A Conceptual Framework for Successful Implementation of IS Projects in the Yemeni Private Sector Business Organizations
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.57-60, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.5760
Abstract
Information Systems (IS) play an important role in business organizations. Implementation of these systems is a difficult task which if not implemented correctly may use up many resources of these organizations. This paper is trying to propose a conceptual framework for the successful implementation of information systems (IS) projects in Yemeni private sector business organizations. The research started with identifying the Critical Success Factors (CSFs) for IS Projects based on a survey of previous works. Then, the proposed conceptual framework was developed, which can help Yemeni private sector business organizations to achieve a successful implementation of IS projects.
Key-Words / Index Term
Information System (IS), Information System Projects, Critical Success Factors (CSFs). Yemeni Private Sector Business Organizations
References
[1] T. Dahlberg and H. Kivijärvi, "Towards an Integrative, Multilevel Theory for Managing the Direct and Indirect Impacts of IT Project Success Factors," 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, pp. 4971-4980, 2016
[2] A. Fayaz, Y. Kamal, S. Amin & S. Khan “Critical success factors in information technology projects”, Management Science Letters, Vol. 7 Issue. 2, pp 73-80, 2017.
[3] G. P. Sudhakar. "A model of critical success factors for software projects", Journal of Enterprise Information Management, Vol. 25 No. 6, pp. 537-558, 2012
[4] T. Cooke-Davies. “The “real” success factors on projects.”, International Journal of Project Management Vol. 20, Issue 3, pp 185-190, 2002.
[5] M.H.N. Nasir and S. Sahibuddin, “Critical success factors for software projects: A comparative study.” Scientific research and essays, vol. 6 issue. 10, pp 2174-2186, 2011
[6] M. Niazi, S. Mahmood, M. Alshayeb, A. Qureshi, K. Faisal, N. Cerpa, “Toward successful project management in global software development”, International Journal of Project Management, Vol. 34, Issue. 8, pp 1553-1567, 2016.
[7] N. Garcia-Sanchez, L. E. Pérez-Bernal, “Determination of critical success factors in implementing an ERP system: A field study in Mexican enterprises”, Information Technology for Development vol. 13, issue. 3, pp 293 – 309, 2007.
[8] M. A. Imtiaz, A. S. Al-Mudhary, M. T. Mirhashemi, R. Ibrahim, “Critical Success Factors of Information Technology Projects”, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, vol. 7, pp.3154-3158, 2013.
[9] G. Thomas, W. Fernández, “Success in IT projects: A matter of definition?”, International Journal of Project Management, vol. 26, issue 7, pp 733-742, 2008.
[10] , D. F. Ofori, “Project management practices and critical success factors-A developing country perspective”, International Journal of Business and Management, vol. 8,issue. 21, pp 14-31, 2013.
[11] P. Savolainen, J. J. Ahonen, I. Richardson,” Software development project success and failure from the supplier`s perspective: A systematic literature review”, International Journal of Project Management, vol.30, issue. 4, pp 458-469, 2012.
[12] M. L. Todorovi?, D. C. Petrovi?, M. M. Mihi?, V. L. Obradovi?, S. D. Bushuyev, “Project success analysis framework: A knowledge-based approach in project management”, International Journal of Project Management, vol. 33 issue. 4, pp 772-783, 2015.
[13] D. Fan, "Analysis of critical success factors in IT project management," 2010 2nd International Conference on Industrial and Information Systems, Dalian, pp. 487-490, 2010.
[14] G. Cserhati, L. Szabo, “The relationship between success criteria and success factors in organisational event projects”, International Journal of Project Management, vol. 32, issue. 4,2014, pp. 613-624, 2014.
[15] M. A?ao?lu, E. S. Yurtkoru, A. K. Ekmekçi, "The effect of ERP implementation CSFs on business performance: an empirical study on users’ perception", Procedia-Social and Behavioral Sciences, Vol. 210, pp. 35-42, 2015.
[16] A. Amaral, G. Fernandes, J. Varajão,” Identifying useful actions to improve team resilience in information systems projects. Procedia Computer Science, Vol. 64, pp. 1182-1189, 2015.
[17] K. Bokovec, T. Damij, T. Rajkovi?, “Evaluating ERP Projects with multi-attribute decision support systems”, Computers in Industry, vol. 73, pp. 93-104, 2015.
[18] Z. Alias, E.M.A. Zawawi, K. Yusof, N.M. Aris, “Determining Critical Success Factors of Project Management Practice: A Conceptual Framework”, Procedia - Social and Behavioral Sciences, vol.153, pp. 61-69, 2014.
[19] J. Ram, D. Corkindale, M. Wu, “Implementation critical success factors (CSFs) for ERP: Do they contribute to implementation success and post-implementation performance?”, International Journal of Production Economics, vol. 144 issue. 1, pp. 157-174, 2015.
[20] M. Jørgensen, “Failure factors of small software projects at a global outsourcing marketplace”, Journal of Systems and Software, vol. 92, pp.157-169, 2014.
[21] G. Arias, D. Vilches, C. Banchoff, I. Harari, V. Harari, P. Iuliano, “The 7 key factors to get successful results in the IT Development projects”, Procedia Technology, vol. 5, pp.199-207, 2012.
[22] A. N. Ahmad, R. A. Rahman, M. Othman, U. F. Abidin, “Critical success factors affecting the implementation of halal food management systems: Perspective of halal executives, consultants and auditors”, Food Control, vol. 74, pp.70-78, 2017.
