You are on page 1of 42

TOP 10

CITED PAPERS

International Journal of Software Engineering &


Applications (IJSEA)

ISSN : 0975 - 9018 ( Online ); 0976-2221 ( Print )

http://www.airccse.org/journal/ijsea/ijsea.html
Citation Count – 115

E-Government Maturity Models: A Comparative Study


Abdoullah Fath-Allah1, Laila Cheikhi1, Rafa E. Al-Qutaish2, and Ali Idri1
1
Software Project Management Research Team, ENSIAS - Mohammed V University - Souissi,
Rabat, Morocco and 2Dept. of Software Engineering & IT, École de Technologie Supérieure,
University of Québec, Montréal, Canada

ABSTRACT

Many maturity models have been used to assess or rank e-government portals. In order to assess
electronic services provided to the citizens, an appropriate e-government maturity model should be
selected. This paper aims at comparing 25 e-government maturity models to find the similarities and
differences between them and also to identify their weaknesses and strengths. Although the maturity
models present large similarities between them, our findings show that the features included in those
models differ from a maturity model to another. Furthermore, while some maturity models are covering
some features and introducing new ones, it seems that others are just ignoring them.

KEYWORDS

E-government, portal, maturity model, comparison, best practices, e-services, maturity stages

Full Text : http://airccse.org/journal/ijsea/papers/5314ijsea06.pdf


REFERENCES

[1] Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5,
pp120-122.

[2] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, Network Books, ABC
Publishers.

[3] Concha, G., Astudillo, H., Porrúa, M., & Pimenta, C. (2012). E-Government procurement
observatory, maturity model and early measurements. Government Information Quarterly, 29, S43–
S50.

[4] KPMG. (2000). e-Government Capacity Check Diagnostic Tool. Retrieved April 17, 2014, from
http://www.tbs-sct.gc.ca/emf-cag/risk-risques/tools-outils-eng.asp

[5] Cresswell, A. M., Pardo, T. A., & Canestraro, D. S. (2006). Digital capability assessment for
eGovernment: A multi-dimensional approach. In Electronic Government (pp. 293–304). Springer.
Retrieved from http://link.springer.com/chapter/10.1007/11823100_26

[6] Layne, K., & Lee, J. (2001). Developing fully functional E-government: A four stage model.
Government Information Quarterly, 18(2), 122–136.

[7] Andersen, K. V., & Henriksen, H. Z. (2006). E-government maturity models: Extension of the Layne
and Lee model. Government Information Quarterly, 23(2), 236–248.

[8] United-Nations. (2012). UN E-Government Survey 2012: E-Government for the People. Retrieved
from http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf

[9] Alhomod, S. M., Shafi, M. M., Kousarrizi, M. N., Seiti, F., Teshnehlab, M., Susanto, H., Batawi, Y.
A. (2012). Best Practices in E government: A review of Some Innovative Models Proposed in
Different Countries. International Journal of Electrical & Computer Sciences, 12(01), 1–6.

[10] Hiller, J. S., & Belanger, F. (2001). Privacy strategies for electronic government. E-Government,
200, 162–198.

[11] Almazan, R. S., & Gil-Garcia, J. R. (2008). E-Government Portals in Mexico. Retrieved from
http://www.igi-global.com/chapter/electronic-government-concepts-methodologies-tools/9818

[12] Cisco IBSG. (2007). e-Government Best Practices learning from success, avoiding the pitfalls.
Retrieved from
http://siteresources.worldbank.org/EXTEDEVELOPMENT/Resources/20080222_Phil_eGov_work
shop.pdf? resourceurlname=20080222_Phil_eGov_workshop.pdf

[13] Baum, C., & Di Maio, A. (2000). Gartner’s four phases of e-government model. Gartner Group.

[14] West, D. M. (2004). E-Government and the Transformation of Service Delivery and Citizen
Attitudes. Public Administration Review, 64(1), 15–27.

[15] Moon, M. J. (2002). The Evolution of E-Government among Municipalities: Rhetoric or Reality?
Public Administration Review, 62(4), 424–433.
[16] Toasaki, Y. (2003). e-Government from A User’s Perspective. APEC telecommunication and
information working group, Chinese Taipei.

[17] Deloitte Consulting, & Deloitte & Touche. (2000). At the dawn of e-government: The citizen as
customer. New York: Deloitte Research. Retrieved from
http://www.egov.vic.gov.au/pdfs/egovernment.pdf

[18] Howard, M. (2001). E-government across the globe: how will’e’change government. E-Government,
90, 80.

[19] Shahkooh, K. A., Saghafi, F., & Abdollahi, A. (2008). A proposed model for e-Government
maturity. In Information and Communication Technologies: From Theory to Applications, 2008.
ICTTA 2008. 3rd International Conference on (pp. 1–5). Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?
arnumber=4529948

[20] Lee, G., & Kwak, Y. H. (2012). An Open Government Maturity Model for social media-based
public engagement. Government Information Quarterly. Retrieved from
http://www.sciencedirect.com/ science/article/pii/S0740624X1200086X

[21] Siau, K., & Long, Y. (2005). Synthesizing e-government stage models–a meta-synthesis based on
metaethnography approach. Industrial Management & Data Systems, 105(4), 443–458.

[22] Wescott, C. G. (2001). E-Government in the Asia-pacific region. Asian Journal of Political Science,
9(2), 1–24.

[23] Chandler, S., & Emanuels, S. (2002). Transformation not automation. In Proceedings of 2nd
European Conference on E-government (pp. 91–102). Retrieved from
http://books.google.com/books?hl=en
&lr=&id=3YZP9nBw7AUC&oi=fnd&pg=PA92&dq=Transformation+not+automation&ots=aFmY
qHo V3x&sig=61L6hnIMq50kPKoh9ujsdITEDD4

[24] Kim, D.-Y., & Grant, G. (2010). E-government maturity model using the capability maturity model
integration. Journal of Systems and Information Technology, 12(3), 230–244.

[25] Chen, J., Yan, Y., & Mingins, C. (2011). A Three-Dimensional Model for E-Government
Development with Cases in China’s Regional E-Government Practice and Experience. In
Management of e-Commerce and e-Government (ICMeCG), 2011 Fifth International Conference on
(pp. 113–120). Retrieved from
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6092643

[26] Windley, P. J. (2002). eGovernment maturity. USA: Windleys’ Technolometria. Retrieved from
http://www.windley.com/docs/eGovernment%20Maturity.pdf

[27] Reddick, C. G. (2004). A two-stage model of e-government growth: Theories and empirical
evidence for US cities. Government Information Quarterly, 21(1), 51–64.

[28] Rohleder, S. J., & Jupp, V. (2003). e-government Leadership: Engaging the customer. Accenture.

[29] N.A.O. (2002). Government on the Web II. Retrieved from


http://www.nao.org.uk/publications/0102/ government_on_the_web_ii. aspx
[30] Netchaeva, I. (2002). E-Government and E-Democracy A Comparison of Opportunities in the North
and South. International Communication Gazette, 64(5), 467–477.

[31] UN, & ASPA. (2001). Benchmarking E-government: A Global Perspective. Retrieved from
unpan1.un.org/intradoc/groups/public/documents/un/unpan021547.pdf

[32] Holden, S. H., Norris, D. F., & Fletcher, P. D. (2003). Electronic government at the local level:
Progress to date and future issues. Public Performance & Management Review, 325–344.

[33] Karokola, G., & Yngström, L. (2009). Discussing E-Government Maturity Models for Developing
World-Security View. In Proceedings of the Information Security South Africa Conference (pp. 81–
98). Retrieved from
http://www.researchgate.net/publication/220803190_A_Framework_for_Web_Services_
Security_Policy_Negotiation/file/9fcfd50f7d806aafc8.pdf#page=101

AUTHORS
Abdoullah Fath-Allah
He holds a bachelor degree in computer science (2005) and a master degree in computer
networks with a minor in software engineering (2007) from Alakhawayn University in
Ifrane, Morocco (AUI). Abdoullah has almost an 8 years’ experience in industry, and he is
an e-HR portals’ consultant. He is currently a PhD student at ENSIAS (Morocco).
Laila Cheikhi
She is a Professor at Computer Science and Systems Analysis School (ENSIAS, Rabat, Morocco). She
received a M.Sc. (2004) from University of Montréal and Ph.D. (2008) from ETS, University of Quebec
at Montreal, and Both in software engineering. She has over eight years of experience in computer
engineering at the Ministry of Finance of Morocco. Her research interests include software quality
models, software metrics, software engineering ISO standards, software product and process quality,
software engineering principles and data analysis.
Rafa E. Al-Qutaish
He is an Associate Professor at École de Technologie Supérieure (ÉTS), University of
Québec, Canada. He received B.Sc. in Computer Science and M.Sc. in Software
Engineering degrees in 1993 and 1998, respectively. Also, he received the Ph.D.
degree in Software Engineering from the School of Higher Technology (ÉTS),
University of Québec, Canada in 2007. His research interests are in Software
Measurement, Software Product Quality, Software Engineering Standardization,
Reverse Engineering, Software Comprehension and Maintenance, and Compiler
Construction. Dr. Al-Qutaish is a senior member of the IEEE & IEEE-CS, and also a
senior member of the IACSIT. http://www.rafa-elayyan.ca
Ali Idri

He is a Professor at Computer Science and Systems Analysis School (ENSIAS, Rabat,


Morocco). He received DEA (Master) (1994) and Doctorate of 3rd Cycle (1997)
degrees in Computer Science, both from the University Mohamed V of Rabat. He has
received his Ph.D. (2003) in Cognitive Computer Sciences from ETS, University of
Quebec at Montreal. His research interests include software cost estimation, software
metrics, fuzzy logic, neural networks, genetic algorithms and information sciences.
Citation Count – 113

A Review of Software Quality Models for the Evaluation of


Software Products
José P. Miguel1, David Mauricio2 and Glen Rodríguez3
1
Department of Exact Sciences, Faculty of Sciences, Universidad Peruana Cayetano Heredia,
Lima, Peru, 2 Faculty of System Engineering and Computing, National University of San
Marcos, Lima,Peru, 3 Faculty of Industrial and System Engineering, National University of
Engineering, Lima, Peru

ABSTRACT

Actually, software products are increasing in a fast way and are used in almost all activities of human life.
Consequently measuring and evaluating the quality of a software product has become a critical task for
many companies. Several models have been proposed to help diverse types of users with quality issues.
The development of techniques for building software has influenced the creation of models to assess the
quality. Since 2000 the construction of software started to depend on generated or manufactured
components and gave rise to new challenges for assessing quality. These components introduce new
concepts such as configurability, reusability, availability, better quality and lower cost. Consequently the
models are classified in basic models which were developed until 2000, and those based on components
called tailored quality models. The purpose of this article is to describe the main models with their
strengths and point out some deficiencies. In this work, we conclude that in the present age, aspects of
communications play an important factor in the quality of software.

KEYWORDS

Software Quality, Models, Software quality models, Software components, COTS

Full Text : http://airccse.org/journal/ijsea/papers/5614ijsea03.pdf


REFERENCES

[1] Côte M & Suryn W & Georgiadou E. (2007). ) “In search for a widely applicable and accepted
software quality model for software quality engineering paper,” Software Quality Journal, 15, 401–
416

[2] IEEE. (1990). IEEE Std 610.12-1990 (1990)- “IEEE Standard Glossary of Software Engineering
Terminology,”
http://web.ecs.baylor.edu/faculty/grabow/Fall2013/csi3374/secure/Standards/IEEE610.12.pdf

[3] IEEE. (1998). Standard for Software Maintenance, Software Engineering Standards Subcommittee
of the IEEE Computer Society.

