Most Effective Communication Management Techniques for Geographically Distributed Project Team Members
|
|
|
- Erica Chase
- 10 years ago
- Views:
Transcription
1 Most Effective Communication Management Techniques for Geographically Distributed Project Team Members Jawairia Rasheed, Farooque Azam and M. Aqeel Iqbal Department of Computer Engineering College of Electrical and Mechanical Engineering National University of Sciences and Technology (NUST), Pakistan Corresponding Author Abstract The effective project management for high quality software projects is only possible by effective communication and coordination among project team members and is a complex task when team members are geographically distributed. This research paper describes the techniques of the communication management of the data mining based and knowledge based tools and advance analytic techniques for extracting data and knowledge of social structures using , chat and mobile and predicting the communication relationship analysis on the basis of this knowledge. Keywords: Software Project Management, Social Structure Networking, Software Communication Management, Communication Network Analysis. 1. Introduction At the end of the 20th century, as IT industry established, knowledge economy entered in the new era. At this time, IT industry began to develop rapidly. More and more people are fascinated by its features combined with both risks and benefits. And people gradually participated in the software development industry. However, after several years of development, many problems in the software industry are gradually revealed. The main problem is ultimate failure chance in software development projects which is increasingly very high. According to statistical ratio, only 10% -20% of software development projects can be completed and delivered on time, and 25% of large software development projects with high demand cannot be completed on time. Survey carried out on failure reasons showed that 70% of projects fail because of improper effective project management [1]. Organization network analysis for a mission critical project done at Fortune 200 company in IT solution industry showed that time and scope slippage was due to the problems in communication and integration management of four project teams residing in different locations of U.S. and Russia[10]. Projects involving diverse tasks and skills do not meet their specialized functionality within the given scope, time, cost and resources. For the successful completion of projects, the subject of project management has evolved to meet the project to its functionality within the given scope, time and resources. Project management relies heavily on the team work and knowledge so it is important to know for a project manager about the coordination, Vol. 2 No. 4 (October 2011) IJoAT 530
2 communication and resources [2] [3] [4] [5]. Communication network analysis acts as a powerful tool for analyzing the team working in an organization from different management perspectives. Communication network analysis (CNA) is ability of visualizing communicating network nodes and to predict these visualizations in real time. Nodes represent individuals or teams while linkages represent communication relationship as shown in figure-1. In project management context communication network analysis acts as predictive gap analysis tool for communication networks in organizations [6]. Analyzing communication networks we can improve the projects resources and teamwork and also project risks can be mitigated which is very helpful for project management [7] [8]. In this research paper we describe social structures that are helpful in building associations and relations among people communicating through , chat and mobile to maintain type wise log and to provide timely information to critical infrastructure and predicting the relationships. Fig 1: Communication Network Analysis 2. Scope of Research In software project management the communication management is most challenging when coordination and communication has to be made among the team members of distributed teams located in different geographical areas [9]. Vol. 2 No. 4 (October 2011) IJoAT 531
3 In this research paper we find the social structures that are helpful in building the associations among people communicating through chat and mobile. We maintain type wise log and provide timely information to critical infrastructure and describe the communication relationship. 3. Proposed Approach We select , chat and mobile features for analysis of social structures. The parameters are sender and receiver addresses with which they are connected to the internet and for mobile are the mobile number and also time when they connected. Then this information is used to populate the database. We use the database information to find and build the hidden structures, and building correlation between internet users, geographical location, telephone numbers, and s. Relationships and associations are developed from these network structures and network metrics are calculated by analyzing the connections that help in the detection and analysis of social structures. By viewing the graph it can be easily found that on which nodes communication links are established. Figure-2 shows our approach about the system model. Fig 2a: System Overview Vol. 2 No. 4 (October 2011) IJoAT 532
4 Creating the Database Fig 2b: System Overview First the database is created and the information about the ids, duration, and call logs mobile numbers and log details is created. Retrieving the data base The information from the database is retrieved where is type id 1 is for 2 for chat and 3 for mobile. Matrices and Applying Thresholds We form the matrices and apply threshold on them which shows the association among the people on the basis of the sending and receiving information via , chat and mobile phone information. For facilitating ourselves we apply a threshold value of 5, which means if the person has exchanged at least 5 s with its neighbor, it is included in the exchange network of the sender. Vol. 2 No. 4 (October 2011) IJoAT 533