[23] M. M. Ahmad, R. P. Cuenca, “Critical success factors for ERP implementation in SMEs”, Robotics and computer-integrated manufacturing, vol. 29, issue. 3,pp.104-111, 2013.
[24] Y. H. Al-Mamary, A. Shamsuddin, A. H. Nor Aziati, “Key factors enhancing acceptance of management information systems in Yemeni companies” Journal of Business and Management Research, vol. 5, pp.108-111, 2014.
[25] Y. H. Al-Mamary, A. Shamsuddin, A. H. Nor Aziati, “Investigating the key factors influencing on management information systems adoption among telecommunication companies in Yemen: the conceptual framework development”, International Journal of Energy, Information and Communications, vol.6, issue. 1, pp.59-68, 2015.
[26] Y. H. Al-Mamary, A. Shamsuddin, A. H. Nor Aziati, ” The pilot test study of relationship between management information systems success factors and organizational performance at Sabafon Company in Yemen”, International Journal of u-and e-Service, Science and Technology, vol. 8, issue. 2, pp. 337-346, 2015.
[27] A. ALdayel, M. dayel, A. S. Al-Mudimigh, “The critical success factors of ERP implementation in higher education in Saudi Arabia: a case study”, International Journal of Information Technology and Management, vol. 2, issue. 2, pp.1-16, 2011.
[28] Z. Alreemy, V. Chang, R. Walters, G. Wills, “Critical success factors (CSFs) for information technology governance (ITG), International Journal of Information Management, vol. 36, issue. 6, pp. 907-916, 2016.
[29] J. M. Denolf, J. H. Trienekens, P.M. (Nel) Wognum, J. Vorst, S.W.F. (Onno) Omta, “Towards a framework of critical success factors for implementing supply chain information systems”, Computers in Industry, vol. 68, pp. 16-26, 2015.
[30] R. A. dos Reis, M. C. Freitas, “Critical Factors on Information Technology Acceptance and Use: An Analysis on Small and Medium Brazilian Clothing Industries”, Procedia Computer Science, vol. 31, pp.105-114, 2014.
[31] H. Elkadi, “Success and failure factors for e-government projects: A case from Egypt”, Egyptian Informatics Journal, vol. 14, issue. 2, pp. 165-173, 2013.
[32] M. H. Al-Sabahi, A. A. Al-Hamidi, A. Ramly, K. M. Rejab, “Exploring criteria and critical factors for governmental projects implementation in Yemen: a case study”, Journal of Surveying, Construction and Property, vol. 5, issue. 2, pp.1-17, 2014.
[33] J. Fortune, D. White, “Framing of project critical success factors by a systems model”, International Journal of Project Management, vol. 24, issue. 1, pp.53-65, 2006.
[34] T. Chow, D-B. Cao, “A survey study of critical success factors in agile software projects”, Journal of Systems and Software, vol. 81, issue. 6, pp.961-971, 2008.
[35] E. W. N. Bernroider, M. Ivanov, “IT project management control and the Control Objectives for IT and related Technology (CobiT) framework”, International Journal of Project Management, vol. 29, issue.3, pp.325-336, 2011.
[36] S. Gupta, C. Misra, "Moderating Effect of Compliance, Network, and Security on the Critical Success Factors in the Implementation of Cloud ERP," in IEEE Transactions on Cloud Computing, vol. 4, no. 4, pp. 440-451, 2016.
[37] M. Jørgensen, “A survey on the characteristics of projects with success in delivering client benefits”, Information and Software Technology, vol.78, pp.83-94, 2016.
[38] R. Hashim, M. Abbas and M. Hashim, "Critical success factors assessment in software projects," 2013 Science and Information Conference, London, pp. 282-287, 2013.
[39] V.R. Montequin, S. Cousillas, F. Ortega, J. Villanueva, “Analysis of the Success Factors and Failure Causes in Information & Communication Technology (ICT) Projects in Spain”, Procedia Technology, vol. 16, pp.992-999, 2014.
[40] E.W.T. Ngai, C.C.H. Law, F.K.T. Wat, “Examining the critical success factors in the adoption of enterprise resource planning”, Computers in Industry, vol. 59, issue 6, pp.548-564, 2008.
[41] L. Y. Astri, “A Study Literature of Critical Success Factors of Cloud Computing in Organizations”, Procedia Computer Science, vol. 59, pp.188-194, 2015.
[42] Y. Chen, “The empirical analysis model on critical success factors for emergency management engineering information system”, Systems Engineering Procedia, vol. 5, pp.234-239, 2012.
[43] L. A. Ika, A. Diallo, D. Thuillier, “Critical success factors for World Bank projects: An empirical investigation”, International Journal of Project Management, vol. 30, issue. 1, pp.105-116, 2012.
[44] R. Müller, R. Turner, “Leadership competency profiles of successful project managers”, International Journal of Project Management, vol. 28, issue. 5, pp.437-448, 2010.
Citation
Mokhtar Mohammed Ghilan, "A Conceptual Framework for Successful Implementation of IS Projects in the Yemeni Private Sector Business Organizations," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.57-60, 2020.