[4] Xu Lai & Sjaak Brinkkemper. (2007). “Concepts of Product Software: Paving the Road for Urgently
Needed Research,” Technical report, Institute of Information and Computing Sciences, Utrecht
University, The Netherlands. European Journal of Information Systems 16, 531–541.

[5] ISO/IEC IS 9126-1. (2001). Software Engineering - Product Quality – Part 1: Quality Model.
International Organization for Standarization, Geneva, Switzerland.

[6] Thapar SS & Singh P & Rani S. (2012). “Challenges to the Development of Standard Software
Quality Model,” International Journal of Computer Applications (0975 – 8887) Volume 49– No.10,
pp 1-7.

[7] Mc Call, J. A. &, Richards, P. K. & Walters, G. F. (1977). Factors in Software Quality, Volumes I,
II, and III. US Rome Air Development Center Reports, US Department of Commerce, USA.

[8] Boehm, B. W., Brown, H., Lipow,M. (1978) “Quantitative Evaluation of Software Quality,” TRW
Systems and Energy Group, 1978

[9] Grady, R. B. (1992). Practical Software Metrics for Project Management and Process Improvement.
Prentice Hall, Englewood Cliffs, NJ, USA

[10] Dromey, R. G. (1995). “A model for software product quality,” IEEE Transactions on Software
Engineering, 21:146-162

[11] ISO/IEC TR 9126-2. (2003). Software Engineering - Product Quality - Part 2: External Metrics.
International Organization for Standardization, Geneva, Switzerland.

[12] ISO/IEC TR 9126-3. (2003): Software Engineering - Product Quality - Part 3: Internal Metrics,
International Organization for Standardization, Geneva, Switzerland.

[13] ISO/IEC TR 9126-4. (2004): Software Engineering - Product Quality - Part 4: Quality in Use
Metrics. International Organization for Standardization, Geneva, Switzerland.

[14] ISO/ IEC CD 25010. (2008). Software Engineering: Software Product Quality Requirements and
Evaluation (SQuaRE) Quality Model and guide. International Organization for Standardization,
Geneva, Switzerland.
[15] Bertoa, M & Vallecillo A. (2002). “Quality Attributes for COTS Components,” I+D Computación,
Vol 1, Nro 2, 128-144.

[16] Georgiadoui, Elli “GEQUAMO-A Generic, Multilayered, Customizable Software Quality model,”
Software Quality Journal, 11, 4, 313-323. DOI=10.1023/A:1025817312035

[17] Alvaro A & Almeida E.S. & Meira S.R.L. (2005). “Towards a Software Component Quality
Model,” Submitted to the 5th International Conference on Quality Software (QSIC).

[18] Rawashdeh A, & Matalkah Bassem. (2006). “A New Software Quality Model for Evaluating COTS
Components,” Journal of Computer Science 2 (4): 373-381, 2006

[19] Klas Michael & Constanza Lampasona & Jurgen Munch. (2011). “Adapting Software Quality
Models: Practical Challenges, Approach, and First Empirical Results,” 37th EUROMICRO
Conference on Software Engineering and Advanced Applications, 978-0-7695-4488-5/11, IEEE pp.
341-348

[20] Ayala Claudia & Hauge, Øyvind & Conradi Reidar & Franch Xavier & Li Jingyue. (2010).
“Selection of third party software in Off-The-Shelf-based software development—An interview
study with industrial practitioners,” The Journal of Systems and Software, pp 24-36

[21] Samarthyam G & Suryanarayana G & Sharma T, Gupta S. (2013). “MIDAS: A Design Quality
Assessment Method for Industrial Software,” Software Engineering in Practice, ICSE 2013, San
Francisco, CA, USA, pp 911-920

[22] Pensionwar Rutuja K & Mishra Anilkumar & Singh Latika. (2013). “A Systematic Study Of
Software Quality – The Objective Of Many Organizations, ” International Journal of Engineering
Research & Technology (IJERT), Vol. 2 Issue 5.

[23] Trendowicz, A & Punter, T. (2003) “Quality modeling for software product lines,” Proceedings of
the 7th ECOOP Workshop on Quantitative Approaches in Object-Oriented Software Engineering,
QAOOSE, Darmstadt, Germany

[24] Al-Badareen Anas Bassam. (2011). “Software Quality Evaluation: User’s View,” International
Journal of Applied Mathematics and Informatics, Issue 3, Volume 5, pp 200-207.

[25] Dubey, S.K & Soumi Ghosh & Ajay Rana. (2012). “Comparison of Software Quality Models: An
Analytical Approach,” International Journal of Emerging Technology and Advanced Engineering,
Volume 2, Issue 2, pp 111-119

[26] Al-Qutaish, Rafa E. (2010). “Quality Models in Software Engineering Literature: An Analytical and
Comparative Study,” Journal of American Science, Vol. 6(3), 166- 175

[27] Ghayathri J & Priya E. M. (2013) “Software Quality Models: A Comparative Study,” International
Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
,Volume 2, Issue 1, pp 42-51.

[28] Samadhiya Durgesh & Wang Su-Hua & Chen Dengjie.(2010), “Quality Models: Role and Value in
Software Engineering,” 2nd International Conference on Software Technology and
Engineering(ICSTE). Pp 320-324.
[29] ASQ (2007). American Society for Quality. Glossary. http://www.asq.org/glossary/q.html , jan 2007.

[30] Alvaro A. &. Almeida E.S & Meira. S.R.L (2010). “A Software Component Quality Framework,”
ACM SIGSOFT SEN 35, 1 (Mar. 2010), 1-4.

[31] Glott R. & Arne-Kristian Groven & Kirsten Haaland & Anna Tannenberg. (2010). “Quality models
for Free/Libre Open Source Software– towards the “Silver Bullet”?,” EUROMICRO Conference on
Software Engineering and Advanced Applications IEEE Computer Society, 439-446.

[32] Adewumi Adewole, Sanjay Misra and Nicholas Omoregbe. (2013). “A Review of Models for
Evaluating Quality in Open Source Software,” 2013 International Conference on Electronic
Engineering and Computer Science, IERI Procedia 4, 88 – 92.

[33] Haaland K & Groven AK & Regnesentral N & Glott R & Tannenberg A. (2010). “Free/Libre Open
Source Quality Models-a comparisonbetween two approaches,” 4th FLOS International Workshop
on Free/Libre/Open Source Software, pp. 1-17.

[34] Duijnhouwer FW & Widdows. (2003). “C. Open Source Maturity Model, ”. Capgemini Expert
Letter.

[35] Wasserman AI & Pal M & Chan C. (2006). “Business Readiness Rating for Open Source,”
Proceedings of the EFOSS Workshop, Como, Italy.

[36] Samoladas I & Gousios G & Spinellis D & Stamelos I. (2008). “The SQO-OSS quality model:
measurement based open source software evaluation,” Open source development, communities and
quality. 237-248.

[37] AL-Badareen Anas Bassam & Mohd Hasan Selamat & Marzanah A. Jabar & Jamilah Din &
Sherzod Turaev. (2011). “Software Quality Models: A Comparative Study”, J.M. Zain et al. (Eds.):
ICSECS 2011, Part I, CCIS 179, pp. 46–55. © Springer-Verlag Berlin Heidelberg
Citation Count – 86

People Factors in Agile Software Development and Project


Management
Vikash Lalsing1 , Somveer Kishnah2 and Sameerchand Pudaruth3

1TNT Express ICS Mauritius, Ebene Cybercity, Rose Hill and 2Department of Computer
Science Engineering, University of Mauritius, Reduit, Moka

ABSTRACT

With the increasing popularity of Agile Methods, many software organisations are moving away from
traditional methods to adopt Agile development methodologies. Instead of being predictive, Agile is
rather adaptive and people-focussed. It advocates a small and collaborative team that work closely
together. But team size is a factor that is in turn constrained by people factors. When implementing Agile,
these key factors are often overlooked. This study aims at identifying the underlying people factors to
consider when adopting Agile for a team to be effective. The method used is the study of three different
sized Agile teams developing products based on the same technologies and using Scrum. Both objective
and subjective measures were used and the results are supported by a survey. The results clearly show that
for agile methodologies to work well, it is crucial to select the right people for the right team.

KEYWORDS

Agile Methodology, Scrum, Agile Teams, Software Development, Project Management

Full Text : http://airccse.org/journal/ijsea/papers/3112ijsea09.pdf


REFERENCES

1. Abilla, P., 2006. Team Dynamics: Size Matters Redux. [Online]. Available:
http://www.shmula.com/team-dynamics-size-matters-redux/182/. [Accessed: 27th April 2011]

2. Agile Manifesto (2011). The Agile Manifesto. [Online]. Available : www.Agilemanifesto.org.


[Accessed: 10th August 2011)

3. Ambler, S.W., 2010a. 2010 IT Project Success Survey. [Online]. Available:


http://www.ambysoft.com/surveys/success2010.html. [Accessed: 1st April 2011]

4. Ancona, D.G., Caldwell, D.F., 1992. Work-groups; Organizational-climate;


Organizationaleffectiveness. Administrative Science Quarterly. 37(??)p. 634-65.

5. Baddeley A, Della Sala, S., 1996. Working memory and executive control. Philos. Trans. R. Soc.
Lond., B, Biol. Sci. 351 (1346): 1397–403.

6. Boehm, B., 1981, Software Engineering Economics, Englewood Cliffs, N.J., USA, Prentice-Hall.

7. Bahli, B. and Bu¨yu¨kkurt, M.D., 2005. Group performance in information systems project groups:
an empirical study, Journal of Information Technology Education, Vol. 4.

8. Bustamante, A., Sawhney, R., 2011. Agile XXL: Scaling Agile for Project Teams, Seapine Software,
Inc.

9. Brady, K., 2006. AGILE/SCRUM Fails to get to grips with Human Psychology. [Online]. Available:
http://www.claretyconsulting.com/it/comments/Agile-Scrum-fails-to-get-to-grips-with-
humanpsychology/2006-08-17/. [Accessed : 3rd August 2011]

10. Conboy, K. Coyle, S. Lero, X.W. Pikkarainen, M., 2011. People over Process: Key Challenges in
Agile Development July/August 2011 (vol. 28 no. 4) pp. 48-57

11. Csíkszentmihályi, M., 1990. Flow: The Psychology of Optimal Experience. New York: Harper and
Row, ISBN 0-06-092043-2.

12. Fayol, H., 1917. (French), Administration industrielle et générale; prévoyance,


organisation,commandement, coordination, contrôle. Paris, H. Dunod et E. Pinat.

13. Hastie, S., 2004. The Agile Mindset: what does it take to make this stuff work? Software Education
Associates Ltd, Agile Development Conference Wellington & Sydney, September 2004

14. Huckman, R.S., Staats, B.R. and Upton, D.M., 2009. Team familiarity, role experience, and
performance: evidence from Indian Software Services, Management Science, Vol. 55 No. 1, pp. 85-
100.

15. Johnson, R., 2008. Six Principles of Effective Management. [Online]. Available:
http://ezinearticles.com/?Six-Principles-of-Effective-Team-Management&id=1803062. [Accessed:
28th March 2011]
16. Kemerer, C., 1989. An agenda for research in the managerial evaluation of computer-aided software
engineering (CASE) tool impacts, Proceedings of the 22nd Annual Hawaii International Conference
on System Sciences, Hawaii, pp. 219-28.

17. Lencioni, P., 2002. The Five Dysfunctions of a Team. Jossey-Bass 18.Ong, A., Tan, G.W. and
Kankanhalli, A., 2005. Team expertise and performance in information systems development
projects, Proceedings of the 9th Asia Pacific Conference on Information Systems, Bangkok,
Thailand, July 7-10.

19. Standish Group., 2009. Chaos Report 2009. [Online]. Available from:
http://www1.standishgroup.com/newsroom/chaos_2009.php. [Accessed 20th May 2011].