5 Extracting Information and Applying Data mining Techniques The information is extracted and data mining techniques are applied extracted from the messages and mobile numbers. Graph Representation of Communicating Relationships We show graph results in the form of communication graphs. Nodes and ties depict the communication relation among people. We then make inferences and analysis for the communication management of software projects. 4. Evaluations and Results In figure-2 there is the log matrix which shows the addresses and sending and the receiving when the is either sent or received. The above figure matrix depicts that person having id AAA has sent seven s so its sending log is 7 and has received 5 s so its receiving log is 5. Fig 3: Log Matrix The next matrix Log Details in figure-4 represents the details of this sending and receiving of this matrix. Vol. 2 No. 4 (October 2011) IJoAT 534
6 Fig 4: Log Details Matrix This log details matrix shows that if AAA has received seven mails then who has sent these mails.this matrix shows that, two mails are sent to the AAA by itself and two are sent to it by BBB one is sent to it by CCC and one by DDD. A threshold value is applied which ignores the value if the sending or receiving value is below or equal to this value. Similarly mobile log matrix shows the sending and receiving calls and mobile log details matrix shows the details of sending and receiving calling details in figure-5 and also chat log matrix shows the sending and receiving chat sessions and chat log details matrixes shows the details of chat in figure-6 as in figure-3 and figure-4 matrixes. Fig 5: Mobile Log Details Matrix Vol. 2 No. 4 (October 2011) IJoAT 535
7 Fig 6: Chat Log Details Matrix The net communication matrix in figure-6 shows the parent or child relationship and the cofactors. The net communication matrix is the combined matrix of the three matrixes and it shows the cluster analysis. The communication relationship graph is as shown in the figure-8. Fig 7: Net Communication Matrix Vol. 2 No. 4 (October 2011) IJoAT 536
8 5. Application Areas Fig 8: Cluster Analysis Communication analysis tool helps the project manager in communication management. As in Log Matrix in figure 3 there is sending and receiving log and project manager by seeing this matrix can easily check who has sent how many mails and who have received how much no of mails. For example in figure-2 matrix the employee having id AAA has sent 7 mails and received 5 mails. So his sending log is 7 and receiving log is 5. Similarly mobile log matrix shows the sending and receiving logs against the mobile numbers and chat log matrix shows the sending and receiving log session of chat. These can be accessed by clicking the boxes of mobile log and chat log as shown in the figure-3. By seeing the log details matrix in figure-4 there is detail information about the sending and receiving log i.e.; among these sending s who has sent these s, AAA id has sent two s to itself and two s are sent by id BBB and one is sent by id CCC and id DDD has sent 0 . AAA id has received 2 s by itself and 2 s by id GGG and one by id JJJ. As its receiving log were 5. So by using the communication analysis tool the project manager can analyze that which employees are in communication. Similarly by seeing the log detail matrix for mobile and chat in figure-5and figure-6, project manager can also analyze the communication relationships by mobile and chat. A threshold value is applied on these matrixes. A threshold value 2 means that only those ids will be selected that will have sending and receiving logs at least 2 and for logs below 2 will not be selected for analysis. Here in figure 2 we have selected threshold value 2. Vol. 2 No. 4 (October 2011) IJoAT 537
9 The net communication matrix in figure 6 shows the relationship of parent node with the child node and the cofactor against these nodes. When the project manager wants to see the communication details of one specific employee, he will select the id of that employee and that id will act as the parent node and the other employees, who have communication against this parent node, will act as child nodes and cofactor in figure-7 shows the no of times they communicated. Figure-8 shows the cluster analysis. By just seeing the graph, analysis can be made about the communication relationship. Graph against any node can be drawn and by seeing the graph communication analysis of the selected node can be made. So when the management wants to see the communication analysis they will just select the id of that employee, as shown in figure 8, and will get the communication graph of this employee with other employees. So this communication analysis can help a lot in project management especially when team members are distributed against different geographical locations. The project manager can send warning to the employees which have threshold value less than assigned and where activity one assigned to one employee depends on the completion of the second activity assigned to other employee and they need sharing of information for completion of their activities. Similarly an automate job skill matching for the employees for assigning task or for hiring or recruiting can also be done by analyzing network analysis. In this case we will keep the employee names against skills instead of ids against ids for chat or mobile. By doing this when management wants to assign tasks to employees they can find the employee which is best skillful for that specific task. It can also be helpful for recruiting and hiring the employees by having best match for the tasks of the jobs. The communication network analysis is also helpful for finding social issues i.e. friendship or other relationship patterns. 