Analysing Covid-19 Cases by Eliminating False Negatives, False Positives by Visual Exploratory Data Analysis Approach
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.61-66, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.6166
Abstract
COVID-19 outbreak has put the whole world in an unusual situation bringing life around the world to a frightening halt and claiming thousands of lives. To quickly trace the disease for breaking chain governments increased the no. of testings, by increasing the no. of tests there is also a raise in no. of cases but there were only limited facilities. Today Machine Learning plays a crucial role in various sectors like Business, Industries and Health care System and so on for predicting their economy. In the Healthcare system Machine Learning is used to predict the probability of occurring diseases. In this paper by Machine Learning approach we render to Predict whether a patient is corona positive or negative based on the results of laboratory tests collected from clinical dataset SARS-Cov-2 among suspected cases and we also predict whether a patient needs to be admitted into a general ward or a semi-intensive unit or an intensive care unit based on his symptoms by using some Machine Learning models like Principal Component Analysis, and visualize the data by Exploratory Data Analysis(EDA).
Key-Words / Index Term
PCA (Principal Component Analysis) ,EDA (Exploratory Data Analysis)
References
[1]. Predicting COVID Cases by Eliminating TPS, FNS, TNS, FPS through Machine Learning Approach by M. Vennela IJCSE vol8 issued on 10 oct 2020
[2]. Saroj S. Date “Forecasting novel Covid-19 confirmed cases in India using Machine Learning Methods” –IJCSE, vol.8, issued on 6,June 2020.
[3]. Measuring and Preventing COVID-19 Using the SIR Model and Machine Learning in Smart HealthCare Saad Awadh Alanazi M. M.Kamruzzaman,MadallahAlruwaili,2NasserAlshammari,1Salman Ali Alqahtani,3 and Ali Karime4:Article in hindawi.
[4]. Sanjib Halder “A Mathematical Model to Forecast & Compare Covid-19 Outbreak in Male & Female using Polynomial Regression Analysis”-IJCSE ,vol.8,issued on 5,May 2020.
[5]. Jay Furst-“False-negative COVID-19 test results may lead to a false sense of security”. Source: mayo clinic Steven Woloshin, M.D., Neeraj Patel, B.A., and Aaron.
[6]. John Wiley& sons “Machine Learning: Hands-on for Developers and Technical Professionals”
Citation
G. Dinesh Chandra, G. Lavanya Devi, P.R.S. Naidu, "Analysing Covid-19 Cases by Eliminating False Negatives, False Positives by Visual Exploratory Data Analysis Approach," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.61-66, 2020.
Alexnet Based Transfer Learning Approach for Extracting Soft Attributes From Iris Biometrics
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.67-71, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.6771
Abstract
In the last decade, biometric techniques for person identification have gained more popularity. Different researchers have proposed various algorithms for feature extraction and classification. Deep learning is a new universally adopted method for classification and regression purpose. Compared to machine learning it is easiest way to train a deep neural network as it does not require feature extraction step. Only the requirement is it needs a voluminous database. In this paper we propose a “AlexNet” a pre-trained network for gender prediction from human iris. We implemented AlexNet for transfer learning based on feature extraction method. In this iris features are extracted using different intermediate layers. These features are further classified using multi-class SVM classifier. We achieved promising results for the proposed method.
Key-Words / Index Term
Deep neural networks, Deep learning, AlexNet, Iris biometrics, Transfer learning
References
[1] A. A. Halder, S. S. Pande, “Implementation of Iris Recognition Using Circular Hough Transform and Template Generation”, International Journal of Computer Science and Engineering, Vol.8, Issue.1, pp.13-16, 2020.
[2] S. Kumar, S. K. Lamba,& S. Jangra, “Existing and Emerging Covariates of Iris Recognition”, International Journal of Computer Science and Engineering,Vol.7, Issue.6, 2019.
[3] V. Thomas, N. V. Chawla, K.W. Bowyer, & P.J. Flynn, “Learning to Predict Gender from Iris Images”, In the proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-5, 2007.
[4] M. Fairhurst, M. Erbilek, & M. Da Costa Abreu, “ Exploring Gender Prediction from Iris Biometrics”, In the proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG). Darmstadt, pp.1-11, 2015.
[5] S. Lagree, & K.W. Bowyer, “Predicting Ethnicity and Gender from Iris Texture”, In the proceedings of the IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, pp.440-445, 2011.
[6] J. E. Tapia, C. A. Perez, & K. W. Bowyer, “Gender Classification from Iris Images using Fusion of Uniform Local Binary Patterns”, In: L. Agapito, M. Bronstein, C. Rother (Eds) Computer Vision - ECCV 2014 Workshops. ECCV 2014. Lecture Notes in Computer Science, 8926, Springer, Cham, 2015.
[7] M. C. KMS Vijini, & K. Shanmugan, “Gender Classification from the Iris Code used for Recognition”, International Journal of MC Square Scientific Research, Vol.9, Issue.1, pp. 218-229, 2017.
[8] A. Bansal, R. Agarwal, & R. K. Sharma, “SVM based Gender Classification using Iris Images”, In the proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, pp. 425-429, 2012.
[9] D. Bobeldyk & A. Ross, “Iris or Periocular? Exploring Sex Prediction from Near Infrared Ocular Images”, In the proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, pp.1- 7, 2016.
[10] J. Tapia, & C. Aravena, “Gender Classification from NIR Iris Images using Deep Learning”, In: B. Bhanu, A. Kumar (Eds) Deep Learning for Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham, 219-239, 2017.
[11] M. Singh, & S. Nagpal, “Gender and Ethnicity Classification of Iris Images using Deep Class-Encoder”, In the proceedings of the IEEE International Joint Conference on Biometrics (IJCB), Denver, CO, pp.666-673, 2017.