20. Sudhakar, G.P. Farooq, A. Patnaik, S., 2011. Soft factors affecting the performance of software
development teams. Team Performance Management Vol. 17 No. 3/4, 2011 pp. 187-205

21. Tuckman, B., 1965. Developmental sequence in small groups. Psychological Bulletin 63 (6): 384–99

22. Whitworth, E., 2006. Agile Experience: Communication and Collaboration in Agile Software
Development Teams. M.A Carleton University, Canada.
Citation Count – 71

Factors Influencing Quality of Mobile Apps: Role of Mobile App


Development Life Cycle

Venkata N Inukollu1, Divya D Keshamoni2 , Taeghyun Kang 3 and Manikanta Inukollu


1
Department of Computer Science Engineering, Texas Tech University, USA, 2Rawls College of
Business, Texas Tech University, USA
3
Department of Computer Science Engineering, Wake forest university, USA and 4Department
of Computer Science, Bhaskar Engineering College, India

ABSTRACT

In this paper, The mobile application field has been receiving astronomical attention from the past few
years due to the growing number of mobile app downloads and withal due to the revenues being
engendered .With the surge in the number of apps, the number of lamentable apps/failing apps has withal
been growing. Interesting mobile app statistics are included in this paper which might avail the developers
understand the concerns and merits of mobile apps. The authors have made an effort to integrate all the
crucial factors that cause apps to fail which include negligence by the developers, technical issues,
inadequate marketing efforts, and high prospects of the users/consumers. The paper provides suggestions
to eschew failure of apps. As per the various surveys, the number of lamentable/failing apps is growing
enormously, primarily because mobile app developers are not adopting a standard development life cycle
for the development of apps. In this paper, we have developed a mobile application with the aid of
traditional software development life cycle phases (Requirements, Design, Develop, Test, and,
Maintenance) and we have used UML, M-UML, and mobile application development technologies.

KEYWORDS

Mobile applications, low quality/bad apps, mobile apps marketing, Mobile Application development,
Mobile Software Engineering, M-UML, UML

Full Text : http://airccse.org/journal/ijsea/papers/5514ijsea02.pdf


REFERENCES

[1] Mobile application history, http://en.wikipedia.org/wiki/Mobile_app

[2] Mobile Stats, http://www.slideshare.net/vaibhavkubadia75/mobile-web-vs-mobile-


apps27540693?from_search=1

[3] Mobile Website vs Apps, http://www.hswsolutions.com/services/mobile-web-


development/mobilewebsite-vs-apps/

[4] Uskov, V.L., "Mobile software engineering in mobile computing curriculum," Interdisciplinary
Engineering Design Education Conference (IEDEC), pp.93,99, 4-5 March 2013

[5] Users Reveal Top Frustrations that Lead to Bad Mobile App Reviews, statistics report,
https://blog.apigee.com/detail/users_reveal_top_frustrations_that_lead_to_bad_mobile_app_reviews
_ infographic

[6] Wooldridge, Dave, and Michael Schneider. The business of iPhone app development: Making and
marketing apps that succeed. Apress, 2010

[7] Android applications stats report, http://www.appbrain.com/stats/number-of-android-apps

[8] An App “Middle Class” Continues To Grow, http://techcrunch.com/2013/11/08/an-app-middle-


classcontinues-to-grow-independently-owned-apps-with-a-million-plus-users-up-121-in-past-18-
months

[9] Developers attitude towards app marketing, http://appflood.com/appflood-


wordpress/wpcontent/uploads/2013/06/AppFlood-Developer-Attitudes-to-App-Marketing-2013.pdf

[10] When mobile apps go bad, http://www.infoworld.com/d/mobile-technology/when-mobile-apps-


gobad-178063

[11] Make a good app to great app http://gigaom.com/2008/03/26/what-makes-a-good-mobile-


applicationgreat/

[12] Wasserman, Tony. "Software engineering issues for mobile application development." FoSER 2010
(2010)

[13] Pekka Abrahamsson, "Mobile-D: an agile approach for mobile application development' Approach"
Conference on Object Oriented Programming Systems Languages and Applications, pp l74 - 175,
2004.

[14] Tracy, Kim W. "Mobile Application Development Experiences on Apple’s iOS and Android OS."
Potentials, IEEE 31, no. 4 (2012): 30-34.

[15] Jeong, Yang-Jae, Ji-Hyeon Lee, and Gyu-Sang Shin. "Development process of mobile application
SW based on agile methodology." In Advanced Communication Technology, 2008. ICACT 2008.
10th International Conference on, vol. 1, pp. 362-366. IEEE, 2008.
[16] Agboma, Florence, and Antonio Liotta. "Addressing user expectations in mobile content delivery."
Mobile Information Systems 3, no. 3 (2007):153-164.

[17] Inukollu, Venkata Narasimha, Sailaja Arsi, and Srinivasa Rao Ravuri. " High level view of cloud
security: issues and solutions." International Journal of Computer Science & Information
Technology 6, no. 2 (2014).

[18] Pressman, Roger S., and Darrel Ince. Software engineering: a practitioner's approach. Vol. 5. New
York: McGraw-hill, 1992.

[19] Rubin, K. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Addison-Wesley
Professional, 2012.

[20] Wasserman, Tony. "Software engineering issues for mobile application development." FoSER 2010
(2010).

[21] Kniberg, H. Scrum and XP from the Trenches (Enterprise Software Development). Lulu, come, 2007

[22] World Mobile Applications Market - Advanced Technologies, Global Forecast (2010 - 2015) report
by arkets&Markets,http://www.marketsandmarkets.com /Market-Reports/mobile-
applications228.html

[23] “Worldwide and U.S. Mobile Applications,Storefronts, and Developer 2010 – 2014 Forecasts and
Year-End 2010 Vendor Market Shares: The "Appification" of Everything” report by IDC,
http://www.idc.com/

[24] Mobile application development tools and techniques,


http://en.wikipedia.org/wiki/Mobile_application_development

[25] G. Booch, J. Rumbaugh, I. Jacobson, The Unified Modeling Language User Guide, Addison-
Wesley, Reading, MA, 1998.

[26] Saleh, Kassem, and Christo El-Morr.the "M-UML: an extension to UML for the modeling of mobile
agent-based software systems." Information and Software Technology 46, no. 4 (2004): 219-227.

[27] Social,networking,history,principles,http://en.wikipedia.org/wiki/Social_network

[28] Tracy, Kim W. "Mobile Application Development Experiences on Apple’s iOS and Android
OS."Potentials, IEEE 31, no. 4 (2012): 30-34.

[29] Android SDK, http://developer.android.com/sdk/index.html

[30] Kalra, Gursev. "Mobile Application Security Testing." Foundstone Professional Services, a division
of McAfee, http://www. foundstone. com (2009).

[31] Thompson, Chris, Jules White, Brian Dougherty, and Douglas C. Schmidt. "Optimizing mobile
application performance with model–driven engineering." In Software Technologies for Embedded
and Ubiquitous Systems, pp. 36-46. Springer Berlin Heidelberg, 2009.
[32] Pekka Abrahamsson, "Mobile-D: an agile approach for mobile application development' Approach"
Conference on Object Oriented Programming Systems Languages and Applications, ppl74 - 175,
2004.

[33] Yang-Jae Jeong; Ji-Hyeon Lee; Gyu-Sang Shin, "Development Process of Mobile Application SW
Based on Agile Methodology," Advanced Communication Technology, 2008. ICACT 2008. 10th
International Conference on, pp.362,366, 17-20 Feb. 2008
Citation Count – 63

Code Quality Evaluation Methodology Using The ISO/IEC 9126


Standard

Yiannis Kanellopoulos1, Panos Antonellis2, Dimitris Antoniou2 , Christos Makris2


, Evangelos Theodoridis2 , Christos Tjortjis*3,4, and Nikos Tsirakis2
1
University of Manchester, School of Computer Science, Manchester, U.K., 2 Dept. of Computer
Engineering and Informatics, University Of Patras, Greece, 3 Dept. of Computer Science, Univ. of
Ioannina, P.O. 1186, 45110, Ioannina, Greece and 4 Dept. of Engineering Informatics and Telecoms,
University of W. Macedonia, Greece

ABSTRACT

This work proposes a methodology for source code quality and static behaviour evaluation of a software
system, based on the standard ISO/IEC-9126. It uses elements automatically derived from source code
enhanced with expert knowledge in the form of quality characteristic rankings, allowing software
engineers to assign weights to source code attributes. It is flexible in terms of the set of metrics and source
code attributes employed, even in terms of the ISO/IEC-9126 characteristics to be assessed. We applied
the methodology to two case studies, involving five open source and one proprietary system. Results
demonstrated that the methodology can capture software quality trends and express expert perceptions
concerning system quality in a quantitative and systematic manner.

KEYWORDS

Software Quality Management, Static Analysis, Software Metrics, ISO/IEC 9126

Full Text : http://airccse.org/journal/ijsea/papers/0710ijsea2.pdf


REFERENCES

[1] Tian, J. (2004) “Quality-Evaluation Models and Measurements”. IEEE Software, 21: 84-91.

[2] ISO/IEC 9126, (2003) Software Engineering – Product Quality Int’l Standard.

[3] Jung, H.W., Kim, S. and Chung, C. (2004) “Measuring Software Product Quality: A Survey of
ISO/IEC 9126”. IEEE Software, 21: 88-92.

[4] Saaty, T. (1990) Multicriteria Decision Making: The Analytic Hierarchy Process, RWS Publications.

[5] Chidamber, S.R. and Kemerer C.F. (1994) “A Metrics Suite for Object Oriented Design”, IEEE
Transactions on Software Engineering, 20: 476-493.

[6] Wakil, M.E., Bastawissi, A.E., Boshra, M. and Fahmy, A. (2004) “Object Oriented Design Quality
Models – A Survey and Comparison”. 2 nd Int’l Conf. on Informatics and Systems.

[7] Hyatt, L.E. and Rosenberg, L.H. (1997) “Software Metrics Program for Risk Assessment”, Elsevier
Acta Astronautica, 40: 223-233.

[8] Bansiya, J. and Davis, C.G. (2002) “A Hierarchical Model for Object-Oriented Design Quality
Assessment”, IEEE Transactions on Software Engineering, 28: 4-19.

[9] Cote, M.A, Syryn, W., Martin, A.R. and Laport, Y.C. (2004) “Evolving a Corporate Software
Quality Assessment Exercise: A Migration Path to ISO/IEC-9126”, SQP, 6: 4-17.

[10] Al Kilidar, H., Cox, K. and Kitchenham B. (2005) “The use and usefulness of the ISO/IEC 9126
quality standard.” IEEE Int’l Symposium on Empirical Software Engineering, pp. 126-132.

[11] Heitlager I., Kuipers T., and Visser J. (2007) “A Practical Model for Measuring Maintainability”,
Proc. 6th IEEE Int’l Conf. Quality of Information and Communications Technology, pp. 30-39.

[12] Plösch R., Gruber H., Hentschel A., Körner C., Pomberger G., Schiffer S., Saft M., Storck S., (2007)
“The EMISQ Method - Expert Based Evaluation of Internal Software Quality”, Proc. 3rd IEEE
Systems and Software Week, pp. 99-108.

[13] Pressman, S.R. (2005) Software Engineering, A Practitioner’s Approach”, McGraw - Hill.

[14] Whitmire S.A. (1997) Object – Oriented Design Measurement, New York: John Wiley & Sons Inc.

[15] Ambler, S.W. (2004) The Object Primer: Agile Model-Driven Development with UML 2.0,
Cambridge University Press.

[16] Lehman, M.M. (1980) “Programs, Life Cycles, and Laws of Software Evolution”, Proc. IEEE, 68:9,
1060-1076.