6. Existing Systems Recently, researchers have used social networks for studying collaboration in software teams and have extracted data from different inventories such as software and archives. Techniques of collaborative filtering and social networks have been developed for problem solving and viewing correlations among developers and their data [11]. Investigation analysis has been done for avoiding from failures and keeping the developer s work more focused and fragmentation free. Investigation has been made between the developer s fragmentation relation and failures after releasing the software. Developer module network which is called contribution network is used to measure network centrality and fragmentation degree of developer s contribution. Investigation and analysis shows central network more error prone [12]. Similarly a case study has been conducted on mature Nortel networking product over three million lines of code in which developer s collaboration network was obtained by the churning effect of code which can reveal failures at file level. Failure prediction models were developed using test and post release failure data which showed an important correlation existence between file based developer metrics and failures [13]. In another research, data has been extracted from software repositories to generate social networks for using task specific interaction among developers for making collaborations and integration. In their approach they found delays when used for IBM s JAZZ team repository for communication and collaboration due to project wide social network and information distribution among seven geographic sites. The work done is, however Vol. 2 No. 4 (October 2011) IJoAT 538
10 independent from any specific repository and can be used for collaboration and communication information distribution. The work done in our case is different because we used social network for communication management which acts as analysis tool and make it possible for the executives to deal with the flaws and handling irregularities and is not limited to code development integration [14]. Social networks generated in these research papers are designed for different research purposes and comparing them is a difficult task. In another research done on the management of complex projects a case study has been done on the Expo 2010 in Shanghai China in which emphasis is made on the management of complex projects management. The study suggests that as the project size increases, its structure becomes more complicated and environment and circumstances become unpredictable. In these situations old and traditional management methods and tools cannot overcome the increased complexity and remains inadaptable. The study depicts that uncertain conditions, sociality, interdependendent events and project dynamics are the root causes of project management complexity. In this study a view of differences between traditional and social management approaches has been discussed and also an integrated social network model is suggested for dealing with complex projects and analysis has been done for Shanghai construction. The study builds the model for the analysis of subgroups, Centrality, Betweenness Centrality and responsibilities of large complex organizations [15]. However in our model metrics are used and analysis has been done on communication management and communication network model is used for analysis to ease the burden of project manager and purely handles the communication management for the teams working offshore and linked through , mobile and chat and data is extracted from the , mobile repositories and chat sessions. We also use a threshold value 0 for none and 1 for having communication. However this value can be changed and adjusted according to the minimum or maximum desired level, thus making it adaptable to the project s required communication level. 7. Potential Research Areas Communication analysis tool is helpful in communication management and is perfect for communication analysis. But there is still a lot of work which can be done for improving communication management. An auto message can be created as warning to the employees which have no communication or communication below a certain threshold or auto appreciation mail to the employees who have communication above specific threshold. Consider the situation when there are thousands of employees, and it would become very difficult for the project manager sending them s individually. An auto message will help in better communication management and will also lessen the burden of project manager in this situation. Allocating timer that is the time remaining for the second activity to begin in the message box of the employee with the message showing that u should complete your work before second activity starts because beginning of second activity depends on the output of your activity. And timer shows the time remaining for the activity completion. Adding the functionality of message Vol. 2 No. 4 (October 2011) IJoAT 539