[12] J. E. Tapia & C.A. Perez, “Gender Classification from NIR Images by using Quadrature Encoding Filters of the Most Relevant Features”, IEEE Access Open Access Journal, 7, 29114-29127, 2019.
[13] NEM Khalifa, MHN Taha, AE Hassanien, HNET Mohamed, “Deep Iris: Deep Learning for Gender Classification through Iris Patterns”, Acta Informatica Medica: AIM : Journal of the Society for Medical Informatics of Bosnia & Herzegovina : Casopis Drustva Za Medicinsku Informatiku Bih, Vol.27, Issue.2, pp.96-102, 2019.
[14] A. Kuehlkamp & K. Bowyer, “Predicting Gender from Iris Texture May Be Harder Than It Seems”, In the proceedings of the IEEE Winter Conference on Applications of Computer Vision (WACV), Waikoloa Village, HI, USA, pp. 904- 912, 2019.
Citation
Minakshi R.Rajput, Ganesh S. Sable, "Alexnet Based Transfer Learning Approach for Extracting Soft Attributes From Iris Biometrics," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.67-71, 2020.
Prediction of Type 2 Diabetics besed on Clustering Algorithm
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.72-78, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.7278
Abstract
Diabetes is one of the disease increases in humanity across the world-wide. Data mining is a process of extracting the information from a large dataset and transforms it into understandable structure. Medical data mining has been a great capability for finding hidden patterns from the large data sets of the medical dataset. The Data mining techniques used for the prediction of diseases like heart diseases, cancer, kidney stones, EEG etc. Prediction of Diabetes is an emerging and fastest growing technology in the medical analysis data. This research paper concentrates on the clustering method for grouping diabetic data based on cluster head attributes. In this paper the popular clustering algorithms K-Means, Fuzzy C-Means (FCM) and Gaussian Kernel based Fuzzy C-Means (GKFCM) clustering algorithms are selected and analyzed based on their fundamentals by using diabetes dataset. The algorithms performance is tested based on its various analyses. The results are compared with three algorithm algorithms. Finally we obtained that the GKFCM has best than K-means and FCM algorithm.
Key-Words / Index Term
K-means, Fuzzy C-Means (FCM), Gaussian Kernel based Fuzzy C-Means (GKFCM), Clustering, and Diabetes dataset.
References
[1]. Han J, Kamber M. Data Mining: Concepts and Techniques [J]. Data Mining Concepts Models Methods & Algorithms Second Edition, 2012.
[2]. Sumathi S, Sivanandam S N. Introduction to Data Mining and its Applications [J]. Studies in Computational Intelligence, 2006.
[3]. Hasim N, Haris N A. A study of open-source data mining tools for forecasting[C]// International Conference on Ubiquitous Information Management and Communication. ACM, 2015.
[4]. Norul Hidayah Ibrahim1 , Aida Mustapha2 , Rozilah Rosli3 , Nurdhiya Hazwani Helmee4 “A Hybrid Model of Hierarchical Clustering and Decision Tree for Rule-based Classification of Diabetic Patients” International Journal of Engineering and Technology (IJET) 2013.
[5]. Yihong Donga, Yueting Zhuanga, Ken Chenc, Xiaoying Taib, “A hierarchical clustering algorithm based on fuzzy graph connectedness”, Fuzzy Sets and Systems, Vol. 157 (13), pp. 1760– 1774.
[6]. P. Padmaja, V. Srikanth, N. Siddiqui, D. Praveen, B. Ambica, V.B.V.E. Venkata Rao, and V.J.P.Raju Rudraraju, “Characteristic evaluation of diabetes data using clustering techniques”International Journal of Computer Science and Network Security, Vol. 8 (11), pp. 244, 251, 2008.
[7]. Ashish Ghosh, Anindya Halder, Megha Kothari, and Susmita Ghosh, “Aggregation pheromone density based data clustering”, Information Sciences, Vol. 178 (13), pp.2816 –2831, 2008.
[8]. Adil M. Bagirow, “Modified global k- Means algorithm for minimum sum-of-squares clustering problems”, Pattern Recognition, Vol. 41 (10), pp. 3192–3199, 2008.
[9]. R.Nithya, P.Manikandan, and D.Ramyachitra, ”Analysis of clustering technique for the diabetes dataset using the training set parameter”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4 (9), pp. 166–169, 2015.
[10]. Zeynel Cebeci and Figen Yildiz, “Comparison of K-Means and Fuzzy C-Means Algorithms on Different Cluster Structures”, Journal of Agricultural Informatics, Vol. 6 (3), pp. 13–23, 2015.
[11]. Usha G Biradar and Deepa S Mugali, “Clustering Algorithms on Diabetes Data:Comparative Case Study”, International Journal of Advanced Research in Computer Science,Vol.8(5), pp.550–552, 2017.
[12]. Jianpeng Qi, Yanwei Yu, Lihong Wang, Jinglei Liu and Yingjie Wang “An effective and efficient hierarchical k-Means clustering algorithm”, International Journal of Distributed Sensor Networks, Vol. 13 (8), pp.1–17, 2017.
[13]. K. Saravananathan and T. Velmurugan: Cluster based performance analysis for Diabetic data, International Journal of Pure and Applied Mathematics, 2018.