[17] Kanellopoulos Y. and Tjortjis C., (2004) “Data Mining Source Code to Facilitate Program
Comprehension: Experiments on Clustering Data Retrieved from C++ Programs”, Proc. IEEE 12th
Int’l Workshop Program Comprehension, pp. 214-223.
[18] Antonellis P., Antoniou D., Kanellopoulos Y., Makris C., Theodoridis E., Tjortjis C., Tsirakis N.,
(2009) “Code4Thought Project: Employing the ISO/IEC-9126 standard for Software Engineering -
Product Quality Assessment”, Proc. IEEE 13th European Conf. Software Maintenance and
Reengineering, pp. 297-300.

[19] Tjortjis C., Sinos L. and Layzell P.J., (2003) “Facilitating Program Comprehension by Mining
Association Rules from Source Code”, Proc. IEEE 11th Int’l Workshop Program Comprehension,
pp. 125-132.

[20] Spinellis, D. (2006) Code Quality: The Open Source Perspective, Addison-Wesley.

[21] Lehman, M.M. and Belady, L.A. (1985) Program Evolution – Processes of Software Change, Acad.
Press.

[22] Geronimo, 2010, http://geronimo.apache.org/

[23] JBoss, 2009, http://www.jboss.com/downloads/

[24] McCabe, T.J. (1976) “A Complexity Measure”, IEEE Trans. on Software Engineering, 2: 308-320.

[25] Apache, 2010, http://cwiki.apache.org/GMOxDOC11/release-notes-11txt.html

[26] JBoss, 2010, jira.jboss.org/secure/ReleaseNote.jspa?version=12310655&styleName=


Html&projectId=10030&Create=Create

[27] Wengo, 2009, http://www.openwengo.org/, http://www.qutecom.org/

AUTHORS

Short Biography

Yiannis Kanellopoulos is a senior consultant at SIG, based in the Netherlands. He


is responsible for carrying out software quality and risk assessments for corporate
and public clients. He holds an MSc in Information Systems Engineering and a
PhD from University of Manchester, School of Computer Science. His PhD Thesis
was related to the application of data mining techniques for supporting software
systems maintenance. He has ample experience in managing software
implementation projects.

Panos Antonellis is a Computer Engineer and a PhD student at the Dept. of


Computer Engineering and Informatics, School of Engineering, Univ. of Patras.

Dimitris Antoniou is a Computer Engineer and Researcher in the Dept. of Computer


Engineering and Informatics at the University of Patras. He has obtained his diploma
from the Department in 2004 and his MSc in 2006. Since 2006, he has been a Ph.D.
student at the same Dept. His research interests focus on Data Structures,
Information Retrieval, String algorithmics, and bioinformatics, Software Quality
Assessment, Web Technologies and GIS. He has scientific work published in int’l
journals and conferences.
Christos Makris was born in Greece, in 1971. He graduated from the Dept. of
Computer Engineering and Informatics, University of Patras, in December 1993. He
received his Ph.D. degree from the Dept. of Computer Engineering and Informatics,
in 1997. He is now an Assistant Professor in the same Department. His research
interests include Data Structures, Web Algorithmics, Computational Geometry, Data
Bases and Information Retrieval. He has published over 60 papers in scientific
journals and refereed conferences.

Evangelos Theodoridis was born in Greece, in 1978. He graduated from the Dept.
of Computer Engineering and Informatics, School of Engineering, University of
Patras, in December 2002. He received his MSc. and a PhD degree from the same
Dept. His research interests include Data Structures, Web Algorithmics, Data
Bases and Information Retrieval and Bioinformatics.

Christos Tjortjis is an adjunct Senior Lecturer at the University of Ioannina, Dept.


of Computer Science and the University of W. Macedonia, Dept. of Engineering
Informatics and Telecoms’ and an hon. Lecturer at the University of Manchester,
School of Comput er Science. He holds an MEng in Computer Engineering and
Informatics from Patras, a BA in Law from Thrace, an MPhil in Computation
from UMIST and a PhD in Informatics from Manchester. His research interests
are in data mining, software comprehension and maintenance.

Nikos Tsirakis is a Computer Engineer and Researcher at the Dept. of Computer


Engineering and Informatics at the University of Patras. He obtained his B.Eng.
from the Dept. in 2004 and an MSc in 2006. Since 2006 he is a PhD student at the
same Dept. His research focuses on String algorithmics and data structures,
Hypertext modelling and searching, Software Quality Assessment, Web
Technologies and GIS. He has scientific work published in int’l journals and
conferences, and he co-authored books & encyclopaedia chapters.
Citation Count – 56

Different Approaches To Black box Testing Technique For Finding


Errors

Mohd. Ehmer Khan

Department of Information Technology Al Musanna College of Technology, Sultanate of Oman

ABSTRACT

Software testing is the process of analyzing software to find the difference between required and existing
condition. Software testing is performed throughout the development cycle of software and it is also
performed to build quality software, for this purpose two basic testing approaches are used, they are
white box testing and black box testing. One of the software testing technique which I have explain in my
paper is Black Box Testing, it is a method of generating test cases that are independent of software
internal structure, I have also briefly explore various different approaches to black box testing technique
for finding errors. Since black box testing is always based either directly or indirectly on the software
specification so it is also called specification based testing.

KEYWORDS

Equivalence Partitioning, Boundary Value Analysis, Fuzz Testing, Orthogonal Array Testing, All Pair
Testing

Full Text: http://www.airccse.org/journal/ijsea/papers/1011ijsea04.pdf


REFERENCES

[1] Black Box Test Tool available at https://buildsecurityin.us-cert.gov/bsi/articles/tools/blackbox/261-


BSI.html

[2] Advantages and Disadvantages of Black Box Testing available at


http://www.geekinterview.com/blogs/243-advantages-and-disadvantages-black-box-testing.html

[3] The Pros and Cons of Black Box Testing Technique available at
http://www.testplant.com/download_files/BB_vs_WB_testing.pdf

[4] Black Box Testing available at http://www.webopedia.com/TERM/B/Black_Box_Testing.html

[5] An Integrated Approach to Software Engineering (Third Edition) by Pankaj Jalote, published in
Narosa Publishing House Pvt. Ltd.

[6] Black Box Testing available at http://www.softwaretestinghelp.com/black-box-testing/

[7] Boundary Value Analysis by Blake Neate (327966) available at


http://www.cs.swan.ac.uk/~csmarkus/CS339/dissertations/NeateB.pdf

[8] Fuzzing available at https://www.owasp.org/index.php/Fuzzing

[9] Example of Cause Effect Graph proposed by G. J. Mayers on 13/9/2007

[10] Standard glossary of terms used in Software Testing (ISTQB) version 2.1 (dd. April 1st, 2010) by
Erik van Veenendaal (The Netherlands)

[11] Orthogonal Testing available at http://mytestingexp.wordpress.com/2010/08/05/orthogonaltesting-


and-pairwise-testing/

[12] The new age of Black Box Testing available at


http://www.globalservicesmedia.com/ITOutsourcing/Product-Development/The-New-Age-of-Black-
BoxTesting/22/4/0/GS100208218035
AUTHOR

Mohd. Ehmer Khan

I completed my B.Sc in 1997 and M.C.A. in 2001 from Aligarh Muslim University, Aligarh, India, and
pursuing Ph.D (Computer Science) from Singhania University, Jhunjhunu, India. I have worked as a
lecturer at Aligarh College Engineering & Management, Aligarh, India from 1999 to 2003. From 2003 to
2005 worked as a lecturer at Institute of Foreign Trade & Management, Moradabad, India. From 2006 to
present working as a lecturer in the Department of Information Technology, Al Musanna College of
Technology, Ministry of Manpower, Sultanate of Oman. I am recipient of PG Merit Scholarship in MCA.
My research area is software engineering with special interest in driving and monitoring program
executions to find bugs, using various software testing techniques.
Citation Count – 52

MCA Based Performance Evaluation of Project Selection


Tuli Bakshi1 and Bijan Sarkar2
1
Department of Computer Application, Calcutta Institute of Technology, Howrah, India
2
Department of Production Engineering, Jadavpur University, Kolkata, India

ABSTRACT

Multi-criteria decision support systems are used in various fields of human activities. In every alternative
multi-criteria decision making problem can be represented by a set of properties or constraints. The
properties can be qualitative & quantitative. For measurement of these properties, there are different
unit, as well as there are different optimization techniques. Depending upon the desired goal, the
normalization aims for obtaining reference scales of values of these properties. This paper deals with a
new additive ratio assessment method. In order to make the appropriate decision and to make a proper
comparison among the available alternatives Analytic Hierarchy Process (AHP) and ARAS have been
used. The uses of AHP is for analysis the structure of the project selection problem and to assign the
weights of the properties and the ARAS method is used to obtain the final ranking and select the best one
among the projects. To illustrate the above mention methods survey data on the expansion of optical fibre
for a telecommunication sector is used. The decision maker can also used different weight combination in
the decision making process according to the demand of the system.

KEYWORDS

Multi-criteria decision support system, AHP, ARAS & Project selection

Full Text : http://www.airccse.org/journal/ijsea/papers/0411ijsea02.pdf


REFERENCES

[1] PMBOK Guide (2004), A guide to the project management body of know, Third Edition, pp 5-7

[2] C.L.Hwang & K.P.Yoon, (1995) “Multiple Attribute Decision Making and Introduction”, London, Sage
Publication, pp2.

[3] Lombera J.-T. S.-J., Rojo J.C, (2010) “Industrial building design stage based on a system approach to their
environmental sustainability”, Construction and Building Materials, Vol. 24, No. 4, pp. 438–447.

[4] Lombera J.-T. S.-J., Aprea I.G, (2009) “A system approach to the environmental analysis of industrial
buildings”, Building and Environment, Vol. 45, No. 3, pp. 673-683.

[5] Juan Y.-K., Gao P., Wang I (2010) “A hybrid decision support system for sustainable office building
renovation and energy performance improvement”, Energy and Buildings, Vol. 42, No. 3, pp. 290-297.

[6] Morkvenas, R;Bivainis J; Jarzemsks,A (2008), “Assessment of employee’s knowledge potential in transport
sector”, Transport 23(3):258-265.

[7] Maskeliunaite, L; Sivilevicius, H; Podvezko, V.(2009), “ Research on the quality of passenger transportation
by railway”, Transport 24 (2):100-112.

[8] Satty T.L.(1980), The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation. Mcgraw-
Hill.287p.

[9] Satty T.L. (1996) , The Analytic Network Process. RWS Publications Pittsburgh.

[10] Hwang, C.L; Yoon, K.(1981) .Multiple Attribute Decision Making: Methods and Applications; A state of the
Art Survey. 1st edition. Springer. 259p

[11] Wang, T.C; Lee, H-D. (2009) , “ Developing a fuzzy TOPSIS approach based on subjective weights and
objective weights”, Expert Sustems with Applications 36 (5): 8980-8985.

[12] Datta, S., Beriha, G.S., Patnaik,B., Mahapatra, S.S.(2009), “ Use of compromise ranking method for supervisor
selection: A multi-criteria decision making (MCDM) approach “, International Journal of Vocational and
Technical Education, vol.1(1),pp.007-013.

[13] Zavadskas, E.K., Kaklauskas, A., Turskis, Z., Tamosaitiene, J.(2008c) , “ Selection of the effective dwelling
house walls by applying attributes values determined at intervals.” Journal of Civil Engineering and
Management, 14 (2), 85-93.