11 received and viewed can be added for resolving the future issues, such as lame excuses in some situations for not receiving or viewing the s, so making the management more effective to deal such issues. We can further make subgroups of networks on inter city communication basis forming micro network and inter country network and call it macro network and then can analyze micro network and macro network communication patterns. We can research on group external and group internal ties and applying statistical formulas such as sampling and standard deviations among the external and internal ties, randomly distributed ties can be calculated. More over a lot of work can be done depending upon the requirements of the projects. The graph can be further analyzed by studying connectedness, hierarchies, efficiencies and least upper bound (LUB) on the nodes. The most sensitive nodes or the nodes which are of most interest can be treated by applying most appropriate algorithms which best satisfy the objectives which we want to achieve. For example; to be a pure out-trees each node must be in-order of one. This means, each actor has a single boss. This is called efficiency" because structures with many different bosses have un-necessary redundant communication of orders from superiors to subordinates. The amount of deviation from this aspect of the pure out-tree can be calculated by computing the difference between the real number of links (minus 1, since the ultimate boss has no boss) and the maximum possible number of links. If the difference is greater, then there is higher inefficiency. This dimension then measures the limit to which nodes have a "single boss." Time sampling can be used which with combination of user ids as well as location can help to track who is doing what where and when. Thus having a system which has complete information and tracking. If we have this then this world is not so far from us and every one is at the next neighbor of the other individual (a little idea of this we can take from face book). By applying transitivity and homophile we can further broaden our research horizons. 8. Conclusion The current era has seen the communication management of the projects even though the bodies are geographically distributed by just extracting the data of s, chat and mobiles and applying data mining techniques and showing the graphs on the basis of their communication relationship. We form matrixes of s chat and mobile which give information about communication exchange and apply threshold values on these matrixes. A matrix shows network in the form of an array of units arranged in rows and columns. The results show the communication taking place and also the details of communication. The project manager can track interesting information by viewing the communication details. We also generate communication network analysis which is the chart of nodes and ties that depicts the natural communication relationship among the people. In our case it will show the communication relationship graph. A picture is worth than thousands of words. Thus by just viewing the nodes on graph project manager can see which employees have a communication and which are not communicating. So in this way this acts as communication analysis tool and helps the project manager in managing the effective communication among employees even if they are geographically distributed. Vol. 2 No. 4 (October 2011) IJoAT 540
12 References [1]. Wang Qian, Song Zhen-hua, Research on optimization of software development project process based on theory of project management, published in 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) Vol , August [2]. Katzy. B, Evaristo.R, Zigurs.I, Knowledge management in virtual projects: a research agenda, published in System Sciences, Proceedings of the 33rd Annual Hawaii International Conference, Jan. 2000, 5 pp. vol.1 [3]. Hamilton, W.F., & Singh, H., The evolution of corporate capabilities in emerging technologies, Interfaces, 22(4), 1992, pp [4]. Powell, T.C., Firm-specific competitive advantage in high technology firms, Journal of High Technology Management, 4(2), 1993, pp [5]. van Krogh, G., & Roos, J., Figuring out your competence configuration, European Management Journal, 4, 1992, pp [6]. S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications, Cambridge: UK, Cambridge University Press, [7]. Fitsilis.P,Gerogiannis.V, Anthopoulos.L, Kameas.A, Using Social Network Analysis for Project Management Software, published in: Current Trends in Information Technology (CTIT), 2009 International Conference on 15 Dec 2009, RE 01 March 2010 [8]. N.J. Brookes, S.C. Morton, A.R.J. Dainty, and N.D. Bums, "Social processes, patterns and practices and project knowledge management: A theoretical framework and an empirical investigation", International Journal of Project Management 24 (2006) [9]. Damian.D, Marczak.S, and Kwan.I., Collaboration Patterns and the Impact of Distance on Awareness in Requirements-Centred Social Networks, Requirements Engineering Conference, RE '07. 15th IEEE International, Delhi, 19 November 2007 [10]. John McCreery, Vicente Moranta, Mapping Team Collaboration in Software Development Projects, published in Proceedings of PICMET conference in 2009 August 2009, USA. [11]. M. Ohira et al., Accelerating Cross-Project Knowledge Collaboration Using Collaborative Filtering and Social Networks, Proc. 2nd Int l Workshop Mining Software Repositories (MSR 05), ACM Press, 2005, pp [12]. M. Pinzger, N. Nagappan, and B. Murphy, Can Developer Social Networks Predict Failures? Proc. Foundation Software Eng., ACM Press, 2008, pp [13]. A. Meneely et al., Predicting Failures with Developer Networks and Social-Network Analysis, Proc. ACM SIGSOFT Foundations of Software Eng., ACM Press, 2008, pp [14]. Wolf, T.; Schroter, A.; Damian, D.; Panjer, L.D.; Nguyen, T.H.D, Mining Task- Based Social Networks to Explore Collaboration in Software Teams published in IEEE Computer Society January 2009 [15]. Li Yongkui, Lu Yujie, Social Network Model of Complex Projects Organization, published in International Conference of Management and Service Science, on 22-sep Vol. 2 No. 4 (October 2011) IJoAT 541
Project Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context
Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context Alejandro Corbellini 1,2, Silvia Schiaffino 1,2, Daniela Godoy 1,2 1 ISISTAN Research Institute, UNICEN University,
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,
How to Analyze Company Using Social Network?