[14]. Karim M. Orabi1 , Yasser M. Kamal, and Thanaa M. Rabah. Early Predictive System for Diabetes Mellitus Disease. ICDM 2016, LNAI 9728, pp. 420– 427, 2016.
[15]. B.M. Patil, Hybrid prediction model for Type-2 diabetic patients. Expert Systems with Applications 37, 8102–8108, 2010.
[16]. Qinpei Zhao, Mantao Xu, and Pasi Fränti “Sum-of-Squares Based Cluster Validity Index and Significance Analysis* “
[17]. Bahman Bahmani, Benjamin Moseley, Andrea Vattani, “Scalable K Means++“ ellipses, IEEE Trans. Neural Networks 3 (5) 643–662, 1992.
[18]. Asha Gowda Karegowda , M.A. Jayaram, A.S. Manjunath, Cascading K-means Clustering and K-Nearest Neighbor Classifier for Categorization of Diabetic Patients.
[19]. WeinaWang, Yunjie Zhang, “On k means cluster validity indices”.
Citation
K. Gandhimathi, N. Umadevi, "Prediction of Type 2 Diabetics besed on Clustering Algorithm," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.72-78, 2020.
A Taxonomy and Survey of Security challenges in intrusion detection and prevention for Cloud Computing
Survey Paper | Journal Paper
Vol.8 , Issue.11 , pp.79-84, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.7984
Abstract
Most of the Organizations and governments consider security as an undeniable prerequisite have in view of the extending movement of attacks which is hostile both security and assurance. In this paper, we present an investigation of IDPS which drove us to play out a gathering of systems depending upon the strategies used in interferences acknowledgment and neutralization structures. We talk about the focal points and disadvantages of these strategies. A brief timeframe later, we analyze the various issues tangling the most ideal value and efficiency of the current IDPS and moreover research its troubles in appropriated registering, PDAs and sharp metropolitan networks.
Key-Words / Index Term
Networking, Security challenges, Cloud computing, intrusion prevention, Intrusion detection,ids, ips, idps
References
[1]. J. A. P. Marpaung, M. Sain, and H.-J. Lee, “ Survey on malware evasion techniques: State of the art and challenges “, in 2012 14th International Conference on Advanced Communication Technology (ICACT), pp. 744 -749 , 2012 .
[2]. Kührer, C. Rossow, and T. Holz, “ Paint It Black: Evaluating the Effectiveness of Malware Blacklists “, in Research in Attacks, Intrusions and Defenses, A. Stavrou, H. Bos, and G. Portokalidis, Éd. Springer International Publishing, pp. 1 -21, 2014.
[3]. K. D. Bowers, C. Hart, A. Juels, and N. Triandopoulos, “PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging “, in Research in Attacks, Intrusions and Defenses, A. Stavrou, H. Bos, and G. Portokalidis, Éd. Springer International Publishing, pp. 46-67, 2014. 1992,
[4]. S. Peng, M. Wu, G. Wang, and S. Yu, « Propagation model of smartphone worms based on semi-Markov process and social relationship graph », Computer. Security., vol. 44, pp. 92-103, 2014.
[5]. W. M. Fitzgerald, U. Neville, and S. N. Foley, “ MASON: Mobile autonomic security for network access controls “, J. Inf. Security. Appl., vol. 18, no. 1, pp. 14-29,. 2013.
[6]. K. Su, J. Li, and H. Fu, “ Smart city and the applications », in 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 1028 -1031, 2011.
[7]. A. S. Elmaghraby and M. M. Losavio, “ Cyber security challenges in Smart Cities: Safety, security and privacy “, J. Adv. Res., vol. 5, no. 4,pp. 491-497, Jul. 2014.
[8]. S. Djahel, R. Doolan, G. Muntean, and J. Murphy, “ A Communications-Oriented Perspective on Traffic Management Systems for Smart Cities: Challenges and Innovative Approaches “, IEEE Commun. Surv. Tutor., vol. 17, no. 1, pp. 125 -151, Firstquarter 2015.
[9]. B. Morin, L. Mé, H. Debar, and M. Ducassé, “ A logic-based model to support alert correlation in intrusion detection “, Inf. Fusion, vol. 10, no. 4, p. 285 - 299, 2009.
[10]. M. M. M. Hassan, “Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic”, Int. J. Distrib. Parallel Syst., vol. 4, no. 2, 2013.
[11]. S. Elhag, A. Fernández, A. Bawakid, S. Alshomrani, and F. Herrera, “On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems” , Expert Syst. Appl., vol. 42, no. 1, pp. 193-202, 2015.
[12]. M. A. Ayd?n, A. H. Zaim, and K. G. Ceylan, “ A hybrid intrusion detection system design for computer network security ”, Comput. Electr. Eng., vol. 35, no. 3, pp. 517-526, 2009.
[13]. C.-C. Lo, C.-C. Huang, and J. Ku, “ A Cooperative Intrusion Detection System Framework for Cloud ComputingNetworks “, in 2010 39th International Conference on Parallel Processing Workshops (ICPPW) pp. 280- 284, 2010.
[14]. K. Wankhade, S. Patka, and R. Thool, “An Overview of Intrusion Detection Based on Data Mining Techniques “,International Conference on Communication Systems and Network Technologies (CSNT),pp. 626-629, 2013.
[15]. F. Gharibian and A. A. Ghorbani, “Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection “, in Fifth Annual Conference on Communication Networks and Services Research, 2007. CNSR ’07, pp. 350-358, 2007.