[14] Zavadskas, E.K., Turskis, Z., Tamosaitiene, J, Marina , V. ,(2008d) , “ Multicriteria selection of project
managers by applying grey criteria”, Technological and Economic Development of Economy, 14(4) , 462- 477

[15] Zavadskas, E.K., Kaklauskas, A., Turskis, Z., Tamosaitiene, J, (2009b), “Multi-attribute decision-making
model by applying grey numbers”, Informatica,20(2), 305-320

[16] MacCrimon, K.R.(1968) , Decision Making Among Multiple- Attribute Alternatives: A Survey and
Consolidated Approach.RAND Memorandum, RM-4823-ARPA. The Rand Corporation, Santa Monica , CA.

[17] Srinivasan, V., Shocker, A. D.,(1973), “ Linear programming techniques for multidimensional analysis of
privileged”, Psychometrika,38, 337-369.

[18] Turskis , Z., Zavadskas , E.K. (2010), “ A new Fuzzy Additive Ratio Assessment Method ( ARAS-F) . Case
Study: The analysis of Fuzzy Multiple Criteria in order to select the logistic centers location” Transport 25(4):
423-432.
[19] Seo F (1981), “Organizational aspects of multicriteria decision making”, Lecture Notes in Economics and
Mathematical System, Berlin, Heidelberg, New York, pp. 363-379.

[20] Saaty T.L (1977), “A scaling method for priorities in hierarchical structures”, Journal of Mathematical
Psychology, Vol. 15, pp. 234-281.

[21] MacCrimon K.R (1968), “Decision marking among multiple-attribute alternatives: a survey and consolidated
approach”, RAND Memorandum, RM-4823-ARPA, The Rand Corporation, Santa Monica, Calif..

[22] Larichev O (2000), “Decision-making theory and methods”, Moscow: Logos (in Russian).

[23] Zavadskas E.K., Kaklauskas A (1996), “Determination of an efficient contractor by using the new method of
multicriteria assessment”, [in:] D.A. Langford, A. Retik (Eds.) International Symposium for “The Organisation
and Management of Construction”. Shaping Theory and Practice, Vol. 2: Managing the Construction Project
and Managing Risk, CIB W 65; London, Weinheim, New York, Tokyo, Melbourne, Madras, London: E and
FN SPON, pp. 94–104.

[24] Podvezko V., Podviezko A(2010), “Dependence of multi-criteria evaluation result on choice of preference
functions and their parameters”, Technological and Economic Development of Economy, Vol. 16, No. 1, pp.
143-158.

[25] Zavadskas E.K., Kaklauskas A., Vlutienė T(2009), “Multicriteria evaluation of apartment blocks maintenance
contractors: lithuanian case study”, International Journal of Strategic Property Management, Vol. 13, No. 4,
pp. 319–338.

[26] Liaudanskiene R., Ustinovicius L., Bogdanovicius A(2009), “Evaluation of construction process safety
solutions using the TOPSIS method”, Inzinerine Ekonomika - Engineering Economics, No. 4, pp. 32-40.

[27] Morteza Pakdin Amiri(2010),“Project selection for oil-fields development by using the AHP and fuzzy
TOPSIS methods”, Expert Systems with Applications 37 ,pp.6218-6224.

[28] Carey Hepler, Glenn Mazur (2007), “The Analytic Hierarchy Process: Methodologies and Application with
customers and Management at Blue Cross Blue Shield of Florida”, ISQFD’07- Williamsburg the 19th
Symposium on QFD,pp-137-149.

[29] Vaidya,O.S. and Kumar,S (2006), “Analytic hierarchy process: An overview of applications”, European
Journal of Operational Research, Vol:169,pp.1-29.

[30] Liedtka,S.L. (2005) , “Analytic hierarchy process and multi-criteria performance management systems”, Cost
Management , (November/December), pp-30-38.

[31] P.R.Drake (1998), “Using the Analytic Hierarchy Process in Engineering Education”,Int.J.Engng Ed., Vol. 14,
No.3, pp.-191-196.

[32] Evangelos Triantaphyllou, Stuart H.Mann (1995), “Using the Analytic Hierarchy process for decision making
in engineering applications:some challenges”,Inter’l Journal of Industrial Engineering:Applications and
Practice, Vol.2, No.1 , PP.-35-44.

[33] Brans J.P., Mareschal B., Vincke P(1984), “PROMETHEE: A new family of outranking methods in
multicriteria analysis”, J.P. Brans, (Ed.), IFORS 84, North Holland, Amsterdam, pp. 477–490.

[34] E.K.Zavadskas, Z.Turskis, T. Vilutiene (2010), “Multiple criteria analysis of foundation instalment alternatives
by applying Additive Ratio Assessment (ARAS) method”, Archives of civil and mechanical engineering,
Vol.X, No.3, pp. 123-141.
[35] Edmundas Kazimieras Zavadskas, Zenonas Turskis (2010), “A new Additive Ratio Assessment ( ARAS)
method in multicriteria decision – making” , Technological and economic development of economy, Baltic
journal on sustainability, 16 (2) : pp 159-172.

[36] Javad Dodangeh , Majid Mojahed, Rosnah bt Mohd Yusuff (2009), “ Best project selection by using of Group
TOPSIS Method”, International Association of Computer Science and Information Technology – Spring
Conference.

AUTHORS
TULI BAKSHI

She works as an assistant professor in Computer Application department in Calcutta Institute of


Technology, West Bengal, India. She possess three master degrees in Applied Mathematics, Computer
Application and Information Technology

DR. BIJAN SARKAR

He is the Professor and Former Head of Production Engineering Department, Jadavpur University,
Kolkata, India. He has received Outstanding Paper Award at Emerald Literati Network for Excellences
2006, UK. He had also received the Best paper Awards from “Indian Institute of Industrial Engineering
(IIIE), Mumbai” for the year 2002 and 2003. He was also awarded Certificates of Merit by the
“Institution of Engineers India)” during 2001-02 and 2002-03. He is the Co-author of the book on
Production Management published by AICTE,CEP, New Delhi. He has published more than 150 papers
in the National / International Journals and Proceedings. He is the Reviewer of IJPR, EJOR, and IE (I).
His fields of interests include Tribology, Reliability engineering, AI, Soft-computing applications and
Decision engineering.
Citation Count – 45

Formalization of the Data Flow Diagram Rules for Consistency


Check
Rosziati Ibrahim and Siow Yen Yen

Department of Software Engineering, Faculty of Computer Science and Information Technology,


Universiti Tun Hussein Onn Malaysia (UTHM), Parit Raja, 86400, Batu Pahat, Johor Malaysia

ABSTRACT

In system development life cycle (SDLC), a system model can be developed using Data Flow Diagram
(DFD). DFD is graphical diagrams for specifying, constructing and visualizing the model of a system.
DFD is used in defining the requirements in a graphical view. In this paper, we focus on DFD and its
rules for drawing and defining the diagrams. We then formalize these rules and develop the tool based on
the formalized rules. The formalized rules for consistency check between the diagrams are used in
developing the tool. This is to ensure the syntax for drawing the diagrams is correct and strictly followed.
The tool automates the process of manual consistency check between data flow diagrams.

KEYWORDS

Consistency Check, Context Diagram, Data Flow Diagram, Formal Method

Full Text : http://airccse.org/journal/ijsea/papers/1010ijsea6.pdf


REFERENCES

[1] Ahmed Jilani, A. A., Nadeem, A., Kim, T. H. and Cho, E. S. (2008). Formal Representations of the Data Flow
Diagram: A Survey. Proc. of the 2008 Advanced Software Engineering and Its Applications. Washington,
USA: IEEE Computer Society. pp. 153-158.

[2] Lucas, F.J., Molina, F. and Toval, A. (2009). A Systematic Review of UML Model Consistency Management.
Information and Software Technology, 51(12), pp. 1 – 15.

[3] Dennis, A., Wixom, B.H. and Roth, R.M. (2006). Systems Analysis and Design. 3rd ed. Hoboken: John Wiley
& Sons, Inc.

[4] Dixit, J. B. and Kumar, R. (2008). Structured System Analysis and Design. Paperback ed. New Delhi, India:
Laxmi Publisher.

[5] Tao, Y.L. and Kung, C.H. (1991). Formal Definition and Verification of Data Flow Diagrams. Journal of
Systems and Software, 16(1), pp. 29-36.

[6] Tong, L. and Tang, C.S. (1991). Semantic Specification and Verification of Data Flow Diagrams. Journal of
Computer Science and Technology, 6(1), pp. 21-31.

[7] Lee, P.T and Tan, K.P. (1992). Modelling of visualized data-flow diagrams using Petri Net Model. Software
Engineering Journal, January 1992, pp. 4-12.

[8] Kim, D.H. and Chong, K. (1996). A Method of Checking Errors and Consistency in the Process of
ObjectOriented Analysis. Proceedings of the 1996 Third Asia-Pacific Software Engineering Conference.
Korea: IEEE Computer Society. Pp. 208-216.

[9] Rosziati Ibrahim and Noraini Ibrahim. A Tool for Checking Conformance of UML Specification. Proceedings
of the 2009 World Academic of Science and Technology (WASET), Volume 51 (v51-45), pp262-266.

[10] Leavens, G.T., Wahls, T. and Bakar, A.L. (1999). Formal Semantics for SA Style Data Flow Diagram
Specification Languages. Proceedings of the 1999 ACM Symposium on Applied Computing. Oregon, US:
IEEE Computer Society. pp. 526–532.

[11] Jeffrey, A. H., George, J.F. and Valacich, J.S. (2002) Modern Systems Analysis and Design. 3rd ed. US:
Prentice-Hall.

[12] Donald, S. and Le Vie, Jr. (2000). Understanding Data Flow Diagram. Proceedings of the 47th annual
conference on Society for Technical Communication. Texas: Integrated Concepts, Inc.

[13] Gao Xiaolei and Huaikou Miao. (2008). The Axiomatic Semantics of PDFD. Proceedings of the 2008 Japan-
China Joint Workshop on Frontier of Computer Science and Technology, IEEE Computer Society, pp. 139-
146.
AUTHORS

Rosziati Ibrahim is with the Software Engineering Department, Faculty of


Computer Science and Information Technology, Universiti Tun Hussein Onn
Malaysia (UTHM). She obtained her PhD in Software Specification from the
Queensland University of Technology (QUT), Brisbane and her MSc and
BSc (Hons) in Computer Science and Mathematics from the University of
Adelaide, Australia. Her research area is in Software Engineering that covers
Software Specification, Software Testing, Operational Semantics, Formal
Methods, Data Mining and Object-Oriented Technology.

Siow Yen Yen is a student at the Department of Software Engineering,


Faculty of Computer Science and Information Technology, Universiti Tun
Hussein Onn Malaysia (UTHM), Batu Pahat, Johor, Malaysia.
Citation Count – 40

Survey of maintenance policies for the Last 50 Years


Asis Sarkar1 Dr Subhash Chandra Panja2 and Dr Bijan Sarkar 3
1
Department of mechanical Engineering N.I.T.Agartala, P.O.:- t.e.c, Barjala, Agartala: - 799055,(India),
2
Department of mechanical Engineering P.O.—Jadavpur University Calcutta:--700032,(India) and
3
Department of Production Engineering P.O:-- Jadavpur University Calcutta:--700032,(India)

ABSTRACT

In the past several decades, maintenance and replacement problems have been extensively
studied in the literature. Thousands of maintenance and replacement models have been created.
However, all these models can fall into some categories of maintenance policies: age
replacement policy, block replacement policy, periodic preventive maintenance policy, failure
limit policy, sequential preventive maintenance policy, repair cost limit policy, repair time limit
policy, repair number counting policy, reference time policy, mixed age policy, group
maintenance policy, opportunistic maintenance policy, etc. Each kind of policy has different
characteristics, advantages and disadvantages with lot of contributions from Research scientist,
Technologists... This survey summarizes, classifies, and compares various existing maintenance
policies Around 170 Authors and their research works are presented in the Reference section. It
will help to look into the different policies which is appropriate to the organization and for
further study the reference section will be helpful for the researchers for further knowledge

KEYWORDS

Maintenance policy; Maintenance; Reliability; Replacement; Optimization

Full Text : http://www.airccse.org/journal/ijsea/papers/0711ijsea10.pdf


REFERENCES
.
(1) Gertsbakh I. Reliability theory with applications to preventive maintenance. Springer, Berlin: 2000,pp 23-190

(2) Barlow RE, Proschan F. “Mathematical theory of reliability”John Wiley and sons, Sydney1967;pp 46-117

(3) Badı´a FG, Berrade MD, Campos CA. Optimization of inspection intervals based on cost. J Appl Probab 2001;
vol 38:872–81.