How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP
Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP ABSTRACT In data mining modelling, data preparation
Network Analysis of a Large Scale Open Source Project
2014 40th Euromicro Conference on Software Engineering and Advanced Applications Network Analysis of a Large Scale Open Source Project Alma Oručević-Alagić, Martin Höst Department of Computer Science,
Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR
BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software
Open Source Software Developer and Project Networks
Open Source Software Developer and Project Networks Matthew Van Antwerp and Greg Madey University of Notre Dame {mvanantw,gmadey}@cse.nd.edu Abstract. This paper outlines complex network concepts and how
SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS
SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland
Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation
www.ijcsi.org 170 Measuring the Impact of Changing Requirements on Software Project Cost: An Empirical Investigation Bushra Sharif 1, Dr. Shoab A. Khan 2, Muhammad Wasim Bhatti 3 1&2 Department of Computer
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University [email protected] [email protected] ABSTRACT Depending
Method for detecting software anomalies based on recurrence plot analysis
Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 3-12 ISSN 2299-2634 http://www.jtacs.org Method for detecting software anomalies based on recurrence plot analysis Michał Mosdorf
Miracle Integrating Knowledge Management and Business Intelligence
ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Formal Methods for Preserving Privacy for Big Data Extraction Software
Formal Methods for Preserving Privacy for Big Data Extraction Software M. Brian Blake and Iman Saleh Abstract University of Miami, Coral Gables, FL Given the inexpensive nature and increasing availability
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
A STUDY REGARDING INTER DOMAIN LINKED DOCUMENTS SIMILARITY AND THEIR CONSEQUENT BOUNCE RATE
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LIX, Number 1, 2014 A STUDY REGARDING INTER DOMAIN LINKED DOCUMENTS SIMILARITY AND THEIR CONSEQUENT BOUNCE RATE DIANA HALIŢĂ AND DARIUS BUFNEA Abstract. Then
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
Business Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
IMPROVING THE CRM SYSTEM IN HEALTHCARE ORGANIZATION
IMPROVING THE CRM SYSTEM IN HEALTHCARE ORGANIZATION ALIREZA KHOSHRAFTAR 1, MOHAMMAD FARID ALVANSAZ YAZDI 2, OTHMAN IBRAHIM 3, MAHYAR AMINI 4, MEHRBAKHSH NILASHI 5, AIDA KHOSHRAFTAR 6, AMIR TALEBI 7 1,3,4,5,6,7
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
Qi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
Research of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
A Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
Simulation and Risk Analysis
Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic
Activity Mining for Discovering Software Process Models
Activity Mining for Discovering Software Process Models Ekkart Kindler, Vladimir Rubin, Wilhelm Schäfer Software Engineering Group, University of Paderborn, Germany [kindler, vroubine, wilhelm]@uni-paderborn.de
Dynamic Adaptive Feedback of Load Balancing Strategy
Journal of Information & Computational Science 8: 10 (2011) 1901 1908 Available at http://www.joics.com Dynamic Adaptive Feedback of Load Balancing Strategy Hongbin Wang a,b, Zhiyi Fang a,, Shuang Cui
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
SEO Techniques for various Applications - A Comparative Analyses and Evaluation
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 20-24 www.iosrjournals.org SEO Techniques for various Applications - A Comparative Analyses and Evaluation Sandhya
Automated Collaborative Filtering Applications for Online Recruitment Services
Automated Collaborative Filtering Applications for Online Recruitment Services Rachael Rafter, Keith Bradley, Barry Smyth Smart Media Institute, Department of Computer Science, University College Dublin,
A Comparative Analysis and Evaluation of Open Source ERP Systems
24 A Comparative Analysis and Evaluation of Open Source ERP Systems Saleh M. Al-Saleem Department of Information Systems, College of Computer and Information Sciences, King Saud University Riyadh, Saudi
Call Graph Based Metrics To Evaluate Software Design Quality