[16]. L. M. Ibrahim,” Artificial Neural Network for Misuse Detection “, J. Commun. Comput., vol. 7, pp. 1548 -7709, 2010.
[17]. W.-H. Chen, S.-H. Hsu, and H.-P. Shen,” Application of SVM and ANN for intrusion detection “, Comput. Oper. Res., vol. 32, no. 10, p. 2617- 2634, 2005.
[18]. A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “ Intrusion detection using fuzzy association rules “, Appl. Soft Computer, vol. 9, no. 2, p. 462-469, mar 2009.
[19]. G.-Y. Chan, C.-S. Lee, and S.-H. Heng, “ Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks “, J. Netw. Comput. Appl., vol. 36, no. 2, pp. 829-842, 2013.
[20]. H. S. Seo and T. H. Cho, « Application of Fuzzy Logic for Distributed Intrusion Detection », in Computational Intelligence and Security, Y. Hao, J. Liu, Y.-P. Wang, Y. Cheung, H. Yin, L. Jiao, J. Ma, and Y.-C. Jiao, Éd. Springer Berlin Heidelberg, pp. 340- 347, 2005.
[21]. S.K. Sharma, L. Gupta, “A Novel Approach for Cloud Computing Environment”, International Journal of Computer Engineering, Vol.4, Issue.12, pp.1-5, 2014.
[22]. K. Gupta, “A Proposed New Approach for Cloud Environment using Cryptic rules”, ISROSET Publisher, India, pp. 542-545, 2016.
Citation
R. Hamsaveni, Vasumathy M., "A Taxonomy and Survey of Security challenges in intrusion detection and prevention for Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.79-84, 2020.
Productivity Metric Estimation: Comprehensive Examine of Efficiency, Effectiveness and Value Based Metrics
Research Paper | Journal Paper
Vol.8 , Issue.11 , pp.85-92, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.8592
Abstract
The successful software project estimation is critically dependent upon measurement of productivity. The overall goal of productivity metric is to improve the ability and performance of information system evaluation as well as maintenance, moreover determine the performance of the information technology (IT) performance in business applications. The activities corresponding to productivity metrics vary at distinct management levels. The activities used within project management leads to dynamic framework that could be opted in changing or dynamic environments. At the project management level, productivities activities concentrates on effectiveness. For instance, during estimation of effort required to reproduce a system, assumption must be manufacture regarding the ability that could lead to successful development of software project and this is fetched from past projects. This paper focuses on identifying the productivity metrics that are essential and appropriate for project management process.
Key-Words / Index Term
Software productivity, ability, effectiveness, efficiency, cost, Information technology
References
V. Singh, “Evaluation and Application of Package Level Metrics in Assessing Software Quality,” IJCA, vol. 58, no. 21, pp. 38–46, 2012.
[2] G. Kaur and D. Sharma, “A Study on Robert C . Martin ’ s Metrics for Packet Categorization Using Fuzzy Logic,” IJHIT, vol. 8, no. 12, pp. 215–224, 2015.
[3] V. Gupta and J. Kumar, “Package level cohesion measurement in object-oriented software,” springer, pp. 251–266, 2012.
[4] [4] G. S. D. A. J, S. Romero, and D. L. Meira, “An Approach to Measure Value-Based Productivity in Software Projects,” IEEE Access, 2009.
[5] M. Snoeck, S. Poelmans, and G. Dedene, “Conceptual Modeling — ER 2000,” vol. 1920, no. October, 2000.
[6] M. Solla, A. Patel, and C. Wills, “New Metric for Measuring Programmer Productivity,” IEEE Conf., pp. 177–182, 2011.
[7] S. Ryan and R. V. O. Connor, “The Journal of Systems and Software Development of a team measure for tacit knowledge in software development teams,” J. Syst. Softw., vol. 82, no. 2, pp. 229–240, 2009.
[8] V. R. Basili et al., “and Business Measurement,” IEEE Access, no. April, pp. 57–65, 2010.
[9] M. A. Akbar et al., “Improving the quality of software development process by introducing a new methodology-Az-model,” IEEE Access, vol. 6, no. February, pp. 4811–4823, 2017.
[10] M. Z. Khan, A. Alsaeedi, and M. Huda, “Empirically Validated Software Efficiency Estimation Model: Product Operation Perspective,” J. Softw. Eng. Appl., vol. 11, no. 10, pp. 486–499, 2018.
[11] E. Frekjmr, “Measuring Usability?: Are Effectiveness , Efficiency , and Satisfaction Really Correlated??,” IEEE Access, vol. 2, no. 1, pp. 345–352, 2006.
[12] D. Suve, “JAsCo?: an Aspect-Oriented approach tailored for Component Based Software Development,” IEEE Access, pp. 21–29, 2003.
[13] N. Murray, G. Muntean, S. Member, Y. Qiao, S. Brennan, and B. Lee, “Modeling User Quality of Experience of Olfaction-Enhanced Multimedia,” IEEE Access, pp. 1–13, 2018.
[14] M. Xenos and D. Stavrinoudis, “OBJECT-ORIENTED METRICS – A SURVEY,” IEEE Access, no. November 2013, 2000.
[15] B. Boehm and A. Jain, “An Initial Theory of Value-Based Software Engineering BT - Value-Based Software Engineering,” Value-Based Softw. Eng., no. January 2005, pp. 1–30, 2005.