(4) Badı´a FG, Berrade MD, Campos CA. Maintenance and monitoring policy under unrevealed failures.
Proceedings of the 10th International Symposium on Applied Stochastic Models and Data Analysis, June 12–
15, 2001, vol.1 pp.142-147

(5) Nakagawa T. Periodic inspection policy with preventive maintenance. Naval Res Logist Quart 1984, vol
31:pp33–40.

(6) Nakagawa T, Yasui K. Periodic-replacement models with threshold levels, IEEE Transaction on Reliability
1991;vol: 40:pp: 395–407.

(7) Vaurio JK. Optimization of test and maintenance intervals based on risk and cost ,Reliability Engineering
andSystem Safety 1995;vol:49: pp23–26.

(8) Vaurio JK. On time-dependent availability and maintenance optimization of standby units under various
maintenance policies. Reliability Engineering and System Safety 1997;vol 56:pp 79–89.

(9) Ross S. Stochastic processes, 2nd edition. Wiley: New York; 1996.pp 11-45

(10) Vaurio JK. Availability and cost functions for periodically inspected preventively maintained units. Reliability
Engineering and System Safety 1999; vol 63: pp133–140.

(11) Ushakov I, “Reliability: past, present, future,” Recent Advances in Reliability Theory: Methodology, Practice,
and Interface, 2000; Birkhäuser, Boston,pp 3-14.

(12) R. Barlow and F. Proschan, Mathematical Theory of Reliability, 1965; Wiley, New York pp 10-231

(13).R. Barlow, “Mathematical reliability theory from the beginning to the present time,” Proceedings. International.
Conference Mathetical .Methods in Reliability., Newyork , 2002.

(14).H.E. Blanton, R.M. Jacobs, "A survey of techniques for analysis and prediction of equipment and reliability",
IEEE Tranactionon on. Reliability Athens., July 1962, pp.18-35.

(15) W. Weibull, "A statistical theory of the strength of materials", Ing. VetenskapsAkad. Handl.,U.S.A. no. 151,
1939,pp.293-297.

(16) B. Epstein, M. Sobel, "Life testing", J. Amer. Stat. Assoc., vol. 48, no. 263, 1953, pp. 486-502.

(17) H.E. Daniels, "The statistical theory of the strength of bundles of threads", Proc. Roy. Soc. London, vol. 183,
1945, pp. 405-435.

(18) B. Epstein, "Application of the theory of extreme values in fracture problems", J. Amer. Stat. Assoc., vol.
43,1948, pp. 403-412.

(19) W. Weibull, "A statistical distribution function of wide applicability", J. Applied Mech., vol. 18, 1951, pp. 293-
297.
(20) D.J. Davis, "An analysis of some failure data", J. Amer. Stat. Assoc., vol. 47, 1952, pp. 113-150.

(21) J.H.K. Kao, "A new life-quality measure for electron tube", IRE Trans. Rel. and Quality Ctrl., PGRQC- 7,
1956, pp. 1-11.

(22) J.H.K. Kao, "Computer methods for estimating Weibull parameters in reliability studies", IRE Trans. Rel. and
Quality Ctrl., PGRQC-13, 1958, pp. 15-22.

(23)R.J. Buehler, "Confidence intervals for the product of two binomial parameters", J. Amer, Stat.Assoc., vol. 52,
1957, pp. 482-493.

(24) Z.W. Birnbaum, S.C. Saunders, "A statistical model for life-length of materials", J. Amer. Stat. Assoc., vol. 53,
no. 281, 1958, pp. 151-160.

(25) G.R. Herd, "Some statistical concepts and techniques for reliability analysis and prediction", Proc. Natl. Symp.
Rel. and Quality Ctrl., Jan 1959, pp. 126-136.

(26) R.F. Tate, "Unbiased estimation: Functions of location and scale parameters", Ann. Math. Stat., vol. 30, no.2,
1959, pp. 341-366.

(27) D.R. Cox, "On the number of Renewals in a Random Interval," Biometrika, vol. 47, issue 3/4, Dec. 1960, pp.
449-452.

(28) M. Zelen, M.C. Dannemiller, "The robustness of life testing procedures derived from the exponential
distribution", Technometrics, vol. 3, no. 1, 1961, pp. 29-49.

(29) J.E. Nylander, "Statistical distributions in reliability", IRE Trans. Rel. and Quality Ctrl., RQC11, July 1962,
pp. 43- 53.

(30) J.F. Shortle, M.B. Mendel, "Physical foundations for lifetime distributions", Proc. System and Bayesian
Rel.2001,pp. 257-266.

(31) G.S. Watson and W.T. Wells, "On the possibility of improving the mean useful life of items by eliminating
thosewith short lives", Technometrics, vol. 3, 1961, pp. 281-198.

(32) R.E. Barlow, A.W. Marshall, F. Proschan, "Properties of probability distributions with monotone hazard rate",
Ann. Math. Stat., vol. 34, 1963, pp.375-389.

(33) R.E. Barlow, A.W. Marshall, "Bounds for distributions with monotone hazard rate, I and II", Ann. Math.Stat.,
vol. 35, 1964, pp. 1234-1274.

(34) S.M. Ross, Introduction to Probability Models with Optimization Applications, 1972; Academic Press, New
York.

(35) H. Block, T.H. Savits, "The IRFA closure problem", Ann. Prob., 4, 1976, pp. 1030-1032.

(36) S.A. Meltzer, "Designing for reliability", IRE Trans Rel. and Quality Ctrl., PGRQC-8, Sept 1956, pp. 36-43.

(37) H.E. Blanton, "Reliability-sensitivity- function analysis", Electronic Design, vol. 6, Feb 1958.

(38) F.E. Dreste, "Statistics: Key to reliable military electronic design", Military Electronics, vol. 6, Mar. 1959, pp.4,
6, 8.

(39) F.E. Dreste, "Circuit design concepts for high reliability", Proc. Natl. Symp. Rel. and Quality Ctrl., Jan
1960,pp. 121-133.
(40) G.P. Steck, "Upper confidence limits for the failure probability of complex networks", Sandia
CorporationResearch Report, SC-4133(TR), 1958.

(41) A. Madansky, "Uses of tolerance limits in missile evaluation", Proc. Stat. Techniques in Missile
EvaluationSymp., Aug 1958.

(42) J.R. Rosenblatt, "Confidence limits for the reliability of complex systems", Stat. Theory of Rel., University
ofWisconsin Press, Madison, Wisconsin, 1963, pp. 115-148.

(43) M.V. Johns, G.J. Lieberman, "An exact asymptotically efficient confidence bound for reliability in thecase of
the Weibull Distribution", Technometrics, vol. 8, 1966, pp. 135-175.

(44) D.R. Thoman, L.J. Bain, C.E. Antle, "Maximum Likelihood Estimation, Exact Confidence Intervals
forReliability, and Tolerance Limits in the Weibull Distribution", Technometrics, vol. 12, 1970, pp. 363-371.

(45) H.F. Martz, B.S. Duran, "Comparison of three methods for calculating lower confidence limits on
systemreliability using component data", IEEE Trans. Rel., vol. R- 34, no. 2, 1985.

(46) A.J. Lotka, "A contribution to the theory of selfrenewing aggregates with special reference to
industrialreplacement", Ann. Math. Stat., vol. 10, 1939, pp. 1-25.

(47) N.R. Campbell, "The replacement of perishable members of a continually operating system", J. Roy. Stat.
Soc.,vol. 7, 1941, pp. 110-130.

(48) W. Feller, "On the integral equation of renewal theory", Ann. Math. Stat., vol. 12, 1941, pp. 243-267.

(49) D. Blackwell, "A renewal theorem", Duke Math. J., vol. 15, 1948, pp. 145-150.

(50) J.L. Doob, "Renewal theory from the point of view of the theory of probability", Trans. Amer. Math. Soc., 63,
1948, pp. 422-438.

(51) W. Feller, "Fluctuation theory of recurrent events", Trans. Amer. Math. Soc., vol. 67, 1949, pp. 98-119.

(52) D.R. Cox, W.L. Smith, "A direct proof of a fundamental theorem of renewal theory", Skand. Aktuar., 36,1953,
pp. 139-150.

(53) W.L. Smith, "Asymptotic renewal theorems", Proc. Roy. Soc. Edin., A, 64, 1954, pp. 9-48.

(54) W. Feller, Introduction to Probability Theory and its Applications, 2nd ed., 1957; Wiley, New York.

(55) W.L. Smith, "Renewal theory and its ramifications", J. Roy. Stat. Soc., Ser. B, vol. 20, no. 2, 1958, pp. 243-
302.

(56) W.L. Smith, "On the cumulants of renewal processes," Biometrika, vol. 46, issue 1/2, June 1959, pp. 1-29.

(57) R.E. Barlow, L.C. Hunter, "Mathematical models for system reliability", Sylvanica Electronic Defense Labs.,
Rept. No. EDL-E35, Aug 1959.

(58) R.E. Barlow, L.C. Hunter, "Mathematical models for system reliability, part II", The Sylvania Technologist,
vol. 13, 1960, pp. 55-65.

(59) D.R. Cox, Renewal Theory, 1962; Wiley, New York. 50. G.S. Watson and M.R. Leadbetter, "Hazard
Analysis.I," Biometrika, vol. 51, June 1964, pp. 175-184.

(60) B.V. Gnedenko, Y.K. Belyaev, A.D. Solovyev, Math. Methods in Reliability Theory, 1969; Academic Press,
New York. (Please note that this book was published in 1965 in Russia)
(61) Z.W. Birnbaum, "On a use of the Mann-Whitney Statistic", Proc. Berkeley Symp. Math. Stat. and
Prob.,University of California Press, Los Angeles, vol. 1, 1955, pp. 13-17.

(62) Z.W. Birnbaum, J.D. Esary, S.C. Saunders, "Multicomponent systems and structures and their
reliability",Technometrics, vol. 3, Feb 1961, pp. 55-77.

(63) J.D. Esary, F. Proschan, "Coherent structure of nonidentical components", Technometrics, no. 5, 1963, pp.
191-209.

(64) Z.W. Birnbaum, J.D. Esary, "Modules of coherent binary systems", J. SIAM, vol. 13, 1965, pp. 444-462.

(65) Z.W. Birnbaum, J.D. Esary, A.W. Marshall, "Stochastic characterization of wear out for components
andsystems", Ann. Math. Stat., 37, 1966, pp. 816-825

(66) Z.W. Birnbaum, "On the importance of different components in multicomponent system,"
MultivariateAnalysis, II, 1969; Academic Press, New York, pp.581-592.

(67) A. Satyanarayana, A. Prabhakar, "New topological formula and rapid algorithm for reliability analysis of
complex networks", IEEE Trans. Rel., R-27, 1978, pp. 82-100.

(68) A. Satyanarayana, M.K. Chang, "Network reliability and the factoring theorem", Networks, 13, 1983, pp. 107-
120.