Call Graph Based Metrics To Evaluate Software Design Quality Hesham Abandah 1 and Izzat Alsmadi 2 1 JUST University; 2 Yarmouk University [email protected], [email protected] Abstract Software defects
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
SAP InfiniteInsight 7.0 SP1
End User Documentation Document Version: 1.0-2014-11 Getting Started with Social Table of Contents 1 About this Document... 3 1.1 Who Should Read this Document... 3 1.2 Prerequisites for the Use of this
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Using Library Dependencies for Clustering
Using Library Dependencies for Clustering Jochen Quante Software Engineering Group, FB03 Informatik, Universität Bremen [email protected] Abstract: Software clustering is an established approach
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN
12 TH INTERNATIONAL DEPENDENCY AND STRUCTURE MODELLING CONFERENCE, 22 23 JULY 2010, CAMBRIDGE, UK COMPARING MATRIX-BASED AND GRAPH-BASED REPRESENTATIONS FOR PRODUCT DESIGN Andrew H Tilstra 1, Matthew I
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
New Work Item for ISO 3534-5 Predictive Analytics (Initial Notes and Thoughts) Introduction
Introduction New Work Item for ISO 3534-5 Predictive Analytics (Initial Notes and Thoughts) Predictive analytics encompasses the body of statistical knowledge supporting the analysis of massive data sets.
2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: [email protected]) Dr. G.N. Singh Department of Physics and
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Software Risk Factors in Developing E-Governance Projects
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Software Risk Factors in Developing E-Governance Projects Ms. Harmeet Malhotra Associate Professor,
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
Interactive information visualization in a conference location
Interactive information visualization in a conference location Maria Chiara Caschera, Fernando Ferri, Patrizia Grifoni Istituto di Ricerche sulla Popolazione e Politiche Sociali, CNR, Via Nizza 128, 00198
Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies
Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Somesh S Chavadi 1, Dr. Asha T 2 1 PG Student, 2 Professor, Department of Computer Science and Engineering,
Recommendation Tool Using Collaborative Filtering
Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
The Evolution of Mobile Apps: An Exploratory Study
The Evolution of Mobile Apps: An Exploratory Study Jack Zhang, Shikhar Sagar, and Emad Shihab Rochester Institute of Technology Department of Software Engineering Rochester, New York, USA, 14623 {jxz8072,
Data Quality Assurance
CHAPTER 4 Data Quality Assurance The previous chapters define accurate data. They talk about the importance of data and in particular the importance of accurate data. They describe how complex the topic
How To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities
A Capability Model for Business Analytics: Part 2 Assessing Analytic Capabilities The first article of this series presented the capability model for business analytics that is illustrated in Figure One.
A Divided Regression Analysis for Big Data
Vol., No. (0), pp. - http://dx.doi.org/0./ijseia.0...0 A Divided Regression Analysis for Big Data Sunghae Jun, Seung-Joo Lee and Jea-Bok Ryu Department of Statistics, Cheongju University, 0-, Korea [email protected],
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest
Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Databases in Organizations
The following is an excerpt from a draft chapter of a new enterprise architecture text book that is currently under development entitled Enterprise Architecture: Principles and Practice by Brian Cameron
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Study of Lightning Damage Risk Assessment Method for Power Grid
Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d
Advanced Materials Research Vol. 628 (2013) pp 265-269 Online available since 2012/Dec/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.628.265 An
An Introduction to. Metrics. used during. Software Development
An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
A Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
Reporting. Understanding Advanced Reporting Features for Managers
Reporting Understanding Advanced Reporting Features for Managers Performance & Talent Management Performance & Talent Management combines tools and processes that allow employees to focus and integrate
