India,
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Modeling Software Maintainability and Quality Assurance in the Agile Environment
, pp.83-90 http://dx.doi.org/10.14257/ijdta.2014.7.3.09 Modeling Software Maintainability and Quality Assurance in the Agile Environment Priyanka Upadhyay, Abhishek Singh and Naveen Garg Department of
3D SCANNING: A NEW APPROACH TOWARDS MODEL DEVELOPMENT IN ADVANCED MANUFACTURING SYSTEM
3D SCANNING: A NEW APPROACH TOWARDS MODEL DEVELOPMENT IN ADVANCED MANUFACTURING SYSTEM Dr. Trikal Shivshankar 1, Patil Chinmay 2, Patokar Pradeep 3 Professor, Mechanical Engineering Department, SSGM Engineering
Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.
Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada
A Requirement Level Modification Analysis Support Framework
A Requirement Level Modification Analysis Support Framework Maryam Shiri, Jameleddine Hassine, Juergen Rilling Concordia University, Montreal, Canada {ma_shiri,j_hassin, rilling}@cse.concordia.ca Abstract
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
Point Biserial Correlation Tests
Chapter 807 Point Biserial Correlation Tests Introduction The point biserial correlation coefficient (ρ in this chapter) is the product-moment correlation calculated between a continuous random variable
Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
A Vague Improved Markov Model Approach for Web Page Prediction
A Vague Improved Markov Model Approach for Web Page Prediction ABSTRACT Priya Bajaj and Supriya Raheja Department of Computer Science & Engineering, ITM University Gurgaon, Haryana 122001, India Today
Process Methodology. Wegmans Deli Kiosk. for. Version 1.0. Prepared by DELI-cious Developers. Rochester Institute of Technology
Process Methodology for Wegmans Deli Kiosk Version 1.0 Prepared by DELI-cious Developers Rochester Institute of Technology September 15, 2013 1 Table of Contents 1. Process... 3 1.1 Choice... 3 1.2 Description...
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review
A Comparison of Software Cost, Duration, and Quality for Waterfall vs. Iterative and Incremental Development: A Systematic Review Susan M. Mitchell and Carolyn B. Seaman Information Systems Department,
Challenges and Limitations in BOM Automation
UNIVERSITY OF TEXAS AT DALLAS SYSTEM ENGINEERING AND MANAGEMENT SYSM6309 ADVANCED REQUIREMENTS ENGINEERING BILL OF MATERIALS GENERATION AUTOMATION FINAL TERM PAPER By: Adi Nugroho 8/3/2013 Submitted to:
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Descriptive Statistics
Descriptive Statistics Primer Descriptive statistics Central tendency Variation Relative position Relationships Calculating descriptive statistics Descriptive Statistics Purpose to describe or summarize
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
SystemDesign Methodologies
SystemDesign Methodologies CM 3380-3 Maintenance is not part of the design process by Claudia Buder, bq923372 Anne Holzapfel, hq923380 Abstract In context of the level three module of System design Methodology
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
A Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
Pearson's Correlation Tests
Chapter 800 Pearson's Correlation Tests Introduction The correlation coefficient, ρ (rho), is a popular statistic for describing the strength of the relationship between two variables. The correlation