(69) A. Bendell, J. Ansell, "The incoherency of multistate coherent system", Rel. Eng., vol. 8, 1984, pp. 165-178.

(70) A.B. Huseby, "Domination Theory and the crapo beta-invariant", Networks, 19, 1989, pp. 135- 149.

(71) J.C. Fu, M.V. Koutras, "Reliability bounds for coherent structures with independent components", Stat.
andProb. Letters, vol. 22, 1995, pp. 137-148.

(72) S. Tsitmidelis, M.V. Koutras, V. Zissimopoulos, "Evaluation of reliability bounds by genetic algorithm",
Proc.Math. Methods in Rel., 2002.

(73) M.V. Boutsikas, M.V. Koutras, "Generalized reliability bounds for coherent structures", J. of Applied
Prob.,vol. 37, 2000, pp. 778-794.

(74) T. Inagaki, E.J. Henley, "Probabilistic evaluations of prime implicants and top events for noncoherent
systems",IEEE Trans. Rel., vol. R-29, no. 5, Dec. 1980, pp. 361-367.

(75) P.S. Jackson, "On the s-importance of elements and prime implicants of noncoherent systems", IEEE Trans.
Rel., vol. R-32, no. 1, Apr. 1983, pp. 21-25.

(76) J.D. Andrews, S. Beeson, "Birnbaum's measure of component importance for noncoherent systems", IEEE
Trans. Rel., vol. 52, no. 2, June 2003, pp. 213-219.

(77) T.F. Oltorik, "Reliability analysis using flowgraphs", Air Force Institute of Technology, USGRR Document,
no. AD 420-047, Aug 1963.

(78) W.W. Haap, "Application of flowgraph techniques to the solution of reliability problems", J. Physics of failure
in Electronics, US Department of Commerce Office of Technical Services AD-434/329, 1964, pp. 375-423.

(79) E. Dolozza, "System states analysis and flowgraph diagrams in reliability", IEEE Trans. Rel., R15, 1966,
pp.383-394.
(80) M.M. Kleinerman, G.H. Weiss, "On the reliability of networks", Proc. Natl. Electronics Conf., vol. 10, 1954,
pp.128-136.

(81) E. Blanton, "Reliability-Prediction technique for use in design of complex systems", IRE Natl. Convention
Record, pt. 10, 1957, pp. 68-79.

(82) http://www.newhousenews.com/archive/macpherson0 21103.html retrived on 10.08.2006

(83) C.W. Holtzman, Jr., W.E. Marshall, "A new method of communication between engineering and
mathematicianaids system reliability prediction", Proc. Natl. Symp. Rel. and Quality Ctrl., Jan 1960, pp. 403-
408.

(84) P. Chatterjee, "Modularization of fault trees: A method to reduce cost of analysis", SIAM Rel. and Fault Tree
Analysis, 1975, pp. 101-137.

(85) A. Rosenthal, "Decomposition methods for fault tree analysis", IEEE Trans. Rel., vol. 43, June 1980, pp. 136-
138.

(86) J.B. Dugan, S.J. Bavuso, M.A. Boyd, " Dynamic fault tree models for fault tolerant computer systems", IEEE
Trans. Rel., vol. 41, no. 3, Sept 1992, pp. 363-377.

(87) J.B. Dugan, S.J. Bavuso, M. Boyd, "Fault trees and Markov models for reliability analysis of fault
tolerantsystems", Rel. Eng. and System Safety, vol. 39, 1993, pp. 291- 301.

(88) R. Gulati, J.B. Dugan, "A modular approach for analyzing static and dynamic fault trees", Proc. RAMS, 1997.

(89) O. Coudert, J.C. Madre, "Fault tree analysis: 10^20 prime implicants and beyond", Proc. RAMS, 1993, pp. 240-
245.

(90) S.A. Doyle, J.B. Dugan, "Dependability assessment using binary decision diagrams", Proc. IEEE Int. Symp.
Fault- Tolerant Computing, FTCS-25, June 1995.

(91) Y. Dutuit, A. Rauzy, "A linear-time algorithm to find modules in fault trees", IEEE Trans. Rel., Sept. 1996.

(92). H.F. Martz, R.G. Almond, "Using higher-level failure data in fault tree quantification", Rel. Eng. and System
Society, 1997, pp. 29-42.

(93) A. Anand, A.K. Somani, "Hierarchical analysis of fault trees with dependencies, using decomposition",
Proc.RAMS, Jan 1998, pp. 69-75.

(94) R. Manian, D. Coppit, K.J. Sullivan, J.B. Dugan, "Bridging the gap between systems and dynamic fault
treemodels", Proc. RAMS, Jan 1999, pp. 105-111.

(95) C.W. Griffin, "Introducing the fault tree as a tool for nuclear safety analysis", Trans. Amer. Nuclear Soc., vol.
9, no. 1, 1966, pp. 157.

(96) J.D. Andrews, "The use of Not logic in fault tree analysis", Qual. Rel. Eng., vol. 17, 2001, pp. 143-150.

(97) S.V. Tsitmidelis, S.V. Zissimopoulos, M.V. Koutras,"Fault tree analysis via set cover model", EUROGEN
2001,Athens, Greece.

(98) I.A. Papazoglou, "Mathematical foundations of event trees", Rel. Eng. and System Safety, vol. 61, 1998, pp.
169-183

(99) J.D. Andrews, S. Dunnett, "Improving accuracy in event tree analysis", Proc. Foresight and Precaution,
Proc.ESREL 2000, SARS and SRA-Europe Annual Conf., May 2000.
(100) J.D. Andrews, S. Dunnett, "Event tree analysis using binary decision diagrams", IEEE Trans. Rel., vol. R-49,
no.2, June 2000, pp. 230-239.

(101) A.N. Kolmogorov, "A number of target hits by several shots and general principles of effectiveness
ofgunfire", Proc. Moscow Inst. Math., issues 12, 1945.

(102) R.O. Frantik, "The determination application and limitations of circuit reliability equations", Sandia
Corp.,report no. SC-3288(TR), April 1954.

(103) L. Takács, “On a sojourn time problem in the theory of stochastic processes,” Trans. Amer. Math. Soc., vol.
93,issue 3, Dec. 1959.

(104) E.A. Elsayed, A. Zebib, "A repairable multistate device", IEEE Trans. Rel., R-28, 1979, p. 81-82.

(105) L.D. Bodin, "Approximation of system reliability using a modular decomposition", Technometrics, vol. 12,
no.2, 1970, pp. 335-344.

(106) A.T. Bharucha-Reid, Elements of the Theory of Markov Processes and their Applications, 1960; McGraw-
Hill, New York

(107) J. Keilson, A. Kooharian, "On time dependent queuing processes", Ann. Math. Stat., vol. 31, 1960.

(108) D.M. Brender, M. Tainiter, "A Markovian model for predicting the reliability of an electronic circuit from data
on component drift and failure", IRE Intl. Convention Record, 1961, pt. 6, pp. 230-241.

(109) I.B. Pogozhev, "Estimation of deviation of failure flow in multi-use equipment from Poisson
process",Cybernetics in Service for Communism, vol. 2, Energiya, Moscow, 1964.

(110) A.D. Solov'yev, "Reliability and queueing theory: standby with rapid renewal," Eng. Cybernetics, no.1, 1970,
pp. 49-64.

(111) A.D. Solov'vey, "Redundancy with fast repair", Eng. Cybernetics, no. 1, 1970.

(112) B. Ouhbi, N. Limnios, "Estimation of kernel, availability and reliability of semiMarkov systems", Proc.Stat.
and Prob. Methods in Rel., 1999.

(113) B. Ouhbi, N. Limnios, "Non-parametric estimation for semi-Markov processes based on its hazard rate", Stat.
Inf. Stoc. Proc., vol. 2, 1999, pp. 151-173.

(114) R.M. Fricks, K.S. Trivedi, "Importance analysis with Markov Chains", Proc. Rel. and Main. Symp., 2003, pp.
89-95.

(115) Y. Lefebvre, "Using equivalent failure rates to assess the unavailability of an ageing system", Proc. Rel. and
Main. Symp., 2003, pp. 82-88.

(116) E.F. Moore, C.E. Shannon, "Reliable circuits using less reliable relays", J. of the Franklin Institute, vol.
262,1956, Pt. I, pp. 191-208, and Pt II, pp. 281-297.

(117) B.V. Gnedenko, "On duplication with renewal", Eng. Cybernetics,Newyork no. 5, pp -282-2971964.

(118) C.R. Gates, "The reliability of redundant systems", JPL-California Inst. Of Tech. Pasadena, CA, Memo 20-
76,Aug 1952.

(119) H. Mine, "Reliability of physical system", IRE Trans. Information Theory, IT-S (Special Supplement),
1959,pp. 138-150.
(120) F. Mosteller, R.E. Rourke, G.B. Thomas, Jr., Probability with statistical applications, 1961; Addison-Wesley,
Reading.

(121) I.I. Bazovsky, Relability Theory and Practice, 1961; Prentice Hall, Englewood Cliffs.

(122) H.F. Martz, R.A. Waller, Bayesian Reliability Analysis, 1982; Wiley, New York.

(123) H.F. Martz, R.A. Waller, E.T. Fickas, "Bayesian reliability analysis of series systems of binomial
subsystemsand components", Technometrics, vol. 30, 1988, pp. 143-154.

(124) H.F. Martz, R.A. Waller, "Bayesian reliability analysis of complex series/parallel systems of
binomialsubsystems and components", Technometrics, vol. 32, 1990, pp. 407-416.

(125) F.L. Hulting, J.A. Robinson, "The reliability of a series system of repairable subsystems: a Bayesian
approach",Naval Research Logistics, vol. 41, 1994, pp. 483-506.

(126) W.J. Kerscher III, J.M. Booker, T.R. Bement, M.A. Meyer, "Characterizing reliability in a product/process
design -assurance program", Proc. RAMS, 1998, pp. 105-112.

(127) S.L. Firstman, "Monte Carlo models for estimating reliability: An exploratory analysis", The Rand Corp.,
Report no. RM2149, ASTIA Doc. No. AD213036, June 1958.

(128) Y.K. Belyaev, T.N. Dugina, E.V.Chepurin, "Computation of lower confidence limit for the complexsystem
reliability", Eng. Cybernetics, no's 2 & 3, 1967.

(129) F. Moskowitz, J. McLean, "Some reliability aspects of system design", IRE Trans. Rel. and Quality Ctrl., vol.
8, 1956, pp. 7-35.

(130) R. Gordon, "Optimum component redundancy for maximum system reliability", Operations Res., vol. 5,
1957,pp. 229-243.

(131) R. Bellman and S. Dreyfus, "Dynamic programming and reliability of multicomponent devices", Operations
Res., vol. 6, 1958, pp. 200-206.

(132) G. Black, F. Proschan, "On optimal redundancy", Operations Res., vol. 7, no. 5, 1959, pp. 581-588.

(133) J.D. Kettelle, "Least-cost allocation of reliability investment”, Operations Res., vol. 10, no. 2, 1962.

(134) R.E. Barlow, L.C. Hunter, F. Proschan, "Optimum redundancy when components are subject to two kinds
offailure", J. SIAM, vol. 11, 1963, pp.64-73.

(135) F. Proschan, T. Bray, "Optimum redundancy under multiple constraints", Operations Res., vol. 13, no. 5,
1965.

(136) F.A. Tillman, H. Ching-Lai, W. Kuo, Optimizationof System Reliability, 1980; Marcel Dekker, New York.

(137) K.E. Portz, H.R. Smith, "Methods for the determination of reliability", IRE Trans. Rel. and QualityCtrl., vol.
11, Aug 1957, pp. 65-73.

(138) J.P. Lipp, "Topology of switching elements vs. reliability", IRE Trans. Rel. and Quality Ctrl., vol. 10,
June1957, pp. 21-33.