[16] A. Ahmad, T. Siddiqui, and N. A. Khan, “A Detailed Phasewise Study on Software Metrics?: A Systematic Literature Review,” Int. J. Sci. Res. Comput. PSci. Eng. Inf. Technol., vol. 3, no. 3, pp. 1696–1705, 2018.
[17] C. Hsu and C. Huang, “Optimal Weighted Combinational Models for Software Reliability Estimation and Analysis,” IEEE, vol. 63, no. 3, pp. 731–749, 2014.
[18] O. Singh and A. Anand, “Testing Domain Dependent Software Reliability Growth Models,” IEEE Access, vol. 2, no. 3, pp. 140–149, 2017.
[19] I. A. Buckley and W. S. Buckley, “Teaching Software Testing using Data Structures,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 4, pp. 1–4, 2017.
[20] A. Rana, “Process of finding defects in software testing,” IEEE Access, vol. 10, no. vi, pp. 297–300, 2017.
[21] P. Maragathavalli and A. Saranya, “Prioritization on Software Reliability Assessment using Adaptive Testing Strategy,” springer, vol. 2, no. 3, pp. 273–277, 2017.
[22] M. Fischbach, D. Wiebusch, and M. E. Latoschik, “Semantic Entity-Component State Management Techniques to Enhance Software Quality for Multimodal VR-Systems,” IEEE Access, vol. 2626, no. c, 2017.
[23] D. Contreras and M. Castro, “Adaptive polling enhances quality and energy saving for multimedia over bluetooth,” IEEE Commun. Lett., vol. 15, no. 5, pp. 521–523, 2011.
[24] M. Fischbach, D. Wiebusch, and M. E. Latoschik, “Semantic Entity-Component State Management Techniques to Enhance Software Quality for Multimodal VR-Systems,” IEEE Trans. Vis. Comput. Graph., vol. 23, no. 4, pp. 1407–1416, 2017.
[25] H. Liu, “Software Engineering Practice in an Undergraduate Compiler Course,” IEEE Trans. Educ., vol. 36, no. 1, pp. 104–108, 1993.
[26] D. I. Heimann, “IEEE Standard 730-2014 Software Quality Assurance Processes Learning objectives What is IEEE 730??,” pp. 1–26, 2015.
[27] C. J. Hsu and C. Y. Huang, “Optimal weighted combinational models for software reliability estimation and analysis,” IEEE Trans. Reliab., vol. 63, no. 3, pp. 731–749, 2014.
[28] P. M. S. S. Chandu and D. Kata, “Integrating and enhancing the quality of services in cloud computing with software testing,” Proc. 2016 IEEE Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2016, pp. 2008–2010, 2016.
[29] Deepika, O. Singh, A. Anand, and J. N. P. Singh, “Testing Domain Dependent Software Reliability Growth Models,” Int. J. Math. Eng. Manag. Sci., vol. 2, no. 3, pp. 140–149, 2019.
[30] W. Wang, P. Xu, X. Bie, and M. Hua, “Enhanced Use of Mattes for Easy Image Composition,” IEEE Trans. Image Process., vol. 25, no. 10, pp. 4608–4616, 2016.
[31] A. Rahman, F. H. Sunny, H. M. Mishu, and F. Sumi, “Open Access Software Testing Algorithm Units,” no. 1, pp. 271–275, 2017.
[32] S. K. Sharma, “Reliability Growth Models for Software Testing Against Security Requirements,” vol. 6, no. 6, pp. 126–132, 2017.
[33] K. Dejaeger, W. Verbeke, D. Martens, and B. Baesens, “Data Mining Techniques for Software Effort Estimation?: A Comparative Study,” vol. 38, no. 2, pp. 375–397, 2012.
[34] E. Kocaguneli, S. Member, T. Menzies, J. Keung, D. Cok, and R. Madachy, “Active Learning and Effort Estimation?: Finding the Essential Content of Software Effort Estimation Data,” pp. 1–14, 2012.
[35] T. W. R. L. K. C. Kang, “Effort estimation of component-based software development – a survey,” vol. 5, no. June 2009, pp. 216–228, 2011.
[36] J. F. Nunamaker and M. Chen, “Software Productivity: A Framework of Study and an Approach to Reusable Components,” IEEE Access, 1989.
[37] N. Murray, G. M. Muntean, Y. Qiao, S. Brennan, and B. Lee, “Modeling user quality of experience of olfaction-enhanced multimedia,” IEEE Trans. Broadcast., vol. 64, no. 2, pp. 539–551, 2018.
Citation
Monika, Deepak, "Productivity Metric Estimation: Comprehensive Examine of Efficiency, Effectiveness and Value Based Metrics," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.85-92, 2020.
Technical Debt Prediction: Using Predictive Model
Survey Paper | Journal Paper
Vol.8 , Issue.11 , pp.93-99, Nov-2020
CrossRef-DOI: https://doi.org/10.26438/ijcse/v8i11.9399
Abstract
The prevalence of devices for programming quality examination has expanded throughout the years, with uncommon regard for instruments that ascertain Technical debt dependent on infringement of a lot of rules. SonarQube is one of the most utilized devices and gives an estimation of the time expected to remediate technical debt. Notwithstanding, experts are as yet suspicious about the precision of their remediation time estimation. In this paper, we investigate the exactness of programming on a set open-source Java ventures. The outcomes call attention to that Technical debt remediation time, contrasted with the genuine time for paying off technical debt, is for the most part overestimated, and that the most precise estimation identifies with code smells, while the least exact concerns bugs.