(139) B.J. Flehinger, "Reliability improvement through redundancy at various system levels", IBM J. of RnD, issue
2,1958, pp. 148-158.
(140) J.L.Philipson, "Operational reliability model for a reconnaissance system”, IRE Natl. Convention Record, pt.
6,1959, pp. 79-88.

(141) M.I. Kaufmann, R.A. Kaufmann, "Predicting reliability", Machine Design, Aug 1960, pp. 178-184.

(142) E. Cramer, U. Kamps, "Sequential k-out-of-n systems",


http://www.math.unioldenburg.de/preprints/get/source/Hb.pdf, Feb 2000.

(143) W.J. Kerscher III, J.M. Booker, M.A. Meyer, R.E. Smith, "PREDICT: A case study, using fuzzy logic",
Proc.RAMS, 2003, pp. 188-195. "PREDICT: A case study, using fuzzy logic", Proc. RAMS, 2003, pp. 188-
195.

(144) M. Marseguerra, E. Zio, M. Ammaturo, V. Fontana, "Predicting reliability via neural networks", Proc.
RAMS,2003, Tampa, Florida, pp. 196-201.

(145) Abdel-Hameed, M., 1987a. An imperfect maintenance model with block replacements. Applied Stochastic
Models and Data Analysis 3, 63–72.

(146) Abdel-Hameed, M., 1987b. Inspection and maintenance policies of devices subject to deterioration. Advances
in Applied Probability 10, 917–931.

(147) Abdel-Hameed, M., 1995. Correction to: ‘‘Inspection and maintenance policies of devices subject to
deterioration’’. Advances in Applied Probability 27 (2), 584.

(148) Archibald, T.W., Dekker, R., 1996. Modified block-replacement for multiplecomponent systems. IEEE
Transactions on Reliability 45 (1), 75–83.
(148) Asher H. Fein gold H.,1984Repairable systems reliability,. Marcel Dekker, New York.
(149) . Assaf, D., Shanthikumar, J.G., 1987. Optimal group maintenance policies with continuous and periodic
inspections. Management Science 33, 1440–1450.

(150) Aven, T., 1983. Optimal replacement under a minimal repair strategy – a general failure model. Advances in
Applied Probability 15 (1), 198–211.

(151) Aven, T., Jensen, U., 1999. Stochastic Models in Reliability,Applications of Mathematics, vol. 41, Springer,
New York.

(152) Balaban, H.S., Singpurwalla, N.D., 1984. Stochastic properties of a sequence of interfailure times under
minimal repair andunder revival. In:

(153) Abdel-Hameed, M., Cinlar, E., Quinn, J. (Eds.), Reliability Theory and Models. Academic Press, Orlando, FL,
pp. 65–80.

(154) Barlow, R.E., Hunter, L.C., 1960. Optimum preventive maintenance policies. Operations Research 8, 90–100.

(155) Barlow, R.E., Proshan, F., 1965. Mathematical Theory of Reliability. Wiley, New York.

(156) Barlow, R.E., Proshan, F., 1975. Statistical Theory of Reliability and Life Testing. Holt, Rinehart & Winston,
New York.
(157) Beichelt, F., 1976. A general preventive maintenance policy. Mathematische Operationsforschung und
Statistik Series,Statistics 7, 927–932.

(158) Beichelt, F., 1978. A new approach to repair limit replacement policies. In: Transactions of the Eighth Prague
Conference on Information Theory, Statistical Decision Functions,Random Processes, vol. C, Prague, pp. 31–
37.
(159) Beichelt, F., 1981a. A generalized block-replacement policy. IEEE Transactions on Reliability R 30 (2), 171–
173.
(160) Beichelt, F., 1981b. Replacement policies based on system age and maintenance cost limits. Mathematische
Operationsforschung und Statistik Series, Statistics 12 (4), 621–627.
(161) Beichelt, F., 1982. A replacement policy based on limits for the repair cost rate. IEEE Transactions on
Reliability R 31 (4),401–402.
(162) Beichelt, F., Fischer, K., 1980. General failure model applied to preventive maintenance policies. IEEE
Transactions on Reliability R 29(1), 39–41.
(163) Berg, M., 1976. A proof of optimality for age replacement policies. Journal of Applied Probability 13, 751–
759.
(164) .Berg, M., 1976. Optimal replacement policies for two-unit machines with increasing running costs – I.
Stochastic Processes and Applications 5, 89–106.

(165) .Berg, M., 1978. General trigger-off replacement procedures for two-unit systems. Naval Research Logistics
25 (March),15–29.
(166) Berg, M., Epstein, B., 1976. A modified block replacement policy. Naval Research Logistics 23, 15–24.
(167) Berg, M., Epstein, B., 1978. Comparison of age, block, and failure replacement. IEEE Transactions on
Reliability R 27(1), 25–29.
(168) Bergman, B., 1978. Optimal replacement under a general failure model. Advances in Applied Probability10
(2),431–451.
(169) Block, H.W., Borges, W.S., Savits, T.H., 1985. Age dependent minimal repair. Journal of Applied Probability
22,370–385.
(170) Block, H.W., Borges, W.S., Savits, T.H., 1988. A general age replacement model with minimal repair. Naval
Research Logistics 35 (5), 365–372.
(171) Block, H.W., Langberg, N.A., Savits, T.H., 1990. Comparisons for maintenance policies involving complete
and minimal repair. in: Henry W.B., Allan R.S., Thomas H.S. (Eds.),Proceedings of the Symposium on
Dependence in Proba-bility and Statistics. Somerset, Pennsylvania, August 1–5, 1987; IMS Lecture Notes
Monograph Ser. 16, Inst. Math.Statist., Hayward, CA.
(172) Block, H.W., Langberg, N.A., Savits, T.H., 1993. Repair replacement policies. Journal of Applied Probability
30 (1),194–206.
(173) Boland, P.J., 1982. Periodic replacement when increasing minimal repair costs vary with time. Naval
ResearchLogistics 29, 541–546.
(174) Boland, P.J., El-Neweihi, E., 1998. Statistical and information based (physical) minimal repair for k out of n
systems. Journal of Applied Probability 35 (3), 731–740.
(175) Boland, P.J., Proschan, F., 1982. Periodic replacement with increasing minimal repair costs at failure.
Operations Research 30, 183–1189.
(176) Boland, P.J., El-Neweihi, E., Proschan, F., 1991. Stochastic order for inspection and repair policies. The
Annals of Applied Probability 1 (2), 207–218.
(177) Canfield, R.V., 1986. Cost optimization of periodic preventive maintenance. IEEE Transactions on Reliability
R 35 (1),78–81.
(178) Chan, J.K., Shaw, L., 1993. Modeling repairable systems with failure rates that depend on age and
maintenance. IEEE Transactions on Reliability 42, 566–570.

(179) Chan, P.K.W., Downs, T., 1978. Two criteria for preventive maintenance. IEEE Transactions on Reliability R
27, 272–273.
Citation Count – 37

Study the impact of Requirements management Characteristics in


global software development projects: An Ontology based approach
S. Arun Kumar1 and T.Arun Kumar2
1
Assistant Professor, SCSE, VIT University, Vellore, Tamil Nadu, India
2
Professor, SCSE, VIT University, Vellore, Tamil Nadu, India

ABSTRACT

Requirements Management is one of the challenging and key tasks in the development of
software products in distributed software development environment. One of the key reasons
found in our literature survey the failure of software projects due to poor project management
and requirement management activity. This main aim of this paper 1. Formulate a framework for
the successful and efficient requirements management framework for Global Software
Development Projects. (GSD) 2. Design a Mixed organization structure of both traditional
approaches and agile approaches, of global software development projects. 3. Apply Ontology
based Knowledge Management Systems for both the approaches to achieve requirements issues
such as missing, inconsistency of requirements, communication and knowledge management
issues and improve the project management activities in a global software development
environment. 4. Propose requirements management metrics to measure and manage software
process during the development of information systems. The major contribution of this paper is
to analyze the requirements management issues and challenges associated with global software
development projects. Two hypotheses have been formulated and tested this problem through
statistical techniques like correlation and regression analysis and validate the same.

KEYWORDS

Requirements Management (RM), Ontology, Requirements Management Metrics, Knowledge


Management (KM), Global Software Development (GSD).

Full Text: http://www.airccse.org/journal/ijsea/papers/1011ijsea10.pdf


REFERENCES

[1] P. Wongthongtham , E. Chang a, T.S. Dillon , I. Sommerville (2006). “Ontology-based multi-site software
development methodology and tools”, Journal of Systems Architecture 640–653.

[2] S.Arun Kumar, T.Arun Kumar, (2011) “Characterization and Validation of Requirements Management
Measures using Correlation and Regression Model”, International Journal of Computer Science & Information
Technology (IJCSIT), Vol 3, No 2, April 2011.

[3] Loconsole, A. and Borstler, J. 2005. An Industrial Case Study on Requirements Volatility Measures. In
Proceedings of the 12th Asia-Pacific Software Engineering Conference (Dec. 15–17, 2005). IEEE Computer
Society, Washington, DC, 249–256.

[4] Loconsole, A. and Borstler, J. 2005. An Industrial Case Study on Requirements Volatility Measures. In
Proceedings of the 12th Asia-Pacific Software Engineering Conference (Dec. 15–17, 2005). IEEE Computer
Society, Washington, DC, 249–256.

[5] Ambriola, V. and Gervasi, V. 2000. Process Metrics for Requirements Analysis. In Proceedings of the 7th
European Workshop on Software Process Technology (Feb. 21–25, 2000). R. Conradi, Ed. Lecture Notes In
Computer Science, 1780. Springer- Verlag, London, 90–95.

[6] Loconsole, A. and Börstler J., (2007) A Correlational Study on Four Size Measures as Predictors of
Requirements Volatility, Submitted to Journal of Software Measurement.

[7] Nafon Assawamekin.(2010) An Ontology-Based Approach for Multiperspective Requirements Traceability


between Analysis Models, 9th IEEE/ACIS International Conference on Computer and Information Science.

[8] Ontology-based Software Engineering ASLab-ICEA-R-2006-016 v 0.1 Draft of 2006-11-15


http://www.aslab.org/documents/ASLab-ICEA-2006-016.pdf

[9] Steve Easterbrook, “What are Requirements”,2004. http://jasonnolan.net/kmd1002/easterbrook.pdf.

[10] Pressman S Rogers, (2001) “Software Engineering, A Practitioner’s Approach”, Fifth Edition, McGraw Hill
Higher Education.

[11] Loconsole Annabella, (2001)“Measuring the Requirements Management Key Process Area”, Proceeding of
ESCOM – European Software Control and Metrics Conference, London, UK.

[12] Viktor Clerc (2005). “Towards architectural knowledge mangement practices for global software development”
ACM, ISBN: 978-1-60558-038-8.

[13] Berenbach.B, “Global Software Development Handbook”, www.ismjournal.com/ITToday/AU9384_C002.pdf.

[14] Loconsole, A. and Borstler, J. (2003). “Theoretical Validation and Case Study of Requirements Management
Measures”, Department of Computing Science, Umea University, Technical Report UMINF 03.02.

[15] Seija Komi-Sirvio and Maarit Tihinen (2005). “Lessons Learned by Participants of Distributed Software
Development Knowledge and Process Management”, Volume 12 Number 2 pp 108–122.

[16] Christopher Lindquist (2006). “Fixing the Requirements Mess”, CIO magazine, URL:
http://www.cio.in/article/fixing-requirements-mess.

[17] S.Arun Kumar, and T.Arun Kumar (2011). “State of software metrics to forecast the variety of elements in
software development process”, PDCTA 2011, Springer CCIS 203, pp. 561-569.

You might also like