Key-Words / Index Term
SonarQube, Technical debt, Security, Code Quality, Open Source Software
References
[1] Allman, Eric. “Managing Technical Debt.” Communications of the ACM 55(5): 50–55. Evolution and Process 29(10), 2012.
[2] Nyyti Saarimäki, Valentina Lenarduzzi, and Davide Taibi. 2019. The Github Repository of the Technical Debt Dataset. https://github.com/clowee/ The-Technical-Debt-Dataset/
[3] Counsell, S. et al. “Is a Strategy for Code Smell Assessment Long Overdue?” In Proceedings - International Conference on Software Engineering, 32–38, 2010.
[4] Freezer, Erik. "Measuring Usability?: Are Effectiveness, Efficiency, and Satisfaction Really Correlated??" IEEE Access 2(1): 345–52, 2006.
[5] Gat, Israel, and John D. Heintz. “From Assessment to Reduction: How Cutter Consortium Helps Rein in Millions of Dollars in Technical Debt.” In Proceedings - International Conference on Software Engineering, 24–26, 2011.
[6] Griffith, Isaac, Hanane Taffahi, Clemente Izurieta, and David Claudio. “A Simulation Study of Practical Methods for Technical Debt Management in Agile Software Development.” In Proceedings - Winter Simulation Conference, Institute of Electrical and Electronics Engineers Inc., 1014–25, 2015.
[7] A. Zeller J. Sliwerski, T. Zimmermann. When Do Changes Induce Fixes? International Workshop on Mining Software Repositories, 1–5, 2005.
[8] Guo, Yue, and Carolyn Seaman. "A Portfolio Approach to Technical Debt Management." In Proceedings - International Conference on Software Engineering, 31–34, 2011.
[9] Holvitie, Johannes et al. “Technical Debt and Agile Software Development Practices and Processes: An Industry Practitioner Survey.” Information and Software Technology 96: 141–60, 2018.
[10] Kellner, Marc I., Raymond J. Madachy, and David M. Raffo. “Software Process Simulation Modeling: Why? What? How?” Journal of Systems and Software 46(2): 91–105. Kuusinen, Kati et al. 2017. “Decomposition of US.” 283: 135–50, 1999.
[11] Murray, Niall et al. “Modeling User Quality of Experience of Olfaction-Enhanced Multimedia.” IEEE Access: 1–13, 2018.
[12] Nugroho, Ariadi, Joost Visser, and Tobias Kuipers. “An Empirical Model of Technical Debt and Interest.” In Proceedings - International Conference on Software Engineering, , 1–8, 2011.
[13] Oliveira, Frederico, Alfredo Goldman, and Viviane Santos. “Managing Technical Debt in Software Projects Using Scrum: An Action Research.” In Proceedings - 2015 Agile Conference, Agile 2015, Institute of Electrical and Electronics Engineers Inc., 50–59, 2015.
[14] Ryan, Sharon, and Rory V O Connor. “The Journal of Systems and Software Development of a Team Measure for Tacit Knowledge in Software Development Teams.” The Journal of Systems & Software 82(2): 229–40, 2009.
[15] M. Z. Khan, A. Alsaeedi, and M. Huda, “Empirically Validated Software Efficiency Estimation Model: Product Operation Perspective,” J. Softw. Eng. Appl., vol. 11, no. 10, pp. 486–499, 2018.
[16] Dos Santos, Eduardo Witter, and Ingrid Nunes. “Investigating the Effectiveness of Peer Code Review in Distributed Software Development.” ACM International Conference Proceeding Series: 84–93, 2017.
[17] Dos Santos, Paulo Sérgio Medeiros, Amanda Varella, Cristine Ribeiro Dantas, and Daniel Beltrão Borges. “Visualizing and Managing Technical Debt in Agile Development: An Experience Report.” In Lecture Notes in Business Information Processing, Springer Verlag, 121–34, 2013.
[18] Seaman, Carolyn, and Yuepu Guo. 2011. 82 Advances in Computers Measuring and Monitoring Technical Debt.
[19] D. I. Heimann, “IEEE Standard 730-2014 Software Quality Assurance Processes Learning objectives What is IEEE 730??,” pp. 1–26, 2015.
[20] Stopford, Ben, Ken Wallace, and John Allspaw. “Technical Debt: Challenges and Perspectives.” IEEE Software 34(4): 79–81, 2017.
[21] M. A. Akbar et al., “Improving the quality of software development process by introducing a new methodology-Az-model,” IEEE Access, vol. 6, no. February, pp. 4811–4823, 2017.
[22] Zazworka, Nico et al. “A Case Study on Effectively Identifying Technical Debt.” In ACM International Conference Proceeding Series, , 42–47, 2013.
[23] A. Rahman, F. H. Sunny, H. M. Mishu, and F. Sumi, “Open Access Software Testing Algorithm Units,” no. 1, pp. 271–275, 2017.
[24] M. Z. Khan, A. Alsaeedi, and M. Huda, “Empirically Validated Software Efficiency Estimation Model: Product Operation Perspective,” J. Softw. Eng. Appl., vol. 11, no. 10, pp. 486–499, 2018.
Citation
Monika, Deepak, "Technical Debt Prediction: Using Predictive Model," International Journal of Computer Sciences and Engineering, Vol.8, Issue.11, pp.93-99, 2020.